SlideShare a Scribd company logo
1 of 47
Is privacy a matter of
transparency and control?
Towards a Privacy Adaptation Procedure
Outline

1. Beyond transparency and control
   Privacy calculus, more paradoxes, and bounded rationality

2. Privacy nudging
   A solution inspired by decision sciences... with some ļ¬‚aws

3. Privacy Adaptation Procedure
   Adaptive nudges based on a contextualized
   understanding of usersā€™ privacy concerns



                                                INFORMATION AND COMPUTER SCIENCES
Beyond transparency and control
Privacy calculus, more paradoxes, and bounded rationality
The state of privacy, 2013




                             INFORMATION AND COMPUTER SCIENCES
A model by Smith et al. 2011
             Why arenā€™t these more
               strongly related?



                                                   Transparency




                                                       Control




                               INFORMATION AND COMPUTER SCIENCES
Transparency and control
 Transparency                       Control




Informed consent                 User empowerment
   ā€œcompanies should               ā€œcompanies should offer
   provide clear descriptions      consumers clear and
   of [...] why they need the      simple choices [...] about
   data, how they will use itā€     personal data collection,
                                   use, and disclosureā€




                                                INFORMATION AND COMPUTER SCIENCES
Examples from your work
Na Wang, Heng Xu, and Jens Grossklags

   ā€œOur new designs encompass control and awareness as
   the essential dimensions of usersā€™ privacy concerns in the
   context of third-party apps on Facebook.ā€


Jessica Vitak

   ā€œUsers may also employ advanced privacy settings to
   segregate audiences, so they can still share relevant
   content with their various connectionsā€

                                                 INFORMATION AND COMPUTER SCIENCES
Examples from your work
Stacy Blasiola

   ā€œBy drawing awareness to the issue, users will be better
   equipped to understand the vulnerabilities posed by third
   party applicationsā€


Ralf De Wolf and Jo Pierson

   ā€œdifferent audience management strategies [...] can be
   used as a framework for access control models and/or
   feedback and awareness toolsā€

                                                INFORMATION AND COMPUTER SCIENCES
The Transparency Paradox


                Useful for concerned users,
                but bad for others
                   Makes them more fearful

                Any mention of privacy,
                whether it is favorable or not,
                triggers privacy concerns




                                 INFORMATION AND COMPUTER SCIENCES
Example: Website A/B testing




                          INFORMATION AND COMPUTER SCIENCES
The Control Paradox
                Decisions are too numerous
                   Most Facebook users
                   donā€™t know implications of
                   their own privacy settings!

                Decisions are difficult
                   Uncertain and delayed
                   outcomes

                Control gives a false sense of
                security


                                 INFORMATION AND COMPUTER SCIENCES
Beyond control
Eden Litt

   ā€œwhile many sites give users a variety of buttons and
   dashboards to help them technologically enforce their
   privacy, these features are only useful if users are aware
   that they exist, know where to ļ¬nd them, and use them
   effectivelyā€


Ralf De Wolf and Jo Pierson

   ā€œin an online environment managing privacy becomes a
   time-consuming choreā€
                                                  INFORMATION AND COMPUTER SCIENCES
Example: Facebook
ā€œbewildering tangle of optionsā€ (New York Times, 2010)

ā€œlabyrinthianā€ controlsā€ (U.S. Consumer Magazine, 2012)




                                              INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
                                     Introducing an ā€œextremeā€
                                     sharing option
               E                        Nothing - City - Block
beneļ¬ts -->




                                        Add the option Exact
                   B
                                     Expected:
                         C
                                        Some will choose Exact
                                        instead of Block
                                 N
                                     Unexpected:
                   privacy -->
                                        Sharing increases across
                                        the board!

                          bit.ly/chi2013privacy      INFORMATION AND COMPUTER SCIENCES
Bounded rationality
                 Peopleā€™s decisions are
                 inconsistent and seemingly
                 irrational
                  - Framing effects
                  - Default effects
                  - Order effects
                 Transparency:
                      Information overload

                 Control:
                      Choice overload
                                  INFORMATION AND COMPUTER SCIENCES
Example: Acquisti et al.




     Foot in the door           Door in the face
 (innocuous requests ļ¬rst)   (risquĆ© requests ļ¬rst)

                                         INFORMATION AND COMPUTER SCIENCES
Example: Acquisti et al.
                                            1400



                                            1200
Cumulative admission rates in percentages




                                            1000



                                            800
                                                                                                                                                            Decreasing
                                                                                                                                                            Increasing
                                            600                                                                                                             Baseline


                                            400



                                            200



                                              0
                                                   1   2   3   4   5   6   7   8   9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
                                                                                       Question number (Increasing condition)




                                                                                                                                    INFORMATION AND COMPUTER SCIENCES
Example: Lai and Hui


A         Please send me Vortrex Newsletters and information.             25%
                                                                            4.
B         Please do not send me Vortrex Newsletters and
          information.                                                    37%the
                                                                            In

C         Please send me Vortrex Newsletters and information.             53%
                                                                            inher
                                                                            defau

D         Please do not send me Vortrex Newsletters and
          information.                                                    0% t
                                                                            onlin
                                                                            The
 Figure 4: Subjects were assigned one of the following conditions
                                                                                      the s
                     in the registration page.
                                                                                      Conn
 3.1. Data Analysis and Results                                                       actio
 The mean levels of participations in each experimental condition are                 nega
 reported in Table 1 below.                                                           conv
  Table 1: Mean participation levels as a function of frames and                      posit
                                                       INFORMATION AND COMPUTER SCIENCES
Summary of part 1


        We need to move beyond
        control and transparency
           Rational privacy decision-
           making is bounded
           Transparency and control
           increase choice difficulty




                                        INFORMATION AND COMPUTER SCIENCES
Privacy nudging
A solution inspired by decision sciences... with some ļ¬‚aws
A new model
Jessica Vitak

   ā€œit is likely that users employ a number of strategies when
   making decisions regarding what and with whom to share
   content onlineā€


These strategies are not rational, therefore:
 - People do not always choose what is best for them
 - There is signiļ¬cant leeway to inļ¬‚uence people's decisions
 - Being objectively neutral is impossible
                                                 INFORMATION AND COMPUTER SCIENCES
A new model
Jessica Vitak

   ā€œit is likely that users employ a number of strategies when
   making decisions regarding what and with whom to share
   content onlineā€


