SlideShare a Scribd company logo
1 of 28
Download to read offline
11
How People Care aboutHow People Care about
their Personal Datatheir Personal Data
Released onReleased on
Social Media?Social Media?
www.assertlab.com
Universidade Federal de Pernambuco
Universidade Federal Rural de Pernambuco
Centro de Estudos e Sistemas Avançados do Recife
Kellyton Brito ksb@cin.ufpe.br
Frederico Durão freddurao@dcc.ufba.br
Vinicius Garcia vcg@cin.ufpe.br
Silvio Meira silvio@meira.com
22
AgendaAgenda
• Motivation
• Method
• Main results
• Conclusions
33
MotivationMotivation
• More than 1 billion people (>70% of internet
population) use social networks (2011)
• More them 600M use at least daily (2011)
• Facebook achieved 1 Billion users (2012)
• People share a lot of personal information
– Many private details
44
MotivationMotivation
Privacy can be compromised by many ways, for
instance:
The use of private data for marketing purposesThe use of private data for marketing purposes
by the social site or by plugby the social site or by plug--in applicationsin applications
using social site API’susing social site API’s
Among others…
55
MotivationMotivation
People generally feel that the privacyfeel that the privacy of their
personal information is being protectedis being protected by social
media sites
but
A majority of the most popular social media, such
as FacebookFacebook, Twitter and Google Services, Twitter and Google Services (services
such as Google+, YouTube and orkut), expresslyexpressly
declare that the service is allowed to use, sharedeclare that the service is allowed to use, share
and sell (and much more) user data for marketingand sell (and much more) user data for marketing
or any other kind of purposesor any other kind of purposes.
66
The StudyThe Study
• Main question:
How people care about the use of their personal
data by service providers in terms of social media.
• Specific questions:
– RQ1: Do people know about social network
companies’ policies?
– RQ2: Are people satisfied with these policies?
– RQ3: Do people would like a new social network
privacy and sharing model, i.e. Data Marketplace?
– RQ4: Are there differences between generations
related to how they care about their data?
77
The MethodThe Method
• The questionnaire
– Defined by Computer Science Researchers + a
Psychologist
– Short brief about privacy, survey goals, estimated
response time
– Ten questions: 3 demographic and 7 specific
– Pilot with 6 respondents
88
Data CollectionData Collection
• Online questionnaire
• Viral approach: Facebook, twitter, e-mail and IM’s
• People reached 2.348 clicks - bit.ly statistcs
• 900 respondents from 16 countries
– 95% brazilians
99
ValidityValidity
• Descriptive analysis:
– Each question separately and data crossing
• 95% brazilians
– Study cannot be generalized to entire internet
population
– One of the biggest social media population (2nd on
the facebook)
• Successful viral advertising
– All ages achieved
– Example: 14% of Generation Z (12 to 19 years old) x
Brazilian population from 10 to 19 is 17,9%.
1010
Age distribution*Age distribution*
Baby
Boomers
4%
Generation X
24%
Generation Y
58%
Generation Z
14%
*D. G. Oblinger and J. L. Oblinger, Educating the Net Generation: Educause, 2005.
111111
Main ResultsMain Results
1212
RQ1: Do people know about social networkRQ1: Do people know about social network
companies’ policies?companies’ policies?
Do you usually read carefully the termsDo you usually read carefully the terms
of agreementof agreement, especially those lines
addressing information copyrights?
Do you knowDo you know that while transferring a file
or content through a social software youyou
are (in most cases) sharing your file’sare (in most cases) sharing your file’s
copyrightscopyrights with the social media
company?
1313
RQ2: Are people satisfied with theseRQ2: Are people satisfied with these
policies?policies?
Do you fearDo you fear that social applications (such
as facebook or twitter) collect, maintain,collect, maintain,
analyze and commercialize the data youanalyze and commercialize the data you
provide?provide?
Have you ever considered giving upHave you ever considered giving up using
