SlideShare une entreprise Scribd logo
1  sur  59
Clarity in Internet
Privacy

Julian Ranger
www.jranger.com



              As
  H2O Group     tro
                   bo
                     tic
Introduction
Introduction
• We jealously guard our privacy in the physical world, but seem
 more relaxed in the digital world
Introduction
• We jealously guard our privacy in the physical world, but seem
 more relaxed in the digital world




• Are we really?
  • Or is this a manifestation of our lack of understanding?
  • A lack of CLARITY regarding digital privacy
Facebook example
Facebook example
• Search for friends
Facebook example
• Search for friends
• Friend request
Facebook example
• Search for friends
• Friend request
• Friend accepts
Facebook example
• Search for friends
• Friend request
• Friend accepts

• VERY STRONG implication
 that communication is
 therefore only between
 friends
Facebook example
• Search for friends
• Friend request
• Friend accepts

• VERY STRONG implication
 that communication is
 therefore only between
 friends

• But the default privacy is
 very open
 • Disingenuously so
“The internet changes everything”
“The internet changes everything”
• The internet and web services changes what we can do
“The internet changes everything”
• The internet and web services changes what we can do
• But does it change our deep rooted attitudes to privacy?
  • Whether we are closed, open or in-between
“The internet changes everything”
• The internet and web services changes what we can do
• But does it change our deep rooted attitudes to privacy?
  • Whether we are closed, open or in-between
• Suggest that the DESIRE for privacy does NOT change
 between the physical and digital worlds
“The internet changes everything”
• The internet and web services changes what we can do
• But does it change our deep rooted attitudes to privacy?
  • Whether we are closed, open or in-between
• Suggest that the DESIRE for privacy does NOT change
 between the physical and digital worlds

• “You’re a broadcast medium whether you like it or not”
  • Why?
    • Surely I can choose
    • Privacy is often traded for free services, but I should
     CHOOSE to do so KNOWINGLY
Harm
           Ethical   Grey   Unethical   Illegal
Spectrum
Harm
           Ethical            Grey                    Unethical                      Illegal
Spectrum



                               Public Interest    List     Unsolicited            Phone
Physical             Gossip
                              Privacy Invasion   Selling     Calls
                                                                         Libel
                                                                                 Tapping
                                                                                         Assault

 World
                                                        Mug                   ID
                                                                                       Fraud
                                                      Targeting              Theft
Harm
           Ethical            Grey                    Unethical                      Illegal
Spectrum



                               Public Interest    List     Unsolicited            Phone
Physical             Gossip
                              Privacy Invasion   Selling     Calls
                                                                         Libel
                                                                                 Tapping
                                                                                         Assault

 World
                                                        Mug                   ID
                                                                                       Fraud
                                                      Targeting              Theft




 Digital
 World
Harm
           Ethical            Grey                    Unethical                      Illegal
Spectrum



                               Public Interest    List     Unsolicited            Phone
Physical             Gossip
                              Privacy Invasion   Selling     Calls
                                                                         Libel
                                                                                 Tapping
                                                                                         Assault

 World
                                                        Mug                   ID
                                                                                       Fraud
                                                      Targeting              Theft




 Digital
 World
Harm
           Ethical              Grey                    Unethical                      Illegal
Spectrum



                                 Public Interest    List     Unsolicited            Phone
Physical               Gossip
                                Privacy Invasion   Selling     Calls
                                                                           Libel
                                                                                   Tapping
                                                                                           Assault

 World
                                                          Mug                   ID
                                                                                         Fraud
                                                        Targeting              Theft




 Digital              Self
 World               Harm
Harm
           Ethical               Grey                    Unethical                      Illegal
Spectrum



                                  Public Interest    List     Unsolicited            Phone
Physical               Gossip
                                 Privacy Invasion   Selling     Calls
                                                                            Libel
                                                                                    Tapping
                                                                                            Assault

 World
                                                           Mug                   ID
                                                                                          Fraud
                                                         Targeting              Theft




 Digital              Self
 World               Harm


                                Permanence

                                Ease of Search
Harm
           Ethical               Grey                    Unethical                      Illegal
Spectrum



                                  Public Interest    List     Unsolicited            Phone
Physical               Gossip
                                 Privacy Invasion   Selling     Calls
                                                                            Libel
                                                                                    Tapping
                                                                                            Assault

