SlideShare uma empresa Scribd logo
1 de 26
Mary Aviles
Principal, Connect 4 Insight
The Privacy Illusion
January 3, 2018
Developed for:
Is NOTHING private?
3
Technological
advances
continue to
proliferate
4
More data = more to breach
5
We are willing
to make
significant
trade-offs for
convenience
6
We
broadcast
all kinds of
information
about
ourselves
7
Predictive analytics can reveal surprising things about you
AND your friends
https://www.ted.com/talks/jennifer_golbeck_the_curly_fry_conundrum_why_social_media_likes_
say_more_than_you_might_think
Marketers are trying to
derive insights to inform
communication &
innovation
9
“Facebook was the source of the psychological
insights that enabled Cambridge Analytica to
target individuals. It was also the mechanism
that enabled them to be delivered on a large
scale.
The company (perfectly legally) bought
consumer datasets – on everything from
magazine subscriptions to airline travel – and
uniquely it appended these with the psych data
(developed earlier using Facebook ‘likes’) to
voter files. It matched all this information to
people’s addresses, their phone numbers and
often their email addresses…the personality
data enabled Cambridge Analytica to craft
individual messages. Finding ‘persuadable’
voters is key for any campaign and with its
treasure trove of data, Cambridge Analytica
could target people high in neuroticism, for
example, with images of immigrants
‘swamping’ the country. The key is finding
emotional triggers for each individual voter.”
https://www.theguardian.com/technology/2017/may/07/the-great-
british-brexit-robbery-hijacked-democracy
10
MIT did a study where they
changed the gender of a
driverless car. When the car did
something wrong,
[respondents] were more
forgiving when it was female
versus when it was genderless
or masculine.
– HBR Ideacast, 12/12/2017
We are trusting of
technology
“There are three types of people in the world:
1. Those who have been hacked
2. Those who will be hacked
3. And those who are being hacked right now
Falling victim to public Wi-Fi’s dangers is a
question of when, not if.”
11
“More people are leery of
public Wi-Fi than public toilet
seats” and yet…
“70 percent of people connected to non-secure
Wi-Fi networks at [both the 2016 Republican and
Democratic National Conventions].”
https://hbr.org/2017/05/why-you-
really-need-to-stop-using-public-wi-fi
What to DO?
13
Consent: to be informed
consumers we need to
understand and evaluate
the trade offs
If you are not paying for it, you’re
not the customer; you’re the
product being sold.
[Andrew Lewis on MetaFilter
https://www.metafilter.com/95152/Userdriven-discontent#3256046]
15
Consider the cost of
privacy in today’s
society
 We routinely choose “free” services over
paid models
 We’ve become conditioned to expect
personalization (and the related
efficiencies)
 We reward entities that deliver “radical
convenience” with our loyalty, word of
mouth
16
Privacy is a major product feature (or failure)
17
Privacy has become a luxury good
• Secure platform that can
protect passwords, banking
information, pictures, videos,
and messages
• Stores information in a high-
security bunker in the Swiss
Alps
• Unlocked including via TouchID
and face recognition
• $53/year
• Israel-based technology
company Military grade privacy
protection (chip-to-chip 256-bit
encryption activated by a
physical switch that places the
cellphone in its secure mode)
• In secure mode, the device only
connects with other Solarin
handsets
• $13,000 Android smartphone
• Designed by Edward Snowden
and well-known hacker Andrew
Huang
• Connects to a phone's radio
transmitters, and shows when
the cellular, Wi-Fi or Bluetooth
connection is being used to
share or receive data
• The case acts as a kind of 'kill
switch' that disconnects the
phone's power supply when
unwanted data sharing is
occurring
18
The Privacy Paradox:
People’s behaviors suggest they don’t
care as much about privacy as they say.
Although they like the idea of privacy, they
don’t seem to value their data enough to
take concrete steps to protect it.
– Harvard Business Review, 12/2017
https://hbr.org/2017/12/what-would-you-pay-to-keep-your-digital-
footprint-100-private
Lock up your data,
make it harder to use
19
Hackers
(objective: money)
Marketers/Corporations
(objective: drive behavior)
Hide your identity,
and use encrypted platforms
(e.g., Google Incognito Window)
Other People
(objective: various, e.g., 39% of all
data breaches are internal)
Use privacy settings,
encrypted platforms,
encrypted data
Government
(objective: various)
Requires “intense”
technology to erase your
digital prints
Personal cybersecurity priorities depend upon where
the risk originates
https://hbr.org/2017/12/which-of-your-employees-are-most-likely-to-expose-
your-company-to-a-cyberattack
20
“After last week's MacOS High Sierra root
access glitch and this week's HomeKit bug—
which allowed hackers to remotely control
smart home products such as smart locks and
garage door openers—it might be time to
reevaluate Apple’s reputation as software
security model citizen.”
– Wired Newsletter 12/10/2017
Corporate repercussions are
considerable
21
Security is a mindset; organizations must
educate & re-educate
• CIOs and CISOs need a primer on the business
• Security should be factored in when planning
new products/services
• All employees should be taught about
cybersecurity
• Incident-response plans/team should be
developed
• Security-mindedness should be built into the
culture
https://hbr.org/2017/11/boards-should-take-responsibility-for-
cybersecurity-heres-how-to-do-it
22
Systemic changes are
coming…
“You’re starting to see the early signs of
governments that when you’re born you’ll
have an identity that sits on the blockchain,
and you’ll have your own private data locker,
and you’ll will be very much in control and
that you will be able to give permission to
companies and institutions to access that
data…that’s coming but, that’s a longer time
frame…”
– HBR Ideacast, 12/12/2017
23
1. Security freeze
http://consumersunion.org/research/consumers-unions-guide-to-
security-freeze-protection/#MI
2. Print your credit report quarterly
www.annualcreditreport.com
3. Opt out of credit card offers
https://www.optoutprescreen.com/?rf=t
4. Consider the risk
…in the meantime
5. Educate yourself
6. Vary your online behavior, use
incognito browsers
7. Don’t use public Wi-Fi to access
sensitive sites
8. Only use HTTPS encrypted sites when
in public
9. Buy unlimited data plan and stay off
Wi-Fi completely
24
Educate yourself &
consider the risks
http://transmitter.ieee.org/iot-2017/rooms
Only the paranoid survive.
[Andrew Grove, Intel co-founder]
Thank You!
26
C O N T A C T
Mary Aviles
mary@connect4insight.com
www.connect4insight.com
248.633.5135
@connect4insight

