SlideShare a Scribd company logo
1 of 74
Download to read offline
Tailored
Introduction




               Interactions
               Simon King
               IxDA Interaction โ€˜09 | February 7th, 2009 | Vancouver, BC, Canada
1. People are increasingly finding value
Introduction

               in tailored interactions, built on top of
               personal data.


               2. Trends point towards a near future of
               data portability between services, providing
               new possibilities for personalization.


               3. Designers should focus on empowering
               people with control over their data.
Tailored interactions are personalized to an individual,
Introduction

               based on knowledge about them and their context.
Tailored interactions are personalized to an individual,
Introduction

               based on knowledge about them and their context.

               These are โ€œsmartโ€ systems, making
               choices on a personโ€™s behalf.
Tailored interactions are personalized to an individual,
Introduction

               based on knowledge about them and their context.

               These are โ€œsmartโ€ systems, making
               choices on a personโ€™s behalf.

               This is different from customization, where
               a person makes an explicit choice to alter
               something within a given set of options.
Tailored interactions can take many forms:
Introduction


               โ—Š Recommendation systems
               โ—Š Filtering of relevant options
               โ—Š Triggering of alerts and actions
               โ—Š Changes to information focus
               โ—Š Intelligent defaults
               โ—Š Specifically withheld or available options
               โ—Š Auto-filled choices
               โ—Š Adaptive navigation
The desire for companies to โ€œknow their usersโ€ and
Introduction

               provide personalized services exists across industries:

               โ—Š Financial
               โ—Š Medical
               โ—Š Retail
               โ—Š Hospitality
               โ—Š Telecommunications
               โ—Š News/Information
1   Raw Material


    Personal Data Mashups
2


    Designing for Control
3
The raw material that enables us to
    Raw
1   Material
               design tailored interactions is data.

               โ—Š Profile/Personal
               โ—Š Preferences
               โ—Š Behavior
               โ—Š History
               โ—Š Relationships
               โ—Š Status
               โ—Š Anything?



                                                       9
Data can be captured explicitly by asking people, but
    Raw
1   Material
               is more often collected implicitly in the background,
               as people use and make choices within a system.




                                                                       10
Designers and the companies we work for have
    Raw
1   Material
               been intrigued by the possibility of a one-to-one
               relationship with our users for a long time.




                                                                   11
Ordinary people have had a range of reactions
    Raw
1   Material
                   to the capture and use of their personal data.

               Ignorance         Fear         Acceptance       Overload




                                                                          12
Raw
1   Material



               Ignorance

                   In the early days of the web the public was
                   largely unaware of what was being captured.

                   Some companies stored personal data,
                   but it was rarely put to much use.



                                                                 13
Raw
1   Material



                                 Fear
               Ignorance

                   Cookies, spam, phishing, and the FBIโ€™s Carnivore led to
                   increased uncertainty about personal data collection.

                   At the same time companies began capturing and using
                   personal data more, primarily for targeted advertising.



                                                                             14
Raw
1   Material



                                              Acceptance
               Ignorance         Fear

                   Web 2.0 often required or encouraged posting
                   and capture of personal information.

                   Data became a valuable asset for businesses and
                   services offered greater user value beyond advertising.



                                                                             15
Raw
1   Material



                                                                 Overload
               Ignorance         Fear         Acceptance

                   Today, people must manage their data on
                   multiple services and actively monitor what
                   information about them is shared or public.

                   Companies are hungry for personal data as the services it
                   powers become increasingly important in peopleโ€™s lives.


                                                                               16
In this overloaded state people are accepting a type
    Raw
1   Material
               of ignorance in their desire for tailored experiences.

                              Ignorance




               Overload                        Fear




                              Acceptance

                                                                        17
People are giving up their passwords to
    Raw
1   Material
               third-party systems for convenience.




                                                         18
Full access is given to even the most sensitive data
    Raw
1   Material
               because aggregation services are so desirable.




                                                                      19
The demand for tailored interactions is bumping up
    Raw
1   Material
               against problems of privacy, security, and scalability.




                                                                         20
The demand for tailored interactions is bumping up
    Raw
1   Material
               against problems of privacy, security, and scalability.

               In this world of design driven by personal data
               it is the designerโ€™s job to balance the pillars
               of people, technology, and business.




                                                                         21
The demand for tailored interactions is bumping up
    Raw
1   Material
               against problems of privacy, security, and scalability.

               In this world of design driven by personal data
               it is the designerโ€™s job to balance the pillars
               of people, technology, and business.

               Recent trends point towards how we can improve peopleโ€™s
               control over their data while connecting products,
               services, and devices to create new opportunities.




                                                                         22
The transition from a web of pages to a
    Personal Data
2   Mashups
                    web of data is mature, with open APIs and
                    application mashups now commonplace.




                                                                23
With the rise of cloud computing and SaaS more
    Personal Data
2   Mashups
                    of our personal data that used to be locked up
                    in local computer systems is coming online.

                    โ—Š Office Docs             โ—Š CRM
                    โ—Š Finances                โ—Š Shopping
                    โ—Š Schedule                โ—Š To-dos
                    โ—Š Address Book            โ—Š Travel
                    โ—Š Medical Records         โ—Š Photos




                                                                     24
Office Docs, Finances, Schedule, Address Book, Medical
    Personal Data
2   Mashups
                    Records, CRM, Shopping, To-dos, Travel, Photos, etc.




