Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing
نویسندگان
چکیده
Many current HCI, social networking, ubiquitous computing, and context aware designs, in order for the design to function, have access to, or collect, significant personal information about the user. This raises concerns about privacy and security, in both the research community and main-stream media. From a practical perspective, in the social world, secrecy and security form an ongoing accomplishment rather than something that is set up and left alone. We explore how design can support privacy as practical action, and investigate the notion of collective information-practice of privacy and security concerns of participants of a mobile, social software for ride sharing. This paper contributes an understanding of HCI security and privacy tensions, discovered while “designing in use” using a Reflective, Agile, Iterative Design (RAID) method.
منابع مشابه
Implementation of Agile Manufacturing Principles in Small and Medium Enterprises (SMES)
Modern manufacturing is under ever increasing pressure to develop solutions for highly complex tasks. In order to maintain the business survival in a highly competitive environment, it is vital to obtain customer satisfaction, which requires developing products with shorter lifecycles and higher quality meanwhile to reduce the production costs. In order to achieve such objectives a paradigm has...
متن کاملRidesharing in Muscat: Can it be a Sustainable Solution for the Traffic Congestion?
We deal with developing a Decision Support System (DSS) to promote the ridesharing among both students and staff of a big organization. The DSS includes a set of functions that allow the management of the riders’ requests and drivers’ availability and embeds a novel two-phase optimization approach that helps in defining the optimal riders-drivers matching. The first phase consists o...
متن کاملDeveloping Secure Software in a Agile environment
Software developers can use agile software development methods to build secure information systems. Current agile methods have few explicit security features. While several discrete security methods can supplement agile methods, few of these integrate seamlessly into other software development methods. Because of the severe constraints imposed by agile methods, these discrete security technique...
متن کاملKnowledge, Attitude and Practices Regarding Muscular Reinforcement among Judokas in Developing Countries: Case Study of the Republic of Benin
This cross-sectional survey determined the level of knowledge, attitude, and practice about muscular reinforcement (MR) among judokas in the Republic of Benin as typical of a developing country. It also examined the relations between the levels of knowledge, attitude, and practice among these judokas. It was undertaken using a non-probabilistic and exhaustive sample of 79 judokas in the citie...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011