SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Online Focus Groups:
  Privacy and Security
  Alfonso Sintjago & Caryn E. Lindsay
        AEA Conference
              Oct. 26, 2012
            Minneapolis, MN
Colleagues Have Discussed
●   Benefits
●   Utility
●   Selecting a platform
●   Making connections
Issues of Concern
Data Privacy
●   “Many Internet users fail to realize that something once put online
    more or less stays online and may be retrieved by others and
    replicated” (Walther, 2011, pg. 4). (High Levels of Variability)
Data Security
●   The policies enacted by third parties, which could be the internet
    service provider (ISP), the cookies on the browser, web beacons,
    the server(s) where the data is stored, or the online service(s)
    utilized, may result in the legal or illegal selling and purchase of
    research data by additional parties (Craig & Ludloff, 2011).
Security Considerations for
    Platform Selection
     unrecognized vulnerabilities within software
        capabilities to address vulnerabilities
        hosting internally or hosting externally
          security level utilized by servers
        online programs allow for interaction
        complexity can increase weaknesses
             data could be not digitized
          limiting copies of the information

 May be subject to IRB, FERPA, or HIPAA regulations
Relevant Online Security
 Elements to Consider


               Services are as vulnerable
               to hacking as their weakest
               line of code (Bailey, 2012;
               Stuttard & Pinto, 2011)
The Unique Environment of an
         Online Focus Group
●   If participants do not trust a system, it is less likely
    that the focus group will gain the valuable data it
    hopes to obtain (Gottman, 2011; Metzger, 2004).

●   Trust is also an essential element for the effective
    functioning of a society (Schneier, 2012).

●   As a qualitative research method, a focus group
    “explicitly use[s] interaction as part of the method”
    (Kitzinger, 1995, pg. 299).
Figure 1.2 – Traditional Focus Group (Flow
                                             of Data – Parties with Access to Data)

Figure 1.1 – Internet Focus Group (Flow
 of Data – Parties with Access to Data)




  When selecting platforms, consider
signing business associate agreements
Sen. Al Franken - (D-MN)
                on Social Media




                                 Remember to ask:
                                 What is the revenue model?
                                 How does the business make a profit?


“You [users] are not their client, you are their product.”
Careful Analysis and
          Consideration
Despite the benefits of the platforms for social
networking, Facebo , Twitter, and Google may
not provide users with the privacy that may be
desired by a research-oriented focus group,
particularly when dealing with delicate subject
matters such as traumatic experiences, socially
unacceptable opinions, and other confidential
information.
Overview of Major Risks - # 1
Data Transferability
●   Information in the Cloud is hard to delete and/or access

●   Increased smartphone use + recording capability (50%+
    own smart phones)

●   Multiple copies of Cloud data (Reliability vs. Security)

●   Data accessible through more devices
Overview of Major Risks - # 2
Hacking and Password Vulnerability
●   Many well known organizations have been hacked (LinkedIn,
    New York Times, DOJ, Bank of America, Google, etc)

●   Importance of longer passwords (7+ Digits)
    Increased understanding of user choices

●   Use of different passwords (10%+ use 1234)
    (database of 3.4million four-digit passwords)
Overview of Major Risks - #3
Provider Practices
●   Average Security Policy is Too Long (2000+ Words)
    1200 websites visited, requiring an average of 201 hours a year

●   Privacy Implications May be Difficult to Understand

●   Many Organizations Collect and Sell Data

●   Privacy Policies Can be Suddenly Modified
Examples
●   Comcast retains users’ data for over 180 days;

●   AOL previously released the partially
    anonymized data of over 600,000 users;

●   Sonic.net only retains users’ clickstream data
    for two weeks (Kirk, 2006; Greenberg, 2012).
Options
●   Use and visit trusted secure sites, applications.

●   TRUSTe, WOT, McAfee SiteAdvisor, Haute Secure, etc.