 World
                                                           Mug                   ID
                                                                                          Fraud
                                                         Targeting              Theft




 Digital              Self
 World               Harm


                                Permanence

                                Ease of Search


                                                                            Legislation
                                                                              Zone
Harm
           Ethical               Grey                    Unethical                      Illegal
Spectrum



                                  Public Interest    List     Unsolicited            Phone
Physical               Gossip
                                 Privacy Invasion   Selling     Calls
                                                                            Libel
                                                                                    Tapping
                                                                                            Assault

 World
                                                           Mug                   ID
                                                                                          Fraud
                                                         Targeting              Theft




 Digital              Self
 World               Harm


                                Permanence

                                Ease of Search


                         Awareness                                          Legislation
                           Zone                                               Zone
“The internet changes everything” - 2
“The internet changes everything” - 2
• Yes it does change some aspects, for example
  • Greater opportunity for self-harm
  • Data persistence
  • Ease of search
“The internet changes everything” - 2
• Yes it does change some aspects, for example
  • Greater opportunity for self-harm
  • Data persistence
  • Ease of search
• But does it change our deep rooted attitudes to privacy?
  • Whether we are closed, open or in-between
“The internet changes everything” - 3
“The internet changes everything” - 3
 • It does change what we can do
   • e.g. information discovery
   • e.g. use of Twitter for Broadcast
   • e.g. Cloud services
 • Some users use new capability to over-share
   • Some do so deliberately - they did before digital too
   • Contend the majority do not do so knowingly
 • Web sites are deliberately disingenuous
   • e.g. previous FB example
     • They wouldn’t need to if privacy desire had truly changed
Statistics, lies & damned lies
Statistics, lies & damned lies
• No clear statistics
Statistics, lies & damned lies
• No clear statistics
• TNS survey in 2009
  • Respondents self-selected so I perceive probability of
   knowledge higher than average user
 • 75% said know how to protect their personal info online
   • but only 39% do so consistently
   • and despite knowledge 35% felt privacy had been invaded
     or violated in the last year
Statistics, lies & damned lies
• No clear statistics
• TNS survey in 2009
  • Respondents self-selected so I perceive probability of
   knowledge higher than average user
 • 75% said know how to protect their personal info online
   • but only 39% do so consistently
   • and despite knowledge 35% felt privacy had been invaded
     or violated in the last year

• Suggests a clear need for education first
  • and simple clear definitions
  • that the AVERAGE internet user can understand
Difficult?
• We are all now familiar with the standard 2 check boxes on
 forms:




• Not too technical
  • Doesn’t discuss how things are done
• Nor shrouded in legalese
An example
An example
• I buy a phone from O2
An example
• I buy a phone from O2
  • I make calls on that phone privately to others for a year
    • All is good
An example
• I buy a phone from O2
  • I make calls on that phone privately to others for a year
    • All is good
  • Then O2 change their terms and conditions
    • Unilaterally share all my phone calls from the last year with
     everyone
An example
• I buy a phone from O2
  • I make calls on that phone privately to others for a year
    • All is good
  • Then O2 change their terms and conditions
    • Unilaterally share all my phone calls from the last year with
     everyone

 • It just wouldn’t happen
An example
• I buy a phone from O2
  • I make calls on that phone privately to others for a year
    • All is good
  • Then O2 change their terms and conditions
    • Unilaterally share all my phone calls from the last year with
     everyone

 • It just wouldn’t happen
• So why then is that acceptable behaviour from major web
 businesses?
 • We need simple, clear basic privacy principles which users
   can understand, and reputable sites conform to
Harm
           Ethical               Grey                    Unethical                      Illegal
Spectrum



                                  Public Interest    List     Unsolicited            Phone
Physical               Gossip
                                 Privacy Invasion   Selling     Calls
                                                                            Libel
                                                                                    Tapping
                                                                                            Assault

 World
                                                           Mug                   ID
                                                                                          Fraud
                                                         Targeting              Theft




 Digital              Self
 World               Harm


                                Permanence

                                Ease of Search


                                                                            Legislation
                                                                              Zone
Harm
           Ethical               Grey                    Unethical                      Illegal
Spectrum



