Personalization vs. Privacy Invasion © 2001 Ann Schlosser, University of Washington Business School.

Slides:



Advertisements
Similar presentations
B: STUDENT DRIVE MOVE INSTRUCTIONS. Using Internet Explorer: From your computers desktop, double click on the Internet Explorer icon. (Internet Explorer.
Advertisements

Reinventing using REST. Anything addressable by a URI is called a resource GET, PUT, POST, DELETE WebDAV (MOVE, LOCK)
 Organizations need to interact with their publics  The interaction between organization- publics is a mediated process.
Back to Table of Contents
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
The Internet industry’s privacy seal program Silicon Valley Web Guild.
1 The End Of The Privacy Policy As We Know It Fran Maier President TRUSTe.
Online Demonstration You will be required to request a password prior to accessing Employee Online. The interactive password request forms are found.
Extras Plus! Pepper. Objectives extra knowledge Cookies Picture handling when creating site.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
Technological Implications for Privacy David Kotz Department of Computer Science Dartmouth College
Mgt 240 Lecture E-commerce: Successful Retailing on the Web November 18, 2004.
1 Networks and Internet Objectives Understand basic concepts in Networking Network Types Understand basic concepts in Internet Internet Services Become.
C MU U sable P rivacy and S ecurity Laboratory Making privacy visible Lorrie Faith Cranor October 19, 2007.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
The Ohio Health Insurance Exchange Exchange Presentation Audio/Visual.
P3P A New Standard in Online Privacy Overview and Demos from Summer 2000.
Internet Advertising © 2001 Ann Schlosser, University of Washington Business School.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Copyright Atomic Dog Publishing, 2002 Chapter 6 Personal values, Lifestyles, Psychographics, and Relationships.
Marketing Management Online marketing
The Future of P3P Ari Schwartz Center for Democracy and Technology Lorrie Faith Cranor AT&T Labs-Research November 2002.
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February 2002
Computer Vocabulary Acceptable Use Policy conduct expected from someone using a computer.
1 WS-Privacy Paul Bui Ryan Dickey. 2 Agenda  WS-Privacy  Introduction to P3P  How P3P Works  P3P Details  A P3P Scenario  Conclusion  References.
HTTPA (Accountable Hyper Text Transfer Protocol) PhD Proposal Talk Oshani Seneviratne DIG, MIT CSAIL May 31, 2011.
UWCISA Symposium on Information Systems Assurance 2005 Internet Privacy Research University of Waterloo Efrim Boritz Won Gyun No R. P. Sundarraj Framework,
Informed Consent to Address Trust, Control, and Privacy Concerns in User Profiling Thea van der Geest, Willem Pieterson, Peter de Vries.
P3P: User Empowerment Tools for Web Privacy Daniel J. Weitzner World Wide Web Consortium 23 April 2001 National Association of Attorneys General.
The Read Write Web Chapter One Presentation By Shontae Dandridge October 20, 2011.
 2001,Hamsi. All rights reserved. branding in the virtual world.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
Branding and Traffic © 2001 Ann Schlosser, University of Washington Business School.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
L/O/G/O I phone Safari Application Name : Malak Saleh Al-Qahtani ID :
Lecture 6 Title: Web Planning, Designing, Developing for E-Marketing By: Mr Hashem Alaidaros MKT 445.
Professional video communications Outlook/Exchange Scheduler for Codian.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
The Platform for Privacy Preferences (P3P) Workshop on the Relationship between Privacy and Security Lorrie Faith Cranor P3P Specification Working Group.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
AT&T Privacy Bird Screen Shots For more information see
Internet Marketing A new tool or a new paradigm? The internet is changing the practice of marketing but the fundamental principles of marketing remain.
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Images were sourced from the following web sites: Slide 2:commons.wikimedia.org/wiki/File:BorromeanRing...commons.wikimedia.org/wiki/File:BorromeanRing...
Jim Loter Director of Information Technology
Visit the member website
Definition: worthy of trust or belief
Chapter 9 e-Commerce Systems.
Setting and Upload Products
Day 34- Identifying People With Data The Cost of Free
SETTING UP OF E-COMMERCE WEBSITE
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February
Section 12.1 Section 12.2 Discuss the functions of a Web site
Microsoft, DoubleClick, and Others: Evaluating Privacy Challenges and Solutions Chapter 11 Case 4.
4Schools Adding a Web Page.
FMAnywhere: Getting Started.
Marketing in the Digital Age: Making New Customer Connections
Cross-Site Request Forgeries: Exploitation and Prevention
Personalization Strategy for gaining competitive advantage
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
FRC Parts Exchange Guide to the site.
Use an Internet Browser
Procedure for adding a Trusted Site
The Platform for Privacy Preferences Project
Presentation transcript:

Personalization vs. Privacy Invasion © 2001 Ann Schlosser, University of Washington Business School

Agenda Consumer preferences Current state of Web sites’ privacy practices Empowering consumers: P3P

Tradeoffs

Information Willing to Share

Exchange Personal Information For Certain Benefits Source: Harris Interactive

Influences on Sharing Information With a Health Web Site

Trust vs. Concern

How do you establish an image of trust? Fundamental “forms” to communicate trustworthiness –Brand –Navigation –Fulfillment –Presentation –Up-to-date technology –Logos of security –Address security and privacy concerns Clearly-stated policies Limited information requests Guarentees Communication channels Source: Cheskin Research and Studio Archetype/Sapient

Prevalence of Privacy Policies

Implementing FTC Fair Information Practices

Consumer Accessibility to Personal Information

Platform for Privacy Preferences (P3P) Firm SideUser Side

Preference settings

Transparency P3P clients can check a privacy policy each time it changes P3P clients can check privacy policies on all objects in a web page, including ads and invisible images

Trust Meter

Double clicking on the P3P icon indicates where the site’s policy differs from the user’s preferences

Searching for a P3P policy No P3P policy found P3P policy is NOT acceptable P3P policy is acceptable IDcide P3P Icons

Sites can list the types of data they collect And view the corresponding P3P policy

Recommended Sites –Acceptable privacy protection for EU