                                                                             25
Office Docs, Finances, Schedule, Address Book, Medical
    Personal Data
2   Mashups
                    Records, CRM, Shopping, To-dos, Travel, Photos, etc.




                                                                             26
Office Docs, Finances, Schedule, Address Book, Medical
    Personal Data
2   Mashups
                    Records, CRM, Shopping, To-dos, Travel, Photos, etc.




                                                                             27
Office Docs, Finances, Schedule, Address Book, Medical
    Personal Data
2   Mashups
                    Records, CRM, Shopping, To-dos, Travel, Photos, etc.




                                                                             28
Office Docs, Finances, Schedule, Address Book, Medical
    Personal Data
2   Mashups
                    Records, CRM, Shopping, To-dos, Travel, Photos, etc.




                                                                             29
Office Docs, Finances, Schedule, Address Book, Medical
    Personal Data
2   Mashups
                    Records, CRM, Shopping, To-dos, Travel, Photos, etc.




                                                                             30
Office Docs, Finances, Schedule, Address Book, Medical
    Personal Data
2   Mashups
                    Records, CRM, Shopping, To-dos, Travel, Photos, etc.




                                                                             31
Office Docs, Finances, Schedule, Address Book, Medical
    Personal Data
2   Mashups
                    Records, CRM, Shopping, To-dos, Travel, Photos, etc.




                                                                             32
Office Docs, Finances, Schedule, Address Book, Medical
    Personal Data
2   Mashups
                    Records, CRM, Shopping, To-dos, Travel, Photos, etc.




                                                                             33
Office Docs, Finances, Schedule, Address Book, Medical
    Personal Data
2   Mashups
                    Records, CRM, Shopping, To-dos, Travel, Photos, etc.




                                                                             34
People are recording moments of their lives that were
    Personal Data
2   Mashups
                    never before captured with the help of services that
                    live on the web, devices, and in their environments.

                    โ—Š Preferences              โ—Š Weight
                    โ—Š Relationships            โ—Š Exercise
                    โ—Š Status                   โ—Š Sleep
                    โ—Š Location                 โ—Š Energy
                    โ—Š Emotions                 โ—Š Driving
                    โ—Š Time                     โ—Š Everything




                                                                            35
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 36
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 37
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 38
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 39
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 40
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 41
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 42
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 43
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 44
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 45
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 46
Preferences, Relationships, Status, Location, Emotions,
    Personal Data
2   Mashups
                    Time, Weight, Exercise, Sleep, Energy, Driving, Everything




                                                                                 47
The amount of raw material for designing tailored
    Personal Data
2   Mashups
                    interactions has increased, potentially enabling
                    new types of personal data mashups.




                                                                        48
The amount of raw material for designing tailored
    Personal Data
2   Mashups
                    interactions has increased, potentially enabling
                    new types of personal data mashups.

                    These are more complicated than application mashups
                    because this data is online, but usually not public.




                                                                           49
The amount of raw material for designing tailored
    Personal Data
2   Mashups
                    interactions has increased, potentially enabling
                    new types of personal data mashups.

                    These are more complicated than application mashups
                    because this data is online, but usually not public.

                    New standards are emerging that allow for
                    private data to be shared securely, opening the
                    floodgates for a new era of tailored interactions.




                                                                           50
There are two key technical capabilities that any
    Personal Data
2   Mashups
                    system for sharing personal data requires:

                    Identification
                    Authorization




                                                                        51
Identification is the fundamental link needed to correlate
    Personal Data
2   Mashups
                    personal data and use it to build tailored interactions.

                    But every service we use acts like weโ€™re a
                    different person, leaving us to manage scores
                    of usernames, passwords, and profiles.




                                                                                 52
OpenID
    Personal Data
2   Mashups

                    is a method of managing your identity
                    in one place, and using that identity to
                    authenticate yourself with multiple services.

                    This is a step towards the web feeling
                    like one big system, rather than a
                    bunch of fragmented ones.




                                                                    53
The next step in the process is authorization,
    Personal Data
2   Mashups
                    or granting of access to personal data.


                    OAuth
                    handles authorization of protected data between
                    two services. It acts like a digital valet key,
                    allowing partial, rather than blanket access.




                                                                      54
Handing over a username and password is blanket
    Personal Data
2   Mashups
                    authorization. Service A impersonates the user
                    and gets complete access to Service B.



                          u/p

                                     Service               Service
                                       A                      B


                                                                      55
OAuth allows for partial authorization and control.
    Personal Data
2   Mashups
                    Service A asks for permission to use a subset of
                    data from Service B, with particular restrictions.




                                              ok
                                 ?
                    Service                           Service
                      A                                  B


                                                                          56
OAuth will be a catalyst for widespread
    Personal Data
2   Mashups
                    sharing of protected personal data.

                    It is showing up first in web applications, but can apply
                    to desktop, mobile, or any Internet connected device.




                                                                                57
Over the last few months all the major players
    Personal Data
2   Mashups
                    have launched their own Distributed Social
                    Networking platforms for personal data sharing:

                    โ—Š Facebook Connect
                    โ—Š Google Friend Connect
                    โ—Š MySpaceID
                    โ—Š Yahoo! Open Strategy




                                                                      58
Each of these companies wants to be the trusted
    Personal Data
2   Mashups
                    gateway for your identification and authorization.

                    Most are approaching this goal from a standards-based
                    perspective, building on top of the โ€œOpen Stack.โ€

                    Others are closed, proprietary systems (Facebook).




