SlideShare une entreprise Scribd logo
1  sur  16
TECHNOLOGY MAKES US A
MARKETING TOOL, DEMOGRAPHIC,
AND TARGET
What do they know about us?
By: Michael Burnie & Evan Pugh
AGENDA
 Introduction
 Advertising in our world and the
digital world
 Targeted advertising & Facebook
 Internet privacy: Twitter, Google, Microsoft
 Quiz
 Conclusion
INTRODUCTION
 Every day, people are subjected to several
forms of advertising, much of which is
targeted.
 Data from photos, videos, sites you visit, and
the products you buy are all used to market
you.
 For most people, internet privacy is
compromised.
ADVERTISING
 As technology advances,
people are exposed to more
advertising throughout the
day.
 It is easier for businesses to advertise
digitally now that more people have internet
access on the go.
 Advertising is being found in more and more
places in the digital world.
ADVERTISING CONT’D
 For 2012 in the US alone,
36 companies spent over
1 billion dollars annually in
advertising, with Procter &
Gamble spending the most at 4.9 billion
dollars (Austin).
 Although more advertising dollars are spent
on television, the digital market is growing at
a much faster pace.
TARGETED ADVERTISING
 A type of advertising that is tailored to
consumers based on demographics,
behaviour variables, and other information.
 Businesses can learn about you through
what you buy, search,
browse, and through your
connections.
TARGETED ADVERTISING: FACEBOOK
 Facebook’s primary revenue stream is through
advertising, thus they have very powerful algorithms
to direct ads on you
 The more information you provide Facebook (willing
or not), the more direct ads you will see.
 “It turns out that your friends are used to fill in the
gaps… Even a barebones profile has a few bits of
information about you” (Klosowski, 2013).
 Luckily, there are methods for
blocking the targeted ads, including
through Facebook preferences and
ad-blockers.
How many websites do you visit
on a daily basis?
Do you visit these websites on a
computer or a mobile device such
as a phone or tablet?
INTERNET PRIVACY
 Do Facebook, Google, Microsoft, Twitter, and
other large IT businesses really value your
privacy?
 Many people agree to license agreements
presented to them without reading the
content.
 Most mobile phones today have GPS built in,
which can be used by Apple, Google, etc. to
target advertising and predict behaviour.
INTERNET PRIVACY: TWITTER
 From Twitter’s Terms of Service:
“you grant us a worldwide, non-exclusive, royalty-free license (with
the right to sublicense) to use, copy, reproduce, process, adapt,
modify, publish, transmit, display and distribute such Content in any
and all media or distribution methods (now known or later
developed).”
Posting Tweets grants them
rights to reuse your content
however they wish.
INTERNET PRIVACY: GOOGLE
 Google introduced a unified
privacy policy in 2012 to
replace their existing 60+
policies from the services
they offer.
 This policy was reviewed and criticised as being
too vague. It does not outline how they are
going to specifically use users’ information.
 Policies are intended for outlining specific
details regarding data usage.
INTERNET PRIVACY: MICROSOFT
 In May 2013, Edward Snowden of the CIA
released information regarding top-secret US
and British government mass surveillance
programs.
 Microsoft provided the NSA with chat messages
sent over their Outlook portal, including Skype
and SkyDrive.
 Even though this violated Microsoft’s privacy
policy, Microsoft provided a great deal of
information to the United
States government.
INTERNET PRIVACY QUIZ!
 Do you read privacy policies, or research
them, prior to accepting them?
 Do you change your privacy settings on
Facebook, Google+, and other social
websites and applications?
 Do you carefully monitor the information you
provide on the internet?
 Do you often use different passwords (or
variations) for different websites?
QUIZ DISCUSSION
 Chances are, none of us can say yes to all of
these questions. Even if you can, your
friends and family may be providing
information about you without you realizing it.
 Although it’s becoming more difficult to keep
your privacy, simply be careful to:
 review the policies you accept and,
 screen the information you give out on the web
CONCLUSION
 Companies will spend a great amount of money
to expose you to products and services, most of
which are targeted towards you.
 Although big businesses today have a lot of
control over your information, there are ways of
protecting your privacy.
 Don’t allow businesses to take advantage of
you. They serve us, not the other way around.
Our private information does not exist to line
their pockets, and you have a right to hold
private information.
REFERENCES
 Austin, C. (2012, November 11). THE BILLIONAIRES' CLUB: Only 36
Companies Have $1,000 Million-Plus Ad Budgets. Business Insider.
Retrieved from http://www.businessinsider.com/the-35-companies-that-
spent-1-billion-on- ads-in-2011-2012-11?op=1
 Gleeson, B. (2012, November 20). TV Advertising VS Digital Marketing. Forbes.
Retrieved from http://www.forbes.com/sites/brentgleeson/2012/11/20/tv-
advertising-vs-digital-marketing/
 Google's privacy policy branded 'too vague'. (2012, March 9). The Telegraph.
Retrieved from
http://www.telegraph.co.uk/technology/google/9133222/Googles-privacy-
policy-branded-too-vague.html
 Klosowski, T. (2013, April 11). How Facebook Uses Your Data to Target Ads,
Even Offline.Lifehacker. Retrieved from
http://lifehacker.com/5994380/how- facebook-uses-your-data-to-target-
ads-even-offline
 Piermont, E. (2013, July 11). Microsoft helped the NSA bypass encryption, new
Snowden leak reveals. Russian Times. Retrieved from
http://rt.com/usa/microsoft-nsa-snowden-leak-971/
 Terms of Service. (2012, June 25). Twitter. Retrieved from https://twitter.com/tos

