COMP 113Social Media & Online Communities, Summer School 2012              6: Privacy, terms & identity
Remember that Tuesday and Wednesday      classes swap next week!                                      2
PART 1: Terms of    privacy                   3
Recall these from Tuesday?                             4
TOS and privacy policies   Provided by all community-driven websites    – E.g., Facebook, Twitter, Ning, etc.   Governs ...
How many of you just click “accept”?                                       6
Types of data collection   Mandatory personal information:    – Collected on registration    – Name, email address, passw...
Google knows all                   8
Privacy   Typically legal requirement to provide a    privacy (data usage) policy:    – e.g., privacy act 1993 NZ   Issu...
10
11
12
13
“As social media become more embedded ineveryday society, the mismatch between the        danah boyd says ...rule-based pr...
[Source: http://online.wsj.com/]   15
Facebook Like button   Used on 3rd party websites   Clicks send information to user’s profiles & to Facebook   Does not...
Facebook says ...“We do not share or sell the information we seewhen you visit a website with a Facebook socialplugin to t...
18
19
Time for a short commercial break      Go on, get outside!
Time for you to get busy   Compare Facebook and Twitter privacy policies    and answer these questions:    1. Which priva...
END OF PART 1                22
PART 2: Identity management                   23
24
What do people do to manage accounts? Use the same username/password for multiple  sites Use their browsers ability to r...
Other more secure methods   Store account details in a “password vault”:    – On your PC (e.g., protected by fingerprint ...
27
Social logins are good because   86% respondents will change behaviour:    – 54% might leave the site and not return    –...
OpenID OpenIDs are URLs (i.e., your identities) Find a provider (e.g., MyOpenID, Yahoo, ...) Log into any site that sup...
Facebook Connect   What happens?    – Login into 3rd party      websites    – Approve level of data      access between F...
32
The End          33
6: privacy terms
Upcoming SlideShare
Loading in...5
×

6: privacy terms

338

Published on

In this class we examine issues around privacy, terms of service, and identity management.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
338
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "6: privacy terms"

  1. 1. COMP 113Social Media & Online Communities, Summer School 2012 6: Privacy, terms & identity
  2. 2. Remember that Tuesday and Wednesday classes swap next week! 2
  3. 3. PART 1: Terms of privacy 3
  4. 4. Recall these from Tuesday? 4
  5. 5. TOS and privacy policies Provided by all community-driven websites – E.g., Facebook, Twitter, Ning, etc. Governs collection, storage, transfer, usage, etc. of user data by operators (services) Sets expectations of behaviour and responsibilities of both parties Users agree to adhere to TOS and privacy policy Lays out consequences of breaching TOS or privacy guidelines
  6. 6. How many of you just click “accept”? 6
  7. 7. Types of data collection Mandatory personal information: – Collected on registration – Name, email address, password Optional personal information: – Identity driven – Biography, photos, tags, location, interests, ... Log information: – Automatic (IP address, browser, visited pages, ...) – 3rd party services (Google analytics) – Cookies (file stored on your machine)
  8. 8. Google knows all 8
  9. 9. Privacy Typically legal requirement to provide a privacy (data usage) policy: – e.g., privacy act 1993 NZ Issues: – Implicit agreement – Jurisdictions – Policy relating to children (min. age) – Business acquisitions, bankruptcy, ... – Disclosure to law enforcement
  10. 10. 10
  11. 11. 11
  12. 12. 12
  13. 13. 13
  14. 14. “As social media become more embedded ineveryday society, the mismatch between the danah boyd says ...rule-based privacy that software offers andthe subtler, intuitive ways that humansunderstand the concept will increasinglycause cultural collisions and social slips.” 14
  15. 15. [Source: http://online.wsj.com/] 15
  16. 16. Facebook Like button Used on 3rd party websites Clicks send information to user’s profiles & to Facebook Does not require click! But what else: “... assemble a vast amount of data about Internet users browsing habits.” Soon: ‘... for a brand or check in at a store could find those actions appearing on their friends pages as a "Sponsored Story" paid for by advertisers.’ 16
  17. 17. Facebook says ...“We do not share or sell the information we seewhen you visit a website with a Facebook socialplugin to third parties and we do not use it to deliverads to you. In addition, we will delete the data (i.e.,data we receive when you see social plugins)associated with users in 90 days. We may keepaggregated and anonymized data (not associatedwith specific users) after 90 days for improving ourproducts and services. This is consistent withstandard industry practice.” 17
  18. 18. 18
  19. 19. 19
  20. 20. Time for a short commercial break Go on, get outside!
  21. 21. Time for you to get busy Compare Facebook and Twitter privacy policies and answer these questions: 1. Which privacy policy is easiest to locate? 2. Which is the most onerous and why? 3. Which (if any) appears to hold user’s interests as paramount? 4. Which service do you trust more? 5. Anything in the policies that you find especially troubling? 6. Are there any other privacy issues that these services can’t control? 21
  22. 22. END OF PART 1 22
  23. 23. PART 2: Identity management 23
  24. 24. 24
  25. 25. What do people do to manage accounts? Use the same username/password for multiple sites Use their browsers ability to remember their password (enabled by default) Dont register for the new site Dont ever log in to the site Log in once, click "remember me" Click the back button on their browser and never come back to the site Maintain a list of user IDs and passwords in an offline document 25
  26. 26. Other more secure methods Store account details in a “password vault”: – On your PC (e.g., protected by fingerprint recognition) – In a portable USB device, protected by a strong pass phrase – On a trustworthy online service, e.g., mashedlife.com Login using an OpenID account where possible Use popular online service (e.g., Facebook Connect, Twitter OAuth, ...)
  27. 27. 27
  28. 28. Social logins are good because 86% respondents will change behaviour: – 54% might leave the site and not return – 26% would go to a different site if possible – 6% would just simply leave or avoid the site – 14% would not complete the registration 88% admitted to supplying incorrect information or not answering all fields 90% admitted to leaving a website if they couldn’t remember login details (was 45%)
  29. 29. OpenID OpenIDs are URLs (i.e., your identities) Find a provider (e.g., MyOpenID, Yahoo, ...) Log into any site that supports OpenID Not overly successful
  30. 30. Facebook Connect What happens? – Login into 3rd party websites – Approve level of data access between Facebook and website – See if your friends have also connected to the website – Publish content to Facebook through the website 31
  31. 31. 32
  32. 32. The End 33

×