                                                                            59
There are two fundamentally differing viewpoints.
         Personal Data
    2    Mashups


                                   Centralized You
                                                                  3rd Party

                                                 3rd Party                     3rd Party




                                                                 Facebook
                                                                                      3rd Party
                                           3rd Party
                                                              Via FB Connect



                                                  3rd Party                      3rd Party


                                                                  3rd Party
Adapted from diagram by
Chris Saad (dataportability.org)

                                                                                                  60
There are two fundamentally differing viewpoints.
         Personal Data
    2    Mashups


                                   Decentralized You
                                                                         Service




                                                     Service                                 Service

                                                                         Service



                                                                                                         Service

                                                Service
                                                                                   Service




                                           Service             Service
                                                                                               Service
Adapted from diagram by
Chris Saad (dataportability.org)

                                                                                                                   61
Kevin Kelly, in Predicting the next 5,000 days
    Designing for
3   Control
                    of the web, said that โ€œTotal personalization
                    will require total transparency.โ€




                                                                     62
This is a frightening vision, not unlike a panopticon
    Designing for
3   Control
                    prison, where you can be constantly observed,
                    without being able to tell if you really are.




                                                                            63
The emergence of standards like OAuth gives me
    Designing for
3   Control
                    hope that Kellyโ€™s future vision can be achieved
                    without such a complete collapse of privacy.

                    But beyond technical capabilities, how
                    can we create tailored interactions that
                    are ethical and human-centered?




                                                                      64
Privacy is sometimes described in terms of
    Designing for
3   Control
                    anonymity, but data must be tied to a particular
                    person to be useful as a material for design.

                    A more relevant definition is โ€œthe choice
                    to reveal oneself selectively.โ€




                                                                       65
This sense of control, over how personal data is used,
    Designing for
3   Control
                    shared, and destroyed, should define the next step
                    in peopleโ€™s relationship to data collection and use.

                                                                      Control
Ignorance                Fear        Acceptance      Overload




                                                                                66
How is my data used?
    Designing for
3   Control


                    โ—Š What do you know about me?
                    โ—Š How do you know it?
                    โ—Š How current is my data?
                    โ—Š How can I change it?
                    โ—Š How is it used to personalize my experience?




                                                                     67
How is my data shared?
    Designing for
3   Control


                    โ—Š What do you know about me based on data from other places?
                    โ—Š What data is being collected about me that I could use elsewhere?
                    โ—Š What data is currently shared with other people or services?
                      Who?
                      With what restrictions?
                      When?
                    โ—Š Is data about me being included in an aggregate data set?
                      How is that being used?




                                                                                          68
How can my data be destroyed?
    Designing for
3   Control


                    โ—Š How can I change what you know about me?
                    โ—Š How can I stop sharing my data?
                    โ—Š How can I remove my data?
                    โ—Š When data is removed, does it still exist within
                      other services I previously shared it with?




                                                                         69
Specific examples of how these questions can be
    Designing for
3   Control
                    answered are beyond the scope of this presentation,
                    but this is an area that is ripe for developing new
                    interaction design patterns and best practices.




                                                                          70
Additional principles:
    Designing for
3   Control


                    โ—Š Fail gracefully
                      When an interaction relies on shared data, provide a
                      reasonable fallback if the data is no longer available.
                    โ—Š Donโ€™t build bubbles
                      Let people choose between tailored interactions
                      and the collective (generic) experience.
                    โ—Š Share your toys
                      Donโ€™t be only a consumer of personal data,
                      give back to the ecosystem.
                    โ—Š Provide an exit
                      People should be able to share, but also to pack up and leave.

                                                                                       71
Beyond this, we also need to get involved in
    Designing for
3   Control
                    policy discussions that are happening within
                    privacy and consumer advocacy groups.

                    Current lobbying tends to focus on anonymizing
                    data used for targeted advertising. We need
                    to join the conversation and expand it to
                    include tailored interactions and control.




                                                                     72
1. New possibilities for tailored interactions are
Conclusion

             emerging through mashups of personal data.


             2. It is our responsibility to empower our
             users with control over their data.


             3. We need to define the patterns and principles
             that support this goal, and promote policy that
             addresses data usage beyond advertising.
Thanks.
Conclusion



             Questions + Contact:
             sking@ideo.com




             Image credit: http://www.flickr.com/photos/sojamo/1343606031/

More Related Content

What's hot

Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook EraJohn Mancini
ย 
Huddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddleHQ
ย 
Linked Open Data
Linked Open DataLinked Open Data
Linked Open DataDerilinx
ย 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
ย 
Everyday surveillance
Everyday surveillanceEveryday surveillance
Everyday surveillanceYavuz Paksoy
ย 
Collaboration & Social Media New Challenges For Records Management
Collaboration & Social Media New Challenges For Records ManagementCollaboration & Social Media New Challenges For Records Management
Collaboration & Social Media New Challenges For Records ManagementMaurene Caplan Grey
ย 
Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...Alexandre Passant
ย 
Data protection guide
Data protection guideData protection guide
Data protection guidepetertran
ย 
Creating a Policy Advocacy Movement
Creating a Policy Advocacy MovementCreating a Policy Advocacy Movement
Creating a Policy Advocacy MovementJanette Toral
ย 
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!Identive
ย 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelAbhijeet Kelkar
ย 
Towards Patient Controlled Privacy
Towards Patient Controlled PrivacyTowards Patient Controlled Privacy
Towards Patient Controlled PrivacyOwen Sacco
ย 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsSimon Moffatt
ย 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interactionYavuz Paksoy
ย 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
ย 
Truth, lies and data privacy
Truth, lies and data privacy Truth, lies and data privacy
Truth, lies and data privacy Jo Booth
ย 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointImperva
ย 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop
ย 

