situated privacy: the role of identity in context · paper on e-education republic of kenya (2006)...

12
Situated Privacy: The role of Identity in context. Anne Adams, Open University

Upload: others

Post on 29-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Situated Privacy: The role of Identity in context.

Anne Adams, Open University

Page 2: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Situated Identity and Privacy

•  Identity – who we are not only relates to what we do but also where we are. (Goffman, Giddens)

•  Trust & Privacy - how we see ourselves, how others see us and in what context.(Wenger, Bellotti, Harisson & Dourish)

•  Situational Experiences and Design •  Trajectories, Dramaturgy and Genres

(benford, Finlay)

•  Complex ecology of devices (nardi)

Page 3: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Situated Privacy

•  Mobile geology Learning

•  Mobile Clinical Learning

•  Mobile social networking and children

•  Policies and design in Africa

•  Privacy / Confidentiality guidance in social

work

Page 4: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

•  Multiple devices •  In the field – pre and post iPad •  Filtering, what to give who •  Different locations changed perspectives

Page 5: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Mobile Clinical Learning

-  Two case studies (Turkey) and (UCL)

-  Case Study 1 focuses on students later on their learning pathway in a specialism.

-  Case Study 2 focuses on students early on their learning pathway in a far more general course on ehealth.

-  Mobile health resources to support the course

Page 6: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Mobile Clinical Learning -  Resources on varicose veins

that were provided on PDA for Case Study 1 participants.

-  Jump between learning material and personal information

“I was going to take a picture of varicose veins on a patient when visiting a hospital...”

Page 7: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Children and Mobile Social Networking

My Maths House Calendar VLH Options Homework Progress Check Record of Achievement

Page 8: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Cyber bulling, Hacking -  Increased problems in schools with mobile access to social

networks

-  CYBER BULLING – social networking sites OR texting

-  Harassment through social networking sites

School Policies: ‘must not post material which could damage the reputation of

yourself, other people or the school.’ ‘In using social networking sites: comments must not make such

comments that bring the …… school its staff or students into disrepute.’

Page 9: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Policy and Design in Africa Policies South Africa Kenya Uganda National Republic of South Africa (2004)’s White

Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of

Education, Science and Technology Sessional Paper no.1

Republic of Uganda (2001) Universities and other Tertiary Institutions Act

Republic of Uganda (2009) Health Sector Strategic Plan

Impact on design process

Enforces university technology innovation

No enforcement or facilitation of technology innovation

Facilitates university technology innovation

Institutional University of Pretoria Strategic Plan 2007-2011

University Strategic Plan (university identity concealed in all Kenyan university policies)

Makerere University Strategic Plan 2008/09-2018/19

Impact on design process

Facilitates initiation of innovative technology projects

Enforces and facilitates design collaboration between e-learning experts, academics and digital librarians

No enforcement or facilitation of collaboration design

Facilitates design collaboration between academics, librarians and end users

Departmental University of Pretoria AIS (Library) Strategic Plan 2007-2010 which incorporates E-library Strategy, Learning and e-learning Facilitation Strategy

University of Pretoria Open Access Mandates

Education Principles

Institutional ICT policy Library strategic plan

Makerere University Library strategic plan 2007-2017

Makerere University Research and Innovation Policy

Makerere University Intellectual Property Management Policy

Makerere University ICT Policy

Impact on design process

Enforces and facilitates design collaboration between e-learning experts, academics and digital librarians

No enforcement or facilitation of collaboration design

Support and facilitate design processes in the projects

Page 10: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Confidentiality & Social Workers -  Thousands of OU Social Worker students previously reviewed

ethical dilemmas – but not electronic privacy risks.

-  Now being taught this through the Adams framework:

1. Information sensitivity - considered from the point of view of the: Individual, Organisation, Owner 2. Information receiver who will see it?Can they identify the person? 3. Data usage How is it going to be used and re-used? Template function: •  The template (framework) provides students with a checklist to work

through before sending information. •  I’m going to use this information for ..x… Is that OK? •  What aspect is unacceptable? Etc.

Page 11: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Confidentiality & Social Workers Review: persons Awareness, Acceptance and Advice

1st Step: Personal Awareness Identify awareness of what information is captured, recorded, distributed and reused about them.

2nd Step: Personal Acceptance

Information Sensitivity

(1)  Identify the sensitivity (with regard to those viewing, editing and distributing it) levels this person attributes to different types of digital information about themselves.

(2)  Support this person in considering sensitivity issues around other people’s digital information.

Information Receivers (1)  Identify this persons’ expectations around who will view their personal digital information (e.g. family, friends, colleagues, employers) and their acceptability levels about this access.

(2)  Support this persons understanding of technical functions to restrict information access according to their needs.

Information Usage (1)  Identify how this person believe their information and digital identity will be used, edited and re-used potentially out of context.

(2)  Identify this persons perceptions of time-frames for how long these different representations of themselves will be available and how they will view them in years to come.

3rd Step: Benefits and Risks Advice Inform person, if unaware, of the potential benefits and privacy risks involved within using social media so an accurate trade-offs can be made by the student and appropriate behaviours (i.e. where, when and what to publish about themselves) adopted for the future.

Page 12: Situated Privacy: The Role of Identity in Context · Paper on e-education Republic of Kenya (2006) ICT Policy Republic of Kenya (2005) Ministry of Education, Science and Technology

Situated identity Privacy

•  Understanding people in a situation to

understand the technology usage

•  Who they are, where they are

•  Experiences, over time

•  Relating design to contextual policies and

guidance.