Copyright 2012 1 Privacy as a Strategic Factor in Social Media: An Analysis Based on the Concepts of Trust and Distrust Roger Clarke Xamax Consultancy,

Slides:



Advertisements
Similar presentations
integrated marketing communications
Advertisements

Broadcast Connect Generate to the Worldyour Communities traffic & Revenue.
Copyright Trust Among Mobile Business Partners Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, U.N.S.W.,
Chapter 5 Transfer of Training
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
On-line media tools for strategic communications purposes When using media tools for communication we try to use the latest technologies such us blogging,
1 UNIVERSITIES of AUSTRALASIA BENCHMARKING RISK MANAGEMENT BILL DUNNE DIRECTOR RISK MANAGEMENT UNSW. PROUDLY SPONSORED BY UNIMUTUAL.
Copyright Consumer-Oriented Social Media as Market Opportunity Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science,
Requirements Engineering Process
1 Using ICT in Geography Workshop Themes Learning Online Citizenship, Europe and identity Networking, you and your schools Virtual Globes and geo-information.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Aviation Security Training Module 4 Design and Conduct Exercise II 1.
ActionDescription 1Decisions about planning and managing the coast are governed by general legal instruments. 2Sectoral stakeholders meet on an ad hoc.
Module N° 7 – Introduction to SMS
E-Marketplaces.
Public B2B Exchanges and Support Services
Recognizing Opportunity
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
South East Personalisation IT Workshop 11 th June 2010 Working in partnership with Improvement and Efficiency South East.
Chapter 6 Negotiating access and research ethics
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
- A Powerful Computing Technology Department of Computer Science Wayne State University 1.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc
16 MKTG CHAPTER Lamb, Hair, McDaniel
Ch. 36, Promotion Is Communication
1 Consumer Motivation CHAPTER 8. 2 Consumer Motivation Represents the drive to satisfy both physiological and psychological needs through product purchase.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Discovering Computers Fundamentals, 2012 Edition
Products, Services, and Brands Building Customer Value
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Creating a WordPress Website Oklahoma Conference of The UMC Department of Communications 1.
Creating and Capturing Customer Value
Symantec Education Skills Assessment SESA 3.0 Feature Showcase
Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting your organization’s logo –“View”
Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals aiim.org Information Management and Social Media Jesse.
31242/32549 Advanced Internet Programming Advanced Java Programming
© 2012 National Heart Foundation of Australia. Slide 2.
Services Course Windows Live SkyDrive Participant Guide.
Chapter 1 Consumer Behavior: Its Origins and Strategic Applications
Chapter 1 Consumer Behavior: Its Origins and Strategic Applications
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
1. Karadeniz Technical University Continuing Education Center has been established to organize Karadeniz Technical University’s continuing education programs,
Abuse Prevention and Response Protocol.
® NSTIC’s Effects on Privacy The Need to Balance Identity and Privacy- Protection with Market Forces in the National Strategy for Trusted Identities in.
NORMAPME ISO User Guide for European SMEs The essence of.
GutsGo eMarketing Let’s Do It Better! Engage2012, June 2012 Let’s Be At It! © GutsGo eMarketing 1.
Our Digital World Second Edition
Social Media Policy ADM – E 21. CHS Social Media Policy Social media = media designed to be disseminated through social interaction, created using highly.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
Social Media and Recordkeeping Allegra Huxtable Manager Government Recordkeeping Tasmanian Archive and Heritage Office.
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
Online Information Services and Social Media Social Networking.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Social Media for Credit Unions? Facebook – Getting Started Adding content Promoting Advertising Summary W E L O O K A T T H I N G S D I F F E R E N T.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Make It Easy For e-Buyers to Contact You Toll-free phone numbers Call centers Text messaging Instant chat 1.
American Chemical Society Mark Carpenter ACS Leadership Conference January 21, 2011 Social Networking for Technical Divisions.
A How-to Guide to Social Media Marketing. Objectives What is social media? Why you need social media to market your product or service Types of social.
Mayer Brown is a global legal services organization comprising legal practices that are separate entities ("Mayer Brown Practices"). The Mayer Brown Practices.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Business consultation and training centre LatConsul.
Chapter6: E-Commerce Web Sites HNDIT11062 – Web Development 1.
Social Media & Social Networking 101 Canadian Society of Safety Engineering (CSSE)
Digital Marketing Services Web Development Web Design Web: S 124/1, Kausalya, Behind Malvani Hotel, Baner Road,
Web 2.0.
The Legal Framework of the Digital Surveillance Economy Roger Clarke & Angela Daly APSN – Uni Hong Kong – 27 September 2017 Xamax Consultancy,
Presentation transcript:

