SlideShare una empresa de Scribd logo
1 de 18
Privacy attitudes, incentives and behaviours Dr Ian Brown Oxford Internet Institute
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy concerns Source: Flash Eurobarometer #225 (2008: 7)
Attitudes  vs.  disclosure Spiekermann, Grossklags and Berendt (2002)
Young people and privacy ,[object Object],[object Object],[object Object],[object Object]
Young adults and privacy ,[object Object],[object Object]
Student information disclosure What kind of personal information do you post online? (first year N=177, final year N=133) Oostveen (2010)
Sampling Facebook Experiences ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Location sharing ,[object Object],[object Object],Abdesslem, Parris & Henderson (2010)
HIV record privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Manzanderani and Brown (2011)
Patient preferences ,[object Object],[object Object],[object Object],[object Object],[object Object],Manzanderani and Brown (2011)
Sharing medical data Source: The Use of Personal Health Information in Medical Research, Medical Research Council, June 2007 pp.54-55
Privacy is contextual ,[object Object],[object Object],[object Object],[object Object],John, Acquisti and Loewenstein (2011)
Homo economicus  vs.  sapiens ,[object Object],[object Object],[object Object],Acquisti (2009)
Market failures in privacy ,[object Object],[object Object],[object Object],[object Object]
Correcting market failure ,[object Object],[object Object],[object Object],[object Object],Romanosky and Acquisti (2009), Brown and Marsden (2008)
Lessons for DP governance ,[object Object],[object Object],[object Object]
References

Más contenido relacionado

Destacado (6)

Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Ubicomp challenges for privacy law
Ubicomp challenges for privacy lawUbicomp challenges for privacy law
Ubicomp challenges for privacy law
 
Database State
Database StateDatabase State
Database State
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 

Similar a Privacy attitudes, incentives and behaviours

EARLY METHODS SECTION1Early Methods Section.docx
EARLY METHODS SECTION1Early Methods Section.docxEARLY METHODS SECTION1Early Methods Section.docx
EARLY METHODS SECTION1Early Methods Section.docx
jacksnathalie
 
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV
 
Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups
la71
 
Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups
la71
 

Similar a Privacy attitudes, incentives and behaviours (20)

Research Ethics
Research EthicsResearch Ethics
Research Ethics
 
Research Ethics
Research EthicsResearch Ethics
Research Ethics
 
Frances Ryan DARTS5 presentation
Frances Ryan DARTS5 presentationFrances Ryan DARTS5 presentation
Frances Ryan DARTS5 presentation
 
Personal online reputations: Managing what you can’t control
Personal online reputations: Managing what you can’t controlPersonal online reputations: Managing what you can’t control
Personal online reputations: Managing what you can’t control
 
April Heyward Research Methods Class Session - 7-22-2021
April Heyward Research Methods Class Session - 7-22-2021April Heyward Research Methods Class Session - 7-22-2021
April Heyward Research Methods Class Session - 7-22-2021
 
Are we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media researchAre we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media research
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
Tweens
TweensTweens
Tweens
 
EARLY METHODS SECTION1Early Methods Section.docx
EARLY METHODS SECTION1Early Methods Section.docxEARLY METHODS SECTION1Early Methods Section.docx
EARLY METHODS SECTION1Early Methods Section.docx
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital Health
 
Connecting and protecting
Connecting and protectingConnecting and protecting
Connecting and protecting
 
Tweens
TweensTweens
Tweens
 
EDRD 6000: Ethics when working with LGBTQ+ Youth
EDRD 6000: Ethics when working with LGBTQ+ YouthEDRD 6000: Ethics when working with LGBTQ+ Youth
EDRD 6000: Ethics when working with LGBTQ+ Youth
 
Tailoring information literacy instruction using the information discernment ...
Tailoring information literacy instruction using the information discernment ...Tailoring information literacy instruction using the information discernment ...
Tailoring information literacy instruction using the information discernment ...
 
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
BETTER CARE WITHOUT COMPROMISING PERSONAL PRIVACY - THE CONSUMERS' VIEWPOINT
 
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
ICEGOV2009 - Tutorial 4 - E-Health Standards in Practice: Challenges and Oppo...
 
Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups
 
Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups
 
Pol soc 360_01_sp15_research_ethics
Pol soc 360_01_sp15_research_ethicsPol soc 360_01_sp15_research_ethics
Pol soc 360_01_sp15_research_ethics
 
Journal Club_Mixed Method Research_IAPSMCON-2022.pptx
Journal Club_Mixed Method Research_IAPSMCON-2022.pptxJournal Club_Mixed Method Research_IAPSMCON-2022.pptx
Journal Club_Mixed Method Research_IAPSMCON-2022.pptx
 

Más de blogzilla

Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
blogzilla
 

Más de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Privacy attitudes, incentives and behaviours

Notas del editor

  1. Imposes cost of future invasive advertising