Contenu connexe

Tendances

Damaging Effects of Blocking Ads and Mitigating Them
Damaging Effects of Blocking Ads and Mitigating ThemDamaging Effects of Blocking Ads and Mitigating Them
Damaging Effects of Blocking Ads and Mitigating ThemBrett Kammer
 
How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age Ayelet Baron
 
Creating Buzz: Marketing in the Age of Social Media
Creating Buzz: Marketing in the Age of Social MediaCreating Buzz: Marketing in the Age of Social Media
Creating Buzz: Marketing in the Age of Social MediaAlex S.
 
The Age of the Omni-Channel Shopper
The Age of the Omni-Channel ShopperThe Age of the Omni-Channel Shopper
The Age of the Omni-Channel ShopperKia Kortelainen
 
Challenges and solutions for government when entering the digital space - Perth
Challenges and solutions for government when entering the digital space - PerthChallenges and solutions for government when entering the digital space - Perth
Challenges and solutions for government when entering the digital space - PerthDigital Next Australia
 
Chapter7 Social Media
Chapter7 Social MediaChapter7 Social Media
Chapter7 Social Mediaeoliver2012
 
Intro To Social Media
Intro To Social MediaIntro To Social Media
Intro To Social MediaMarci Hower
 
Social Media For Communication Strategy, Part 1 of 4
Social Media For Communication Strategy, Part 1 of 4Social Media For Communication Strategy, Part 1 of 4
Social Media For Communication Strategy, Part 1 of 4Copywrite, Ink.
 
Web 2.0 and Social Media
Web 2.0 and Social MediaWeb 2.0 and Social Media
Web 2.0 and Social MediaNFN Labs
 
Razorfish Digital Brand Experience
Razorfish Digital Brand ExperienceRazorfish Digital Brand Experience
Razorfish Digital Brand ExperienceDan St. Peter
 
Digital Influence in a Network Economy
Digital Influence in a Network EconomyDigital Influence in a Network Economy
Digital Influence in a Network EconomySparxoo
 
Marketing to Children in a Digital Age
Marketing to Children in a Digital AgeMarketing to Children in a Digital Age
Marketing to Children in a Digital AgeMaytha Nassor
 
Meltwater Buzz - Social Media
Meltwater Buzz - Social MediaMeltwater Buzz - Social Media
Meltwater Buzz - Social MediaLaurie edwards
 
Promoting & Protecting In Today’s Social Currency
Promoting & Protecting In Today’s Social CurrencyPromoting & Protecting In Today’s Social Currency
Promoting & Protecting In Today’s Social CurrencyDigital Next Australia
 
Prodcut placement, shameless marketing? pdf
Prodcut placement, shameless marketing?  pdfProdcut placement, shameless marketing?  pdf
Prodcut placement, shameless marketing? pdfAlexander Birt
 

Tendances (20)

Damaging Effects of Blocking Ads and Mitigating Them
Damaging Effects of Blocking Ads and Mitigating ThemDamaging Effects of Blocking Ads and Mitigating Them
Damaging Effects of Blocking Ads and Mitigating Them
 
How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age
 
Digital Media
Digital MediaDigital Media
Digital Media
 
Creating Buzz: Marketing in the Age of Social Media
Creating Buzz: Marketing in the Age of Social MediaCreating Buzz: Marketing in the Age of Social Media
Creating Buzz: Marketing in the Age of Social Media
 
The Age of the Omni-Channel Shopper
The Age of the Omni-Channel ShopperThe Age of the Omni-Channel Shopper
The Age of the Omni-Channel Shopper
 
