Professional Documents
Culture Documents
LCV Dissertation Proposal Presentation
LCV Dissertation Proposal Presentation
LCV Dissertation Proposal Presentation
3
Monday, March 8, 2010
Usable Security
Sensitive
Personal
Information
6
Monday, March 8, 2010
Guiding Argument: Joint
Optimization
Sensitive
Personal
Information
Social
Mechanisms
6
Monday, March 8, 2010
Guiding Argument: Joint
Optimization
Sensitive
Personal
Information
Social Technical
Mechanisms Mechanisms
6
Monday, March 8, 2010
Guiding Argument: Joint
Optimization
Sensitive
Personal
Information
Social Technical
Mechanisms Mechanisms
Sensitive
Personal
Information
Social Technical
Mechanisms Mechanisms
Sensitive
Personal
Information
8
Monday, March 8, 2010
Guiding Argument: Joint
Optimization
Sensitive
Personal
Information
Technical
Mechanisms
8
Monday, March 8, 2010
Guiding Argument: Joint
Optimization
Sensitive
Personal
Information
Social Technical
Mechanisms Mechanisms
8
Monday, March 8, 2010
Social Norms
Impacting
Security
Privacy & Trust
9
Monday, March 8, 2010
Trust
Tool
Transformation
Subject Object Outcome
Monday, March 8, 2010
Process
14
Activity Theory: Engström
Tool
Transformation
Subject Object Process Outcome
Rules Division of
Community
Labor
Monday, March 8, 2010
15
Activity Theory: Zone of Proximal
Development
✤ External and Internal states
✤ External: artifacts
✤ Managing other’s
information
✤ Information in multiple
places
✤ Information in different
forms
Owner Report
Head Teacher
Teacher
✤ Outlines (somewhat
ambiguously) US National
regulations in regards to
privacy and security of
patients’ ‘information’
“The HIPAA Privacy Rule provides federal protections for personal health information held by
covered entities and gives patients an array of rights with respect to that information. At the
same time, the Privacy Rule is balanced so that it permits the disclosure of personal health
information needed for patient care and other important purposes. The Security Rule specifies a
series of administrative, physical, and technical safeguards for covered entities to use to assure
the confidentiality, integrity, and availability of electronic protected health information.”
Insurance
File Forms Electronic billing patient file; physical file of Physical file in director’s office; sub-file in
medical history; electronic copy of teacher room; electronic copy of information in
information in physical file physical file; possible additional over-flow file
Communication Methods Email, inter-office memos, documenting in Email, inter-office memos, documenting in
files, face-to-face, staff meetings, phone files, face-to-face, texting, staff meetings,
phone, facebook, back-pack mail
Policing Privacy Agency U.S. Department of Health & Human Virginia’s Department of Social Services
Services through HIPPA through bi-annual licensing; additional
accreditation through NYCEA, and hosing
institution such as Virginia Tech
Method of conveying Signed forms provided when first enrolling Ambient information, policy handbook, forms
explicit policies or at start of visit sent back-pack mail to be returned, enrollment
File Travel
Monday, March 8, 2010
Travels with Patient
forms
Central file stays in one location 25
Qualitative
Methods
✤ Studying the world of the participants
as an active - observer
✤ The research findings are dependent on
the interpretations of the researcher;
researcher is the instrument
✤ Research questions are open, and
adaptive to upon deeper
understanding of the research context
✤ Data is captured in notes & rich
descriptions, transcriptions, artifacts,
memos of interpretation, audio
recordings, etc
✤ Data collection is never complete
Theory
Sorting Memos & Adopting
1. Summer Interviews of Certain Categories as
Childcare and Medical Theoretical Concepts
Practice Directors
2. Fall Observations and
Follow-up Interviews Memo Writing/Codes/
Tentative Categories
3. Fall Interviews of Parents
(1) (2) (3) (4)
4. Proposed Observations Initial Focused Advanced & Further Theoretical
Seeking Specific Sampling if Needed
New Data
Coding &
Data Collection
Coding
✤ Ownership
✤ Place-based Norms
✤ Role-based Norms
✤ Information Redundancy
✤ Information On-hand
✤ 1 childcare
✤ 1 medical practice
✤ Goal: Observe the use of explicit and implicit policies & the
breakdowns surrounding them
✤ Set of problem & near-future scenarios that have been abstracted from
observation and pilot studies
✤ Scenarios created to
represent different aspects
of the conceptual
framework created by Dr.
Kafura & Usable Security
Team
✤ Observations:
✤ One observation prior to
summer
✤ One observation in August-
September
✤ Data Aggregation & Analysis:
Summer + Fall
✤ Writing: November-April
✤ Research Defense: January
✤ Final Defense: April
Another thanks to Dr. Fancis Quek & Dr. Denis Gracanin from the
Usable Security team for their feedback.
Activity Motive
Action Goal
Operation Condition
✤ Appropriateness: What
information is appropriate to
reveal in particular contexts
✤ Behavior framing:
mediating behaviors
through the ‘place’ -
regulating privacy
boundaries
✤ Boundary Regulation: the
place where privacy
norms regulate behavior
✤ Trust negotiation:
negotiation between two
parties with different
privacy policies