YIFANG LI
  • Bio
  • Selected Work
  • CV
  • Contact Me

Private IOS

 PRIVATE-IOS: A DEVICE SHARING PRIVACY PROTECTION TOOL

Year: 2016 | Clemson University | Undergrad Team Members: Brady Bannister, Jason Alexander, Levin Czenkusch | Skill: Heuristic Evaluation, Cognitive Walkthrough, Rapid Prototyping, Usability Testing | Role: PhD Leader

INTRODUCTION

In everyday life, there are often situations encountered in which someone wishes to share a mobile device (such as a smartphone or tablet) with others. For instance, friends may want to watch videos together on one phone, family members may want to borrow each other’s tablets to play games, or drivers may want to hand their phone to a passenger to perform a task while driving. From a security perspective, device sharing can be quite the concern. If a user decides to share his or her device with someone who is not trustworthy, all sorts of issues may arise.

Our PRIVATE-IOS tool focuses on borrowing and broadcasting sharing types. Users can pre-set the privacy for different borrowers’ groups. When lending phone to others, users are able to quickly switch to the corresponding privacy modes, then some content in their phone will be hidden, such as specific application icons, using records, or photos contains some specific persons. After sharing, they can switch to the normal mode. We make the privacy setting procedure easy to understand and learn, and provide the default recommended privacy settings, reducing users’ burden. In addition, the tool provides different levels of privacy based on individual user’s need (for example, hiding the whole app or just hiding the using records). At last, our tool reduces social implications, avoiding the situation that the borrowers may feel the owners do not trust them if they realize they are blocked.
 
The functions include two main parts. The first focus is borrowing. The tool provides some groups with default settings that the users may frequently borrow their devices with, such as partner, friend, colleague, and stranger. Users can change the privacy modes settings, or customize a new group. Some available functions include hiding app or using record, hiding all content containing a certain keyword, hide photos based on face, album, location or time, stopping all notifications, clearing borrowers using records, and installation password required. The second focus is broadcasting that users can stop all notifications, hiding app icons, and preventing app accidental opening.

HCC DESIGN CYCLE REVIEW

Picture

STAGE 1: DEFINE USER NEEDS

Picture
We used two methods to identify users' needs: Previous paper study and heuristic     evaluation. First, we read previous papers about technologies that were studied and found other surveys and test’s that were done and then we proceeded to a heuristic evaluation (using Jacob Nielson's 10 heuristics) on the technologies in those papers as well as the current iPhone Restriction application.
To know more details about the procedure, please download the word doc at the bottom of this page.
Design Requirements
​ 1. Design a usable privacy enhancing tool embedded in iOS mobile operating system
2. Focus on borrowing and broadcasting sharing types
3. Time saving and convenient – Quickly switch to specific modes
4. The setting procedure should be easy to understand and learn
5. Provide the default/recommended privacy settings, reducing burden
6. Provide different levels of privacy based on individual user’s need (hide whole app, just hide record etc.)
7. Reduce social implications


STAGE 2: DESIGN LOW-FIDELITY PROTOTYPE

Picture

Low-fidelity Prototype Screen Samples

Picture

STAGE 3: EVALUATION & REDESIGN ITERATIONS ON LOW-FI

Picture
We did three redesign iterations using Balsamiq.
For the first two versions of low-fi, we used the formative usability inspection method cognitive walkthrough.
For the last version, we did heuristic evaluation again.
Based on the experts' feedback, we made some changes in each iteration. Please download the word doc at the bottom of this page to see details.

STAGE 4: DESIGN HIGH-FIDELITY PROTOTYPE

After fixing all problems in low-fi prototypes, we built a high-fi prototype based on the 3rd version of low-fi, using Just In Mind software.

High-fidelity Prototype Screen Samples

Picture
Picture
Picture

STAGE 5: USABILITY TESTING

In the usability testing, we had 2 iterations on Hi-fi prototype. In per iteration, we recruited 3 participants. They need to finish 6 tasks. We collected quantitative data for each task, including performance data and preference data.
Performance Data Measurements:
  •    Time spend for each task
  •    The number of errors occurred for each task
  •    The successfulness for each task
Preference Data Measurements:
  •    Rate the ease or difficulty of performing this task (1very difficult-5very easy)
  •    Rate the time it took to complete this task (1more time than expected-5less time than expected)
  •    Rate the likelihood that you would use this feature/task (1not likely at all-5very likely)
Post-test Questionnaire:
  • SUS (System Usability Scale)
Picture
Picture
private-ios_final_report_s.docx
File Size: 3437 kb
File Type: docx
Download File

back
Made by Yifang Li. 2019.
  • Bio
  • Selected Work
  • CV
  • Contact Me