SlideShare uma empresa Scribd logo
1 de 22
Data protection and
    social networks
Data: Pew Research Center, Internet and American Life Surveys
Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
Which data are social networks
storing?
• In 2011, Austrian law student
  Max Schrems received 1,222
  pages of data after subject
  access request to Facebook
• Searches, pages viewed,
  relationships with friends,
  events, like button tracking,
  cookies, conversation tracking…
• Facebook now has data
  download tool, supplies 39 of 84
  data categories held               TouchGraph Facebook Browser
Data: CareerBuilder, online, fieldwork 17/11/09-2/12/09, probability
 sample of 407 UK private sector employers, sample error ±4.41%
Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
Reasonable expectations?
     • Oxford students fined on basis of Facebook photos of exam
       celebrations. Whose “fault”?
        • Students who didn’t take appropriate security measures
          using available tools?
        • Oxford proctors for snooping on a “private place”?
        • Facebook because it did not provide the right defaults for
          a “reasonable expectation of privacy”?
     • A29WP: “SNS should ensure privacy-friendly and free of
       charge default settings are in place restricting access to self-
       selected contacts”
     • Canadian Privacy Commissioner: “Facebook’s default
       settings in respect of photo albums and search engines do
       not meet users’ reasonable expectations”
Data shared about third parties
                              • How far can users control what
                                is “tagged” with their identifier?
                              • Facial recognition
                              • A29WP: “Users should be
                                advised by SNS that pictures or
                                information about other
                                individuals, should only be
                                uploaded with the individual’s
TouchGraph Facebook Browser
                                consent.”
Facebook Platform
• Over 9m apps and integrated websites as of March 2012
• “Social Plugins” are revealing browsing behaviour across the Web to
  Facebook and Twitter – used by latter for profiling (10 days of
  records). Banned in Schleswig-Holstein
• X’s app consent may reveal personal data about Y, and transmit
  user IDs to ad tracking companies
• Canadian Privacy Commissioner: “Facebook should be doing much
  more to ensure that meaningful consent is duly obtained from users
  when developers access their personal information [and]
  technological safeguards that will not simply forbid, but effectively
  prevent, developers’ unauthorized access to personal information
  that they do not need.”
Young people and privacy
• Most young people see Internet as private space for talking to
    (already-known) friends, and target information to peer group
•   Lenhart et al. (2007) found stricter access controls on photos/videos
    by teens than adults (76% v 58% most of time/sometimes)
•   Teens showed higher privacy concerns with parental monitoring;
    parental discussions increased privacy concerns and reduced
    disclosure
•   Human impulse to connect and share information with friends, but
    when mediated can easily be replicated and spread to places never
    intended. Teens less good at managing collapsed contexts (boyd,
    Marwick)
•   Adult users of social media are developing similar behaviours –
    consequence of mediation, not age (Marwick et al. 2010)
Young adults and privacy
• Hoofnagle et al. (2010) found very limited understanding
  of privacy laws among young adults – 42% answered all 5
  questions incorrectly
• Jones et al. surveyed 7,421 students at 40 US colleges.
  75% concerned about passwords, SSNs, credit card
  numbers but few about SNSes due to insignificant
  consequences (2009)
Student information disclosure




 What kind of personal information do you post online? (first year N=177, final year N=133) Oostveen
 (2010)
Sampling Facebook Experiences
                                                       Facebook Application
                                                        Location disclosed to friends



                                Server
                                 Data are collected
                                in our server
                                 Questions are
                                sent to participants
                                                            Aims
                                                            To understand:
                                through SMS
                                                             Why do students share
                                                            their location
                                                             How (text, picture)
                                                             When, to whom they
Mobile phones carried by students                           share this location
 Location retrieved with embedded GPS                       At what locations are
 Subjects answer questions (e.g., sharing choices)         they more willing to share
Location sharing




•    40 participants responded to over 2000 questions over 2 weeks
•    Participants are more willing to share their location when they are in ‘Leisure’ or
    ‘Academic’ locations than in the ‘Library’ or in ‘Residential’ areas.
                                                 Abdesslem, Parris & Henderson (2010)
Privacy is contextual
• “Contrary to the assumption … that people have
 stable, coherent, preferences with respect to
 privacy, we find that concern about privacy … is
 highly sensitive to contextual factors”
 • Privacy salience primes concerns
 • “People, it seems, feel more comfortable providing
   personal information on unprofessional sites that are
   arguably particularly likely to misuse it.”
 • “Covert inquiries … do not trigger concerns about
   privacy, and hence promote disclosure.”


