Teaching privacy with ubicomp scenarios in HCI classes

Privacy is a many-faceted concept and, consequently, designing for privacy is a challenging topic to teach. Privacy in ubicomp environments adds to the challenge, since such environments are still rare and people have not gained experience from interacting in them. Scenarios can be used to make the issues concrete for students. We describe three cases, with different scenarios, different pedagogical goals, different levels of students, and different data collection methods, for teaching about privacy using scenarios. We report on the experiences, both the successes and the pitfalls that need to be taken into account.

[1]  Pertti Huuskonen,et al.  Understanding privacy regulation in ubicomp interactions , 2008, Personal and Ubiquitous Computing.

[2]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[3]  Mary Beth Rosson,et al.  Looking for trouble: understanding end-user security management , 2007, CHIMIT '07.

[4]  Florence Appel Ethics across the computer science curriculum: Privacy modules in an introductory database course , 2005, Science and engineering ethics.

[5]  Kari-Jouko Räihä,et al.  Faces of Privacy: Effect of Culture and Context , 2009, INTERACT.

[6]  Anind K. Dey,et al.  Managing Personal Information Disclosure in Ubiquitous Computing Environments , 2003 .

[7]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[8]  Paul Dourish,et al.  Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..

[9]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[10]  Sandeep Purao,et al.  Situating evaluation in scenarios of use , 2004, CSCW.

[11]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[12]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[13]  Saul Greenberg,et al.  Teaching human computer interaction to programmers , 1996, INTR.

[14]  Judy Kay,et al.  Integrating Ethical Content Into Computing Curricula , 2004, ACE.

[15]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[16]  Elizabeth D. Mynatt,et al.  Digital family portraits: supporting peace of mind for extended family members , 2001, CHI.

[17]  Gregory D. Abowd,et al.  Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing , 2005, CHI.

[18]  L. Cassel,et al.  The computing ontology: application in education , 2007, ITiCSE-WGR '07.

[19]  Stefan Stieger,et al.  Internet users' perceptions of 'privacy concerns' and 'privacy actions' , 2007, Int. J. Hum. Comput. Stud..

[20]  Anind K. Dey,et al.  Who wants to know what when? privacy preference determinants in ubiquitous computing , 2003, CHI Extended Abstracts.

[21]  Morten Hertzum,et al.  The Evaluator Effect: A Chilling Fact About Usability Evaluation Methods , 2001, Int. J. Hum. Comput. Interact..

[22]  Lujo Bauer,et al.  Lessons learned from the deployment of a smartphone-based access-control system , 2007, SOUPS '07.

[23]  Gregory D. Abowd,et al.  From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary , 2008, TCHI.

[24]  Michael Friedewald,et al.  Privacy, identity and security in ambient intelligence: A scenario analysis , 2007, Telematics Informatics.

[25]  Ben Shneiderman,et al.  Making a difference: integrating socially relevant projects into HCI teaching , 2006, CHI EA '06.