SlideShare uma empresa Scribd logo
1 de 63
Baixar para ler offline
TRUST UX
ann wuyts
@vintfalken
sentiance
customer experience & UX
BALANCING PERSONALISATION AND PRIVACY TO CREATE UNDERSTANDING AND TRUST
Strata + Hadoop World, 2015
HAPPY TO INTRODUCE YOU TO MY NEW BEST FRIENDS
THESE THINGS
KNOW 
ME
THE FOUR PHASES OF COGNIZANT COMPUTING
1. SYNC ME
 Store copies of my digital assets and keep it
in sync across all end points and contexts
2. SEE ME
 Know where I am (and have been) on the
internet and in the real world. Understand
my mood and context to better align services
3. KNOW ME
 Understand what I want and need and
proactively present it to me
4. BE ME
 Act on my behalf based on learned and
explicit rules
94% COMPLETED
82% WEARABLES UPDATE
31% … LOADING DATA
INITIALIZING.. 12%
Meanwhile, at the Apple Watch
announcement, 19× Personal.
relevant

are you engaging at
the right moment?
glanceable

can you deliver value
in milliseconds? 
personal

do you approach people
in the right manner?
EXPERIENCES FOR THE MOST PERSONAL DEVICE EVER ARE
No other Apple device has ever been so
connected to the wearer. It is important
to be mindful of this connection .

Apple Watch Human Interface Design Guidelines, 2015
UNDERSTANDING PERSONALISATION
TRUST PRIVACY
H2H
MACHINE-TO-HUMAN RELATIONSHIPS ARE NOW ABOUT HUMAN-TO-HUMAN VALUES
M2H
2nd Annual Poll on How Personal Technology is Changing our Lives - January 2015, Microsoft	
  

Concern about privacy jumped 5 points between 2014 and 2015.
THE PRIVACY CHALLENGE
91% of adults ‘agree’
or ‘strongly agree’
that consumers have
lost control over how
personal information
is collected and used
by companies.


Pew Research Privacy Panel Survey,
January 2014
LOSS OF CONTROL
MISCOMMUNICATION
People are fearful of
sharing their data
largely because
companies and
government have not
been good at clearly
explaining how they
use it.

The Data Dialog, Demos 2012
TERRIBLE HEADLINES
In the future
your insurance
company will
know when you
are having sex.


Kashmir Hill, Fusion.net - 2015
38% of those who say not
concerned about privacy
online say they do mind
companies using information
about them

71% of those who are happy
to share personal
information with companies
and brands that they like are
concerned about how
information collected about
them is being used by
companies

Personalisations vs Privacy, Ipsos MORI, 2014
USER INCONSISTENCY
THE FACEBOOK PARADOX
THE FACEBOOK PARADOX
91% of adults feel consumers
have lost control over how
personal information is collected
and used by companies.

58% of the entire adult
population (and 71% of internet
users) is on Facebook.
Having knowledge of the customer is the
only durable competitive advantage for
companies.

Bruce Kasanoff, the author of Smart Customers, Stupid Companies
Increased knowledge of the consumer and
the fine-tuning of offers that are perceived
as personal and highly relevant should lead
to an increase in spend. 

Gartner on the monetization of contextualization
DATA VALUE EXCHANGE
insights in own behaviourcustomer insights
peer comparisonoptimising processes & products
personalisation (right message)
relevance (right person, right moment)
accountability (on ADDD)data driven decisions
CONSUMERBUSINESS
magic moon
standard moon
no moon
value on the consumer side
should be equal or more
privacy
THE UNTRUTH
UX
VS
The truth is that collecting
information about people
allows you to make
significantly better products
and the more information 
you collect, the better 
products you can build . 

Dustin Curtis,
“Privacy VS. User Experience” (2014)


#FALSE
(or at least a very one-sighted truth)
Whether or not better products can be made by
collecting more user data is a matter of…

•  Context
•  Opinion
•  Causation/correlation
•  Data quality (accurate? relevant? complete?) 
•  Define: better product
MORE DATA, BETTER PRODUCTS?
BUSINESS
VALUE
CONSUMER
VALUE
PRIVACY
GREAT UX
personalisation
PRIVACY AS A FUNDAMENTAL COMPONENT OF THE PRODUCT EXPERIENCE
PRIVACY
@ SENTIANCE
UX DESIGN
Businesses	
  can	
  deliver	
  a	
  grand	
  user	
  
experience	
  and	
  tremendous	
  value	
  to	
  
both	
  customers	
  and	
  the	
  company,	
  	
  
only	
  if	
  they	
  safeguard	
  their	
  users’	
  
privacy	
  and	
  security.	
  
→
Niveau 1
Niveau 2
Niveau 3
aggressive driver
…
…
waking up
…
city worker
sleeping
walking
 running
car
 subway
train
bus
 boat
zigzagging
 standing
airplane*
biking
arriving at home, work, the gym, ...
shopping
lunch
inactive
noisy environment*
in a meeting
horse*
@home
working
in company*
couch potato
workaholic
sportive
N2 moments
N3 profiles
N1 events
watching tv
motorcycle
agitated*
suddenly stopped
tram
climbing*
SENTIANCE FROM MOBILE DATA TO SMART LIFE
why
great
UX
requires
privacy
what 
UX &
privacy
have in
common
10
examples
to do both
Privacy &
UX right
DEFINE: PRIVACY
Personal data 
is any information
relating to an individual,
whether it relates to his or 
her private, professional
or public life.
(it is however, an essential requirement)
SECURITY = PRIVACY
“Security is a very important topic, but it’s primarily a
technical topic, and to a large extent it’s a very well-
understood one. If you pay attention to security, it is possible
to get it right, whereas privacy is something that’s much more
fluid and is much more about social norms, expectations, 
implicit contracts between consumers and providers.”

