Cars, Condoms, & Information Sharing How Private is Private Enough?
description
Transcript of Cars, Condoms, & Information Sharing How Private is Private Enough?
CARS, CONDOMS, & INFORMATION SHARINGHOW PRIVATE IS PRIVATE ENOUGH?Vaibhav Garg Drexel
University
Cars
J. Adams. Cars, cholera, and cows. CATO Institute, 335: 1–49, 1999.
Seat Belt Habit http://youtu.be/Fa5BVk9mbSY
Condoms
M. Cassell, D. Halperin, J. Shelton, and D. Stanton. Risk compensation: The Achilles’ heel of innovations in HIV prevention? British Medical Journal, 332(7541):605–607, 2006.
Privacy
L. Brandimarte, A. Acquisti, and G. Loewenstein. Misplaced confidences: Privacy and the control paradox. Social Psychological and Personality Science, 2012.
RiskComes from the Italian word ‘risicare’
Probability * Magnitude
Rational Agent
Smoking is a factor which contributes to lung cancer. Most cancers that start in lung, known as primary lung cancers, are carcinomas that derive from epithelial cells. Depending on the type of tumor, so-called paraneoplastic phenomena may initially attract attention to the disease.[16] In lung cancer, these phenomena may include Lambert-Eaton myasthenic syndrome (muscle weakness due to auto-antibodies), hypercalcemia, or syndrome of inappropriate antidiuretic hormone (SIADH). Tumors in the top (apex) of the lung, known as Pancoast tumors,[17] may invade the local part of the sympathetic nervous system, leading to changed sweating patterns and eye muscle problems (a combination known as Horner's syndrome) as well as muscle weakness in the hands due to invasion of the brachial plexus.
Privacy Risk Communication (1)
Privacy Risk Communication (2)
Privacy Risk Communication (3)
People don’t care
Complete Information == Market Efficiency
R. A. Posner. The Economics of Privacy. American Economic Review, 71(2):405-409, 1981.
People don’t know
Info graphic from Matt McKeon.
Usability
P. Inglesant and M. Sasse. The true cost of unusable password policies: password use in the wild. In Proceedings of the 28th International conference on Human factors in computing systems, pages 383–392. ACM, 2010.
RiskComes from the Italian word ‘risicare’
Probability * Magnitude
Boundedly Rational
J. Grossklags and A.Acquisti. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. Workshop on Economics of Information Security. 2007.
16
Certainty Effect
Bird in hand is worth two in the bush!
For sure!
Maybe! P=0.1
17
Reflection Effect
Lose For sure!
Lose Maybe! P=0.1
We prefer certain gains but uncertain losses!
Class Participation
Class Participation
Class Participation
Class Participation
Class Participation
Class Participation
Boundedly Rational
J. Grossklags and A.Acquisti. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. Workshop on Economics of Information Security. 2007.
25
Voluntariness
26
Immediacy
27
Knowledge to Exposed
28
Knowledge to Science
29
Control
30
Newness
31
Common-Dread
32
Chronic-catatrophic
33
Severity
Nine Dimensional Model Voluntariness Immediacy Knowledge to Experts Knowledge to Exposed Control Newness Common-Dread Chronic-Catastrophic SeverityB. Fischhoff, P. Slovic, S. Lichtenstein, S. Read, and B. Combs. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sciences, 9(2):127–152, 1978.
Revealed Preferences Revealed Preferences
Attitudes are reflected by behavior Traditionally Acceptable
‘The… assumption is that historically revealed social preferences and costs are sufficiently enduring to permit their use for predictive purposes.’
C. Starr. Social benefit versus technological risk. Science, 165(3899):1232–1238, 1969.
Expressed Preferences Expressed Preferences
Behaviors are informed by attitudes What end-users want or acceptable risk?
‘The societal value system fluctuates with time, and the technological capability to follow fast changing societal goals does not exist.’C. Starr, R. Rudman, and C. Whipple. Philosophical Basis for Risk Analysis. Annual Review of Energy, 1:629-662, 1976.
Nine Dimensional Model Voluntariness Immediacy Knowledge to Experts Knowledge to Exposed Control Newness Common-Dread Chronic-Catastrophic SeverityB. Fischhoff, P. Slovic, S. Lichtenstein, S. Read, and B. Combs. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sciences, 9(2):127–152, 1978.
Rational Risk Communication
Smoking is a factor which contributes to lung cancer. Most cancers that start in lung, known as primary lung cancers, are carcinomas that derive from epithelial cells. Depending on the type of tumor, so-called paraneoplastic phenomena may initially attract attention to the disease.[16] In lung cancer, these phenomena may include Lambert-Eaton myasthenic syndrome (muscle weakness due to auto-antibodies), hypercalcemia, or syndrome of inappropriate antidiuretic hormone (SIADH). Tumors in the top (apex) of the lung, known as Pancoast tumors,[17] may invade the local part of the sympathetic nervous system, leading to changed sweating patterns and eye muscle problems (a combination known as Horner's syndrome) as well as muscle weakness in the hands due to invasion of the brachial plexus.
Boundedly Rational
Gender Differences
Aging!
Income
Education
Mental Models Physical Criminal Medical Warfare Economic
Boundedly Rational
Mental Model
Privacy Case Study Phishing Keyloggers Older Adults
48
Why Older Adults? Fastest growing demographic Susceptibility to fraud
20% of the victims (FTC) 1/10th of publicly held bonds 1/3rd of publicly held stock
49
Why Design for Older Adults Designs for younger people Assumptions
Technical experience Sight, focus, dexterity Risk posture
50
Design Constraints Memory
Semantic Learnt Lasts longer Retention is better
Episodic Experienced Richer Retrieval is better!
Mental Models Physical, Criminal, Economic, Medical, and
Warfare
51
Design Constraints Memory
Semantic Learnt Lasts longer Retention is better
Episodic Experienced Richer Retrieval is better!
Mental Models Physical, Criminal, Economic, Medical, and
Warfare
52
Risk Communication: Text
Privacy Videos Phishing
http://youtu.be/4ZQ9pFTCdy4 Keylogger
http://youtu.be/6zHJoZqrCB0
54
To conclude…