SlideShare a Scribd company logo
1 of 74
Social Distortion: Privacy, Consent, and Social Networks H. Brian Holland Visiting Associate Professor of Law Dickinson School of Law at Penn State University
Not talking about covert surveillance Not talking about the government but rather Voluntary disclosure of personal information to private institutions
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Paradox of the Privacy “Market”
We say one thing. I want my privacy. We do something else. Here’s my data.  Take what you want. (just give me my stuff)
Examples
The claim 43% of online users claim  that they are likely to read the privacy policy  of an ecommerce site before buying anything
The reality 26% actually consulted the privacy policy Even more odd, essentially no difference between privacy fundamentalists, pragmatists, or the unconcerned
The claim 71% want to control  who can access their personal information
The reality ~ 75% have supplied first name last name email street address ~ 50% have supplied phone number birthday credit card information (to e-commerce sites)
Why the paradox between professed attitude and actual behavior?
Blame it on the market and the law of the market
Starting point The current market for transferring personal information (1) revelation (mere disclosure) (2) consent – express or implied
Any regulation? some  targeted limits on: extremely invasive collection and use (privacy torts) certain kinds of data (e.g. health records) certain subjects of data (e.g. kids)
But most data can be collected or given away very cheaply. So, why do we consent so easily? 3 points
Lack of legal control over data No property rights in personal data Lack of bargaining power Inability to control downstream rights 1
The decline of consent contracting Contracts as standardized commodities Contracts as part of the product 2
Market distortions (behavioral economics) Incomplete or asymmetric information Bounded rationality Systemic psychological deviations from rationality 3
Creates artificially low prices for personal information consent is cheap
Personal information as a commodity.
Social Network Sites Market distortions on steroids.
A social-tools model of production An effective tool of coordination A plausible promise (the basic “why” to join or contribute) An acceptable bargain with users
But is it a bad bargain for users? Capturing users’ personal information Privacy 1.0 – Centralized data collection, storage and aggregation Privacy 2.0 – Peers as both sensors and producers Owning user’s personal information (storage, use, transfer)
Why consent to a bad bargain? What do users get?
New and powerful market distortions
Two integrated points Social network sites are … (1)  Altering the basic structure of the information exchange agreement (2)  Benefiting from certain social phenomena that are driving us to join the network and to disclose a lot of personal information
The structure of the information-exchange agreement consent recedes into the background First point
The classic e-commerce model Money Personal information associated with delivery of current goods or services and the provision of future goods or services Merchandise Services Database ?? ?? ??
The g-mail model Initial negotiation and transaction (looks like the ecommerce model) A little bit of personal information In exchange for services
The g-mail model Lots of personal information Subsequent negotiations and transactions for the exchange of personal information between contacts
The g-mail model Lots of personal information Lots of personal information Not holding? Not passing on? Ads Gmail recedes into the background, almost as a third-party beneficiary of these subsequent transactions (info exchange) between contacts
The Social Network Site model A little bit of personal information In exchange for services
The Social Network Site model Lots of personal information Lots of personal information A little bit of personal information In exchange for services
The Social Network Site model A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ???
The Social Network Site model A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ??? Database ?? ?? ?? Ads Ads Ads
Certain social phenomena Driving us to join the network and Driving us to disclose a lot of personal information Second point
Social phenomena (a)  The evolution of social organization toward social networks and networked individualism (b)  Online identity performance assertions of digital identity processes of identity formation
Glocalized Relationships Networked Individualism Bounded Groups (a) The evolution of social organization (from little boxes to social networks) neighborhoods households workplaces ??
Networked individualism Relationship unhinged from location Person-to-person connectivity (replacing place-to-place) Facilitating larger, more fragmented networks
Using technology to manage intimacy in larger, more fragmented social networks The email example Asynchronous Flexible Control Contact with multiple people
Social network sites Flexible, asynchronous communication + Leveraging our need to build and maintain relationships
Need for community Need to remain connected Need to retain and create common experience Need to engage peer opinion and build reputation
Personal information is at the heart of relationship This is how we create intimacy
Not  basic identifiers or contact information Truly personal information Expressions of Self Preferences Graphic representations Affiliations Acts and activities Sexuality Identity
(b)  Online identity performance Assertions of digital identity (all users) Process of identity formation   (younger users)
Assertions of digital identity (all users) Traditional identity clues are not available
So we compensate Other clues More information More communication time Using networks to triangulate and authenticate (to overcome ease of manipulation)
Process of identity formation (younger users) Using digital space to … Work out identity and status Make sense of cultural clues and societal norms Negotiate public life
Part of this is taking risks Putting yourself out there Pushing boundaries Gauging reactions What is acceptable and what is not?
Just as with intimate relationships Personal information is at the heart of  identity performance
Acts of articulation Text Images Audio Video Developing a virtual presence or identity.
and social networks get it all A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ??? Database ?? ?? ??
Terms of Service and Privacy Policies * highlights *
 