                               John, Acquisti and Loewenstein (2011)
Homo economicus vs. sapiens
• Bounded rationality
• Privacy risks are highly probabilistic, cumulative, and
  difficult to calculate
• Most individuals bad at deferred gratification, and have
  time-inconsistent preferences




                                                    Acquisti (2009)
How to further privacy in social
networks?
• Is the consent given when signing up for Facebook (and apps) good
  enough? Informed? “Explicit” for sensitive data? EC: “general
  principle of transparent processing”, “improving the modalities for the
  actual exercise of the rights of access, rectification”, “clarifying and
  strengthening the rules on consent”
• Should current consent expose users to future risks? “The eternal
  memory of Google” vs. the “right to be forgotten”; “data portability”
• Can T & C which exclude liability for privacy and security breaches be
  potentially void as unfair consumer terms? EC: “general personal
  data breach notification”, “extending the power to bring an action
  before the national courts”, “strengthening the existing provisions on
  sanctions”
• EC: “further promoting the use of PETs and the possibilities for the
  concrete implementation of the concept of ‘Privacy by Design’”,
  “continue to promote the development of high legal and technical
  standards of data protection in third countries and at international
  level”
Individuals ≠ data controllers

                 • How sustainable is Lindqvist?
                 • A29WP: “when access to a profile is
                   provided to all members within the SNS
                   or the data is indexable by search
                   engines, access goes beyond the
                   personal or household sphere.”
                 • Better privacy protection by
                   infomediaries?
                   • Defaults/Nudges?
                   • Expedited temporary restrictions on sharing?
References
SNS market penetration




                         Source: Le Monde, 15/5/08
Is competition regulation required?
• OpenSocial and related efforts may reduce switching
  costs,
• but network effects will still act as a barrier to entry
• vertical integration will limit consumer choice


Competition authorities could:
• impose ex ante interoperability requirements
• upon dominant social utilities
• between vertically integrated value chains
• to minimise network barriers
Three models
Model 1: Must-carry obligations
• on broadcasters and Electronic Programme Guides
Model 2: API disclosure requirements
• on Microsoft from DoJ and EC rulings
Model 3: Interconnect requirements
• on telcos, especially with SMP
• for IM clients, from Time Warner/AOL merger case
Model comparison
• API disclosure requirements are necessary but not
 sufficient - ability to program platform apps is of little use if
 they cannot run
• Must-carry obligations enable one platform to “break in” to
 another (eg Flickr app on Facebook)
• Interconnect requirements most likely to lead to seamless
 user experience that will create real competition

Mais conteúdo relacionado

Mais procurados

An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
Mobile Access to Licensed Databases in Medicine and Other Subject Areas
Mobile Access to Licensed Databases in Medicine and Other Subject AreasMobile Access to Licensed Databases in Medicine and Other Subject Areas
Mobile Access to Licensed Databases in Medicine and Other Subject AreasBohyun Kim
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3Dave King
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao janelle17
 
Digital students - Is there a Gap? presentation at the EDEN 2012, Porto
Digital students - Is there a Gap? presentation at the EDEN 2012, PortoDigital students - Is there a Gap? presentation at the EDEN 2012, Porto
Digital students - Is there a Gap? presentation at the EDEN 2012, PortoDiana Andone
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataAnsgar Koene
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...csandit
 
Peer computing complete project
Peer computing complete projectPeer computing complete project
Peer computing complete projectboos111
 
What's on the Horizon? Trends and Trials in Educational Technology
What's on the Horizon? Trends and Trials in Educational TechnologyWhat's on the Horizon? Trends and Trials in Educational Technology
What's on the Horizon? Trends and Trials in Educational TechnologyMelissa Rethlefsen
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictDexter Dizon
 
