The document discusses issues around privacy and data sharing with digital health technologies. It notes that while some data sharing may provide benefits, such as disease tracking, more exploitative uses are also possible. All data is at risk of becoming public over time as encryption and anonymity are broken. The document concludes that with digital data, public exposure should be assumed rather than any ability to selectively share, and technologies to protect privacy may lag behind risks to it.
ReadySetPresent (Empowerment PowerPoint Presentation Content): 100+ PowerPoint presentation content slides. Increasing empowerment in the workplace increases self-confidence, courage, and strength in each employee. Empowerment PowerPoint Presentation Content slides include topics such as: slides on a leader's role, 7 benefits of empowerment, empowerment in practice, various guidelines, 6 slides on empowered teams, 20+ tips for empowering employees, 9 rules of empowerment, 4 empowerment dimensions, building contracts with employees, 4 keys to assisting integration, 5 slides on building employee contracts, five types of empowerment, skills needed to empower, 7 slides on empowered decision making, 5 types of managerial control, 4 slides on when to empower, how to’s and more!
What's digital profiling and its impact on your privacyFabrizio Gramuglio
My speech at ECB / Be@Ware about security at home: digital profiling, emotion recognition, personal information hacking, and everyday life profiling technologies available today around you
ReadySetPresent (Empowerment PowerPoint Presentation Content): 100+ PowerPoint presentation content slides. Increasing empowerment in the workplace increases self-confidence, courage, and strength in each employee. Empowerment PowerPoint Presentation Content slides include topics such as: slides on a leader's role, 7 benefits of empowerment, empowerment in practice, various guidelines, 6 slides on empowered teams, 20+ tips for empowering employees, 9 rules of empowerment, 4 empowerment dimensions, building contracts with employees, 4 keys to assisting integration, 5 slides on building employee contracts, five types of empowerment, skills needed to empower, 7 slides on empowered decision making, 5 types of managerial control, 4 slides on when to empower, how to’s and more!
What's digital profiling and its impact on your privacyFabrizio Gramuglio
My speech at ECB / Be@Ware about security at home: digital profiling, emotion recognition, personal information hacking, and everyday life profiling technologies available today around you
presenting a concept for privacy in a world with the Internet of Things. While we already have serious privacy issues, many of them will become even worse with computers that are always on, everywhere and not even perceivable as computers anymore. This presentation holds a proposal to solve some of these issues
Your doorbell is looking a bit creepy. Smart video doorbells like those from Ring and Nest Labs (owned by Amazon and Alphabet, respectively) have their practical uses, such as catching package thieves. Still, the fast-selling systems could evolve into a privacy invasion, as Geoffrey A. Fowler notes in the Washington Post while offering an ethical field guide.
Major security intrustions from businesses large and small, private and government, indicate that the Internet is far less secure than most realize. After reading this, you may want to reconsider how secure your private data and information really is.
As our lives are more and more digital, more and more personal data travels. Consumers are becoming aware & worry, especially in a context of scandals around privacy on internet. Brands have to change their approach to big data to establish a real trusting relationship with their consumers.
How to use social media network analysis for amplificationMarc Smith
How can social media network analysis help you get your message out? Use network maps of social media to identify the most influential contributors based on their location within the network. Use content analysis to identify the topics, hashtags and URLs of greatest interest to the "mayors" of the hashtags that matter to you.
A network is a collection of connections. Learn how to express an edge in NodeXL. If you can make a pie chart, you can now make a network chart in NodeXL,
More Related Content
Similar to 20130724 ted x-marc smith-digital health futures empowerment or coercion
presenting a concept for privacy in a world with the Internet of Things. While we already have serious privacy issues, many of them will become even worse with computers that are always on, everywhere and not even perceivable as computers anymore. This presentation holds a proposal to solve some of these issues
Your doorbell is looking a bit creepy. Smart video doorbells like those from Ring and Nest Labs (owned by Amazon and Alphabet, respectively) have their practical uses, such as catching package thieves. Still, the fast-selling systems could evolve into a privacy invasion, as Geoffrey A. Fowler notes in the Washington Post while offering an ethical field guide.
