Parenting from the Pocket: Value Tensions and TechnicalDirections for Secure and Private Parent-Teen Mobile Safety. Czeskisy, A., Dermendjievay, I., Yapity, H., Borningy, A., Friedmanz, B., Gill, B., & Kohno, T. In Symposium on Usable Privacy and Security (SOUPS) 2010. Website abstract bibtex An increasing number of high-tech devices, such as drivermonitoring systems and Internet usage monitoring tools, areadvertised as useful or even necessary for good parenting ofteens. Simultaneously, there is a growing market for mobile\personal safety" devices. As these trends merge, there willbe signicant implications for parent-teen relationships, affectingdomains such as privacy, trust, and maturation. Notonly the teen and his or her parents are aected; other importantstakeholders include the teen's friends who may beunwittingly monitored. This problem space, with less clearcutassets, risks, and aected parties, thus lies well outside ofmore typical computer security applications.To help understand this problem domain and what, if anything,should be built, we turn to the theory and methodsof Value Sensitive Design, a systematic approach to designingfor human values in technology. We rst develop valuescenarios that highlight potential issues, benets, harms, andchallenges. We then conducted semi-structured interviewswith 18 participants (9 teens and their parents). Results showsignicant dierences with respect to information about: 1)internal state (e.g., mood) versus external environment (e.g.,location); 2) situation (e.g., emergency vs. non-emergency);and 3) awareness (e.g., notication vs. non-notication). Thevalue scenario and interview results positioned us to identifykey technical challenges such as strongly protecting theprivacy of a teen's contextual information during ordinary situationsbut immediately exposing that information to othersas appropriate in an emergency and corresponding architecturallevers for these technologies.In addition to laying a foundation for future work in thisarea, this research serves as a prototypical example of usingValue Sensitive Design to explicate the underlying human valuesin complex security domains
@inProceedings{
title = {Parenting from the Pocket: Value Tensions and TechnicalDirections for Secure and Private Parent-Teen Mobile Safety},
type = {inProceedings},
identifiers = {[object Object]},
keywords = {location,mobile,privacy,reading-group,smartphone,summarized,trg},
websites = {http://www.cs.washington.edu/homes/borning/papers/czeskis-soups2010.pdf},
id = {5aa11aad-acd3-39fc-b3f3-b0c8644db068},
created = {2018-07-12T21:31:41.708Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:41.708Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {czeskisy:parenting},
source_type = {inproceedings},
notes = {Paper deals with mobile 'personal safety' devices like gps jackets, in-car cameras etc used by parents to monitor their children. To study the domain better and to learn the challenges associated with developing these devices, the authors use value sensitive design to build value scenarios and conduct interviews with teens and their parents. They highlight four aspects of VSD - direct and indirect stakeholders, value tensions, value scenarios and value dams and flows. Three scenarios are listed – Naomi is scared of strangers following her in the night, Paul is caught spying on his son, Ben, using a tracking application on Ben's mobile phone and a sensitive image gets captured on the in-car camera installed in Tiffany's car. Interviews conducted with 9 parent-teen pairs. Questions deal with general views and personal experiences with parenting and the current personal safety technology. The authors try to understand when teens and parents want data to be shared always, never or sometimes depending on the type of information being shared, who is receiving the information and whether they receive notification or not or in an emergency situation. They are asked to take the view of a direct and indirect stakeholder. Intra and inter-group analysis is done on the results from the interviews. Finally the authors give a list of directions for designers of such devices – data, situation and recipients must be handled differently, corner cases like teens in abusive relationships and households must be considered, avoid false alarms for emergency responders, consider the device resources, only those who need the data must be allowed to decrypt it, what to do during emergency situations, when should data be deleted and covert communication methods.},
private_publication = {false},
abstract = {An increasing number of high-tech devices, such as drivermonitoring systems and Internet usage monitoring tools, areadvertised as useful or even necessary for good parenting ofteens. Simultaneously, there is a growing market for mobile\personal safety" devices. As these trends merge, there willbe signicant implications for parent-teen relationships, affectingdomains such as privacy, trust, and maturation. Notonly the teen and his or her parents are aected; other importantstakeholders include the teen's friends who may beunwittingly monitored. This problem space, with less clearcutassets, risks, and aected parties, thus lies well outside ofmore typical computer security applications.To help understand this problem domain and what, if anything,should be built, we turn to the theory and methodsof Value Sensitive Design, a systematic approach to designingfor human values in technology. We rst develop valuescenarios that highlight potential issues, benets, harms, andchallenges. We then conducted semi-structured interviewswith 18 participants (9 teens and their parents). Results showsignicant dierences with respect to information about: 1)internal state (e.g., mood) versus external environment (e.g.,location); 2) situation (e.g., emergency vs. non-emergency);and 3) awareness (e.g., notication vs. non-notication). Thevalue scenario and interview results positioned us to identifykey technical challenges such as strongly protecting theprivacy of a teen's contextual information during ordinary situationsbut immediately exposing that information to othersas appropriate in an emergency and corresponding architecturallevers for these technologies.In addition to laying a foundation for future work in thisarea, this research serves as a prototypical example of usingValue Sensitive Design to explicate the underlying human valuesin complex security domains},
