Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
decoding
PRIVACY
Diana SCHNEIDER 										 					 ICED’13 Young Members Event
BRISKROAD
ambassadors of design thinking
fut...
THE PRIVATE REALM
	WHY THE FUSS
	 PRIVACY STRATEGIES
	 FUTURE ROLE OF DESIGN
1
2
3
4
2Diana SCHNEIDER I d.schneider@briskr...
defining privacy
interpersonally negotiated rules of access to the self
3Diana SCHNEIDER I d.schneider@briskroad.com						...
min. participants male	 female expert
reviews
co-creation
sessions
MUC
SEOUL
empirical study
understanding perceptions, co...
name 5 concrete
situations in which
you experienced
privacy
5Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED...
INFORMATION
CULTURE
NATURE
CONSUMPTION
TERRITORY
TOGETHERNESS
SECLUSION
ROOM
DIVISION
PSEU-
DO-SPACE
VIRTUAL SPA-
CE
COMMU...
INFORMATION
CULTURE
NATURE
CONSUMPTION
TERRITORY
TOGETHERNESS
SECLUSION
ROOM
DIVISION
PSEU-
DO-SPACE
VIRTUAL SPA-
CE
COMMU...
name 5 recent
situations in which
your privacy was
compromised
8Diana SCHNEIDER I d.schneider@briskroad.com						 	 					I...
LOSS OF CONTROL
of an individual over his /
her PHYSICAL privacy
LOSS OF CONTROL
of an individual over his /
her SOCIAL pr...
LOSS OF CONTROL
of an individual over his /
her PHYSICAL privacy
LOSS OF CONTROL
of an individual over his /
her SOCIAL pr...
2
why the fuss?
11Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
current situation
privacy crisis?
12Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
13Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
0011010110001
0101000101110111
01010101111101
10111001010
00001010111101
100011101010
11101001110
00011101010
10100011
29
...
3
privacy strategies
15Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
whichstrategies
do you use to
protect/regain/
ensure your 	
privacy
16Diana SCHNEIDER I d.schneider@briskroad.com						 	 ...
analogue privacy strategies
diversity of ways to acquire and protect privacy
17Diana SCHNEIDER I d.schneider@briskroad.com...
analogue privacy strategies
diversity of ways to acquire and protect privacy
paperbags to
hide bought
items
time-managemen...
©2013-PAYWORKSGmbH-J.Lechner,C.Deger,D.Bellem,S.Eumes
mobile tech.
ubiquitous accessibility via portable devices
19Diana S...
mobile tech. privacy strategies
limitations and lack of user control
shut down PC
password
encrypt data
headphones
20Diana...
future role of design
421Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
TECHNOLOGY
PRIVACY
the gap
discrepancy between privacy and technologically enabled strategies
situative
subjective
interpe...
empowering through a workable design tool connecting developers and users
AWARENESSof relevance
UNDERSTANDING of implicati...
Online Pre-Survey
PRIVACY PERCEPTIONS & CONFLICTS
Online CrowdSource Beta
PRIVACY IN MOBILE TECH.
10
197
11
awareness
blue...
Diana SCHNEIDER
Design Thinker l Founder
d.schneider@briskroad.com
www.briskroad.com
BRISKROAD
ambassadors of design think...
Prochain SlideShare
Chargement dans…5
×

DECODING PRIVACY - Future Implications of Privacy in Technology

2 719 vues

Publié le

Conference Speech (YME) at the International Conference on Engineering Design (ICED'13), in Seoul, Korea, August 2013, held by Diana Schneider, Design Thinker at BRISKROAD (www.briskroad.com)