Pilgrim Baert – co-founder of AlertMe
THE INTERNET OF EVERYTHING: DESIGNER ROLES ARE UNDERGOING CHANGE
UX design has been
extended to address
all aspects of a
product or service as
perceived by its
users – that includes
the control they have
of their personal dta,
their privacy.
BEING CREDIBLE
useful
usable
 desirable
credible
valuable
findable
 accessible

User Experience Honeycomb (Peter Morville)

credible
2004
the information you
present to users
2015
taking responsibility to
keep personal data safe
PRIVACY-BY-DESIGNER: DELIVER BOTH PERSONAL & TRUST
We owe it to both our users and the people who hire us
to actively think about privacy, and to implement privacy 
in the flows and designs we deliver. 
B. 
We need to deliver 
trustworthy products.
A. 
We need to deliver 
great, personal experiences.
1. You need to fully understand the end goal
(by asking the right questions) 
WHY
 Why are we doing this? 
What do you want to achieve?
What is required to achieve this? 
What is the best way?
WHAT
WHO
 Who is impacted by this?
What do they expect?
GOAL
DATA
PIA
2. There are rules, guidelines, toolkits. 
(which continuously evolve)
UX
 PRIVACY
•  Apple, Android, .. design guidelines
•  Interaction patterns
•  Best (and worst) practice examples
•  Models & frameworks
•  User research methods
•  Emerging trends
•  … 
TOOLKITS: omnigraffle, illustrator, fireworks,
pen & paper, …
•  Existing & upcoming EU Law (GDPR)
•  Local privacy act & royal decrees
•  Local telecommunications law
•  Privacy watchdog recommendations
•  ToS of the platform (iOS, Android)
•  Internal policies
•  … 
TOOLKITS: information classification, risk
assessments, privacy policies, PIA framework, …
2. There are rules, guidelines, toolkits. 
(which continuously evolve)
General Data Protection Regulation
EXPANDED SCOPE
any organization processing personal
data of EU residents

PRIVACY-BY-DESIGN & DEFAULT

EXPLICIT INFORMED CONSENT

DATA BREACH NOTIFICATION
DPA & possibly consumer

DPO REQUIRED
Users/month threshold or location data

DATA PORTABILITY
3. Less is More. 
(value & proportionality)
collection
processing
storing

purpose


PROPORTIONALITY
fewer data
fewer
 less detailed
shorter period in time
de-idenfity asap
Less is more, not just in quantity but also in identifiability & time
value of 
knowing 
cost of
identifying

IDENTIFIABILITY

Why an IP an sich will no longer be personal data… 
(unless you are an ISP)
avoid when possible
 geohashes
coarse location
beware location
GDPR: this is ‘special data’ → extra safety measures
4. You can not do it alone. 
(it is multi-disciplinary and cross-departmental)

Privacy requires a clear mandate to get things done.
Everybody accepts it is
important – but not a single
department has it as a priority.
Have privacy as part as the
project plan and estimates as
soon as possible.
A continuous need to explain the
significance of privacy in the overall
product & company picture
Have privacy as a deliverable,
avoids the delays & soring costs of
adding it after the facts.
Privacy is not only a fundamental right,
it can also be a competitive advantage .

Neelie Kroes

Conform to EU legislation? 
Ready for the world market, then.
People can trust you with their digital
identities → sets you apart from competition
5. The devil is the details. 
(and the cost of mistakes is high)
•  up to 1,000,000 EUR fine or
up to 2% of the annual
worldwide turnover in case
of an enterprise, whichever
is greater (Draft GDPR, art 79)
•  customers leaving
•  
•  customer complaints
•  customers leaving
UX Privacy
Most of these were
hacked (security), but
as soon as personal
data leaks: 

Privacy & trust
disaster too.
6. Practice Honest Communication. 
(from the start)
Consider a breach likely – and prepare
accordingly.
VISA’s ‘Responding to a Data Breach
– Communications Guidelines for Merchants‘ guidelines.

do not play the victim
 express regret
take ownership
be accountable
1. What happened? (tell what you know at that time)
crisis communications
(works for downtime communication too)
2. What is being done *NOW*? (investigate, take systems offline, ..)
3. How does this affect your customers? (both short- and long term)
4. What are you doing to minimize risk? What can your customers do?
5. How do people get more information or updates?
(folluw up) 6. What are you doing prevent this from happening again?
Privacy does not benefit from a “do
first, ask forgiveness later” strategy.


(avoid: “Hey, we just lost all this data of yours you did not we had in the first place.”)
which data you gather & what for
set correct expectations
FROM THE START:
informed explicit consent

(avoid: “Hey, we just lost all this data of yours you did not we had in the first place.”)
clear affirmative action
use plain language
1.  You need to fully understand the end goal – Ask the right questions
2.  There are rules, guidelines and toolkits – Rules & tools evolve. Fast.
3.  Less is more – Value & proportionality
4.  You can’t do it alone. – Multi-disciplinary and cross-departmental
5.  The devil is in the details – and the cost of mistakes high
6.  Honest communications – from the start
As designers, then what can we easily do
that improves both UX and privacy?
GOOD UX AND PRIVACY
10 examples to get it right
1. Design for Explicit: Opt-In
By signing this contract, you
agree we have the right to collect
and pass on all your information.
In case you do not want your bank
to pass on your credit information
to third partners and other
divisions, please write ‘I do not
agree’ on the contract and hand it
over to the person behind the till.
EXPLICIT
 EXPLICIT
 NOT EXPLICIT
(hidden opt-out)
NO
 YES
IF YOU AGREE, PLEASE
CHECK THIS BOX:
2. Design for
Informed: No
Surprises
3. Design for Choice: Consent
In your designs and flows, take into account both having
and not having the data. 
Design personalized experiences
for when you have data.
Design good alternatives for not
having the data.
Today will be sunny
Weather for Olen, Belgium where we
know you live.
Check out the weather!
Antwerpen
Privacy as a trading function
Accelerometer
Gyroscope
Microphone
Camera
In-App Usage
GPS
Expected
value
User
acceptance
Wi-Fi
Browsing History
The more permissions are required, more added value is expected from the mobile app.
Calendar
SMS
Light
GSR
Clear & consistent, so
people can trust you to
point out privacy related
features & settings.
4. Design
for Trust
TrustUX: balancing personalisation and privacy to create understanding and trust (Strata+Hadoop World)
5. Design for Because..
Explain your magic.

When users know of the
existence of a certain
algorithm, their
satisfaction with the
product increases over
time , probably as they
start to understand its
workings better. Yet when
they discovered an
algorithm they were
previously unaware of,
users felt betrayed.
Worst case scenario

“In the extreme case, it
may be that whenever a
software developer in
Menlo Park adjusts a
parameter, someone
somewhere wrongly starts
to believe themselves to be
unloved. ” 

– Eslami et all.
Because... allows people to correct you when wrong.