 
 
 
And users consent to all of this …
So, what’s my point?
It’s not just immature and irresponsible kids Just say “no” Would you want your grandmother to read it! Would you post it in Times Square?
There are real, concrete reasons for posting  so much personal information. They won’t simply “grow out of it”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why they won’t work
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ineffective at altering the decision to provide consent
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Focus on the wrong problem: misuse rather than consent
“ If a person consents to most of these activities,  there is no privacy violation.” Daniel J. Solove A Taxonomy of Privacy
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Interference with autonomy & Negative impact on functionality
What  will  work?
Goal Regulate privacy and Preserve the benefits of new social spaces (functionality)
Is it really a problem? How much of a problem is it? What do users really want?
Focus Emerging social norms of “ network” privacy
Regulating data-flow between networks Architecture/Design User-controlled partitions Technology Tagging data Contextual data Law Restrictions on downstream use and transfer Restrictions on network-crossing Data portability
Regulating data-use within networks The market is more likely to work The “Beacon” example Strengthened by portability Social norms will develop
Thank you.

More Related Content

What's hot

Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)Matthew Asbell
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity ManagementGeorge Roberts
 
You Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaYou Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaSMB Seattle
 
A new model for building online trust in b2 c
A new model for building online trust in b2 cA new model for building online trust in b2 c
A new model for building online trust in b2 cAlexander Decker
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talkRobert Bodle
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal RisksGlenn Manishin
 
Developing a Social Media Policy
Developing a Social Media PolicyDeveloping a Social Media Policy
Developing a Social Media PolicyEric Schwartzman
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketinggaurav jain
 
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan HeuerYour Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan HeuerUnivention GmbH
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
 
GDPR: New Privacy Rules, Digital Communications, Marketing Opportunities
GDPR: New Privacy Rules, Digital Communications, Marketing OpportunitiesGDPR: New Privacy Rules, Digital Communications, Marketing Opportunities
GDPR: New Privacy Rules, Digital Communications, Marketing OpportunitiesBob Johnson, Ph.D.
 
CS4001 Final Ethics Paper
CS4001 Final Ethics PaperCS4001 Final Ethics Paper
CS4001 Final Ethics PaperGino McCarty
 
Dow Jones Government Round Table Collaboration And Metadata
Dow Jones Government Round Table   Collaboration And MetadataDow Jones Government Round Table   Collaboration And Metadata
Dow Jones Government Round Table Collaboration And Metadataeb98jdb
 
Monetizing the mobile social graph
Monetizing the mobile social graphMonetizing the mobile social graph
Monetizing the mobile social graphLisa Borodkin
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadashibrah76
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyAmy Larrimore
 
2019 Trends in Legal Marketing, Including Ethics
2019 Trends in Legal Marketing, Including Ethics2019 Trends in Legal Marketing, Including Ethics
2019 Trends in Legal Marketing, Including EthicsStacey Burke
 

What's hot (20)

Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
 
Social crm comes of age
Social crm comes of ageSocial crm comes of age
Social crm comes of age
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity Management
 
You Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaYou Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social Media
 
A new model for building online trust in b2 c
A new model for building online trust in b2 cA new model for building online trust in b2 c
A new model for building online trust in b2 c
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Developing a Social Media Policy
Developing a Social Media PolicyDeveloping a Social Media Policy
Developing a Social Media Policy
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan HeuerYour Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
GDPR: New Privacy Rules, Digital Communications, Marketing Opportunities
GDPR: New Privacy Rules, Digital Communications, Marketing OpportunitiesGDPR: New Privacy Rules, Digital Communications, Marketing Opportunities
GDPR: New Privacy Rules, Digital Communications, Marketing Opportunities
 
CS4001 Final Ethics Paper
CS4001 Final Ethics PaperCS4001 Final Ethics Paper
CS4001 Final Ethics Paper
 
Dow Jones Government Round Table Collaboration And Metadata
Dow Jones Government Round Table   Collaboration And MetadataDow Jones Government Round Table   Collaboration And Metadata
Dow Jones Government Round Table Collaboration And Metadata
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Monetizing the mobile social graph
Monetizing the mobile social graphMonetizing the mobile social graph
Monetizing the mobile social graph
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 
2019 Trends in Legal Marketing, Including Ethics
2019 Trends in Legal Marketing, Including Ethics2019 Trends in Legal Marketing, Including Ethics
2019 Trends in Legal Marketing, Including Ethics
 

Viewers also liked

Mindlab
MindlabMindlab
MindlabSIX
 
Presentation Aids Conference
Presentation Aids ConferencePresentation Aids Conference
Presentation Aids Conferenceguestb631a6
 
Manejo del conflicto 2
Manejo del conflicto 2 Manejo del conflicto 2
Manejo del conflicto 2 rocio cardozo
 
Niver Luciano - 24.02.07
Niver Luciano - 24.02.07Niver Luciano - 24.02.07
Niver Luciano - 24.02.07Jubrac Jacui
 

Viewers also liked (7)

Mindlab
MindlabMindlab
Mindlab
 
Presentation Aids Conference
Presentation Aids ConferencePresentation Aids Conference
Presentation Aids Conference
 
Manejo del conflicto 2
Manejo del conflicto 2 Manejo del conflicto 2
Manejo del conflicto 2
 
Niver Luciano - 24.02.07
Niver Luciano - 24.02.07Niver Luciano - 24.02.07
Niver Luciano - 24.02.07
 
Besondere Fotos
Besondere FotosBesondere Fotos
Besondere Fotos
 
D Fquebellomundo
D FquebellomundoD Fquebellomundo
D Fquebellomundo
 
Preserving Aquatic Ecosystems
Preserving Aquatic EcosystemsPreserving Aquatic Ecosystems
Preserving Aquatic Ecosystems
 

Similar to Social Distortion: Privacy, Consent, and Social Networks

Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Big data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big data
Big data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big dataBig data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big data
Big data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big dataRick Bouter
 
Sogeti on big data creating clarity
Sogeti on big data creating claritySogeti on big data creating clarity
Sogeti on big data creating clarityYann SESE
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.pptamreena6
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future Agenda
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Kuliza Technologies
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4Data-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set LegislationData-Set
 
Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT
 Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT
Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNTRick Bouter
 
Ryan ziemba marketing consulting deck
Ryan ziemba   marketing consulting deckRyan ziemba   marketing consulting deck
Ryan ziemba marketing consulting deckCuttime, Inc.
 
