SlideShare a Scribd company logo
Web 2.0 & Online Communities, Summer School 2011




      Day 10: Privacy, terms, & identity
This week (Week 4)
Tuesday (day 10):
– Privacy, terms & identity management
Wednesday (day 11):
– Social plugins & project work
Thursday (day 12):
– It’s Prajesh’s very own special day!
Miscellany:
–   Wiki software upgraded
–   Blog assignment 2 marks (same as last week)
–   Blog assignment 3 due Friday (IRGO!)
–   Project: Research almost done, page & content 
    started, user recruitment begun
                                                     2
3
Blog assignment 3   (4 th   February by 5:00pm)
For the last blog assignment, students will be 
required to go to at least one session of 
the IRGO unConference 2. 
Your task is to participate at a session of your 
choice (check the programme for the full range 
of topics) and then critique this session.
Please feel free to include other media such as 
photos etc. of the session in question to augment 
your writing. 
Read the unConference programme for sessions 
of interest and the FAQ page for answers to 
common questions.
                                                     4
Part 1: Terms of
     privacy
                   5
TOS and privacy policies
Provided by all community‐driven websites
– E.g., Facebook, Twitter, Ning, etc.
Governs collection, storage, transfer, usage, etc. 
of user data by operators (services)
Sets expectations of behaviour and 
responsibilities of both parties
Users agree to adhere to TOS and privacy policy
Lays out consequences of breaching TOS or 
privacy guidelines
How many of you just click “accept”?




                                       7
Types of data collection
Mandatory personal information:
– Collected on registration
– Name, email address, password
Optional personal information:
– Identity driven
– Biography, photos, tags, location, interests, ...
Log information:
– Automatic (IP address, browser, visited pages, ...)
– 3rd party services (Google analytics)
– Cookies (file stored on your machine)
Google knows all




                   9
Privacy
Typically legal requirement to provide a 
privacy (data usage) policy:
– e.g., privacy act 1993 NZ
Issues:
– Implicit agreement
– Jurisdictions
– Policy relating to children (min. age)
– Business acquisitions, bankruptcy, ...
– Disclosure to law enforcement
11
12
13
14
danah boyd says ...

“As social media become more embedded in 
everyday society, the mismatch between the 
rule‐based privacy that software offers and 
the subtler, intuitive ways that humans 
understand the concept will increasingly 
cause cultural collisions and social slips.”



                                               15
[Source: http://online.wsj.com/]   16
Facebook Like button


Used on 3rd party websites
Clicks send information to user’s profiles & to Facebook
Does not require click!
But what else: “... assemble a vast amount of data 
about Internet users' browsing habits.”
Soon: ‘... for a brand or check in at a store could find 
those actions appearing on their friends' pages as a 
"Sponsored Story" paid for by advertisers.’ 

                                                            17
Facebook says ...
“We do not share or sell the information we see 
when you visit a website with a Facebook social 
plugin to third parties and we do not use it to deliver 
ads to you. In addition, we will delete the data (i.e., 
data we receive when you see social plugins) 
associated with users in 90 days. We may keep 
aggregated and anonymized data (not associated 
with specific users) after 90 days for improving our 
products and services. This is consistent with 
standard industry practice.”

                                                           18
19
20
UNCOMMERCIAL BREAK
                     21
Time for you to get busy
Compare Facebook and Twitter privacy policies 
and answer these questions:
1. Which privacy policy is easiest to locate?
2. Which is the most onerous and why?
3. Which (if any) appears to hold user’s interests as 
   paramount?
4. Which service do you trust more?
5. Anything in the policies that you find especially 
   troubling?
6. Are there any other privacy issues that these 
   services can’t control?

                                                         22
END OF PART 1
                23
Part 2: Identity
 management
                   24
25
What do people do to manage accounts?
Use the same username/password for multiple 
sites
Use their browser's ability to remember their 
password (enabled by default)
Don't register for the new site
Don't ever log in to the site
Log in once, click "remember me"
Click the back button on their browser and never 
come back to the site
Maintain a list of user IDs and passwords in an 
offline document
                                                    26
Other more secure methods
Store account details in a “password vault”:
– On your PC (e.g., protected by fingerprint recognition)
– In a portable USB device, protected by a strong pass 
  phrase
– On a trustworthy online service, e.g., mashedlife.com
Login using an OpenID account where possible
Use popular online service (e.g., Facebook Connect, 
Twitter OAuth, ...)
28
OpenID
OpenIDs are URLs (i.e., your identities)
Find a provider (e.g., MyOpenID, Yahoo, ...)
Log into any site that supports OpenID
Not overly successful
Facebook Connect
What happens?
– Login into 3rd party 
  websites
– Approve level of data 
  access between Facebook 
  and website
– See if your friends have 
  also connected to the 
  website
– Publish content to 
  Facebook through the 
  website
                              30
31
The End