some social applications for fear ofapplications for fear of
misuse or commercializationmisuse or commercialization of your
personal data?
1414
RQ3: do people like a new social network privacyRQ3: do people like a new social network privacy
and sharing model, i.e. Data Marketplaceand sharing model, i.e. Data Marketplace
What do you think about a marketplaceWhat do you think about a marketplace
in which the social applications reward
you for making use of your personal data?
Would you pay for a serviceWould you pay for a service that gives
you total control over the data that you
publish on social applications (beyond
application level features such as privacy
settings)?
151515
11 -- Does people knows aboutDoes people knows about
social network companies’social network companies’
policies?policies?
• Definitely not!
• 55% have never read terms of agreement and
copyrights, and only 4% always read it
• As a consequence, they do not know that they
are sharing their copyrights (54%)
161616
22 -- Are people satisfied withAre people satisfied with
these policies?these policies?
• Definitely not!
• 83% fear that social applications collect,
maintain, analize and commercialize their data
• And 68% think about give up from these
applications fearing misuse or
commercialization of their personal data
171717
33 -- Do people would like a newDo people would like a new
social network privacy and sharingsocial network privacy and sharing
model, i.e. Data Marketplace?model, i.e. Data Marketplace?
• Some people
• 32% thinks that a Data Marketplace would be
the ideal scenario
• But 63% do not believe that it is possible
• 55% could pay for a service that guarantee
their privacy
• 11% for sure
• But 40% not at all
1818
People Keener to Pay for PrivacyPeople Keener to Pay for Privacy
• People concerned to configure their visibility
settings
• People that read and know about companies
agreement terms and copyright sharing
• People that fear the misuse of their data
think about giving up applications and are
keener to pay for privacy.
• These people would like the DataMarket model
191919
44 –– Are there differencesAre there differences
between generations related tobetween generations related to
how they care about theirhow they care about their
data?data?
2020
Terms of agreement and copyrightsTerms of agreement and copyrights
• Young people don’t read!
Do you usually read carefully the terms of agreement,
especially those lines addressing information copyrights?
2121
Fear aboutFear about data misuse or commercedata misuse or commerce
• Older people think about give up applications, and youngest
have higher rates of “I do not care”
• Younger people more tolerant if they need services
2222
Data marketplaceData marketplace
• X and Y generation with higher confidence
– Economically active population ?
2323
Would people pay for privacy?Would people pay for privacy?
• Older generations more keener to pay,
independent of the cost
2424
Summary of generation behaviorSummary of generation behavior
252525
Concluding…Concluding…
2626
Final ConclusionsFinal Conclusions
• People do not read license terms and
consequently do not know very much about
services policies;
• People care about their privacy, and fear that
social applications collect, maintain, analyze and
commercialize their data;
• A good number of people would support
alternative models such as paying for privacy or
selling their personal data;
• There are some differences between generations
in relation to how they care about their data.
2727
Final ConclusionsFinal Conclusions
• Considering survey results, probably there is a
new market for:
(i) New social sites that emphasize these privacy
questions
(ii) A new Data Marketplace service that could allow
social applications reward users for making use
of their personal data.
282828
How people cares aboutHow people cares about
their personal datatheir personal data
released onreleased on
social medias?social medias?
www.assertlab.com
Universidade Federal de Pernambuco
Universidade Federal Rural de Pernambuco
Centro de Estudos e Sistemas Avançados do Recife
Kellyton Brito ksb@cin.ufpe.br
Frederico Durão freddurao@dcc.ufba.br
Vinicius Garcia vcg@cin.ufpe.br
Silvio Meira silvio@meira.com

