SlideShare a Scribd company logo
1 of 25
Download to read offline
decoding
PRIVACY
Diana SCHNEIDER 										 					 ICED’13 Young Members Event
BRISKROAD
ambassadors of design thinking
future implications of
privacy in technology
©-http://experttechnologyreview.com/predic-
tions-for-mobile-technology-in-2013/
THE PRIVATE REALM
	WHY THE FUSS
	 PRIVACY STRATEGIES
	 FUTURE ROLE OF DESIGN
1
2
3
4
2Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
defining privacy
interpersonally negotiated rules of access to the self
3Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
min. participants male	 female expert
reviews
co-creation
sessions
MUC
SEOUL
empirical study
understanding perceptions, conflicts and solutions of privacy
WORLDWIDE
eSurvey
ICED’13
Research
Presentation
50 197 116 81 10 2
4Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
name 5 concrete
situations in which
you experienced
privacy
5Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
INFORMATION
CULTURE
NATURE
CONSUMPTION
TERRITORY
TOGETHERNESS
SECLUSION
ROOM
DIVISION
PSEU-
DO-SPACE
VIRTUAL SPA-
CE
COMMUNICATIONINTERSPACE
MOBILITY
DOMESTICITY
FAMILIARITY
MOTION
ENTERTAINMENT
ACQUAINTANCEOWNERSHIP
INACCESSIBILITY
REGENERATION
FREEDOM
PERSON OF
TRUST
INTELLECT
CREATION
isolate
interact
isolateisolate
PLACES OF
ENCOUNTER
NORMED
PLACES
BEING
UNOBSERVED
PHYSICALhuman body member of society
identity
CONTENTUAL
SOCIAL
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
concentric model of privacy
trichotomy of the self
6Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
INFORMATION
CULTURE
NATURE
CONSUMPTION
TERRITORY
TOGETHERNESS
SECLUSION
ROOM
DIVISION
PSEU-
DO-SPACE
VIRTUAL SPA-
CE
COMMUNICATIONINTERSPACE
MOBILITY
DOMESTICITY
FAMILIARITY
MOTION
ENTERTAINMENT
ACQUAINTANCEOWNERSHIP
INACCESSIBILITY
REGENERATION
FREEDOM
PERSON OF
TRUST
INTELLECT
CREATION
isolate
interact
isolateisolate
PLACES OF
ENCOUNTER
NORMED
PLACES
BEING
UNOBSERVED
PHYSICALhuman body member of society
identity
CONTENTUAL
SOCIAL
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
concentric model of privacy
trichotomy of the self
dinner
with
friends
driving
at night
sunday
morning
routine
7Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
name 5 recent
situations in which
your privacy was
compromised
8Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
LOSS OF CONTROL
of an individual over his /
her PHYSICAL privacy
LOSS OF CONTROL
of an individual over his /
her SOCIAL privacy
LOSS OF CONTROL
of an individual over his /
her CONTENTUAL privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
PHYSICALhuman body member of society
identity
CONTENTUAL
SOCIAL
DISRESPECT
OF INTIMACY
UNPROTECTED
CONDEMNATION
UNWANTED ENTRANCE
INTO PRIVATE CONTENT
intrinsic
CONTROL
over one‘s
privacy
DANGER
EXCESSIVE
DISROBEMENT
BODILY
VULNERABILITY
PUBLIC
EXPOSURE
TRESPASSING THE BODILY/
SENSORIAL PROTECTIVE ZONE
INCAPACITY TO FULFILL
ONE‘S PUBLIC ROLE
ENDANGERED
PROPERTY
UNWANTED EXCESS
OF INFORMATION
IRRECONCILABLE
ROLES
THREATENED
DATA
THREATENED
SENSORIAL SPHERE
EXCESS OF
PUBLIC ORDER
privacy conflicts
duality of control between individuals and their surrounding
9Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
LOSS OF CONTROL
of an individual over his /
her PHYSICAL privacy
LOSS OF CONTROL
of an individual over his /
her SOCIAL privacy
LOSS OF CONTROL
of an individual over his /
her CONTENTUAL privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
PHYSICALhuman body member of society
identity
CONTENTUAL
SOCIAL
DISRESPECT
OF INTIMACY
UNPROTECTED
CONDEMNATION
UNWANTED ENTRANCE
INTO PRIVATE CONTENT
intrinsic
CONTROL
over one‘s
privacy
DANGER
EXCESSIVE
DISROBEMENT
BODILY
VULNERABILITY
PUBLIC
EXPOSURE
TRESPASSING THE BODILY/
SENSORIAL PROTECTIVE ZONE
INCAPACITY TO FULFILL
ONE‘S PUBLIC ROLE
ENDANGERED
PROPERTY
UNWANTED EXCESS
OF INFORMATION
IRRECONCILABLE
ROLES
THREATENED
DATA
THREATENED
SENSORIAL SPHERE
EXCESS OF
PUBLIC ORDER
privacy conflicts
duality of control between individuals and their surrounding
bodily contact
in crowded
public transport
camera
surveillance
in elevators
receiving a
private phonecall
