SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Privacy Matters
… or does it?
Thursday, January 29, 2015
"You have zero privacy anyway. Get over it.“ -
Sun Microsystems' CEO Scott McNealy
(1999)
Hullabaloo
What is privacy?
• Historical concept - An objective, legitimate or reasonable
expectation of privacy is an expectation of privacy generally
recognized by society.
• Modern Tort law defining invasion of privacy –
– Intrusion of solitude: physical or electronic intrusion into
one's private quarters.
– Public disclosure of private facts: the dissemination of
truthful private information which a reasonable person
would find objectionable
17 privacy matters
Privacy is dead?
• “People have really gotten comfortable not
only sharing more information and different
kinds, but more openly and with more
people. That social norm is just something
that has evolved over time.” – Facebook
CEO, Mark Zuckerberg – 2010
– Is there a generational gap with the expectation
of privacy online?
Challenge
• Privacy = control of dissemination of
information
• Challenge = dramatic increase is amount of
personal data
– Easy storage and tracking of information by
systems
– Difficult storage and tracking by individuals
Facebook Privacy Map
Our privacy survey
• 1,000 online respondents
– Age: 13 - 20 (200)
– Age: 21 - 29 (200)
– Age: 30 - 39 (200)
– Age: 40 - 54 (200)
– Age: 55 + (200)
Do you feel that too much of your private information
is shared online?
68.45%
31.55%
Yes
No
Generation Gap
0.0%
10.0%
20.0%
30.0%
40.0%
50.0%
60.0%
70.0%
80.0%
13-20 21-29 30-39 40-54 55+
Male
Female
How concerned are you about your online privacy?
*Scalar Question 1 – 7 ranking
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
13-20 21-29 30-39 40-54 55+
Not concerned
Very Concerned
How concerned are you that the following data is collected
about you during normal internet use?
Data Point Surfing Improve Search 13-20
Credit card information (e.g. stored info for future purchases) 81.0% 68.6% 53.0%
Telephone number 57.8% 50.8% 38.1%
Location 52.6% 42.7% 37.6%
Address 45.1% 38.7% 33.7%
Purchase behavior (e.g. your last Amazon purchase) 42.8% 39.5% 35.9%
Search behavior (e.g. your last Google search) 36.8% 36.5% 28.7%
E-mail address 33.8% 37.6% 28.2%
Date of birth 28.8% 29.3% 17.1%
Name 19.4% 24.9% 19.9%
Age 15.8% 20.1% 18.8%
Political party affiliation 15.5% 21.2% 12.7%
Gender 12.8% 18.1% 14.9%
Education level 12.3% 19.4% 13.8%
How comfortable are you sharing each of the following data
points?
Data Point Sharing
Gender 46.4%
Name 43.9%
Education level 41.2%
Political party affiliation 40.0%
Age 37.6%
Date of birth 22.3%
Address 20.6%
Purchase behavior (e.g. your last Amazon purchase) 17.2%
Search behavior (e.g. your last Google search) 17.1%
E-mail address 17.0%
Location 12.4%
Telephone number 8.7%
Credit card information (e.g. stored info for future purchases) 5.7%
How comfortable are you sharing your personal information
with the following groups?
Overall 13-20 21-29 30-39 40-54 55+
Family 76.9% 76.2% 79.1% 72.7% 73.8% 82.6%
Friends 57.7% 63.0% 66.5% 46.5% 48.6% 63.7%
Retailers 9.4% 14.4% 11.5% 7.5% 6.0% 7.9%
Government (Federal, State, Local) 16.8% 22.8% 22.2% 15.5% 9.7% 13.9%
Banks and other financial institutions 20.4% 20.4% 24.1% 20.9% 16.9% 19.5%
Market Research firms 10.6% 14.4% 11.5% 10.2% 7.1% 10.0%
Social networking sites 9.9% 17.1% 11.5% 11.2% 4.9% 4.7%
Conclusion
The expectation of privacy is evolving
The challenge will be to balance generational
views on privacy and sharing

Contenu connexe

Tendances

Research.ly by PeopleBrowsr - Next Generation Social Search
Research.ly by PeopleBrowsr - Next Generation Social SearchResearch.ly by PeopleBrowsr - Next Generation Social Search
Research.ly by PeopleBrowsr - Next Generation Social SearchPeopleBrowsr
 