These strategies are not rational, therefore:
 - People do not always choose what is best for them
 - There is signiļ¬cant leeway to inļ¬‚uence people's decisions
 - Being objectively neutral is impossible
                                                 INFORMATION AND COMPUTER SCIENCES
A new model

                             Behavioral reactions
                            (including disclosures)


               Default                                     Default
               Nudge                                       Nudge
                order                                       value

                                  Decision
                              Privacy Calculus
                                 strategies


Justiļ¬cation
   Nudge                                                               Justiļ¬cation
                                                                          Nudge

                    Risk/                             Benfits
                    Costs



                                                                INFORMATION AND COMPUTER SCIENCES
A new model
                                Default
Justiļ¬cation
                                 value

A succinct reason to          Relieve users from the
disclose (or not disclose)    burden of making decisions
a piece of information
                               - Path of least resistance
 - Make it easier to           - Implicit normative cue
   rationalize the decision      (what I should do)
 - Minimize the potential      - Endowment effect (what
   regret of choosing the        I have is worth more than
   wrong option                  what I donā€™t have)

                                              INFORMATION AND COMPUTER SCIENCES
Example: Acquisti et al.
                                            1400



                                            1200
Cumulative admission rates in percentages




                                            1000



                                            800
                                                                                                                                                            Decreasing
                                                                                                                                                            Increasing
                                            600                                                                                                             Baseline


                                            400



                                            200



                                              0
                                                   1   2   3   4   5   6   7   8   9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
                                                                                       Question number (Increasing condition)




                                                                                                                                    INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa
                              Disclosure*behavior*
                                              *


           Demographics*disclosure       *                *Context*disclosure*
        Context#ļ¬rst#    Demographics#ļ¬rst#       Context#ļ¬rst#      Demograpics#ļ¬rst#
100%#
 90%#
 80%#
 70%#
 60%#
 50%#
 40%#
 30%#
 20%#
 10%#
  0%#




                            bit.ly/tiis2013                          INFORMATION AND COMPUTER SCIENCES
Example: Lai and Hui


A         Please send me Vortrex Newsletters and information.             25%
                                                                            4.
B         Please do not send me Vortrex Newsletters and
          information.                                                    37%the
                                                                            In

C         Please send me Vortrex Newsletters and information.             53%
                                                                            inher
                                                                            defau

D         Please do not send me Vortrex Newsletters and
          information.                                                    0% t
                                                                            onlin
                                                                            The
 Figure 4: Subjects were assigned one of the following conditions
                                                                                      the s
                     in the registration page.
                                                                                      Conn
 3.1. Data Analysis and Results                                                       actio
 The mean levels of participations in each experimental condition are                 nega
 reported in Table 1 below.                                                           conv
  Table 1: Mean participation levels as a function of frames and                      posit
                                                       INFORMATION AND COMPUTER SCIENCES
Example: Brown & Krishna
     %pt increase in ā€œHighā€
         compared to baseline


                                              Default




    High default
       works              Reactance
                      when aware of motives
                                        INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa


                   5 justiļ¬cation types
                      None
                      Useful for you
                      Number of others
                      Useful for others
                      Explanation




           bit.ly/tiis2013          INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa
                                   Disclosure*behavior*
                                                   *


           Demographics*disclosure             *                  *Context*disclosure*
        Context"ļ¬rst"        Demographics"ļ¬rst"           Context"ļ¬rst"        Demograpics"ļ¬rst"
100%"
 90%"        1"
 80%"             ***"
 70%"                                                      *" **" *"
 60%"                                                                                   *" *"
 50%"
 40%"
 30%"
 20%"
 10%"
  0%"
           none"     useful"for"you"   #"of"others"    useful"for"others"   explanaDon"




                                bit.ly/tiis2013                                INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa
                                                        Sa#sfac#on)with))
                                   Disclosure*behavior*   the)system)
Anticipated satisfaction with *
           Demographics*disclosure
                                                 *

                                                                    *Context*disclosure*
the system (intention to use):
        Context"ļ¬rst"   Demographics"ļ¬rst"            1,00" Context"ļ¬rst"        Demograpics"ļ¬rst"
100%"
                                                      0,75"
 90%" 6 items,1"e.g. ā€œI would
                ***"                                  0,50"
 80%"
      recommend the system
 70%"                                                 0,25" *" **" *"
 60%" to othersā€                                      0,00"                               *" *"
 50%"
                                                     $0,25"
Lower for any justiļ¬cation!
40%"
 30%"                                                $0,50"
                                                                                               1"
 20%"                                                $0,75"                 **" **"
 10%"
                                                     $1,00"                           ***"
  0%"
             none"   useful"for"you"   #"of"others"     useful"for"others"    explanaDon"


                                 bit.ly/tiis2013                                INFORMATION AND COMPUTER SCIENCES
Problems with Privacy Nudging

What should be the purpose of the nudge?



ā€œMore information = better, e.g. for personalizationā€
   Techniques to increase disclosure cause reactance in the
   more privacy-minded users

ā€œPrivacy is an absolute rightā€œ
   More difficult for less privacy-minded users to enjoy the
   beneļ¬ts that disclosure would provide


                                                 INFORMATION AND COMPUTER SCIENCES
Problems with Privacy Nudging
                 Smith, Goldstein & Johnson:
                    ā€œWhat is best for
                    consumers depends upon
                    characteristics of the
                    consumer: An outcome
                    that maximizes consumer
                    welfare may be
                    suboptimal for some
                    consumers in a context
                    where there is
                    heterogeneity in
                    preferences.ā€

                                INFORMATION AND COMPUTER SCIENCES
Summary of part 2
        Nudges work
           Defaults and justiļ¬cations
           can inļ¬‚uence usersā€™
           decisions

        But we cannot nudge
        everyone the same way!
           Users differ in their
           disclosure preferences
           Nudges should respect
           these differences

                                        INFORMATION AND COMPUTER SCIENCES
Privacy Adaptation Procedure
  Adaptive nudges based on a contextualized
   understanding of usersā€™ privacy concerns
Contextualized preferences
Sameer Patil et al.