          32

More Related Content

What's hot

Web 3.0 :The Evolution of Web
Web 3.0:The Evolution of WebWeb 3.0:The Evolution of Web
Web 3.0 :The Evolution of Web
Niharjyoti Sarangi
 
Web tools..emaia
Web tools..emaiaWeb tools..emaia
Web tools..emaia
EddyCardno
 
“Library 2.0: Balancing the Risks and Benefits to Maximise the Dividends”
“Library 2.0: Balancing the Risks and Benefits to Maximise the Dividends”“Library 2.0: Balancing the Risks and Benefits to Maximise the Dividends”
“Library 2.0: Balancing the Risks and Benefits to Maximise the Dividends”
bridgingworlds2008
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
Yury Chemerkin
 
Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0
tokey_sport
 
Unpacking Pinterest. Breaking down Pinterest’s Terms of Service.
Unpacking Pinterest. Breaking down Pinterest’s Terms of Service.Unpacking Pinterest. Breaking down Pinterest’s Terms of Service.
Unpacking Pinterest. Breaking down Pinterest’s Terms of Service.
helentheoharakis
 
Web 1.0 2.0 3.0
Web 1.0 2.0 3.0Web 1.0 2.0 3.0
Web 1.0 2.0 3.0
Likan Patra
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC Legal
JISC Legal
 
Web Evolution Nova Spivack Twine
Web Evolution   Nova Spivack   TwineWeb Evolution   Nova Spivack   Twine
Web Evolution Nova Spivack Twine
Nova Spivack
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
Donald E. Hester
 

What's hot (12)

Web 3.0 :The Evolution of Web
Web 3.0:The Evolution of WebWeb 3.0:The Evolution of Web
Web 3.0 :The Evolution of Web
 
Web tools..emaia
Web tools..emaiaWeb tools..emaia
Web tools..emaia
 
“Library 2.0: Balancing the Risks and Benefits to Maximise the Dividends”
“Library 2.0: Balancing the Risks and Benefits to Maximise the Dividends”“Library 2.0: Balancing the Risks and Benefits to Maximise the Dividends”
“Library 2.0: Balancing the Risks and Benefits to Maximise the Dividends”
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Web 1.0, 2.0 & 3.0
Web 1.0, 2.0 & 3.0Web 1.0, 2.0 & 3.0
Web 1.0, 2.0 & 3.0
 
Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0
 
Unpacking Pinterest. Breaking down Pinterest’s Terms of Service.
Unpacking Pinterest. Breaking down Pinterest’s Terms of Service.Unpacking Pinterest. Breaking down Pinterest’s Terms of Service.
Unpacking Pinterest. Breaking down Pinterest’s Terms of Service.
 
Web 1.0 2.0 3.0
Web 1.0 2.0 3.0Web 1.0 2.0 3.0
Web 1.0 2.0 3.0
 
Legal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC LegalLegal aspects of web 2.0 and social networking JISC Legal
Legal aspects of web 2.0 and social networking JISC Legal
 
Reading Log
Reading Log Reading Log
Reading Log
 
Web Evolution Nova Spivack Twine
Web Evolution   Nova Spivack   TwineWeb Evolution   Nova Spivack   Twine
Web Evolution Nova Spivack Twine
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 

Viewers also liked

5: Happy users
5: Happy users5: Happy users
5: Happy users
COMP 113
 
Day 13 (part 1): Virtual worlds
Day 13 (part 1): Virtual worldsDay 13 (part 1): Virtual worlds
Day 13 (part 1): Virtual worlds
COMP 113
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part twoCOMP 113
 
Class 1: Introduction
Class 1: IntroductionClass 1: Introduction
Class 1: Introduction
COMP 113
 
3: web technologies
3: web technologies3: web technologies
3: web technologies
COMP 113
 
4: SM case studies & online community
4: SM case studies & online community4: SM case studies & online community
4: SM case studies & online community
COMP 113
 
Cat graham Otago University 29th Jan 13
Cat graham Otago University 29th Jan 13Cat graham Otago University 29th Jan 13
Cat graham Otago University 29th Jan 13COMP 113
 
Miscellany
MiscellanyMiscellany
MiscellanyCOMP 113
 

Viewers also liked (8)

