POST 10: Reflection and proposition/online privacy


This week I have handed my draft proposal to peers and tutor ask for concept feedback. I realise that the idea I come up last week was not strong enough, it still need a clearly idea behind to support the service design. I need to further consider:

  • What will happen if user don’t use this system?
  • What the feeling of the user using this system?
  • How it will interact with other users? is any possible?
  • How it balance the relationship between users and online business?

I learned a lot from my peers feedback, he gave me suggestion I should focused on how the system can bring positive effect to users – the user experience behind, as well as how it will helps others. Therefore I proposed a map section in the Third Party Platform design. It allow users interact with others through social media and also possible to check the location of data lost.

The process from in class feedback and outside class brainstorming are quite help me to develop my final proposal and find the possible thing to apply action around online privacy.

service map

Revised Proposition

AIMS: Stand on online business side, I decided to design a service design system reflect on a Third Party Platform (app), which aims to help people protect their personal information not be used by online commercial transaction and to regain the credibility of online business. The project called “ Trust me”; it’s engage user prejudge the result of using or non-using the system.

ISSUE RESEARCH / POSSIBLE CHANGE: Business use information in ways that user do not like, users quickly learn about it, and the firms are forced to stop. The research involved lot examples to explain why online marketplace failure at the present stage. Otherwise, young teenagers have become concerned about the disclosure, use, and sale of information which businesses have collected about them through a website. According to the interview task and probe task result that I have presented before, one of my interviewee (22years old girl) explained that most of time she has to sign up the website with right personal information because most of them need to verify your email address which she has no choice. Besides, the probe task shown the result of how many promotion/junk email she got for one week. I picked up NSW as the target area, come out with 3 points of the possible change: help people protect data (Action); Share value information with others (Interaction); understand the seriousness of the issue (Feeling).

ACTION TO SUPPORT CHANGE: Therefore, the concept designed that each website need provide a QR code option, which “Trust me” scan QR code to sing up without submitting any personal information. The thing people need to do is create an account for “Trust me”, which will require you set your email address, security code and username only; once you sign up a new website, you can decide whether you want all the information from this website is managed by”Trust me”; If yes, all the information from the website will directly go into the e-mail and mail inbox; you are able to check all the message here. If not use the scan option:  when you click normal sing up option, it will bring you to the social media pop out page ( explain in next paragraph).

On the other hand, the result of how many messages/emails “Trust me” has blocked and where your data has been in danger will show with maps in “Trust me”. It will help you understand what the situation you are in. Share your maps on social media upload with hashtag, you also can see other users posts, check where the data has lost usually and be aware of any dangers.

Trust me user flow chart

“Trust me” not only help online companies get the contact information of users (email, username), but also help users protect their privacy and be aware of danger. It has balanced the relationship between users and online business, with this system, people can live in comfortable internet environment and online business will get batter in the future.

Written by Jiahui Li (nancy)


Post 9: Visual documentation of the brainstorming session / online privacy

By Jiahui Li (nancy)

Review the six weeks brainstorming and collaboration exercise in our group, online privacy issue has been discussed and explored from different perspectives. I found some comments and ideas from my peers help me further understand the topic and identify what I missed within my research, as well as help me framed my problem statement towards my response of the specific issue.  The different concept of our proposal opened our mind to look at more possibilities rely on  “online privacy”  issue.

I have mentioned the first brainstorming section in post 8, we start with the IDEO brainstorming to generate our ideas for a proposal and then direct our problem statement. Once we have our problem statement done, we start brainstorming in our group. We develop ideas around online privacy, what’s possible to change, and what our ideas to drive a proposal. The comments and feedback from peers helped me draft my initial concept of my proposal. Although the collaboration exercise helps me found a lot of different insights to develop my project, the process still needs more concrete ideas that can separate from each of our proposals.

week 6 in class brainstorming

During the break time, I have joined the collaboration workshop for service design case study. In the first stage, we were asked to mindmap out all the actors included in the article and categories the actors to the different controversy such as people, emotion/identity/behaviour, networks/communication and biological. The process helped me clarify how they represent the user in the process and what the main emotion direct the design.(image below)

service design case study

Follow on, we combined the actors from each category and created a sentence to explain the actors. From the feedback from tutors, we released the most important thing we want to emphasise should also be set up in the beginning. So the statement of the analysis should focus on user’s experience, not the designer.

In the next stage, we were introduced to develop a flowchart (joinery map) that document the way the user interacts with actions in the service. In this section, we began to break off our ideas into a rich storyboard of the user experience, which will bring me a deep insight of how can I start with my service design project.(image below)

service design case study 2

Based on my pervious blog post include all the brainstorming exercise have represented the steps/process of developing my issue proposal. Collected all the comments and feedback from peers and tutors,I need further clarify how actors/players react to each other in my proposal, as well as what the experience of the proposal will bring to users.