Something we best figure out before algorithms get to act on
our behalf.
6. Design for Transparency
Show people their data
selfs.

If we are going to allow
algorithms and expert
rules to steer our
behaviour, we must know
they understand that
correctly.

Allow for: 
-  Correction
-  Reset
7. Design for forming secure habits
“Burner accounts”

Kinja introduced these for
anonymous commenting.
They made private keys
understandable through
metaphor.

“…if you lose the burner
key initially issued we will
not be able to retrieve this
information for you or reset
the account. Save your
key.”
Reward secure
behaviour

Users that enable two-step
security on their accounts
will now receive a 10%
discount off their monthly
bill Mailchimp bill.
8. Design to encourage privacy
Access duration

People forget to ‘revoke’
things. Supply limited time
access options: 

-  WeChat: discoverable
for 10 minutes (default)
-  LinkedIn: access
duration settings
(weeks → months →
years)
9. Design for an Exit
Offer Alternatives

Make it easy to leave, but
think about WHY people
are leaving, and offer
alternatives. 

Eg.
-  “snooze” services
-  less-email-option
-  reset profile/account
-  ..
10. Design with P2P privacy in mind
Do you want to know
if your friends are
(action/mood/..) ?

Do you want your friends
to know if you are
(action/mood/..) ?

Don’t allow
OK
We influence what is acceptable.
Snowden Challenge at SXSW
Combine exceptional ux with privacy at INCEPTION, not
afterwards
“ Combine exceptional UX with privacy at 
inception, not afterwards.”

Edward Snowden’s Challenge to Startups at SXSW
As the need for permanent access to data increases,
so does the need for ethics & morality.
Weak AI
(expert systems)
Strong AI
(singularity)
Machine Learning
Deep Learning
Recommender Systems
Autonomous
Systems
Transition period (Danger Zone)
GOOD UX AND PRIVACY

Privacy is about more than data.
Privacy does not benefit
from a “do first, ask forgiveness later” strategy.
It’s their data. Not yours.
(Safeguarding it is a joint effort, though).

It is their choice. 
Design the best possible experience, regardless the choice.
HELP BUILD THE FUTURE BOLDLY.
DO SO RESPONSIBLY
ann wuyts
@vintfalken
sentiance
customer experience & UX
Strata + Hadoop World, 2015
Thank you.

Mais conteúdo relacionado

Mais procurados

Why Mobile Social Media Matters - Statistics, Trends, Technologies
Why Mobile Social Media Matters - Statistics, Trends, TechnologiesWhy Mobile Social Media Matters - Statistics, Trends, Technologies
Why Mobile Social Media Matters - Statistics, Trends, TechnologiesDavid Berkowitz
 
The 2016 CES Report: The Trend Behind the Trend
The 2016 CES Report: The Trend Behind the TrendThe 2016 CES Report: The Trend Behind the Trend
The 2016 CES Report: The Trend Behind the Trend360i
 
Mobile World Congress - Day 4 Recap
Mobile World Congress - Day 4 Recap Mobile World Congress - Day 4 Recap
Mobile World Congress - Day 4 Recap Ogilvy
 
What's Next: Social Media Trends 2020
What's Next: Social Media Trends 2020 What's Next: Social Media Trends 2020
What's Next: Social Media Trends 2020 Ogilvy Consulting
 
The State of Content: Rules of Engagement 2016
The State of Content: Rules of Engagement 2016The State of Content: Rules of Engagement 2016
The State of Content: Rules of Engagement 2016blaiq
 
How Mobile Killed the Desktop: 33 Stats that Tell a Story
How Mobile Killed the Desktop: 33 Stats that Tell a StoryHow Mobile Killed the Desktop: 33 Stats that Tell a Story
How Mobile Killed the Desktop: 33 Stats that Tell a StoryPlacester
 
360i's 2015 International CES Hot List
360i's 2015 International CES Hot List360i's 2015 International CES Hot List
360i's 2015 International CES Hot List360i
 
How Digital Is Becoming A Mobile First Experience
How Digital Is Becoming A Mobile First ExperienceHow Digital Is Becoming A Mobile First Experience
How Digital Is Becoming A Mobile First ExperienceYuan Wang
 
Digital marketing trends 2014
Digital marketing trends 2014Digital marketing trends 2014
Digital marketing trends 2014Paul Gilbert
 
Artificial Intelligence - AI marketing 2021 - EMDM - Hugues Rey - Solvay ...
Artificial Intelligence - AI marketing    2021 -  EMDM - Hugues Rey - Solvay ...Artificial Intelligence - AI marketing    2021 -  EMDM - Hugues Rey - Solvay ...
Artificial Intelligence - AI marketing 2021 - EMDM - Hugues Rey - Solvay ...Hugues Rey
 
Activate Tech and Media Outlook 2016
Activate Tech and Media Outlook 2016Activate Tech and Media Outlook 2016
Activate Tech and Media Outlook 2016Activate
 
Tech & Digital Trend 2017
Tech & Digital Trend 2017Tech & Digital Trend 2017
Tech & Digital Trend 2017IQUII
 
Mobile Tech Trends for 2017
Mobile Tech Trends for 2017Mobile Tech Trends for 2017
Mobile Tech Trends for 2017Somo
 
How CMOs Can Build a Mobile App Strategy
How CMOs Can Build a Mobile App StrategyHow CMOs Can Build a Mobile App Strategy
How CMOs Can Build a Mobile App StrategyKoombea
 
Chinese New Year Reaches Mobile Tipping Point
Chinese New Year Reaches Mobile Tipping PointChinese New Year Reaches Mobile Tipping Point
Chinese New Year Reaches Mobile Tipping PointApp Annie
 
ONDEC | Edition 3 | Strangers
ONDEC | Edition 3 | StrangersONDEC | Edition 3 | Strangers
ONDEC | Edition 3 | StrangersThe Media Kitchen
 
Social Revolution: Connecting with Today’s Customer
Social Revolution: Connecting with Today’s CustomerSocial Revolution: Connecting with Today’s Customer
Social Revolution: Connecting with Today’s CustomerHubSpot
 

Mais procurados (20)