Mais conteúdo relacionado

Mais procurados

Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
28 Burnside
 
Mitre: People in Progress
Mitre: People in ProgressMitre: People in Progress
Mitre: People in Progress
SoCo Partners
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
bmcmenemy
 

Mais procurados (18)

How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big Data
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 
Mitre: People in Progress
Mitre: People in ProgressMitre: People in Progress
Mitre: People in Progress
 
patrick di didomenico
patrick di didomenicopatrick di didomenico
patrick di didomenico
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
Data Security and MPS
Data Security and MPSData Security and MPS
Data Security and MPS
 
ITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT businessITCamp 2016: The rise of privacy and personal data in the IT business
ITCamp 2016: The rise of privacy and personal data in the IT business
 

Semelhante a The Privacy Illusion

FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
Melissa Krasnow
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 

Semelhante a The Privacy Illusion (20)

Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
IABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspectiveIABE Big Data information paper - An actuarial perspective
IABE Big Data information paper - An actuarial perspective
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...
 
The Technology Horizon: Essential Technologies for Legal Marketers
The Technology Horizon: Essential Technologies for Legal MarketersThe Technology Horizon: Essential Technologies for Legal Marketers
The Technology Horizon: Essential Technologies for Legal Marketers
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
What Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets BreachedWhat Happens to Your Data When a Company Gets Breached
What Happens to Your Data When a Company Gets Breached
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023 What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
MindSHARE: Staying Secure Online
MindSHARE: Staying Secure OnlineMindSHARE: Staying Secure Online
MindSHARE: Staying Secure Online
 

Mais de Mary Aviles

Data fluency in the age of surveillance capitalism
Data fluency in the age of surveillance capitalismData fluency in the age of surveillance capitalism
Data fluency in the age of surveillance capitalism
Mary Aviles
 

Mais de Mary Aviles (9)

Data fluency in the age of surveillance capitalism
Data fluency in the age of surveillance capitalismData fluency in the age of surveillance capitalism
Data fluency in the age of surveillance capitalism
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak data
 
Inclusive storytelling 12_07_18
Inclusive storytelling 12_07_18Inclusive storytelling 12_07_18
Inclusive storytelling 12_07_18
 
The 4 Ps of Popping Up
The 4 Ps of Popping UpThe 4 Ps of Popping Up
The 4 Ps of Popping Up
 
What Are You Known For?
What Are You Known For?What Are You Known For?
What Are You Known For?
 
