25
decoding PRIVACY Diana SCHNEIDER ICED’13 Young Members Event BRISKROAD ambassadors of design thinking future implications of privacy in technology © - http://experttechnologyreview.com/predic- tions-for-mobile-technology-in-2013/

DECODING PRIVACY - Future Implications of Privacy in Technology

Embed Size (px)

DESCRIPTION

Conference Speech (YME) at the International Conference on Engineering Design (ICED'13), in Seoul, Korea, August 2013, held by Diana Schneider, Design Thinker at BRISKROAD (www.briskroad.com)

Citation preview

Page 1: DECODING PRIVACY - Future Implications of Privacy in Technology

decodingPRIVACY

Diana SCHNEIDER ICED’13 Young Members Event

BRISKROADambassadors of design thinking

future implications of privacy in technology

© -

htt

p://

expe

rtte

chno

logy

revi

ew.c

om/p

redi

c-tio

ns-f

or-m

obile

-tec

hnol

ogy-

in-2

013/

Page 2: DECODING PRIVACY - Future Implications of Privacy in Technology

THE PRIVATE REALM

WHY THE FUSS

PRIVACY STRATEGIES

FUTURE ROLE OF DESIGN

1234

2Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 3: DECODING PRIVACY - Future Implications of Privacy in Technology

defining privacyinterpersonally negotiated rules of access to the self

3Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 4: DECODING PRIVACY - Future Implications of Privacy in Technology

min. participants male female expert reviews

co-creationsessions

MUC

SEOUL

empirical studyunderstanding perceptions, conflicts and solutions of privacy

WORLDWIDEeSurvey

ICED’13Research

Presentation

50 197 116 81 10 24Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 5: DECODING PRIVACY - Future Implications of Privacy in Technology

name 5 concrete situations in which you experienced

privacy

5Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 6: DECODING PRIVACY - Future Implications of Privacy in Technology

INFORMATION

CULTURE

NATURE

CONSUMPTION

TERRITORY

TOGETHERNESS

SECLUSION

ROOM DIVISIONPSEU-

DO-SPACE

VIRTUAL SPA-CE

COMMUNICATIONINTERSPACE

MOBILITY

DOMESTICITY

FAMILIARITY

MOTION

ENTERTAINMENT

ACQUAINTANCEOWNERSHIP

INACCESSIBILITYREGENERATION

FREEDOM

PERSON OF TRUST

INTELLECT

CREATION

isolate

interact

isolateisolate

PLACES OFENCOUNTER

NORMED PLACES

BEINGUNOBSERVED

PHYSICALhuman body member of society

identityCONTENTUAL

SOCIAL

ISOLATE Degree of INTERACTION

INTERACT

ILLU

SO

RY

EN

VR

ON

ME

NT

SOLITUDE

INDIVIDUAL CONTENT

ENV

IRO

NM

EN

T

PEER GROUP INTERAC

TION

INDIVIDUAL EXPERIENCE OF COLLECTIVITY

PR

OD

UC

T

FRIENDSHIP & RELATE

DN

ES

S

COLLECTIVE EXPERIENCE

BO

DY

INTIMACY

CREATION OF CONT-

concentric model of privacytrichotomy of the self

6Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 7: DECODING PRIVACY - Future Implications of Privacy in Technology

INFORMATION

CULTURE

NATURE

CONSUMPTION

TERRITORY

TOGETHERNESS

SECLUSION

ROOM DIVISIONPSEU-

DO-SPACE

VIRTUAL SPA-CE

COMMUNICATIONINTERSPACE

MOBILITY

DOMESTICITY

FAMILIARITY

MOTION

ENTERTAINMENT

ACQUAINTANCEOWNERSHIP

INACCESSIBILITYREGENERATION

FREEDOM

PERSON OF TRUST

INTELLECT

CREATION

isolate

interact

isolateisolate

PLACES OFENCOUNTER

NORMED PLACES

BEINGUNOBSERVED

PHYSICALhuman body member of society

identityCONTENTUAL

SOCIAL

ISOLATE Degree of INTERACTION

INTERACT

ILLU

SO

RY

EN

VR

ON

ME

NT

SOLITUDE

INDIVIDUAL CONTENT

ENV

IRO

NM

EN

T

PEER GROUP INTERAC

TION

INDIVIDUAL EXPERIENCE OF COLLECTIVITY

PR

OD

UC

T

FRIENDSHIP & RELATE

DN

ES

S

COLLECTIVE EXPERIENCE

BO

DY

INTIMACY

CREATION OF CONT-

concentric model of privacytrichotomy of the self

dinner with friends

driving at night

sunday morning routine

7Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 8: DECODING PRIVACY - Future Implications of Privacy in Technology

name 5 recent situations in which your privacy was compromised

8Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 9: DECODING PRIVACY - Future Implications of Privacy in Technology

