SlideShare una empresa de Scribd logo
1 de 22
Data protection and
    social networks
Data: Pew Research Center, Internet and American Life Surveys
Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
Which data are social networks
storing?
• In 2011, Austrian law student
  Max Schrems received 1,222
  pages of data after subject
  access request to Facebook
• Searches, pages viewed,
  relationships with friends,
  events, like button tracking,
  cookies, conversation tracking…
• Facebook now has data
  download tool, supplies 39 of 84
  data categories held               TouchGraph Facebook Browser
Data: CareerBuilder, online, fieldwork 17/11/09-2/12/09, probability
 sample of 407 UK private sector employers, sample error ±4.41%
Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
Reasonable expectations?
     • Oxford students fined on basis of Facebook photos of exam
       celebrations. Whose “fault”?
        • Students who didn’t take appropriate security measures
          using available tools?
        • Oxford proctors for snooping on a “private place”?
        • Facebook because it did not provide the right defaults for
          a “reasonable expectation of privacy”?
     • A29WP: “SNS should ensure privacy-friendly and free of
       charge default settings are in place restricting access to self-
       selected contacts”
     • Canadian Privacy Commissioner: “Facebook’s default
       settings in respect of photo albums and search engines do
       not meet users’ reasonable expectations”
Data shared about third parties
                              • How far can users control what
                                is “tagged” with their identifier?
                              • Facial recognition
                              • A29WP: “Users should be
                                advised by SNS that pictures or
                                information about other
                                individuals, should only be
                                uploaded with the individual’s
TouchGraph Facebook Browser
                                consent.”
Facebook Platform
• Over 9m apps and integrated websites as of March 2012
• “Social Plugins” are revealing browsing behaviour across the Web to
  Facebook and Twitter – used by latter for profiling (10 days of
  records). Banned in Schleswig-Holstein
• X’s app consent may reveal personal data about Y, and transmit
  user IDs to ad tracking companies
• Canadian Privacy Commissioner: “Facebook should be doing much
  more to ensure that meaningful consent is duly obtained from users
  when developers access their personal information [and]
  technological safeguards that will not simply forbid, but effectively
  prevent, developers’ unauthorized access to personal information
  that they do not need.”
Young people and privacy
• Most young people see Internet as private space for talking to
    (already-known) friends, and target information to peer group
•   Lenhart et al. (2007) found stricter access controls on photos/videos
    by teens than adults (76% v 58% most of time/sometimes)
•   Teens showed higher privacy concerns with parental monitoring;
    parental discussions increased privacy concerns and reduced
    disclosure
•   Human impulse to connect and share information with friends, but
    when mediated can easily be replicated and spread to places never
    intended. Teens less good at managing collapsed contexts (boyd,
    Marwick)
•   Adult users of social media are developing similar behaviours –
    consequence of mediation, not age (Marwick et al. 2010)
Young adults and privacy
• Hoofnagle et al. (2010) found very limited understanding
  of privacy laws among young adults – 42% answered all 5
  questions incorrectly
• Jones et al. surveyed 7,421 students at 40 US colleges.
  75% concerned about passwords, SSNs, credit card
  numbers but few about SNSes due to insignificant
  consequences (2009)
Student information disclosure




 What kind of personal information do you post online? (first year N=177, final year N=133) Oostveen
 (2010)
Sampling Facebook Experiences
                                                       Facebook Application
                                                        Location disclosed to friends



                                Server
                                 Data are collected
                                in our server
                                 Questions are
                                sent to participants
                                                            Aims
                                                            To understand:
                                through SMS
                                                             Why do students share
                                                            their location
                                                             How (text, picture)
                                                             When, to whom they
Mobile phones carried by students                           share this location
 Location retrieved with embedded GPS                       At what locations are
 Subjects answer questions (e.g., sharing choices)         they more willing to share
Location sharing




•    40 participants responded to over 2000 questions over 2 weeks
•    Participants are more willing to share their location when they are in ‘Leisure’ or
    ‘Academic’ locations than in the ‘Library’ or in ‘Residential’ areas.
                                                 Abdesslem, Parris & Henderson (2010)
Privacy is contextual
• “Contrary to the assumption … that people have
 stable, coherent, preferences with respect to
 privacy, we find that concern about privacy … is
 highly sensitive to contextual factors”
 • Privacy salience primes concerns
 • “People, it seems, feel more comfortable providing
   personal information on unprofessional sites that are
   arguably particularly likely to misuse it.”
 • “Covert inquiries … do not trigger concerns about
   privacy, and hence promote disclosure.”