5: Happy users
5: Happy users5: Happy users
5: Happy users
 
Day 13 (part 1): Virtual worlds
Day 13 (part 1): Virtual worldsDay 13 (part 1): Virtual worlds
Day 13 (part 1): Virtual worlds
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two
 
Class 1: Introduction
Class 1: IntroductionClass 1: Introduction
Class 1: Introduction
 
3: web technologies
3: web technologies3: web technologies
3: web technologies
 
4: SM case studies & online community
4: SM case studies & online community4: SM case studies & online community
4: SM case studies & online community
 
Cat graham Otago University 29th Jan 13
Cat graham Otago University 29th Jan 13Cat graham Otago University 29th Jan 13
Cat graham Otago University 29th Jan 13
 
Miscellany
MiscellanyMiscellany
Miscellany
 

Similar to Day 10: Privacy, TOS & identity

6: privacy terms
6: privacy terms6: privacy terms
6: privacy terms
COMP 113
 
5 privacy terms
5 privacy terms5 privacy terms
5 privacy termsCOMP 113
 
Fyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshare
Franky Redant
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business Issues
Jeff Johnson
 
Unesco web2.0 workshop presentation
Unesco web2.0 workshop presentationUnesco web2.0 workshop presentation
Unesco web2.0 workshop presentation
Peter Mason
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Getting comfortable with social media
Getting comfortable with social mediaGetting comfortable with social media
Getting comfortable with social media
Kate Trgovac
 
A .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social mediaA .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social mediaRoy Lachica
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
Somerco Research
 
Fyronic seminar-software factorymeeting-sls
Fyronic seminar-software factorymeeting-slsFyronic seminar-software factorymeeting-sls
Fyronic seminar-software factorymeeting-sls
Franky Redant
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Cataloguing your friends and neighbours
Cataloguing your friends and neighboursCataloguing your friends and neighbours
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Nicola Osborne
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
Jason Hong
 
Missionary disciples and new media part2
Missionary disciples and new media part2Missionary disciples and new media part2
Missionary disciples and new media part2
Caroline Cerveny
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
Elizabeth Engel
 
Government of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social MediaGovernment of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social MediaJesse Wilkins
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
Julian Ranger
 
Online: The rise and rise (CIMCIG presentation, February 2009)
Online: The rise and rise (CIMCIG presentation, February 2009)Online: The rise and rise (CIMCIG presentation, February 2009)
Online: The rise and rise (CIMCIG presentation, February 2009)
pwcom.co.uk Ltd
 
Fundamentals of Social Media (Part 1)
Fundamentals of Social Media (Part 1)Fundamentals of Social Media (Part 1)
Fundamentals of Social Media (Part 1)
Whitney Mathews
 

Similar to Day 10: Privacy, TOS & identity (20)

6: privacy terms
6: privacy terms6: privacy terms
6: privacy terms
 
5 privacy terms
5 privacy terms5 privacy terms
5 privacy terms
 
Fyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshareFyronic seminar-engage-slideshare
Fyronic seminar-engage-slideshare
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business Issues
 
Unesco web2.0 workshop presentation
Unesco web2.0 workshop presentationUnesco web2.0 workshop presentation
Unesco web2.0 workshop presentation
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Getting comfortable with social media
Getting comfortable with social mediaGetting comfortable with social media
Getting comfortable with social media
 
A .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social mediaA .net developer experiences with web2.0 and social media
A .net developer experiences with web2.0 and social media
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
Fyronic seminar-software factorymeeting-sls
Fyronic seminar-software factorymeeting-slsFyronic seminar-software factorymeeting-sls
Fyronic seminar-software factorymeeting-sls
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Cataloguing your friends and neighbours
Cataloguing your friends and neighboursCataloguing your friends and neighbours
Cataloguing your friends and neighbours
 
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Missionary disciples and new media part2
Missionary disciples and new media part2Missionary disciples and new media part2
Missionary disciples and new media part2
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Government of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social MediaGovernment of Alberta Information Management Conference 2013 IM and Social Media
Government of Alberta Information Management Conference 2013 IM and Social Media
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
Online: The rise and rise (CIMCIG presentation, February 2009)
Online: The rise and rise (CIMCIG presentation, February 2009)Online: The rise and rise (CIMCIG presentation, February 2009)
Online: The rise and rise (CIMCIG presentation, February 2009)
 
Fundamentals of Social Media (Part 1)
Fundamentals of Social Media (Part 1)Fundamentals of Social Media (Part 1)
Fundamentals of Social Media (Part 1)
 

More from COMP 113

9 mobile devices and geolocation
9  mobile devices and geolocation9  mobile devices and geolocation
9 mobile devices and geolocationCOMP 113
 
