<node id="663474">
  <nid>663474</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1669672115</created>
  <changed>1669672115</changed>
  <title><![CDATA[PhD Proposal by Youngwook Do]]></title>
  <body><![CDATA[<p>Title: Physicalizing Security and Privacy against Privacy-Invasive Sensors in Everyday Environments</p>

<p>Date: Friday, December 2, 2022</p>

<p>Time: 9:00 AM - 11:00 AM ET</p>

<p>Location (in-person):&nbsp; CODA C1215</p>

<p>Location (remote):&nbsp; <a href="https://gatech.zoom.us/j/3143222787?pwd=bzJCTkNEZUZwMnJQVnVJd0RVbTEzZz09">click here to join via Zoom&nbsp;</a></p>

<p>&nbsp;</p>

<p>Youngwook Do</p>

<p>PhD Student in Computer Science</p>

<p>School of Interactive Computing</p>

<p>Georgia Institute of Technology</p>

<p>&nbsp;</p>

<p>Committee:</p>

<p>Dr. Gregory D. Abowd (co-advisor), College of Engineering, Northeastern University, USA and School of Interactive Computing, Georgia Institute of Technology, USA&nbsp;</p>

<p>Dr. Sauvik Das (co-advisor), Human-Computer Interaction Institute, Carnegie Mellon University, USA and School of Interactive Computing, Georgia Institute of Technology, USA</p>

<p>Dr. Hyunjoo Oh, School of Interactive Computing &amp; School of Industrial Design, Georgia Institute of Technology, USA&nbsp;</p>

<p>Dr. Thad Starner, School of Interactive Computing, Georgia Institute of Technology, USA</p>

<p>Dr. Jason I. Hong, Human-Computer Interaction Institute, Carnegie Mellon University, USA</p>

<p>&nbsp;</p>

<p>Abstract:</p>

<p>&nbsp;</p>

<p>Security and privacy (S&amp;P) operations of sensor-enabled devices in everyday environments often fail end-users. Specifically, the S&amp;P operations are running inside the devices and are not apparent to end-users. For example, it is unclear to discern if a laptop webcam could be activated without turning on its associated LED indicator or if a smart speaker microphone could record the users&rsquo; conversation unwittingly. Moreover, despite claims that end-users&rsquo; data is not collected without their knowledge or consent, the users found evidence to the contrary. Owing to that, this creates a discrepancy between how S&amp;P operations actually work and how end-users think they work. Due to this discrepancy, end-users have started losing their trust in using such sensor-enabled devices.</p>

<p>&nbsp;</p>

<p>In my research, I aim to narrow the discrepancy by leveraging tangible and physical operations that allow end-users to physically perceive their S&amp;P actions, which, in turn, helps improve trust in sensor-enabled devices. However, privacy concerns with different sensor-enabled devices need to be handled differently. As a metaphor, people could close their doors and perceptibly guarantee that no one can see inside their room. However, closing the door may not completely prevent a conversation sound from going outside the room as sound could propagate through.&nbsp;</p>

<p>&nbsp;</p>

<p>In my thesis proposal, I present a series of case studies and demonstrate how to approach such challenges according to various sensing system types. First, I present Smart Webcam Cover (IMWUT 2021), an intelligent physical barrier for a laptop webcam, and discuss design components that establish trust in using the laptop webcam. Second, I showcase Power for Privacy (under review) and explain how to design a physical S&amp;P operation to address privacy concerns with a smart speaker microphone that cannot be completely blocked by a physical barrier.&nbsp;</p>

<p>&nbsp;</p>

<p>In my proposed work, I propose how to design a solution to address S&amp;P concerns with passive RFID tags. Passive RFID information could be collected imperceptibly and passively by RFID transceivers without end-users&rsquo; knowledge or consent. Unlike a laptop webcam and smart speaker microphone that belong to end-users, the RFID transceiver device does not belong to end-users and they cannot control the RFID transceiver. This uniquely situated sensing system needs to be addressed differently from the webcam and microphone setups. Therefore, I will discuss consideration factors to address the concerns against the passive RFID setup and evaluation plans to assess trust in the effectiveness of the proposed&nbsp; S&amp;P solution. These design implications will contribute to S&amp;P solution designs to address privacy concerns with various sensor-enabled devices situated in a variety of contexts.&nbsp;&nbsp;</p>

<p>&nbsp;</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Physicalizing Security and Privacy against Privacy-Invasive Sensors in Everyday Environments]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2022-12-02T09:00:00-05:00]]></value>
      <value2><![CDATA[2022-12-02T11:00:00-05:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>102851</tid>
        <value><![CDATA[Phd proposal]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