The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Mediajlipsey
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdfAroraRajinder1
 
Open Data - context of Open Government in Edmonton
Open Data - context of Open Government in EdmontonOpen Data - context of Open Government in Edmonton
Open Data - context of Open Government in EdmontonJas Darrah
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Legal Issues Re: Social Media for the Regulated Utility Industry
Legal Issues Re: Social Media for the Regulated Utility IndustryLegal Issues Re: Social Media for the Regulated Utility Industry
Legal Issues Re: Social Media for the Regulated Utility IndustryCarolyn Elefant
 

Similar to Social Distortion: Privacy, Consent, and Social Networks (20)

Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Big data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big data
Big data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big dataBig data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big data
Big data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big data
 
Sogeti on big data creating clarity
Sogeti on big data creating claritySogeti on big data creating clarity
Sogeti on big data creating clarity
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT
 Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT
Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT
 
Ryan ziemba marketing consulting deck
Ryan ziemba   marketing consulting deckRyan ziemba   marketing consulting deck
Ryan ziemba marketing consulting deck
 
The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Media
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf
 
Open Data - context of Open Government in Edmonton
Open Data - context of Open Government in EdmontonOpen Data - context of Open Government in Edmonton
Open Data - context of Open Government in Edmonton
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Legal Issues Re: Social Media for the Regulated Utility Industry
Legal Issues Re: Social Media for the Regulated Utility IndustryLegal Issues Re: Social Media for the Regulated Utility Industry
Legal Issues Re: Social Media for the Regulated Utility Industry
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Social Distortion: Privacy, Consent, and Social Networks