Retail Boot Camp 2019
Retail Boot Camp 2019Retail Boot Camp 2019
Retail Boot Camp 2019
 
Designing the Customer Experience
Designing the Customer ExperienceDesigning the Customer Experience
Designing the Customer Experience
 
5 Things You Need To Know When Thinking About Market Research
5 Things You Need To Know When Thinking About Market Research5 Things You Need To Know When Thinking About Market Research
5 Things You Need To Know When Thinking About Market Research
 
Applying Customer Delight to Improve the Market Research Process
Applying Customer Delight to Improve the Market Research ProcessApplying Customer Delight to Improve the Market Research Process
Applying Customer Delight to Improve the Market Research Process
 

Último

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 

Último (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 

The Privacy Illusion

  • 1. Mary Aviles Principal, Connect 4 Insight The Privacy Illusion January 3, 2018 Developed for:
  • 4. 4 More data = more to breach
  • 5. 5 We are willing to make significant trade-offs for convenience
  • 7. 7 Predictive analytics can reveal surprising things about you AND your friends https://www.ted.com/talks/jennifer_golbeck_the_curly_fry_conundrum_why_social_media_likes_ say_more_than_you_might_think
  • 8. Marketers are trying to derive insights to inform communication & innovation
  • 9. 9 “Facebook was the source of the psychological insights that enabled Cambridge Analytica to target individuals. It was also the mechanism that enabled them to be delivered on a large scale. The company (perfectly legally) bought consumer datasets – on everything from magazine subscriptions to airline travel – and uniquely it appended these with the psych data (developed earlier using Facebook ‘likes’) to voter files. It matched all this information to people’s addresses, their phone numbers and often their email addresses…the personality data enabled Cambridge Analytica to craft individual messages. Finding ‘persuadable’ voters is key for any campaign and with its treasure trove of data, Cambridge Analytica could target people high in neuroticism, for example, with images of immigrants ‘swamping’ the country. The key is finding emotional triggers for each individual voter.” https://www.theguardian.com/technology/2017/may/07/the-great- british-brexit-robbery-hijacked-democracy
  • 10. 10 MIT did a study where they changed the gender of a driverless car. When the car did something wrong, [respondents] were more forgiving when it was female versus when it was genderless or masculine. – HBR Ideacast, 12/12/2017 We are trusting of technology
  • 11. “There are three types of people in the world: 1. Those who have been hacked 2. Those who will be hacked 3. And those who are being hacked right now Falling victim to public Wi-Fi’s dangers is a question of when, not if.” 11 “More people are leery of public Wi-Fi than public toilet seats” and yet… “70 percent of people connected to non-secure Wi-Fi networks at [both the 2016 Republican and Democratic National Conventions].” https://hbr.org/2017/05/why-you- really-need-to-stop-using-public-wi-fi
  • 13. 13 Consent: to be informed consumers we need to understand and evaluate the trade offs
  • 14. If you are not paying for it, you’re not the customer; you’re the product being sold. [Andrew Lewis on MetaFilter https://www.metafilter.com/95152/Userdriven-discontent#3256046]
  • 15. 15 Consider the cost of privacy in today’s society  We routinely choose “free” services over paid models  We’ve become conditioned to expect personalization (and the related efficiencies)  We reward entities that deliver “radical convenience” with our loyalty, word of mouth
  • 16. 16 Privacy is a major product feature (or failure)
  • 17. 17 Privacy has become a luxury good • Secure platform that can protect passwords, banking information, pictures, videos, and messages • Stores information in a high- security bunker in the Swiss Alps • Unlocked including via TouchID and face recognition • $53/year • Israel-based technology company Military grade privacy protection (chip-to-chip 256-bit encryption activated by a physical switch that places the cellphone in its secure mode) • In secure mode, the device only connects with other Solarin handsets • $13,000 Android smartphone • Designed by Edward Snowden and well-known hacker Andrew Huang • Connects to a phone's radio transmitters, and shows when the cellular, Wi-Fi or Bluetooth connection is being used to share or receive data • The case acts as a kind of 'kill switch' that disconnects the phone's power supply when unwanted data sharing is occurring
  • 18. 18 The Privacy Paradox: People’s behaviors suggest they don’t care as much about privacy as they say. Although they like the idea of privacy, they don’t seem to value their data enough to take concrete steps to protect it. – Harvard Business Review, 12/2017 https://hbr.org/2017/12/what-would-you-pay-to-keep-your-digital- footprint-100-private
  • 19. Lock up your data, make it harder to use 19 Hackers (objective: money) Marketers/Corporations (objective: drive behavior) Hide your identity, and use encrypted platforms (e.g., Google Incognito Window) Other People (objective: various, e.g., 39% of all data breaches are internal) Use privacy settings, encrypted platforms, encrypted data Government (objective: various) Requires “intense” technology to erase your digital prints Personal cybersecurity priorities depend upon where the risk originates https://hbr.org/2017/12/which-of-your-employees-are-most-likely-to-expose- your-company-to-a-cyberattack
  • 20. 20 “After last week's MacOS High Sierra root access glitch and this week's HomeKit bug— which allowed hackers to remotely control smart home products such as smart locks and garage door openers—it might be time to reevaluate Apple’s reputation as software security model citizen.” – Wired Newsletter 12/10/2017 Corporate repercussions are considerable
  • 21. 21 Security is a mindset; organizations must educate & re-educate • CIOs and CISOs need a primer on the business • Security should be factored in when planning new products/services • All employees should be taught about cybersecurity • Incident-response plans/team should be developed • Security-mindedness should be built into the culture https://hbr.org/2017/11/boards-should-take-responsibility-for- cybersecurity-heres-how-to-do-it
  • 22. 22 Systemic changes are coming… “You’re starting to see the early signs of governments that when you’re born you’ll have an identity that sits on the blockchain, and you’ll have your own private data locker, and you’ll will be very much in control and that you will be able to give permission to companies and institutions to access that data…that’s coming but, that’s a longer time frame…” – HBR Ideacast, 12/12/2017
  • 23. 23 1. Security freeze http://consumersunion.org/research/consumers-unions-guide-to- security-freeze-protection/#MI 2. Print your credit report quarterly www.annualcreditreport.com 3. Opt out of credit card offers https://www.optoutprescreen.com/?rf=t 4. Consider the risk …in the meantime 5. Educate yourself 6. Vary your online behavior, use incognito browsers 7. Don’t use public Wi-Fi to access sensitive sites 8. Only use HTTPS encrypted sites when in public 9. Buy unlimited data plan and stay off Wi-Fi completely
  • 24. 24 Educate yourself & consider the risks http://transmitter.ieee.org/iot-2017/rooms
  • 25. Only the paranoid survive. [Andrew Grove, Intel co-founder]
  • 26. Thank You! 26 C O N T A C T Mary Aviles mary@connect4insight.com www.connect4insight.com 248.633.5135 @connect4insight