●   HTTPS and Encrypted Comm, Encrypted Drives

●   Virtual Private Network (VPN) and Proxies in countries
    with laws with the better privacy protection

●   TOR (https://www.torproject.org/)
Elements to Consider
                  When Selecting a Platform - 1
    Conducting an Online
                                                   Questions for Moderator
         Focus Group
1- Requirements of the Study     Must it meet HIPAA privacy standards? Is the data sensitive?
2- Concerns of the Participant   Will the participant feel comfortable in this environment?
3- Anonymity of participants     Can participants participate without being identified?
4- Data encryption               Must the data be encrypted? Is the data encrypted?
5- Server Location               Must the data be stored locally, can it be stored on the cloud?
6- Selection of Participants     Are there benefits from having access to social network data?
7- Terms of Agreement            Are the terms of agreement acceptable and favorable?
8- Control over Change           Can the platform privacy be modified without your input?
9- Notification of Changes       How will the service provider notify you of policy changes?
10- History of the Company       Is the site trusted (TRUSTe, etc)? Recent misuses of data?
Elements to Consider
                 When Selecting a Platform - 2
    Conducting an Online
                                                   Questions for Moderator
        Focus Group
11- Ownership of Data             Is the data owned or shared by the service provider?
12- Access to the Data            Is the data accessible to anyone on the Internet?
13- Security from Users           Can the data be easily copied and distributed by users?
14- Security from Outsiders       Could the data be stolen by a third party?
15- Anonymity of Data             Will the provider anonymize the data?
16- Selling of Data               Can the service provider sell the focus group data?
17- Modifications to Platform     Can the platform be modified? Can its security be
                                  enhanced?
18- Access to the Source Code     Do you have access to the source code? Can you modify it?
19- Linking of Participant Data   Can the data be easily linked to other data from that user?
Recommendations
Choosing the ‘best’ platform depends upon many factors
  Data may be used by companies in unexpected ways
      Data may be accessed illegally by third parties
 Digitized data can be easily duplicated and transferred
     Misuses of data can have serious consequences
   A sincere attempt to protect privacy must be taken
Decide whether or not you trust any third parties involved
    Online or Offline, focus groups are based on trust!
PRIMARY ONLINE PROGRAMS
CONSIDERED BY UMN’S ONLINE
FOCUS GROUP RESEARCH TEAM
Skype                       More Information: http://www.skype.com/intl/en-us/security/
                                  http://www.skype.com/intl/en/legal/privacy/general/
   (available since 2003)
Privacy Policy Last Updated: June 2012
Overview: Video and voice over IP Software, High Bandwidth, Real-Time, Multi-
Platform
With over 650 million users, Skype is the largest Voice Over Internet Protocol (VOIP)
Skype uses secure algorithms and standards (RSA and AES) to protect users from
hackers and phishing.
EDUCAUSE experts were concerned in 2007 about the level of access to network
ports that Skype required from computers that utilized the software
“Skype will not sell, rent, trade or otherwise transfer any personal and/or traffic data
or communications content outside of Microsoft and its controlled subsidiaries and
affiliates without your explicit permission, unless it is obliged to do so under
applicable laws or by order of the competent authorities.”
Adobe Connect
         (available since 2003)

Privacy Policy Last Updated: May 2012
Overview: Multiple deployment options. Web Presentations and Video Conferencing
Adobe Connect can be customized and hosted locally allowing for the incorporation of
additional security features if required by HIPAA or FERPA.
Since 2011, Adobe allows Adobe Connect to be licensed in three ways
Security functions include the ability to disable undesired functionalities, control over
access to meeting rooms, allows for SSL encryption, best practices for password
management policies, easy-to-use administration console that enables for the
configuration of LDAP (Lightweight Directory Access Protocol) server details,
authentication methods, query page-size limits, and other valuable security features.



                          More Information: http://www.adobe.com/privacy/policy.edu.html
                          http://www.adobe.com/products/adobeconnect/features.edu.html
Ning                     More Information: http://www.ning.com/about/legal/privacy/

                              http://www.ning.com/about/safety/
 (available since 2003)

Privacy Policy Last Updated: December 2010
Overview: Private social network. Cloud-based environment.
Does not profit from the sale of data - requires users to pay for the cost of maintaining
their space.
Ning allows an organization to purchase their own Ning installation
Utilized by a large number of educational communities
Users cannot host Ning within their own servers (must be hosted by Ning)
Does not utilize https and not HIPAA Compliant
More Information: http://docs.moodle.org/23/en/Security_FAQ
   Moodle                           http://docs.moodle.org/23/en/Security_recommendations
   (available since 2002)           http://moodle.org/security/


