risk communication as security interaction in the iot
TRANSCRIPT
![Page 1: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/1.jpg)
+
Risk Communication as Security Interaction in the IoT
Unpacking the Future of IoT 17 August 2017 Salish, WA L Jean Camp
![Page 2: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/2.jpg)
+Security Interaction
![Page 3: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/3.jpg)
+Helpful Advice
![Page 4: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/4.jpg)
+Improved Security Interaction
![Page 5: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/5.jpg)
+Better Risk Communication
![Page 6: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/6.jpg)
+People Are Saying
YOU MAKE NO SENSE!!! GET OUT OF MY WAY!!!
![Page 7: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/7.jpg)
+Consider Other People’s Perspectives
One problem, three views: incentives, usability, or risk communication?
![Page 8: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/8.jpg)
+Personalize Security
![Page 9: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/9.jpg)
+Risk Communication
n Simplify
n Identify
n Reify
n Rectify
Mental Models
![Page 10: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/10.jpg)
+Design for Humans Requires Designing for Humans
![Page 11: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/11.jpg)
+Design for Humans Requires Designing for Humans
Smoking is a factor which contributes to lung cancer. Most cancers that start in lung, known as primary lung cancers, are carcinomas that derive from epithelial cells. Depending on the type of tumor, so-called paraneoplastic phenomena may initially attract attention to the disease. In lung cancer, these phenomena may include Lambert-Eaton myasthenic syndrome (muscle weakness due to auto-antibodies), hypercalcemia, or syndrome of inappropriate antidiuretic hormone (SIADH). Tumors in the top (apex) of the lung, known as Pancoast tumors, may invade the local part of the sympathetic nervous system, leading to changed sweating patterns and eye muscle problems (a combination known as Horner's syndrome) as well as muscle weakness in the hands due to invasion of the brachial plexus.
![Page 12: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/12.jpg)
+Design for Humans Requires Designing for Humans
![Page 13: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/13.jpg)
+Simplify
n Change behavior
n By being helpful
n Make it Easy
![Page 14: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/14.jpg)
+Simplify with Mental Models
• Buggy code • Targeting Big Fish • Ubiquitous virus • Young Geek; Graffiti • Young Geek; Reputation • Burglars • Individual Criminals • Organized crime
• Warfare • Medical infection • Property crime • Spatial models • Economic threat • Physical assault
Wash Camp
![Page 15: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/15.jpg)
+Mental Models Make Stories
• Warfare • Medical infection/ virus • Graffiti • Safe spaces • Stealing money/ economic threat • Physical assault
![Page 16: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/16.jpg)
+Simplify the Mental Model
Align with the
stories people
tell
![Page 17: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/17.jpg)
+Simplify, Reify with Mental Models
Video https://www.youtube.com/watch?v=j7zcuDfqRrg
![Page 18: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/18.jpg)
+Risk as Multidimensional
![Page 19: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/19.jpg)
+Identify, Reify
Screen shot here
You Are Risking It -------à>>
But Your Videos All Work!
![Page 20: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/20.jpg)
+Identify, Reify, Rectify
Screen shot here
Look you are safe!
But not everything works.
![Page 21: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/21.jpg)
+Mobile Security Interaction
![Page 22: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/22.jpg)
+Rectify: Make Intentions Actionable
![Page 23: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/23.jpg)
+Simplify: Android Risks & Benefits
Also used locks and eyeballs
![Page 24: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/24.jpg)
+Simplify: Aggregate Ratings
![Page 25: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/25.jpg)
+Rectify
![Page 26: Risk Communication as Security Interaction in the IoT](https://reader031.vdocuments.mx/reader031/viewer/2022012515/618f88ff51c5ee50e64d2dd1/html5/thumbnails/26.jpg)
+Mental Models
n Simplify
n Identify
n Reify
n Rectify