320 likes | 429 Views
Understanding and Capturing People’s Privacy Policies in a People Finder Application. Madhu Prabaker, Jinghai Rao, Ian Fette, Patrick Kelley, Lorrie Cranor, Jason Hong, Norman Sadeh Carnegie Mellon University. Overview. Case study of People Finder application What it is How it works
E N D
Understanding and Capturing People’s Privacy Policies in a People Finder Application Madhu Prabaker, Jinghai Rao, Ian Fette, Patrick Kelley, Lorrie Cranor, Jason Hong, Norman SadehCarnegie Mellon University
Overview • Case study of People Finder application • What it is • How it works • Lab studies and field trials • Lessons Learned / Opinions and Conjectures
User-Controllable Privacy and SecurityProject Overview • Overall Goal: Better UIs for managing privacy and security for pervasive computing • Simple ways of specifying policies • Clear notifications and explanations of what happened • Better visualizations to summarize results • Machine learning for learning preferences • Start with small evaluations, continue with large-scale ones • Large multi-disciplinary team and project • Six faculty, 2 postdocs, five students • Roughly 2 years into project
User-Controllable Privacy and SecurityProject Overview • Applications • People Finder • Contextual Instant Messaging (later at Ubicomp) • Grey: Access Control to resources • Some Challenges • Not being burdensome or annoying • Right balance of expressiveness and simplicity • Providing enough value so people will use our apps! • Security & privacy our main concern, but not users’
People Finder • Lets you find other people’s location, subject to any specified rules • Okayness checking • Rendezvous • Requestors have a list of buddies whose location they can request via web, system tray, or mobile phone
Some Architectural Details • Laptop version uses Skyhook for positioning • Skyhook based on Intel Place Lab, uses WiFi localization • We also use a database provided by CMU to determine name of location • Each WiFi access point has an associated place name • “Newell-Simon Hall 2504” • Mobile phone version uses Intel POLS for positioning • POLS uses GSM towers for localization • Doesn’t work well in Pittsburgh, not enough GSM towers
Users can Specify Rules • Also generates human-readable description of rule
User FeedbackBalloon Pop-Up • Basic feedback (currently only for laptops)
System Architecture • Centralized architecture • Location stored in a server rather than on end-user devices • Doesn’t this go against design goals of Place Lab, POLS, and your dissertation, Jason? • Some Musings on Privacy • No users even asked about this issue • Would likely only be small subset of tech-savvy users • Easier upgrades (think service vs app) • Made it very easy to add laptop functionality • Makes “Last seen” feature possible • Better performance for some features (ex. querying groups)
Lab Studies • Goal: how well does Machine Learning work for learning prefs? • Setup • 19 participants • Asked to create initial rule set • Go thru a 30 scenarios where someone requested location • What their rule would do • Whether they agreed with rule • Option to change their rules
Lab Studies • Users not very accurate • ~5 min to create rules, 8 min if include refining rules • #Rules ranged 1-10, ~5 rules • Weak correlation between time spent and accuracy • Case-based reasoning yielded pretty good results • Caveat: scenarios probed unusual situations, may not mirror actual practice
Field Trials • Three different groups (not simultaneous) • 15 team members amongst ourselves, 6 wks • 7 MBA students, 2 wks • 6 people involved in organizing Spring Carnival, 9 days • Asked or paid people to audit, to see accuracy • Usage uneven • #Requests ranged from single digits to 100s • Looking at top 12 heavy users, accuracy of rules ~79% • People tended to relax rules over time • Initially were conservative, allowed more use later on
Lessons Thus Far • Surprisingly few concerns about privacy • No user expressed strong privacy concerns • Feature requests were always non-privacy related • If low usage, due to not enough utility, not due to privacy • Does this mean our privacy is good enough, or is this because of users’ attitudes and behaviors? • Hard to tell
Users’ Attitudes and Behaviors • Westin identified three clusters of people wrt attitudes toward commercial entities • Fundamentalists (~25%) • Unconcerned (~10%) • Pragmatists (~65%) • We need something like this for ubicomp • But for personal privacy rather than for commercial entities • With more fine-grained segmentation • Fundamentalists include techno-libertarians and luddites • Pragmatists include too busy, not enough value, etc • Better segmentation would help us understand if our privacy is good enough
Users’ Attitudes and Behaviors • Need to tie better with adoption models
Lessons Thus Far • Also need to consider cost-benefit issues • Lowering Costs • Making rule creation easier and faster • Facebook widget, avoid “yet another social network” problem • Linking with instant messaging • Phone with GPS built-in rather than separate device • Increasing Benefits • Speed of getting someone’s location • Getting multiple people’s locations • Finding location of people not on list • Quality of location (accuracy, place names)
Lessons Thus Far • Critical mass a huge problem • Started with mobile phones, but high-end phones so we could only deploy a few at a time • Laptop version helped address this problem • Believe Facebook widget will overcome this problem • People did not use history and auditing features often • Primarily because we asked or paid them • IMBuddy: But seemed to feel better knowing it was there! • Other features to assuage concerns, even if not used?
Our Next Steps • Facebook widget and larger study • Adding more features • More contextual info, interruptibility and window name • Simplified user interface • Simplifying the privacy model • Supporting common patterns (co-workers only when at work, family and close friends always, etc)
End-User Privacy in HCI • 137 page article surveying privacy in HCI and CSCW • Forthcoming in the new Foundations and Trends journal, in a few weeks
Acknowledgements • NSF Cyber Trust CNS-0627513 • NSF IIS CNS-0433540 • ARO DAAD19-02-0389 • France Telecom • Nokia • IBM • Skyhook