Post 8: Brainstorming possibilities for a design response / online privacy

by Jiahui Li (nancy)

After the past six weeks research and brainstorming, my issue study has been brought into the important stage. We finally introduced our proposal into three types of design practice: data visualisation, service design and generative system. We start with the IDEO brainstorming section to generate our ideas for a proposal. Below are the five cues that help me articulate my problem statement:

1. Who does the problem affect?

The key stakeholders in this issue are 18 – 25 years old teenagers who do need Internet and don’t know how to control the seriousness of online privacy issue. Most young teenagers have a large demand of Internet and low level of privacy understanding; although they afraid of online privacy leaking sometimes, they are not strong enough to control the problem.

2. What are the boundaries of the issue?

The boundary of the issue is representational; it shows the most common online privacy problem that exists in online commercial development. Based on the previous research, I explored the online privacy issue that specific to “online commercial use of personal information”. When business use information in ways that user does not like, users quickly know about it, and the firms are forced to stop. Because of  business keeps ask and use user’s personal information without their consent, the balance between online commercial development and user privacy has lost.

3. When does the problem occur?

Problems usually happened when you are registering a new website and browsing the illegal websites. More and more website ask to sign up before you browsing, when you sign up a new website, users are required to provide a large amount of personal information include interest, email, gender, address, phone number, even more, privacy questions.

4. Where does the problem occur?

The major place that the problem happened is in your email system, mobile phone message and a phone call. For example, thousand of promotion email keep annoying you every day, phone fraud and message fraud made you afraid and don’t know what’s the truth is.

5. Why is it important that the problem is fixed?

The problem is too common to exist in the online society, the invasion of personal privacy had a great influence on people’s life and the development of the network industry. So the seriousness of the problem can’t be ignored. People need to have a healthy network environment, as well as can protect their personal privacy not  be violated. Especially for young teenagers, they can’t live without Internet, so we need to fix the relationship between website and user privacy.

In class brainstorming

Once we have our problem statement done, we start brainstorming in our group. We develop ideas around online privacy, what’s possible to change, and what our ideas to direct a proposal. Below are the 5 point summary of our possibility findings:

  • In order to educate people and provide people a deep understanding of how creepy when you exposed your personal information public, I generated the idea around data visualisation, which will be present through an interactive design; emphasise the feeling that lost data.
  • Improve the possibility of finding where you lost your data, and be aware of how to protect your data successfully from specific website/online network.
  • A data trust system can help people build the trust between user and website
  • App / program for user to input locations of risk-build a database
  • Improve the understanding of online privacy with info graphic poster, promote and educating people online privacy knowledge


Based on what I got from the five-point summary of the possibilities, I’m going to work on the third idea. As a designer, I decided to build a service design system reflect on a Third Party Platform (TPF) involved in a data trust system,  which aims to help people protect their personal information not be used from commercial website.

According to the old blog post, I have interested in how design project visualise social issue and how can it help people realise the importance of the social issue that happened today. The service design system are designed specific for when you register a new website, it’s replace the function of sign up with personal information. You can scan QR code and sing up without submitting any personal information.

After scanning, the tips will pop out to ask you “whether you want use TPF to manage the website”, you can chose yes or not. If yes, all the information from the website will directly go into the TPF inbox, and you can check all the message here. On the other hand, a data trust system is embed in the TPF, it will help you analysis your data and check where your data has lost.

On the one side, online business still can get the information of users (email, and name), on other side, users can have a safety internet environment. So the project has balanced the relationship between users and companies, as well as help young teenager’s protect their personal privacy.

Post 7: Issue mapping – online privacy

Written by Jiahui Li (nancy)

Since this semester start, collaboration are introduced into our design project process from week 2-week 5.  In terms of collaboration, we consider team composition, communication, distribution, knowledge-sharing and co-ordination that help us build understanding of collaborative exercise. As a group, we were asked to collaboratively map the issue of online privacy, as well as continue brainstorming the ideas of stakeholders involved in our topic. The collaborative exercise start with work in pairs and turn to as a four people groups, we built connection with others and gain a lot of insightful thoughts from the peer’s perspective around online privacy issue.

In week 2, we first work on the brainstorming section, which are list all the possible stakeholders of online privacy around “shared values”, “public and private”, “ human and non-human” and “political and proximity”. As I mentioned in my previous post, these maps presented how specific stakeholders deal with online privacy, as well as the line drawn between their different positions. Thought from peers in my group are quite different with my position, its expand my understanding of data/ online privacy, especially on big data and Wihileaks.

Afterwards, we generated “word associations” in week 4 class, we again shared the ideas around online privacy. The exercise expand the findings of possibility of online privacy, from broth one side and opposite side. We come up with some unfamiliar words such as HDI – Human Data Interaction and DDOS, most of them are well-known, so most of people picked the worth. Besides, the recombination of individual words to sentences, quite fun and understandable; it showed me the alternative and optional thought from others and collaboration exercise to help me further develop the project (Image 1).