bibtype = {inProceedings},
author = {Czeskisy, Alexei and Dermendjievay, Ivayla and Yapity, Hussein and Borningy, Alan and Friedmanz, Batya and Gill, Brian and Kohno, Tadayoshi},
booktitle = {Symposium on Usable Privacy and Security (SOUPS) 2010}
}
Downloads: 0
{"_id":"LAziEN9qmfz9PDYtM","bibbaseid":"czeskisy-dermendjievay-yapity-borningy-friedmanz-gill-kohno-parentingfromthepocketvaluetensionsandtechnicaldirectionsforsecureandprivateparentteenmobilesafety","downloads":0,"creationDate":"2019-02-15T15:14:59.664Z","title":"Parenting from the Pocket: Value Tensions and TechnicalDirections for Secure and Private Parent-Teen Mobile Safety","author_short":["Czeskisy, A.","Dermendjievay, I.","Yapity, H.","Borningy, A.","Friedmanz, B.","Gill, B.","Kohno, T."],"year":null,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"Parenting from the Pocket: Value Tensions and TechnicalDirections for Secure and Private Parent-Teen Mobile Safety","type":"inProceedings","identifiers":"[object Object]","keywords":"location,mobile,privacy,reading-group,smartphone,summarized,trg","websites":"http://www.cs.washington.edu/homes/borning/papers/czeskis-soups2010.pdf","id":"5aa11aad-acd3-39fc-b3f3-b0c8644db068","created":"2018-07-12T21:31:41.708Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:41.708Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"czeskisy:parenting","source_type":"inproceedings","notes":"Paper deals with mobile 'personal safety' devices like gps jackets, in-car cameras etc used by parents to monitor their children. To study the domain better and to learn the challenges associated with developing these devices, the authors use value sensitive design to build value scenarios and conduct interviews with teens and their parents. They highlight four aspects of VSD - direct and indirect stakeholders, value tensions, value scenarios and value dams and flows. Three scenarios are listed – Naomi is scared of strangers following her in the night, Paul is caught spying on his son, Ben, using a tracking application on Ben's mobile phone and a sensitive image gets captured on the in-car camera installed in Tiffany's car. Interviews conducted with 9 parent-teen pairs. Questions deal with general views and personal experiences with parenting and the current personal safety technology. The authors try to understand when teens and parents want data to be shared always, never or sometimes depending on the type of information being shared, who is receiving the information and whether they receive notification or not or in an emergency situation. They are asked to take the view of a direct and indirect stakeholder. Intra and inter-group analysis is done on the results from the interviews. Finally the authors give a list of directions for designers of such devices – data, situation and recipients must be handled differently, corner cases like teens in abusive relationships and households must be considered, avoid false alarms for emergency responders, consider the device resources, only those who need the data must be allowed to decrypt it, what to do during emergency situations, when should data be deleted and covert communication methods.","private_publication":false,"abstract":"An increasing number of high-tech devices, such as drivermonitoring systems and Internet usage monitoring tools, areadvertised as useful or even necessary for good parenting ofteens. Simultaneously, there is a growing market for mobile\\personal safety\" devices. As these trends merge, there willbe signicant implications for parent-teen relationships, affectingdomains such as privacy, trust, and maturation. Notonly the teen and his or her parents are aected; other importantstakeholders include the teen's friends who may beunwittingly monitored. This problem space, with less clearcutassets, risks, and aected parties, thus lies well outside ofmore typical computer security applications.To help understand this problem domain and what, if anything,should be built, we turn to the theory and methodsof Value Sensitive Design, a systematic approach to designingfor human values in technology. We rst develop valuescenarios that highlight potential issues, benets, harms, andchallenges. We then conducted semi-structured interviewswith 18 participants (9 teens and their parents). Results showsignicant dierences with respect to information about: 1)internal state (e.g., mood) versus external environment (e.g.,location); 2) situation (e.g., emergency vs. non-emergency);and 3) awareness (e.g., notication vs. non-notication). Thevalue scenario and interview results positioned us to identifykey technical challenges such as strongly protecting theprivacy of a teen's contextual information during ordinary situationsbut immediately exposing that information to othersas appropriate in an emergency and corresponding architecturallevers for these technologies.In addition to laying a foundation for future work in thisarea, this research serves as a prototypical example of usingValue