                               John, Acquisti and Loewenstein (2011)
Homo economicus vs. sapiens
• Bounded rationality
• Privacy risks are highly probabilistic, cumulative, and
  difficult to calculate
• Most individuals bad at deferred gratification, and have
  time-inconsistent preferences




                                                    Acquisti (2009)
How to further privacy in social
networks?
• Is the consent given when signing up for Facebook (and apps) good
  enough? Informed? “Explicit” for sensitive data? EC: “general
  principle of transparent processing”, “improving the modalities for the
  actual exercise of the rights of access, rectification”, “clarifying and
  strengthening the rules on consent”
• Should current consent expose users to future risks? “The eternal
  memory of Google” vs. the “right to be forgotten”; “data portability”
• Can T & C which exclude liability for privacy and security breaches be
  potentially void as unfair consumer terms? EC: “general personal
  data breach notification”, “extending the power to bring an action
  before the national courts”, “strengthening the existing provisions on
  sanctions”
• EC: “further promoting the use of PETs and the possibilities for the
  concrete implementation of the concept of ‘Privacy by Design’”,
  “continue to promote the development of high legal and technical
  standards of data protection in third countries and at international
  level”
Individuals ≠ data controllers

                 • How sustainable is Lindqvist?
                 • A29WP: “when access to a profile is
                   provided to all members within the SNS
                   or the data is indexable by search
                   engines, access goes beyond the
                   personal or household sphere.”
                 • Better privacy protection by
                   infomediaries?
                   • Defaults/Nudges?
                   • Expedited temporary restrictions on sharing?
References
SNS market penetration




                         Source: Le Monde, 15/5/08
Is competition regulation required?
• OpenSocial and related efforts may reduce switching
  costs,
• but network effects will still act as a barrier to entry
• vertical integration will limit consumer choice


Competition authorities could:
• impose ex ante interoperability requirements
• upon dominant social utilities
• between vertically integrated value chains
• to minimise network barriers
Three models
Model 1: Must-carry obligations
• on broadcasters and Electronic Programme Guides
Model 2: API disclosure requirements
• on Microsoft from DoJ and EC rulings
Model 3: Interconnect requirements
• on telcos, especially with SMP
• for IM clients, from Time Warner/AOL merger case
Model comparison
• API disclosure requirements are necessary but not
 sufficient - ability to program platform apps is of little use if
 they cannot run
• Must-carry obligations enable one platform to “break in” to
 another (eg Flickr app on Facebook)
• Interconnect requirements most likely to lead to seamless
 user experience that will create real competition

Más contenido relacionado

La actualidad más candente

THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
csandit
 

La actualidad más candente (19)

An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
Mobile Access to Licensed Databases in Medicine and Other Subject Areas
Mobile Access to Licensed Databases in Medicine and Other Subject AreasMobile Access to Licensed Databases in Medicine and Other Subject Areas
Mobile Access to Licensed Databases in Medicine and Other Subject Areas
 
Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
Singapore iatul keynote
Singapore iatul keynoteSingapore iatul keynote
Singapore iatul keynote
 
Empowerment technologies byShyna Gane Daleon and Galasao
Empowerment technologies byShyna Gane  Daleon and Galasao Empowerment technologies byShyna Gane  Daleon and Galasao
Empowerment technologies byShyna Gane Daleon and Galasao
 
Digital students - Is there a Gap? presentation at the EDEN 2012, Porto
Digital students - Is there a Gap? presentation at the EDEN 2012, PortoDigital students - Is there a Gap? presentation at the EDEN 2012, Porto
Digital students - Is there a Gap? presentation at the EDEN 2012, Porto
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
 
Peer computing complete project
Peer computing complete projectPeer computing complete project
Peer computing complete project
 
Illegal File Sharing
Illegal File SharingIllegal File Sharing
Illegal File Sharing
 
Illegal file sharing4
Illegal file sharing4Illegal file sharing4
Illegal file sharing4
 
What's on the Horizon? Trends and Trials in Educational Technology
What's on the Horizon? Trends and Trials in Educational TechnologyWhat's on the Horizon? Trends and Trials in Educational Technology
What's on the Horizon? Trends and Trials in Educational Technology
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ict
 
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
H018144450
H018144450H018144450
H018144450
 
The Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
The Googling Juror 2014 - The Fate of the Jury in the Digital ParadigmThe Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
The Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
 

Destacado

Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
Christian Bosau
 

Destacado (17)

Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
 
Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112 Social media & data protection policy v1.0 141112
Social media & data protection policy v1.0 141112
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
Look before you leap - research as foundation for brand identity development
Look before you leap - research as foundation for brand identity developmentLook before you leap - research as foundation for brand identity development
Look before you leap - research as foundation for brand identity development
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Personal data protection in the EU
Personal data protection in the EUPersonal data protection in the EU
Personal data protection in the EU
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
2017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v22017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v2
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
 
