Visualisation and Other Methods of Expression (VOME)
Lead Research Organisation:
CRANFIELD UNIVERSITY
Department Name: Cranfield Defence and Security
Abstract
Abstracts are not currently available in GtR for all funded research. This is normally because the abstract was not required at the time of proposal submission, but may be because it included sensitive information such as personal details.
People |
ORCID iD |
Debi Ashenden (Principal Investigator) |
Publications
Barnard-Wills D
(2010)
Public sector engagement with online identity management
in Identity in the Information Society
Coopamootoo P
(2011)
Privacy and Identity Management for Life
Barnard-Wills D
(2012)
E-safety education: Young people, surveillance and responsibility
in Criminology & Criminal Justice
Coles-Kemp, L
(2012)
Community-centric engagement: lessons learned from privacy awareness intervention design
in Proc of HCI 2012: The 26th BCS Conference on Human Computer Interaction
Barnard-Wills D
(2013)
Playing with Privacy: Games for Education and Communication in the Politics of Online Privacy
in Political Studies
Title | Internet Saint or Online Demon |
Description | Participatory music video made by young people from Hudson's Youth Group - http://www.vome.org.uk/toolkit/music-video-2/ |
Type Of Art | Film/Video/Animation |
Year Produced | 2011 |
Impact | Used for training purposes in private sector organisations and used in workshop settings with participants to stimulate thinking. |
URL | http://www.youtube.com/watch?v=CBIN9pFp7ss |
Description | Researchers from the Information Security Group (ISG) at Royal Holloway, University of London, Salford and Cranfield University participated in a three year collaborative research project with consent and privacy specialists at Consult Hyperion and Sunderland City Council, to explore how people engage with concepts of information privacy and consent in on-line interactions. The purpose of VOME (Visualisation and Other Methods of Expression) was to explore how user communities engage with concepts of information privacy and consent in on-line interactions. The aim is to develop alternative conceptual models of on-line privacy which enable users to make clearer on-line disclosure choices. These decision-making models will facilitate a better dialogue between the designers of privacy and consent functionality and their customers. Researchers at Cranfield University were responsible for investigating how people currently think about privacy and consent in online interactions and, by focusing on a particular target audience, to develop interventions that would engage that target audience and help them understand the risks to their personal information when online. The research carried out by Salford University as part of the project led us to select young people as the target audience for the interventions. The interventions that were developed included a card trading game called 'Privacy' and a participatory music video called 'Internet Saint and Online Demon'. The team at Cranfield University used a range of qualitative research methods from analysing online discussions, to using discourse analysis coupled with political science theories to investigate current e-safety training for young people as well as the responses to that training. We also used participatory approaches with a youth group to develop the music video. Our interventions fed into the research carried out by Royal Holloway in their design of technology interventions and, together with Royal Holloway, we established some useful lessons learned for system designers. These include the importance of balancing the control of the researcher against the control of the participants. This means that researchers need to let go of control in some instances particularly when they have participants who do not have strong attitudes around a subject (such as online identity). This was the case during the making of the participatory video with the youth group. The young people involved determined what was filmed, how it was produced and the message that was conveyed. Researchers also need to understand the end user from his or her perspective and not rely on what they imagine that to be. Furthermore it is necessary to understand the involvement and influence of key stakeholders (such as youth workers). There are also limits to the approaches often used to segment target audiences. We discovered that the game and the video work with different segements of young people and that we needed to move beyond demographic or behavioural segmenting towards a more community-based approach. The PhD student working on the VOME project at Cranfield University is looking at ways of using persuasive technology to guide end users towards more privacy aware options and behaviours. The thesis (due to be submitted in January 2013) demonstrates the complexity and challenge of designing usable privacy and explores the way that persuasive technology can overcome this. |
