SlideShare a Scribd company logo
1 of 74
Social Distortion: Privacy, Consent, and Social Networks H. Brian Holland Visiting Associate Professor of Law Dickinson School of Law at Penn State University
Not talking about covert surveillance Not talking about the government but rather Voluntary disclosure of personal information to private institutions
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Paradox of the Privacy “Market”
We say one thing. I want my privacy. We do something else. Here’s my data.  Take what you want. (just give me my stuff)
Examples
The claim 43% of online users claim  that they are likely to read the privacy policy  of an ecommerce site before buying anything
The reality 26% actually consulted the privacy policy Even more odd, essentially no difference between privacy fundamentalists, pragmatists, or the unconcerned
The claim 71% want to control  who can access their personal information
The reality ~ 75% have supplied first name last name email street address ~ 50% have supplied phone number birthday credit card information (to e-commerce sites)
Why the paradox between professed attitude and actual behavior?
Blame it on the market and the law of the market
Starting point The current market for transferring personal information (1) revelation (mere disclosure) (2) consent – express or implied
Any regulation? some  targeted limits on: extremely invasive collection and use (privacy torts) certain kinds of data (e.g. health records) certain subjects of data (e.g. kids)
But most data can be collected or given away very cheaply. So, why do we consent so easily? 3 points
Lack of legal control over data No property rights in personal data Lack of bargaining power Inability to control downstream rights 1
The decline of consent contracting Contracts as standardized commodities Contracts as part of the product 2
Market distortions (behavioral economics) Incomplete or asymmetric information Bounded rationality Systemic psychological deviations from rationality 3
Creates artificially low prices for personal information consent is cheap
Personal information as a commodity.
Social Network Sites Market distortions on steroids.
A social-tools model of production An effective tool of coordination A plausible promise (the basic “why” to join or contribute) An acceptable bargain with users
But is it a bad bargain for users? Capturing users’ personal information Privacy 1.0 – Centralized data collection, storage and aggregation Privacy 2.0 – Peers as both sensors and producers Owning user’s personal information (storage, use, transfer)
Why consent to a bad bargain? What do users get?
New and powerful market distortions
Two integrated points Social network sites are … (1)  Altering the basic structure of the information exchange agreement (2)  Benefiting from certain social phenomena that are driving us to join the network and to disclose a lot of personal information
The structure of the information-exchange agreement consent recedes into the background First point
The classic e-commerce model Money Personal information associated with delivery of current goods or services and the provision of future goods or services Merchandise Services Database ?? ?? ??
The g-mail model Initial negotiation and transaction (looks like the ecommerce model) A little bit of personal information In exchange for services
The g-mail model Lots of personal information Subsequent negotiations and transactions for the exchange of personal information between contacts
The g-mail model Lots of personal information Lots of personal information Not holding? Not passing on? Ads Gmail recedes into the background, almost as a third-party beneficiary of these subsequent transactions (info exchange) between contacts
The Social Network Site model A little bit of personal information In exchange for services
The Social Network Site model Lots of personal information Lots of personal information A little bit of personal information In exchange for services
The Social Network Site model A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ???
The Social Network Site model A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ??? Database ?? ?? ?? Ads Ads Ads
Certain social phenomena Driving us to join the network and Driving us to disclose a lot of personal information Second point
Social phenomena (a)  The evolution of social organization toward social networks and networked individualism (b)  Online identity performance assertions of digital identity processes of identity formation
Glocalized Relationships Networked Individualism Bounded Groups (a) The evolution of social organization (from little boxes to social networks) neighborhoods households workplaces ??
Networked individualism Relationship unhinged from location Person-to-person connectivity (replacing place-to-place) Facilitating larger, more fragmented networks
Using technology to manage intimacy in larger, more fragmented social networks The email example Asynchronous Flexible Control Contact with multiple people
Social network sites Flexible, asynchronous communication + Leveraging our need to build and maintain relationships
Need for community Need to remain connected Need to retain and create common experience Need to engage peer opinion and build reputation
Personal information is at the heart of relationship This is how we create intimacy
Not  basic identifiers or contact information Truly personal information Expressions of Self Preferences Graphic representations Affiliations Acts and activities Sexuality Identity
(b)  Online identity performance Assertions of digital identity (all users) Process of identity formation   (younger users)
Assertions of digital identity (all users) Traditional identity clues are not available
So we compensate Other clues More information More communication time Using networks to triangulate and authenticate (to overcome ease of manipulation)
Process of identity formation (younger users) Using digital space to … Work out identity and status Make sense of cultural clues and societal norms Negotiate public life
Part of this is taking risks Putting yourself out there Pushing boundaries Gauging reactions What is acceptable and what is not?
Just as with intimate relationships Personal information is at the heart of  identity performance
Acts of articulation Text Images Audio Video Developing a virtual presence or identity.
and social networks get it all A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ??? Database ?? ?? ??
Terms of Service and Privacy Policies * highlights *
 