More Related Content

What's hot

Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security MonitoringSysomos
 
Best practices Best practices for privacy and data protection in direct marke...
Best practices Best practices for privacy and data protection in direct marke...Best practices Best practices for privacy and data protection in direct marke...
Best practices Best practices for privacy and data protection in direct marke...CF1979
 
Bill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileBill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileChuck Brooks
 
Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Denys Malengreau
 
The Business(es) of Disinformation
The Business(es) of DisinformationThe Business(es) of Disinformation
The Business(es) of DisinformationSara-Jayne Terp
 
Ethics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningEthics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningHJ van Veen
 
Issue Tracking: How News 'Moves' Through the Media
Issue Tracking: How News 'Moves' Through the MediaIssue Tracking: How News 'Moves' Through the Media
Issue Tracking: How News 'Moves' Through the Mediaevolve24
 
Understanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalUnderstanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalAndrew Gregoris
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black TwitterAyodele Odubela
 
The Future Of Social Networks
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social NetworksCharlene Li
 
Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Digital Policy and Law Consulting
 
Framework for cybersecurity info sharing
Framework for cybersecurity info sharingFramework for cybersecurity info sharing
Framework for cybersecurity info sharingRoy Ramkrishna
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks
 
Gates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringGates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringChris Gates
 
Bigdata and Social Media Analytics
Bigdata and Social Media Analytics Bigdata and Social Media Analytics
Bigdata and Social Media Analytics Dillip kumar
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks
 

What's hot (20)

Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security Monitoring
 
Best practices Best practices for privacy and data protection in direct marke...
Best practices Best practices for privacy and data protection in direct marke...Best practices Best practices for privacy and data protection in direct marke...
Best practices Best practices for privacy and data protection in direct marke...
 
Bill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner ProfileBill and Melinda Gates Foundation Tech Partner Profile
Bill and Melinda Gates Foundation Tech Partner Profile
 
Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020Digital identity - Progressive Recruitment - 29/04/2020
Digital identity - Progressive Recruitment - 29/04/2020
 
The Business(es) of Disinformation
The Business(es) of DisinformationThe Business(es) of Disinformation
The Business(es) of Disinformation
 
Ethics in Data Science and Machine Learning
Ethics in Data Science and Machine LearningEthics in Data Science and Machine Learning
Ethics in Data Science and Machine Learning
 
Issue Tracking: How News 'Moves' Through the Media
Issue Tracking: How News 'Moves' Through the MediaIssue Tracking: How News 'Moves' Through the Media
Issue Tracking: How News 'Moves' Through the Media
 
a6-zhao
a6-zhaoa6-zhao
a6-zhao
 
Understanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalUnderstanding The Big Data Opportunity Final
Understanding The Big Data Opportunity Final
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black Twitter
 
The Future Of Social Networks
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social Networks
 
Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...
 
Framework for cybersecurity info sharing
Framework for cybersecurity info sharingFramework for cybersecurity info sharing
Framework for cybersecurity info sharing
 
Essay
EssayEssay
Essay
 
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...
 
Gates Toorcon X New School Information Gathering
Gates Toorcon X New School Information GatheringGates Toorcon X New School Information Gathering
Gates Toorcon X New School Information Gathering
 
Bigdata and Social Media Analytics
Bigdata and Social Media Analytics Bigdata and Social Media Analytics
Bigdata and Social Media Analytics
 
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
Chuck Brooks Profile on Emerging Technologies, Cybersecurity, Homeland Security
 
Social media & big data
Social media & big dataSocial media & big data
Social media & big data
 

Viewers also liked

2013 PoApper Introduction
2013 PoApper Introduction2013 PoApper Introduction
2013 PoApper IntroductionByungjin Park
 
Lng flyer04 final
Lng flyer04 finalLng flyer04 final
Lng flyer04 finalMECint
 
Challenges In Managing Embedded Product Development
Challenges In Managing Embedded Product DevelopmentChallenges In Managing Embedded Product Development
Challenges In Managing Embedded Product DevelopmentAtul Nene
 
Polarbearsfinal!!!!
Polarbearsfinal!!!!Polarbearsfinal!!!!
Polarbearsfinal!!!!tenazaki
 
Network Equipment Testing White Paper
Network Equipment Testing White PaperNetwork Equipment Testing White Paper
Network Equipment Testing White PaperAtul Nene
 
Polar bears (1)
Polar bears (1)Polar bears (1)
Polar bears (1)tenazaki
 
Developing softwareformobilesandtablets
Developing softwareformobilesandtabletsDeveloping softwareformobilesandtablets
Developing softwareformobilesandtabletsAtul Nene
 
Offshore flyer04 final
Offshore flyer04 finalOffshore flyer04 final
Offshore flyer04 finalMECint
 
Polar bears (1)
Polar bears (1)Polar bears (1)
Polar bears (1)tenazaki
 
PoApper Introduction
PoApper IntroductionPoApper Introduction
PoApper IntroductionByungjin Park
 
Hindustani Classical Music for Listeners
Hindustani Classical Music for ListenersHindustani Classical Music for Listeners
Hindustani Classical Music for ListenersAtul Nene
 
Pivotal tracker를 활용한 팀 프로젝트 관리
Pivotal tracker를 활용한 팀 프로젝트 관리Pivotal tracker를 활용한 팀 프로젝트 관리
Pivotal tracker를 활용한 팀 프로젝트 관리Byungjin Park
 