Copyright Privacy as a Strategic Factor in Social Media: An Analysis Based on the Concepts of Trust and Distrust Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW, Sydney SMTD {.html,.ppt} Roskilde University, CBIT, Computer Science Research Group on User-Driven IT Innovation 25 June 2012

Copyright Privacy as a Strategic Factor in Social Media Agenda Trust Distrust, Lack of Trust, Forced Trust Trust Factors Drivers, Influencers Social Media Definitions, Genres Privacy Nature, Issues in Social Media Research Opportunities

Copyright Trust Confident Reliance by a party on the behaviour of other parties which results in willingness to expose oneself to risks Origins Familial and Social Settings in which Cultural Affinity exists

Copyright The Existence of Cultural Affinity Feasible Kin Community (Barn-Raising) Cooperatives, e.g. credit unions ('They are Us') Infeasible For-Profit Corporations (Horse-Trading) Corporations law demands that priority be given to the interests of the corporation above all other interests – customer service, society and environment are constraints, never objectives An ersatz form of trust, or a proxy for it

Copyright Sources of Trust Direct Relationship Kinship, mateship, maybe principal-agent, contract, multiple prior transactions Direct Experience Prior exposure, a prior transaction Referred Trust 'Word-of-mouth', reputation, accreditation Symbols of Trust or Images of Trust Brands, meta-brands

Copyright Examples of Factors That Inculcate Trust Transparency and the Availability of Evidence: the Identity and Location: of the Tradable Item of other Parties of the Marketspace Operator Service Longevity and Reliability Security of Transaction Data Risk Allocation / Clarity of Risk Exposure Safeguards, such as warranties, recourse, insurance, a credible insurer of last resort

Copyright Qualities Involved in an Act of Trusting Information About Risks well-informed, informed, ill-informed, 'blind' Degree of Control over Risks tight, some, none Judgement about Risks well-considered, considered, ill-considered, naive

Copyright Determinants of the Importance of Trust The extent of knowledge about the Risk Factors The degree of Risk Exposure The degree of understanding of the Risk Exposures The relative power of the Parties The duration of the Risk Exposure The availability, affordability of effective insurance The hedonic value / desirability / compulsion of the tradable item

Copyright Trust in What? The counter-party to the transaction The quality of the tradeable item or service The fit of the item or service to the need The delivery process The infrastructure and institutions on which the conduct of the transaction depends

Copyright Advice from Corporate Credibility Assume Consumers Are Suspicious Explain Who You Are (ACN, etc.) Declare Your Real-World Footprint Provide a Consumer Protection Statement Provide a Privacy Statement Visible Enquiry- and Complaints-Handling Links to Industry Association Schemes Links to Relevant Regulators

Copyright Advice from Apply Consumer-Friendly Principles Information Choice Consent 'opt-in' the norm 'opt-out' requires stringent justification Fair Conditions Recourse

Copyright Theory in 2012 B2C eCommerce Theory postulates as trust determinants (1) Ability (2) Integrity (3) Benevolence (4) Web-Site Quality Mayer et al. (1995), Lee & Turban (2001), Salo & Karjaluoto (2007)

Copyright Theory, and Practical Reality, in 2012 B2C eCommerce Theory postulates as trust determinants (1) Ability (2) Integrity (3) Benevolence (4) Web-Site Quality Mayer et al. (1995), Lee & Turban (2001), Salo & Karjaluoto (2007) Assuming altruistic behaviour by for-profits is fatuous In practice, consumer marketing corporations: contrive the appearance of cultural affinity, e.g. they offer economic benefits to frequent buyers, projecting the benefits not using an economic term but one that invokes social factors: 'loyalty programs' use advertising, advertorials and promotions to project socially positive imagery onto a brandname and logo