  • Login to see the comments

DECODING PRIVACY - Future Implications of Privacy in Technology

  1. 1. decoding PRIVACY Diana SCHNEIDER ICED’13 Young Members Event BRISKROAD ambassadors of design thinking future implications of privacy in technology ©-http://experttechnologyreview.com/predic- tions-for-mobile-technology-in-2013/
  2. 2. THE PRIVATE REALM WHY THE FUSS PRIVACY STRATEGIES FUTURE ROLE OF DESIGN 1 2 3 4 2Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  3. 3. defining privacy interpersonally negotiated rules of access to the self 3Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  4. 4. min. participants male female expert reviews co-creation sessions MUC SEOUL empirical study understanding perceptions, conflicts and solutions of privacy WORLDWIDE eSurvey ICED’13 Research Presentation 50 197 116 81 10 2 4Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  5. 5. name 5 concrete situations in which you experienced privacy 5Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  6. 6. INFORMATION CULTURE NATURE CONSUMPTION TERRITORY TOGETHERNESS SECLUSION ROOM DIVISION PSEU- DO-SPACE VIRTUAL SPA- CE COMMUNICATIONINTERSPACE MOBILITY DOMESTICITY FAMILIARITY MOTION ENTERTAINMENT ACQUAINTANCEOWNERSHIP INACCESSIBILITY REGENERATION FREEDOM PERSON OF TRUST INTELLECT CREATION isolate interact isolateisolate PLACES OF ENCOUNTER NORMED PLACES BEING UNOBSERVED PHYSICALhuman body member of society identity CONTENTUAL SOCIAL ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- concentric model of privacy trichotomy of the self 6Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  7. 7. INFORMATION CULTURE NATURE CONSUMPTION TERRITORY TOGETHERNESS SECLUSION ROOM DIVISION PSEU- DO-SPACE VIRTUAL SPA- CE COMMUNICATIONINTERSPACE MOBILITY DOMESTICITY FAMILIARITY MOTION ENTERTAINMENT ACQUAINTANCEOWNERSHIP INACCESSIBILITY REGENERATION FREEDOM PERSON OF TRUST INTELLECT CREATION isolate interact isolateisolate PLACES OF ENCOUNTER NORMED PLACES BEING UNOBSERVED PHYSICALhuman body member of society identity CONTENTUAL SOCIAL ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- concentric model of privacy trichotomy of the self dinner with friends driving at night sunday morning routine 7Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  8. 8. name 5 recent situations in which your privacy was compromised 8Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  9. 9. LOSS OF CONTROL of an individual over his / her PHYSICAL privacy LOSS OF CONTROL of an individual over his / her SOCIAL privacy LOSS OF CONTROL of an individual over his / her CONTENTUAL privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS PHYSICALhuman body member of society identity CONTENTUAL SOCIAL DISRESPECT OF INTIMACY UNPROTECTED CONDEMNATION UNWANTED ENTRANCE INTO PRIVATE CONTENT intrinsic CONTROL over one‘s privacy DANGER EXCESSIVE DISROBEMENT BODILY VULNERABILITY PUBLIC EXPOSURE TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE INCAPACITY TO FULFILL ONE‘S PUBLIC ROLE ENDANGERED PROPERTY UNWANTED EXCESS OF INFORMATION IRRECONCILABLE ROLES THREATENED DATA THREATENED SENSORIAL SPHERE EXCESS OF PUBLIC ORDER privacy conflicts duality of control between individuals and their surrounding 9Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  10. 10. LOSS OF CONTROL of an individual over his / her PHYSICAL privacy LOSS OF CONTROL of an individual over his / her SOCIAL privacy LOSS OF CONTROL of an individual over his / her CONTENTUAL privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS PHYSICALhuman body member of society identity CONTENTUAL SOCIAL DISRESPECT OF INTIMACY UNPROTECTED CONDEMNATION UNWANTED ENTRANCE INTO PRIVATE CONTENT intrinsic CONTROL over one‘s privacy DANGER EXCESSIVE DISROBEMENT BODILY VULNERABILITY PUBLIC EXPOSURE TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE INCAPACITY TO FULFILL ONE‘S PUBLIC ROLE ENDANGERED PROPERTY UNWANTED EXCESS OF INFORMATION IRRECONCILABLE ROLES THREATENED DATA THREATENED SENSORIAL SPHERE EXCESS OF PUBLIC ORDER privacy conflicts duality of control between individuals and their surrounding bodily contact in crowded public transport camera surveillance in elevators receiving a private phonecall at the office 10Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  11. 11. 2 why the fuss? 11Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  12. 12. current situation privacy crisis? 12Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  13. 13. 13Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  14. 14. 0011010110001 0101000101110111 01010101111101 10111001010 00001010111101 100011101010 11101001110 00011101010 10100011 29 55 30 56 check-in 31 57 32 58 33 59 26 52 34 60 27 53 35 61 28 54 36PRIVACY UBIQUITY password: *********** ? vs. despite within through 14Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  15. 15. 3 privacy strategies 15Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  16. 16. whichstrategies do you use to protect/regain/ ensure your privacy 16Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  17. 17. analogue privacy strategies diversity of ways to acquire and protect privacy 17Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  18. 18. analogue privacy strategies diversity of ways to acquire and protect privacy paperbags to hide bought items time-management and independence towel on deck-chair 18Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  19. 19. ©2013-PAYWORKSGmbH-J.Lechner,C.Deger,D.Bellem,S.Eumes mobile tech. ubiquitous accessibility via portable devices 19Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  20. 20. mobile tech. privacy strategies limitations and lack of user control shut down PC password encrypt data headphones 20Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  21. 21. future role of design 421Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  22. 22. TECHNOLOGY PRIVACY the gap discrepancy between privacy and technologically enabled strategies situative subjective interpersonal individual cultural creative nuanced generic objective impersonal common global basic trivial vs. 22Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  23. 23. empowering through a workable design tool connecting developers and users AWARENESSof relevance UNDERSTANDING of implications ENABLING user control Future Role of Design the bridge + 23Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  24. 24. Online Pre-Survey PRIVACY PERCEPTIONS & CONFLICTS Online CrowdSource Beta PRIVACY IN MOBILE TECH. 10 197 11 awareness blueprint & Developer Interviews SFO Developer Interviews MUC DESIGN ENGINEERING TOOL REAL-TIME USER IDEA PLATFORM it takes two investigating user and developer perspectives now. goalt=0 decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world strategies situation description location participants decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world conflicts participants PLACES OF ENCOUNTER ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- PLACES OF ENCOUNTER ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP privacy DEFINITIONS privacy CONFLICTS privacy STRATEGIES decoding PRIVACYdesign tool OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES LOSS L over his / her vacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL LOSS L over his / her vacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL CONCEAL OUTSOURCE OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES CONCEAL OUTSOURCE OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES sneak preview www.decodingprivacy.com 24Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  25. 25. Diana SCHNEIDER Design Thinker l Founder d.schneider@briskroad.com www.briskroad.com BRISKROAD ambassadors of design thinking questions? @ S05 - D5 Design for User Experience I Thurs. 08/22 I 10:45am - 12:15pm 25Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy

×