                                  Public Interest    List     Unsolicited            Phone
Physical               Gossip
                                 Privacy Invasion   Selling     Calls
                                                                            Libel
                                                                                    Tapping
                                                                                            Assault

 World
                                                           Mug                   ID
                                                                                          Fraud
                                                         Targeting              Theft




 Digital              Self
 World               Harm


                                Permanence

                                Ease of Search


                         Awareness                                          Legislation
                           Zone                                               Zone
It is of course more complicated ...
                                        The Real Life Social
                                       Network by @padday




But that is the next layer of detail
Minimum basic privacy principles
Minimum basic privacy principles
• We are clearly told at which privacy level a service operates at
                            Identified 223 tracking

                                files/programs
Minimum basic privacy principles
• We are clearly told at which privacy level a service operates at
                            Identified 223 tracking

                                files/programs




• The privacy level cannot be changed on us without us knowing
Minimum basic privacy principles
• We are clearly told at which privacy level a service operates at
                            Identified 223 tracking

                                files/programs




• The privacy level cannot be changed on us without us knowing



• We have an ability to have our information deleted should we
 so wish it
 • Retracting permission should be as easy as giving it
It is of course more complicated ....
• Copyright in self
• Who owns derived data
• How retract data already passed on
• ....etc
It is of course more complicated ....
• Copyright in self
• Who owns derived data
• How retract data already passed on
• ....etc
But again that is another layer of detail
How?
• Enshrined in some manner of certification
• Privacy certification bodies exist today; however,
  • Don’t have simple principles
  • Primarily check site does what Privacy policy says, not
   mandating minimum
   • Facebook has a TRUSTe certificate for example
 • Question as to whether quick to retract certificate
   • Some statistics imply that those with certificates are MORE
     likely to breach their own privacy principles!
Appetite for change?
Appetite for change?
• Privacy and digital business can co-exist
  • Even with issues with TRUSTe model, they claim new web
   sites get a 20% better retention/sales with their logo
 • Not everything has to be free
Appetite for change?
• Privacy and digital business can co-exist
  • Even with issues with TRUSTe model, they claim new web
   sites get a 20% better retention/sales with their logo
 • Not everything has to be free



• World Wide Web
  • If we as industry don’t address issue Governments will
  • Legislation not universal
    • Fracturing of web
    • inhibits innovation
• Internet, Web, Web 2.0 brings many benefits
• Internet, Web, Web 2.0 brings many benefits
• Privacy is a critical issue
  • Must be addressed
    • Simply & clearly
 • But doesn’t have to stifle those benefits
• Internet, Web, Web 2.0 brings many benefits
• Privacy is a critical issue
  • Must be addressed
    • Simply & clearly
 • But doesn’t have to stifle those benefits
• Privacy in the digital world must be about informed consent as
 it is in the physical world
 • Expectation and right to privacy by default
• 6 simple privacy levels   • 3 Privacy principles?
                             • We are clearly told at which
                               privacy level a service
                               operates at

                             • The privacy level cannot be
                               changed on us without us
                               knowing

                             • We have an ability to have our
                               information deleted should we
                               so wish it
                               • Retracting permission should
                                 be as easy as giving it

Contenu connexe

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

En vedette

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

En vedette (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Clarity in internet privacy

