SlideShare ist ein Scribd-Unternehmen logo
1 von 50
THE SOCIAL WEB:
AN INTRO TO
PRIVACY AND
INFORMATION
SHARING
Giulia ranzini (g.ranzini@vu.nl)
Class Today:
• A Definition of (online) Privacy
• Privacy on Social Media
1
A DEFINITION
OF (ONLINE)
PRIVACY
Why do we talk so much about
privacy?
Wikileaks
• Born in 2006
• Collects and publishes
documents leaked
from single individuals
including details on
wrongdoings of
governments and
companies.
Prism/1
In 2009, Edward Snowden, a
tech employee of Dell, was
assigned to protect the NSA
against cyberattacks from
China. In a matter of five years,
he was hired by the NSA and
moved to Hawaii, where he
worked as a “system
administrator”. In reality, he was
trained as a spy.
Prism/2
What he found was an
immense program of
surveillance called
PRISM, developed by
the US in collaboration
with Austrialian and
British Secret Services.
Prism had information
on:
• Virtually all EU leaders and ministers
• Leaders of international charities, among
others UNICEF and Medecins sans Frontieres
• Companies like Siemens (GER) or Petrobras
• Yahoo and Gmail users
• Gamers playing WoW, Second Life, all games
on Xbox Live
AND YET…
10
Elements of privacy
Privacy is defined by cultures…
Greece Sweden
Elements of privacy
Privacy is defined by time…
What is
privacy to you?
A definition of privacy
1. “The right to be left alone” (Warren & Brandeis,
1890, p. 195)
2. The selective control of access to the self
(Altman, 1975, p. 24)
3. Ability of people to determine when, how, and to
what extent, information about them is
communicated to others (Westin, 1968)
Two theories of privacy
Two theories of privacy
Westin (1967):
From Political Science, not
behavioral sciences
“People have a need for privacy”
Westin – four forms of privacy
Westin – four objectives of
privacy
Two theories of privacy
Altman (1975):
Privacy has many purposes, one of
which is to give rise to identities.
Social interaction is important for
the creation of cultural identities:
privacy regulates that.
Altman – five elements of privacy
Boundaries?
It is also what
prevents
intimacy from
forming in
relationships.
The typical example
Boundaries & Privacy
A boundary is most often what is put
between the life that is public…
A boundary is most often what is put
between the life that is public…
…And what
needs to
stay private.
LET’S TRY A TINY
FACEBOOK
EXPERIMENT
A small facebook experiment
1. Take your laptop/tablet/phone
2. Log in to facebook.com (from the browser, not
eventual apps)
3. Click on the lock on the right handside
4. Select ”Settings”
A small facebook
experiment/2
5. Click on ”Adverts”
6. From ”Adverts”, select ”Adverts
based on my preferences
7. Click on ”Edit”
What can you
observe?
Some items are scarily
accurate
Some items are (really) dumb
I wish…
Not true! No.
No.
Allergic.
Why is that?
2PRIVACY AND
SOCIAL
MEDIA
A simple truth
The way we think about privacy,
especially online, is always in a
tradeoff against something else.
Tradeoffs/1
Tradeoffs/2
Online tradeoffs
Most of the services we use online
are free to us. Of course, they are
not really free.
In the tradeoff between not using
such services and using them, we
decide to use them. This makes our
data the currency we use to pay for
those services.
For example…
Facebook app on your phone
The privacy paradox
The privacy paradox
How about you?
What determines privacy
settings?
• Concerns in terms of privacy
• Impression Management
• Disposition to trust
• Narcissism
• Norms
Utz & Krämer (2009), 3 studies in NL and GER.
Institutional VS social
privacy
Institutional Privacy
Social Privacy
Privacy related to institutions such
as companies and institutions.
Concerns are about surveillance
and loss of ownership over
individual data.
Privacy related to social
relationships and peers.
Concerns are about identity theft,
stalking or other types of privacy-
invasive behaviors.
Identified risks
• Stalking
• Identity theft
• Blackmailing
• Damaged reputations
• Unwanted contacts
• Surveillance
• Misuse of data by third parties
• Mixing personal and professional circles
Not to mention…
The Icloud hack of celebrity pictures in 2014!
Then why do we keep
sharing?
Uses and gratifications:Uses and gratifications:
Third person effect:Third person effect:
Ritualized Media UseRitualized Media Use
• Need for distraction and
entertainment
• Need for (para) social relations
• Need for identity construction
• Negative effects are considered more
likely for others than for the self.
• Social Media use is a habit, and as
such can hardly be controlled
Or are we just growing more
cynical?
• Users react to risks coming from their immediate
social environment (Hargittai & boyd, 2010)…
• …And yet fail to do so when it comes to
institutional (i.e. company-related) risks (Raynes-
Goldie, 2010; Young & Quan-Haase, 2013)
• One possible explanation for this is a recent
growth in cynicism around privacy.
Privacy cynicism
Privacy cynicism is defined as an attitude of
uncertainty, powerlessness and
mistrust towards the handling of personal data by
online services, rendering privacy
protection behavior meaningless.
Hoffman,Lutz & Ranzini, 2015
why cynicism?
I know my data could be used
against my knowledge, but
what can I do?
It’s not like I
could do
something
about it
Whatever…they
already have all
of my data
anyway.
Why cynicism?
• Cynicism in general is described as a coping
mechanism
• To social situations where the subject feels
helpless
• To situations where the motives of others
are not easy to understand.
• Privacy Cynicism acts on the tradeoff making
individuals feel like their defenses are too low to
take any action.
Questions?
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?Mathias Klang
 
