personas.mdwn 4.64 KB
Newer Older
sajolida's avatar
sajolida committed
1
2
[[!meta title="Personas"]]

127.0.0.1's avatar
127.0.0.1 committed
3
4
5
6
7
8
[[!toc levels=3]]

# Big picture

This is about [[!tails_ticket 11162]].

sajolida's avatar
sajolida committed
9
10
11
12
# External resources about personas

  - [Gus Andrew's User Personas for Privacy and Security](https://medium.com/@gusandrews/user-personas-for-privacy-and-security-a8b35ae5a63b#.8lyxpkom4)
  - [Personas on usability.gov](http://www.usability.gov/how-to-and-tools/methods/personas.html)
13
14
15
  - [AccessNow's A First Look at Digital Security](https://www.accessnow.org/a-first-look-at-digital-security/)
    is formatted a bit like personas.
  - [Developing Personas from the Internet Freedom Needfinding Framework](http://internetfreedom.secondmuse.com/framework-elements/developing-personas/)
16

sajolida's avatar
sajolida committed
17
18
# Data sources

sajolida's avatar
sajolida committed
19
- [*Rick Wash & Emilee Rader*, Too Much Knowledge? Security Beliefs and
sajolida's avatar
sajolida committed
20
  Protective Behaviors Among United States Internet
sajolida's avatar
sajolida committed
21
  Users](http://www.rickwash.com/papers/security-survey.pdf): studies a
sajolida's avatar
sajolida committed
22
23
24
25
  large representative sample of United States Internet users about
  different causal beliefs related to computer security, and about the
  actions they regularly undertake to protect their computers.

sajolida's avatar
sajolida committed
26
27
28
29
30
- [*Javier Garza Ramos*, Journalist Security in the Digital
  World](http://www.cima.ned.org/wp-content/uploads/2016/03/CIMA-Journalist-Digital-Tools-03-01-15.pdf)
  is a survey of 154 journalists worldwide on their digital security
  practices.

sajolida's avatar
sajolida committed
31
32
33
34
35
36
- [Jennifer R. Henrichsen](https://www.asc.upenn.edu/people/jennifer-r-henrichsen) is
  doing a research with journalists and digital security trainers to
  shed light on journalists' perceptions toward digital security
  technologies, including motivations to adopt and barriers to adoption.
  In March 2017, the results of her research were not published yet.

sajolida's avatar
sajolida committed
37
38
39
40
41
- [EFF: Privacy By Practice, Not Just By Policy: A System Administrator
  Advocating for Student Privacy](https://www.eff.org/deeplinks/2017/03/privacy-practice-not-just-policy-system-administrator-advocating-student-privacy)
  is an interesting story about the use of Chromebooks in schools and
  the internal resistance about its threat to privacy.

42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
# User scenarios

From a discussion in August 2016:

- A small group of English-speaking journalists use Tails to analyse an
  archive of leaked documents and prepare articles about them.

- A well-established music teacher uses Tails to bypass the software and
  network limitations on his professional laptop.

- Someone living in a controlled housing uses Tails to avoid having all
  his Internet browsing monitored by the staff.

- A political scientist in Egypt uses Tails to send his findings to
  Germany while avoiding State surveillance.

- A woman who lives with someone abusing her uses Tails to communicate
  stealthily and without living traces on the home computer.

- A political activist uses Tails to coordinate with their affinity
  group and organize a demonstration.

- A person suffering from cancer uses Tails to learn about their disease
  while avoiding their employer learning about their condition.

- A group of people preparing a plea for defending activists in court
  uses Tails to prepare the plea and store the documents in a safe
  place.

- A free software contributor uses Tails to translate the security tools
  used by their community into Bahasa Indonesia.

- A whistle-blower uses Tails to store and edit to-be-leaked documents
  securely.

- A lawyer uses Tails to communicate with their client in a secure and
  anonymous fashion.

- A Tails developer uses Tails to develop Tails and understand better
  the struggling of users.

- A university student uses Tails to publish publicly-funded but
  copyrighted scientific papers online.

- Union workers use Tails to coordinate about labor struggle over their
  company's network.

- A Russian tourist uses Tails to access their online bank account
  without getting their credential stolen.

- A nomadic person with no personal laptop uses Tails to carry the same
  computing environment and personal documents around.

- A abuse contact uses Tails in order to communicate with survivors
  contacting them.

- A person without their own Internet access uses Tails to use an
  uncensored Internet.

- A teenager uses Tails to escape parental control filter.

- A group of people use Tails to write a book together and publish it.

- A scientist uses Tails to report and transcribe interviews while
  preserving the personal identifying information of the interviewees.

- Webmasters of a cop-watching website use Tails to reduce their chance
  of being caught while reporting on police violence.

- A photographer uses Tails to store and work on pictures before
  publication.

- A person without the need for a big storage uses Tails as their main
  operating system to have more privacy.