(Image 1: week 4 mapping)

In week 5, we are introduced into controversy mapping; a controversy is a disagreement, a typically prolonged, public, and heated debate. As in pairs, we start with the stakeholder map we generated in week 3, bring forward them to explore the specific relationship between each stakeholders, how they affect each other to deal with online privacy (Image 2).

(Image 2: week 5 controversy mapping)

On the other hand, we created a chart that reflect on the corresponding points between controversy, emotion and motivation. It help us found point in this network, put possible things into the space, and then we can draw out the creative change based on these maps. Then we worked on the specific controversy – data ownership, and come out with some different findings. For example, we have the emotion of “non-opinion” and opposite way “ over-powering”; teenagers are non-opinion based, because they think they don’t car who own the data; for data mining companies/adults, they feel they are over-powering, they don’t want their info to be used (Image 3.4).

(Image 3: week 5 controversy mapping)
(Image 4: week 5 controversy mapping)

At the last stage, we as a group four has completed the “Controversy Actors” surround Hierarchies, issues, associate, politics, values and capacities.  Findings and thought provide me more alternative ideas and find way to shift this issue in many different ways (Image 5).

(Image 5: week 5 controversy mapping)


Collaboration workshop withy groups and peers help us further understand the topic and identify what we missed within our research. Fortunately, four of us in our group are focus on different topic around online privacy such as “ownership of data”, “Wihileaks” and “commercial data use”. So the different opinions from the same issue opened our mind to look at “online privacy” from quite discriminating perspectives. For example, thought from my pattern in “data ownership” help me gained a deep understanding of who do you think they can own your data, how data has been collected or what’s people’s attitude (age: 18-25) with data ownership – most of them don’t care who’s using and who own it. Look into the 5 weeks research, mapping exercise, I’m currently work on “ online privacy issue happened in commercial web development”. As I mentioned before, we need draw a line that can balance the relationship between online commercial and user privacy. So combine this ideas with the insight/understanding from co-creating task, I start clarified my approach in both side of human and non-human :

What need to deal with:

  • commercial website use user’s personal information without the user’s consent (human)
  • collect personal information (non-human)
  • teenagers (18-25) doesn’t care where there information go and any… (human)
  • the education level of privacy

Possibilities for action to create change:

  • From human side: a creative idea to educating people around the issue.
  • From non-human side: A third party platform to visualise information and deal with specific point around the issue.

The things we explored are still broad; based on the starting point, I will further build a deep insight of my design project.

Web-scraping technique: #Online privacy

Written by Jiahui Li (nancy)

In order to gain a border understanding of online privacy that happened in people’s life, I looked up Twitter with web-scraping technique. Twitter as a social network is simply bring people closer to their interests and it’s still evolving with various options for its users. The network let users like create a profile, choose whom you would want to follow and post tweets which allow you share your mood and insight on the platform, as well as engage people build conversation around the world. All the tweets of people you follow appear as a shuffled list on your main Twitter page. Businesses have found Twitter to be an effective means of communication with their customers. The network connects businesses with their customers anytime, anywhere. However, it still has limitation of message number, following and follower.

On the other hand, twitter has built a unique function called “ Twitter Advanced Search”, which allow user to tailor search results to specific date ranges, people and more. This makes it easier to find specific Tweets. It been used for people who looking for specific topics and areas that can easy focus on their conversation between same topic. Based on the research, people has started against “privacy information usage” to protect their own information, they believe this is the most expedient way.  Therefore, people share on Twitter with representative image, own experience, articles and videos to not only express their positions, but to encourage more people to protect their own online privacy. On the other hand, business also exist as a big part in Twitter Advanced Search that help people dealing with their privacy issues. (See the image below)

Screen Shot 2016-09-03 at 9.52.22 PM
(Twitter Advanced Search with key words “commercial online privacy)


Screen Shot 2016-09-03 at 4.48.39 PM
(Twitter Advanced Search with key words “commercial online privacy)

Get start of using web-scraping, I set up the key words as “ web personal online privacy”. Most of these tweets are surrounding suggestions and experience with how to protect personal information online to avoid commercial website. Besides, twitter doesn’t have much conversations to communicate the issue specific into the keywords I set up; most of them shared between 2009-2016. At the same time, I have identified how hashtags/key words trend over the time, between 2009-2010, most of people start think about their online privacy and ask for how can they protect the information not be used; after 2010, people described the issue and list “how to control”; in the most recent post, it listed “should you tape over your webcam? personal guide to online privacy”.

Screen Shot 2016-09-03 at 10.34.33 PM
( Twitter Advanced Search,”keywords web personal online privacy”, 2016)


Then I reset the hashtags to “web use privacy”. In these tweets, it is clear that personal opinions and positions are significantly less than those advertisings, which are used to explain how people deal with privacy issue. In other words, few tweets posted the position of “People Limit Web Use Due To Privacy Concerns” happened in America. Concerns about privacy and security are discouraging people from posting to social networks, expressing controversial opinions, conducting online banking and shopping from online retailers.