PeopleBrowsr Keynote Slides - About Us
PeopleBrowsr Keynote Slides - About UsPeopleBrowsr Keynote Slides - About Us
PeopleBrowsr Keynote Slides - About UsPeopleBrowsr
 
Chapter 11 Overview Social Media Communication Lipshultz
Chapter 11 Overview Social Media Communication Lipshultz Chapter 11 Overview Social Media Communication Lipshultz
Chapter 11 Overview Social Media Communication Lipshultz LauriePeters15
 
Jason A. Cohen - Political Communication Literature Review and Analysis Paper
Jason A. Cohen - Political Communication Literature Review and Analysis PaperJason A. Cohen - Political Communication Literature Review and Analysis Paper
Jason A. Cohen - Political Communication Literature Review and Analysis PaperJason A. Cohen
 
Lava Row Camp: What's next: Emerging trends in social and new media
Lava Row Camp: What's next: Emerging trends in social and new mediaLava Row Camp: What's next: Emerging trends in social and new media
Lava Row Camp: What's next: Emerging trends in social and new mediaNathan Wright
 
Final Research Project
Final Research ProjectFinal Research Project
Final Research ProjectMollie Neal
 
A survey on applications of social networks in marketing-English Version
A survey on applications of social networks in marketing-English VersionA survey on applications of social networks in marketing-English Version
A survey on applications of social networks in marketing-English Versionzohreh izadpanah
 
Obama Internet Campaign Presentation
Obama Internet Campaign PresentationObama Internet Campaign Presentation
Obama Internet Campaign PresentationKathryn Burns
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital AgeJane Prusakova
 
The truth behind filter bubbles: bursting some myths
The truth behind filter bubbles: bursting some mythsThe truth behind filter bubbles: bursting some myths
The truth behind filter bubbles: bursting some mythsEduardoSuarez87
 
Z kanelis profit nature of platforms-gz
Z kanelis profit nature of platforms-gzZ kanelis profit nature of platforms-gz
Z kanelis profit nature of platforms-gzZachKanelis
 
Social media and health care november 14, 2013
Social media and health care november 14, 2013Social media and health care november 14, 2013
Social media and health care november 14, 2013ArCompany
 
No, I don't want to be friends with my butter. Brand relationships in the soc...
No, I don't want to be friends with my butter. Brand relationships in the soc...No, I don't want to be friends with my butter. Brand relationships in the soc...
No, I don't want to be friends with my butter. Brand relationships in the soc...Nathaniel Perez
 
Social networking analysis
Social networking analysisSocial networking analysis
Social networking analysisCandice Martinez
 
Dark Social Is The Most Important Marketing Data You're Not Tracking
Dark Social Is The Most Important Marketing Data You're Not TrackingDark Social Is The Most Important Marketing Data You're Not Tracking
Dark Social Is The Most Important Marketing Data You're Not TrackingUnified
 
The Millennial Think Tank for Brands
The Millennial Think Tank for BrandsThe Millennial Think Tank for Brands
The Millennial Think Tank for BrandsArCompany
 

Tendances (18)

Research.ly by PeopleBrowsr - Next Generation Social Search
Research.ly by PeopleBrowsr - Next Generation Social SearchResearch.ly by PeopleBrowsr - Next Generation Social Search
Research.ly by PeopleBrowsr - Next Generation Social Search
 
Social Technology Quarterly 08
Social Technology Quarterly 08Social Technology Quarterly 08
Social Technology Quarterly 08
 
PeopleBrowsr Keynote Slides - About Us
PeopleBrowsr Keynote Slides - About UsPeopleBrowsr Keynote Slides - About Us
PeopleBrowsr Keynote Slides - About Us
 
Chapter 11 Overview Social Media Communication Lipshultz
Chapter 11 Overview Social Media Communication Lipshultz Chapter 11 Overview Social Media Communication Lipshultz
Chapter 11 Overview Social Media Communication Lipshultz
 