Privacy Policy Last Updated: Will vary depending on the installation
Overview: Modular Object-Oriented Dynamic Learning Environment. OSS Learning
Management System (LMS).
Moodle is a highly customizable platform that can be hosted on most servers.
Currently used in 220 countries, in over 65 thousand sites (http://moodle.org/stats/).
Moodlerooms.com offers Moodle hosting services that are HIPAA and FERPA compliant
Large community of developers working to improve the platform.
As an open source software, anyone could find its vulnerabilities. (No Backdoor Access)
Installations may or may not utilize https and robust user authorization systems.
Internet Start Up Companies
                                     (Varies by Start Up)

Privacy Policy Last Updated: Will vary depending on the start up.
Overview: Large number of programs with multiple advantages.
May be more willing to meet HIPAA and other security requirements than a larger company
Privacy could increased for participants if an internal product is developed
A start up could change its business plan or fail to secure data properly
With the exception of Moodle all other discussed sites have been awarded a TRUSTe seal
Carefully consider a partnership with a start up, especially if the data is of delicate nature
Adapting software that is already available to meet a different function can be complicated
No online environment addressed all of the elements discussed by other team members

Mais conteúdo relacionado

Mais procurados

Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for TabletSymantec
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityAlex Hyer
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010Ulf Mattsson
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...IJNSA Journal
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 

Mais procurados (20)

Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Project 3
Project 3Project 3
Project 3
 
ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 

Semelhante a Online Focus Groups Privacy and Security Considerations

Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?Ashish Patel
 
Share point encryption
Share point encryptionShare point encryption
Share point encryptioncsmith2009
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2016
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...Danny Miller
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedElastica Inc.
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET Journal
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
How To Safeguard Your Data in This Digital World?
How To Safeguard Your Data in This Digital World?How To Safeguard Your Data in This Digital World?
How To Safeguard Your Data in This Digital World?ACS Networks & Technologies
 
How To Safeguard Your Data in This Digital World?
How To Safeguard Your Data in This Digital World?How To Safeguard Your Data in This Digital World?
How To Safeguard Your Data in This Digital World?ACS Networks & Technologies
 
Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Fuji Xerox Asia Pacific
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 

Semelhante a Online Focus Groups Privacy and Security Considerations (20)

Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Ief information day 2017
Ief information day 2017Ief information day 2017
Ief information day 2017
 
Where in the world is your Corporate data?
Where in the world is your Corporate data?Where in the world is your Corporate data?
Where in the world is your Corporate data?
 
Share point encryption
Share point encryptionShare point encryption
Share point encryption
 
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
festival ICT 2013: La consumerizzazione dell’IT: come coglierne i vantaggi ec...
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
 
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy TechniqueIRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
IRJET- Medical Big Data Protection using Fog Computing and Decoy Technique
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
How To Safeguard Your Data in This Digital World?
How To Safeguard Your Data in This Digital World?How To Safeguard Your Data in This Digital World?
How To Safeguard Your Data in This Digital World?
 
How To Safeguard Your Data in This Digital World?
How To Safeguard Your Data in This Digital World?How To Safeguard Your Data in This Digital World?
How To Safeguard Your Data in This Digital World?
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?Cloud Types and Security- Which one is right for you?
Cloud Types and Security- Which one is right for you?
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 

Mais de Alfonso Sintjago

GAPSA - UMN Alumni Association Update - Jan 2015
GAPSA - UMN Alumni Association Update - Jan 2015GAPSA - UMN Alumni Association Update - Jan 2015
GAPSA - UMN Alumni Association Update - Jan 2015Alfonso Sintjago
 
ICT4D - Mobiles Phones and New Possibilities (Dominican Republic - Case Study)
ICT4D - Mobiles Phones and New Possibilities (Dominican Republic - Case Study)ICT4D - Mobiles Phones and New Possibilities (Dominican Republic - Case Study)
ICT4D - Mobiles Phones and New Possibilities (Dominican Republic - Case Study)Alfonso Sintjago
 
Educación Movil y TICS Para El Desarrollo (ICT4D) - Proyecto Piloto
Educación Movil y TICS Para El Desarrollo (ICT4D) - Proyecto PilotoEducación Movil y TICS Para El Desarrollo (ICT4D) - Proyecto Piloto
Educación Movil y TICS Para El Desarrollo (ICT4D) - Proyecto PilotoAlfonso Sintjago
 