Why Mobile Social Media Matters - Statistics, Trends, Technologies
Why Mobile Social Media Matters - Statistics, Trends, TechnologiesWhy Mobile Social Media Matters - Statistics, Trends, Technologies
Why Mobile Social Media Matters - Statistics, Trends, Technologies
 
The 2016 CES Report: The Trend Behind the Trend
The 2016 CES Report: The Trend Behind the TrendThe 2016 CES Report: The Trend Behind the Trend
The 2016 CES Report: The Trend Behind the Trend
 
Mobile World Congress - Day 4 Recap
Mobile World Congress - Day 4 Recap Mobile World Congress - Day 4 Recap
Mobile World Congress - Day 4 Recap
 
What's Next: Social Media Trends 2020
What's Next: Social Media Trends 2020 What's Next: Social Media Trends 2020
What's Next: Social Media Trends 2020
 
The State of Content: Rules of Engagement 2016
The State of Content: Rules of Engagement 2016The State of Content: Rules of Engagement 2016
The State of Content: Rules of Engagement 2016
 
How Mobile Killed the Desktop: 33 Stats that Tell a Story
How Mobile Killed the Desktop: 33 Stats that Tell a StoryHow Mobile Killed the Desktop: 33 Stats that Tell a Story
How Mobile Killed the Desktop: 33 Stats that Tell a Story
 
99 Facts on the Future of Business
99 Facts on the Future of Business99 Facts on the Future of Business
99 Facts on the Future of Business
 
360i's 2015 International CES Hot List
360i's 2015 International CES Hot List360i's 2015 International CES Hot List
360i's 2015 International CES Hot List
 
How Digital Is Becoming A Mobile First Experience
How Digital Is Becoming A Mobile First ExperienceHow Digital Is Becoming A Mobile First Experience
How Digital Is Becoming A Mobile First Experience
 
Digital marketing trends 2014
Digital marketing trends 2014Digital marketing trends 2014
Digital marketing trends 2014
 
Artificial Intelligence - AI marketing 2021 - EMDM - Hugues Rey - Solvay ...
Artificial Intelligence - AI marketing    2021 -  EMDM - Hugues Rey - Solvay ...Artificial Intelligence - AI marketing    2021 -  EMDM - Hugues Rey - Solvay ...
Artificial Intelligence - AI marketing 2021 - EMDM - Hugues Rey - Solvay ...
 
Activate Tech and Media Outlook 2016
Activate Tech and Media Outlook 2016Activate Tech and Media Outlook 2016
Activate Tech and Media Outlook 2016
 
Tech & Digital Trend 2017
Tech & Digital Trend 2017Tech & Digital Trend 2017
Tech & Digital Trend 2017
 
Mobile Tech Trends for 2017
Mobile Tech Trends for 2017Mobile Tech Trends for 2017
Mobile Tech Trends for 2017
 
How CMOs Can Build a Mobile App Strategy
How CMOs Can Build a Mobile App StrategyHow CMOs Can Build a Mobile App Strategy
How CMOs Can Build a Mobile App Strategy
 
Empathic Computing: From Wearables to Biohacking
Empathic Computing: From Wearables to BiohackingEmpathic Computing: From Wearables to Biohacking
Empathic Computing: From Wearables to Biohacking
 
Social digital tech trends 2016
Social digital tech trends 2016 Social digital tech trends 2016
Social digital tech trends 2016
 
Chinese New Year Reaches Mobile Tipping Point
Chinese New Year Reaches Mobile Tipping PointChinese New Year Reaches Mobile Tipping Point
Chinese New Year Reaches Mobile Tipping Point
 
ONDEC | Edition 3 | Strangers
ONDEC | Edition 3 | StrangersONDEC | Edition 3 | Strangers
ONDEC | Edition 3 | Strangers
 
Social Revolution: Connecting with Today’s Customer
Social Revolution: Connecting with Today’s CustomerSocial Revolution: Connecting with Today’s Customer
Social Revolution: Connecting with Today’s Customer
 

Destaque

Jack D. Ryger: The Need For Speed - 7 Places to Legally Race Your Car
Jack D. Ryger: The Need For Speed - 7 Places to Legally Race Your CarJack D. Ryger: The Need For Speed - 7 Places to Legally Race Your Car
Jack D. Ryger: The Need For Speed - 7 Places to Legally Race Your CarJack D. Ryger
 
Fatal Truck Accidents in Decline Despite Recent Uptick in Crashes
Fatal Truck Accidents in Decline Despite Recent Uptick in CrashesFatal Truck Accidents in Decline Despite Recent Uptick in Crashes
Fatal Truck Accidents in Decline Despite Recent Uptick in CrashesCogan & Power P.C.
 
Ensuring Your Weight Loss Survives The Hype
Ensuring Your Weight Loss Survives The HypeEnsuring Your Weight Loss Survives The Hype
Ensuring Your Weight Loss Survives The HypeRudolph Kirkland
 
China capitulates: Another round of auto stimulus
China capitulates: Another round of auto stimulusChina capitulates: Another round of auto stimulus
China capitulates: Another round of auto stimulusBloomberg LP
 
UX for connected cars
UX for connected carsUX for connected cars
UX for connected carsPlan
 
Buying Your First Car
Buying Your First CarBuying Your First Car
Buying Your First CarEason Chan
 
20 Awesome Facts About Chocolate That You Need To Know For Valentine’s Day
20 Awesome Facts About Chocolate That You Need To Know For Valentine’s Day20 Awesome Facts About Chocolate That You Need To Know For Valentine’s Day
20 Awesome Facts About Chocolate That You Need To Know For Valentine’s DayEason Chan
 
20 Statistics About Millennials in the Workplace
20 Statistics About Millennials in the Workplace20 Statistics About Millennials in the Workplace
20 Statistics About Millennials in the WorkplaceOfficevibe
 
Southeast Asia Technology Investment Landscape
Southeast Asia Technology Investment LandscapeSoutheast Asia Technology Investment Landscape
Southeast Asia Technology Investment LandscapeWarren Leow
 
The Automotive Industry Through the lens of social
The Automotive Industry Through the lens of socialThe Automotive Industry Through the lens of social
The Automotive Industry Through the lens of socialBrandwatch
 