Monkey D. Luffy - 리더의 격을 배우다 by Posquit0
Monkey D. Luffy - 리더의 격을 배우다 by Posquit0Monkey D. Luffy - 리더의 격을 배우다 by Posquit0
Monkey D. Luffy - 리더의 격을 배우다 by Posquit0Byungjin Park
 
Chapter 3 cac phuong phap cap nhat thong tin tren web
Chapter 3 cac phuong phap cap nhat thong tin tren webChapter 3 cac phuong phap cap nhat thong tin tren web
Chapter 3 cac phuong phap cap nhat thong tin tren webxuandiencntt
 
WERD phonetic transliterator to Devanagari
WERD phonetic transliterator to DevanagariWERD phonetic transliterator to Devanagari
WERD phonetic transliterator to DevanagariAtul Nene
 
Posquit0 - Fabric을 이용한 ssh streamlining
Posquit0 - Fabric을 이용한 ssh streamliningPosquit0 - Fabric을 이용한 ssh streamlining
Posquit0 - Fabric을 이용한 ssh streamliningByungjin Park
 
Rangkaian listrik Elektronika
Rangkaian listrik ElektronikaRangkaian listrik Elektronika
Rangkaian listrik ElektronikaDavid Loekito
 

Viewers also liked (20)

2013 PoApper Introduction
2013 PoApper Introduction2013 PoApper Introduction
2013 PoApper Introduction
 
Lng flyer04 final
Lng flyer04 finalLng flyer04 final
Lng flyer04 final
 
Challenges In Managing Embedded Product Development
Challenges In Managing Embedded Product DevelopmentChallenges In Managing Embedded Product Development
Challenges In Managing Embedded Product Development
 
Polarbearsfinal!!!!
Polarbearsfinal!!!!Polarbearsfinal!!!!
Polarbearsfinal!!!!
 
Network Equipment Testing White Paper
Network Equipment Testing White PaperNetwork Equipment Testing White Paper
Network Equipment Testing White Paper
 
Polar bears (1)
Polar bears (1)Polar bears (1)
Polar bears (1)
 
Lowsbrown
LowsbrownLowsbrown
Lowsbrown
 
Developing softwareformobilesandtablets
Developing softwareformobilesandtabletsDeveloping softwareformobilesandtablets
Developing softwareformobilesandtablets
 
Offshore flyer04 final
Offshore flyer04 finalOffshore flyer04 final
Offshore flyer04 final
 
Polar bears (1)
Polar bears (1)Polar bears (1)
Polar bears (1)
 
PoApper Introduction
PoApper IntroductionPoApper Introduction
PoApper Introduction
 
Hindustani Classical Music for Listeners
Hindustani Classical Music for ListenersHindustani Classical Music for Listeners
Hindustani Classical Music for Listeners
 
Pivotal tracker를 활용한 팀 프로젝트 관리
Pivotal tracker를 활용한 팀 프로젝트 관리Pivotal tracker를 활용한 팀 프로젝트 관리
Pivotal tracker를 활용한 팀 프로젝트 관리
 
Monkey D. Luffy - 리더의 격을 배우다 by Posquit0
Monkey D. Luffy - 리더의 격을 배우다 by Posquit0Monkey D. Luffy - 리더의 격을 배우다 by Posquit0
Monkey D. Luffy - 리더의 격을 배우다 by Posquit0
 
Chapter 3 cac phuong phap cap nhat thong tin tren web
Chapter 3 cac phuong phap cap nhat thong tin tren webChapter 3 cac phuong phap cap nhat thong tin tren web
Chapter 3 cac phuong phap cap nhat thong tin tren web
 
WERD phonetic transliterator to Devanagari
WERD phonetic transliterator to DevanagariWERD phonetic transliterator to Devanagari
WERD phonetic transliterator to Devanagari
 
Posquit0 - Fabric을 이용한 ssh streamlining
Posquit0 - Fabric을 이용한 ssh streamliningPosquit0 - Fabric을 이용한 ssh streamlining
Posquit0 - Fabric을 이용한 ssh streamlining
 
Thiet ke csdl pt
Thiet ke csdl ptThiet ke csdl pt
Thiet ke csdl pt
 
PLAW-111publ189
PLAW-111publ189PLAW-111publ189
PLAW-111publ189
 
Rangkaian listrik Elektronika
Rangkaian listrik ElektronikaRangkaian listrik Elektronika
Rangkaian listrik Elektronika
 

Similar to How People Care about their Personal Datatheir Data Released onReleased on Social Media?

Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project DIPRC2019
 
Presentation big data and social media final_video
Presentation big data and social media final_videoPresentation big data and social media final_video
Presentation big data and social media final_videoramikaurraminder
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataAnsgar Koene
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplacemkeane
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
The Business Value of Social Media
The Business Value of Social MediaThe Business Value of Social Media
The Business Value of Social MediaNikhil Jagtiani
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - recordDigital Catapult
 
Grounded, data with a story
Grounded, data with a storyGrounded, data with a story
Grounded, data with a storyInWithForward
 
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...Marcus Leaning
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 

Similar to How People Care about their Personal Datatheir Data Released onReleased on Social Media? (20)

Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project
 
Presentation big data and social media final_video
Presentation big data and social media final_videoPresentation big data and social media final_video
Presentation big data and social media final_video
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
The Business Value of Social Media
The Business Value of Social MediaThe Business Value of Social Media
The Business Value of Social Media
 
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, Feds
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - record
 
Grounded, data with a story
Grounded, data with a storyGrounded, data with a story
Grounded, data with a story
 
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 

More from Kellyton Brito

Poder e Contra Poder na Era Digital: Dados abertos governamentais
Poder e Contra Poder na Era Digital: Dados abertos governamentaisPoder e Contra Poder na Era Digital: Dados abertos governamentais
Poder e Contra Poder na Era Digital: Dados abertos governamentaisKellyton Brito
 
Assessing the Benefits of Open Government Data: The Case of Meu Congresso Nac...
Assessing the Benefits of Open Government Data: The Case of Meu Congresso Nac...Assessing the Benefits of Open Government Data: The Case of Meu Congresso Nac...
Assessing the Benefits of Open Government Data: The Case of Meu Congresso Nac...Kellyton Brito
 
Brazilian Government Open Data: Implementation, Challenges, and Potential Opp...
Brazilian Government Open Data: Implementation, Challenges, and Potential Opp...Brazilian Government Open Data: Implementation, Challenges, and Potential Opp...
Brazilian Government Open Data: Implementation, Challenges, and Potential Opp...Kellyton Brito
 
Mulheres no Meu Congresso Nacional
Mulheres no Meu Congresso NacionalMulheres no Meu Congresso Nacional
Mulheres no Meu Congresso NacionalKellyton Brito
 
Dados abertos no brasil
Dados abertos no brasilDados abertos no brasil
Dados abertos no brasilKellyton Brito
 
LIFT: A Legacy InFormation retrieval Tool
LIFT: A Legacy InFormation retrieval ToolLIFT: A Legacy InFormation retrieval Tool
LIFT: A Legacy InFormation retrieval ToolKellyton Brito
 
Implementing Web Applications as Social Machines Composition: a Case Study
Implementing Web Applications as Social Machines Composition: a Case StudyImplementing Web Applications as Social Machines Composition: a Case Study
Implementing Web Applications as Social Machines Composition: a Case StudyKellyton Brito
 
Programa Capivara - Seminário Alto Capibaribe - Uso de TI
Programa Capivara - Seminário Alto Capibaribe - Uso de TIPrograma Capivara - Seminário Alto Capibaribe - Uso de TI
Programa Capivara - Seminário Alto Capibaribe - Uso de TIKellyton Brito
 

More from Kellyton Brito (8)

Poder e Contra Poder na Era Digital: Dados abertos governamentais
Poder e Contra Poder na Era Digital: Dados abertos governamentaisPoder e Contra Poder na Era Digital: Dados abertos governamentais
Poder e Contra Poder na Era Digital: Dados abertos governamentais
 
Assessing the Benefits of Open Government Data: The Case of Meu Congresso Nac...
Assessing the Benefits of Open Government Data: The Case of Meu Congresso Nac...Assessing the Benefits of Open Government Data: The Case of Meu Congresso Nac...
Assessing the Benefits of Open Government Data: The Case of Meu Congresso Nac...
 