Jason A. Cohen - Political Communication Literature Review and Analysis Paper
Jason A. Cohen - Political Communication Literature Review and Analysis PaperJason A. Cohen - Political Communication Literature Review and Analysis Paper
Jason A. Cohen - Political Communication Literature Review and Analysis Paper
 
Lava Row Camp: What's next: Emerging trends in social and new media
Lava Row Camp: What's next: Emerging trends in social and new mediaLava Row Camp: What's next: Emerging trends in social and new media
Lava Row Camp: What's next: Emerging trends in social and new media
 
Final Research Project
Final Research ProjectFinal Research Project
Final Research Project
 
Barackfinalgr
BarackfinalgrBarackfinalgr
Barackfinalgr
 
A survey on applications of social networks in marketing-English Version
A survey on applications of social networks in marketing-English VersionA survey on applications of social networks in marketing-English Version
A survey on applications of social networks in marketing-English Version
 
Obama Internet Campaign Presentation
Obama Internet Campaign PresentationObama Internet Campaign Presentation
Obama Internet Campaign Presentation
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital Age
 
The truth behind filter bubbles: bursting some myths
The truth behind filter bubbles: bursting some mythsThe truth behind filter bubbles: bursting some myths
The truth behind filter bubbles: bursting some myths
 
Z kanelis profit nature of platforms-gz
Z kanelis profit nature of platforms-gzZ kanelis profit nature of platforms-gz
Z kanelis profit nature of platforms-gz
 
Social media and health care november 14, 2013
Social media and health care november 14, 2013Social media and health care november 14, 2013
Social media and health care november 14, 2013
 
No, I don't want to be friends with my butter. Brand relationships in the soc...
No, I don't want to be friends with my butter. Brand relationships in the soc...No, I don't want to be friends with my butter. Brand relationships in the soc...
No, I don't want to be friends with my butter. Brand relationships in the soc...
 
Social networking analysis
Social networking analysisSocial networking analysis
Social networking analysis
 
Dark Social Is The Most Important Marketing Data You're Not Tracking
Dark Social Is The Most Important Marketing Data You're Not TrackingDark Social Is The Most Important Marketing Data You're Not Tracking
Dark Social Is The Most Important Marketing Data You're Not Tracking
 
The Millennial Think Tank for Brands
The Millennial Think Tank for BrandsThe Millennial Think Tank for Brands
The Millennial Think Tank for Brands
 

En vedette

Cheezburge tribecon-20101028
Cheezburge tribecon-20101028Cheezburge tribecon-20101028
Cheezburge tribecon-20101028TribeCon
 
8 rg tribecon_deck
8 rg tribecon_deck8 rg tribecon_deck
8 rg tribecon_deckTribeCon
 
Tom Fischmann: Plugging In To Research: Apps & Games to Improve Body Image
Tom Fischmann: Plugging In To Research: Apps & Games to Improve Body ImageTom Fischmann: Plugging In To Research: Apps & Games to Improve Body Image
Tom Fischmann: Plugging In To Research: Apps & Games to Improve Body ImageTribeCon
 
Micki krimmel tribecon
Micki krimmel tribeconMicki krimmel tribecon
Micki krimmel tribeconTribeCon
 
Juston Western: The Phone You Buy 2 Years from Now Will Make Concerts Amazing
Juston Western: The Phone You Buy 2 Years from Now Will Make Concerts AmazingJuston Western: The Phone You Buy 2 Years from Now Will Make Concerts Amazing
Juston Western: The Phone You Buy 2 Years from Now Will Make Concerts AmazingTribeCon
 
Produire une note de conseil politique
Produire une note de conseil politiqueProduire une note de conseil politique
Produire une note de conseil politiqueFlorent Michelot
 
POL 4840 - H16 - Séance 4
POL 4840 - H16 - Séance 4POL 4840 - H16 - Séance 4
POL 4840 - H16 - Séance 4Florent Michelot
 

En vedette (8)

Cheezburge tribecon-20101028
Cheezburge tribecon-20101028Cheezburge tribecon-20101028
Cheezburge tribecon-20101028
 
The Elementary Child
The Elementary Child The Elementary Child
The Elementary Child
 