Exploitation Route | The research demonstrated that there was a strong demand from young people for practical detailed advice on how to manage technology and personal information when online. Attitudes to 'sexting' demonstrate that the way young people negotiate risk online is more complex than is currently presented and that while young people are being protected as children online (the training they receive focuses on cyber bulling and 'stranger danger') they are not being prepared for adult life online. Our interventions fed into the research carried out by Royal Holloway in their design of technology interventions and, together with Royal Holloway, we established some useful lessons learned for system designers. These include the importance of balancing the control of the researcher against the control of the participants. This means that researchers need to let go of control in some instances particularly when they have participants who do not have strong attitudes around a subject (such as online identity). |
Sectors | Communities and Social Services/Policy Creative Economy Digital/Communication/Information Technologies (including Software) Education Security and Diplomacy |
URL | http://vome.org.uk |
Description | The findings were used to inform the content of an ESRC project - CREST (Centre for Research & Evidence on Security Threats). |
First Year Of Impact | 2015 |
Sector | Financial Services, and Management Consultancy,Government, Democracy and Justice |
Impact Types | Societal Policy & public services |
Description | Impact Funding |
Amount | £4,485 (GBP) |
Organisation | Engineering and Physical Sciences Research Council (EPSRC) |
Sector | Public |
Country | United Kingdom |
Start | 03/2013 |
End | 08/2013 |
Description | Critical Design |
Organisation | Royal College of Art |
Country | United Kingdom |
Sector | Academic/University |
PI Contribution | The VOME team at Cranfield University collaborated with two critical design artists from RCA to use critical design to envision privacy, identity and security futures. |
Collaborator Contribution | Two pieces were produced. The first comprised three artefacts entitled 'Specimens of IT Fauna' (http://www.davidbenque.com/projects/specimens-of-it-fauna) and the second was a video entitled crime pays (http://www.austinhouldsworth.co.uk/project/crime-pays/). These were used in follow-on workshop (two held at the British Computer Society) and were the subject of a paper presented at the Praxis and Poetics Conference in Newcastle (http://www.praxisandpoetics.org/). Both pieces were exhibited at the Baltic Centre in Newcastle and 'Crime Pays' was exhibited at the RCA. |
Impact | Two pieces were produced. The first comprised three artefacts entitled 'Specimens of IT Fauna' (http://www.davidbenque.com/projects/specimens-of-it-fauna) and the second was a video entitled crime pays (http://www.austinhouldsworth.co.uk/project/crime-pays/). These were used in follow-on workshop (two held at the British Computer Society) and were the subject of a paper presented at the Praxis and Poetics Conference in Newcastle (http://www.praxisandpoetics.org/). Both pieces were exhibited at the Baltic Centre in Newcastle and 'Crime Pays' was exhibited at the RCA. Disciplines involved were critical design (art) and social science |
Start Year | 2012 |
Description | Exploring Emotional Requirements for Online Identity Management |
Form Of Engagement Activity | Participation in an activity, workshop or similar |
Part Of Official Scheme? | No |
Geographic Reach | National |
Primary Audience | Professional Practitioners |
Results and Impact | We ran three events - two workshops at the British Computer Society (BCS) and one workshop at the Defence Academy. At the two events at the BCS we had a total of 37 registered attendees but unfortunately there were many last minute cancellations and we had 21 attendees in total. One of the events was held in the early evening to catch people after work and the other was held as a breakfast event to catch people on their way into work. At the Defence Academy workshop we have over 30 attendees - it was relatively easy for participants to attend if they are working on site. We were, however, pleased with the cross-section of attendees at all three workshops - amongst others there were representatives from Prudential plc., GCHQ, BIS, ISC2, GetSafeOnline, Dstl, DCDC and Old Mutual Investment Group. We succeeded in generating debate in the workshops about the social and emotional aspects of online identity management and cyber security. Over the course of the workshops we also refined the way we engaged with participants and the techniques we used to facilitate creative thinking (such as white boarding and rich pictures). |
Year(s) Of Engagement Activity | 2013 |