What's hot (20)

Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
ย 
Huddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File SyncHuddle Sync - Intelligent File Sync
Huddle Sync - Intelligent File Sync
ย 
Linked Open Data
Linked Open DataLinked Open Data
Linked Open Data
ย 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
ย 
Data Ownership: Who Owns 'My Data'?
Data Ownership: Who Owns 'My Data'?Data Ownership: Who Owns 'My Data'?
Data Ownership: Who Owns 'My Data'?
ย 
Everyday surveillance
Everyday surveillanceEveryday surveillance
Everyday surveillance
ย 
Collaboration & Social Media New Challenges For Records Management
Collaboration & Social Media New Challenges For Records ManagementCollaboration & Social Media New Challenges For Records Management
Collaboration & Social Media New Challenges For Records Management
ย 
Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...Federating Distributed Social Data to Build an Interlinked Online Information...
Federating Distributed Social Data to Build an Interlinked Online Information...
ย 
Data protection guide
Data protection guideData protection guide
Data protection guide
ย 
Creating a Policy Advocacy Movement
Creating a Policy Advocacy MovementCreating a Policy Advocacy Movement
Creating a Policy Advocacy Movement
ย 
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
idOnDemand | Article | Looking For An ID Solution? Get It From idOnDemand!
ย 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
ย 
Towards Patient Controlled Privacy
Towards Patient Controlled PrivacyTowards Patient Controlled Privacy
Towards Patient Controlled Privacy
ย 
The Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security ConcernsThe Identity of Things: Privacy & Security Concerns
The Identity of Things: Privacy & Security Concerns
ย 
Transformations in interaction
Transformations in interactionTransformations in interaction
Transformations in interaction
ย 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
ย 
Truth, lies and data privacy
Truth, lies and data privacy Truth, lies and data privacy
Truth, lies and data privacy
ย 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePoint
ย 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
ย 
Introduction to IA
Introduction to IAIntroduction to IA
Introduction to IA
ย 

Viewers also liked

El rol del diseรฑo en las polรญticas pรบblicas - WIAD16 Mendoza
El rol del diseรฑo en las polรญticas pรบblicas - WIAD16 MendozaEl rol del diseรฑo en las polรญticas pรบblicas - WIAD16 Mendoza
El rol del diseรฑo en las polรญticas pรบblicas - WIAD16 MendozaDรกmaris Sepรบlveda Troncoso
ย 
Herbert Spencer.
Herbert Spencer.Herbert Spencer.
Herbert Spencer.Huseyin Kirik
ย 
Herbert Spencer (Philosophy of Education)
Herbert Spencer (Philosophy of Education)Herbert Spencer (Philosophy of Education)
Herbert Spencer (Philosophy of Education)Nharyza Cueva
ย 
Personas, scenarios, user stories
Personas, scenarios, user storiesPersonas, scenarios, user stories
Personas, scenarios, user storiesInteractionDesign
ย 
Herbert spencer
Herbert spencerHerbert spencer
Herbert spencerPam Green
ย 
PiX: Partituras de Interacciรณn
PiX: Partituras de InteracciรณnPiX: Partituras de Interacciรณn
PiX: Partituras de InteracciรณnHerbert Spencer
ย 

Viewers also liked (6)

El rol del diseรฑo en las polรญticas pรบblicas - WIAD16 Mendoza
El rol del diseรฑo en las polรญticas pรบblicas - WIAD16 MendozaEl rol del diseรฑo en las polรญticas pรบblicas - WIAD16 Mendoza
El rol del diseรฑo en las polรญticas pรบblicas - WIAD16 Mendoza
ย 
Herbert Spencer.
Herbert Spencer.Herbert Spencer.
Herbert Spencer.
ย 
Herbert Spencer (Philosophy of Education)
Herbert Spencer (Philosophy of Education)Herbert Spencer (Philosophy of Education)
Herbert Spencer (Philosophy of Education)
ย 
Personas, scenarios, user stories
Personas, scenarios, user storiesPersonas, scenarios, user stories
Personas, scenarios, user stories
ย 
Herbert spencer
Herbert spencerHerbert spencer
Herbert spencer
ย 
PiX: Partituras de Interacciรณn
PiX: Partituras de InteracciรณnPiX: Partituras de Interacciรณn
PiX: Partituras de Interacciรณn
ย 