Brazilian Government Open Data: Implementation, Challenges, and Potential Opp...
Brazilian Government Open Data: Implementation, Challenges, and Potential Opp...Brazilian Government Open Data: Implementation, Challenges, and Potential Opp...
Brazilian Government Open Data: Implementation, Challenges, and Potential Opp...
 
Mulheres no Meu Congresso Nacional
Mulheres no Meu Congresso NacionalMulheres no Meu Congresso Nacional
Mulheres no Meu Congresso Nacional
 
Dados abertos no brasil
Dados abertos no brasilDados abertos no brasil
Dados abertos no brasil
 
LIFT: A Legacy InFormation retrieval Tool
LIFT: A Legacy InFormation retrieval ToolLIFT: A Legacy InFormation retrieval Tool
LIFT: A Legacy InFormation retrieval Tool
 
Implementing Web Applications as Social Machines Composition: a Case Study
Implementing Web Applications as Social Machines Composition: a Case StudyImplementing Web Applications as Social Machines Composition: a Case Study
Implementing Web Applications as Social Machines Composition: a Case Study
 
Programa Capivara - Seminário Alto Capibaribe - Uso de TI
Programa Capivara - Seminário Alto Capibaribe - Uso de TIPrograma Capivara - Seminário Alto Capibaribe - Uso de TI
Programa Capivara - Seminário Alto Capibaribe - Uso de TI
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

How People Care about their Personal Datatheir Data Released onReleased on Social Media?

