Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing

نویسندگان

  • Kenneth Radke
  • Margot Brereton
  • Seyed Hadi Mirisaee
  • Sunil Ghelawat
  • Colin Boyd
  • Juan Manuel González Nieto
چکیده

Many current HCI, social networking, ubiquitous computing, and context aware designs, in order for the design to function, have access to, or collect, significant personal information about the user. This raises concerns about privacy and security, in both the research community and main-stream media. From a practical perspective, in the social world, secrecy and security form an ongoing accomplishment rather than something that is set up and left alone. We explore how design can support privacy as practical action, and investigate the notion of collective information-practice of privacy and security concerns of participants of a mobile, social software for ride sharing. This paper contributes an understanding of HCI security and privacy tensions, discovered while “designing in use” using a Reflective, Agile, Iterative Design (RAID) method.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of Agile Manufacturing Principles in Small and Medium Enterprises (SMES)

Modern manufacturing is under ever increasing pressure to develop solutions for highly complex tasks. In order to maintain the business survival in a highly competitive environment, it is vital to obtain customer satisfaction, which requires developing products with shorter lifecycles and higher quality meanwhile to reduce the production costs. In order to achieve such objectives a paradigm has...

متن کامل

Ridesharing in Muscat: Can it be a Sustainable Solution for the Traffic Congestion?

We deal with developing a Decision Support System (DSS) to promote the ridesharing among both students and staff of a big organization. The DSS includes a set of functions that allow the management of the riders’ requests and drivers’ availability and embeds a novel two-phase optimization approach that helps in defining the optimal riders-drivers matching. The first phase consists o...

متن کامل

Developing Secure Software in a Agile environment

Software developers can use agile software development methods to build secure information systems. Current agile methods have few explicit security features. While several discrete security methods can supplement agile methods, few of these integrate seamlessly into other software development methods. Because of the severe constraints imposed by agile methods, these discrete security technique...

متن کامل

Knowledge, Attitude and Practices Regarding Muscular Reinforcement among Judokas in Developing Countries: Case Study of the Republic of Benin

This cross-sectional survey determined the level of knowledge, attitude, and practice about muscular reinforcement (MR) among judokas in the Republic of Benin as typical of a developing country. It also examined the relations between the levels of knowledge, attitude, and practice among these judokas. It was undertaken using a non-probabilistic and exhaustive sample of 79 judokas in the citie...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011