7 Adopting & integrating SM in organisations
7 Adopting & integrating SM in organisations7 Adopting & integrating SM in organisations
7 Adopting & integrating SM in organisationsCOMP 113
 
U otago the frew group webinar
U otago the frew group webinar U otago the frew group webinar
U otago the frew group webinar
COMP 113
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
#eqnz: Sarah Gallagher
#eqnz: Sarah Gallagher#eqnz: Sarah Gallagher
#eqnz: Sarah GallagherCOMP 113
 
4 growing and thriving online communities
4 growing and thriving online communities4 growing and thriving online communities
4 growing and thriving online communitiesCOMP 113
 
3 online community & social networks
3 online community & social networks3 online community & social networks
3 online community & social networks
COMP 113
 
2 SM a closer look
2 SM a closer look2 SM a closer look
2 SM a closer lookCOMP 113
 
2013: Comp113 lecture 1 part One
2013: Comp113 lecture 1 part One2013: Comp113 lecture 1 part One
2013: Comp113 lecture 1 part OneCOMP 113
 
12: End of everything
12: End of everything12: End of everything
12: End of everything
COMP 113
 
11: Gamification
11: Gamification11: Gamification
11: Gamification
COMP 113
 
10: The pitch & cool tools
10: The pitch & cool tools10: The pitch & cool tools
10: The pitch & cool tools
COMP 113
 
9: mobile technologies
9: mobile technologies9: mobile technologies
9: mobile technologies
COMP 113
 
8: The Deep Web & Arab Spring
8: The Deep Web & Arab Spring8: The Deep Web & Arab Spring
8: The Deep Web & Arab Spring
COMP 113
 
7: Copyright and eqnz
7: Copyright and eqnz7: Copyright and eqnz
7: Copyright and eqnz
COMP 113
 
2: Social media services and blogging
2: Social media services and blogging2: Social media services and blogging
2: Social media services and blogging
COMP 113
 
1: Overview and context
1: Overview and context1: Overview and context
1: Overview and context
COMP 113
 
Day 18: The end (for real)
Day 18: The end (for real)Day 18: The end (for real)
Day 18: The end (for real)
COMP 113
 
Day 15: Pitch & mobile
Day 15: Pitch & mobileDay 15: Pitch & mobile
Day 15: Pitch & mobile
COMP 113
 

More from COMP 113 (20)

9 mobile devices and geolocation
9  mobile devices and geolocation9  mobile devices and geolocation
9 mobile devices and geolocation
 
7 Adopting & integrating SM in organisations
7 Adopting & integrating SM in organisations7 Adopting & integrating SM in organisations
7 Adopting & integrating SM in organisations
 
U otago the frew group webinar
U otago the frew group webinar U otago the frew group webinar
U otago the frew group webinar
 
6 online identity
6 online identity6 online identity
6 online identity
 
6 online identity
6 online identity6 online identity
6 online identity
 
#eqnz: Sarah Gallagher
#eqnz: Sarah Gallagher#eqnz: Sarah Gallagher
#eqnz: Sarah Gallagher
 
4 growing and thriving online communities
4 growing and thriving online communities4 growing and thriving online communities
4 growing and thriving online communities
 
3 online community & social networks
3 online community & social networks3 online community & social networks
3 online community & social networks
 
2 SM a closer look
2 SM a closer look2 SM a closer look
2 SM a closer look
 
2013: Comp113 lecture 1 part One
2013: Comp113 lecture 1 part One2013: Comp113 lecture 1 part One
2013: Comp113 lecture 1 part One
 
12: End of everything
12: End of everything12: End of everything
12: End of everything
 
11: Gamification
11: Gamification11: Gamification
11: Gamification
 
10: The pitch & cool tools
10: The pitch & cool tools10: The pitch & cool tools
10: The pitch & cool tools
 
9: mobile technologies
9: mobile technologies9: mobile technologies
9: mobile technologies
 
8: The Deep Web & Arab Spring
8: The Deep Web & Arab Spring8: The Deep Web & Arab Spring
8: The Deep Web & Arab Spring
 
7: Copyright and eqnz
7: Copyright and eqnz7: Copyright and eqnz
7: Copyright and eqnz
 
2: Social media services and blogging
2: Social media services and blogging2: Social media services and blogging
2: Social media services and blogging
 
1: Overview and context
1: Overview and context1: Overview and context
1: Overview and context
 
Day 18: The end (for real)
Day 18: The end (for real)Day 18: The end (for real)
Day 18: The end (for real)
 