Screen Shot 2016-09-03 at 10.59.30 PM
(Twitter Advanced Search, “web use privacy”, 2016)


Screen Shot 2016-09-03 at 11.18.11 PM
(Twitter Advanced Search, “web use privacy”, 2016)

It’s interesting to look at is there a video is shared on Twitter, which shows the online privacy secret that some big companies didn’t tell you. The video come up with creepy and strong music, the text put you in a serious atmosphere; engaging and warning people protect their online privacy.

       ( 2010)

At the end, the positions and insights from different people all strongly proved the wealth of suggestions and experience through social media. It can help us get a deeper understanding of the seriousness of the issues, as well as provide more viable solutions. For future exploration and my design project, I would like using this data -scarping  technique to generate a range of privacy data flow and make them visually express the seriousness of online privacy.

5 point summary:

  • Twitter Advanced Search help people easily gather information and research on social media.
  • People has stand out to against companies use their personal information without their concern.
  • More effective solutions/suggestions surrounding online privacy can be found out with web-scraping technique
  • Concerns about privacy and security are discouraging people from posting to social networks

  • A commercial website need post a privacy policy if it collects personally identifiable info


Reference 2010, Online Privacy Secrets EXPOSED Commercial – What Google Isn’t Telling Us, video recording, YouTube, viewed 3 September 2016,<>.










Post 5: An interview and issue probe on online privacy

Written by Jiahui Li (nancy)

In this blog I have introduced my semi structured interview which help me further understand more about online privacy, as well as collected more personal experience around online privacy. Here the summary of the Interview:

1. How much you know about online privacy?

First I will first think my personal information. Actually I’m not sure the definition of online privacy, the thing I know is all about we need protect our privacy online. For example, If I use apps without checking their privacy settings or the settings on my device, then I might be say-bye to my personal information. And also online privacy risk exist in our life everywhere; we lost our personal data in different ways: when you sign in a new website, sign in a new social account, using booking system, applying job….

2. Do you usually using privacy setting for your mobile? why?

Yes, I do. I think I’m the person really don’t like talk with strangers. I remember once I was using a chat app to chat with my friend, I didn’t turn off the location; then I got a lot people from nearby to add me friends and talk to me which is very annoying. So I always check the privacy setting when I sign in with new webs/apps. Furthermore, privacy setting can help me hide the information I don’t want to show, and most of people can’t find it.

3. Are you always read Terms and Conditions before you sign online? Any suggestion to improve?

No, definitely not. I haven’t meet the person really serious about Terms and Conditions in my life. I only read them briefly when I sign something really important, such as bank, paypal…They are too long and all looks same. For example, the new Terms and Conditions for Apple ID achieved 49 pages, that not possible to read them in full. In terms of suggestions, I was thinking use visual graphic, but it hard too communicate the content.

4. What do you think all your drives connect together with could (iphone/ipad/mac/…)?

I have iPhone,ipad and mac at home, all my drives are connect together. I don’t think there something wrong with the connection. If I lost the information from one of this drive or someone stolen my phone, I can get them back. I know my information will easily exposed, but I still think it’s will bring me benefits more than harm.

5. Are you usually provide your real information when you sign in on website/store? Why?

Yes, I am. But still depend on what kind of website/store. If the website I only use for once, I will sign in with fake information (most of them need verify your email address which I have no choice). But I usually put the wrong phone number for all my sign in. For me, email address, gender, age not that important, but phone number is the most important personal information.

TAKE HOME TASK (PROBE) : After the Interview, I have handed out to my interviewee a take home task specific to “ How many junk email/promotion email you have received in one week?” 

Though the pervious stakeholder maps of online/data privacy can be identified the relationship between general users, government and business/companies. Government and Companies on the positive side share values, and users don’t want their information expose in public.  Although government and companies undertake to protect user’s privacy, they still stick their personal information without causing the user’s suspect which can be used as their own advertising.


The screenshot above came from the issue probe completed by my interviewee which recorded “How many junk email/promotion email you have received in one week?” In the screen shot shows she got 27 promotion emails from different stores/companies include bank and school in one week.  As she said, sometimes the amount of the email far beyond these numbers. The companies collect your information when you sign in, analysis your need; they know what you may interesting in and send thousands of email no matter your feeling. Their behaviour made most users feel disturbing. Though they never stop to contact with you, these promotion emails from different companies did not cause our attention, so most of them are unread. Therefore, a descendant trend of government/companies reliability has been pointed out by most of online users.

