SlideShare uma empresa Scribd logo
1 de 18
Privacy attitudes, incentives and behaviours Dr Ian Brown Oxford Internet Institute
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy concerns Source: Flash Eurobarometer #225 (2008: 7)
Attitudes  vs.  disclosure Spiekermann, Grossklags and Berendt (2002)
Young people and privacy ,[object Object],[object Object],[object Object],[object Object]
Young adults and privacy ,[object Object],[object Object]
Student information disclosure What kind of personal information do you post online? (first year N=177, final year N=133) Oostveen (2010)
Sampling Facebook Experiences ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Location sharing ,[object Object],[object Object],Abdesslem, Parris & Henderson (2010)
HIV record privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Manzanderani and Brown (2011)
Patient preferences ,[object Object],[object Object],[object Object],[object Object],[object Object],Manzanderani and Brown (2011)
Sharing medical data Source: The Use of Personal Health Information in Medical Research, Medical Research Council, June 2007 pp.54-55
Privacy is contextual ,[object Object],[object Object],[object Object],[object Object],John, Acquisti and Loewenstein (2011)
Homo economicus  vs.  sapiens ,[object Object],[object Object],[object Object],Acquisti (2009)
Market failures in privacy ,[object Object],[object Object],[object Object],[object Object]
Correcting market failure ,[object Object],[object Object],[object Object],[object Object],Romanosky and Acquisti (2009), Brown and Marsden (2008)
Lessons for DP governance ,[object Object],[object Object],[object Object]
References

Mais conteúdo relacionado

Destaque (6)

Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy law
 
Database State
Database StateDatabase State
Database State
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 

Semelhante a Privacy attitudes, incentives and behaviours

EARLY METHODS SECTION1Early Methods Section.docx
EARLY METHODS SECTION1Early Methods Section.docxEARLY METHODS SECTION1Early Methods Section.docx
EARLY METHODS SECTION1Early Methods Section.docx
jacksnathalie
 
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV
 
Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups
la71
 
Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups
la71
 

Semelhante a Privacy attitudes, incentives and behaviours (20)

Research Ethics
Research EthicsResearch Ethics
Research Ethics
 
Research Ethics
Research EthicsResearch Ethics
Research Ethics
 
Frances Ryan DARTS5 presentation
Frances Ryan DARTS5 presentationFrances Ryan DARTS5 presentation
Frances Ryan DARTS5 presentation
 
Personal online reputations: Managing what you can’t control
Personal online reputations: Managing what you can’t controlPersonal online reputations: Managing what you can’t control
Personal online reputations: Managing what you can’t control
 
April Heyward Research Methods Class Session - 7-22-2021
April Heyward Research Methods Class Session - 7-22-2021April Heyward Research Methods Class Session - 7-22-2021
April Heyward Research Methods Class Session - 7-22-2021
 
Are we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media researchAre we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media research
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
Tweens
TweensTweens
Tweens
 
EARLY METHODS SECTION1Early Methods Section.docx
EARLY METHODS SECTION1Early Methods Section.docxEARLY METHODS SECTION1Early Methods Section.docx
EARLY METHODS SECTION1Early Methods Section.docx
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital Health
 
Connecting and protecting
Connecting and protectingConnecting and protecting
Connecting and protecting
 
Tweens
TweensTweens
Tweens
 
EDRD 6000: Ethics when working with LGBTQ+ Youth
EDRD 6000: Ethics when working with LGBTQ+ YouthEDRD 6000: Ethics when working with LGBTQ+ Youth
EDRD 6000: Ethics when working with LGBTQ+ Youth
 
Tailoring information literacy instruction using the information discernment ...
Tailoring information literacy instruction using the information discernment ...Tailoring information literacy instruction using the information discernment ...
Tailoring information literacy instruction using the information discernment ...
 
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
 
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
 
Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups
 
Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups
 
Pol soc 360_01_sp15_research_ethics
Pol soc 360_01_sp15_research_ethicsPol soc 360_01_sp15_research_ethics
Pol soc 360_01_sp15_research_ethics
 
Journal Club_Mixed Method Research_IAPSMCON-2022.pptx
Journal Club_Mixed Method Research_IAPSMCON-2022.pptxJournal Club_Mixed Method Research_IAPSMCON-2022.pptx
Journal Club_Mixed Method Research_IAPSMCON-2022.pptx
 

Mais de blogzilla

Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
blogzilla
 

Mais de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Privacy attitudes, incentives and behaviours

Notas do Editor

  1. Imposes cost of future invasive advertising