Social Media Introduction
Social Media IntroductionSocial Media Introduction
Social Media Introduction
 
Challenges and solutions for government when entering the digital space - Perth
Challenges and solutions for government when entering the digital space - PerthChallenges and solutions for government when entering the digital space - Perth
Challenges and solutions for government when entering the digital space - Perth
 
Web Squared
Web SquaredWeb Squared
Web Squared
 
Chapter7 Social Media
Chapter7 Social MediaChapter7 Social Media
Chapter7 Social Media
 
Intro To Social Media
Intro To Social MediaIntro To Social Media
Intro To Social Media
 
Social Media For Communication Strategy, Part 1 of 4
Social Media For Communication Strategy, Part 1 of 4Social Media For Communication Strategy, Part 1 of 4
Social Media For Communication Strategy, Part 1 of 4
 
Web 2.0 and Social Media
Web 2.0 and Social MediaWeb 2.0 and Social Media
Web 2.0 and Social Media
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Razorfish Digital Brand Experience
Razorfish Digital Brand ExperienceRazorfish Digital Brand Experience
Razorfish Digital Brand Experience
 
Digital Influence in a Network Economy
Digital Influence in a Network EconomyDigital Influence in a Network Economy
Digital Influence in a Network Economy
 
Marketing to Children in a Digital Age
Marketing to Children in a Digital AgeMarketing to Children in a Digital Age
Marketing to Children in a Digital Age
 
Meltwater Buzz - Social Media
Meltwater Buzz - Social MediaMeltwater Buzz - Social Media
Meltwater Buzz - Social Media
 
Promoting & Protecting In Today’s Social Currency
Promoting & Protecting In Today’s Social CurrencyPromoting & Protecting In Today’s Social Currency
Promoting & Protecting In Today’s Social Currency
 
New chapter of marketing
New chapter of marketingNew chapter of marketing
New chapter of marketing
 
Prodcut placement, shameless marketing? pdf
Prodcut placement, shameless marketing?  pdfProdcut placement, shameless marketing?  pdf
Prodcut placement, shameless marketing? pdf
 

Similaire à Technology makes us a marketing tool, demographic

Social Media Marketing 101
Social Media Marketing 101Social Media Marketing 101
Social Media Marketing 101Jevan Woolley
 
SSB BART Group Accessible Social Media Presentation
SSB BART Group Accessible Social Media PresentationSSB BART Group Accessible Social Media Presentation
SSB BART Group Accessible Social Media PresentationEduardo Meza-Etienne
 
Technology makes us a Marketing Tool, Demographic, and Target
Technology makes us a Marketing Tool, Demographic, and TargetTechnology makes us a Marketing Tool, Demographic, and Target
Technology makes us a Marketing Tool, Demographic, and Target100126417
 
Disrupting_Digital_Advertising_Report
Disrupting_Digital_Advertising_ReportDisrupting_Digital_Advertising_Report
Disrupting_Digital_Advertising_ReportJilliane Baumert
 
8 social media trends that matter
8 social media trends that matter8 social media trends that matter
8 social media trends that matterLaurie Shook, MBA
 
Eric schmidt in_class_assignment
Eric schmidt in_class_assignmentEric schmidt in_class_assignment
Eric schmidt in_class_assignmentkzaatarah
 
Eric schmidt in_class_assignmentaaa
Eric schmidt in_class_assignmentaaaEric schmidt in_class_assignmentaaa
Eric schmidt in_class_assignmentaaattghazal
 
Evolution of Digital Marketing and its Impact on Privacy
Evolution of Digital Marketing and its Impact on PrivacyEvolution of Digital Marketing and its Impact on Privacy
Evolution of Digital Marketing and its Impact on Privacyijtsrd
 
Web 2010 – Ten Trends Defining Your Future
Web 2010 – Ten Trends Defining Your FutureWeb 2010 – Ten Trends Defining Your Future
Web 2010 – Ten Trends Defining Your FutureAffiliate Summit
 
Corporate Relations - Social media presentation
Corporate Relations - Social media presentationCorporate Relations - Social media presentation
Corporate Relations - Social media presentationLeedsMet_CR
 
Social media naiop - new version
Social media   naiop - new versionSocial media   naiop - new version
Social media naiop - new versionASAE
 
Digiral marketing bibners guid Book By ankit mohapatra
Digiral marketing bibners guid Book By ankit mohapatraDigiral marketing bibners guid Book By ankit mohapatra
Digiral marketing bibners guid Book By ankit mohapatraAnkit Mohapatra
 