   ā€œOne of the factors contributing to this ā€œprivacy paradoxā€ is
   the decoupling of the circumstances in which privacy-
   affecting behaviors occur from the time at which privacy
   concerns are expressedā€


Sam McNeilly,Ā Luke Hutton, andĀ Tristan Henderson

   ā€œParticipants were willing to share different types of
   information in different waysā€

                                                  INFORMATION AND COMPUTER SCIENCES
Contextualized preferences
Pamela Wisniewski andĀ Heather Richter Lipford

   ā€œBy operationalizing SNSĀ desired privacy level at a more
   granular level, we wereĀ able to unpack, if not disprove,
   aspects of the privacyĀ paradoxā€


Sam McNeilly,Ā Luke Hutton, andĀ Tristan Henderson

   ā€œprivacy settings are fairly robust to capturing people's
   contextual norms over timeā€

                                                  INFORMATION AND COMPUTER SCIENCES
Contextualized preferences

                      Contextualize
                                          The optimal justiļ¬cation and
                        different users
                                          default may depend on:
                                           - type of info (what)
  different context




                           Privacy         - user characteristics (who)
                           decision
                                           - recipient (to whom)
                                           - etc...


                                                          INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.
  Type of data         ID    Items
                        1    Wall
                        2    Status updates
  Facebook activity     3    Shared links
                        4    Notes
                        5    Photos
                        6  ā€œWhat?ā€
                            Hometown
  Location              7
                               =
                            Location (city)
                        8   Location (state/province)
                        9   Four
                            Residence (street address)
  Contact info           dimensions
                        11  Phone number
                        12   Email address
                        13   Religious views
  Life/interests        14   Interests (favorite movies, etc.)
                        15   Facebook groups

                      bit.ly/privdim                   INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.

 ā€œWho?ā€
     =
   Five
disclosure
 proļ¬les

   159 pps tend to share little information overall (LowD)
   26 pps tend to share activities and interests (Act+IntD)
   50 pps tend to share location and interests (Loc+IntD)
   65 pps tend to share everything but contact info (Hi-ConD)
   59 pps tend to share everything
                         bit.ly/privdim            INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg et al.



                                            Detect
                                             class
                                           member-
                                             ship




            bit.ly/privdim    INFORMATION AND COMPUTER SCIENCES
Example: Knijnenburg & Kobsa

          I care about
          the beneļ¬ts




                I do whatever
                   others do


                                INFORMATION AND COMPUTER SCIENCES
disclosure tendency, where requesting context data first
leads to less threat and more trust.                                Best Strategy to Achieve High Total Disclosure
                                                                    Since it is best to ask demographics first to increase
Figure 4 compares for each group the best strategy (marked          demographics disclosure, and context first to increase

      Example: Knijnenburg & Kobsa
with an arrow) against all other strategies. Strategies that        context disclosure, increasing total disclosure asks for a
perform significantly worse than the best strategy are              compromise. The best way to attain this compromise is to
labeled with a p-value.                                             first choose a preferred request order, and then to select a


       User type             Context first                                   Demographics first
       Males with low        The ā€˜useful for youā€™ justification gives the    Providing no justification gives the highest
       disclosure tendency   highest demographics disclosure.                context disclosure.
       Females with low      Providing no justification gives the highest    The ā€˜explanationā€™ justification keeps
       disclosure tendency   demographics disclosure.                        context disclosure on par.
       Males with high       The ā€˜useful for othersā€™ justification keeps     The ā€˜useful for youā€™ justification keeps
       disclosure tendency   demographics disclosure almost on par.          context disclosure on par.
       Females with high     Providing no justification gives a high         The ā€˜useful for youā€™ justification gives the
       disclosure tendency   demographics disclosure.                        highest context disclosure.

                                  Table 2: Best strategies to achieve high overall disclosures.


      User type                                     Best strategy
      Males with low disclosure tendency            Demographics first with ā€˜useful for youā€™.
      Males with high disclosure tendency           The ā€˜useful for youā€™ justification in any order.
      Females with low disclosure tendency          Context first with ā€˜useful for youā€™.
      Females with high disclosure tendency         Context first with no justification, but ā€˜useful for youā€™ is second
                                                    best.

                                   Table 3: Best strategies to achieve high user satisfaction.




                                               bit.ly/iui2013                                     INFORMATION AND COMPUTER SCIENCES
The Adaptive Privacy Procedure

   ā€¢ Determine the item-. user-, and recipient-type
   ā€¢ Select the default and justification that fits best
     for this context


     pshare = Ī± + Ī²itemtype + Ī²usertype + Ī²recipienttype




                                             OUTPUT
              INPUT




     {user, item, recipient}       {defaults, justification}

                                                      INFORMATION AND COMPUTER SCIENCES
The Adaptive Privacy Procedure

Practical use:
 - Automatic initial defaults in line with ā€œdisclosure proļ¬leā€
 - Personalized disclosure justiļ¬cations
Relieves some of the burden of the privacy decision:
   The right privacy-related information
   The right amount of control

ā€œRealistic empowermentā€


                                                    INFORMATION AND COMPUTER SCIENCES
Summary of part 3

        Smith, Goldstein & Johnson:
           ā€œthe idea of an adaptive
           default preserves
           considerable consumer
           autonomy [...] and strikes
           a balance between
           providing more choice
           and providing the right
           choices.ā€



                                        INFORMATION AND COMPUTER SCIENCES
Final summary

1. Beyond transparency and control
   Rational privacy decision-making is bounded, and
   transparency and control only increase choice difficulty