  • 1. Clarity in Internet Privacy Julian Ranger www.jranger.com As H2O Group tro bo tic
  • 3. Introduction • We jealously guard our privacy in the physical world, but seem more relaxed in the digital world
  • 4. Introduction • We jealously guard our privacy in the physical world, but seem more relaxed in the digital world • Are we really? • Or is this a manifestation of our lack of understanding? • A lack of CLARITY regarding digital privacy
  • 7. Facebook example • Search for friends • Friend request
  • 8. Facebook example • Search for friends • Friend request • Friend accepts
  • 9. Facebook example • Search for friends • Friend request • Friend accepts • VERY STRONG implication that communication is therefore only between friends
  • 10. Facebook example • Search for friends • Friend request • Friend accepts • VERY STRONG implication that communication is therefore only between friends • But the default privacy is very open • Disingenuously so
  • 11. “The internet changes everything”
  • 12. “The internet changes everything” • The internet and web services changes what we can do
  • 13. “The internet changes everything” • The internet and web services changes what we can do • But does it change our deep rooted attitudes to privacy? • Whether we are closed, open or in-between
  • 14. “The internet changes everything” • The internet and web services changes what we can do • But does it change our deep rooted attitudes to privacy? • Whether we are closed, open or in-between • Suggest that the DESIRE for privacy does NOT change between the physical and digital worlds
  • 15. “The internet changes everything” • The internet and web services changes what we can do • But does it change our deep rooted attitudes to privacy? • Whether we are closed, open or in-between • Suggest that the DESIRE for privacy does NOT change between the physical and digital worlds • “You’re a broadcast medium whether you like it or not” • Why? • Surely I can choose • Privacy is often traded for free services, but I should CHOOSE to do so KNOWINGLY
  • 16.
  • 17. Harm Ethical Grey Unethical Illegal Spectrum
  • 18. Harm Ethical Grey Unethical Illegal Spectrum Public Interest List Unsolicited Phone Physical Gossip Privacy Invasion Selling Calls Libel Tapping Assault World Mug ID Fraud Targeting Theft
  • 19. Harm Ethical Grey Unethical Illegal Spectrum Public Interest List Unsolicited Phone Physical Gossip Privacy Invasion Selling Calls Libel Tapping Assault World Mug ID Fraud Targeting Theft Digital World
  • 20. Harm Ethical Grey Unethical Illegal Spectrum Public Interest List Unsolicited Phone Physical Gossip Privacy Invasion Selling Calls Libel Tapping Assault World Mug ID Fraud Targeting Theft Digital World
  • 21. Harm Ethical Grey Unethical Illegal Spectrum Public Interest List Unsolicited Phone Physical Gossip Privacy Invasion Selling Calls Libel Tapping Assault World Mug ID Fraud Targeting Theft Digital Self World Harm
  • 22. Harm Ethical Grey Unethical Illegal Spectrum Public Interest List Unsolicited Phone Physical Gossip Privacy Invasion Selling Calls Libel Tapping Assault World Mug ID Fraud Targeting Theft Digital Self World Harm Permanence Ease of Search
  • 23. Harm Ethical Grey Unethical Illegal Spectrum Public Interest List Unsolicited Phone Physical Gossip Privacy Invasion Selling Calls Libel Tapping Assault World Mug ID Fraud Targeting Theft Digital Self World Harm Permanence Ease of Search Legislation Zone
  • 24. Harm Ethical Grey Unethical Illegal Spectrum Public Interest List Unsolicited Phone Physical Gossip Privacy Invasion Selling Calls Libel Tapping Assault World Mug ID Fraud Targeting Theft Digital Self World Harm Permanence Ease of Search Awareness Legislation Zone Zone
  • 25. “The internet changes everything” - 2
  • 26. “The internet changes everything” - 2 • Yes it does change some aspects, for example • Greater opportunity for self-harm • Data persistence • Ease of search
  • 27. “The internet changes everything” - 2 • Yes it does change some aspects, for example • Greater opportunity for self-harm • Data persistence • Ease of search • But does it change our deep rooted attitudes to privacy? • Whether we are closed, open or in-between
  • 28. “The internet changes everything” - 3
  • 29. “The internet changes everything” - 3 • It does change what we can do • e.g. information discovery • e.g. use of Twitter for Broadcast • e.g. Cloud services • Some users use new capability to over-share • Some do so deliberately - they did before digital too • Contend the majority do not do so knowingly • Web sites are deliberately disingenuous • e.g. previous FB example • They wouldn’t need to if privacy desire had truly changed
  • 30. Statistics, lies & damned lies
  • 31. Statistics, lies & damned lies • No clear statistics
  • 32. Statistics, lies & damned lies • No clear statistics • TNS survey in 2009 • Respondents self-selected so I perceive probability of knowledge higher than average user • 75% said know how to protect their personal info online • but only 39% do so consistently • and despite knowledge 35% felt privacy had been invaded or violated in the last year