8 rg tribecon_deck
8 rg tribecon_deck8 rg tribecon_deck
8 rg tribecon_deck
 
Tom Fischmann: Plugging In To Research: Apps & Games to Improve Body Image
Tom Fischmann: Plugging In To Research: Apps & Games to Improve Body ImageTom Fischmann: Plugging In To Research: Apps & Games to Improve Body Image
Tom Fischmann: Plugging In To Research: Apps & Games to Improve Body Image
 
Micki krimmel tribecon
Micki krimmel tribeconMicki krimmel tribecon
Micki krimmel tribecon
 
Juston Western: The Phone You Buy 2 Years from Now Will Make Concerts Amazing
Juston Western: The Phone You Buy 2 Years from Now Will Make Concerts AmazingJuston Western: The Phone You Buy 2 Years from Now Will Make Concerts Amazing
Juston Western: The Phone You Buy 2 Years from Now Will Make Concerts Amazing
 
Produire une note de conseil politique
Produire une note de conseil politiqueProduire une note de conseil politique
Produire une note de conseil politique
 
POL 4840 - H16 - Séance 4
POL 4840 - H16 - Séance 4POL 4840 - H16 - Séance 4
POL 4840 - H16 - Séance 4
 

Similaire à 17 privacy matters

Connect To Survive - The Digital Divide
Connect To Survive  - The Digital DivideConnect To Survive  - The Digital Divide
Connect To Survive - The Digital DivideCollabor8now Ltd
 
APRIL 2013: Google on Boomers & Seniors Online
APRIL 2013: Google on Boomers & Seniors OnlineAPRIL 2013: Google on Boomers & Seniors Online
APRIL 2013: Google on Boomers & Seniors OnlineAARP
 
Web for Information and Mental Health Support
Web for Information and Mental Health SupportWeb for Information and Mental Health Support
Web for Information and Mental Health SupportPatrick Daniels
 
Social Media Study 2009 by People from Cossette
Social Media Study 2009 by People from CossetteSocial Media Study 2009 by People from Cossette
Social Media Study 2009 by People from CossetteLuc-Andre Cormier
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
 
Enterprise Use Of Social Media
Enterprise Use Of Social MediaEnterprise Use Of Social Media
Enterprise Use Of Social Mediatallgal
 
Enterprise Use Of Social Media
Enterprise Use Of Social MediaEnterprise Use Of Social Media
Enterprise Use Of Social Mediatallgal
 
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harmsInternet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harmsJames Stewart
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Onlinecaniceconsulting
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerJim Adler
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentationRay Brannon
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Jim Adler
 
Privacy and Your Digital Footprint
Privacy and Your Digital FootprintPrivacy and Your Digital Footprint
Privacy and Your Digital FootprintStephanieSellan
 
Mktg350 lecture 10302013
Mktg350 lecture 10302013Mktg350 lecture 10302013
Mktg350 lecture 10302013lkirkman
 

Similaire à 17 privacy matters (20)

Connect To Survive - The Digital Divide
Connect To Survive  - The Digital DivideConnect To Survive  - The Digital Divide
Connect To Survive - The Digital Divide
 
APRIL 2013: Google on Boomers & Seniors Online
APRIL 2013: Google on Boomers & Seniors OnlineAPRIL 2013: Google on Boomers & Seniors Online
APRIL 2013: Google on Boomers & Seniors Online
 
Research Quality
Research Quality Research Quality
Research Quality
 
Web for Information and Mental Health Support
Web for Information and Mental Health SupportWeb for Information and Mental Health Support
Web for Information and Mental Health Support
 
Social Media Study 2009 by People from Cossette
Social Media Study 2009 by People from CossetteSocial Media Study 2009 by People from Cossette
Social Media Study 2009 by People from Cossette
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Enterprise Use Of Social Media
Enterprise Use Of Social MediaEnterprise Use Of Social Media
Enterprise Use Of Social Media
 
Enterprise Use Of Social Media
Enterprise Use Of Social MediaEnterprise Use Of Social Media
Enterprise Use Of Social Media
 
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harmsInternet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
Internet and Society 2018 Digital Divide, Exclusion, Policy, and new harms
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Governing as social networking
Governing as social networkingGoverning as social networking
Governing as social networking
 