2. Privacy nudging
   Needs to move beyond the one-size-ļ¬ts-all approach

3. Privacy Adaptation Procedure
   The optimal balance between nudges and control



                                                 INFORMATION AND COMPUTER SCIENCES

More Related Content

What's hot

Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
Ā 
Social Network Theory and Google
Social Network Theory and GoogleSocial Network Theory and Google
Social Network Theory and GoogleEdward Alonzo
Ā 
Dissertation Social Network Sites
Dissertation Social Network SitesDissertation Social Network Sites
Dissertation Social Network SitesXenia K-i
Ā 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Daniel Katz
Ā 
Roles In Networks
Roles In NetworksRoles In Networks
Roles In NetworksPatti Anklam
Ā 
182287550 finance-solved-cases-doc
182287550 finance-solved-cases-doc182287550 finance-solved-cases-doc
182287550 finance-solved-cases-dochomeworkping10
Ā 
Sourcing lecture 3 ITSM Cloudsourcing and outsourcing
Sourcing lecture 3 ITSM Cloudsourcing and outsourcingSourcing lecture 3 ITSM Cloudsourcing and outsourcing
Sourcing lecture 3 ITSM Cloudsourcing and outsourcingFrank Willems
Ā 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in CyberspaceMarc Smith
Ā 
A Perspective on Graph Theory and Network Science
A Perspective on Graph Theory and Network ScienceA Perspective on Graph Theory and Network Science
A Perspective on Graph Theory and Network ScienceMarko Rodriguez
Ā 
Ep 180 - How Autonomous Vehicles create a more Inclusive & Diverse Workplace
Ep 180 - How Autonomous Vehicles create a more Inclusive & Diverse WorkplaceEp 180 - How Autonomous Vehicles create a more Inclusive & Diverse Workplace
Ep 180 - How Autonomous Vehicles create a more Inclusive & Diverse WorkplaceLauren Lindemulder
Ā 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network AnalysisGiorgos Cheliotis
Ā 
Reproduction of Hierarchy? A Social Network Analysis of the American Law Pro...
Reproduction of Hierarchy?  A Social Network Analysis of the American Law Pro...Reproduction of Hierarchy?  A Social Network Analysis of the American Law Pro...
Reproduction of Hierarchy? A Social Network Analysis of the American Law Pro...Daniel Katz
Ā 
How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...Jeromy Anglim
Ā 
Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...ACMBangalore
Ā 
Discovery Posters
Discovery PostersDiscovery Posters
Discovery Postersadepaolis
Ā 

What's hot (16)

Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Ā 
Social Network Theory and Google
Social Network Theory and GoogleSocial Network Theory and Google
Social Network Theory and Google
Ā 
Dissertation Social Network Sites
Dissertation Social Network SitesDissertation Social Network Sites
Dissertation Social Network Sites
Ā 
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Network Analysis and Law: Introductory Tutorial @ Jurix 2011 Meeting (Vienna)
Ā 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
Ā 
Roles In Networks
Roles In NetworksRoles In Networks
Roles In Networks
Ā 
182287550 finance-solved-cases-doc
182287550 finance-solved-cases-doc182287550 finance-solved-cases-doc
182287550 finance-solved-cases-doc
Ā 
Sourcing lecture 3 ITSM Cloudsourcing and outsourcing
Sourcing lecture 3 ITSM Cloudsourcing and outsourcingSourcing lecture 3 ITSM Cloudsourcing and outsourcing
Sourcing lecture 3 ITSM Cloudsourcing and outsourcing
Ā 
1999 ACM SIGCHI - Counting on Community in Cyberspace
1999   ACM SIGCHI - Counting on Community in Cyberspace1999   ACM SIGCHI - Counting on Community in Cyberspace
1999 ACM SIGCHI - Counting on Community in Cyberspace
Ā 
A Perspective on Graph Theory and Network Science
A Perspective on Graph Theory and Network ScienceA Perspective on Graph Theory and Network Science
A Perspective on Graph Theory and Network Science
Ā 
Ep 180 - How Autonomous Vehicles create a more Inclusive & Diverse Workplace
Ep 180 - How Autonomous Vehicles create a more Inclusive & Diverse WorkplaceEp 180 - How Autonomous Vehicles create a more Inclusive & Diverse Workplace
Ep 180 - How Autonomous Vehicles create a more Inclusive & Diverse Workplace
Ā 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
Ā 
Reproduction of Hierarchy? A Social Network Analysis of the American Law Pro...
Reproduction of Hierarchy?  A Social Network Analysis of the American Law Pro...Reproduction of Hierarchy?  A Social Network Analysis of the American Law Pro...
Reproduction of Hierarchy? A Social Network Analysis of the American Law Pro...
Ā 
How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...How to conduct a social network analysis: A tool for empowering teams and wor...
How to conduct a social network analysis: A tool for empowering teams and wor...
Ā 
Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...Social Network Analysis (SNA) and its implications for knowledge discovery in...
Social Network Analysis (SNA) and its implications for knowledge discovery in...
Ā 
Discovery Posters
Discovery PostersDiscovery Posters
Discovery Posters
Ā 

Similar to CSCW networked privacy workshop - keynote

hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...
hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...
hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...City University London
Ā 
Dr. dzaharudin mansor microsoft
Dr. dzaharudin mansor   microsoftDr. dzaharudin mansor   microsoft
Dr. dzaharudin mansor microsoftSoo Chin Hock
Ā 
Building AI with Security and Privacy in mind
Building AI with Security and Privacy in mindBuilding AI with Security and Privacy in mind
Building AI with Security and Privacy in mindgeetachauhan
Ā 
Building AI with Security Privacy in Mind
Building AI with Security Privacy in MindBuilding AI with Security Privacy in Mind
Building AI with Security Privacy in Mindgeetachauhan
Ā 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
Ā 
Data Sharing and the Polar Information Commons
Data Sharing and the Polar Information CommonsData Sharing and the Polar Information Commons
Data Sharing and the Polar Information CommonsKaitlin Thaney
Ā 
Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBIJuan Hernandez
Ā 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
Ā 
Private Cloud: Debunking Myths Preventing Adoption
Private Cloud: Debunking Myths Preventing AdoptionPrivate Cloud: Debunking Myths Preventing Adoption
Private Cloud: Debunking Myths Preventing AdoptionDana Gardner
Ā 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Jim Adler
Ā 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
Ā 
DATA SCIENCE
DATA SCIENCEDATA SCIENCE
DATA SCIENCELavanyaJanu1
Ā 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
Ā 
Opportunities with data science
Opportunities with data scienceOpportunities with data science
Opportunities with data scienceAshiq Rahman
Ā 
BYOD: Risks and Opportunities
BYOD: Risks and OpportunitiesBYOD: Risks and Opportunities
BYOD: Risks and Opportunitiesbudzeg
Ā 
Data Explosion and Big Data Require New Strategies for Data Management and Re...
Data Explosion and Big Data Require New Strategies for Data Management and Re...Data Explosion and Big Data Require New Strategies for Data Management and Re...
Data Explosion and Big Data Require New Strategies for Data Management and Re...Dana Gardner
Ā 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
Ā 