Mobile Phones and Development - Preliminary Results - Pilot Project (Dominica...
Mobile Phones and Development - Preliminary Results - Pilot Project (Dominica...Mobile Phones and Development - Preliminary Results - Pilot Project (Dominica...
Mobile Phones and Development - Preliminary Results - Pilot Project (Dominica...Alfonso Sintjago
 
Augmented Reality and Education - Infographic (Leapfrog Initiatives)
Augmented Reality and Education - Infographic (Leapfrog Initiatives)Augmented Reality and Education - Infographic (Leapfrog Initiatives)
Augmented Reality and Education - Infographic (Leapfrog Initiatives)Alfonso Sintjago
 
Robotics and Education - Infographic (Leapfrog Initiatives)
Robotics and Education - Infographic (Leapfrog Initiatives)Robotics and Education - Infographic (Leapfrog Initiatives)
Robotics and Education - Infographic (Leapfrog Initiatives)Alfonso Sintjago
 
Open Minnesota (OER 2013) - Open Governance, Open Policies, and Affordable Ed...
Open Minnesota (OER 2013) - Open Governance, Open Policies, and Affordable Ed...Open Minnesota (OER 2013) - Open Governance, Open Policies, and Affordable Ed...
Open Minnesota (OER 2013) - Open Governance, Open Policies, and Affordable Ed...Alfonso Sintjago
 
Finding Common Ground - GAPSA Evaluation
Finding Common Ground - GAPSA EvaluationFinding Common Ground - GAPSA Evaluation
Finding Common Ground - GAPSA EvaluationAlfonso Sintjago
 
Mobile Apps For Evaluators (Top App Categories for Evaluators in Android and ...
Mobile Apps For Evaluators (Top App Categories for Evaluators in Android and ...Mobile Apps For Evaluators (Top App Categories for Evaluators in Android and ...
Mobile Apps For Evaluators (Top App Categories for Evaluators in Android and ...Alfonso Sintjago
 
Video presentation Workshop (Draft)
Video presentation Workshop (Draft)Video presentation Workshop (Draft)
Video presentation Workshop (Draft)Alfonso Sintjago
 
Moodle In The Dominican Republic
Moodle In The Dominican RepublicMoodle In The Dominican Republic
Moodle In The Dominican RepublicAlfonso Sintjago
 
Booksprint Presentation CIES 2013
Booksprint Presentation CIES 2013Booksprint Presentation CIES 2013
Booksprint Presentation CIES 2013Alfonso Sintjago
 
Open Education 2013 - Activities
Open Education 2013 - ActivitiesOpen Education 2013 - Activities
Open Education 2013 - ActivitiesAlfonso Sintjago
 
Thoughtful Design - Year Walk
Thoughtful Design - Year WalkThoughtful Design - Year Walk
Thoughtful Design - Year WalkAlfonso Sintjago
 
2012 Treks Mobile App Evaluation
2012 Treks Mobile App Evaluation2012 Treks Mobile App Evaluation
2012 Treks Mobile App EvaluationAlfonso Sintjago
 
GAPSA Organization and Goals
GAPSA Organization and GoalsGAPSA Organization and Goals
GAPSA Organization and GoalsAlfonso Sintjago
 
2013 - Booksprint - Future of Ed
2013 - Booksprint - Future of Ed2013 - Booksprint - Future of Ed
2013 - Booksprint - Future of EdAlfonso Sintjago
 
2012-2013 - Main Changes GAPSA
2012-2013 - Main Changes GAPSA2012-2013 - Main Changes GAPSA
2012-2013 - Main Changes GAPSAAlfonso Sintjago
 

Mais de Alfonso Sintjago (20)

GAPSA - UMN Alumni Association Update - Jan 2015
GAPSA - UMN Alumni Association Update - Jan 2015GAPSA - UMN Alumni Association Update - Jan 2015
GAPSA - UMN Alumni Association Update - Jan 2015
 
IT Fellow
IT FellowIT Fellow
IT Fellow
 
ICT4D - Mobiles Phones and New Possibilities (Dominican Republic - Case Study)
ICT4D - Mobiles Phones and New Possibilities (Dominican Republic - Case Study)ICT4D - Mobiles Phones and New Possibilities (Dominican Republic - Case Study)
ICT4D - Mobiles Phones and New Possibilities (Dominican Republic - Case Study)
 
Educación Movil y TICS Para El Desarrollo (ICT4D) - Proyecto Piloto
Educación Movil y TICS Para El Desarrollo (ICT4D) - Proyecto PilotoEducación Movil y TICS Para El Desarrollo (ICT4D) - Proyecto Piloto
Educación Movil y TICS Para El Desarrollo (ICT4D) - Proyecto Piloto
 
Mobile Phones and Development - Preliminary Results - Pilot Project (Dominica...
Mobile Phones and Development - Preliminary Results - Pilot Project (Dominica...Mobile Phones and Development - Preliminary Results - Pilot Project (Dominica...
Mobile Phones and Development - Preliminary Results - Pilot Project (Dominica...
 