Sensitive Design to explicate the underlying human valuesin complex security domains","bibtype":"inProceedings","author":"Czeskisy, Alexei and Dermendjievay, Ivayla and Yapity, Hussein and Borningy, Alan and Friedmanz, Batya and Gill, Brian and Kohno, Tadayoshi","booktitle":"Symposium on Usable Privacy and Security (SOUPS) 2010","bibtex":"@inProceedings{\n title = {Parenting from the Pocket: Value Tensions and TechnicalDirections for Secure and Private Parent-Teen Mobile Safety},\n type = {inProceedings},\n identifiers = {[object Object]},\n keywords = {location,mobile,privacy,reading-group,smartphone,summarized,trg},\n websites = {http://www.cs.washington.edu/homes/borning/papers/czeskis-soups2010.pdf},\n id = {5aa11aad-acd3-39fc-b3f3-b0c8644db068},\n created = {2018-07-12T21:31:41.708Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:41.708Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {czeskisy:parenting},\n source_type = {inproceedings},\n notes = {Paper deals with mobile 'personal safety' devices like gps jackets, in-car cameras etc used by parents to monitor their children. To study the domain better and to learn the challenges associated with developing these devices, the authors use value sensitive design to build value scenarios and conduct interviews with teens and their parents. They highlight four aspects of VSD - direct and indirect stakeholders, value tensions, value scenarios and value dams and flows. Three scenarios are listed – Naomi is scared of strangers following her in the night, Paul is caught spying on his son, Ben, using a tracking application on Ben's mobile phone and a sensitive image gets captured on the in-car camera installed in Tiffany's car. Interviews conducted with 9 parent-teen pairs. Questions deal with general views and personal experiences with parenting and the current personal safety technology. The authors try to understand when teens and parents want data to be shared always, never or sometimes depending on the type of information being shared, who is receiving the information and whether they receive notification or not or in an emergency situation. They are asked to take the view of a direct and indirect stakeholder. Intra and inter-group analysis is done on the results from the interviews. Finally the authors give a list of directions for designers of such devices – data, situation and recipients must be handled differently, corner cases like teens in abusive relationships and households must be considered, avoid false alarms for emergency responders, consider the device resources, only those who need the data must be allowed to decrypt it, what to do during emergency situations, when should data be deleted and covert communication methods.},\n private_publication = {false},\n abstract = {An increasing number of high-tech devices, such as drivermonitoring systems and Internet usage monitoring tools, areadvertised as useful or even necessary for good parenting ofteens. Simultaneously, there is a growing market for mobile\\personal safety\" devices. As these trends merge, there willbe signicant implications for parent-teen relationships, affectingdomains such as privacy, trust, and maturation. Notonly the teen and his or her parents are aected; other importantstakeholders include the teen's friends who may beunwittingly monitored. This problem space, with less clearcutassets, risks, and aected parties, thus lies well outside ofmore typical computer security applications.To help understand this problem domain and what, if anything,should be built, we turn to the theory and methodsof Value Sensitive Design, a systematic approach to designingfor human values in technology. We rst develop valuescenarios that highlight potential issues, benets, harms, andchallenges. We then conducted semi-structured interviewswith 18 participants (9 teens and their parents). Results showsignicant dierences with respect to information about: 1)internal state (e.g., mood) versus external environment (e.g.,location); 2) situation (e.g., emergency vs. non-emergency);and 3) awareness (e.g., notication vs. non-notication). Thevalue scenario and interview results positioned us to identifykey technical challenges such as strongly protecting theprivacy of a teen's contextual information during ordinary situationsbut immediately exposing that information to othersas appropriate in an emergency and corresponding architecturallevers for these technologies.In addition to laying a foundation for future work in thisarea, this research serves as a prototypical example of usingValue Sensitive Design to explicate the underlying human valuesin complex security domains},\n bibtype = {inProceedings},\n author = {Czeskisy, Alexei and Dermendjievay, Ivayla and Yapity, Hussein and Borningy, Alan and Friedmanz, Batya and Gill, Brian and Kohno, Tadayoshi},\n booktitle = {Symposium on Usable Privacy and Security (SOUPS) 2010}\n}","author_short":["Czeskisy, A.","Dermendjievay, I.","Yapity, H.","Borningy, A.","Friedmanz, B.","Gill, B.","Kohno, T."],"urls":{"Website":"http://www.cs.washington.edu/homes/borning/papers/czeskis-soups2010.pdf"},"bibbaseid":"czeskisy-dermendjievay-yapity-borningy-friedmanz-gill-kohno-parentingfromthepocketvaluetensionsandtechnicaldirectionsforsecureandprivateparentteenmobilesafety","role":"author","keyword":["location","mobile","privacy","reading-group","smartphone","summarized","trg"],"downloads":0},"search_terms":["parenting","pocket","value","tensions","technicaldirections","secure","private","parent","teen","mobile","safety","czeskisy","dermendjievay","yapity","borningy","friedmanz","gill","kohno"],"keywords":["location","mobile","privacy","reading-group","smartphone","summarized","trg"],"authorIDs":[]}