{"668076":{"#nid":"668076","#data":{"type":"event","title":"PhD Defense by Youngwook Do","body":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ETitle: Physicalizing Security and Privacy: Exploring Physically Intuitive Design to Build Users Trust in Using Ubiquitous Sensors\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDate: Monday, June 26, 2023\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ETime: 1:00 PM - 4:00 PM ET\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ELocation (in-person):\u0026nbsp; Coda 1215\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ELocation (remote):\u0026nbsp; \u003C\/span\u003E\u003C\/span\u003E\u003Ca href=\u0022https:\/\/gatech.zoom.us\/j\/3143222787?pwd=bzJCTkNEZUZwMnJQVnVJd0RVbTEzZz09\u0022\u003E\u003Cspan\u003E\u003Cspan\u003Eclick here to join via Zoom\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/a\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EYoungwook Do\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EPh.D. Candidate in Computer Science\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ESchool of Interactive Computing\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EGeorgia Institute of Technology\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003ECommittee:\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Gregory D. Abowd (co-advisor), College of Engineering, Northeastern University, USA and School of Interactive Computing, Georgia Institute of Technology, USA\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Sauvik Das (co-advisor), Human-Computer Interaction Institute, Carnegie Mellon University, USA and School of Interactive Computing, Georgia Institute of Technology, USA\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Hyunjoo Oh, School of Interactive Computing \u0026amp; School of Industrial Design, Georgia Institute of Technology, USA\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Thad Starner, School of Interactive Computing, Georgia Institute of Technology, USA\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EDr. Jason I. Hong, Human-Computer Interaction Institute, Carnegie Mellon University, USA\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EAbstract:\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EEnd-users often experience difficulties in using security and privacy (S\u0026amp;P) operations of sensor-enabled devices in everyday environments. Specifically, the S\u0026amp;P operations are running inside the devices and are not apparent to end-users. For example, it is challenging to discern with certainty if a laptop webcam could be activated without turning on its associated LED indicator, if a smart speaker microphone could record the users\u2019 conversation unwittingly, and if a malicious actor surreptitiously carries an RFID reader around to covertly access data stored in a user\u2019s passive RFID tags. Moreover, manufacturers assert that end-users\u2019 data is not unwittingly collected. However, the users came across contradictory evidence. This results in creating a gulf between how S\u0026amp;P operations actually work and how end-users perceive they work and this gulf erodes end-users\u2019 trust in using such sensor-enabled devices.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EIn my research, I aim to narrow this gulf by leveraging tangible and physical operations that allow end-users to physically perceive and intuitively understand their S\u0026amp;P actions, which, in turn, helps address S\u0026amp;P concerns against, and improve trust in, sensor-enabled devices. However, S\u0026amp;P concerns with different sensor-enabled devices are required to be managed differently. As a metaphor, people could close their doors and perceptibly guarantee that no one can see inside their room. However, closing the door may not completely prevent the sound of private conversations from going outside the room as sound could propagate through.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EIn my defense, I present a series of projects and demonstrate how to approach such challenges according to various sensing system types. First, I present Smart Webcam Cover, an intelligent physical barrier for a laptop webcam, and discuss design components that establish trust in using the laptop webcam. Second, I showcase Powering for Privacy and explain how to design a physical S\u0026amp;P operation to address privacy concerns with a smart speaker microphone that cannot be completely blocked by a physical barrier. Lastly, I introduce On-demand RFID, a new passive RFID design that allows end-users to perceptibly assure the RFID\u2019s readability against unauthorized access attempts. The design implications I found from the projects will contribute to solution designs to address S\u0026amp;P concerns with various sensor-enabled devices situated in a variety of contexts.\u0026nbsp; \u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003EPhysicalizing Security and Privacy: Exploring Physically Intuitive Design to Build Users Trust in Using Ubiquitous Sensors\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Physicalizing Security and Privacy: Exploring Physically Intuitive Design to Build Users Trust in Using Ubiquitous Sensors"}],"uid":"27707","created_gmt":"2023-06-12 17:08:44","changed_gmt":"2023-06-12 17:08:44","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2023-06-26T13:00:53-04:00","event_time_end":"2023-06-26T16:00:00-04:00","event_time_end_last":"2023-06-26T16:00:00-04:00","gmt_time_start":"2023-06-26 17:00:53","gmt_time_end":"2023-06-26 20:00:00","gmt_time_end_last":"2023-06-26 20:00:00","rrule":null,"timezone":"America\/New_York"},"location":"Coda 1215","extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"100811","name":"Phd Defense"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"177814","name":"Postdoc"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}