Social Media For Small Businesses
Social Media For Small BusinessesSocial Media For Small Businesses
Social Media For Small BusinessesCatherine Tryon
 
10 Common Questions And Answers About Social Media
10 Common Questions And Answers About Social Media10 Common Questions And Answers About Social Media
10 Common Questions And Answers About Social MediaSocial Sinergy
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationNathan Wright
 

Similaire à Technology makes us a marketing tool, demographic (20)

Social Media Marketing 101
Social Media Marketing 101Social Media Marketing 101
Social Media Marketing 101
 
SSB BART Group Accessible Social Media Presentation
SSB BART Group Accessible Social Media PresentationSSB BART Group Accessible Social Media Presentation
SSB BART Group Accessible Social Media Presentation
 
Ama Web Trends Presentation
Ama Web Trends PresentationAma Web Trends Presentation
Ama Web Trends Presentation
 
Data and Creativity - Choices in Digital Marketing
Data and Creativity - Choices in Digital MarketingData and Creativity - Choices in Digital Marketing
Data and Creativity - Choices in Digital Marketing
 
Technology makes us a Marketing Tool, Demographic, and Target
Technology makes us a Marketing Tool, Demographic, and TargetTechnology makes us a Marketing Tool, Demographic, and Target
Technology makes us a Marketing Tool, Demographic, and Target
 
Disrupting_Digital_Advertising_Report
Disrupting_Digital_Advertising_ReportDisrupting_Digital_Advertising_Report
Disrupting_Digital_Advertising_Report
 
8 social media trends that matter
8 social media trends that matter8 social media trends that matter
8 social media trends that matter
 
Eric Schmidt
Eric Schmidt Eric Schmidt
Eric Schmidt
 
Eric Schmidt
Eric Schmidt Eric Schmidt
Eric Schmidt
 
Eric schmidt in_class_assignment
Eric schmidt in_class_assignmentEric schmidt in_class_assignment
Eric schmidt in_class_assignment
 
Eric schmidt in_class_assignmentaaa
Eric schmidt in_class_assignmentaaaEric schmidt in_class_assignmentaaa
Eric schmidt in_class_assignmentaaa
 
Evolution of Digital Marketing and its Impact on Privacy
Evolution of Digital Marketing and its Impact on PrivacyEvolution of Digital Marketing and its Impact on Privacy
Evolution of Digital Marketing and its Impact on Privacy
 
Web 2010 – Ten Trends Defining Your Future
Web 2010 – Ten Trends Defining Your FutureWeb 2010 – Ten Trends Defining Your Future
Web 2010 – Ten Trends Defining Your Future
 
Corporate Relations - Social media presentation
Corporate Relations - Social media presentationCorporate Relations - Social media presentation
Corporate Relations - Social media presentation
 
Social Media 101
Social Media 101Social Media 101
Social Media 101
 
Social media naiop - new version
Social media   naiop - new versionSocial media   naiop - new version
Social media naiop - new version
 
Digiral marketing bibners guid Book By ankit mohapatra
Digiral marketing bibners guid Book By ankit mohapatraDigiral marketing bibners guid Book By ankit mohapatra
Digiral marketing bibners guid Book By ankit mohapatra
 
Social Media For Small Businesses
Social Media For Small BusinessesSocial Media For Small Businesses
Social Media For Small Businesses
 
10 Common Questions And Answers About Social Media
10 Common Questions And Answers About Social Media10 Common Questions And Answers About Social Media
10 Common Questions And Answers About Social Media
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
 

Dernier

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Technology makes us a marketing tool, demographic