Five point summary:

  1. Most promotion emails from government and companies has disturbed user’s life.
  2. The similarity and complexity lead to people give up with Terms and Conditions.
  3. Acute dependence has existed in the connection between different drives.
  4. User’s vague understanding causes privacy disclosure.
  5. An interview/ primary research can help us open mind and further understand more about online privacy

Post 3: Online privacy stakeholder mapping

Written by Jiahui Li (nancy)

Screen Shot 2016-08-28 at 8.36.31 PM
(group 28 2016)
(group 28 2016)


These are the stakeholder maps we develop in our group. In terms of the mindmap section, we still working on online privacy and data security issue, the maps help us clean up all the possible stakeholders we can look at in the next few stages, as well as the value share between some of the stakeholders.

  • For users (no matter public or private) they have the same position feel scared and against hackers
  • For some technology companies and the government they are one the same boat for business and management
  • Users and Government/Business are opposite; they don’t want share their personal information


  1. The Search Giant

    (Fisher 2011) “The Search Giant”

    This illustration is called The Search Giant. Julie Fisher came out this illustration that information can be tracked and people can be found through the internet. When you look at the image, it makes you feel creepy and paranoid, as well as present the idea and connecting the man to being followed on the internet. The idea of the spider comes from the ideas of internet, which already very popular in everyone’s life.

    On the other hand, you can become stuck in the world wide web, the predatory nature of some giant corporations, can be perceived as an ominous presence, the fact that they are useful but potentially dangerous as a spider in the center of a web knows exactly where the ‘flies’ are – alluding to a notion of being tracked and finally spiders don’t blink and have many eyes in which the word google is reflected.

    The image reflected the serious problem on how information online are easily accessible and controllable involved personal and business. In my pervious research, I have shown few articles that can confirm online privacy and data security already too common to exist in current society.


2.Lies, damned lies, and statistics.

(Levin 2016)

“Lies, damned lies, and statistics.” — Mark Twain

Why you should lie as much as possible on your Facebook profile? We all know the purpose is prevent the identity thief online. This image is created by Vincent Mahé and used in Adam Levin’s article “ Scared of identity theft? Tell lies on Facebook.”

In this image, the man is Selfie at home with the family plant, cool drink and the naked upper body. He is trying to show others he was enjoying his holiday outside, obviously he lied.

Had Facebook existed then, people’s rights (ie. identity privacy information) have been violated. So people like to puff up their egos on social-networking sites to protect their own information, they believe this is the most expedient way.  People lie on Facebook to not only make themselves look good, but to feel better about themselves. A 2014 study found that a fifth of young Facebook users admitted to lying on the site about things such as relationship status and job promotions.

This is a powerful data to explain how people feel with online privacy.

3. Eyephone

(Fisher 2011) “Eyephone”

This illustration is from the same illustrator I had before – Julie Fisher. She looked into the issues surrounding the development of new technologies and their effects on social life and generation divides. This piece called “EyePhone”, which be named with the homophonic word of “iphone”.

The inspiration of this illustration is come from the radio news. The radio has told “Iphones+Ipad’s that track your location and updates when synced to a computer.”

Besides, she has done some research and the basic problem is if someone steals your mobile they could find out exactly where you have been using a simple computer program. This will put you in danger such as stalking, blackmail and jealous spouses following you. As you can feel the technology and current situation are a bit fearful which is shown through the graphics (ie. arrow, eyes in mobile, colour and hands) out the places where the man has walked.

I’ve watched a video before which is shown “how wifi tracking a smartphone can be used by retailers to covertly learn about their visitors,” but this illustration looks more effective.

4. lPRISM surveillance

Digital privacy, Internet Surveillance and The PRISM - Enemies of the Internet
(Kumar 2013)

Digital privacy, Internet surveillance and the prism-enemies of the Internet are presented in this image.  In this image the man is afraid of all the technology devices he own. He try to close the door to avoid internet surveillance. These huge eyes are staring at his life and his actions. Online surveillance is a growing danger for journalists, bloggers, citizen-journalists and human rights defenders.

On the other hand, the text in the images: “ you can trust government” made the man more afraid. In the article, which the image belong to has pointed out that lPRISM surveillance scandal has consumed the Internet as the implications of massive scale U.S.

The most serious situation is the NSA got direct access Google, Facebook, Apple, Yahoo and Microsoft servers which allowed it to harvest internet usage details of millions of unsuspecting American citizens. All public knows about it, and they are outraged like what shows in the image.

5. Delete cookies?

(Abu 2015)

Same with the image, many people think if they clear their cookies and browsing history and delete their history will protect their identification data, however there are still have many technologies that allow companies to identify you even after doing that.

Some big companies are dedicated to collect as much data as possible on users which they later sell. Even the information you think not important to you, they will collected to analysis your other personal information.

On the other hand, I also mentioned in my research before, many companies are losing credibility which caused by their own attitude for online privacy.

Therefore,tracking is all over the place and very hard to stay far away.

