Recorded Business Meetings and AI Algorithmic Tools: Negotiating Privacy Concerns, Psychological Safety, and Control

2021 ◽  
pp. 232948842110370
Author(s):  
Peter W. Cardon ◽  
Haibing Ma ◽  
Carolin Fleischmann

Artificial intelligence (AI) algorithmic tools that analyze and evaluate recorded meeting data may provide many new opportunities for employees, teams, and organizations. Yet, these new and emerging AI tools raise a variety of issues related to privacy, psychological safety, and control. Based on in-depth interviews with 50 American, Chinese, and German employees, this research identified five key tensions related to algorithmic analysis of recorded meetings: employee control of data versus management control of data, privacy versus transparency, reduced psychological safety versus enhanced psychological safety, learning versus evaluation, and trust in AI versus trust in people. More broadly, these tensions reflect two dimensions to inform organizational policymaking and guidelines: safety versus risk and employee control versus management control. Based on a quadrant configuration of these dimensions, we propose the following approaches to managing algorithmic applications to recording meeting data: the surveillance, benevolent control, meritocratic, and social contract approaches. We suggest the social contract approach facilitates the most robust dialog about the application of algorithmic tools to recorded meeting data, potentially leading to higher employee control and sense of safety.

Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2020 ◽  
Author(s):  
Reham AlTamime ◽  
Vincent Marmion ◽  
Wendy Hall

BACKGROUND Mobile apps and IoT-enabled smartphones technologies facilitate collecting, sharing, and inferring from a vast amount of data about individuals’ location, health conditions, mobility status, and other factors. The use of such technology highlights the importance of understanding individuals’ privacy concerns to design applications that integrate their privacy expectations and requirements. OBJECTIVE This paper explores, assesses, and predicts individuals’ privacy concerns in relation to collecting and disclosing data on mobile health apps. METHODS We designed a questionnaire to identify participants’ privacy concerns pertaining to a set of 432 mobile apps’ data collection and sharing scenarios. Participants were presented with 27 scenarios that varied across three categorical factors: (1) type of data collected (e.g. health, demographic, behavioral, and location); (2) data sharing (e.g., whether it is shared, and for what purpose); and, (3) retention rate (e.g., forever, until the purpose is satisfied, unspecified, week, or year). RESULTS Our findings show that type of data, data sharing, and retention rate are all factors that affect individuals’ privacy concerns. However, specific factors such as collecting and disclosing health data to a third-party tracker play a larger role than other factors in triggering privacy concerns. CONCLUSIONS Our findings suggest that it is possible to predict privacy concerns based on these three factors. We propose design approaches that can improve users’ awareness and control of their data on mobile applications


Author(s):  
Enrico Di Minin ◽  
Christoph Fink ◽  
Anna Hausmann ◽  
Jens Kremer ◽  
Ritwik Kulkarni

2021 ◽  
Vol 21 (1) ◽  
pp. 1-32
Author(s):  
Vikram Mehta ◽  
Daniel Gooch ◽  
Arosha Bandara ◽  
Blaine Price ◽  
Bashar Nuseibeh

The emergence of ubiquitous computing (UbiComp) environments has increased the risk of undesired access to individuals’ physical space or their information, anytime and anywhere, raising potentially serious privacy concerns. Individuals lack awareness and control of the vulnerabilities in everyday contexts and need support and care in regulating disclosures to their physical and digital selves. Existing GUI-based solutions, however, often feel physically interruptive, socially disruptive, time-consuming and cumbersome. To address such challenges, we investigate the user interaction experience and discuss the need for more tangible and embodied interactions for effective and seamless natural privacy management in everyday UbiComp settings. We propose the Privacy Care interaction framework, which is rooted in the literature of privacy management and tangible computing. Keeping users at the center, Awareness and Control are established as the core parts of our framework. This is supported with three interrelated interaction tenets: Direct, Ready-to-Hand, and Contextual . Direct refers to intuitiveness through metaphor usage. Ready-to-Hand supports granularity, non-intrusiveness, and ad hoc management, through periphery-to-center style attention transitions. Contextual supports customization through modularity and configurability. Together, they aim to provide experience of an embodied privacy care with varied interactions that are calming and yet actively empowering. The framework provides designers of such care with a basis to refer to, to generate effective tangible tools for privacy management in everyday settings. Through five semi-structured focus groups, we explore the privacy challenges faced by a sample set of 15 older adults (aged 60+) across their cyber-physical-social spaces. The results show conformity to our framework, demonstrating the relevance of the facets of the framework to the design of privacy management tools in everyday UbiComp contexts.