Similar to CSCW networked privacy workshop - keynote (20)

hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...
hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...
hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...
Ā 
Dr. dzaharudin mansor microsoft
Dr. dzaharudin mansor   microsoftDr. dzaharudin mansor   microsoft
Dr. dzaharudin mansor microsoft
Ā 
Building AI with Security and Privacy in mind
Building AI with Security and Privacy in mindBuilding AI with Security and Privacy in mind
Building AI with Security and Privacy in mind
Ā 
Building AI with Security Privacy in Mind
Building AI with Security Privacy in MindBuilding AI with Security Privacy in Mind
Building AI with Security Privacy in Mind
Ā 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
Ā 
Data Sharing and the Polar Information Commons
Data Sharing and the Polar Information CommonsData Sharing and the Polar Information Commons
Data Sharing and the Polar Information Commons
Ā 
Opening keynote gianni cooreman
Opening keynote gianni cooremanOpening keynote gianni cooreman
Opening keynote gianni cooreman
Ā 
Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBI
Ā 
Future of the Internet - National Geographic - Digital Capital Week
Future of the Internet - National Geographic - Digital Capital WeekFuture of the Internet - National Geographic - Digital Capital Week
Future of the Internet - National Geographic - Digital Capital Week
Ā 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot Spot
Ā 
Private Cloud: Debunking Myths Preventing Adoption
Private Cloud: Debunking Myths Preventing AdoptionPrivate Cloud: Debunking Myths Preventing Adoption
Private Cloud: Debunking Myths Preventing Adoption
Ā 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
Ā 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Ā 
DATA SCIENCE
DATA SCIENCEDATA SCIENCE
DATA SCIENCE
Ā 
The Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the FutureThe Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the Future
Ā 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
Ā 
Opportunities with data science
Opportunities with data scienceOpportunities with data science
Opportunities with data science
Ā 
BYOD: Risks and Opportunities
BYOD: Risks and OpportunitiesBYOD: Risks and Opportunities
BYOD: Risks and Opportunities
Ā 
Data Explosion and Big Data Require New Strategies for Data Management and Re...
Data Explosion and Big Data Require New Strategies for Data Management and Re...Data Explosion and Big Data Require New Strategies for Data Management and Re...
Data Explosion and Big Data Require New Strategies for Data Management and Re...
Ā 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
Ā 

More from Bart Knijnenburg

Profiling Facebook Users' Privacy Behaviors
Profiling Facebook Users' Privacy BehaviorsProfiling Facebook Users' Privacy Behaviors
Profiling Facebook Users' Privacy BehaviorsBart Knijnenburg
Ā 
Counteracting the negative effect of form auto-completion on the privacy calc...
Counteracting the negative effect of form auto-completion on the privacy calc...Counteracting the negative effect of form auto-completion on the privacy calc...
Counteracting the negative effect of form auto-completion on the privacy calc...Bart Knijnenburg
Ā 
FYI: Communication Style Preferences Underlie Differences in Location-Sharing...
FYI: Communication Style Preferences Underlie Differences in Location-Sharing...FYI: Communication Style Preferences Underlie Differences in Location-Sharing...
FYI: Communication Style Preferences Underlie Differences in Location-Sharing...Bart Knijnenburg
Ā 
Preference-based Location Sharing: Are More Privacy Options Really Better?
Preference-based Location Sharing: Are More Privacy Options Really Better?Preference-based Location Sharing: Are More Privacy Options Really Better?
Preference-based Location Sharing: Are More Privacy Options Really Better?Bart Knijnenburg
Ā 
Big data - A critical appraisal
Big data - A critical appraisalBig data - A critical appraisal
Big data - A critical appraisalBart Knijnenburg
Ā 
Helping Users with Information Disclosure Decisions: Potential for Adaptation...
Helping Users with Information Disclosure Decisions: Potential for Adaptation...Helping Users with Information Disclosure Decisions: Potential for Adaptation...
Helping Users with Information Disclosure Decisions: Potential for Adaptation...Bart Knijnenburg
Ā 
Inspectability and Control in Social Recommenders
Inspectability and Control in Social RecommendersInspectability and Control in Social Recommenders
Inspectability and Control in Social RecommendersBart Knijnenburg
Ā 
Tutorial on Conducting User Experiments in Recommender Systems
Tutorial on Conducting User Experiments in Recommender SystemsTutorial on Conducting User Experiments in Recommender Systems
Tutorial on Conducting User Experiments in Recommender SystemsBart Knijnenburg
Ā 
Privacy in Mobile Personalized Systems - The Effect of Disclosure Justifications
Privacy in Mobile Personalized Systems - The Effect of Disclosure JustificationsPrivacy in Mobile Personalized Systems - The Effect of Disclosure Justifications
Privacy in Mobile Personalized Systems - The Effect of Disclosure JustificationsBart Knijnenburg
Ā 
Explaining the User Experience of Recommender Systems with User Experiments
Explaining the User Experience of Recommender Systems with User ExperimentsExplaining the User Experience of Recommender Systems with User Experiments
Explaining the User Experience of Recommender Systems with User ExperimentsBart Knijnenburg
Ā 
Using latent features diversification to reduce choice difficulty in recommen...
Using latent features diversification to reduce choice difficulty in recommen...Using latent features diversification to reduce choice difficulty in recommen...
Using latent features diversification to reduce choice difficulty in recommen...Bart Knijnenburg
Ā 
Recsys2011 presentation "Each to his own - How Different Users Call for Diffe...
Recsys2011 presentation "Each to his own - How Different Users Call for Diffe...Recsys2011 presentation "Each to his own - How Different Users Call for Diffe...
Recsys2011 presentation "Each to his own - How Different Users Call for Diffe...Bart Knijnenburg
Ā 
Recommendations and Feedback - The user-experience of a recommender system
Recommendations and Feedback - The user-experience of a recommender systemRecommendations and Feedback - The user-experience of a recommender system
Recommendations and Feedback - The user-experience of a recommender systemBart Knijnenburg
Ā 

More from Bart Knijnenburg (14)