Similar to Tailored Interactions

Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outtheODI
ย 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information InfrastructureJay McLaughlin
ย 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future Agenda
ย 
Itri icl 0116_distribute
Itri icl 0116_distributeItri icl 0116_distribute
Itri icl 0116_distributeFuming Shih
ย 
The power of_mobile_and_social_data_webinar_slides_21_may2012
The power of_mobile_and_social_data_webinar_slides_21_may2012The power of_mobile_and_social_data_webinar_slides_21_may2012
The power of_mobile_and_social_data_webinar_slides_21_may2012Accenture
ย 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
ย 
Big data overview external
Big data overview externalBig data overview external
Big data overview externalBrett Colbert
ย 
Cloud Security: Trust and Transformation
Cloud Security: Trust and TransformationCloud Security: Trust and Transformation
Cloud Security: Trust and TransformationPeter Coffee
ย 
Hispanic Digital and Print Media Conference 2012 - Oscar Padilla
Hispanic Digital and Print Media Conference 2012 - Oscar PadillaHispanic Digital and Print Media Conference 2012 - Oscar Padilla
Hispanic Digital and Print Media Conference 2012 - Oscar PadillaPortada
ย 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
ย 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
ย 
Understanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalUnderstanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalAndrew Gregoris
ย 
Rrw โ€“ a robust and reversible watermarking technique for relational data
Rrw โ€“ a robust and reversible watermarking technique for relational dataRrw โ€“ a robust and reversible watermarking technique for relational data
Rrw โ€“ a robust and reversible watermarking technique for relational dataLeMeniz Infotech
ย 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
ย 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
ย 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkFlaskdata.io
ย 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Marco Morana
ย 
EDF2013 - Richard Benjamins: Big Data โ€“ Big opportunities โ€“ Big risks? And ...
EDF2013 - Richard Benjamins: Big Data โ€“  Big opportunities โ€“  Big risks? And ...EDF2013 - Richard Benjamins: Big Data โ€“  Big opportunities โ€“  Big risks? And ...
EDF2013 - Richard Benjamins: Big Data โ€“ Big opportunities โ€“ Big risks? And ...European Data Forum
ย 

Similar to Tailored Interactions (20)

Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught out
ย 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
ย 
Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...Future of privacy - Insights from Discussions Building on an Initial Perspect...
Future of privacy - Insights from Discussions Building on an Initial Perspect...
ย 
Itri icl 0116_distribute
Itri icl 0116_distributeItri icl 0116_distribute
Itri icl 0116_distribute
ย 
The power of_mobile_and_social_data_webinar_slides_21_may2012
The power of_mobile_and_social_data_webinar_slides_21_may2012The power of_mobile_and_social_data_webinar_slides_21_may2012
The power of_mobile_and_social_data_webinar_slides_21_may2012
ย 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
ย 
Big data overview external
Big data overview externalBig data overview external
Big data overview external
ย 
Customer in control
Customer in controlCustomer in control
Customer in control
ย 
Ecommerce Chap 10
Ecommerce Chap 10Ecommerce Chap 10
Ecommerce Chap 10
ย 
Cloud Security: Trust and Transformation
Cloud Security: Trust and TransformationCloud Security: Trust and Transformation
Cloud Security: Trust and Transformation
ย 
Hispanic Digital and Print Media Conference 2012 - Oscar Padilla
Hispanic Digital and Print Media Conference 2012 - Oscar PadillaHispanic Digital and Print Media Conference 2012 - Oscar Padilla
Hispanic Digital and Print Media Conference 2012 - Oscar Padilla
ย 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
ย 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
ย 
Understanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalUnderstanding The Big Data Opportunity Final
Understanding The Big Data Opportunity Final
ย 
Rrw โ€“ a robust and reversible watermarking technique for relational data
Rrw โ€“ a robust and reversible watermarking technique for relational dataRrw โ€“ a robust and reversible watermarking technique for relational data
Rrw โ€“ a robust and reversible watermarking technique for relational data
ย 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
ย 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
ย 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
ย 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
ย 
EDF2013 - Richard Benjamins: Big Data โ€“ Big opportunities โ€“ Big risks? And ...
EDF2013 - Richard Benjamins: Big Data โ€“  Big opportunities โ€“  Big risks? And ...EDF2013 - Richard Benjamins: Big Data โ€“  Big opportunities โ€“  Big risks? And ...
EDF2013 - Richard Benjamins: Big Data โ€“ Big opportunities โ€“ Big risks? And ...
ย 

Recently uploaded

CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girlsmodelanjalisharma4
ย 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneLukeKholes
ย 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptxVanshNarang19
ย 
Kurla Call Girls Pooja Nehwal๐Ÿ“ž 9892124323 โœ… Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal๐Ÿ“ž 9892124323 โœ…  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal๐Ÿ“ž 9892124323 โœ…  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal๐Ÿ“ž 9892124323 โœ… Vashi Call Service Available Nea...Pooja Nehwal
ย 
Escorts Service Basapura โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
Escorts Service Basapura โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)Escorts Service Basapura โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
Escorts Service Basapura โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)amitlee9823
ย 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130Suhani Kapoor
ย 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...home
ย 
Government polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdGovernment polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdshivubhavv
ย 
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Delhi Call girls
ย 
Top Rated Pune Call Girls Koregaon Park โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park โŸŸ 6297143586 โŸŸ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park โŸŸ 6297143586 โŸŸ Call Me For Genuine S...Call Girls in Nagpur High Profile
ย 
Top Rated Pune Call Girls Saswad โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
ย 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...SUHANI PANDEY
ย 
Brookefield Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore...
Brookefield Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore...Brookefield Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore...
Brookefield Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore...amitlee9823
ย 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsCharles Obaleagbon
ย 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxmirandajeremy200221
ย 
VVIP CALL GIRLS Lucknow ๐Ÿ’“ Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow ๐Ÿ’“ Lucknow < Renuka Sharma > 7877925207 Escorts ServiceVVIP CALL GIRLS Lucknow ๐Ÿ’“ Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow ๐Ÿ’“ Lucknow < Renuka Sharma > 7877925207 Escorts Servicearoranaina404
ย 

Recently uploaded (20)

CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
ย 
Case Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, PuneCase Study of Hotel Taj Vivanta, Pune
Case Study of Hotel Taj Vivanta, Pune
ย 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptx
ย 
Kurla Call Girls Pooja Nehwal๐Ÿ“ž 9892124323 โœ… Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal๐Ÿ“ž 9892124323 โœ…  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal๐Ÿ“ž 9892124323 โœ…  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal๐Ÿ“ž 9892124323 โœ… Vashi Call Service Available Nea...
ย 
young call girls in Vivek Vihar๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Vivek Vihar๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Serviceyoung call girls in Vivek Vihar๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Vivek Vihar๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
ย 
Call Girls Service Mukherjee Nagar @9999965857 Delhi ๐Ÿซฆ No Advance VVIP ๐ŸŽ SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi ๐Ÿซฆ No Advance  VVIP ๐ŸŽ SER...Call Girls Service Mukherjee Nagar @9999965857 Delhi ๐Ÿซฆ No Advance  VVIP ๐ŸŽ SER...
Call Girls Service Mukherjee Nagar @9999965857 Delhi ๐Ÿซฆ No Advance VVIP ๐ŸŽ SER...
ย 
Escorts Service Basapura โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
Escorts Service Basapura โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)Escorts Service Basapura โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
Escorts Service Basapura โ˜Ž 7737669865โ˜Ž Book Your One night Stand (Bangalore)
ย 
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
VIP Call Girls Service Mehdipatnam Hyderabad Call +91-8250192130
ย 
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
Recommendable # 971589162217 # philippine Young Call Girls in Dubai By Marina...
ย 
Government polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcdGovernment polytechnic college-1.pptxabcd
Government polytechnic college-1.pptxabcd
ย 
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
Best VIP Call Girls Noida Sector 47 Call Me: 8448380779
ย 
Top Rated Pune Call Girls Koregaon Park โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
Top Rated  Pune Call Girls Koregaon Park โŸŸ 6297143586 โŸŸ Call Me For Genuine S...Top Rated  Pune Call Girls Koregaon Park โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
Top Rated Pune Call Girls Koregaon Park โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
ย 
young call girls in Pandav nagar ๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Pandav nagar ๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Serviceyoung call girls in Pandav nagar ๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Pandav nagar ๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
ย 
Top Rated Pune Call Girls Saswad โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Saswad โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Saswad โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Saswad โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Serv...
ย 
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
VIP Model Call Girls Kalyani Nagar ( Pune ) Call ON 8005736733 Starting From ...
ย 
Brookefield Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore...
Brookefield Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore...Brookefield Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore...
Brookefield Call Girls: ๐Ÿ“ 7737669865 ๐Ÿ“ High Profile Model Escorts | Bangalore...
ย 
B. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdfB. Smith. (Architectural Portfolio.).pdf
B. Smith. (Architectural Portfolio.).pdf
ย 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past Questions
ย 
DragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptxDragonBall PowerPoint Template for demo.pptx
DragonBall PowerPoint Template for demo.pptx
ย 
VVIP CALL GIRLS Lucknow ๐Ÿ’“ Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow ๐Ÿ’“ Lucknow < Renuka Sharma > 7877925207 Escorts ServiceVVIP CALL GIRLS Lucknow ๐Ÿ’“ Lucknow < Renuka Sharma > 7877925207 Escorts Service
VVIP CALL GIRLS Lucknow ๐Ÿ’“ Lucknow < Renuka Sharma > 7877925207 Escorts Service
ย 