2014 ◽  
Vol 12 (1) ◽  
pp. 77-79 ◽  
Author(s):  
David Eckhoff ◽  
Christoph Sommer

Author(s):  
Natã M. Barbosa ◽  
Gang Wang ◽  
Blase Ur ◽  
Yang Wang

To enable targeted ads, companies profile Internet users, automatically inferring potential interests and demographics. While current profiling centers on users' web browsing data, smartphones and other devices with rich sensing capabilities portend profiling techniques that draw on methods from ubiquitous computing. Unfortunately, even existing profiling and ad-targeting practices remain opaque to users, engendering distrust, resignation, and privacy concerns. We hypothesized that making profiling visible at the time and place it occurs might help users better understand and engage with automatically constructed profiles. To this end, we built a technology probe that surfaces the incremental construction of user profiles from both web browsing and activities in the physical world. The probe explores transparency and control of profile construction in real time. We conducted a two-week field deployment of this probe with 25 participants. We found that increasing the visibility of profiling helped participants anticipate how certain actions can trigger specific ads. Participants' desired engagement with their profile differed in part based on their overall attitudes toward ads. Furthermore, participants expected algorithms would automatically determine when an inference was inaccurate, no longer relevant, or off-limits. Current techniques typically do not do this. Overall, our findings suggest that leveraging opportunistic moments within pervasive computing to engage users with their own inferred profiles can create more trustworthy and positive experiences with targeted ads.


Author(s):  
Kai Wang ◽  
Xinping Yan ◽  
Yupeng Yuan

Nowadays, with the higher voice of ship energy saving and emission reduction, the research on energy efficiency management is particularly necessary. Energy efficiency management and control of ships is an effective way to improve the ship energy efficiency. In this paper, according to the new clean propulsion system configurations of 5000 tons of bulk carrier, the energy efficiency management control strategy of the clean propulsion system is designed based on the model of advanced brushless doubly-fed shaft generator, propulsion system using LNG/diesel dual fuel engine and energy consumption of the main engine for reducing energy consumption. The simulation model of the entire propulsion system and the designed control strategy were designed. The influence of the engine speed on the ship energy efficiency was analyzed, and the feasibility of the energy efficiency management control strategies was verified by simulation using Matlab/Simulink. The results show that the designed strategies can ensure the power requirement of the whole ship under different conditions and improve the ship energy efficiency and reduce CO2 emissions.


2012 ◽  
Vol 193-194 ◽  
pp. 1257-1260
Author(s):  
Min Zhang

Various challenges should be considered in the development of an effective model for the planning and control of high-rise building construction. These challenges have been identified as results of the construction process. This paper discusses the engineering planning and management control in high-rise building construction. The methodology should also be able to address the concerns and considerations regularly faced in the industry and thus providing flexible modeling, which can be used by different levels of management


Author(s):  
H.R. Ganesh ◽  
P. S. Aithal ◽  
P. Kirubadevi

The concept of minimum display quantity (MDQ) is unavoidable in brick-and-mortar retailing format owing to which, retailers need to ensure a minimum level of inventory displayed at each store irrespective of the revenue or inventory turns generated by a particular store. It is observed that majority of bricks-and-mortar retailers in India assume;(a) existing inventory management system is ideal to their store, (b) software solutions record accurate inventory movement, (c) involving store management team in inventory related decision making is risky/biased and most importantly (d) loss of sale due to stockouts is inevitable. Such assumptions and widely followed practice have created a predisposition and mindset in store managers and they believe that their store delivers revenue and profit to the best of its potential with the inventory which is made available to them through existing inventory management system and we cannot avoid a number of instances consumers are unsatisfied due to stockout situations. In this research, we have analysed the existing decision-making process and control systems related to inventory management of a select retailer, attempted to design a new framework and applied the same through an experiment to evaluate the change in (a) overall store profitability and (b) inventory related key performance indicators.


Sign in / Sign up

Export Citation Format

Share Document