Lee Rainie
Lee Rainie Lee Rainie
Lee Rainie
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy Officer
 
Brainstorm Cccu Frontiers
Brainstorm Cccu FrontiersBrainstorm Cccu Frontiers
Brainstorm Cccu Frontiers
 
Marti digital citizen presentation
Marti digital citizen presentationMarti digital citizen presentation
Marti digital citizen presentation
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
 
Privacy and Your Digital Footprint
Privacy and Your Digital FootprintPrivacy and Your Digital Footprint
Privacy and Your Digital Footprint
 
Mktg350 lecture 10302013
Mktg350 lecture 10302013Mktg350 lecture 10302013
Mktg350 lecture 10302013
 
Digital technology impacts by 2020
Digital technology impacts by 2020Digital technology impacts by 2020
Digital technology impacts by 2020
 

Plus de TribeCon

Ron J Williams: Forget Wall Street, Invest in We
Ron J Williams: Forget Wall Street, Invest in WeRon J Williams: Forget Wall Street, Invest in We
Ron J Williams: Forget Wall Street, Invest in WeTribeCon
 
Ron Domingue: The Pen is Mightier Than the Pixel
Ron Domingue: The Pen is Mightier Than the PixelRon Domingue: The Pen is Mightier Than the Pixel
Ron Domingue: The Pen is Mightier Than the PixelTribeCon
 
Jonathan Kay: Why We Invest in Free Beer & Hugs vs Trade Shows & Banner Ads
Jonathan Kay: Why We Invest in Free Beer & Hugs vs Trade Shows & Banner AdsJonathan Kay: Why We Invest in Free Beer & Hugs vs Trade Shows & Banner Ads
Jonathan Kay: Why We Invest in Free Beer & Hugs vs Trade Shows & Banner AdsTribeCon
 
Keith Robinson: Conversations for Better Design
Keith Robinson: Conversations for Better DesignKeith Robinson: Conversations for Better Design
Keith Robinson: Conversations for Better DesignTribeCon
 
Mike Karnjanaprakorn: Those Who Can, Teach
Mike Karnjanaprakorn: Those Who Can, TeachMike Karnjanaprakorn: Those Who Can, Teach
Mike Karnjanaprakorn: Those Who Can, TeachTribeCon
 
Andrew Larimer: Jack/Quixote, or How to Deal with Giants
Andrew Larimer: Jack/Quixote, or How to Deal with GiantsAndrew Larimer: Jack/Quixote, or How to Deal with Giants
Andrew Larimer: Jack/Quixote, or How to Deal with GiantsTribeCon
 
16 magicbucket4
16 magicbucket416 magicbucket4
16 magicbucket4TribeCon
 
12 tribe con larimer
12 tribe con larimer12 tribe con larimer
12 tribe con larimerTribeCon
 

Plus de TribeCon (8)

Ron J Williams: Forget Wall Street, Invest in We
Ron J Williams: Forget Wall Street, Invest in WeRon J Williams: Forget Wall Street, Invest in We
Ron J Williams: Forget Wall Street, Invest in We
 
Ron Domingue: The Pen is Mightier Than the Pixel
Ron Domingue: The Pen is Mightier Than the PixelRon Domingue: The Pen is Mightier Than the Pixel
Ron Domingue: The Pen is Mightier Than the Pixel
 
Jonathan Kay: Why We Invest in Free Beer & Hugs vs Trade Shows & Banner Ads
Jonathan Kay: Why We Invest in Free Beer & Hugs vs Trade Shows & Banner AdsJonathan Kay: Why We Invest in Free Beer & Hugs vs Trade Shows & Banner Ads
Jonathan Kay: Why We Invest in Free Beer & Hugs vs Trade Shows & Banner Ads
 
Keith Robinson: Conversations for Better Design
Keith Robinson: Conversations for Better DesignKeith Robinson: Conversations for Better Design
Keith Robinson: Conversations for Better Design
 
Mike Karnjanaprakorn: Those Who Can, Teach
Mike Karnjanaprakorn: Those Who Can, TeachMike Karnjanaprakorn: Those Who Can, Teach
Mike Karnjanaprakorn: Those Who Can, Teach
 