Copyright Regulatory Factors Prudential Regulation (solvency) Participant Protection (transparency, fairness of processes and conditions) Tradable Item Regulation (chemicals, gambling services, explosives, weapons, cryptography, erotica/pornography, Nazi memorabilia) Government Agency with legal authority Trans-Border Regulation Self-Regulation (i.e. pseudo-regulation) by an industry association or marketspace operator

Copyright DisTrust Confident Reliance by a party on the MISbehaviour of other parties OR Active Belief by a party that the behaviour of other parties is not reliable

Copyright Lack of Trust The absence, or inadequacy, of confidence by a party in the reliability of the behaviour of other parties Hope held by a party that the behaviour of other parties will be reliable, despite the absence or inadequacy of important trust factors Forced Trust

Copyright Categories of Trust Factor Trust Influencer Positive influence on the likelihood a party will participate Distrust Influencer Negative influence on the likelihood a party will participate Trust Driver Such a strong positive influence on the likelihood of a party participating that it determines the outcome Distrust Driver Such a strong negative influence on the likelihood of a party participating that it determines the outcome

Copyright Categories of Trust Factor

Copyright Social Media A Classification Kaplan & Haenlein (2010)

Copyright A Participant-Oriented Classification of Social Media

Copyright A Participant-Oriented Classification of Social Media

Copyright Currently-Available Social Media Genres 1-with-1/Few INTERACTION Tools networked text (asynchronous) networked text chat / IM (synchronous) SMS / texting from mobile phones -attachments, any format (asynch) voice: over Internet (VoIP, Skype) (synch) tele-conferencing (VoIP, Skype) (synch) videophone (Skype Video) (synch) video-conferencing (Skype Video) (synch) 1-to-Many BROADCAST Tools bulletin boards systems (BBS) Usenet / netnews lists web-pages indexes (Lycos, Altavista, Google, Bing) blogs (WordPress, Blogspot) micro-blogs (Twitter, Tumblr) glogs – wearable wireless webcams, cyborg-logs, retro-nymed as 'graphical blogs' 'content communities', e.g. for images (deviantArt, Flickr and Picasa), for videos (YouTube), for slide-sets (Slideshare) closed / 'walled-garden' 'wall-postings' within SNS (Plaxo, MySpace, LinkedIn, Xing, Reddit, Facebook, Google+) 1-with-Many SHARING Tools Content Collaboration wikis (Wikipedia) social news sites (Slashdot, Newsvine) online office apps (Zoho, Google Docs, MS Live) Indicator-Sharing 'social bookmarking' (Delicious) dis/approvals (Digg's dig & bury, Reddit's up & down, StumbleUpon's thumbs-up & thumbs-down, Facebook's Like button, Google+'s +1 button) Multi-Player Networked Gaming text-based MUDDs social gaming sites (Friendster) Massively Multiplayer Online Games (MMOGs), esp. Role-Playing Games (MMORPGs), e.g. World of Warcraft online virtual worlds (Second Life)

Copyright Social Media A Working Definition And hence Scope Specification

Copyright Social Media A Working Definition And hence Scope Specification An application or service that is perceived by its users to support those users in relation to: interaction with other people broadcast to other people sharing with other people

Copyright Location – from Added-Extra to Intrinsic Network Address has always been visible, as a necessary element of the services Physical Address / Geolocation has progressively become available, and for cellular phones is intrinsic to the services operation Location-based services can be valuable to users A primary use is in consumer marketing For most current-round SMS, location is an extra For the coming round, location is intrinsic Privacy sensitivities will leap

Copyright Social Medias Business Model 'There must be a way to monetise this somehow' 'You will find something interesting here' is a self-fulfilling prophecy, because people can be enticed to contribute 'something interesting' They, and the people who come after them, can be enticed to click on targeted advertisements Targeting is based on: profile-data that users supply about themselves content that they have donated their online behaviour while using the service their online behaviour more generally data that other people contribute about the user

Copyright Privacy The interest that individuals have in sustaining a 'personal space', free from interference by other people and organisations Multiple Dimensions Privacy of Personal Communications Privacy of Personal Data / Data Protection Privacy of Personal Behaviour Privacy of the Person