6. The cloud

(Fisher 2011) “The cloud”


The image “The Cloud” has communicated the idea behind is showing a potential conflict in power and privacy. Perhaps it is easier for him to connect to his work than his children. In this image a man is on holiday in north east England with his children, but he is caught up in the cloud and his work in London which takes a greater precedence in his life.

As soon as he is on the internet, no matter his location, he’s location is at his office. Different with before, in this piece, if his location been tracking, will help him hide his current location and left more time with his family.

That’s what technology do sometimes with good effect.

7. Ads with Eyes

(Fisher 2011) “Ads with Eyes”

This illustration is called “Ads with Eyes”. The illustrator has been reading about computers that can scan your face when you walk into a building or shopping centre and analyze your information such as your age, your mood and then (although this is in development) deduce what kind of advert would be best suited to your tastes and thus be more effective as a campaign. As you can see, the tech is trying to analysis the man: he is herather harried, stressed and the camera suggested him to the coffee shop. This is similar with one of the video I have watched on vimeo is shown “how wifi tracking a smartphone can be used by retailers to covertly learn about their visitors,” when you shopping in the shopping centre, they know where you have been.

8. a new balancing of privacy

(Liu 2016)


The image is created by Thomas Leuthard, it been published in the article The Wearable Revolution: Drawing the Line Between Exciting New Tech and Privacy. The huge face are watching peoples action and where are they going.

The author of the article aims to find the great deal of discourse about balancing tech revolutions and personal rights and boundaries. According to that, the perspectives are listed on three different sections: 

  • Start with the issue of Google Glass and similar wearables has raised serious privacy concerns among consumers and business owners.
  • Introduced eyewear cameras.
  • Balancing innovation and invasion: Wherever people land on issues about privacy, it is exciting to be surrounded by so many innovative devices and watch how they are transforming the world.

We cant live without technology. The idea of wearable technology is represented a new balancing of privacy issue and new tech.

9. The things you revealing online is much more than you think

(Ha 2015)

This illustration shows the meaning of “The things you revealing online is much more than you think.” The inspiration of the image is from a TED video talk. When you working online, how little you know? and how much others know.

Also they have discussed what the web knows about you, and what we can do about the things we’d rather it forgot. If go back to my pervious blog post, I have discussed people’s attitude on online privacy. Business and people not pay attention to data protection led to Privacy disclosure: correct business operations and data protection method.

10. Clues in the Cloud

(Clues in the Cloud 2015)

This artwork is from “Clues in the Cloud” — a multi-media art piece that combines visual illustrations, audio recordings and poetic prose. They have seven sections to explores a different aspect of privacy in the digital age.  It has stated that the benefits of technology are not always clear, so the studio use illustrations to explain “what is privacy and how does it affect our lives?”

In this image, a female nude is exposed public with a huge number of eyes as the background. When we are texting all the powers that may be are surveilling our action at day and night.

Because of most of people cannot stop data surveillance, the girl in the image is praying privacy could be here to stay.


Abu, L. 2015, Stands’ Stand on Privacy, Stands, viewed 28 August 2016, <>

Clues in the Cloud, 2015, viewed 21 August 2016, <>

Fisher, J. 2011, Exploring the way technology in the UK is changing social interaction, Bechance, viewed 28 August 2016, <>

Ha, TH. 2014, What are you revealing online? Much more than you think, viewed 20 August 2016, <>

Kumar, M. 2013, Digital privacy, Internet surveillance and the prism-enemies of the Internet, The Hacker News, viewed 20 August 2016, <>

Levin, A. 2016, Scared of identity theft? Tell lies on Facebook, wired, viewed 20 August 2016, <>

Liu, Z. 2016, The Wearable Revolution: Drawing the Line Between Exciting New Tech and Privacy, wired, viewed 28 August 2016, <>

Post 4: Online privacy – how personal information is easily accessible online

Look through online privacy issue; this blog has explored a project designed for online anonymity. Online anonymity can prevent somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Parache and Robert Diel created an experimental installation – “the stranger” at Digital Kitchen studio in Chicago, for the purpose of explaining to people how personal information is easily accessible online; live public information that’s freely available on the web pours forth from this creepy digital entity (Holmes 2013).

On the one hand, The Stranger is a self-initiated interactive art installation creating a dialogue between the user and a digital avatar. On the other’s it is an immersive single user experience, challenging the user to step closer as the Stranger avatar stares at him and projects information related to the name entered into the web app.

The video shown below creates a dialogue between the user and a digital avatar, the user speaks to the installation and the installation speaks back using visuals, sounds and live social personal information (Maxence 2013). When you move forward, a giant face will more clearly. And then enter your name and keywords on a smartphone/tablet, the experience becomes centered on the user privacy.

(Maxence 2013)

When you stand with a distance, the user was surrounded by a swarm of whispers; the designers created a constantly gossiping nature of today’s online communication.

As the user gets closer, the whispers gradually disappear and the sound becomes more intense. The giant digital face staring at the user while it emerges from the dark and an increasing amount of live, publicly available personal information from Twitter and Facebook is revealed to the audience (Maxence 2013).