Major security intrustions from businesses large and small, private and government, indicate that the Internet is far less secure than most realize. After reading this, you may want to reconsider how secure your private data and information really is.
As our lives are more and more digital, more and more personal data travels. Consumers are becoming aware & worry, especially in a context of scandals around privacy on internet. Brands have to change their approach to big data to establish a real trusting relationship with their consumers.
How to use social media network analysis for amplificationMarc Smith
How can social media network analysis help you get your message out? Use network maps of social media to identify the most influential contributors based on their location within the network. Use content analysis to identify the topics, hashtags and URLs of greatest interest to the "mayors" of the hashtags that matter to you.
A network is a collection of connections. Learn how to express an edge in NodeXL. If you can make a pie chart, you can now make a network chart in NodeXL,
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...Marc Smith
Networks are a powerful way to understand social media.
This talk reviews the ways the NodeXL application can be used to reveal the social media networks structures around topics.
2014 TheNextWeb-Mapping connections with NodeXLMarc Smith
Slides from a talk at the 2014 TheNextWeb in Amsterdam.
NodeXL social media network analysis of Twitter reveals six common structures in Twitter networks.
Think Link: Network Insights with No Programming SkillsMarc Smith
Networks are everywhere, but the tools for end users to access, analyze, visualize and share insights into connected structures have been absent. NodeXL, the network overview discovery and exploration add-in for Excel makes network analysis as easy as making a pie chart.
2013 NodeXL Social Media Network AnalysisMarc Smith
Social media network analysis and visualization with NodeXL - the network overview discovery and exploration add-in for Excel. Map Twitter, Facebook, email, blogs, and the web with a point and click interface within the familiar spreadsheet.
Course description for Optimice class on organizational network analysis (ONA) - the application of social network analysis (SNA) to business organizations.
Slides for talk at ConTech 2011 the International Symposium on Convergence Technology (ConTech 2011) – Smart & Humane World – on November 3rd in Seoul, South Korea.
Date: 2011 November 3 (Thurs)
Place: COEX Grand Ballroom, Seoul, Korea
Organized by Advanced Institutes of Convergence Technologies (AICT), Seoul National University (SNU)
In Cooperation with Ministry of Knowledge Economy, Ministry of Education, Science and Technology, National Research Foundation of Korea, Graduate School of Convergence Science and Technology (GSCST)
20110830 Introducing the Social Media Research FoundationMarc Smith
Description of the activities and goals of the Social Media Research Foundation. The foundation is dedicated to Open Tools, Open Data, and Open Scholarship. See: http://www.smrfoundation.org.
One project from the Social Media Research Foundation is NodeXL, the network overview, discovery and exploration add-in for Excel 2007/2010. See: http://www.smrfoundation.org
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR - Slides Onl...Peter Gallagher
In this session delivered at Leeds IoT, I talk about how you can control a 3D printed Robot Arm with a Raspberry Pi, .NET 8, Blazor and SignalR.
I also show how you can use a Unity app on an Meta Quest 3 to control the arm VR too.
You can find the GitHub repo and workshop instructions here;
https://bit.ly/dotnetrobotgithub
Google Calendar is a versatile tool that allows users to manage their schedules and events effectively. With Google Calendar, you can create and organize calendars, set reminders for important events, and share your calendars with others. It also provides features like creating events, inviting attendees, and accessing your calendar from mobile devices. Additionally, Google Calendar allows you to embed calendars in websites or platforms like SlideShare, making it easier for others to view and interact with your schedules.
3. The telescreen received and transmitted simultaneously. Any
sound that Winston made, above the level of a very low
whisper, would be picked up by it, moreover, so long as he
remained within the field of vision which the metal plaque
commanded, he could be seen as well as heard. There was of
course no way of knowing whether you were being watched
at any given moment. How often, or on what system, the
Thought Police plugged in on any individual wire was
guesswork. It was even conceivable that they watched
everybody all the time. But at any rate they could plug in your
wire whenever they wanted to. You had to live—did live, from
habit that became instinct—in the assumption that every
sound you made was overheard, and, except in darkness,
every movement scrutinized.