Profiling Facebook Users' Privacy Behaviors
Profiling Facebook Users' Privacy BehaviorsProfiling Facebook Users' Privacy Behaviors
Profiling Facebook Users' Privacy Behaviors
Ā 
Counteracting the negative effect of form auto-completion on the privacy calc...
Counteracting the negative effect of form auto-completion on the privacy calc...Counteracting the negative effect of form auto-completion on the privacy calc...
Counteracting the negative effect of form auto-completion on the privacy calc...
Ā 
FYI: Communication Style Preferences Underlie Differences in Location-Sharing...
FYI: Communication Style Preferences Underlie Differences in Location-Sharing...FYI: Communication Style Preferences Underlie Differences in Location-Sharing...
FYI: Communication Style Preferences Underlie Differences in Location-Sharing...
Ā 
Preference-based Location Sharing: Are More Privacy Options Really Better?
Preference-based Location Sharing: Are More Privacy Options Really Better?Preference-based Location Sharing: Are More Privacy Options Really Better?
Preference-based Location Sharing: Are More Privacy Options Really Better?
Ā 
Big data - A critical appraisal
Big data - A critical appraisalBig data - A critical appraisal
Big data - A critical appraisal
Ā 
Helping Users with Information Disclosure Decisions: Potential for Adaptation...
Helping Users with Information Disclosure Decisions: Potential for Adaptation...Helping Users with Information Disclosure Decisions: Potential for Adaptation...
Helping Users with Information Disclosure Decisions: Potential for Adaptation...
Ā 
Hcsd talk ibm
Hcsd talk ibmHcsd talk ibm
Hcsd talk ibm
Ā 
Inspectability and Control in Social Recommenders
Inspectability and Control in Social RecommendersInspectability and Control in Social Recommenders
Inspectability and Control in Social Recommenders
Ā 
Tutorial on Conducting User Experiments in Recommender Systems
Tutorial on Conducting User Experiments in Recommender SystemsTutorial on Conducting User Experiments in Recommender Systems
Tutorial on Conducting User Experiments in Recommender Systems
Ā 
Privacy in Mobile Personalized Systems - The Effect of Disclosure Justifications
Privacy in Mobile Personalized Systems - The Effect of Disclosure JustificationsPrivacy in Mobile Personalized Systems - The Effect of Disclosure Justifications
Privacy in Mobile Personalized Systems - The Effect of Disclosure Justifications
Ā 
Explaining the User Experience of Recommender Systems with User Experiments
Explaining the User Experience of Recommender Systems with User ExperimentsExplaining the User Experience of Recommender Systems with User Experiments
Explaining the User Experience of Recommender Systems with User Experiments
Ā 
Using latent features diversification to reduce choice difficulty in recommen...
Using latent features diversification to reduce choice difficulty in recommen...Using latent features diversification to reduce choice difficulty in recommen...
Using latent features diversification to reduce choice difficulty in recommen...
Ā 
Recsys2011 presentation "Each to his own - How Different Users Call for Diffe...
Recsys2011 presentation "Each to his own - How Different Users Call for Diffe...Recsys2011 presentation "Each to his own - How Different Users Call for Diffe...
Recsys2011 presentation "Each to his own - How Different Users Call for Diffe...
Ā 
Recommendations and Feedback - The user-experience of a recommender system
Recommendations and Feedback - The user-experience of a recommender systemRecommendations and Feedback - The user-experience of a recommender system
Recommendations and Feedback - The user-experience of a recommender system
Ā 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
Ā 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
Ā 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
Ā 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
Ā 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
Ā 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
Ā 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
Ā 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
Ā 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdfssuser54595a
Ā 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
Ā 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
Ā 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
Ā 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
Ā 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
Ā 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
Ā 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
Ā 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Ā 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Ā 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Ā 
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
Ā 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
Ā 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Ā 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Ā 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
Ā 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
Ā 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
Ā 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Ā 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Ā 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
Ā 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
Ā 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
Ā 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
Ā 