 
 
 
And users consent to all of this …
So, what’s my point?
It’s not just immature and irresponsible kids Just say “no” Would you want your grandmother to read it! Would you post it in Times Square?
There are real, concrete reasons for posting  so much personal information. They won’t simply “grow out of it”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why they won’t work
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Ineffective at altering the decision to provide consent
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Focus on the wrong problem: misuse rather than consent
“ If a person consents to most of these activities,  there is no privacy violation.” Daniel J. Solove A Taxonomy of Privacy
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Interference with autonomy & Negative impact on functionality
What  will  work?
Goal Regulate privacy and Preserve the benefits of new social spaces (functionality)
Is it really a problem? How much of a problem is it? What do users really want?
Focus Emerging social norms of “ network” privacy
Regulating data-flow between networks Architecture/Design User-controlled partitions Technology Tagging data Contextual data Law Restrictions on downstream use and transfer Restrictions on network-crossing Data portability
Regulating data-use within networks The market is more likely to work The “Beacon” example Strengthened by portability Social norms will develop
Thank you.

More Related Content

What's hot

Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity Management
George Roberts
 
Developing a Social Media Policy
Developing a Social Media PolicyDeveloping a Social Media Policy
Developing a Social Media Policy
Eric Schwartzman
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
shibrah76
 

What's hot (20)

Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
 
Social crm comes of age
Social crm comes of ageSocial crm comes of age
Social crm comes of age
 
Personal identity Management
Personal identity ManagementPersonal identity Management
Personal identity Management
 
You Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social MediaYou Tweeted WHAT?!: Legal Risks of Social Media
You Tweeted WHAT?!: Legal Risks of Social Media
 
A new model for building online trust in b2 c
A new model for building online trust in b2 cA new model for building online trust in b2 c
A new model for building online trust in b2 c
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 
Social Media: Managing Legal Risks
Social Media: Managing Legal RisksSocial Media: Managing Legal Risks
Social Media: Managing Legal Risks
 
Developing a Social Media Policy
Developing a Social Media PolicyDeveloping a Social Media Policy
Developing a Social Media Policy
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan HeuerYour Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
GDPR: New Privacy Rules, Digital Communications, Marketing Opportunities
GDPR: New Privacy Rules, Digital Communications, Marketing OpportunitiesGDPR: New Privacy Rules, Digital Communications, Marketing Opportunities
GDPR: New Privacy Rules, Digital Communications, Marketing Opportunities
 
CS4001 Final Ethics Paper
CS4001 Final Ethics PaperCS4001 Final Ethics Paper
CS4001 Final Ethics Paper
 
Dow Jones Government Round Table Collaboration And Metadata
Dow Jones Government Round Table   Collaboration And MetadataDow Jones Government Round Table   Collaboration And Metadata
Dow Jones Government Round Table Collaboration And Metadata
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Monetizing the mobile social graph
Monetizing the mobile social graphMonetizing the mobile social graph
Monetizing the mobile social graph
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 
2019 Trends in Legal Marketing, Including Ethics
2019 Trends in Legal Marketing, Including Ethics2019 Trends in Legal Marketing, Including Ethics
2019 Trends in Legal Marketing, Including Ethics
 

Viewers also liked (7)

Mindlab
MindlabMindlab
Mindlab
 
Presentation Aids Conference
Presentation Aids ConferencePresentation Aids Conference
Presentation Aids Conference
 
Manejo del conflicto 2
Manejo del conflicto 2 Manejo del conflicto 2
Manejo del conflicto 2
 
Niver Luciano - 24.02.07
Niver Luciano - 24.02.07Niver Luciano - 24.02.07
Niver Luciano - 24.02.07
 