at the office
10Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
2
why the fuss?
11Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
current situation
privacy crisis?
12Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
13Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
0011010110001
0101000101110111
01010101111101
10111001010
00001010111101
100011101010
11101001110
00011101010
10100011
29
55
30
56
check-in
31
57
32
58
33
59
26
52
34
60
27
53
35
61
28
54
36PRIVACY
UBIQUITY
password: ***********
?
vs.
despite
within
through
14Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
3
privacy strategies
15Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
whichstrategies
do you use to
protect/regain/
ensure your 	
privacy
16Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
analogue privacy strategies
diversity of ways to acquire and protect privacy
17Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
analogue privacy strategies
diversity of ways to acquire and protect privacy
paperbags to
hide bought
items
time-management
and independence
towel on
deck-chair
18Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
©2013-PAYWORKSGmbH-J.Lechner,C.Deger,D.Bellem,S.Eumes
mobile tech.
ubiquitous accessibility via portable devices
19Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
mobile tech. privacy strategies
limitations and lack of user control
shut down PC
password
encrypt data
headphones
20Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
future role of design
421Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
TECHNOLOGY
PRIVACY
the gap
discrepancy between privacy and technologically enabled strategies
situative
subjective
interpersonal
individual
cultural
creative
nuanced
generic
objective
impersonal
common
global
basic
trivial
vs.
22Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
empowering through a workable design tool connecting developers and users
AWARENESSof relevance
UNDERSTANDING of implications
ENABLING user control
Future Role of Design
the bridge
+ 23Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
Online Pre-Survey
PRIVACY PERCEPTIONS & CONFLICTS
Online CrowdSource Beta
PRIVACY IN MOBILE TECH.
10
197
11
awareness
blueprint &
Developer Interviews
SFO
Developer Interviews
MUC
DESIGN
ENGINEERING
TOOL
REAL-TIME
USER IDEA
PLATFORM
it takes two
investigating user and developer perspectives
now.
goalt=0
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
strategies
situation
description
location
participants
decoding
PRIVACYperceptions, conflicts and strategies of privacy in the mobile world
conflicts
participants
PLACES OF
ENCOUNTER
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
PLACES OF
ENCOUNTER
ISOLATE
Degree of INTERACTION
INTERACT
ILLUSORYENVRONMENT
SOLITUDE
INDIV
IDUALCONTENT
ENVIRONMENT
PEER GROUP
INTE
RACTION
IND
IVIDUALEXPERIENCEOFCOLLECTIVITY
PRODUCT
FRIENDSHIP
&
RELATEDNESS
C
O
LLECTIVEEXPERIENCE
BODY
INTIMAC
Y
C
REATIONOFCONT-
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER
SOLUTION HEATMAP
privacy DEFINITIONS
privacy CONFLICTS
privacy STRATEGIES
decoding
PRIVACYdesign tool
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
LOSS L
over his /
her vacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
LOSS L
over his /
her vacy
OF CONTROL
over his /
her SOCIAL privacy
TROL
over his /
privacy
CONTROL TAKE-OVER
of another‘s PHYSICAL
privacy over one‘s own
CONTROL TAKE-OVER
of another‘s SOCIAL
privacy over one‘s own
TAKE-OVER
of another‘s CONTENTUAL
privacy over one‘s own
INTRUSION
Locus of TAKING CONTROL
LOSS
intrinsic
CONTROL
CONCEAL
OUTSOURCE
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
CONCEAL
OUTSOURCE
OWN SPACE OF
PERCEPTION
MOBILE TECHNOLOGIES
sneak preview
www.decodingprivacy.com
24Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy
Diana SCHNEIDER
Design Thinker l Founder
d.schneider@briskroad.com
www.briskroad.com
BRISKROAD
ambassadors of design thinking
questions?
@
S05 - D5 Design for User Experience I Thurs. 08/22 I 10:45am - 12:15pm
25Diana SCHNEIDER I d.schneider@briskroad.com						 	 					ICED’13 I Decoding Privacy