Day 15: Pitch & mobile
Day 15: Pitch & mobileDay 15: Pitch & mobile
Day 15: Pitch & mobile
 

Recently uploaded

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Day 10: Privacy, TOS & identity

  • 1. Web 2.0 & Online Communities, Summer School 2011 Day 10: Privacy, terms, & identity
  • 2. This week (Week 4) Tuesday (day 10): – Privacy, terms & identity management Wednesday (day 11): – Social plugins & project work Thursday (day 12): – It’s Prajesh’s very own special day! Miscellany: – Wiki software upgraded – Blog assignment 2 marks (same as last week) – Blog assignment 3 due Friday (IRGO!) – Project: Research almost done, page & content  started, user recruitment begun 2
  • 3. 3
  • 4. Blog assignment 3 (4 th February by 5:00pm) For the last blog assignment, students will be  required to go to at least one session of  the IRGO unConference 2.  Your task is to participate at a session of your  choice (check the programme for the full range  of topics) and then critique this session. Please feel free to include other media such as  photos etc. of the session in question to augment  your writing.  Read the unConference programme for sessions  of interest and the FAQ page for answers to  common questions. 4
  • 5. Part 1: Terms of privacy 5
  • 6. TOS and privacy policies Provided by all community‐driven websites – E.g., Facebook, Twitter, Ning, etc. Governs collection, storage, transfer, usage, etc.  of user data by operators (services) Sets expectations of behaviour and  responsibilities of both parties Users agree to adhere to TOS and privacy policy Lays out consequences of breaching TOS or  privacy guidelines
  • 7. How many of you just click “accept”? 7
  • 8. Types of data collection Mandatory personal information: – Collected on registration – Name, email address, password Optional personal information: – Identity driven – Biography, photos, tags, location, interests, ... Log information: – Automatic (IP address, browser, visited pages, ...) – 3rd party services (Google analytics) – Cookies (file stored on your machine)
  • 10. Privacy Typically legal requirement to provide a  privacy (data usage) policy: – e.g., privacy act 1993 NZ Issues: – Implicit agreement – Jurisdictions – Policy relating to children (min. age) – Business acquisitions, bankruptcy, ... – Disclosure to law enforcement
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. danah boyd says ... “As social media become more embedded in  everyday society, the mismatch between the  rule‐based privacy that software offers and  the subtler, intuitive ways that humans  understand the concept will increasingly  cause cultural collisions and social slips.” 15
  • 17. Facebook Like button Used on 3rd party websites Clicks send information to user’s profiles & to Facebook Does not require click! But what else: “... assemble a vast amount of data  about Internet users' browsing habits.” Soon: ‘... for a brand or check in at a store could find  those actions appearing on their friends' pages as a  "Sponsored Story" paid for by advertisers.’  17
  • 18. Facebook says ... “We do not share or sell the information we see  when you visit a website with a Facebook social  plugin to third parties and we do not use it to deliver  ads to you. In addition, we will delete the data (i.e.,  data we receive when you see social plugins)  associated with users in 90 days. We may keep  aggregated and anonymized data (not associated  with specific users) after 90 days for improving our  products and services. This is consistent with  standard industry practice.” 18
  • 19. 19
  • 20. 20
  • 22. Time for you to get busy Compare Facebook and Twitter privacy policies  and answer these questions: 1. Which privacy policy is easiest to locate? 2. Which is the most onerous and why? 3. Which (if any) appears to hold user’s interests as  paramount? 4. Which service do you trust more? 5. Anything in the policies that you find especially  troubling? 6. Are there any other privacy issues that these  services can’t control? 22
  • 23. END OF PART 1 23
  • 24. Part 2: Identity management 24
  • 25. 25
  • 26. What do people do to manage accounts? Use the same username/password for multiple  sites Use their browser's ability to remember their  password (enabled by default) Don't register for the new site Don't ever log in to the site Log in once, click "remember me" Click the back button on their browser and never  come back to the site Maintain a list of user IDs and passwords in an  offline document 26
  • 27. Other more secure methods Store account details in a “password vault”: – On your PC (e.g., protected by fingerprint recognition) – In a portable USB device, protected by a strong pass  phrase – On a trustworthy online service, e.g., mashedlife.com Login using an OpenID account where possible Use popular online service (e.g., Facebook Connect,  Twitter OAuth, ...)
  • 28. 28
  • 30. Facebook Connect What happens? – Login into 3rd party  websites – Approve level of data  access between Facebook  and website – See if your friends have  also connected to the  website – Publish content to  Facebook through the  website 30
  • 31. 31
  • 32. The End 32