Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Fostering Trustworthy Digital Engagement

387 views

Published on

Digital Exeter January 2016 talk by Geoff Revill, Krowdthink Ltd
digitalexeter.uk @DigitalExeter

Published in: Business
  • Be the first to comment

  • Be the first to like this

Fostering Trustworthy Digital Engagement

  1. 1. Fostering Trustworthy Digital Engagement A Product and Business Strategy #dataprivacyday Geoff Revill Krowdthink Ltd
  2. 2. Trust Fostering Trust in Digital Engagement is as much about HOW You build your system and company development culture, as it is about WHAT you build 1 February, 2016 copyright Krowdthink Ltd 2016 2
  3. 3. Krowd App • Privacy Preserving Hyper-Local Digital Engagement app (based on Wi-Fi) • Built in a Trust Framework • Connects People in Places – Just needs real-time co-location validation – Does not Know your Location • Discover who is here – Pseudonymous Identity – Self-Profiled – Location-oriented Persona • Engage with the crowd – Share what’s happening right here right now – What’s said in the Krowd stays in the Krowd • Defaults to Chatham house Rules 1 February, 2016 copyright Krowdthink Ltd 2016 3
  4. 4. Cyber Security = Trust? • Important to secure Economic Activity • UK Gov investing £1.9Bn Cyber Security • Does Cyber Security address Trust? – Its an Arms race • Does a cyber security commitment mean a company respects privacy? 1 February, 2016 copyright Krowdthink Ltd 2016 4
  5. 5. What is Privacy? • Principle • Law • Value • Privacy Implementation • Our Definition 1 February, 2016 copyright Krowdthink Ltd 2016 5
  6. 6. Privacy: Principle • Basis of US Privacy Law • Basis of EU Data Protection Act • Basis of new EU General Data Protection regulation (GDPR) 1 February, 2016 copyright Krowdthink Ltd 2016 6
  7. 7. Privacy: Law • Human Rights • USA – Defined by the online service provider! • Enforced by FTC – EU Safe Harbour • EU – Data Protection Act • Enforced by citizen’s ICO – New GDPR • Enforced by ICO of any EU country Informed Consent 1 February, 2016 copyright Krowdthink Ltd 2016 7
  8. 8. GDPR 1 February, 2016 copyright Krowdthink Ltd 2016 8
  9. 9. Privacy: Value Privacy ≈ Freedom 1 February, 2016 copyright Krowdthink Ltd 2016 9
  10. 10. Privacy Implementation • 7 Principles of Privacy by Design 1. Proactive not Reactive, Preventative not Remedial 2. Privacy as the Default Setting 3. Privacy Embedded into Design 4. Full Functionality – positive Sum, not Zero Sum 5. End-to-end Security – Full Lifecycle Protection 6. Visibility & Transparency – Keep it Open 7. Respect for User Privacy – Keep it User-Centric • Underpins the GDPR 1 February, 2016 copyright Krowdthink Ltd 2016 10
  11. 11. Krowdthink App Dev Principle for Privacy • Every Digital Citizen has a different perspective on what privacy is…but…. – We can all agree on when it’s breached.. • “When the Information I provide is used for a purpose other than that for which it was understood to be provided” 1 February, 2016 copyright Krowdthink Ltd 2016 11
  12. 12. Quick Trust Poll • How many of you consider your mobile service provider to be basically trustworthy? – Who knows that they opted in to share continuous (cell tower) location & movement data for commercial/marketing purposes? – Who knows that they opt-in to location tracking via Wi-Fi for commercial/marketing purposes? • How many of you have lowered your Trust in the Mobile provider now knowing how they sell your location & movement data? 1 February, 2016 copyright Krowdthink Ltd 2016 12
  13. 13. Anonymization Double-Speak 1 February, 2016 copyright Krowdthink Ltd 2016 13 Copyright: Daniel C. Barth-Jones, M.P.H., Ph.D
  14. 14. Transparency for Anonymization • USA – HIPAA – Health data released after provably below 0.04% de-anonymization risk – Low dimension data • Why not for Location Data? – It’s at least as sensitive as health data • as defined under the Data Protection Act – High dimension data – 4 location data points to de-anonymize location • With 95% accuracy 1 February, 2016 copyright Krowdthink Ltd 2016 14
  15. 15. Reluctant Digital Sharers • Pew Research (USA) - 2015 – 59% have recently cleared cookies – 57% refused to transact data when relevance unclear – 25% have used a temporary username/email – 24% given deliberately inaccurate data – 23% refused to engage if real identity needed – 10% encrypt calls or emails – 9% user anonymous web browsing (Tor etc) • Mobile Ecosystem Forum Consumer Trust Study 2015 – 30% growth, 2014 to 2015, in reluctance to data share • 50% specifically highlight browsing and location data • Explosion in Growth of the Ad Blocker – 82% growth 2014-15 in UK – 12m UK active users June 2015 1 February, 2016 copyright Krowdthink Ltd 2016 15
  16. 16. The Sharers Desire • Pew Research (USA) - 2015 – 93% of adults say that being in control of who can get information about them is important – 90% say controlling what information is collected about them is important – 93% say ability to share confidential matters with another trusted person is important 1 February, 2016 copyright Krowdthink Ltd 2016 16
  17. 17. Cognitive Dissonance Immediate Benefit Subsequent Consequence 1 February, 2016 copyright Krowdthink Ltd 2016 17 TIME T R U S T
  18. 18. Cognitive Dissonance Trade: Feature for Your Data Data Breach Who suffers? 1 February, 2016 copyright Krowdthink Ltd 2016 18 TIME T R U S T
  19. 19. Online Trust Definitions Social An attitude of confident expectation in an online situation of risk that one’s vulnerabilities will not be exploited Business Confidence that the value exchange is fair and equitable and that loss of trust drives an equivalent/proportional consequence on both parties 1 February, 2016 copyright Krowdthink Ltd 2016 19
  20. 20. Trustworth y Transparenc y Control Remedy Open Business Model Private by Default User Data Minimization Secure by Design No Covert Profiling or Tracking Trust in Digital Engagement 1 February, 2016 copyright Krowdthink Ltd 2016 20 Company Aspiration Empowering the User Operational Processes to Respect Privacy
  21. 21. QUESTIONS Geoff Revill @Krowdthink geoff@krowdthink.com Events: 1 February, 2016 copyright Krowdthink Ltd 2016 21 www.theprivacyadvantage.com Sponsored by ARM & Microsoft Becoming Web Safe Eventbrite 24th Feb -Exeter University

×