Deep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial IntelligenceDeep Learning - The Past, Present and Future of Artificial Intelligence
Deep Learning - The Past, Present and Future of Artificial Intelligence
 
Information Privacy & Social Media Issues in Healthcare
Information Privacy & Social Media Issues in HealthcareInformation Privacy & Social Media Issues in Healthcare
Information Privacy & Social Media Issues in Healthcare
 

Similar a Data protection and social networks

The fate-of-the-semantic-web
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-web
Marketingfacts
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
Open University Australia
 
Characterization of facebook users
Characterization of facebook usersCharacterization of facebook users
Characterization of facebook users
Debesh Majumdar
 

Similar a Data protection and social networks (20)

Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
 
EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul Simon
 
Researching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media AnalysisResearching Social Media – Big Data and Social Media Analysis
Researching Social Media – Big Data and Social Media Analysis
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...
 
Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...Perceived versus Actual Predictability of Personal Information in Social Netw...
Perceived versus Actual Predictability of Personal Information in Social Netw...
 
PerCol 2012 - Presentation
PerCol 2012 - Presentation PerCol 2012 - Presentation
PerCol 2012 - Presentation
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKSSOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
SOS: A DISTRIBUTED MOBILE Q&A SYSTEM BASED ON SOCIAL NETWORKS
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
The fate-of-the-semantic-web
The fate-of-the-semantic-webThe fate-of-the-semantic-web
The fate-of-the-semantic-web
 
Benchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People SearchBenchmarking the Privacy-­Preserving People Search
Benchmarking the Privacy-­Preserving People Search
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social NetworksJPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
JPJ1442 SOS: A Distributed Mobile Q&A System Based on Social Networks
 
Characterization of facebook users
Characterization of facebook usersCharacterization of facebook users
Characterization of facebook users
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Social and organizational perspective in HCI
Social and organizational perspective in HCISocial and organizational perspective in HCI
Social and organizational perspective in HCI
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital LearnersDesigning a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners
 

Más de blogzilla

Más de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Data protection and social networks