Does Living Near An NFL Stadium Boost Your Home Value?
Does Living Near An NFL Stadium Boost Your Home Value?Does Living Near An NFL Stadium Boost Your Home Value?
Does Living Near An NFL Stadium Boost Your Home Value?Trulia
 
25 Cars Worth Waiting For 2016–2019
25 Cars Worth Waiting For 2016–201925 Cars Worth Waiting For 2016–2019
25 Cars Worth Waiting For 2016–2019Eason Chan
 
15 Common Myths you were taught to believe about Cars
15 Common Myths you were taught to believe about Cars15 Common Myths you were taught to believe about Cars
15 Common Myths you were taught to believe about CarsEason Chan
 
DESIGN THE PRIORITY, PERFORMANCE 
AND UX
DESIGN THE PRIORITY, PERFORMANCE 
AND UXDESIGN THE PRIORITY, PERFORMANCE 
AND UX
DESIGN THE PRIORITY, PERFORMANCE 
AND UXPeter Rozek
 

Destaque (16)

Jack D. Ryger: The Need For Speed - 7 Places to Legally Race Your Car
Jack D. Ryger: The Need For Speed - 7 Places to Legally Race Your CarJack D. Ryger: The Need For Speed - 7 Places to Legally Race Your Car
Jack D. Ryger: The Need For Speed - 7 Places to Legally Race Your Car
 
Fatal Truck Accidents in Decline Despite Recent Uptick in Crashes
Fatal Truck Accidents in Decline Despite Recent Uptick in CrashesFatal Truck Accidents in Decline Despite Recent Uptick in Crashes
Fatal Truck Accidents in Decline Despite Recent Uptick in Crashes
 
Ensuring Your Weight Loss Survives The Hype
Ensuring Your Weight Loss Survives The HypeEnsuring Your Weight Loss Survives The Hype
Ensuring Your Weight Loss Survives The Hype
 
China capitulates: Another round of auto stimulus
China capitulates: Another round of auto stimulusChina capitulates: Another round of auto stimulus
China capitulates: Another round of auto stimulus
 
UX for connected cars
UX for connected carsUX for connected cars
UX for connected cars
 
Automated vehicles and transport systems
Automated vehicles and transport systemsAutomated vehicles and transport systems
Automated vehicles and transport systems
 
Buying Your First Car
Buying Your First CarBuying Your First Car
Buying Your First Car
 
20 Awesome Facts About Chocolate That You Need To Know For Valentine’s Day
20 Awesome Facts About Chocolate That You Need To Know For Valentine’s Day20 Awesome Facts About Chocolate That You Need To Know For Valentine’s Day
20 Awesome Facts About Chocolate That You Need To Know For Valentine’s Day
 
Hybrid vehicles
Hybrid vehiclesHybrid vehicles
Hybrid vehicles
 
20 Statistics About Millennials in the Workplace
20 Statistics About Millennials in the Workplace20 Statistics About Millennials in the Workplace
20 Statistics About Millennials in the Workplace
 
Southeast Asia Technology Investment Landscape
Southeast Asia Technology Investment LandscapeSoutheast Asia Technology Investment Landscape
Southeast Asia Technology Investment Landscape
 
The Automotive Industry Through the lens of social
The Automotive Industry Through the lens of socialThe Automotive Industry Through the lens of social
The Automotive Industry Through the lens of social
 
Does Living Near An NFL Stadium Boost Your Home Value?
Does Living Near An NFL Stadium Boost Your Home Value?Does Living Near An NFL Stadium Boost Your Home Value?
Does Living Near An NFL Stadium Boost Your Home Value?
 
25 Cars Worth Waiting For 2016–2019
25 Cars Worth Waiting For 2016–201925 Cars Worth Waiting For 2016–2019
25 Cars Worth Waiting For 2016–2019
 
15 Common Myths you were taught to believe about Cars
15 Common Myths you were taught to believe about Cars15 Common Myths you were taught to believe about Cars
15 Common Myths you were taught to believe about Cars
 
DESIGN THE PRIORITY, PERFORMANCE 
AND UX
DESIGN THE PRIORITY, PERFORMANCE 
AND UXDESIGN THE PRIORITY, PERFORMANCE 
AND UX
DESIGN THE PRIORITY, PERFORMANCE 
AND UX
 

Semelhante a TrustUX: balancing personalisation and privacy to create understanding and trust (Strata+Hadoop World)

Cloud migration risk
Cloud migration riskCloud migration risk
Cloud migration riskEdgevalue
 
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise SuccessAltimeter, a Prophet Company
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
K4b Technology Innovation — Trends and Opportunities.pptx
K4b Technology Innovation — Trends and Opportunities.pptxK4b Technology Innovation — Trends and Opportunities.pptx
K4b Technology Innovation — Trends and Opportunities.pptxSelvam Shahraswaty
 
BT On The Productivity Puzzle in Collaboration
BT On The Productivity Puzzle in CollaborationBT On The Productivity Puzzle in Collaboration
BT On The Productivity Puzzle in CollaborationLeon Benjamin
 
Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.Ashika Chauhan
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van TolTalentEvent
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
UX of IoT: Making Meaningful Connections for Users
UX of IoT: Making Meaningful Connections for UsersUX of IoT: Making Meaningful Connections for Users
UX of IoT: Making Meaningful Connections for UsersKat Jayne
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Dana Gardner
 
Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016We Are Social
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
Nexus of Force and Social
Nexus of Force and SocialNexus of Force and Social
Nexus of Force and SocialTech Life JSC
 
APD Presents Best of the Next
APD Presents Best of the Next APD Presents Best of the Next
APD Presents Best of the Next dgmAustralia
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Top Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxTop Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxAdvance Tech
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 

Semelhante a TrustUX: balancing personalisation and privacy to create understanding and trust (Strata+Hadoop World) (20)

WeDo Technologies Blog 2014
WeDo Technologies Blog 2014WeDo Technologies Blog 2014
WeDo Technologies Blog 2014
 
Cloud migration risk
Cloud migration riskCloud migration risk
Cloud migration risk
 
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success
[REPORT PREVIEW] The AI Maturity Playbook: Five Pillars of Enterprise Success
 
Knowledge Work 2020
Knowledge Work 2020Knowledge Work 2020
Knowledge Work 2020
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
K4b Technology Innovation — Trends and Opportunities.pptx
K4b Technology Innovation — Trends and Opportunities.pptxK4b Technology Innovation — Trends and Opportunities.pptx
K4b Technology Innovation — Trends and Opportunities.pptx
 
BT On The Productivity Puzzle in Collaboration
BT On The Productivity Puzzle in CollaborationBT On The Productivity Puzzle in Collaboration
BT On The Productivity Puzzle in Collaboration
 
Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.Top Trends from SXSW Interactive 2014. The Big Roundup.
Top Trends from SXSW Interactive 2014. The Big Roundup.
 