Intro to Social Media for DSFRS - 22nd July2010
Intro to Social Media for DSFRS - 22nd July2010Intro to Social Media for DSFRS - 22nd July2010
Intro to Social Media for DSFRS - 22nd July2010Carl Haggerty
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Mathias Klang
 
Popular Issues in (Digital) Media Literacy
Popular Issues in (Digital) Media LiteracyPopular Issues in (Digital) Media Literacy
Popular Issues in (Digital) Media LiteracyAlec Couros
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - pptJincy24
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship RedefinedConnectSafely
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible? Mathias Klang
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbookdanderson688
 
Online Privacy - Facebook Use of Your Data
Online Privacy - Facebook Use of Your Data Online Privacy - Facebook Use of Your Data
Online Privacy - Facebook Use of Your Data danielleargese
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
Ethics of Social Media Monitoring
Ethics of Social Media MonitoringEthics of Social Media Monitoring
Ethics of Social Media MonitoringRobert Berkman
 
Jack dorsey twitter
Jack dorsey twitterJack dorsey twitter
Jack dorsey twittermikelmartil
 
Hackers are people too
Hackers are people tooHackers are people too
Hackers are people tooAmanda Berlin
 
Tips to stay safe and responsible on social media
Tips to stay safe and responsible on social mediaTips to stay safe and responsible on social media
Tips to stay safe and responsible on social mediakayliewest
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishingecarrow
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
Florida social media
Florida social mediaFlorida social media
Florida social mediaNicole Black
 
Lesson 1 maintaining internet safety(unit 1)
Lesson 1    maintaining internet safety(unit 1)Lesson 1    maintaining internet safety(unit 1)
Lesson 1 maintaining internet safety(unit 1)FRANCISANGELOBANTAT
 

Was ist angesagt? (20)

Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Intro to Social Media for DSFRS - 22nd July2010
Intro to Social Media for DSFRS - 22nd July2010Intro to Social Media for DSFRS - 22nd July2010
Intro to Social Media for DSFRS - 22nd July2010
 
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma
 
Popular Issues in (Digital) Media Literacy
Popular Issues in (Digital) Media LiteracyPopular Issues in (Digital) Media Literacy
Popular Issues in (Digital) Media Literacy
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - ppt
 
Digital Citizenship Redefined
Digital Citizenship RedefinedDigital Citizenship Redefined
Digital Citizenship Redefined
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?
 
Digital media flipbook
Digital media flipbookDigital media flipbook
Digital media flipbook
 
Online Privacy - Facebook Use of Your Data
Online Privacy - Facebook Use of Your Data Online Privacy - Facebook Use of Your Data
Online Privacy - Facebook Use of Your Data
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Ethics of Social Media Monitoring
Ethics of Social Media MonitoringEthics of Social Media Monitoring
Ethics of Social Media Monitoring
 
Jack dorsey twitter
Jack dorsey twitterJack dorsey twitter
Jack dorsey twitter
 
Hackers are people too
Hackers are people tooHackers are people too
Hackers are people too
 
Tips to stay safe and responsible on social media
Tips to stay safe and responsible on social mediaTips to stay safe and responsible on social media
Tips to stay safe and responsible on social media
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
Florida social media
Florida social mediaFlorida social media
Florida social media
 
Lesson 1 maintaining internet safety(unit 1)
Lesson 1    maintaining internet safety(unit 1)Lesson 1    maintaining internet safety(unit 1)
Lesson 1 maintaining internet safety(unit 1)
 