Tailored Interactions

  • 1. Tailored Introduction Interactions Simon King IxDA Interaction โ€˜09 | February 7th, 2009 | Vancouver, BC, Canada
  • 2. 1. People are increasingly finding value Introduction in tailored interactions, built on top of personal data. 2. Trends point towards a near future of data portability between services, providing new possibilities for personalization. 3. Designers should focus on empowering people with control over their data.
  • 3. Tailored interactions are personalized to an individual, Introduction based on knowledge about them and their context.
  • 4. Tailored interactions are personalized to an individual, Introduction based on knowledge about them and their context. These are โ€œsmartโ€ systems, making choices on a personโ€™s behalf.
  • 5. Tailored interactions are personalized to an individual, Introduction based on knowledge about them and their context. These are โ€œsmartโ€ systems, making choices on a personโ€™s behalf. This is different from customization, where a person makes an explicit choice to alter something within a given set of options.
  • 6. Tailored interactions can take many forms: Introduction โ—Š Recommendation systems โ—Š Filtering of relevant options โ—Š Triggering of alerts and actions โ—Š Changes to information focus โ—Š Intelligent defaults โ—Š Specifically withheld or available options โ—Š Auto-filled choices โ—Š Adaptive navigation
  • 7. The desire for companies to โ€œknow their usersโ€ and Introduction provide personalized services exists across industries: โ—Š Financial โ—Š Medical โ—Š Retail โ—Š Hospitality โ—Š Telecommunications โ—Š News/Information
  • 8. 1 Raw Material Personal Data Mashups 2 Designing for Control 3
  • 9. The raw material that enables us to Raw 1 Material design tailored interactions is data. โ—Š Profile/Personal โ—Š Preferences โ—Š Behavior โ—Š History โ—Š Relationships โ—Š Status โ—Š Anything? 9
  • 10. Data can be captured explicitly by asking people, but Raw 1 Material is more often collected implicitly in the background, as people use and make choices within a system. 10
  • 11. Designers and the companies we work for have Raw 1 Material been intrigued by the possibility of a one-to-one relationship with our users for a long time. 11
  • 12. Ordinary people have had a range of reactions Raw 1 Material to the capture and use of their personal data. Ignorance Fear Acceptance Overload 12
  • 13. Raw 1 Material Ignorance In the early days of the web the public was largely unaware of what was being captured. Some companies stored personal data, but it was rarely put to much use. 13
  • 14. Raw 1 Material Fear Ignorance Cookies, spam, phishing, and the FBIโ€™s Carnivore led to increased uncertainty about personal data collection. At the same time companies began capturing and using personal data more, primarily for targeted advertising. 14
  • 15. Raw 1 Material Acceptance Ignorance Fear Web 2.0 often required or encouraged posting and capture of personal information. Data became a valuable asset for businesses and services offered greater user value beyond advertising. 15
  • 16. Raw 1 Material Overload Ignorance Fear Acceptance Today, people must manage their data on multiple services and actively monitor what information about them is shared or public. Companies are hungry for personal data as the services it powers become increasingly important in peopleโ€™s lives. 16
  • 17. In this overloaded state people are accepting a type Raw 1 Material of ignorance in their desire for tailored experiences. Ignorance Overload Fear Acceptance 17
  • 18. People are giving up their passwords to Raw 1 Material third-party systems for convenience. 18
  • 19. Full access is given to even the most sensitive data Raw 1 Material because aggregation services are so desirable. 19
  • 20. The demand for tailored interactions is bumping up Raw 1 Material against problems of privacy, security, and scalability. 20
  • 21. The demand for tailored interactions is bumping up Raw 1 Material against problems of privacy, security, and scalability. In this world of design driven by personal data it is the designerโ€™s job to balance the pillars of people, technology, and business. 21
  • 22. The demand for tailored interactions is bumping up Raw 1 Material against problems of privacy, security, and scalability. In this world of design driven by personal data it is the designerโ€™s job to balance the pillars of people, technology, and business. Recent trends point towards how we can improve peopleโ€™s control over their data while connecting products, services, and devices to create new opportunities. 22
  • 23. The transition from a web of pages to a Personal Data 2 Mashups web of data is mature, with open APIs and application mashups now commonplace. 23
  • 24. With the rise of cloud computing and SaaS more Personal Data 2 Mashups of our personal data that used to be locked up in local computer systems is coming online. โ—Š Office Docs โ—Š CRM โ—Š Finances โ—Š Shopping โ—Š Schedule โ—Š To-dos โ—Š Address Book โ—Š Travel โ—Š Medical Records โ—Š Photos 24
  • 25. Office Docs, Finances, Schedule, Address Book, Medical Personal Data 2 Mashups Records, CRM, Shopping, To-dos, Travel, Photos, etc. 25
  • 26. Office Docs, Finances, Schedule, Address Book, Medical Personal Data 2 Mashups Records, CRM, Shopping, To-dos, Travel, Photos, etc. 26
  • 27. Office Docs, Finances, Schedule, Address Book, Medical Personal Data 2 Mashups Records, CRM, Shopping, To-dos, Travel, Photos, etc. 27
  • 28. Office Docs, Finances, Schedule, Address Book, Medical Personal Data 2 Mashups Records, CRM, Shopping, To-dos, Travel, Photos, etc. 28
  • 29. Office Docs, Finances, Schedule, Address Book, Medical Personal Data 2 Mashups Records, CRM, Shopping, To-dos, Travel, Photos, etc. 29
  • 30. Office Docs, Finances, Schedule, Address Book, Medical Personal Data 2 Mashups Records, CRM, Shopping, To-dos, Travel, Photos, etc. 30
  • 31. Office Docs, Finances, Schedule, Address Book, Medical Personal Data 2 Mashups Records, CRM, Shopping, To-dos, Travel, Photos, etc. 31
  • 32. Office Docs, Finances, Schedule, Address Book, Medical Personal Data 2 Mashups Records, CRM, Shopping, To-dos, Travel, Photos, etc. 32
  • 33. Office Docs, Finances, Schedule, Address Book, Medical Personal Data 2 Mashups Records, CRM, Shopping, To-dos, Travel, Photos, etc. 33
  • 34. Office Docs, Finances, Schedule, Address Book, Medical Personal Data 2 Mashups Records, CRM, Shopping, To-dos, Travel, Photos, etc. 34
  • 35. People are recording moments of their lives that were Personal Data 2 Mashups never before captured with the help of services that live on the web, devices, and in their environments. โ—Š Preferences โ—Š Weight โ—Š Relationships โ—Š Exercise โ—Š Status โ—Š Sleep โ—Š Location โ—Š Energy โ—Š Emotions โ—Š Driving โ—Š Time โ—Š Everything 35
  • 36. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 36
  • 37. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 37
  • 38. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 38
  • 39. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 39
  • 40. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 40
  • 41. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 41
  • 42. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 42
  • 43. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 43