Besondere Fotos
Besondere FotosBesondere Fotos
Besondere Fotos
 
D Fquebellomundo
D FquebellomundoD Fquebellomundo
D Fquebellomundo
 
Preserving Aquatic Ecosystems
Preserving Aquatic EcosystemsPreserving Aquatic Ecosystems
Preserving Aquatic Ecosystems
 

Similar to Social Distortion: Privacy, Consent, and Social Networks

1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf
AroraRajinder1
 

Similar to Social Distortion: Privacy, Consent, and Social Networks (20)

Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Big data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big data
Big data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big dataBig data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big data
Big data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big data
 
Sogeti on big data creating clarity
Sogeti on big data creating claritySogeti on big data creating clarity
Sogeti on big data creating clarity
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
 
Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?Carpe Datum! Who knows who you are?
Carpe Datum! Who knows who you are?
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT
 Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT
Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNT
 
Ryan ziemba marketing consulting deck
Ryan ziemba   marketing consulting deckRyan ziemba   marketing consulting deck
Ryan ziemba marketing consulting deck
 
The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Media
 
1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf1 Explain the principle of privacy. What impact has IT made on priv.pdf
1 Explain the principle of privacy. What impact has IT made on priv.pdf
 
Open Data - context of Open Government in Edmonton
Open Data - context of Open Government in EdmontonOpen Data - context of Open Government in Edmonton
Open Data - context of Open Government in Edmonton
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Legal Issues Re: Social Media for the Regulated Utility Industry
Legal Issues Re: Social Media for the Regulated Utility IndustryLegal Issues Re: Social Media for the Regulated Utility Industry
Legal Issues Re: Social Media for the Regulated Utility Industry
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Social Distortion: Privacy, Consent, and Social Networks