CSCW networked privacy workshop - keynote

  • 1. Is privacy a matter of transparency and control? Towards a Privacy Adaptation Procedure
  • 2. Outline 1. Beyond transparency and control Privacy calculus, more paradoxes, and bounded rationality 2. Privacy nudging A solution inspired by decision sciences... with some ļ¬‚aws 3. Privacy Adaptation Procedure Adaptive nudges based on a contextualized understanding of usersā€™ privacy concerns INFORMATION AND COMPUTER SCIENCES
  • 3. Beyond transparency and control Privacy calculus, more paradoxes, and bounded rationality
  • 4. The state of privacy, 2013 INFORMATION AND COMPUTER SCIENCES
  • 5. A model by Smith et al. 2011 Why arenā€™t these more strongly related? Transparency Control INFORMATION AND COMPUTER SCIENCES
  • 6. Transparency and control Transparency Control Informed consent User empowerment ā€œcompanies should ā€œcompanies should offer provide clear descriptions consumers clear and of [...] why they need the simple choices [...] about data, how they will use itā€ personal data collection, use, and disclosureā€ INFORMATION AND COMPUTER SCIENCES
  • 7. Examples from your work Na Wang, Heng Xu, and Jens Grossklags ā€œOur new designs encompass control and awareness as the essential dimensions of usersā€™ privacy concerns in the context of third-party apps on Facebook.ā€ Jessica Vitak ā€œUsers may also employ advanced privacy settings to segregate audiences, so they can still share relevant content with their various connectionsā€ INFORMATION AND COMPUTER SCIENCES
  • 8. Examples from your work Stacy Blasiola ā€œBy drawing awareness to the issue, users will be better equipped to understand the vulnerabilities posed by third party applicationsā€ Ralf De Wolf and Jo Pierson ā€œdifferent audience management strategies [...] can be used as a framework for access control models and/or feedback and awareness toolsā€ INFORMATION AND COMPUTER SCIENCES
  • 9. The Transparency Paradox Useful for concerned users, but bad for others Makes them more fearful Any mention of privacy, whether it is favorable or not, triggers privacy concerns INFORMATION AND COMPUTER SCIENCES
  • 10. Example: Website A/B testing INFORMATION AND COMPUTER SCIENCES
  • 11. The Control Paradox Decisions are too numerous Most Facebook users donā€™t know implications of their own privacy settings! Decisions are difficult Uncertain and delayed outcomes Control gives a false sense of security INFORMATION AND COMPUTER SCIENCES
  • 12. Beyond control Eden Litt ā€œwhile many sites give users a variety of buttons and dashboards to help them technologically enforce their privacy, these features are only useful if users are aware that they exist, know where to ļ¬nd them, and use them effectivelyā€ Ralf De Wolf and Jo Pierson ā€œin an online environment managing privacy becomes a time-consuming choreā€ INFORMATION AND COMPUTER SCIENCES
  • 13. Example: Facebook ā€œbewildering tangle of optionsā€ (New York Times, 2010) ā€œlabyrinthianā€ controlsā€ (U.S. Consumer Magazine, 2012) INFORMATION AND COMPUTER SCIENCES
  • 14. Example: Knijnenburg et al. Introducing an ā€œextremeā€ sharing option E Nothing - City - Block beneļ¬ts --> Add the option Exact B Expected: C Some will choose Exact instead of Block N Unexpected: privacy --> Sharing increases across the board! bit.ly/chi2013privacy INFORMATION AND COMPUTER SCIENCES
  • 15. Bounded rationality Peopleā€™s decisions are inconsistent and seemingly irrational - Framing effects - Default effects - Order effects Transparency: Information overload Control: Choice overload INFORMATION AND COMPUTER SCIENCES
  • 16. Example: Acquisti et al. Foot in the door Door in the face (innocuous requests ļ¬rst) (risquĆ© requests ļ¬rst) INFORMATION AND COMPUTER SCIENCES
  • 17. Example: Acquisti et al. 1400 1200 Cumulative admission rates in percentages 1000 800 Decreasing Increasing 600 Baseline 400 200 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Question number (Increasing condition) INFORMATION AND COMPUTER SCIENCES
  • 18. Example: Lai and Hui A Please send me Vortrex Newsletters and information. 25% 4. B Please do not send me Vortrex Newsletters and information. 37%the In C Please send me Vortrex Newsletters and information. 53% inher defau D Please do not send me Vortrex Newsletters and information. 0% t onlin The Figure 4: Subjects were assigned one of the following conditions the s in the registration page. Conn 3.1. Data Analysis and Results actio The mean levels of participations in each experimental condition are nega reported in Table 1 below. conv Table 1: Mean participation levels as a function of frames and posit INFORMATION AND COMPUTER SCIENCES
  • 19. Summary of part 1 We need to move beyond control and transparency Rational privacy decision- making is bounded Transparency and control increase choice difficulty INFORMATION AND COMPUTER SCIENCES
  • 20. Privacy nudging A solution inspired by decision sciences... with some ļ¬‚aws
  • 21. A new model Jessica Vitak ā€œit is likely that users employ a number of strategies when making decisions regarding what and with whom to share content onlineā€ These strategies are not rational, therefore: - People do not always choose what is best for them - There is signiļ¬cant leeway to inļ¬‚uence people's decisions - Being objectively neutral is impossible INFORMATION AND COMPUTER SCIENCES
  • 22. A new model Jessica Vitak ā€œit is likely that users employ a number of strategies when making decisions regarding what and with whom to share content onlineā€ These strategies are not rational, therefore: - People do not always choose what is best for them - There is signiļ¬cant leeway to inļ¬‚uence people's decisions - Being objectively neutral is impossible INFORMATION AND COMPUTER SCIENCES
  • 23. A new model Behavioral reactions (including disclosures) Default Default Nudge Nudge order value Decision Privacy Calculus strategies Justiļ¬cation Nudge Justiļ¬cation Nudge Risk/ Benfits Costs INFORMATION AND COMPUTER SCIENCES
  • 24. A new model Default Justiļ¬cation value A succinct reason to Relieve users from the disclose (or not disclose) burden of making decisions a piece of information - Path of least resistance - Make it easier to - Implicit normative cue rationalize the decision (what I should do) - Minimize the potential - Endowment effect (what regret of choosing the I have is worth more than wrong option what I donā€™t have) INFORMATION AND COMPUTER SCIENCES
  • 25. Example: Acquisti et al. 1400 1200 Cumulative admission rates in percentages 1000 800 Decreasing Increasing 600 Baseline 400 200 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Question number (Increasing condition) INFORMATION AND COMPUTER SCIENCES
  • 26. Example: Knijnenburg & Kobsa Disclosure*behavior* * Demographics*disclosure * *Context*disclosure* Context#ļ¬rst# Demographics#ļ¬rst# Context#ļ¬rst# Demograpics#ļ¬rst# 100%# 90%# 80%# 70%# 60%# 50%# 40%# 30%# 20%# 10%# 0%# bit.ly/tiis2013 INFORMATION AND COMPUTER SCIENCES
  • 27. Example: Lai and Hui A Please send me Vortrex Newsletters and information. 25% 4. B Please do not send me Vortrex Newsletters and information. 37%the In C Please send me Vortrex Newsletters and information. 53% inher defau D Please do not send me Vortrex Newsletters and information. 0% t onlin The Figure 4: Subjects were assigned one of the following conditions the s in the registration page. Conn 3.1. Data Analysis and Results actio The mean levels of participations in each experimental condition are nega reported in Table 1 below. conv Table 1: Mean participation levels as a function of frames and posit INFORMATION AND COMPUTER SCIENCES