(MaxencePar 2013) Stranger system

I’m really interested in this interactive social experiment, the designer used a different way to remind people or explain to people the seriousness of online privacy. I believe firsthand experience will be more directly to enhance the user’s attention, it influence is far better than written expression and visual images.



Holmes, K. 2013, ‘Furious Butler quits as governor’, The Creators Project, 11 January, viewed 19 August 2016, <>

Maxence 2013, The Stranger Installation, Vimeo, viewed 19 August 2016, <>

MaxencePar. 2013, Stranger_system, viewed 19 August 2016, <>

Post 2 :Building your expertise using scholarly secondary sources – online privacy

Written by Jiahui Li (nancy)

Based on the previous research study, I further invested how authors are positioning the issue around online privacy in commercial marketplace/application. There are two journal articles I have read presented the positions of a new application/commercial marketplace need fit to ecommerce development and user privacy both sides.

The first article is “Understanding and capturing people’s privacy policies in a mobile social networking application” written by Sadeh, Hong, Cranor, Fette, Kelley, Prabaker and Rao. In terms of the online word development, a number of mobile applications have emerged. However, people have expressed concerns about the privacy implications associated with this class of software. Therefore, authors recorded the result of their survey at Carnegie Mellon University in the context of PEOPLE FINDER, an application that enables cell phone and laptop users to selectively share their locations with others. Their purpose is to better understand people’s attitudes and behaviors towards privacy as they interact with such an application and to explore technologies that empower users to more effectively and efficiently specify their privacy preferences (Sadeh et al. 2008). It’s not a professional body, but it’s trustworthy through the result of the survey.

Screen Shot 2016-08-14 at 10.17.43 PM
people finder application (Sadeh et al. 2008)

As the result of the survey, they have pointed out that systems should help people stay in their comfort zones while also helping them evolve their policies over time. I agree with the authors, over the past few years, until today, online mobile applications has become an indispensable part of our life. A new application need fit both sides.

The book “Privacy and the Commercial Use of Personal Information” written by Rubin and Lenard. In current society, unfettered access to user’s personal information happened in most online commercial development, users right to privacy had been violated. In this book, authors try to prove to government that make online privacy are the right choices. Market failure in this context would mean that consumers preferences concerning the amount and use of their information are not being accurately transmitted and responded to in the marketplace (Rubin 2002). After careful examination of the literature, they find no evidence of market failure or of harm to consumers from “too much” advertising and marketing information being produced. When business use information in ways that user do not like, users quickly learn about it, and the firms are forced to stop. The book involved lot examples to explain why online marketplace failure at the present stage. I agree with the authors, we need draw a line that can balance the relationship between online commercial and user privacy, the issue of online user privacy can’t be ignored.



Rubin, P.H. & Lenard, T.M. 2002, Privacy and the Commercial Use of Personal Information, Springer Science & Business Media, U.S

Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M. & Rao, J. 2008, ‘Understanding and capturing people’s privacy policies in a mobile social networking application’, Carnegie Mellon University Research, viewed on 3 August 2016, Personal and Ubiquitous Computing, 13(6), pp.401-412

Post 1: How much do you know about online privacy?

Image source: ThinkStock, viewed 29 July 2016

I have researched on data security and online privacy issue, which happens all around the world. There few articles shared different positions from different authors.


On privacy and cyber-security, plan today or fail tomorrow?

James Moore was previously served as Canada’s minister of industry, which included responsibility for Canada’s digital policy, as well as Canada’s privacy and copyright law. The article “Opinion: On privacy and cyber-security, plan today or fail tomorrow” that he wrote for Canadian Business is used to reminding business pay attention to data security.

The article is opinion based. James has pointed out that business should pay much attention of prevent countless data breaches and online privacy crises that happen in most Canadian business, especially for those business who have not yet thought through all of these issues in an increasingly litigious business environment and the perilous online world, it should be planned early it happens (Moore 2016). The story has become all too common for businesses today. So I agree with the author’s opinion, plan before it happens.

On the other hand, communications and engagement, business operations and data protection, which are key indicators of the ability of businesses to reduce the risk of a data breach action. Good communication and customers are keenly engaged in that can help the customers protecting their self-interest. Otherwise, correct business operations and data protection method will enable business to stand out in the perilous online world.



 How much do you know on mobile online games?

Thomson Reuters ZAWYA has published an article – “TRA issues warning against mobile online games that request the geographical location of users”. With the increase in cybercrime, they have the responsibility to open valuable information and make more people aware of the serious problem. UAE Telecommunications Regulatory Authority (TRA) has been pointed out at the beginning of the article to confirm the reliability of the information source (ZAWYA 2016).