  • 1. Data protection and social networks
  • 2. Data: Pew Research Center, Internet and American Life Surveys Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
  • 3. Which data are social networks storing? • In 2011, Austrian law student Max Schrems received 1,222 pages of data after subject access request to Facebook • Searches, pages viewed, relationships with friends, events, like button tracking, cookies, conversation tracking… • Facebook now has data download tool, supplies 39 of 84 data categories held TouchGraph Facebook Browser
  • 4. Data: CareerBuilder, online, fieldwork 17/11/09-2/12/09, probability sample of 407 UK private sector employers, sample error ±4.41% Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
  • 5.
  • 6. Reasonable expectations? • Oxford students fined on basis of Facebook photos of exam celebrations. Whose “fault”? • Students who didn’t take appropriate security measures using available tools? • Oxford proctors for snooping on a “private place”? • Facebook because it did not provide the right defaults for a “reasonable expectation of privacy”? • A29WP: “SNS should ensure privacy-friendly and free of charge default settings are in place restricting access to self- selected contacts” • Canadian Privacy Commissioner: “Facebook’s default settings in respect of photo albums and search engines do not meet users’ reasonable expectations”
  • 7. Data shared about third parties • How far can users control what is “tagged” with their identifier? • Facial recognition • A29WP: “Users should be advised by SNS that pictures or information about other individuals, should only be uploaded with the individual’s TouchGraph Facebook Browser consent.”
  • 8. Facebook Platform • Over 9m apps and integrated websites as of March 2012 • “Social Plugins” are revealing browsing behaviour across the Web to Facebook and Twitter – used by latter for profiling (10 days of records). Banned in Schleswig-Holstein • X’s app consent may reveal personal data about Y, and transmit user IDs to ad tracking companies • Canadian Privacy Commissioner: “Facebook should be doing much more to ensure that meaningful consent is duly obtained from users when developers access their personal information [and] technological safeguards that will not simply forbid, but effectively prevent, developers’ unauthorized access to personal information that they do not need.”
  • 9. Young people and privacy • Most young people see Internet as private space for talking to (already-known) friends, and target information to peer group • Lenhart et al. (2007) found stricter access controls on photos/videos by teens than adults (76% v 58% most of time/sometimes) • Teens showed higher privacy concerns with parental monitoring; parental discussions increased privacy concerns and reduced disclosure • Human impulse to connect and share information with friends, but when mediated can easily be replicated and spread to places never intended. Teens less good at managing collapsed contexts (boyd, Marwick) • Adult users of social media are developing similar behaviours – consequence of mediation, not age (Marwick et al. 2010)
  • 10. Young adults and privacy • Hoofnagle et al. (2010) found very limited understanding of privacy laws among young adults – 42% answered all 5 questions incorrectly • Jones et al. surveyed 7,421 students at 40 US colleges. 75% concerned about passwords, SSNs, credit card numbers but few about SNSes due to insignificant consequences (2009)
  • 11. Student information disclosure What kind of personal information do you post online? (first year N=177, final year N=133) Oostveen (2010)
  • 12. Sampling Facebook Experiences Facebook Application  Location disclosed to friends Server  Data are collected in our server  Questions are sent to participants Aims To understand: through SMS  Why do students share their location  How (text, picture)  When, to whom they Mobile phones carried by students share this location  Location retrieved with embedded GPS  At what locations are  Subjects answer questions (e.g., sharing choices) they more willing to share
  • 13. Location sharing • 40 participants responded to over 2000 questions over 2 weeks • Participants are more willing to share their location when they are in ‘Leisure’ or ‘Academic’ locations than in the ‘Library’ or in ‘Residential’ areas. Abdesslem, Parris & Henderson (2010)
  • 14. Privacy is contextual • “Contrary to the assumption … that people have stable, coherent, preferences with respect to privacy, we find that concern about privacy … is highly sensitive to contextual factors” • Privacy salience primes concerns • “People, it seems, feel more comfortable providing personal information on unprofessional sites that are arguably particularly likely to misuse it.” • “Covert inquiries … do not trigger concerns about privacy, and hence promote disclosure.” John, Acquisti and Loewenstein (2011)
  • 15. Homo economicus vs. sapiens • Bounded rationality • Privacy risks are highly probabilistic, cumulative, and difficult to calculate • Most individuals bad at deferred gratification, and have time-inconsistent preferences Acquisti (2009)
  • 16. How to further privacy in social networks? • Is the consent given when signing up for Facebook (and apps) good enough? Informed? “Explicit” for sensitive data? EC: “general principle of transparent processing”, “improving the modalities for the actual exercise of the rights of access, rectification”, “clarifying and strengthening the rules on consent” • Should current consent expose users to future risks? “The eternal memory of Google” vs. the “right to be forgotten”; “data portability” • Can T & C which exclude liability for privacy and security breaches be potentially void as unfair consumer terms? EC: “general personal data breach notification”, “extending the power to bring an action before the national courts”, “strengthening the existing provisions on sanctions” • EC: “further promoting the use of PETs and the possibilities for the concrete implementation of the concept of ‘Privacy by Design’”, “continue to promote the development of high legal and technical standards of data protection in third countries and at international level”
  • 17. Individuals ≠ data controllers • How sustainable is Lindqvist? • A29WP: “when access to a profile is provided to all members within the SNS or the data is indexable by search engines, access goes beyond the personal or household sphere.” • Better privacy protection by infomediaries? • Defaults/Nudges? • Expedited temporary restrictions on sharing?
  • 19. SNS market penetration Source: Le Monde, 15/5/08
  • 20. Is competition regulation required? • OpenSocial and related efforts may reduce switching costs, • but network effects will still act as a barrier to entry • vertical integration will limit consumer choice Competition authorities could: • impose ex ante interoperability requirements • upon dominant social utilities • between vertically integrated value chains • to minimise network barriers
  • 21. Three models Model 1: Must-carry obligations • on broadcasters and Electronic Programme Guides Model 2: API disclosure requirements • on Microsoft from DoJ and EC rulings Model 3: Interconnect requirements • on telcos, especially with SMP • for IM clients, from Time Warner/AOL merger case
  • 22. Model comparison • API disclosure requirements are necessary but not sufficient - ability to program platform apps is of little use if they cannot run • Must-carry obligations enable one platform to “break in” to another (eg Flickr app on Facebook) • Interconnect requirements most likely to lead to seamless user experience that will create real competition

Notas del editor

  1. http://www.searchenginejournal.com/the-growth-of-social-media-an-infographic/32788/
  2. http://www.nytimes.com/2012/02/06/technology/06iht-rawdata06.html?pagewanted=all http://www.europe-v-facebook.org/fb_cat1.pdf
  3. http://www.searchenginejournal.com/the-growth-of-social-media-an-infographic/32788/ http://www.careerbuilder.co.uk/UK/share/aboutus/pressreleasesdetail.aspx?id=pr28&sd=1%2F13%2F2010&ed=12%2F31%2F2010
  4. http://online.wsj.com/article/SB10001424052748704648604575620750998072986.html
  5. http://ebiquity.umbc.edu/blogger/2010/10/17/wsj-many-facebook-apps-transmit-user-ids-to-advertising-tracking-companies/ http://www.gov2u.org/index.php/blog/157-a-german-state-which-unlikes-facebook https://www.datenschutzzentrum.de/presse/20110819-facebook-en.htm
  6. http://www.priv.gc.ca/cf-dc/2009/2009_008_0716_e.cfm