risk communication as security interaction in the iot

26
+ Risk Communication as Security Interaction in the IoT Unpacking the Future of IoT 17 August 2017 Salish, WA L Jean Camp

Upload: others

Post on 13-Nov-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Risk Communication as Security Interaction in the IoT

+

Risk Communication as Security Interaction in the IoT

Unpacking the Future of IoT 17 August 2017 Salish, WA L Jean Camp

Page 2: Risk Communication as Security Interaction in the IoT

+Security Interaction

Page 3: Risk Communication as Security Interaction in the IoT

+Helpful Advice

Page 4: Risk Communication as Security Interaction in the IoT

+Improved Security Interaction

Page 5: Risk Communication as Security Interaction in the IoT

+Better Risk Communication

Page 6: Risk Communication as Security Interaction in the IoT

+People Are Saying

YOU MAKE NO SENSE!!! GET OUT OF MY WAY!!!

Page 7: Risk Communication as Security Interaction in the IoT

+Consider Other People’s Perspectives

One problem, three views: incentives, usability, or risk communication?

Page 8: Risk Communication as Security Interaction in the IoT

+Personalize Security

Page 9: Risk Communication as Security Interaction in the IoT

+Risk Communication

n Simplify

n Identify

n Reify

n Rectify

Mental Models

Page 10: Risk Communication as Security Interaction in the IoT

+Design for Humans Requires Designing for Humans

Page 11: Risk Communication as Security Interaction in the IoT

+Design for Humans Requires Designing for Humans

Smoking is a factor which contributes to lung cancer. Most cancers that start in lung, known as primary lung cancers, are carcinomas that derive from epithelial cells. Depending on the type of tumor, so-called paraneoplastic phenomena may initially attract attention to the disease. In lung cancer, these phenomena may include Lambert-Eaton myasthenic syndrome (muscle weakness due to auto-antibodies), hypercalcemia, or syndrome of inappropriate antidiuretic hormone (SIADH). Tumors in the top (apex) of the lung, known as Pancoast tumors, may invade the local part of the sympathetic nervous system, leading to changed sweating patterns and eye muscle problems (a combination known as Horner's syndrome) as well as muscle weakness in the hands due to invasion of the brachial plexus.

Page 12: Risk Communication as Security Interaction in the IoT

+Design for Humans Requires Designing for Humans

Page 13: Risk Communication as Security Interaction in the IoT

+Simplify

n Change behavior

n By being helpful

n Make it Easy

Page 14: Risk Communication as Security Interaction in the IoT

+Simplify with Mental Models

•  Buggy code •  Targeting Big Fish •  Ubiquitous virus •  Young Geek; Graffiti •  Young Geek; Reputation •  Burglars •  Individual Criminals •  Organized crime

•  Warfare •  Medical infection •  Property crime •  Spatial models •  Economic threat •  Physical assault

Wash Camp

Page 15: Risk Communication as Security Interaction in the IoT

+Mental Models Make Stories

•  Warfare •  Medical infection/ virus •  Graffiti •  Safe spaces •  Stealing money/ economic threat •  Physical assault

Page 16: Risk Communication as Security Interaction in the IoT

+Simplify the Mental Model

Align with the

stories people

tell

Page 17: Risk Communication as Security Interaction in the IoT

+Simplify, Reify with Mental Models

Video https://www.youtube.com/watch?v=j7zcuDfqRrg

Page 18: Risk Communication as Security Interaction in the IoT

+Risk as Multidimensional

Page 19: Risk Communication as Security Interaction in the IoT

+Identify, Reify

Screen shot here

You Are Risking It -------à>>

But Your Videos All Work!

Page 20: Risk Communication as Security Interaction in the IoT

+Identify, Reify, Rectify

Screen shot here

Look you are safe!

But not everything works.

Page 21: Risk Communication as Security Interaction in the IoT

+Mobile Security Interaction

Page 22: Risk Communication as Security Interaction in the IoT

+Rectify: Make Intentions Actionable

Page 23: Risk Communication as Security Interaction in the IoT

+Simplify: Android Risks & Benefits

Also used locks and eyeballs

Page 24: Risk Communication as Security Interaction in the IoT

+Simplify: Aggregate Ratings

Page 25: Risk Communication as Security Interaction in the IoT

+Rectify

Page 26: Risk Communication as Security Interaction in the IoT

+Mental Models

n Simplify

n Identify

n Reify

n Rectify