Augmented Reality and Education - Infographic (Leapfrog Initiatives)
Augmented Reality and Education - Infographic (Leapfrog Initiatives)Augmented Reality and Education - Infographic (Leapfrog Initiatives)
Augmented Reality and Education - Infographic (Leapfrog Initiatives)
 
Robotics and Education - Infographic (Leapfrog Initiatives)
Robotics and Education - Infographic (Leapfrog Initiatives)Robotics and Education - Infographic (Leapfrog Initiatives)
Robotics and Education - Infographic (Leapfrog Initiatives)
 
Open Minnesota (OER 2013) - Open Governance, Open Policies, and Affordable Ed...
Open Minnesota (OER 2013) - Open Governance, Open Policies, and Affordable Ed...Open Minnesota (OER 2013) - Open Governance, Open Policies, and Affordable Ed...
Open Minnesota (OER 2013) - Open Governance, Open Policies, and Affordable Ed...
 
Finding Common Ground - GAPSA Evaluation
Finding Common Ground - GAPSA EvaluationFinding Common Ground - GAPSA Evaluation
Finding Common Ground - GAPSA Evaluation
 
Mobile Apps For Evaluators (Top App Categories for Evaluators in Android and ...
Mobile Apps For Evaluators (Top App Categories for Evaluators in Android and ...Mobile Apps For Evaluators (Top App Categories for Evaluators in Android and ...
Mobile Apps For Evaluators (Top App Categories for Evaluators in Android and ...
 
Virtual Ethnography
Virtual EthnographyVirtual Ethnography
Virtual Ethnography
 
Video presentation Workshop (Draft)
Video presentation Workshop (Draft)Video presentation Workshop (Draft)
Video presentation Workshop (Draft)
 
Moodle In The Dominican Republic
Moodle In The Dominican RepublicMoodle In The Dominican Republic
Moodle In The Dominican Republic
 
Booksprint Presentation CIES 2013
Booksprint Presentation CIES 2013Booksprint Presentation CIES 2013
Booksprint Presentation CIES 2013
 
Open Education 2013 - Activities
Open Education 2013 - ActivitiesOpen Education 2013 - Activities
Open Education 2013 - Activities
 
Thoughtful Design - Year Walk
Thoughtful Design - Year WalkThoughtful Design - Year Walk
Thoughtful Design - Year Walk
 
2012 Treks Mobile App Evaluation
2012 Treks Mobile App Evaluation2012 Treks Mobile App Evaluation
2012 Treks Mobile App Evaluation
 
GAPSA Organization and Goals
GAPSA Organization and GoalsGAPSA Organization and Goals
GAPSA Organization and Goals
 
2013 - Booksprint - Future of Ed
2013 - Booksprint - Future of Ed2013 - Booksprint - Future of Ed
2013 - Booksprint - Future of Ed
 
2012-2013 - Main Changes GAPSA
2012-2013 - Main Changes GAPSA2012-2013 - Main Changes GAPSA
2012-2013 - Main Changes GAPSA
 

Último

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Último (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Online Focus Groups Privacy and Security Considerations