  • 1. Social Distortion: Privacy, Consent, and Social Networks H. Brian Holland Visiting Associate Professor of Law Dickinson School of Law at Penn State University
  • 2. Not talking about covert surveillance Not talking about the government but rather Voluntary disclosure of personal information to private institutions
  • 3.
  • 4. The Paradox of the Privacy “Market”
  • 5. We say one thing. I want my privacy. We do something else. Here’s my data. Take what you want. (just give me my stuff)
  • 7. The claim 43% of online users claim that they are likely to read the privacy policy of an ecommerce site before buying anything
  • 8. The reality 26% actually consulted the privacy policy Even more odd, essentially no difference between privacy fundamentalists, pragmatists, or the unconcerned
  • 9. The claim 71% want to control who can access their personal information
  • 10. The reality ~ 75% have supplied first name last name email street address ~ 50% have supplied phone number birthday credit card information (to e-commerce sites)
  • 11. Why the paradox between professed attitude and actual behavior?
  • 12. Blame it on the market and the law of the market
  • 13. Starting point The current market for transferring personal information (1) revelation (mere disclosure) (2) consent – express or implied
  • 14. Any regulation? some targeted limits on: extremely invasive collection and use (privacy torts) certain kinds of data (e.g. health records) certain subjects of data (e.g. kids)
  • 15. But most data can be collected or given away very cheaply. So, why do we consent so easily? 3 points
  • 16. Lack of legal control over data No property rights in personal data Lack of bargaining power Inability to control downstream rights 1
  • 17. The decline of consent contracting Contracts as standardized commodities Contracts as part of the product 2
  • 18. Market distortions (behavioral economics) Incomplete or asymmetric information Bounded rationality Systemic psychological deviations from rationality 3
  • 19. Creates artificially low prices for personal information consent is cheap
  • 20. Personal information as a commodity.
  • 21. Social Network Sites Market distortions on steroids.
  • 22. A social-tools model of production An effective tool of coordination A plausible promise (the basic “why” to join or contribute) An acceptable bargain with users
  • 23. But is it a bad bargain for users? Capturing users’ personal information Privacy 1.0 – Centralized data collection, storage and aggregation Privacy 2.0 – Peers as both sensors and producers Owning user’s personal information (storage, use, transfer)
  • 24. Why consent to a bad bargain? What do users get?
  • 25. New and powerful market distortions
  • 26. Two integrated points Social network sites are … (1) Altering the basic structure of the information exchange agreement (2) Benefiting from certain social phenomena that are driving us to join the network and to disclose a lot of personal information
  • 27. The structure of the information-exchange agreement consent recedes into the background First point
  • 28. The classic e-commerce model Money Personal information associated with delivery of current goods or services and the provision of future goods or services Merchandise Services Database ?? ?? ??
  • 29. The g-mail model Initial negotiation and transaction (looks like the ecommerce model) A little bit of personal information In exchange for services
  • 30. The g-mail model Lots of personal information Subsequent negotiations and transactions for the exchange of personal information between contacts
  • 31. The g-mail model Lots of personal information Lots of personal information Not holding? Not passing on? Ads Gmail recedes into the background, almost as a third-party beneficiary of these subsequent transactions (info exchange) between contacts
  • 32. The Social Network Site model A little bit of personal information In exchange for services
  • 33. The Social Network Site model Lots of personal information Lots of personal information A little bit of personal information In exchange for services
  • 34. The Social Network Site model A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ???
  • 35. The Social Network Site model A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ??? Database ?? ?? ?? Ads Ads Ads
  • 36. Certain social phenomena Driving us to join the network and Driving us to disclose a lot of personal information Second point
  • 37. Social phenomena (a) The evolution of social organization toward social networks and networked individualism (b) Online identity performance assertions of digital identity processes of identity formation
  • 38. Glocalized Relationships Networked Individualism Bounded Groups (a) The evolution of social organization (from little boxes to social networks) neighborhoods households workplaces ??
  • 39. Networked individualism Relationship unhinged from location Person-to-person connectivity (replacing place-to-place) Facilitating larger, more fragmented networks
  • 40. Using technology to manage intimacy in larger, more fragmented social networks The email example Asynchronous Flexible Control Contact with multiple people
  • 41. Social network sites Flexible, asynchronous communication + Leveraging our need to build and maintain relationships
  • 42. Need for community Need to remain connected Need to retain and create common experience Need to engage peer opinion and build reputation
  • 43. Personal information is at the heart of relationship This is how we create intimacy
  • 44. Not basic identifiers or contact information Truly personal information Expressions of Self Preferences Graphic representations Affiliations Acts and activities Sexuality Identity
  • 45. (b) Online identity performance Assertions of digital identity (all users) Process of identity formation (younger users)
  • 46. Assertions of digital identity (all users) Traditional identity clues are not available
  • 47. So we compensate Other clues More information More communication time Using networks to triangulate and authenticate (to overcome ease of manipulation)
  • 48. Process of identity formation (younger users) Using digital space to … Work out identity and status Make sense of cultural clues and societal norms Negotiate public life
  • 49. Part of this is taking risks Putting yourself out there Pushing boundaries Gauging reactions What is acceptable and what is not?
  • 50. Just as with intimate relationships Personal information is at the heart of identity performance
  • 51. Acts of articulation Text Images Audio Video Developing a virtual presence or identity.
  • 52. and social networks get it all A little bit of personal information In exchange for services Lots of personal information Lots of personal information Lots and lots and lots and lots of personal information In exchange for ??? Database ?? ?? ??
  • 53. Terms of Service and Privacy Policies * highlights *
  • 54.  
  • 55.  
  • 56.  
  • 57.  
  • 58. And users consent to all of this …
  • 59. So, what’s my point?
  • 60. It’s not just immature and irresponsible kids Just say “no” Would you want your grandmother to read it! Would you post it in Times Square?
  • 61. There are real, concrete reasons for posting so much personal information. They won’t simply “grow out of it”
  • 62.
  • 64.
  • 65.
  • 66. “ If a person consents to most of these activities, there is no privacy violation.” Daniel J. Solove A Taxonomy of Privacy
  • 67.
  • 68. What will work?
  • 69. Goal Regulate privacy and Preserve the benefits of new social spaces (functionality)
  • 70. Is it really a problem? How much of a problem is it? What do users really want?
  • 71. Focus Emerging social norms of “ network” privacy
  • 72. Regulating data-flow between networks Architecture/Design User-controlled partitions Technology Tagging data Contextual data Law Restrictions on downstream use and transfer Restrictions on network-crossing Data portability
  • 73. Regulating data-use within networks The market is more likely to work The “Beacon” example Strengthened by portability Social norms will develop