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...Agnes Gulyas
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
 
The Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
The Googling Juror 2014 - The Fate of the Jury in the Digital ParadigmThe Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
The Googling Juror 2014 - The Fate of the Jury in the Digital ParadigmDavid Harvey
 

Mais procurados (19)

An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
Mobile Access to Licensed Databases in Medicine and Other Subject Areas
Mobile Access to Licensed Databases in Medicine and Other Subject AreasMobile Access to Licensed Databases in Medicine and Other Subject Areas
Mobile Access to Licensed Databases in Medicine and Other Subject Areas
 
Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
Singapore iatul keynote
Singapore iatul keynoteSingapore iatul keynote
Singapore iatul keynote
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Digital students - Is there a Gap? presentation at the EDEN 2012, Porto
Digital students - Is there a Gap? presentation at the EDEN 2012, PortoDigital students - Is there a Gap? presentation at the EDEN 2012, Porto
Digital students - Is there a Gap? presentation at the EDEN 2012, Porto
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
 
Peer computing complete project
Peer computing complete projectPeer computing complete project
Peer computing complete project
 
Illegal File Sharing
Illegal File SharingIllegal File Sharing
Illegal File Sharing
 
Illegal file sharing4
Illegal file sharing4Illegal file sharing4
Illegal file sharing4
 
What's on the Horizon? Trends and Trials in Educational Technology
What's on the Horizon? Trends and Trials in Educational TechnologyWhat's on the Horizon? Trends and Trials in Educational Technology
What's on the Horizon? Trends and Trials in Educational Technology
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ict
 
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
H018144450
H018144450H018144450
H018144450
 
The Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
The Googling Juror 2014 - The Fate of the Jury in the Digital ParadigmThe Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
The Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
 

Destaque

Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Michael Altendorf
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplaceBailey and Wyant PLLC
 
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...Christian Bosau
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Dave Shannon
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leadingHsuan-Ting Chen
 
Look before you leap - research as foundation for brand identity development
Look before you leap - research as foundation for brand identity developmentLook before you leap - research as foundation for brand identity development
Look before you leap - research as foundation for brand identity developmentRachel Reuben
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataArthit Suriyawongkul
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EUArete-Zoe, LLC
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
2017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v22017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v2Flaskdata.io
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...Bart Van Den Brande
 
Deep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial IntelligenceDeep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial IntelligenceLukas Masuch
 
Information Privacy & Social Media Issues in Healthcare
Information Privacy & Social Media Issues in HealthcareInformation Privacy & Social Media Issues in Healthcare
Information Privacy & Social Media Issues in HealthcareNawanan Theera-Ampornpunt
 

Destaque (17)

Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
Look before you leap - research as foundation for brand identity development
Look before you leap - research as foundation for brand identity developmentLook before you leap - research as foundation for brand identity development
Look before you leap - research as foundation for brand identity development
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EU
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
2017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v22017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v2
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
 
Deep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial IntelligenceDeep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial Intelligence
 
Information Privacy & Social Media Issues in Healthcare
Information Privacy & Social Media Issues in HealthcareInformation Privacy & Social Media Issues in Healthcare
Information Privacy & Social Media Issues in Healthcare
 

Semelhante a Data protection and social networks

Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...i_scienceEU
 
EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonPaul Simon
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisFarida Vis
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_smaAnsgar Koene
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Symeon Papadopoulos
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Eleftherios Spyromitros-Xioufis
 
PerCol 2012 - Presentation
PerCol 2012 - Presentation PerCol 2012 - Presentation
PerCol 2012 - Presentation Ville Antila
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKSSOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKSShakas Technologies
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
 
The fate-of-the-semantic-web
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-webMarketingfacts
 
Benchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People SearchBenchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People SearchDaqing He
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Open University Australia
 
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social NetworksJPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networkschennaijp
 
Characterization of facebook users
Characterization of facebook usersCharacterization of facebook users
Characterization of facebook usersDebesh Majumdar
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCISaqib Shehzad
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital LearnersDesigning a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital LearnersIJITE
 

Semelhante a Data protection and social networks (20)

Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
 
EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul Simon
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...
 