LOSS OF CONTROL

of an individual over his / her PHYSICAL privacy

LOSS OF CONTROL

of an individual over his / her SOCIAL privacy

LOSS OF CONTROL

of an individual over his / her CONTENTUAL privacy

CONTROL TAKE-OVER

of another‘s PHYSICAL privacy over one‘s own

CONTROL TAKE-OVER

of another‘s SOCIAL privacy over one‘s own

CONTROL TAKE-OVER

of another‘s CONTENTUAL privacy over one‘s own

INTRUSION Locus of TAKING CONTROL

LOSS

PHYSICALhuman body member of society

identityCONTENTUAL

SOCIAL

DISRESPECTOF INTIMACY

UNPROTECTEDCONDEMNATION

UNWANTED ENTRANCEINTO PRIVATE CONTENT

intrinsic CONTROLover one‘s

privacy

DANGER EXCESSIVE DISROBEMENT

BODILYVULNERABILITY

PUBLICEXPOSURE

TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE

INCAPACITY TO FULFILLONE‘S PUBLIC ROLE

ENDANGERED PROPERTY

UNWANTED EXCESSOF INFORMATION

IRRECONCILABLEROLES

THREATENEDDATA

THREATENED SENSORIAL SPHERE

EXCESS OFPUBLIC ORDER

privacy conflictsduality of control between individuals and their surrounding

9Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 10: DECODING PRIVACY - Future Implications of Privacy in Technology

LOSS OF CONTROL

of an individual over his / her PHYSICAL privacy

LOSS OF CONTROL

of an individual over his / her SOCIAL privacy

LOSS OF CONTROL

of an individual over his / her CONTENTUAL privacy

CONTROL TAKE-OVER

of another‘s PHYSICAL privacy over one‘s own

CONTROL TAKE-OVER

of another‘s SOCIAL privacy over one‘s own

CONTROL TAKE-OVER

of another‘s CONTENTUAL privacy over one‘s own

INTRUSION Locus of TAKING CONTROL

LOSS

PHYSICALhuman body member of society

identityCONTENTUAL

SOCIAL

DISRESPECTOF INTIMACY

UNPROTECTEDCONDEMNATION

UNWANTED ENTRANCEINTO PRIVATE CONTENT

intrinsic CONTROLover one‘s

privacy

DANGER EXCESSIVE DISROBEMENT

BODILYVULNERABILITY

PUBLICEXPOSURE

TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE

INCAPACITY TO FULFILLONE‘S PUBLIC ROLE

ENDANGERED PROPERTY

UNWANTED EXCESSOF INFORMATION

IRRECONCILABLEROLES

THREATENEDDATA

THREATENED SENSORIAL SPHERE

EXCESS OFPUBLIC ORDER

privacy conflictsduality of control between individuals and their surrounding

bodily contactin crowded public transport

camera surveillancein elevators

receiving a private phonecall at the office

10Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 11: DECODING PRIVACY - Future Implications of Privacy in Technology

2

why the fuss?

11Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 12: DECODING PRIVACY - Future Implications of Privacy in Technology

current situationprivacy crisis?

12Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 13: DECODING PRIVACY - Future Implications of Privacy in Technology

13Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 14: DECODING PRIVACY - Future Implications of Privacy in Technology

00110101100010101000101110111

0101010111110110111001010

0000101011110110001110101011101001110

00011101010

10100011

2955

3056

check-in

3157

3258

3359

2652

3460

2753

3561

2854

36

PRIVACY

UBIQUITY

password: *********** ?vs.

despite

within

through

14Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 15: DECODING PRIVACY - Future Implications of Privacy in Technology

3

privacy strategies

15Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 16: DECODING PRIVACY - Future Implications of Privacy in Technology

which strategies do you use to protect / regain /ensure your

privacy

16Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 17: DECODING PRIVACY - Future Implications of Privacy in Technology

analogue privacy strategiesdiversity of ways to acquire and protect privacy

17Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 18: DECODING PRIVACY - Future Implications of Privacy in Technology

analogue privacy strategiesdiversity of ways to acquire and protect privacy

paperbags to hide bought items

time-management and independence

towel ondeck-chair

18Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 19: DECODING PRIVACY - Future Implications of Privacy in Technology

© 2

013

- PA

YWO

RKS

Gm

bH -

J. L

echn

er, C

. Deg

er, D

. Bel

lem

, S. E

umes

mobile tech.ubiquitous accessibility via portable devices

19Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 20: DECODING PRIVACY - Future Implications of Privacy in Technology

mobile tech. privacy strategieslimitations and lack of user control

shut down PC

passwordencrypt data

headphones

20Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 21: DECODING PRIVACY - Future Implications of Privacy in Technology

future role of design

421Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 22: DECODING PRIVACY - Future Implications of Privacy in Technology

TECHNOLOGYPRIVACY

the gapdiscrepancy between privacy and technologically enabled strategies

situativesubjectiveinterpersonalindividualculturalcreativenuanced

genericobjective

impersonalcommon

globalbasictrivial

vs.

22Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 23: DECODING PRIVACY - Future Implications of Privacy in Technology

empowering through a workable design tool connecting developers and users

AWARENESS of relevance

UNDERSTANDING of implications

ENABLING user control

Future Role of Design

the bridge

+23Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 24: DECODING PRIVACY - Future Implications of Privacy in Technology

Online Pre-SurveyPRIVACY PERCEPTIONS & CONFLICTS

Online CrowdSource BetaPRIVACY IN MOBILE TECH.

10

197

11

awarenessblueprint &

Developer InterviewsSFO

Developer InterviewsMUC

DESIGN ENGINEERING

TOOL

REAL-TIMEUSER IDEA PLATFORM

it takes twoinvestigating user and developer perspectives

now.

goalt=0

decodingPRIVACY perceptions, conflicts and strategies of privacy in the mobile world

strategies

situation

description

location

participants

decodingPRIVACY perceptions, conflicts and strategies of privacy in the mobile world

conflicts

participants

PLACES OFENCOUNTER

ISOLATE Degree of INTERACTION

INTERACT

ILLU

SO

RY

EN

VR

ON

ME

NT

SOLITUDE

INDIVIDUAL CONTENT

ENV

IRO

NM

EN

T

PEER GROUP INTERAC

TION

INDIVIDUAL EXPERIENCE OF COLLECTIVITY

PR

OD

UC

T

FRIENDSHIP & RELATE

DN

ES

S

COLLECTIVE EXPERIENCE

BO

DY

INTIMACY

CREATION OF CONT-

OWN SPACE OF PERCEPTION

MOBILE TECHNOLOGIES

PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER

SOLUTION HEATMAP

privacy DEFINITIONS

privacy CONFLICTS

privacy STRATEGIES

decodingPRIVACY design tool

OWN SPACE OF PERCEPTION

MOBILE TECHNOLOGIES

LOSS Lover his /

her vacy

OF CONTROL

over his / her SOCIAL privacy

TROL

over his / privacy

CONTROL TAKE-OVER

of another‘s PHYSICAL privacy over one‘s own

CONTROL TAKE-OVER

of another‘s SOCIAL privacy over one‘s own

TAKE-OVER

of another‘s CONTENTUAL privacy over one‘s own

INTRUSION Locus of TAKING CONTROL

LOSS

intrinsic CONTROL

CONCEAL

OUTSOURCE

OWN SPACE OF

PERCEPTION

MOBILE TECHNOLOGIES sneak previewwww.decodingprivacy.com

24Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy

Page 25: DECODING PRIVACY - Future Implications of Privacy in Technology

Diana SCHNEIDERDesign Thinker l Founder

[email protected]

BRISKROADambassadors of design thinking

questions?

@S05 - D5 Design for User Experience I Thurs. 08/22 I 10:45am - 12:15pm

25Diana SCHNEIDER I [email protected] ICED’13 I Decoding Privacy