Andere mochten auch

11 necto installation_ready
11 necto installation_ready11 necto installation_ready
11 necto installation_readywww.panorama.com
 
Progetto 5 comuni del Pasubio - scuola Vallarsa
Progetto 5  comuni del Pasubio - scuola VallarsaProgetto 5  comuni del Pasubio - scuola Vallarsa
Progetto 5 comuni del Pasubio - scuola Vallarsaguestf9daa3a
 
Estudio Del Movimiento Por Jose Manuel Berrio
Estudio Del Movimiento Por Jose Manuel BerrioEstudio Del Movimiento Por Jose Manuel Berrio
Estudio Del Movimiento Por Jose Manuel Berriojombe403
 
Prioritas Diklat
Prioritas DiklatPrioritas Diklat
Prioritas Diklatsu7as
 
Chris Thorngate evaluation
Chris Thorngate evaluationChris Thorngate evaluation
Chris Thorngate evaluationguestd7608fd
 
Online sourceselementary
Online sourceselementaryOnline sourceselementary
Online sourceselementaryEllen Brandt
 
Crescent/Stonco LED Brochure
Crescent/Stonco LED BrochureCrescent/Stonco LED Brochure
Crescent/Stonco LED BrochureColleen2782
 
Capodian Investment Management
Capodian Investment ManagementCapodian Investment Management
Capodian Investment ManagementAnthonySchnur
 
Konpers LSI Denny JA Desember 2016 - Mayoritas Publik Ingin Gubernur Baru DKI
Konpers LSI Denny JA Desember 2016 - Mayoritas Publik Ingin Gubernur Baru DKIKonpers LSI Denny JA Desember 2016 - Mayoritas Publik Ingin Gubernur Baru DKI
Konpers LSI Denny JA Desember 2016 - Mayoritas Publik Ingin Gubernur Baru DKIFahd Pahdepie
 
VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3Davide Ceolin
 
開啟Q9 Ue版九方
開啟Q9 Ue版九方開啟Q9 Ue版九方
開啟Q9 Ue版九方Warren Yip
 
Mlc For Cities Introduction To The Concept
Mlc For Cities Introduction To The ConceptMlc For Cities Introduction To The Concept
Mlc For Cities Introduction To The ConceptMultiLingualCity
 

Andere mochten auch (20)

2017 Digital Yearbook
2017 Digital Yearbook2017 Digital Yearbook
2017 Digital Yearbook
 
11 necto installation_ready
11 necto installation_ready11 necto installation_ready
11 necto installation_ready
 
Progetto 5 comuni del Pasubio - scuola Vallarsa
Progetto 5  comuni del Pasubio - scuola VallarsaProgetto 5  comuni del Pasubio - scuola Vallarsa
Progetto 5 comuni del Pasubio - scuola Vallarsa
 
Estudio Del Movimiento Por Jose Manuel Berrio
Estudio Del Movimiento Por Jose Manuel BerrioEstudio Del Movimiento Por Jose Manuel Berrio
Estudio Del Movimiento Por Jose Manuel Berrio
 
Zorgloket
ZorgloketZorgloket
Zorgloket
 
Prioritas Diklat
Prioritas DiklatPrioritas Diklat
Prioritas Diklat
 
Chris Thorngate evaluation
Chris Thorngate evaluationChris Thorngate evaluation
Chris Thorngate evaluation
 
Kommunikationsplanering
KommunikationsplaneringKommunikationsplanering
Kommunikationsplanering
 
Grönare med it
Grönare med itGrönare med it
Grönare med it
 
MVC CSRF Protection
MVC CSRF ProtectionMVC CSRF Protection
MVC CSRF Protection
 
SEAP Andreas Lamppa
SEAP Andreas LamppaSEAP Andreas Lamppa
SEAP Andreas Lamppa
 
How it's made
How it's madeHow it's made
How it's made
 
Online sourceselementary
Online sourceselementaryOnline sourceselementary
Online sourceselementary
 
Crescent/Stonco LED Brochure
Crescent/Stonco LED BrochureCrescent/Stonco LED Brochure
Crescent/Stonco LED Brochure
 
Capodian Investment Management
Capodian Investment ManagementCapodian Investment Management
Capodian Investment Management
 