PerCol 2012 - Presentation
PerCol 2012 - Presentation PerCol 2012 - Presentation
PerCol 2012 - Presentation
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKSSOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
The fate-of-the-semantic-web
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-web
 
Benchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People SearchBenchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People Search
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social NetworksJPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
 
Characterization of facebook users
Characterization of facebook usersCharacterization of facebook users
Characterization of facebook users
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCI
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital LearnersDesigning a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners
 

Mais de blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 

Mais de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Data protection and social networks

  • 1. Data protection and social networks
  • 2. Data: Pew Research Center, Internet and American Life Surveys Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
  • 3. Which data are social networks storing? • In 2011, Austrian law student Max Schrems received 1,222 pages of data after subject access request to Facebook • Searches, pages viewed, relationships with friends, events, like button tracking, cookies, conversation tracking… • Facebook now has data download tool, supplies 39 of 84 data categories held TouchGraph Facebook Browser
  • 4. Data: CareerBuilder, online, fieldwork 17/11/09-2/12/09, probability sample of 407 UK private sector employers, sample error ±4.41% Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
  • 5.
  • 6. Reasonable expectations? • Oxford students fined on basis of Facebook photos of exam celebrations. Whose “fault”? • Students who didn’t take appropriate security measures using available tools? • Oxford proctors for snooping on a “private place”? • Facebook because it did not provide the right defaults for a “reasonable expectation of privacy”? • A29WP: “SNS should ensure privacy-friendly and free of charge default settings are in place restricting access to self- selected contacts” • Canadian Privacy Commissioner: “Facebook’s default settings in respect of photo albums and search engines do not meet users’ reasonable expectations”
  • 7. Data shared about third parties • How far can users control what is “tagged” with their identifier? • Facial recognition • A29WP: “Users should be advised by SNS that pictures or information about other individuals, should only be uploaded with the individual’s TouchGraph Facebook Browser consent.”
  • 8. Facebook Platform • Over 9m apps and integrated websites as of March 2012 • “Social Plugins” are revealing browsing behaviour across the Web to Facebook and Twitter – used by latter for profiling (10 days of records). Banned in Schleswig-Holstein • X’s app consent may reveal personal data about Y, and transmit user IDs to ad tracking companies • Canadian Privacy Commissioner: “Facebook should be doing much more to ensure that meaningful consent is duly obtained from users when developers access their personal information [and] technological safeguards that will not simply forbid, but effectively prevent, developers’ unauthorized access to personal information that they do not need.”
  • 9. Young people and privacy • Most young people see Internet as private space for talking to (already-known) friends, and target information to peer group • Lenhart et al. (2007) found stricter access controls on photos/videos by teens than adults (76% v 58% most of time/sometimes) • Teens showed higher privacy concerns with parental monitoring; parental discussions increased privacy concerns and reduced disclosure • Human impulse to connect and share information with friends, but when mediated can easily be replicated and spread to places never intended. Teens less good at managing collapsed contexts (boyd, Marwick) • Adult users of social media are developing similar behaviours – consequence of mediation, not age (Marwick et al. 2010)
  • 10. Young adults and privacy • Hoofnagle et al. (2010) found very limited understanding of privacy laws among young adults – 42% answered all 5 questions incorrectly • Jones et al. surveyed 7,421 students at 40 US colleges. 75% concerned about passwords, SSNs, credit card numbers but few about SNSes due to insignificant consequences (2009)
  • 11. Student information disclosure What kind of personal information do you post online? (first year N=177, final year N=133) Oostveen (2010)
