26
Usable Trust in the Internet of Things Peter Wolkerstorfer – CURE Effectsplus 2nd Cluster Event (July 4th & 5th 2011, VU University, Amsterdam)

U trustit_cluster meeting

  • Upload
    fcleary

  • View
    421

  • Download
    1

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: U trustit_cluster meeting

Usable Trust in the Internet of ThingsPeter Wolkerstorfer – CURE

Effectsplus 2nd Cluster Event 

(July 4th & 5th 2011, VU University, Amsterdam)

Page 2: U trustit_cluster meeting

Agenda

• Introduction• Scenarios•Personas•Requirements

•Outlook

Page 3: U trustit_cluster meeting

33

Introduction

Page 4: U trustit_cluster meeting

44

uTRUSTit Project  factsProject duration: 3 years

Project funding:  EU 7th Framework Programme ICT‐2009.1.4

Project coordinator: CURE – Center for Usability Research & Engineering

Contact: http://[email protected]

Page 5: U trustit_cluster meeting

55

The uTRUSTit Consortium

Page 6: U trustit_cluster meeting

66

CURE – Center for Usability Research & Engineering• Independent Research Center with 30 Researchers• Interdisciplinary Research➥Psychology, Sociology, Industrial‐& Media‐Design, Informatics, etc.

•Main Research Areas➥Usability and User Experience Research, Requirements Engineering, Prototyping und User Interface Design / User‐Centred Design, Lab & Field Evaluations (Focus on Technology Acceptance), HCISEC & Privacy

Page 7: U trustit_cluster meeting

77

uTRUSTit Overview

Page 8: U trustit_cluster meeting

88

Usable Trust in the IoT

•What is it?➥Trust as a decision‐basis for end‐users

➥“informed decisions”

➥Trust feedback mechanisms which are accepted by end‐users

•How to achieve?➥User‐centric design process

➥Personas

➥Requirements engineering

Page 9: U trustit_cluster meeting

99

Scenarios

Page 10: U trustit_cluster meeting

1010

Das Bild kann zurz…

Scenarios

• Smart Home• Image right: Door lock system, Medicine cabinet & Media Center

• Smart Office

•E‐Voting

Page 11: U trustit_cluster meeting

1111

Personas

Page 12: U trustit_cluster meeting

1212Personas ‐What are Personas?

Page 13: U trustit_cluster meeting

1313Personas ‐What are Personas?

“...a hypothetical archetype of real users described in great detail and defined by their goals and needs, rather than just demographics.”

Lindgren et al. (2007)

“...a hypothetical archetype of real users described in great detail and defined by their goals and needs, rather than just demographics.”

Lindgren et al. (2007)

Page 14: U trustit_cluster meeting

1414Personas ‐Why Personas?

•Rise developers‘ empathy for end‐users➥Know for whom artefacts are developed

•Consolidate the individual pictures from an abstract „the user“ to one concrete set of personas

➥Prevents “bending” of user definitions & projections 

•Nearly none‐intrusive method➥Development‐style agnostic

Page 15: U trustit_cluster meeting

1515

Anna Janssen

Page 16: U trustit_cluster meeting

1616

Sara Moser

Page 17: U trustit_cluster meeting

1717

The Clasens

Page 18: U trustit_cluster meeting

1818

David Clasen

Page 19: U trustit_cluster meeting

1919

Paul Clasen

Page 20: U trustit_cluster meeting

2020

Fredrik Clasen

Page 21: U trustit_cluster meeting

2121Personas –Marketing

Page 22: U trustit_cluster meeting

2222

Requirements

Page 23: U trustit_cluster meeting

2323

Requirements for Usable Trust

•3‐folded requirements➥Technical requirements

➥Requirements for VR

➥User‐requirements

➥Method: focus groups + usability heuristics + questionnaires(questionnaires related to the scenarios; elicit attitudes towards privacy, technology and trust)

➥3 focus groups, 23 Participants (9 female / 14 male; age 27y‐67y; av. age = 41,73, STD=14,8)

Page 24: U trustit_cluster meeting

2424

User‐ Requirements Examples• A device should provide feedback if third parties are able to read data during entry and transmission.

• The look and feel of a software or user interface should be consistent even among various devices.

• The adoption from IoT in daily life must be eco‐friendly and environmentally friendly.

• Security and privacy functions should be pre‐configured in a meaningful way. Users should be able to choose from pre‐defined policies which reflect common sense over the micro management of all policies for all use cases.

Page 25: U trustit_cluster meeting

2525

Outlook

•Complexity reduction

•Trust research•Mental model research

Image source: http://www.boxesandarrows.com/

Page 26: U trustit_cluster meeting

2626

Thank you for your attention!

Questions?

Peter Wolkerstorfer – wolkerstorfer    cure.at@

http://www.utrustit.eu/