Andrew Larimer: Jack/Quixote, or How to Deal with Giants
Andrew Larimer: Jack/Quixote, or How to Deal with GiantsAndrew Larimer: Jack/Quixote, or How to Deal with Giants
Andrew Larimer: Jack/Quixote, or How to Deal with Giants
 
16 magicbucket4
16 magicbucket416 magicbucket4
16 magicbucket4
 
12 tribe con larimer
12 tribe con larimer12 tribe con larimer
12 tribe con larimer
 

Dernier

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 

Dernier (20)

UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 

17 privacy matters

  • 1. Privacy Matters … or does it? Thursday, January 29, 2015
  • 2. "You have zero privacy anyway. Get over it.“ - Sun Microsystems' CEO Scott McNealy (1999)
  • 4. What is privacy? • Historical concept - An objective, legitimate or reasonable expectation of privacy is an expectation of privacy generally recognized by society. • Modern Tort law defining invasion of privacy – – Intrusion of solitude: physical or electronic intrusion into one's private quarters. – Public disclosure of private facts: the dissemination of truthful private information which a reasonable person would find objectionable
  • 6. Privacy is dead? • “People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people. That social norm is just something that has evolved over time.” – Facebook CEO, Mark Zuckerberg – 2010 – Is there a generational gap with the expectation of privacy online?
  • 7. Challenge • Privacy = control of dissemination of information • Challenge = dramatic increase is amount of personal data – Easy storage and tracking of information by systems – Difficult storage and tracking by individuals
  • 9. Our privacy survey • 1,000 online respondents – Age: 13 - 20 (200) – Age: 21 - 29 (200) – Age: 30 - 39 (200) – Age: 40 - 54 (200) – Age: 55 + (200)
  • 10. Do you feel that too much of your private information is shared online? 68.45% 31.55% Yes No
  • 12. How concerned are you about your online privacy? *Scalar Question 1 – 7 ranking 0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 13-20 21-29 30-39 40-54 55+ Not concerned Very Concerned
  • 13. How concerned are you that the following data is collected about you during normal internet use? Data Point Surfing Improve Search 13-20 Credit card information (e.g. stored info for future purchases) 81.0% 68.6% 53.0% Telephone number 57.8% 50.8% 38.1% Location 52.6% 42.7% 37.6% Address 45.1% 38.7% 33.7% Purchase behavior (e.g. your last Amazon purchase) 42.8% 39.5% 35.9% Search behavior (e.g. your last Google search) 36.8% 36.5% 28.7% E-mail address 33.8% 37.6% 28.2% Date of birth 28.8% 29.3% 17.1% Name 19.4% 24.9% 19.9% Age 15.8% 20.1% 18.8% Political party affiliation 15.5% 21.2% 12.7% Gender 12.8% 18.1% 14.9% Education level 12.3% 19.4% 13.8%
  • 14. How comfortable are you sharing each of the following data points? Data Point Sharing Gender 46.4% Name 43.9% Education level 41.2% Political party affiliation 40.0% Age 37.6% Date of birth 22.3% Address 20.6% Purchase behavior (e.g. your last Amazon purchase) 17.2% Search behavior (e.g. your last Google search) 17.1% E-mail address 17.0% Location 12.4% Telephone number 8.7% Credit card information (e.g. stored info for future purchases) 5.7%
  • 15. How comfortable are you sharing your personal information with the following groups? Overall 13-20 21-29 30-39 40-54 55+ Family 76.9% 76.2% 79.1% 72.7% 73.8% 82.6% Friends 57.7% 63.0% 66.5% 46.5% 48.6% 63.7% Retailers 9.4% 14.4% 11.5% 7.5% 6.0% 7.9% Government (Federal, State, Local) 16.8% 22.8% 22.2% 15.5% 9.7% 13.9% Banks and other financial institutions 20.4% 20.4% 24.1% 20.9% 16.9% 19.5% Market Research firms 10.6% 14.4% 11.5% 10.2% 7.1% 10.0% Social networking sites 9.9% 17.1% 11.5% 11.2% 4.9% 4.7%
  • 16. Conclusion The expectation of privacy is evolving The challenge will be to balance generational views on privacy and sharing