  • 1. TECHNOLOGY MAKES US A MARKETING TOOL, DEMOGRAPHIC, AND TARGET What do they know about us? By: Michael Burnie & Evan Pugh
  • 2. AGENDA  Introduction  Advertising in our world and the digital world  Targeted advertising & Facebook  Internet privacy: Twitter, Google, Microsoft  Quiz  Conclusion
  • 3. INTRODUCTION  Every day, people are subjected to several forms of advertising, much of which is targeted.  Data from photos, videos, sites you visit, and the products you buy are all used to market you.  For most people, internet privacy is compromised.
  • 4. ADVERTISING  As technology advances, people are exposed to more advertising throughout the day.  It is easier for businesses to advertise digitally now that more people have internet access on the go.  Advertising is being found in more and more places in the digital world.
  • 5. ADVERTISING CONT’D  For 2012 in the US alone, 36 companies spent over 1 billion dollars annually in advertising, with Procter & Gamble spending the most at 4.9 billion dollars (Austin).  Although more advertising dollars are spent on television, the digital market is growing at a much faster pace.
  • 6. TARGETED ADVERTISING  A type of advertising that is tailored to consumers based on demographics, behaviour variables, and other information.  Businesses can learn about you through what you buy, search, browse, and through your connections.
  • 7. TARGETED ADVERTISING: FACEBOOK  Facebook’s primary revenue stream is through advertising, thus they have very powerful algorithms to direct ads on you  The more information you provide Facebook (willing or not), the more direct ads you will see.  “It turns out that your friends are used to fill in the gaps… Even a barebones profile has a few bits of information about you” (Klosowski, 2013).  Luckily, there are methods for blocking the targeted ads, including through Facebook preferences and ad-blockers.
  • 8. How many websites do you visit on a daily basis? Do you visit these websites on a computer or a mobile device such as a phone or tablet?
  • 9. INTERNET PRIVACY  Do Facebook, Google, Microsoft, Twitter, and other large IT businesses really value your privacy?  Many people agree to license agreements presented to them without reading the content.  Most mobile phones today have GPS built in, which can be used by Apple, Google, etc. to target advertising and predict behaviour.
  • 10. INTERNET PRIVACY: TWITTER  From Twitter’s Terms of Service: “you grant us a worldwide, non-exclusive, royalty-free license (with the right to sublicense) to use, copy, reproduce, process, adapt, modify, publish, transmit, display and distribute such Content in any and all media or distribution methods (now known or later developed).” Posting Tweets grants them rights to reuse your content however they wish.
  • 11. INTERNET PRIVACY: GOOGLE  Google introduced a unified privacy policy in 2012 to replace their existing 60+ policies from the services they offer.  This policy was reviewed and criticised as being too vague. It does not outline how they are going to specifically use users’ information.  Policies are intended for outlining specific details regarding data usage.
  • 12. INTERNET PRIVACY: MICROSOFT  In May 2013, Edward Snowden of the CIA released information regarding top-secret US and British government mass surveillance programs.  Microsoft provided the NSA with chat messages sent over their Outlook portal, including Skype and SkyDrive.  Even though this violated Microsoft’s privacy policy, Microsoft provided a great deal of information to the United States government.
  • 13. INTERNET PRIVACY QUIZ!  Do you read privacy policies, or research them, prior to accepting them?  Do you change your privacy settings on Facebook, Google+, and other social websites and applications?  Do you carefully monitor the information you provide on the internet?  Do you often use different passwords (or variations) for different websites?
  • 14. QUIZ DISCUSSION  Chances are, none of us can say yes to all of these questions. Even if you can, your friends and family may be providing information about you without you realizing it.  Although it’s becoming more difficult to keep your privacy, simply be careful to:  review the policies you accept and,  screen the information you give out on the web
  • 15. CONCLUSION  Companies will spend a great amount of money to expose you to products and services, most of which are targeted towards you.  Although big businesses today have a lot of control over your information, there are ways of protecting your privacy.  Don’t allow businesses to take advantage of you. They serve us, not the other way around. Our private information does not exist to line their pockets, and you have a right to hold private information.
  • 16. REFERENCES  Austin, C. (2012, November 11). THE BILLIONAIRES' CLUB: Only 36 Companies Have $1,000 Million-Plus Ad Budgets. Business Insider. Retrieved from http://www.businessinsider.com/the-35-companies-that- spent-1-billion-on- ads-in-2011-2012-11?op=1  Gleeson, B. (2012, November 20). TV Advertising VS Digital Marketing. Forbes. Retrieved from http://www.forbes.com/sites/brentgleeson/2012/11/20/tv- advertising-vs-digital-marketing/  Google's privacy policy branded 'too vague'. (2012, March 9). The Telegraph. Retrieved from http://www.telegraph.co.uk/technology/google/9133222/Googles-privacy- policy-branded-too-vague.html  Klosowski, T. (2013, April 11). How Facebook Uses Your Data to Target Ads, Even Offline.Lifehacker. Retrieved from http://lifehacker.com/5994380/how- facebook-uses-your-data-to-target- ads-even-offline  Piermont, E. (2013, July 11). Microsoft helped the NSA bypass encryption, new Snowden leak reveals. Russian Times. Retrieved from http://rt.com/usa/microsoft-nsa-snowden-leak-971/  Terms of Service. (2012, June 25). Twitter. Retrieved from https://twitter.com/tos

Notes de l'éditeur

  1. https://twitter.com/tos
  2. http://www.telegraph.co.uk/technology/google/9133222/Googles-privacy-policy-branded-too-vague.html
  3. http://rt.com/usa/microsoft-nsa-snowden-leak-971/