With more and more online games requirements for location information, the privacy of users is invaded. They are allowing criminal elements like hackers to spy on them and know when they are in isolated places–giving them the opportunity to rob them of their possessions or cause further harm. So TRA called on all smart mobile and device users and warned them about playing online electronic games that request for their geographical locations, which could be used against them for criminal activities (ZAWYA 2016). The harm that online game brings to people’s privacy exists on our side; it’s factual. So I agree with the author. Different with other author’s, ZAWYA found the problem from daily life and called people apply in real action.



Why our public lives need privacy protections?

Brigid Delaney is the author of the novel Wild Things. She wrote the article “Why our public lives need privacy protections” for State High Court and it’s worked hard to call for privacy law reform. Different from the previous articles, Delaney mentioned some famous people’s personal experience that will make the information more trustworthy and article more persuasive.

Privacy advocates are grappling with many things at the moment,we are aware, but seem largely unconcerned. A cause of action for serious invasion of privacy does not presently exist in Australian law.

The article is opinion based with well researched, Australian Law Reform Commission and New South Wales parliamentary committee have recommended the state “lead the way” in creating a new legal action for invasions of privacy (Delaney 2016). Same with other authors, Delaney is here joined Kirby to call for privacy law reform. I also agree with the author. We have to say we need this public part of the Internet to get jobs, keep in touch with our friends, market the goods and other things, but there still very necessary for us to live safe online.

On the other hand, we know the law hasn’t kept pace with technology; the increase in social media is creating a dangerous environment for privacy and has brought the harm for people’s life,which can not be ignored. Therefore, there still have bunch of worth information we haven’t know enough, we need to investigate more and protect ourselves in online word.­



How your personal information is at risk?

James Law has published an article “Data leaks: How your personal information is at risk”. In today’s world, the personal data you entrust to companies is at greater risk than you realize and also for business. James has published this article as a wake-up call for Australian and Australia’s corporates. The chief technology officer of information security company Clearswift – Dr. Bunker have stated many Australian companies are not taken seriously about the protection of network attacks and data holes (Law 2014).

In the same way, James has been published the relevant article to emphasize how creepy when your Google map data been stolen. They know where you live; they know everything about you and more worrying results.

The article is opinion based and it’s telling the truth through different examples from different companies. Therefore I agree with the author that companies’ reputations need be protected with the powerful systems, such as data-loss prevention systems, which allow sensitive data to be removed before the information leaves the organization.

On the other hand, companies should further investigate more about “how systems can be checked out to make sure the processes around them is secure and protected; how customers can equally aware of the risks and how to avoid a malicious insider in your companies”, which will help companies far away greater.



Never read the terms and conditions?

Ansgar Koene is a Senior Research Fellow with the CaSMa project. He has published the article: “Never read the terms and conditions? Here’s an idea that might protect your online privacy” to give people advice about how might we protect our online data privacy. Ansgar has been working on the similar topic to research data and people’s interest in online word, so his article becomes more credible.

According to UK’s Citizens Advice reports, Ansgar has provided a trustworthy data, which shows only around 1% people really do read the long pages terms and conditions in full before signing up to a website. Because of so many people don’t fully read terms and conditions, they may not be aware how much control the service provider is asserting over their content.

Therefore, Ansgar’s research came up with “Kitemark idea” concept to protect your data, without having to wade through those documents. A House of Lords committee recently recommended introducing a “kite mark” to identify websites that meet EU standards for handling and processing personal data (Koene 2016). They argued that this would provide a visual symbol for consumers to know that they weren’t signing up to anything they objected to (Koene 2016). The article is opinion based and it still need be considered.

In the same way, Ansgar has been considered the stumbling block of the kitemark concept; come from the reality that online services are dominated by US companies that look at the business on a global scale, with hundreds of millions of customers. So I agree with the author. Although kitemark” idea is an innovative concept, it’s still hard to bring into effect at international level at this moment.

Overviewed all the articles, there are three positions I want further to investigate. They are :Business not pay attention to data protection led to Privacy disclosure; Illegal online games bring benefit  for hackers and Most companies don’t havesafeguards for company’s data protection. These are too close to people’s life, we need design feasible plans to apply in real action. 


Written by Jiahui Li (nancy)


Delaney, B., 2016, ‘Why our public lives need privacy protections’, Saturday paper post, 14 May, viewed 30 July 2016, < >

Law, J., 2014, ‘ Data leaks: You’re your personal information is at risk’, post, 1 October, viewed 29 July 2016, <>

Koene, A., 2016, ‘ Never read terms and conditions? Here’s an idea that might protect your online privacy’, The conversation post, 15 July, viewed 29 July 2016<>

Moore, J., 2016, ‘Opinion: On privacy and cyber-security, plan today or fail tomorrow’, Vancouver Sun post, 7 July, viewed 30 July 2016, <>

ZAWYA, 2016, ‘TRA issues warning against mobile online games that requests geographical location of users’, ZAWYA post, 16 July, viewed 30 July 2016, <>