  • 1. Social Distortion: Privacy, Consent, and Social Networks H. Brian Holland Visiting Associate Professor of Law Dickinson School of Law at Penn State University
  • 2. Not talking about covert surveillance Not talking about the government but rather Voluntary disclosure of personal information to private institutions
  • 3.
  • 4. The Paradox of the Privacy “Market”
  • 5. We say one thing. I want my privacy. We do something else. Here’s my data. Take what you want. (just give me my stuff)
  • 7. The claim 43% of online users claim that they are likely to read the privacy policy of an ecommerce site before buying anything
  • 8. The reality 26% actually consulted the privacy policy Even more odd, essentially no difference between privacy fundamentalists, pragmatists, or the unconcerned
  • 9. The claim 71% want to control who can access their personal information
  • 10. The reality ~ 75% have supplied first name last name email street address ~ 50% have supplied phone number birthday credit card information (to e-commerce sites)
  • 11. Why the paradox between professed attitude and actual behavior?
  • 12. Blame it on the market and the law of the market
  • 13. Starting point The current market for transferring personal information (1) revelation (mere disclosure) (2) consent – express or implied
  • 14. Any regulation? some targeted limits on: extremely invasive collection and use (privacy torts) certain kinds of data (e.g. health records) certain subjects of data (e.g. kids)
  • 15. But most data can be collected or given away very cheaply. So, why do we consent so easily? 3 points
  • 16. Lack of legal control over data No property rights in personal data Lack of bargaining power Inability to control downstream rights 1
  • 17. The decline of consent contracting Contracts as standardized commodities Contracts as part of the product 2
  • 18. Market distortions (behavioral economics) Incomplete or asymmetric information Bounded rationality Systemic psychological deviations from rationality 3
  • 19. Creates artificially low prices for personal information consent is cheap
  • 20. Personal information as a commodity.
  • 21. Social Network Sites Market distortions on steroids.
  • 22. A social-tools model of production An effective tool of coordination A plausible promise (the basic “why” to join or contribute) An acceptable bargain with users
  • 23. But is it a bad bargain for users? Capturing users’ personal information Privacy 1.0 – Centralized data collection, storage and aggregation Privacy 2.0 – Peers as both sensors and producers Owning user’s personal information (storage, use, transfer)
  • 24. Why consent to a bad bargain? What do users get?
  • 25. New and powerful market distortions
  • 26. Two integrated points Social network sites are … (1) Altering the basic structure of the information exchange agreement (2) Benefiting from certain social phenomena that are driving us to join the network and to disclose a lot of personal information
  • 27. The structure of the information-exchange agreement consent recedes into the background First point
  • 28. The classic e-commerce model Money Personal information associated with delivery of current goods or services and the provision of future goods or services Merchandise Services Database ?? ?? ??
  • 29. The g-mail model Initial negotiation and transaction (looks like the ecommerce model) A little bit of personal information In exchange for services
  • 30. The g-mail model Lots of personal information Subsequent negotiations and transactions for the exchange of personal information between contacts
  • 31. The g-mail model Lots of personal information Lots of personal information Not holding? Not passing on? Ads Gmail recedes into the background, almost as a third-party beneficiary of these subsequent transactions (info exchange) between contacts
  • 32. The Social Network Site model A little bit of personal information In exchange for services
  • 33. The Social Network Site model Lots of personal information Lots of personal information A little bit of personal information In exchange for services
  • 34. The Social Network Site model A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ???
  • 35. The Social Network Site model A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ??? Database ?? ?? ?? Ads Ads Ads
  • 36. Certain social phenomena Driving us to join the network and Driving us to disclose a lot of personal information Second point
  • 37. Social phenomena (a) The evolution of social organization toward social networks and networked individualism (b) Online identity performance assertions of digital identity processes of identity formation
  • 38. Glocalized Relationships Networked Individualism Bounded Groups (a) The evolution of social organization (from little boxes to social networks) neighborhoods households workplaces ??
  • 39. Networked individualism Relationship unhinged from location Person-to-person connectivity (replacing place-to-place) Facilitating larger, more fragmented networks
  • 40. Using technology to manage intimacy in larger, more fragmented social networks The email example Asynchronous Flexible Control Contact with multiple people
  • 41. Social network sites Flexible, asynchronous communication + Leveraging our need to build and maintain relationships
  • 42. Need for community Need to remain connected Need to retain and create common experience Need to engage peer opinion and build reputation
  • 43. Personal information is at the heart of relationship This is how we create intimacy
  • 44. Not basic identifiers or contact information Truly personal information Expressions of Self Preferences Graphic representations Affiliations Acts and activities Sexuality Identity
  • 45. (b) Online identity performance Assertions of digital identity (all users) Process of identity formation (younger users)
  • 46. Assertions of digital identity (all users) Traditional identity clues are not available
  • 47. So we compensate Other clues More information More communication time Using networks to triangulate and authenticate (to overcome ease of manipulation)
  • 48. Process of identity formation (younger users) Using digital space to … Work out identity and status Make sense of cultural clues and societal norms Negotiate public life
  • 49. Part of this is taking risks Putting yourself out there Pushing boundaries Gauging reactions What is acceptable and what is not?
  • 50. Just as with intimate relationships Personal information is at the heart of identity performance
  • 51. Acts of articulation Text Images Audio Video Developing a virtual presence or identity.
  • 52. and social networks get it all A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ??? Database ?? ?? ??
  • 53. Terms of Service and Privacy Policies * highlights *
  • 54.  
  • 55.  
  • 56.  
  • 57.  
  • 58. And users consent to all of this …
  • 59. So, what’s my point?
  • 60. It’s not just immature and irresponsible kids Just say “no” Would you want your grandmother to read it! Would you post it in Times Square?
  • 61. There are real, concrete reasons for posting so much personal information. They won’t simply “grow out of it”
  • 62.
  • 64.
  • 65.
  • 66. “ If a person consents to most of these activities, there is no privacy violation.” Daniel J. Solove A Taxonomy of Privacy
  • 67.
  • 68. What will work?
  • 69. Goal Regulate privacy and Preserve the benefits of new social spaces (functionality)
  • 70. Is it really a problem? How much of a problem is it? What do users really want?
  • 71. Focus Emerging social norms of “ network” privacy
  • 72. Regulating data-flow between networks Architecture/Design User-controlled partitions Technology Tagging data Contextual data Law Restrictions on downstream use and transfer Restrictions on network-crossing Data portability
  • 73. Regulating data-use within networks The market is more likely to work The “Beacon” example Strengthened by portability Social norms will develop