Privacy & Elvis


Published on

This slidedeck was for an internal lunchtime discussion around the issue of privacy. Each speaker had about 6-8 minutes to speak. I was simply trying to understand what privacy was in the context of the increasingly social world we live in. My final thought was that there was no fixed definition of privacy and that context played a very important role.

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Privacy & Elvis

  1. 1. Privacy & Elvis Guy Stephens 22.02.11
  2. 2. What is privacy? <ul><li>Is all privacy the same? Data, online, offline, abstract, philosophical </li></ul><ul><li>Is privacy determined by culture, context, celebrity…? </li></ul><ul><li>Who’s responsibility is privacy? You, me, the law, Facebook </li></ul><ul><li>Who or what controls privacy? You, me, the law, Twitter, Google </li></ul><ul><li>Can privacy be owned? What is owned? By who or what? Can I sell it? </li></ul><ul><li>Are there different levels of privacy? Permission levels on Facebook </li></ul><ul><li>What is the opposite of privacy? Public(ity), openness, transparency </li></ul><ul><li>What is privacy protecting? Information, picture, identity, secret </li></ul><ul><li>Is privacy a convenience? A commodity? A construct? A social object? </li></ul><ul><li>Is privacy a badge? </li></ul>© Foviance 2011
  3. 3. Is privacy a personal choice? © Foviance 2011
  4. 4. IBM Social Computing Guidelines: Blurring lines <ul><li>Be who you are. We believe in transparency and honesty; anonymity is not an option… But also be smart about protecting yourself and your privacy. What you publish will be around for a long time, so consider the content carefully and also be judicious in disclosing personal details. </li></ul><ul><li>Be thoughtful about how you present yourself in online social networks.  The lines between public and private, personal and professional are blurred in online social networks. </li></ul><ul><li>Protecting confidential and proprietary information. Social computing blurs many of the traditional boundaries between internal and external communications… For example, ask permission before posting someone's picture in a social network or publishing in a blog a conversation that was meant to be private. </li></ul>© Foviance 2011
  5. 5. Facebook: Distributed privacy © Foviance 2011
  6. 6. Twitter: How private are DMs? © Foviance 2011
  7. 7. Charlene Li, Being open without giving away the store… © Foviance 2011
  8. 8. The Cluetrain Manifesto <ul><li>12: There are no secrets. The networked market knows more than companies do about their own products. And whether the news is good or bad, they tell everyone. </li></ul><ul><li>41: Companies make a religion of security , but this is largely a red herring. Most are protecting less against competitors than against their own market and workforce. </li></ul>© Foviance 2011
  9. 9. A final word <ul><li>29: Elvis said it best: &quot;We can't go on together with suspicious minds.&quot; </li></ul>© Foviance 2011