  • 1. Online Focus Groups: Privacy and Security Alfonso Sintjago & Caryn E. Lindsay AEA Conference Oct. 26, 2012 Minneapolis, MN
  • 2. Colleagues Have Discussed ● Benefits ● Utility ● Selecting a platform ● Making connections
  • 3. Issues of Concern Data Privacy ● “Many Internet users fail to realize that something once put online more or less stays online and may be retrieved by others and replicated” (Walther, 2011, pg. 4). (High Levels of Variability) Data Security ● The policies enacted by third parties, which could be the internet service provider (ISP), the cookies on the browser, web beacons, the server(s) where the data is stored, or the online service(s) utilized, may result in the legal or illegal selling and purchase of research data by additional parties (Craig & Ludloff, 2011).
  • 4. Security Considerations for Platform Selection unrecognized vulnerabilities within software capabilities to address vulnerabilities hosting internally or hosting externally security level utilized by servers online programs allow for interaction complexity can increase weaknesses data could be not digitized limiting copies of the information May be subject to IRB, FERPA, or HIPAA regulations
  • 5. Relevant Online Security Elements to Consider Services are as vulnerable to hacking as their weakest line of code (Bailey, 2012; Stuttard & Pinto, 2011)
  • 6. The Unique Environment of an Online Focus Group ● If participants do not trust a system, it is less likely that the focus group will gain the valuable data it hopes to obtain (Gottman, 2011; Metzger, 2004). ● Trust is also an essential element for the effective functioning of a society (Schneier, 2012). ● As a qualitative research method, a focus group “explicitly use[s] interaction as part of the method” (Kitzinger, 1995, pg. 299).
  • 7. Figure 1.2 – Traditional Focus Group (Flow of Data – Parties with Access to Data) Figure 1.1 – Internet Focus Group (Flow of Data – Parties with Access to Data) When selecting platforms, consider signing business associate agreements
  • 8. Sen. Al Franken - (D-MN) on Social Media Remember to ask: What is the revenue model? How does the business make a profit? “You [users] are not their client, you are their product.”
  • 9. Careful Analysis and Consideration Despite the benefits of the platforms for social networking, Facebo , Twitter, and Google may not provide users with the privacy that may be desired by a research-oriented focus group, particularly when dealing with delicate subject matters such as traumatic experiences, socially unacceptable opinions, and other confidential information.
  • 10. Overview of Major Risks - # 1 Data Transferability ● Information in the Cloud is hard to delete and/or access ● Increased smartphone use + recording capability (50%+ own smart phones) ● Multiple copies of Cloud data (Reliability vs. Security) ● Data accessible through more devices
  • 11. Overview of Major Risks - # 2 Hacking and Password Vulnerability ● Many well known organizations have been hacked (LinkedIn, New York Times, DOJ, Bank of America, Google, etc) ● Importance of longer passwords (7+ Digits) Increased understanding of user choices ● Use of different passwords (10%+ use 1234) (database of 3.4million four-digit passwords)
  • 12. Overview of Major Risks - #3 Provider Practices ● Average Security Policy is Too Long (2000+ Words) 1200 websites visited, requiring an average of 201 hours a year ● Privacy Implications May be Difficult to Understand ● Many Organizations Collect and Sell Data ● Privacy Policies Can be Suddenly Modified
  • 13. Examples ● Comcast retains users’ data for over 180 days; ● AOL previously released the partially anonymized data of over 600,000 users; ● Sonic.net only retains users’ clickstream data for two weeks (Kirk, 2006; Greenberg, 2012).
  • 14. Options ● Use and visit trusted secure sites, applications. ● TRUSTe, WOT, McAfee SiteAdvisor, Haute Secure, etc. ● HTTPS and Encrypted Comm, Encrypted Drives ● Virtual Private Network (VPN) and Proxies in countries with laws with the better privacy protection ● TOR (https://www.torproject.org/)
  • 15. Elements to Consider When Selecting a Platform - 1 Conducting an Online Questions for Moderator Focus Group 1- Requirements of the Study Must it meet HIPAA privacy standards? Is the data sensitive? 2- Concerns of the Participant Will the participant feel comfortable in this environment? 3- Anonymity of participants Can participants participate without being identified? 4- Data encryption Must the data be encrypted? Is the data encrypted? 5- Server Location Must the data be stored locally, can it be stored on the cloud? 6- Selection of Participants Are there benefits from having access to social network data? 7- Terms of Agreement Are the terms of agreement acceptable and favorable? 8- Control over Change Can the platform privacy be modified without your input? 9- Notification of Changes How will the service provider notify you of policy changes? 10- History of the Company Is the site trusted (TRUSTe, etc)? Recent misuses of data?