  • 28. Example: Brown & Krishna %pt increase in ā€œHighā€ compared to baseline Default High default works Reactance when aware of motives INFORMATION AND COMPUTER SCIENCES
  • 29. Example: Knijnenburg & Kobsa 5 justiļ¬cation types None Useful for you Number of others Useful for others Explanation bit.ly/tiis2013 INFORMATION AND COMPUTER SCIENCES
  • 30. Example: Knijnenburg & Kobsa Disclosure*behavior* * Demographics*disclosure * *Context*disclosure* Context"ļ¬rst" Demographics"ļ¬rst" Context"ļ¬rst" Demograpics"ļ¬rst" 100%" 90%" 1" 80%" ***" 70%" *" **" *" 60%" *" *" 50%" 40%" 30%" 20%" 10%" 0%" none" useful"for"you" #"of"others" useful"for"others" explanaDon" bit.ly/tiis2013 INFORMATION AND COMPUTER SCIENCES
  • 31. Example: Knijnenburg & Kobsa Sa#sfac#on)with)) Disclosure*behavior* the)system) Anticipated satisfaction with * Demographics*disclosure * *Context*disclosure* the system (intention to use): Context"ļ¬rst" Demographics"ļ¬rst" 1,00" Context"ļ¬rst" Demograpics"ļ¬rst" 100%" 0,75" 90%" 6 items,1"e.g. ā€œI would ***" 0,50" 80%" recommend the system 70%" 0,25" *" **" *" 60%" to othersā€ 0,00" *" *" 50%" $0,25" Lower for any justiļ¬cation! 40%" 30%" $0,50" 1" 20%" $0,75" **" **" 10%" $1,00" ***" 0%" none" useful"for"you" #"of"others" useful"for"others" explanaDon" bit.ly/tiis2013 INFORMATION AND COMPUTER SCIENCES
  • 32. Problems with Privacy Nudging What should be the purpose of the nudge? ā€œMore information = better, e.g. for personalizationā€ Techniques to increase disclosure cause reactance in the more privacy-minded users ā€œPrivacy is an absolute rightā€œ More difficult for less privacy-minded users to enjoy the beneļ¬ts that disclosure would provide INFORMATION AND COMPUTER SCIENCES
  • 33. Problems with Privacy Nudging Smith, Goldstein & Johnson: ā€œWhat is best for consumers depends upon characteristics of the consumer: An outcome that maximizes consumer welfare may be suboptimal for some consumers in a context where there is heterogeneity in preferences.ā€ INFORMATION AND COMPUTER SCIENCES
  • 34. Summary of part 2 Nudges work Defaults and justiļ¬cations can inļ¬‚uence usersā€™ decisions But we cannot nudge everyone the same way! Users differ in their disclosure preferences Nudges should respect these differences INFORMATION AND COMPUTER SCIENCES
  • 35. Privacy Adaptation Procedure Adaptive nudges based on a contextualized understanding of usersā€™ privacy concerns
  • 36. Contextualized preferences Sameer Patil et al. ā€œOne of the factors contributing to this ā€œprivacy paradoxā€ is the decoupling of the circumstances in which privacy- affecting behaviors occur from the time at which privacy concerns are expressedā€ Sam McNeilly,Ā Luke Hutton, andĀ Tristan Henderson ā€œParticipants were willing to share different types of information in different waysā€ INFORMATION AND COMPUTER SCIENCES
  • 37. Contextualized preferences Pamela Wisniewski andĀ Heather Richter Lipford ā€œBy operationalizing SNSĀ desired privacy level at a more granular level, we wereĀ able to unpack, if not disprove, aspects of the privacyĀ paradoxā€ Sam McNeilly,Ā Luke Hutton, andĀ Tristan Henderson ā€œprivacy settings are fairly robust to capturing people's contextual norms over timeā€ INFORMATION AND COMPUTER SCIENCES
  • 38. Contextualized preferences Contextualize The optimal justiļ¬cation and different users default may depend on: - type of info (what) different context Privacy - user characteristics (who) decision - recipient (to whom) - etc... INFORMATION AND COMPUTER SCIENCES
  • 39. Example: Knijnenburg et al. Type of data ID Items 1 Wall 2 Status updates Facebook activity 3 Shared links 4 Notes 5 Photos 6 ā€œWhat?ā€ Hometown Location 7 = Location (city) 8 Location (state/province) 9 Four Residence (street address) Contact info dimensions 11 Phone number 12 Email address 13 Religious views Life/interests 14 Interests (favorite movies, etc.) 15 Facebook groups bit.ly/privdim INFORMATION AND COMPUTER SCIENCES
  • 40. Example: Knijnenburg et al. ā€œWho?ā€ = Five disclosure proļ¬les 159 pps tend to share little information overall (LowD) 26 pps tend to share activities and interests (Act+IntD) 50 pps tend to share location and interests (Loc+IntD) 65 pps tend to share everything but contact info (Hi-ConD) 59 pps tend to share everything bit.ly/privdim INFORMATION AND COMPUTER SCIENCES
  • 41. Example: Knijnenburg et al. Detect class member- ship bit.ly/privdim INFORMATION AND COMPUTER SCIENCES
  • 42. Example: Knijnenburg & Kobsa I care about the beneļ¬ts I do whatever others do INFORMATION AND COMPUTER SCIENCES
  • 43. disclosure tendency, where requesting context data first leads to less threat and more trust. Best Strategy to Achieve High Total Disclosure Since it is best to ask demographics first to increase Figure 4 compares for each group the best strategy (marked demographics disclosure, and context first to increase Example: Knijnenburg & Kobsa with an arrow) against all other strategies. Strategies that context disclosure, increasing total disclosure asks for a perform significantly worse than the best strategy are compromise. The best way to attain this compromise is to labeled with a p-value. first choose a preferred request order, and then to select a User type Context first Demographics first Males with low The ā€˜useful for youā€™ justification gives the Providing no justification gives the highest disclosure tendency highest demographics disclosure. context disclosure. Females with low Providing no justification gives the highest The ā€˜explanationā€™ justification keeps disclosure tendency demographics disclosure. context disclosure on par. Males with high The ā€˜useful for othersā€™ justification keeps The ā€˜useful for youā€™ justification keeps disclosure tendency demographics disclosure almost on par. context disclosure on par. Females with high Providing no justification gives a high The ā€˜useful for youā€™ justification gives the disclosure tendency demographics disclosure. highest context disclosure. Table 2: Best strategies to achieve high overall disclosures. User type Best strategy Males with low disclosure tendency Demographics first with ā€˜useful for youā€™. Males with high disclosure tendency The ā€˜useful for youā€™ justification in any order. Females with low disclosure tendency Context first with ā€˜useful for youā€™. Females with high disclosure tendency Context first with no justification, but ā€˜useful for youā€™ is second best. Table 3: Best strategies to achieve high user satisfaction. bit.ly/iui2013 INFORMATION AND COMPUTER SCIENCES
  • 44. The Adaptive Privacy Procedure ā€¢ Determine the item-. user-, and recipient-type ā€¢ Select the default and justification that fits best for this context pshare = Ī± + Ī²itemtype + Ī²usertype + Ī²recipienttype OUTPUT INPUT {user, item, recipient} {defaults, justification} INFORMATION AND COMPUTER SCIENCES
  • 45. The Adaptive Privacy Procedure Practical use: - Automatic initial defaults in line with ā€œdisclosure proļ¬leā€ - Personalized disclosure justiļ¬cations Relieves some of the burden of the privacy decision: The right privacy-related information The right amount of control ā€œRealistic empowermentā€ INFORMATION AND COMPUTER SCIENCES
  • 46. Summary of part 3 Smith, Goldstein & Johnson: ā€œthe idea of an adaptive default preserves considerable consumer autonomy [...] and strikes a balance between providing more choice and providing the right choices.ā€ INFORMATION AND COMPUTER SCIENCES
  • 47. Final summary 1. Beyond transparency and control Rational privacy decision-making is bounded, and transparency and control only increase choice difficulty 2. Privacy nudging Needs to move beyond the one-size-ļ¬ts-all approach 3. Privacy Adaptation Procedure The optimal balance between nudges and control INFORMATION AND COMPUTER SCIENCES