Fontys Eric van Tol
Fontys Eric van TolFontys Eric van Tol
Fontys Eric van Tol
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
UX of IoT: Making Meaningful Connections for Users
UX of IoT: Making Meaningful Connections for UsersUX of IoT: Making Meaningful Connections for Users
UX of IoT: Making Meaningful Connections for Users
 
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
Focus on Data, Risk Control, and Predictive Analysis Drives New Era of Cloud-...
 
Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Nexus of Force and Social
Nexus of Force and SocialNexus of Force and Social
Nexus of Force and Social
 
APD Presents Best of the Next
APD Presents Best of the Next APD Presents Best of the Next
APD Presents Best of the Next
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Top Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docxTop Strategic Technology Trends for 2022.docx
Top Strategic Technology Trends for 2022.docx
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 

Mais de Ann Wuyts

Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)Ann Wuyts
 
Privacy By Designer (PHP.ghent)
Privacy By Designer (PHP.ghent)Privacy By Designer (PHP.ghent)
Privacy By Designer (PHP.ghent)Ann Wuyts
 
When people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXWhen people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXAnn Wuyts
 
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Ann Wuyts
 
Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Ann Wuyts
 
Designing dashboards for a Sense of Control
Designing dashboards for a Sense of ControlDesigning dashboards for a Sense of Control
Designing dashboards for a Sense of ControlAnn Wuyts
 
Ambient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAmbient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAnn Wuyts
 
9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet WetenAnn Wuyts
 
Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)Ann Wuyts
 
MomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy RecommendationsMomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy RecommendationsAnn Wuyts
 
Vuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptVuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptAnn Wuyts
 

Mais de Ann Wuyts (11)

Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
Stop hiding behind your privacy policy: build consumer trust (ADM.be, 2015)
 
Privacy By Designer (PHP.ghent)
Privacy By Designer (PHP.ghent)Privacy By Designer (PHP.ghent)
Privacy By Designer (PHP.ghent)
 
When people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UXWhen people are your most important asset: Data Governance, Privacy & UX
When people are your most important asset: Data Governance, Privacy & UX
 
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...
 
Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!Dear Marketers, How Badly Do You Know Me!
Dear Marketers, How Badly Do You Know Me!
 
Designing dashboards for a Sense of Control
Designing dashboards for a Sense of ControlDesigning dashboards for a Sense of Control
Designing dashboards for a Sense of Control
 
Ambient AI, Advertising & Technology
Ambient AI, Advertising & TechnologyAmbient AI, Advertising & Technology
Ambient AI, Advertising & Technology
 
9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten9 Dingen Die Je Over Privacy Moet Weten
9 Dingen Die Je Over Privacy Moet Weten
 
Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)Mobile, Smart & Context-Aware (infographic)
Mobile, Smart & Context-Aware (infographic)
 
MomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy RecommendationsMomoBXL - Pat Walsche on World-wide Privacy Recommendations
MomoBXL - Pat Walsche on World-wide Privacy Recommendations
 
Vuilbakkes Mobile App Concept
Vuilbakkes Mobile App ConceptVuilbakkes Mobile App Concept
Vuilbakkes Mobile App Concept
 

Último

Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameKapil Thakar
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and businessFrancesco Corti
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4DianaGray10
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInThousandEyes
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...DianaGray10
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024Brian Pichman
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechProduct School
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.IPLOOK Networks
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxNeo4j
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxKaustubhBhavsar6
 

Último (20)

Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Flow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First FrameFlow Control | Block Size | ST Min | First Frame
Flow Control | Block Size | ST Min | First Frame
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
From the origin to the future of Open Source model and business
From the origin to the future of  Open Source model and businessFrom the origin to the future of  Open Source model and business
From the origin to the future of Open Source model and business
 
UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4UiPath Studio Web workshop series - Day 4
UiPath Studio Web workshop series - Day 4
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024
 
SheDev 2024
SheDev 2024SheDev 2024
SheDev 2024
 
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - TechWebinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
Webinar: The Art of Prioritizing Your Product Roadmap by AWS Sr PM - Tech
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.
 
Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptx
 

TrustUX: balancing personalisation and privacy to create understanding and trust (Strata+Hadoop World)