Notas do Editor

  1. Facebook example…you are sharing a TON of information/behavioral data about yourselves and your network members  I would say most people, whether it’s the device or the app, they give their trust very easily to the device without thinking about sort of the lopsided tradeoffs that they’re signing up for. And this is because technology, what it does, is it actually accelerates trust. It makes things very seamless where we don’t think about what we’re really placing our trust in. – HBR Ideacast 12/12/17
  2. Stop at 5:45 Dr. Jen Golbeck, Associate Professor at the University of Maryland social data analytics pioneer discovers people’s hidden attributes from their online behavior leader in creating human-friendly security and privacy systems
  3. Not everyone is using this information benignly
  4. Iris, Siri, Alexa — they’re female names, and it’s really interesting when you look at the gender studies that just by changing the name or making it feel more female in the design, people are more trusting towards that technology and more forgiving…. – HBR Ideacast 12/12/17
  5. Consumer awareness and consent There’s a science behind what makes someone trustworthy. And there’s four traits to it. So, there’s competence, and there’s reliability, and that’s really the how side of the equation: how well you are going to do something. And then there’s the why side of the equation, which is integrity and benevolence: so, how much do you care? And I think the integrity is the most important piece, which is, do your intentions align with mine? What are your motives? – HBR Ideacast
  6. “privacy paradox”. In short, people’s behaviors suggest they don’t care as much about privacy as they say. Although they like the idea of privacy, they don’t seem to value their data enough to take concrete steps to protect it.  https://hbr.org/2017/12/what-would-you-pay-to-keep-your-digital-footprint-100-private
  7. https://www.youtube.com/watch?v=dUMH6DVYskc
  8. (malicious, accidental, or negligent)
  9. Wired 12.10.17
  10. https://hbr.org/2017/11/boards-should-take-responsibility-for-cybersecurity-heres-how-to-do-it