  • 33. Statistics, lies & damned lies • No clear statistics • TNS survey in 2009 • Respondents self-selected so I perceive probability of knowledge higher than average user • 75% said know how to protect their personal info online • but only 39% do so consistently • and despite knowledge 35% felt privacy had been invaded or violated in the last year • Suggests a clear need for education first • and simple clear definitions • that the AVERAGE internet user can understand
  • 34. Difficult? • We are all now familiar with the standard 2 check boxes on forms: • Not too technical • Doesn’t discuss how things are done • Nor shrouded in legalese
  • 36. An example • I buy a phone from O2
  • 37. An example • I buy a phone from O2 • I make calls on that phone privately to others for a year • All is good
  • 38. An example • I buy a phone from O2 • I make calls on that phone privately to others for a year • All is good • Then O2 change their terms and conditions • Unilaterally share all my phone calls from the last year with everyone
  • 39. An example • I buy a phone from O2 • I make calls on that phone privately to others for a year • All is good • Then O2 change their terms and conditions • Unilaterally share all my phone calls from the last year with everyone • It just wouldn’t happen
  • 40. An example • I buy a phone from O2 • I make calls on that phone privately to others for a year • All is good • Then O2 change their terms and conditions • Unilaterally share all my phone calls from the last year with everyone • It just wouldn’t happen • So why then is that acceptable behaviour from major web businesses? • We need simple, clear basic privacy principles which users can understand, and reputable sites conform to
  • 41. Harm Ethical Grey Unethical Illegal Spectrum Public Interest List Unsolicited Phone Physical Gossip Privacy Invasion Selling Calls Libel Tapping Assault World Mug ID Fraud Targeting Theft Digital Self World Harm Permanence Ease of Search Legislation Zone
  • 42. Harm Ethical Grey Unethical Illegal Spectrum Public Interest List Unsolicited Phone Physical Gossip Privacy Invasion Selling Calls Libel Tapping Assault World Mug ID Fraud Targeting Theft Digital Self World Harm Permanence Ease of Search Awareness Legislation Zone Zone
  • 43.
  • 44. It is of course more complicated ... The Real Life Social Network by @padday But that is the next layer of detail
  • 45. Minimum basic privacy principles
  • 46. Minimum basic privacy principles • We are clearly told at which privacy level a service operates at Identified 223 tracking files/programs
  • 47. Minimum basic privacy principles • We are clearly told at which privacy level a service operates at Identified 223 tracking files/programs • The privacy level cannot be changed on us without us knowing
  • 48. Minimum basic privacy principles • We are clearly told at which privacy level a service operates at Identified 223 tracking files/programs • The privacy level cannot be changed on us without us knowing • We have an ability to have our information deleted should we so wish it • Retracting permission should be as easy as giving it
  • 49. It is of course more complicated .... • Copyright in self • Who owns derived data • How retract data already passed on • ....etc
  • 50. It is of course more complicated .... • Copyright in self • Who owns derived data • How retract data already passed on • ....etc But again that is another layer of detail
  • 51. How? • Enshrined in some manner of certification • Privacy certification bodies exist today; however, • Don’t have simple principles • Primarily check site does what Privacy policy says, not mandating minimum • Facebook has a TRUSTe certificate for example • Question as to whether quick to retract certificate • Some statistics imply that those with certificates are MORE likely to breach their own privacy principles!
  • 53. Appetite for change? • Privacy and digital business can co-exist • Even with issues with TRUSTe model, they claim new web sites get a 20% better retention/sales with their logo • Not everything has to be free
  • 54. Appetite for change? • Privacy and digital business can co-exist • Even with issues with TRUSTe model, they claim new web sites get a 20% better retention/sales with their logo • Not everything has to be free • World Wide Web • If we as industry don’t address issue Governments will • Legislation not universal • Fracturing of web • inhibits innovation
  • 55.
  • 56. • Internet, Web, Web 2.0 brings many benefits
  • 57. • Internet, Web, Web 2.0 brings many benefits • Privacy is a critical issue • Must be addressed • Simply & clearly • But doesn’t have to stifle those benefits
  • 58. • Internet, Web, Web 2.0 brings many benefits • Privacy is a critical issue • Must be addressed • Simply & clearly • But doesn’t have to stifle those benefits • Privacy in the digital world must be about informed consent as it is in the physical world • Expectation and right to privacy by default
  • 59. • 6 simple privacy levels • 3 Privacy principles? • We are clearly told at which privacy level a service operates at • The privacy level cannot be changed on us without us knowing • We have an ability to have our information deleted should we so wish it • Retracting permission should be as easy as giving it

Notes de l'éditeur

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n
  51. \n
  52. \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n