2017
DOI: 10.1145/3134746
|View full text |Cite
|
Sign up to set email alerts
|

Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks

Abstract: Although "privacy by design" (PBD)-embedding privacy protections into products during design, rather than retroactively-uses the term "design" to recognize how technical design choices implement and settle policy, design approaches and methodologies are largely absent from PBD conversations. Critical, speculative, and value-centered design approaches can be used to elicit reflections on relevant social values early in product development, and are a natural fit for PBD and necessary to achieve PBD's goal. Bring… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
35
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 81 publications
(37 citation statements)
references
References 49 publications
2
35
0
Order By: Relevance
“…First, any application that entails the collection and display of personal data should prioritize the agency of users to preserve their own privacy and to choose how and with whom their biosignals are shared. People may have concerns about the intrusiveness of this intimate and sensitive data [49,50]; thus, we need to understand the privacy controls that are necessary for this type of data [71]. In the present work, for example, we explicitly state that Jared agreed to share his heart rate data with participants.…”
Section: Implications For Technologymentioning
confidence: 99%
“…First, any application that entails the collection and display of personal data should prioritize the agency of users to preserve their own privacy and to choose how and with whom their biosignals are shared. People may have concerns about the intrusiveness of this intimate and sensitive data [49,50]; thus, we need to understand the privacy controls that are necessary for this type of data [71]. In the present work, for example, we explicitly state that Jared agreed to share his heart rate data with participants.…”
Section: Implications For Technologymentioning
confidence: 99%
“…One approach to do this uses design as the method of inquiry to understand people and situations. Design activities may be used to engage stakeholders; designers, researchers, and stakeholders create or discuss design concepts together to understand stakeholders' experiences and concerns about privacy [67,80,121]. Relatedly, technology probes or conceptual design artifacts can be shared with stakeholders to understand how privacy arises in the context of their daily activities [95,114].…”
Section: Purpose: How Privacy Is Addressed By Designmentioning
confidence: 99%
“…We used qualitative methods to analyse the answers to the open ended question using two independent coders. We followed the grounded theory approach where the coders coded data by eliciting codes from the data available without any prejudice [23]. This was done in NVivo [24].…”
Section: Discussionmentioning
confidence: 99%