5. ‘Smith!’ screamed the shrewish voice from the
telescreen.
‘6079 Smith W.! Yes, YOU! Bend lower, please!
You can do better than that. You’re not trying.
Lower, please! THAT’S better, comrade. Now
stand at ease, the whole squad, and watch me.
7. To keep your face expressionless was not
difficult, and even your breathing could be
controlled, with an effort: but you could not
control the beating of your heart, and the
telescreen was quite delicate enough to pick it
up.
9. It was terribly dangerous to let your thoughts
wander when you were in any public place or
within range of a telescreen. The smallest thing
could give you away. A nervous tic, an unconscious
look of anxiety, a habit of muttering to yourself—
anything that carried with it the suggestion of
abnormality, of having something to hide. In any
case, to wear an improper expression on your face
(to look incredulous when a victory was announced,
for example) was itself a punishable offence. There
was even a word for it in Newspeak: FACECRIME, it
was called.
10.
11. COMPUTER SECURITY IS AN OXYMORON
All health data should be assumed world readable
12. Information that is
not public
and has not yet been
destroyed
is just waiting to
change to
either
state.
http://www.flickr.com/photos/baileyblack/1545504824/
15. Risky behavior will be priced in
real time, 3rd glass of wine
tonight? Click here for a $20
extension for alcohol related
injury or illness.
http://www.connectedaction.net/2009/02
/18/the-future-of-helath-insurance-
mobile-medical-sensors-and-dynamic-
pricing/
16. http://www.ft.com/cms/s/0/c1473442-a6f4-11de-bd14-00144feabdc0.html
Novartis chip to help ensure bitter pills are
swallowed
By Andrew Jack in London
Published: September 21 2009 23:06 | Last
updated: September 21 2009 23:06
technology that inserts a tiny microchip into
each pill swallowed and sends a reminder to
patients by text message if they fail to follow
their doctors’ prescriptions.
the system – which broadcasts from the “chip
in the pill” to a receiver on the shoulder – on
20 patients using Diovan, a drug to lower
blood pressure, had boosted “compliance”
with prescriptions from 30 per cent to 80 per
cent after six months.
17. Prediction: a mobile App will be more
medically effective than many drugs
If only because it will make you take the drug
properly
19. Result: lives that are more publicly
displayed than ever before.
• Add potential improvements in audio and
facial recognition and a new world of
continuous observation and publication
emerges.
• Some benefits, like those displayed by the
Google Flu tracking system, illustrate the
potential for insight from aggregated sensor
data.
• More exploitative applications are also likely.
21. The Myth of Selective Sharing
Bits exist along a gradient from private to public.
But in practice
they only move
in one direction.
http://www.connectedaction.net/2011/07/25/the-myth-of-selective-sharing-why-all-bits-will-eventually-be-public-or-be-destroyed/
25. Cryptography weakens over time
Eventually, private bits,
even when encrypted,
become public because
the march of computing
power makes their
encryption increasingly
trivial to break.
27. Patterns of connection
may uniquely identify
De-anonymizing Social Networks
Arvind Narayanan & Vitaly Shmatikov
http://33bits.org/2009/03/19/de-anonymizing-social-networks/
Abstract:
Operators of online social networks are increasingly sharing potentially sensitive information
about users and their relationships with advertisers, application developers, and data-mining
researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.
We present a framework for analyzing privacy and anonymity in social networks and develop a
new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its
effectiveness on real-world networks, we show that a third of the users who can be verified to
have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-
sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate. Our
de-anonymization algorithm is based purely on the network topology, does not require creation
of a large number of dummy “sybil” nodes, is robust to noise and all existing defenses, and works
even when the overlap between the target network and the adversary’s auxiliary information is
small.
31. Information that is
not public
and has not yet been
destroyed
is just waiting to
change to
either
state.
32. Conclusions
Selling “selective exposure” as a feature has dangerous failure conditions.
Assume public by default.
It takes a long time for mitigating technologies to catch up.
Insurance companies turn out to be the heros in the history of technical risk.
The aggregate data from social media is creating new opportunities for gaining insights into macro trends across populations.http://www.google.org/flutrends/