Konpers LSI Denny JA Desember 2016 - Mayoritas Publik Ingin Gubernur Baru DKI
Konpers LSI Denny JA Desember 2016 - Mayoritas Publik Ingin Gubernur Baru DKIKonpers LSI Denny JA Desember 2016 - Mayoritas Publik Ingin Gubernur Baru DKI
Konpers LSI Denny JA Desember 2016 - Mayoritas Publik Ingin Gubernur Baru DKI
 
seequence
seequenceseequence
seequence
 
VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3
 
開啟Q9 Ue版九方
開啟Q9 Ue版九方開啟Q9 Ue版九方
開啟Q9 Ue版九方
 
Mlc For Cities Introduction To The Concept
Mlc For Cities Introduction To The ConceptMlc For Cities Introduction To The Concept
Mlc For Cities Introduction To The Concept
 

Ähnlich wie Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)

Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social MediaDilna DV
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and AdvantageTechno World 4 U
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsICT Watch - Indonesia
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingSofia Naznim
 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA Surender Singh
 
10 Rules for Social Media Engagement
10 Rules for Social Media Engagement10 Rules for Social Media Engagement
10 Rules for Social Media EngagementLaura Lee Dooley
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The UglyDr. Joel Evans
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Badmanesh Makheja
 
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tSocial Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tjordanwollman
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 

Ähnlich wie Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini) (20)

Privacy & Elvis
Privacy & ElvisPrivacy & Elvis
Privacy & Elvis
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
whistle blowing.
whistle blowing.whistle blowing.
whistle blowing.
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social Networking
 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA
 
10 Rules for Social Media Engagement
10 Rules for Social Media Engagement10 Rules for Social Media Engagement
10 Rules for Social Media Engagement
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
Social Media - It Can Be Good, Bad, and Ugly
Social Media  - It Can Be Good, Bad, and UglySocial Media  - It Can Be Good, Bad, and Ugly
Social Media - It Can Be Good, Bad, and Ugly
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
 
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn'tSocial Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 

Mehr von Davide Ceolin

Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...Davide Ceolin
 
Provenance as a Key Factor for Privacy-proof Trust
Provenance as a Key Factor for Privacy-proof TrustProvenance as a Key Factor for Privacy-proof Trust
Provenance as a Key Factor for Privacy-proof TrustDavide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1 VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1 Davide Ceolin
 
Semi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation TrustworthinessSemi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation TrustworthinessDavide Ceolin
 
Subjective Logic Extensions for the Web and the Semantic Web
Subjective Logic Extensions for the Web and the Semantic WebSubjective Logic Extensions for the Web and the Semantic Web
Subjective Logic Extensions for the Web and the Semantic WebDavide Ceolin
 
Trust Evaluation through User Reputation and Provenance Analysis
Trust Evaluation through User Reputation and Provenance AnalysisTrust Evaluation through User Reputation and Provenance Analysis
Trust Evaluation through User Reputation and Provenance AnalysisDavide Ceolin
 

Mehr von Davide Ceolin (10)

Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
 
Provenance as a Key Factor for Privacy-proof Trust
Provenance as a Key Factor for Privacy-proof TrustProvenance as a Key Factor for Privacy-proof Trust
Provenance as a Key Factor for Privacy-proof Trust
 
VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6
 
VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5
 
VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4
 
VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2
 
VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1 VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1
 
Semi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation TrustworthinessSemi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation Trustworthiness
 
Subjective Logic Extensions for the Web and the Semantic Web
Subjective Logic Extensions for the Web and the Semantic WebSubjective Logic Extensions for the Web and the Semantic Web
Subjective Logic Extensions for the Web and the Semantic Web
 
Trust Evaluation through User Reputation and Provenance Analysis
Trust Evaluation through User Reputation and Provenance AnalysisTrust Evaluation through User Reputation and Provenance Analysis
Trust Evaluation through User Reputation and Provenance Analysis
 

Kürzlich hochgeladen

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Kürzlich hochgeladen (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)