  • 44. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 44
  • 45. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 45
  • 46. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 46
  • 47. Preferences, Relationships, Status, Location, Emotions, Personal Data 2 Mashups Time, Weight, Exercise, Sleep, Energy, Driving, Everything 47
  • 48. The amount of raw material for designing tailored Personal Data 2 Mashups interactions has increased, potentially enabling new types of personal data mashups. 48
  • 49. The amount of raw material for designing tailored Personal Data 2 Mashups interactions has increased, potentially enabling new types of personal data mashups. These are more complicated than application mashups because this data is online, but usually not public. 49
  • 50. The amount of raw material for designing tailored Personal Data 2 Mashups interactions has increased, potentially enabling new types of personal data mashups. These are more complicated than application mashups because this data is online, but usually not public. New standards are emerging that allow for private data to be shared securely, opening the floodgates for a new era of tailored interactions. 50
  • 51. There are two key technical capabilities that any Personal Data 2 Mashups system for sharing personal data requires: Identification Authorization 51
  • 52. Identification is the fundamental link needed to correlate Personal Data 2 Mashups personal data and use it to build tailored interactions. But every service we use acts like weโ€™re a different person, leaving us to manage scores of usernames, passwords, and profiles. 52
  • 53. OpenID Personal Data 2 Mashups is a method of managing your identity in one place, and using that identity to authenticate yourself with multiple services. This is a step towards the web feeling like one big system, rather than a bunch of fragmented ones. 53
  • 54. The next step in the process is authorization, Personal Data 2 Mashups or granting of access to personal data. OAuth handles authorization of protected data between two services. It acts like a digital valet key, allowing partial, rather than blanket access. 54
  • 55. Handing over a username and password is blanket Personal Data 2 Mashups authorization. Service A impersonates the user and gets complete access to Service B. u/p Service Service A B 55
  • 56. OAuth allows for partial authorization and control. Personal Data 2 Mashups Service A asks for permission to use a subset of data from Service B, with particular restrictions. ok ? Service Service A B 56
  • 57. OAuth will be a catalyst for widespread Personal Data 2 Mashups sharing of protected personal data. It is showing up first in web applications, but can apply to desktop, mobile, or any Internet connected device. 57
  • 58. Over the last few months all the major players Personal Data 2 Mashups have launched their own Distributed Social Networking platforms for personal data sharing: โ—Š Facebook Connect โ—Š Google Friend Connect โ—Š MySpaceID โ—Š Yahoo! Open Strategy 58
  • 59. Each of these companies wants to be the trusted Personal Data 2 Mashups gateway for your identification and authorization. Most are approaching this goal from a standards-based perspective, building on top of the โ€œOpen Stack.โ€ Others are closed, proprietary systems (Facebook). 59
  • 60. There are two fundamentally differing viewpoints. Personal Data 2 Mashups Centralized You 3rd Party 3rd Party 3rd Party Facebook 3rd Party 3rd Party Via FB Connect 3rd Party 3rd Party 3rd Party Adapted from diagram by Chris Saad (dataportability.org) 60
  • 61. There are two fundamentally differing viewpoints. Personal Data 2 Mashups Decentralized You Service Service Service Service Service Service Service Service Service Service Adapted from diagram by Chris Saad (dataportability.org) 61
  • 62. Kevin Kelly, in Predicting the next 5,000 days Designing for 3 Control of the web, said that โ€œTotal personalization will require total transparency.โ€ 62
  • 63. This is a frightening vision, not unlike a panopticon Designing for 3 Control prison, where you can be constantly observed, without being able to tell if you really are. 63
  • 64. The emergence of standards like OAuth gives me Designing for 3 Control hope that Kellyโ€™s future vision can be achieved without such a complete collapse of privacy. But beyond technical capabilities, how can we create tailored interactions that are ethical and human-centered? 64
  • 65. Privacy is sometimes described in terms of Designing for 3 Control anonymity, but data must be tied to a particular person to be useful as a material for design. A more relevant definition is โ€œthe choice to reveal oneself selectively.โ€ 65
  • 66. This sense of control, over how personal data is used, Designing for 3 Control shared, and destroyed, should define the next step in peopleโ€™s relationship to data collection and use. Control Ignorance Fear Acceptance Overload 66
  • 67. How is my data used? Designing for 3 Control โ—Š What do you know about me? โ—Š How do you know it? โ—Š How current is my data? โ—Š How can I change it? โ—Š How is it used to personalize my experience? 67
  • 68. How is my data shared? Designing for 3 Control โ—Š What do you know about me based on data from other places? โ—Š What data is being collected about me that I could use elsewhere? โ—Š What data is currently shared with other people or services? Who? With what restrictions? When? โ—Š Is data about me being included in an aggregate data set? How is that being used? 68
  • 69. How can my data be destroyed? Designing for 3 Control โ—Š How can I change what you know about me? โ—Š How can I stop sharing my data? โ—Š How can I remove my data? โ—Š When data is removed, does it still exist within other services I previously shared it with? 69
  • 70. Specific examples of how these questions can be Designing for 3 Control answered are beyond the scope of this presentation, but this is an area that is ripe for developing new interaction design patterns and best practices. 70
  • 71. Additional principles: Designing for 3 Control โ—Š Fail gracefully When an interaction relies on shared data, provide a reasonable fallback if the data is no longer available. โ—Š Donโ€™t build bubbles Let people choose between tailored interactions and the collective (generic) experience. โ—Š Share your toys Donโ€™t be only a consumer of personal data, give back to the ecosystem. โ—Š Provide an exit People should be able to share, but also to pack up and leave. 71
  • 72. Beyond this, we also need to get involved in Designing for 3 Control policy discussions that are happening within privacy and consumer advocacy groups. Current lobbying tends to focus on anonymizing data used for targeted advertising. We need to join the conversation and expand it to include tailored interactions and control. 72
  • 73. 1. New possibilities for tailored interactions are Conclusion emerging through mashups of personal data. 2. It is our responsibility to empower our users with control over their data. 3. We need to define the patterns and principles that support this goal, and promote policy that addresses data usage beyond advertising.
  • 74. Thanks. Conclusion Questions + Contact: sking@ideo.com Image credit: http://www.flickr.com/photos/sojamo/1343606031/