  • 1. TRUST UX ann wuyts @vintfalken sentiance customer experience & UX BALANCING PERSONALISATION AND PRIVACY TO CREATE UNDERSTANDING AND TRUST Strata + Hadoop World, 2015
  • 2. HAPPY TO INTRODUCE YOU TO MY NEW BEST FRIENDS THESE THINGS KNOW ME
  • 3. THE FOUR PHASES OF COGNIZANT COMPUTING 1. SYNC ME Store copies of my digital assets and keep it in sync across all end points and contexts 2. SEE ME Know where I am (and have been) on the internet and in the real world. Understand my mood and context to better align services 3. KNOW ME Understand what I want and need and proactively present it to me 4. BE ME Act on my behalf based on learned and explicit rules 94% COMPLETED 82% WEARABLES UPDATE 31% … LOADING DATA INITIALIZING.. 12%
  • 4. Meanwhile, at the Apple Watch announcement, 19× Personal. relevant are you engaging at the right moment? glanceable can you deliver value in milliseconds? personal do you approach people in the right manner? EXPERIENCES FOR THE MOST PERSONAL DEVICE EVER ARE
  • 5. No other Apple device has ever been so connected to the wearer. It is important to be mindful of this connection . Apple Watch Human Interface Design Guidelines, 2015
  • 6. UNDERSTANDING PERSONALISATION TRUST PRIVACY H2H MACHINE-TO-HUMAN RELATIONSHIPS ARE NOW ABOUT HUMAN-TO-HUMAN VALUES M2H
  • 7. 2nd Annual Poll on How Personal Technology is Changing our Lives - January 2015, Microsoft   Concern about privacy jumped 5 points between 2014 and 2015. THE PRIVACY CHALLENGE
  • 8. 91% of adults ‘agree’ or ‘strongly agree’ that consumers have lost control over how personal information is collected and used by companies. Pew Research Privacy Panel Survey, January 2014 LOSS OF CONTROL
  • 9. MISCOMMUNICATION People are fearful of sharing their data largely because companies and government have not been good at clearly explaining how they use it. The Data Dialog, Demos 2012
  • 10. TERRIBLE HEADLINES In the future your insurance company will know when you are having sex. Kashmir Hill, Fusion.net - 2015
  • 11. 38% of those who say not concerned about privacy online say they do mind companies using information about them 71% of those who are happy to share personal information with companies and brands that they like are concerned about how information collected about them is being used by companies Personalisations vs Privacy, Ipsos MORI, 2014 USER INCONSISTENCY
  • 12. THE FACEBOOK PARADOX THE FACEBOOK PARADOX 91% of adults feel consumers have lost control over how personal information is collected and used by companies. 58% of the entire adult population (and 71% of internet users) is on Facebook.
  • 13. Having knowledge of the customer is the only durable competitive advantage for companies. Bruce Kasanoff, the author of Smart Customers, Stupid Companies
  • 14. Increased knowledge of the consumer and the fine-tuning of offers that are perceived as personal and highly relevant should lead to an increase in spend. Gartner on the monetization of contextualization
  • 15. DATA VALUE EXCHANGE insights in own behaviourcustomer insights peer comparisonoptimising processes & products personalisation (right message) relevance (right person, right moment) accountability (on ADDD)data driven decisions CONSUMERBUSINESS magic moon standard moon no moon value on the consumer side should be equal or more
  • 16. privacy THE UNTRUTH UX VS The truth is that collecting information about people allows you to make significantly better products and the more information you collect, the better products you can build . Dustin Curtis, “Privacy VS. User Experience” (2014) #FALSE (or at least a very one-sighted truth)
  • 17. Whether or not better products can be made by collecting more user data is a matter of… •  Context •  Opinion •  Causation/correlation •  Data quality (accurate? relevant? complete?) •  Define: better product MORE DATA, BETTER PRODUCTS?
  • 18. BUSINESS VALUE CONSUMER VALUE PRIVACY GREAT UX personalisation PRIVACY AS A FUNDAMENTAL COMPONENT OF THE PRODUCT EXPERIENCE
  • 19. PRIVACY @ SENTIANCE UX DESIGN Businesses  can  deliver  a  grand  user   experience  and  tremendous  value  to   both  customers  and  the  company,     only  if  they  safeguard  their  users’   privacy  and  security.   →
  • 20. Niveau 1 Niveau 2 Niveau 3 aggressive driver … … waking up … city worker sleeping walking running car subway train bus boat zigzagging standing airplane* biking arriving at home, work, the gym, ... shopping lunch inactive noisy environment* in a meeting horse* @home working in company* couch potato workaholic sportive N2 moments N3 profiles N1 events watching tv motorcycle agitated* suddenly stopped tram climbing* SENTIANCE FROM MOBILE DATA TO SMART LIFE
  • 21. why great UX requires privacy what UX & privacy have in common 10 examples to do both Privacy & UX right
  • 22. DEFINE: PRIVACY Personal data is any information relating to an individual, whether it relates to his or her private, professional or public life.
  • 23. (it is however, an essential requirement) SECURITY = PRIVACY “Security is a very important topic, but it’s primarily a technical topic, and to a large extent it’s a very well- understood one. If you pay attention to security, it is possible to get it right, whereas privacy is something that’s much more fluid and is much more about social norms, expectations, implicit contracts between consumers and providers.” Pilgrim Baert – co-founder of AlertMe
  • 24. THE INTERNET OF EVERYTHING: DESIGNER ROLES ARE UNDERGOING CHANGE UX design has been extended to address all aspects of a product or service as perceived by its users – that includes the control they have of their personal dta, their privacy.
  • 25. BEING CREDIBLE useful usable desirable credible valuable findable accessible User Experience Honeycomb (Peter Morville) credible 2004 the information you present to users 2015 taking responsibility to keep personal data safe
  • 26. PRIVACY-BY-DESIGNER: DELIVER BOTH PERSONAL & TRUST We owe it to both our users and the people who hire us to actively think about privacy, and to implement privacy in the flows and designs we deliver. B. We need to deliver trustworthy products. A. We need to deliver great, personal experiences.
  • 27. 1. You need to fully understand the end goal (by asking the right questions) WHY Why are we doing this? What do you want to achieve? What is required to achieve this? What is the best way? WHAT WHO Who is impacted by this? What do they expect? GOAL DATA PIA
  • 28. 2. There are rules, guidelines, toolkits. (which continuously evolve) UX PRIVACY •  Apple, Android, .. design guidelines •  Interaction patterns •  Best (and worst) practice examples •  Models & frameworks •  User research methods •  Emerging trends •  … TOOLKITS: omnigraffle, illustrator, fireworks, pen & paper, … •  Existing & upcoming EU Law (GDPR) •  Local privacy act & royal decrees •  Local telecommunications law •  Privacy watchdog recommendations •  ToS of the platform (iOS, Android) •  Internal policies •  … TOOLKITS: information classification, risk assessments, privacy policies, PIA framework, …
  • 29. 2. There are rules, guidelines, toolkits. (which continuously evolve) General Data Protection Regulation EXPANDED SCOPE any organization processing personal data of EU residents PRIVACY-BY-DESIGN & DEFAULT EXPLICIT INFORMED CONSENT DATA BREACH NOTIFICATION DPA & possibly consumer DPO REQUIRED Users/month threshold or location data DATA PORTABILITY