  • 1. THE SOCIAL WEB: AN INTRO TO PRIVACY AND INFORMATION SHARING Giulia ranzini (g.ranzini@vu.nl)
  • 2. Class Today: • A Definition of (online) Privacy • Privacy on Social Media
  • 4. Why do we talk so much about privacy?
  • 5.
  • 6. Wikileaks • Born in 2006 • Collects and publishes documents leaked from single individuals including details on wrongdoings of governments and companies.
  • 7. Prism/1 In 2009, Edward Snowden, a tech employee of Dell, was assigned to protect the NSA against cyberattacks from China. In a matter of five years, he was hired by the NSA and moved to Hawaii, where he worked as a “system administrator”. In reality, he was trained as a spy.
  • 8. Prism/2 What he found was an immense program of surveillance called PRISM, developed by the US in collaboration with Austrialian and British Secret Services.
  • 9. Prism had information on: • Virtually all EU leaders and ministers • Leaders of international charities, among others UNICEF and Medecins sans Frontieres • Companies like Siemens (GER) or Petrobras • Yahoo and Gmail users • Gamers playing WoW, Second Life, all games on Xbox Live
  • 11. Elements of privacy Privacy is defined by cultures… Greece Sweden
  • 12. Elements of privacy Privacy is defined by time…
  • 14. A definition of privacy 1. “The right to be left alone” (Warren & Brandeis, 1890, p. 195) 2. The selective control of access to the self (Altman, 1975, p. 24) 3. Ability of people to determine when, how, and to what extent, information about them is communicated to others (Westin, 1968)
  • 15. Two theories of privacy
  • 16. Two theories of privacy Westin (1967): From Political Science, not behavioral sciences “People have a need for privacy”
  • 17. Westin – four forms of privacy
  • 18. Westin – four objectives of privacy
  • 19. Two theories of privacy Altman (1975): Privacy has many purposes, one of which is to give rise to identities. Social interaction is important for the creation of cultural identities: privacy regulates that.
  • 20. Altman – five elements of privacy
  • 21. Boundaries? It is also what prevents intimacy from forming in relationships.
  • 23. Boundaries & Privacy A boundary is most often what is put between the life that is public… A boundary is most often what is put between the life that is public… …And what needs to stay private.
  • 24. LET’S TRY A TINY FACEBOOK EXPERIMENT
  • 25. A small facebook experiment 1. Take your laptop/tablet/phone 2. Log in to facebook.com (from the browser, not eventual apps) 3. Click on the lock on the right handside 4. Select ”Settings”
  • 26. A small facebook experiment/2 5. Click on ”Adverts” 6. From ”Adverts”, select ”Adverts based on my preferences 7. Click on ”Edit”
  • 28. Some items are scarily accurate
  • 29. Some items are (really) dumb I wish… Not true! No. No. Allergic.
  • 32. A simple truth The way we think about privacy, especially online, is always in a tradeoff against something else.
  • 35. Online tradeoffs Most of the services we use online are free to us. Of course, they are not really free. In the tradeoff between not using such services and using them, we decide to use them. This makes our data the currency we use to pay for those services.
  • 40. What determines privacy settings? • Concerns in terms of privacy • Impression Management • Disposition to trust • Narcissism • Norms Utz & Krämer (2009), 3 studies in NL and GER.
  • 41. Institutional VS social privacy Institutional Privacy Social Privacy Privacy related to institutions such as companies and institutions. Concerns are about surveillance and loss of ownership over individual data. Privacy related to social relationships and peers. Concerns are about identity theft, stalking or other types of privacy- invasive behaviors.
  • 42. Identified risks • Stalking • Identity theft • Blackmailing • Damaged reputations • Unwanted contacts • Surveillance • Misuse of data by third parties • Mixing personal and professional circles
  • 43. Not to mention… The Icloud hack of celebrity pictures in 2014!
  • 44. Then why do we keep sharing? Uses and gratifications:Uses and gratifications: Third person effect:Third person effect: Ritualized Media UseRitualized Media Use • Need for distraction and entertainment • Need for (para) social relations • Need for identity construction • Negative effects are considered more likely for others than for the self. • Social Media use is a habit, and as such can hardly be controlled
  • 45. Or are we just growing more cynical? • Users react to risks coming from their immediate social environment (Hargittai & boyd, 2010)… • …And yet fail to do so when it comes to institutional (i.e. company-related) risks (Raynes- Goldie, 2010; Young & Quan-Haase, 2013) • One possible explanation for this is a recent growth in cynicism around privacy.
  • 46. Privacy cynicism Privacy cynicism is defined as an attitude of uncertainty, powerlessness and mistrust towards the handling of personal data by online services, rendering privacy protection behavior meaningless. Hoffman,Lutz & Ranzini, 2015
  • 47. why cynicism? I know my data could be used against my knowledge, but what can I do? It’s not like I could do something about it Whatever…they already have all of my data anyway.
  • 48. Why cynicism? • Cynicism in general is described as a coping mechanism • To social situations where the subject feels helpless • To situations where the motives of others are not easy to understand. • Privacy Cynicism acts on the tradeoff making individuals feel like their defenses are too low to take any action.