VIDEO

The development of user-centered designs for privacy technology


Published: 16 Aug. 2019

Carnegie Mellon University Bosch Distinguished Professor in Security and Privacy Technologies Lorrie Cranor, CIPT, talks about the development of user-centered designs for privacy technology. Cranor said when privacy tools are developed, the user-side of the equation is often forgotten. In order to improve the tools, Cranor said developers should conduct studies with users to see what users are looking for and which features they gravitate toward in their prototypes. Watch theĀ full video on YouTube.

The development of user-centered designs for privacy technology

View upcoming IAPP LinkedIn Live events
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Lorrie Cranor

CIPT

FORE Systems University Professor of CS and of Engineering & Public Policy

Carnegie Mellon University


Tags:

Personal impactsPrivacy engineeringTechnologyPrivacy
VIDEO

The development of user-centered designs for privacy technology

Published: 16 Aug. 2019


Contributors:

Lorrie Cranor

CIPT

FORE Systems University Professor of CS and of Engineering & Public Policy

Carnegie Mellon University


Carnegie Mellon University Bosch Distinguished Professor in Security and Privacy Technologies Lorrie Cranor, CIPT, talks about the development of user-centered designs for privacy technology. Cranor said when privacy tools are developed, the user-side of the equation is often forgotten. In order to improve the tools, Cranor said developers should conduct studies with users to see what users are looking for and which features they gravitate toward in their prototypes. Watch theĀ full video on YouTube.

The development of user-centered designs for privacy technology

View upcoming IAPP LinkedIn Live events
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Personal impactsPrivacy engineeringTechnologyPrivacy

Related resources