More Related Content

Similar to DECODING PRIVACY - Future Implications of Privacy in Technology

DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...
DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...
DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...Diana Schneider
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsSven Wohlgemuth
 
Social engineering – posing challenges to the thinking security professional ...
Social engineering – posing challenges to the thinking security professional ...Social engineering – posing challenges to the thinking security professional ...
Social engineering – posing challenges to the thinking security professional ...Paul Devassy, CPP
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Marco Morana
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsDavid Wood
 
GDPR Art. 25 - Privacy by design and default
GDPR Art. 25 - Privacy by design and defaultGDPR Art. 25 - Privacy by design and default
GDPR Art. 25 - Privacy by design and defaultMichelangelo van Dam
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionIRJET Journal
 
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...Diana Schneider
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignDr. Ann Cavoukian
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Scott Wright
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Lutz Schmitt
 
Designing products and services with GDPR
Designing products and services with GDPRDesigning products and services with GDPR
Designing products and services with GDPRCyber-Duck
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPAdi Saputra
 

Similar to DECODING PRIVACY - Future Implications of Privacy in Technology (20)

DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...
DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...
DECODING PRIVACY - Perceptions, Conflicts and Strategies of Privacy in the Mo...
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet Applications
 
Social engineering – posing challenges to the thinking security professional ...
Social engineering – posing challenges to the thinking security professional ...Social engineering – posing challenges to the thinking security professional ...
Social engineering – posing challenges to the thinking security professional ...
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable ClaimsPrivacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
 
GDPR Art. 25 - Privacy by design and default
GDPR Art. 25 - Privacy by design and defaultGDPR Art. 25 - Privacy by design and default
GDPR Art. 25 - Privacy by design and default
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
 
Accessible Privacy and Security
Accessible Privacy and SecurityAccessible Privacy and Security
Accessible Privacy and Security
 
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...
MINDSET BEYOND THE MYTH - practice, applicability and teachability of Design ...
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
 
10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)10 Overriding Themes from SXSW (March 2014)
10 Overriding Themes from SXSW (March 2014)
 
Designing products and services with GDPR
Designing products and services with GDPRDesigning products and services with GDPR
Designing products and services with GDPR
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