  • 1. 11 How People Care aboutHow People Care about their Personal Datatheir Personal Data Released onReleased on Social Media?Social Media? www.assertlab.com Universidade Federal de Pernambuco Universidade Federal Rural de Pernambuco Centro de Estudos e Sistemas Avançados do Recife Kellyton Brito ksb@cin.ufpe.br Frederico Durão freddurao@dcc.ufba.br Vinicius Garcia vcg@cin.ufpe.br Silvio Meira silvio@meira.com
  • 2. 22 AgendaAgenda • Motivation • Method • Main results • Conclusions
  • 3. 33 MotivationMotivation • More than 1 billion people (>70% of internet population) use social networks (2011) • More them 600M use at least daily (2011) • Facebook achieved 1 Billion users (2012) • People share a lot of personal information – Many private details
  • 4. 44 MotivationMotivation Privacy can be compromised by many ways, for instance: The use of private data for marketing purposesThe use of private data for marketing purposes by the social site or by plugby the social site or by plug--in applicationsin applications using social site API’susing social site API’s Among others…
  • 5. 55 MotivationMotivation People generally feel that the privacyfeel that the privacy of their personal information is being protectedis being protected by social media sites but A majority of the most popular social media, such as FacebookFacebook, Twitter and Google Services, Twitter and Google Services (services such as Google+, YouTube and orkut), expresslyexpressly declare that the service is allowed to use, sharedeclare that the service is allowed to use, share and sell (and much more) user data for marketingand sell (and much more) user data for marketing or any other kind of purposesor any other kind of purposes.
  • 6. 66 The StudyThe Study • Main question: How people care about the use of their personal data by service providers in terms of social media. • Specific questions: – RQ1: Do people know about social network companies’ policies? – RQ2: Are people satisfied with these policies? – RQ3: Do people would like a new social network privacy and sharing model, i.e. Data Marketplace? – RQ4: Are there differences between generations related to how they care about their data?
  • 7. 77 The MethodThe Method • The questionnaire – Defined by Computer Science Researchers + a Psychologist – Short brief about privacy, survey goals, estimated response time – Ten questions: 3 demographic and 7 specific – Pilot with 6 respondents
  • 8. 88 Data CollectionData Collection • Online questionnaire • Viral approach: Facebook, twitter, e-mail and IM’s • People reached 2.348 clicks - bit.ly statistcs • 900 respondents from 16 countries – 95% brazilians
  • 9. 99 ValidityValidity • Descriptive analysis: – Each question separately and data crossing • 95% brazilians – Study cannot be generalized to entire internet population – One of the biggest social media population (2nd on the facebook) • Successful viral advertising – All ages achieved – Example: 14% of Generation Z (12 to 19 years old) x Brazilian population from 10 to 19 is 17,9%.
  • 10. 1010 Age distribution*Age distribution* Baby Boomers 4% Generation X 24% Generation Y 58% Generation Z 14% *D. G. Oblinger and J. L. Oblinger, Educating the Net Generation: Educause, 2005.
  • 12. 1212 RQ1: Do people know about social networkRQ1: Do people know about social network companies’ policies?companies’ policies? Do you usually read carefully the termsDo you usually read carefully the terms of agreementof agreement, especially those lines addressing information copyrights? Do you knowDo you know that while transferring a file or content through a social software youyou are (in most cases) sharing your file’sare (in most cases) sharing your file’s copyrightscopyrights with the social media company?
  • 13. 1313 RQ2: Are people satisfied with theseRQ2: Are people satisfied with these policies?policies? Do you fearDo you fear that social applications (such as facebook or twitter) collect, maintain,collect, maintain, analyze and commercialize the data youanalyze and commercialize the data you provide?provide? Have you ever considered giving upHave you ever considered giving up using some social applications for fear ofapplications for fear of misuse or commercializationmisuse or commercialization of your personal data?
  • 14. 1414 RQ3: do people like a new social network privacyRQ3: do people like a new social network privacy and sharing model, i.e. Data Marketplaceand sharing model, i.e. Data Marketplace What do you think about a marketplaceWhat do you think about a marketplace in which the social applications reward you for making use of your personal data? Would you pay for a serviceWould you pay for a service that gives you total control over the data that you publish on social applications (beyond application level features such as privacy settings)?
  • 15. 151515 11 -- Does people knows aboutDoes people knows about social network companies’social network companies’ policies?policies? • Definitely not! • 55% have never read terms of agreement and copyrights, and only 4% always read it • As a consequence, they do not know that they are sharing their copyrights (54%)
  • 16. 161616 22 -- Are people satisfied withAre people satisfied with these policies?these policies? • Definitely not! • 83% fear that social applications collect, maintain, analize and commercialize their data • And 68% think about give up from these applications fearing misuse or commercialization of their personal data
  • 17. 171717 33 -- Do people would like a newDo people would like a new social network privacy and sharingsocial network privacy and sharing model, i.e. Data Marketplace?model, i.e. Data Marketplace? • Some people • 32% thinks that a Data Marketplace would be the ideal scenario • But 63% do not believe that it is possible • 55% could pay for a service that guarantee their privacy • 11% for sure • But 40% not at all
  • 18. 1818 People Keener to Pay for PrivacyPeople Keener to Pay for Privacy • People concerned to configure their visibility settings • People that read and know about companies agreement terms and copyright sharing • People that fear the misuse of their data think about giving up applications and are keener to pay for privacy. • These people would like the DataMarket model
  • 19. 191919 44 –– Are there differencesAre there differences between generations related tobetween generations related to how they care about theirhow they care about their data?data?
  • 20. 2020 Terms of agreement and copyrightsTerms of agreement and copyrights • Young people don’t read! Do you usually read carefully the terms of agreement, especially those lines addressing information copyrights?
  • 21. 2121 Fear aboutFear about data misuse or commercedata misuse or commerce • Older people think about give up applications, and youngest have higher rates of “I do not care” • Younger people more tolerant if they need services
  • 22. 2222 Data marketplaceData marketplace • X and Y generation with higher confidence – Economically active population ?
  • 23. 2323 Would people pay for privacy?Would people pay for privacy? • Older generations more keener to pay, independent of the cost
  • 24. 2424 Summary of generation behaviorSummary of generation behavior
  • 26. 2626 Final ConclusionsFinal Conclusions • People do not read license terms and consequently do not know very much about services policies; • People care about their privacy, and fear that social applications collect, maintain, analyze and commercialize their data; • A good number of people would support alternative models such as paying for privacy or selling their personal data; • There are some differences between generations in relation to how they care about their data.
  • 27. 2727 Final ConclusionsFinal Conclusions • Considering survey results, probably there is a new market for: (i) New social sites that emphasize these privacy questions (ii) A new Data Marketplace service that could allow social applications reward users for making use of their personal data.
  • 28. 282828 How people cares aboutHow people cares about their personal datatheir personal data released onreleased on social medias?social medias? www.assertlab.com Universidade Federal de Pernambuco Universidade Federal Rural de Pernambuco Centro de Estudos e Sistemas Avançados do Recife Kellyton Brito ksb@cin.ufpe.br Frederico Durão freddurao@dcc.ufba.br Vinicius Garcia vcg@cin.ufpe.br Silvio Meira silvio@meira.com