  • 16. Elements to Consider When Selecting a Platform - 2 Conducting an Online Questions for Moderator Focus Group 11- Ownership of Data Is the data owned or shared by the service provider? 12- Access to the Data Is the data accessible to anyone on the Internet? 13- Security from Users Can the data be easily copied and distributed by users? 14- Security from Outsiders Could the data be stolen by a third party? 15- Anonymity of Data Will the provider anonymize the data? 16- Selling of Data Can the service provider sell the focus group data? 17- Modifications to Platform Can the platform be modified? Can its security be enhanced? 18- Access to the Source Code Do you have access to the source code? Can you modify it? 19- Linking of Participant Data Can the data be easily linked to other data from that user?
  • 17. Recommendations Choosing the ‘best’ platform depends upon many factors Data may be used by companies in unexpected ways Data may be accessed illegally by third parties Digitized data can be easily duplicated and transferred Misuses of data can have serious consequences A sincere attempt to protect privacy must be taken Decide whether or not you trust any third parties involved Online or Offline, focus groups are based on trust!
  • 18. PRIMARY ONLINE PROGRAMS CONSIDERED BY UMN’S ONLINE FOCUS GROUP RESEARCH TEAM
  • 19. Skype More Information: http://www.skype.com/intl/en-us/security/ http://www.skype.com/intl/en/legal/privacy/general/ (available since 2003) Privacy Policy Last Updated: June 2012 Overview: Video and voice over IP Software, High Bandwidth, Real-Time, Multi- Platform With over 650 million users, Skype is the largest Voice Over Internet Protocol (VOIP) Skype uses secure algorithms and standards (RSA and AES) to protect users from hackers and phishing. EDUCAUSE experts were concerned in 2007 about the level of access to network ports that Skype required from computers that utilized the software “Skype will not sell, rent, trade or otherwise transfer any personal and/or traffic data or communications content outside of Microsoft and its controlled subsidiaries and affiliates without your explicit permission, unless it is obliged to do so under applicable laws or by order of the competent authorities.”
  • 20. Adobe Connect (available since 2003) Privacy Policy Last Updated: May 2012 Overview: Multiple deployment options. Web Presentations and Video Conferencing Adobe Connect can be customized and hosted locally allowing for the incorporation of additional security features if required by HIPAA or FERPA. Since 2011, Adobe allows Adobe Connect to be licensed in three ways Security functions include the ability to disable undesired functionalities, control over access to meeting rooms, allows for SSL encryption, best practices for password management policies, easy-to-use administration console that enables for the configuration of LDAP (Lightweight Directory Access Protocol) server details, authentication methods, query page-size limits, and other valuable security features. More Information: http://www.adobe.com/privacy/policy.edu.html http://www.adobe.com/products/adobeconnect/features.edu.html
  • 21. Ning More Information: http://www.ning.com/about/legal/privacy/ http://www.ning.com/about/safety/ (available since 2003) Privacy Policy Last Updated: December 2010 Overview: Private social network. Cloud-based environment. Does not profit from the sale of data - requires users to pay for the cost of maintaining their space. Ning allows an organization to purchase their own Ning installation Utilized by a large number of educational communities Users cannot host Ning within their own servers (must be hosted by Ning) Does not utilize https and not HIPAA Compliant
  • 22. More Information: http://docs.moodle.org/23/en/Security_FAQ Moodle http://docs.moodle.org/23/en/Security_recommendations (available since 2002) http://moodle.org/security/ Privacy Policy Last Updated: Will vary depending on the installation Overview: Modular Object-Oriented Dynamic Learning Environment. OSS Learning Management System (LMS). Moodle is a highly customizable platform that can be hosted on most servers. Currently used in 220 countries, in over 65 thousand sites (http://moodle.org/stats/). Moodlerooms.com offers Moodle hosting services that are HIPAA and FERPA compliant Large community of developers working to improve the platform. As an open source software, anyone could find its vulnerabilities. (No Backdoor Access) Installations may or may not utilize https and robust user authorization systems.
  • 23. Internet Start Up Companies (Varies by Start Up) Privacy Policy Last Updated: Will vary depending on the start up. Overview: Large number of programs with multiple advantages. May be more willing to meet HIPAA and other security requirements than a larger company Privacy could increased for participants if an internal product is developed A start up could change its business plan or fail to secure data properly With the exception of Moodle all other discussed sites have been awarded a TRUSTe seal Carefully consider a partnership with a start up, especially if the data is of delicate nature Adapting software that is already available to meet a different function can be complicated No online environment addressed all of the elements discussed by other team members