Copyright "[A social networking service] profits primarily by using heretofore private information it has collected about you to target advertising. And Zuckerberg has repeatedly made sudden, sometimes ill conceived and often poorly communicated policy changes that resulted in once-private personal information becoming instantly and publicly accessible. As a result, once-latent concerns over privacy, power and profit have bubbled up and led both domestic and international regulatory agencies to scrutinize the company more closely... The high-handed manner in which members' personal information has been treated, the lack of consultation or even communication with them beforehand, Facebook's growing domination of the entire social networking sphere, Zuckerberg's constant and very public declarations of the death of privacy and his seeming imposition of new social norms all feed growing fears that [Zuckerberg] and Facebook itself simply can not be trusted" facebookprivacy_b_ html (O'Connor 2012)

Copyright Privacy and Social Media Second-Party Risk Exposure (Service- Provider) Express Declarations Content Provision about Self Social Networks Content Provision about Others Third-Party Risk Exposure (Others) Openness that was Unanticipated Openness through Breach of Original Terms Strategic Partnerships Syndication Demand Powers

Copyright A Catalogue of Social Media Privacy Concerns 1Privacy-Abusive Data Collection 2Privacy-Abusive Service-Provider Rights 3Privacy-Abusive Functionality and User Interfaces 4Privacy-Abusive Data Exploitation Source: Reviews of media reports

Copyright A Catalogue of Social Media Privacy Concerns 1Privacy-Abusive Data Collection Demands for User Data identity data profile data contacts data Collection of User Data about users' locations over time about users' online behaviour, even when not transacting with the particular service from third parties, without notice to the user and/or without user consent 2Privacy-Abusive Service-Provider Rights Terms of Service Features substantial self-declared, non-negotiable rights for the service-provider, including: to exploit users' data for their own purposes to disclose users' data to other organisations to retain users' data permanently, even if the person terminates their account to change Terms of Service: unilaterally without advance notice to users; and/or without any notice to users Exercise of Self-Declared Service-Provider Rights in ways harmful to users' interests in order to renege on previous undertakings Avoidance of Consumer Protection and Privacy Laws location of storage and processing in data havens location of contract-jurisdiction distant from users ignoring of regulatory and oversight agencies acceptance of nuisance-value fines and nominal undertakings

Copyright A Catalogue of Social Media Privacy Concerns 3 Privacy-Abusive Functionality and User Interfaces Privacy-Related Settings non-conservative default settings inadequate granularity complex and unhelpful user interfaces changes to the effects of settings, without advance notice, without any notice and/or without consent 'Real Names' Policies denial of multiple identities denial of anonymity denial of pseudonymity enforced publication of 'real name', associated profile data Changes to Functionality and User Interface frequent; and/or without advance notice to users, without any notice to users and/or without user consent User Access to Their Data lack of clarity about whether, and how, data can be accessed lack of, even denial of, the right of subject access User Deletion of Their Data lack of clarity about whether, and how, data can be deleted lack of, and even denial of, the users right to delete 4 Privacy-Abusive Data Exploitation Exposure of User Data to Third Parties wide exposure, in violation of previous Terms, of: users' profile-data (e.g. address, mobile-phone) users' postings users' advertising and purchasing behaviour users' explicit social networks users' inferred social networks, e.g. from messaging-traffic changes to the scope of exposure: without advance notice to users without any notice to users; and/or without user consent access by government agencies without demonstrated legal authority Exposure of Data about Other People upload of users' address-books, including: their contact-points comments about them by implication, their social networks exploitation of non-users' interactions with users

Copyright Privacy-Sensitive Social Media Research Opportunities Social Science Distinguish positive and negative Drivers from Influencers Measure the Strength of Influencers, under varying scenarios Assess trade-offs between positive and negative Influencers, under varying scenarios Prioritise possible privacy-sensitive features Design and Prototyping Specify Desirable Features Architect: for Client-Server for P2P Design and Code Open-Source Components Implement Features Publish Reference Code Publish Pilot Releases

Copyright Privacy as a Strategic Factor in Social Media: An Analysis Based on the Concepts of Trust and Distrust Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW, Sydney SMTD {.html,.ppt} Roskilde University, CBIT, Computer Science Research Group on User-Driven IT Innovation 25 June 2012