DECODING PRIVACY - Future Implications of Privacy in Technology

  • 1. decoding PRIVACY Diana SCHNEIDER ICED’13 Young Members Event BRISKROAD ambassadors of design thinking future implications of privacy in technology ©-http://experttechnologyreview.com/predic- tions-for-mobile-technology-in-2013/
  • 2. THE PRIVATE REALM WHY THE FUSS PRIVACY STRATEGIES FUTURE ROLE OF DESIGN 1 2 3 4 2Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 3. defining privacy interpersonally negotiated rules of access to the self 3Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 4. min. participants male female expert reviews co-creation sessions MUC SEOUL empirical study understanding perceptions, conflicts and solutions of privacy WORLDWIDE eSurvey ICED’13 Research Presentation 50 197 116 81 10 2 4Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 5. name 5 concrete situations in which you experienced privacy 5Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 6. INFORMATION CULTURE NATURE CONSUMPTION TERRITORY TOGETHERNESS SECLUSION ROOM DIVISION PSEU- DO-SPACE VIRTUAL SPA- CE COMMUNICATIONINTERSPACE MOBILITY DOMESTICITY FAMILIARITY MOTION ENTERTAINMENT ACQUAINTANCEOWNERSHIP INACCESSIBILITY REGENERATION FREEDOM PERSON OF TRUST INTELLECT CREATION isolate interact isolateisolate PLACES OF ENCOUNTER NORMED PLACES BEING UNOBSERVED PHYSICALhuman body member of society identity CONTENTUAL SOCIAL ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- concentric model of privacy trichotomy of the self 6Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 7. INFORMATION CULTURE NATURE CONSUMPTION TERRITORY TOGETHERNESS SECLUSION ROOM DIVISION PSEU- DO-SPACE VIRTUAL SPA- CE COMMUNICATIONINTERSPACE MOBILITY DOMESTICITY FAMILIARITY MOTION ENTERTAINMENT ACQUAINTANCEOWNERSHIP INACCESSIBILITY REGENERATION FREEDOM PERSON OF TRUST INTELLECT CREATION isolate interact isolateisolate PLACES OF ENCOUNTER NORMED PLACES BEING UNOBSERVED PHYSICALhuman body member of society identity CONTENTUAL SOCIAL ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- concentric model of privacy trichotomy of the self dinner with friends driving at night sunday morning routine 7Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 8. name 5 recent situations in which your privacy was compromised 8Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 9. LOSS OF CONTROL of an individual over his / her PHYSICAL privacy LOSS OF CONTROL of an individual over his / her SOCIAL privacy LOSS OF CONTROL of an individual over his / her CONTENTUAL privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS PHYSICALhuman body member of society identity CONTENTUAL SOCIAL DISRESPECT OF INTIMACY UNPROTECTED CONDEMNATION UNWANTED ENTRANCE INTO PRIVATE CONTENT intrinsic CONTROL over one‘s privacy DANGER EXCESSIVE DISROBEMENT BODILY VULNERABILITY PUBLIC EXPOSURE TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE INCAPACITY TO FULFILL ONE‘S PUBLIC ROLE ENDANGERED PROPERTY UNWANTED EXCESS OF INFORMATION IRRECONCILABLE ROLES THREATENED DATA THREATENED SENSORIAL SPHERE EXCESS OF PUBLIC ORDER privacy conflicts duality of control between individuals and their surrounding 9Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 10. LOSS OF CONTROL of an individual over his / her PHYSICAL privacy LOSS OF CONTROL of an individual over his / her SOCIAL privacy LOSS OF CONTROL of an individual over his / her CONTENTUAL privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own CONTROL TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS PHYSICALhuman body member of society identity CONTENTUAL SOCIAL DISRESPECT OF INTIMACY UNPROTECTED CONDEMNATION UNWANTED ENTRANCE INTO PRIVATE CONTENT intrinsic CONTROL over one‘s privacy DANGER EXCESSIVE DISROBEMENT BODILY VULNERABILITY PUBLIC EXPOSURE TRESPASSING THE BODILY/ SENSORIAL PROTECTIVE ZONE INCAPACITY TO FULFILL ONE‘S PUBLIC ROLE ENDANGERED PROPERTY UNWANTED EXCESS OF INFORMATION IRRECONCILABLE ROLES THREATENED DATA THREATENED SENSORIAL SPHERE EXCESS OF PUBLIC ORDER privacy conflicts duality of control between individuals and their surrounding bodily contact in crowded public transport camera surveillance in elevators receiving a private phonecall at the office 10Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 11. 2 why the fuss? 11Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 12. current situation privacy crisis? 12Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 13. 13Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 15. 3 privacy strategies 15Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 16. whichstrategies do you use to protect/regain/ ensure your privacy 16Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 17. analogue privacy strategies diversity of ways to acquire and protect privacy 17Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 18. analogue privacy strategies diversity of ways to acquire and protect privacy paperbags to hide bought items time-management and independence towel on deck-chair 18Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 19. ©2013-PAYWORKSGmbH-J.Lechner,C.Deger,D.Bellem,S.Eumes mobile tech. ubiquitous accessibility via portable devices 19Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 20. mobile tech. privacy strategies limitations and lack of user control shut down PC password encrypt data headphones 20Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 21. future role of design 421Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 22. TECHNOLOGY PRIVACY the gap discrepancy between privacy and technologically enabled strategies situative subjective interpersonal individual cultural creative nuanced generic objective impersonal common global basic trivial vs. 22Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 23. empowering through a workable design tool connecting developers and users AWARENESSof relevance UNDERSTANDING of implications ENABLING user control Future Role of Design the bridge + 23Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 24. Online Pre-Survey PRIVACY PERCEPTIONS & CONFLICTS Online CrowdSource Beta PRIVACY IN MOBILE TECH. 10 197 11 awareness blueprint & Developer Interviews SFO Developer Interviews MUC DESIGN ENGINEERING TOOL REAL-TIME USER IDEA PLATFORM it takes two investigating user and developer perspectives now. goalt=0 decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world strategies situation description location participants decoding PRIVACYperceptions, conflicts and strategies of privacy in the mobile world conflicts participants PLACES OF ENCOUNTER ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- PLACES OF ENCOUNTER ISOLATE Degree of INTERACTION INTERACT ILLUSORYENVRONMENT SOLITUDE INDIV IDUALCONTENT ENVIRONMENT PEER GROUP INTE RACTION IND IVIDUALEXPERIENCEOFCOLLECTIVITY PRODUCT FRIENDSHIP & RELATEDNESS C O LLECTIVEEXPERIENCE BODY INTIMAC Y C REATIONOFCONT- OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP PHYSICAL HYPERVISOR VIRTUAL MACHINE GUEST OS LAYER APPLICATION USER SOLUTION HEATMAP privacy DEFINITIONS privacy CONFLICTS privacy STRATEGIES decoding PRIVACYdesign tool OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES LOSS L over his / her vacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL LOSS L over his / her vacy OF CONTROL over his / her SOCIAL privacy TROL over his / privacy CONTROL TAKE-OVER of another‘s PHYSICAL privacy over one‘s own CONTROL TAKE-OVER of another‘s SOCIAL privacy over one‘s own TAKE-OVER of another‘s CONTENTUAL privacy over one‘s own INTRUSION Locus of TAKING CONTROL LOSS intrinsic CONTROL CONCEAL OUTSOURCE OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES CONCEAL OUTSOURCE OWN SPACE OF PERCEPTION MOBILE TECHNOLOGIES sneak preview www.decodingprivacy.com 24Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy
  • 25. Diana SCHNEIDER Design Thinker l Founder d.schneider@briskroad.com www.briskroad.com BRISKROAD ambassadors of design thinking questions? @ S05 - D5 Design for User Experience I Thurs. 08/22 I 10:45am - 12:15pm 25Diana SCHNEIDER I d.schneider@briskroad.com ICED’13 I Decoding Privacy