  • 30. 3. Less is More. (value & proportionality) collection processing storing purpose PROPORTIONALITY
  • 31. fewer data fewer less detailed shorter period in time de-idenfity asap Less is more, not just in quantity but also in identifiability & time
  • 32. value of knowing cost of identifying IDENTIFIABILITY Why an IP an sich will no longer be personal data… (unless you are an ISP)
  • 33. avoid when possible geohashes coarse location beware location GDPR: this is ‘special data’ → extra safety measures
  • 34. 4. You can not do it alone. (it is multi-disciplinary and cross-departmental) Privacy requires a clear mandate to get things done. Everybody accepts it is important – but not a single department has it as a priority. Have privacy as part as the project plan and estimates as soon as possible. A continuous need to explain the significance of privacy in the overall product & company picture Have privacy as a deliverable, avoids the delays & soring costs of adding it after the facts.
  • 35. Privacy is not only a fundamental right, it can also be a competitive advantage . Neelie Kroes Conform to EU legislation? Ready for the world market, then. People can trust you with their digital identities → sets you apart from competition
  • 36. 5. The devil is the details. (and the cost of mistakes is high) •  up to 1,000,000 EUR fine or up to 2% of the annual worldwide turnover in case of an enterprise, whichever is greater (Draft GDPR, art 79) •  customers leaving •  •  customer complaints •  customers leaving UX Privacy
  • 37. Most of these were hacked (security), but as soon as personal data leaks: Privacy & trust disaster too.
  • 38. 6. Practice Honest Communication. (from the start) Consider a breach likely – and prepare accordingly. VISA’s ‘Responding to a Data Breach – Communications Guidelines for Merchants‘ guidelines. do not play the victim express regret take ownership be accountable
  • 39. 1. What happened? (tell what you know at that time) crisis communications (works for downtime communication too) 2. What is being done *NOW*? (investigate, take systems offline, ..) 3. How does this affect your customers? (both short- and long term) 4. What are you doing to minimize risk? What can your customers do? 5. How do people get more information or updates? (folluw up) 6. What are you doing prevent this from happening again?
  • 40. Privacy does not benefit from a “do first, ask forgiveness later” strategy. (avoid: “Hey, we just lost all this data of yours you did not we had in the first place.”) which data you gather & what for set correct expectations
  • 41. FROM THE START: informed explicit consent (avoid: “Hey, we just lost all this data of yours you did not we had in the first place.”) clear affirmative action use plain language
  • 42. 1.  You need to fully understand the end goal – Ask the right questions 2.  There are rules, guidelines and toolkits – Rules & tools evolve. Fast. 3.  Less is more – Value & proportionality 4.  You can’t do it alone. – Multi-disciplinary and cross-departmental 5.  The devil is in the details – and the cost of mistakes high 6.  Honest communications – from the start As designers, then what can we easily do that improves both UX and privacy?
  • 43. GOOD UX AND PRIVACY 10 examples to get it right
  • 44. 1. Design for Explicit: Opt-In By signing this contract, you agree we have the right to collect and pass on all your information. In case you do not want your bank to pass on your credit information to third partners and other divisions, please write ‘I do not agree’ on the contract and hand it over to the person behind the till. EXPLICIT EXPLICIT NOT EXPLICIT (hidden opt-out) NO YES IF YOU AGREE, PLEASE CHECK THIS BOX:
  • 45. 2. Design for Informed: No Surprises
  • 46. 3. Design for Choice: Consent In your designs and flows, take into account both having and not having the data. Design personalized experiences for when you have data. Design good alternatives for not having the data. Today will be sunny Weather for Olen, Belgium where we know you live. Check out the weather! Antwerpen
  • 47. Privacy as a trading function Accelerometer Gyroscope Microphone Camera In-App Usage GPS Expected value User acceptance Wi-Fi Browsing History The more permissions are required, more added value is expected from the mobile app. Calendar SMS Light GSR
  • 48. Clear & consistent, so people can trust you to point out privacy related features & settings. 4. Design for Trust
  • 50. 5. Design for Because.. Explain your magic. When users know of the existence of a certain algorithm, their satisfaction with the product increases over time , probably as they start to understand its workings better. Yet when they discovered an algorithm they were previously unaware of, users felt betrayed.
  • 51. Worst case scenario “In the extreme case, it may be that whenever a software developer in Menlo Park adjusts a parameter, someone somewhere wrongly starts to believe themselves to be unloved. ” – Eslami et all.
  • 52. Because... allows people to correct you when wrong. Something we best figure out before algorithms get to act on our behalf.
  • 53. 6. Design for Transparency Show people their data selfs. If we are going to allow algorithms and expert rules to steer our behaviour, we must know they understand that correctly. Allow for: -  Correction -  Reset
  • 54. 7. Design for forming secure habits “Burner accounts” Kinja introduced these for anonymous commenting. They made private keys understandable through metaphor. “…if you lose the burner key initially issued we will not be able to retrieve this information for you or reset the account. Save your key.”
  • 55. Reward secure behaviour Users that enable two-step security on their accounts will now receive a 10% discount off their monthly bill Mailchimp bill.
  • 56. 8. Design to encourage privacy Access duration People forget to ‘revoke’ things. Supply limited time access options: -  WeChat: discoverable for 10 minutes (default) -  LinkedIn: access duration settings (weeks → months → years)
  • 57. 9. Design for an Exit Offer Alternatives Make it easy to leave, but think about WHY people are leaving, and offer alternatives. Eg. -  “snooze” services -  less-email-option -  reset profile/account -  ..
  • 58. 10. Design with P2P privacy in mind Do you want to know if your friends are (action/mood/..) ? Do you want your friends to know if you are (action/mood/..) ? Don’t allow OK
  • 59. We influence what is acceptable.
  • 60. Snowden Challenge at SXSW Combine exceptional ux with privacy at INCEPTION, not afterwards “ Combine exceptional UX with privacy at inception, not afterwards.” Edward Snowden’s Challenge to Startups at SXSW
  • 61. As the need for permanent access to data increases, so does the need for ethics & morality. Weak AI (expert systems) Strong AI (singularity) Machine Learning Deep Learning Recommender Systems Autonomous Systems Transition period (Danger Zone)
  • 62. GOOD UX AND PRIVACY Privacy is about more than data. Privacy does not benefit from a “do first, ask forgiveness later” strategy. It’s their data. Not yours. (Safeguarding it is a joint effort, though). It is their choice. Design the best possible experience, regardless the choice.
  • 63. HELP BUILD THE FUTURE BOLDLY. DO SO RESPONSIBLY ann wuyts @vintfalken sentiance customer experience & UX Strata + Hadoop World, 2015 Thank you.