  • 12. Sampling Facebook Experiences Facebook Application  Location disclosed to friends Server  Data are collected in our server  Questions are sent to participants Aims To understand: through SMS  Why do students share their location  How (text, picture)  When, to whom they Mobile phones carried by students share this location  Location retrieved with embedded GPS  At what locations are  Subjects answer questions (e.g., sharing choices) they more willing to share
  • 13. Location sharing • 40 participants responded to over 2000 questions over 2 weeks • Participants are more willing to share their location when they are in ‘Leisure’ or ‘Academic’ locations than in the ‘Library’ or in ‘Residential’ areas. Abdesslem, Parris & Henderson (2010)
  • 14. Privacy is contextual • “Contrary to the assumption … that people have stable, coherent, preferences with respect to privacy, we find that concern about privacy … is highly sensitive to contextual factors” • Privacy salience primes concerns • “People, it seems, feel more comfortable providing personal information on unprofessional sites that are arguably particularly likely to misuse it.” • “Covert inquiries … do not trigger concerns about privacy, and hence promote disclosure.” John, Acquisti and Loewenstein (2011)
  • 15. Homo economicus vs. sapiens • Bounded rationality • Privacy risks are highly probabilistic, cumulative, and difficult to calculate • Most individuals bad at deferred gratification, and have time-inconsistent preferences Acquisti (2009)
  • 16. How to further privacy in social networks? • Is the consent given when signing up for Facebook (and apps) good enough? Informed? “Explicit” for sensitive data? EC: “general principle of transparent processing”, “improving the modalities for the actual exercise of the rights of access, rectification”, “clarifying and strengthening the rules on consent” • Should current consent expose users to future risks? “The eternal memory of Google” vs. the “right to be forgotten”; “data portability” • Can T & C which exclude liability for privacy and security breaches be potentially void as unfair consumer terms? EC: “general personal data breach notification”, “extending the power to bring an action before the national courts”, “strengthening the existing provisions on sanctions” • EC: “further promoting the use of PETs and the possibilities for the concrete implementation of the concept of ‘Privacy by Design’”, “continue to promote the development of high legal and technical standards of data protection in third countries and at international level”
  • 17. Individuals ≠ data controllers • How sustainable is Lindqvist? • A29WP: “when access to a profile is provided to all members within the SNS or the data is indexable by search engines, access goes beyond the personal or household sphere.” • Better privacy protection by infomediaries? • Defaults/Nudges? • Expedited temporary restrictions on sharing?
  • 19. SNS market penetration Source: Le Monde, 15/5/08
  • 20. Is competition regulation required? • OpenSocial and related efforts may reduce switching costs, • but network effects will still act as a barrier to entry • vertical integration will limit consumer choice Competition authorities could: • impose ex ante interoperability requirements • upon dominant social utilities • between vertically integrated value chains • to minimise network barriers
  • 21. Three models Model 1: Must-carry obligations • on broadcasters and Electronic Programme Guides Model 2: API disclosure requirements • on Microsoft from DoJ and EC rulings Model 3: Interconnect requirements • on telcos, especially with SMP • for IM clients, from Time Warner/AOL merger case
  • 22. Model comparison • API disclosure requirements are necessary but not sufficient - ability to program platform apps is of little use if they cannot run • Must-carry obligations enable one platform to “break in” to another (eg Flickr app on Facebook) • Interconnect requirements most likely to lead to seamless user experience that will create real competition

Notas do Editor

  1. http://www.searchenginejournal.com/the-growth-of-social-media-an-infographic/32788/
  2. http://www.nytimes.com/2012/02/06/technology/06iht-rawdata06.html?pagewanted=all http://www.europe-v-facebook.org/fb_cat1.pdf
  3. http://www.searchenginejournal.com/the-growth-of-social-media-an-infographic/32788/ http://www.careerbuilder.co.uk/UK/share/aboutus/pressreleasesdetail.aspx?id=pr28&sd=1%2F13%2F2010&ed=12%2F31%2F2010
  4. http://online.wsj.com/article/SB10001424052748704648604575620750998072986.html
  5. http://ebiquity.umbc.edu/blogger/2010/10/17/wsj-many-facebook-apps-transmit-user-ids-to-advertising-tracking-companies/ http://www.gov2u.org/index.php/blog/157-a-german-state-which-unlikes-facebook https://www.datenschutzzentrum.de/presse/20110819-facebook-en.htm
  6. http://www.priv.gc.ca/cf-dc/2009/2009_008_0716_e.cfm