SlideShare a Scribd company logo
1 of 18
Download to read offline
Hands Off My Data!

A Comparison of Privacy Representations and Expectations
on Facebook

Hayley V Fuller
Agenda

1) Research “Context”
2) Findings
Introduction Research Context
Literature Review Privacy: What do we know?

Privacy as Data Control

Privacy as Dignity

{
{

•

Westin (1967)

•Smith

(2000)
RQ1: How does Facebook represent online privacy within policy, as
reflected in the Statement of Rights and Responsibilities (SRR)?
RQ2: What are Facebook users’ expectations of online privacy, as
reflected in user comments outlining privacy concerns in response to
Facebook’s SRR?
RQ3: How do user and Facebook (as reflected in the SRR)
conceptualizations of privacy compare to one another?

REsearch Questions
Method

Qualitative Content
Analysis

{

•PIPEDA

FIPs
•Recognition of Themes
Fair Information Principles (FIPs)
Accountability
Identifying Purposes

Consent

An organization is responsible for personal information under its control and shall designate an individual or individuals who are
accountable for the organization’s compliance with the following principles (PIPEDA, 2011, p. 36).
The purposes for which personal information is collected shall be identified by the organization at or before the time the information is
collected (PIPEDA, 2011, p. 36).

The knowledge and consent of the individual are required for the
collection, use, or disclosure of personal information, except where
inappropriate (PIPEDA, 2011, p. 37).

Limiting Collection

The collection of personal information shall be limited to that which is necessary for the purposes identified by the organization.
Information shall be collected by fair and lawful means (PIPEDA, 2011, p. 39).

Limiting Use, Disclosure,
and Retention

Personal information shall not be used or disclosed for purposes
other than those for which it was collected, except with the consent
of the individual or as required by law. Personal information shall be
retained only as long as necessary for the fulfillment of those
purposes (PIPEDA, 2011, p. 39).

Accuracy
Safeguards
Openness
Individual Access
Challenging Compliance

Personal information shall be as accurate, complete, and up-to-date as is necessary for the purposes for which it is to be used (PIPEDA,
2011, p. 40).

Personal information shall be protected by security safeguards appropriate to the sensitivity of the information (PIPEDA, 2011, p. 40).

An organization shall make readily available to individuals specific information about its policies and practices relating to the
management of personal information (PIPEDA, 2011, p. 41).
Upon request, an individual shall be informed of the existence, use, and disclosure of his or her personal information and shall be given
access to that information. An individual shall be able to challenge the accuracy and completeness of the information and have it
amended as appropriate (PIPEDA, 2011, p. 42).

An individual shall be able to address a challenge concerning compliance with the above principles to the designated individual or
individuals accountable for the organization’s compliance (PIPEDA, 2011, p. 43).
FIPs Category

Number of Sections of SRR
Coded Using FIPs
Categories
18

% of Total Number of
Sections

Limited Collection

10

8%

Limiting Use/
Disclosure/Retention

27

23%

Accuracy
Safeguards

8
11

8%
9%

Openness

15

13%

Accountability
Identifying Purposes

0
2

0%
1.7%

Individual Access
Challenging Compliance

0
0

Consent

16%

0%
0%
Total Sections: 116

Findings Privacy in the SRR: FIPs Coding
FIPs Category
Consent
Limiting Use/Disclosure/
Retention

% of Total SRR

% of Policy
Changes between
2011 and 2012

16% (18 of 116 sections)
23% (27 of 116 sections)

25%
31%

Findings Privacy in the SRR: Policy vs Stylistic Changes
FIP Category

Number of Comments
per category
51

% of Total Privacy Comments (out
of 316)
16%

2

0.6%

Limiting Use/
Disclosure/Retention

105

33%

Accuracy
Safeguards
Openness
Accountability
Identifying Purposes
Individual Access
Challenging Compliance
Approval/Disapproval
Statements

5
0
41
0
0
0
0
112

1.5%
0%
13%
0%
0%
0%
0%
36%

Consent
Limited Collection

Findings Privacy in the Comments: FIPs
When you or others who can see your content and
information use an application, your content and
information is shared with the application. We
require applications to respect your privacy, and
your agreement with that application will control
how the application can use, store, and transfer
that content and information.  (To learn more
about Platform, read our Data Use Policy and
Platform  Page.)

Findings Privacy in the Comments: SRR Section 2.3
70% of all user comments were related to SRR
Section 2.3

60% of those comments were about data
control

Findings Comparison of Privacy Concerns
ThemeS & Discussion Privacy Issues and Themes

Primary privacy issues:
1) Limiting Use/Disclosure/Retention
2) Consent

Section 2.3 themes:
1) Data Control
2) Threats
ThemeS : Data Control

Don Myra Gasser 2.3 needs to change in two ways.
Friends use of me [sic] FB information can not be shared
with any other applications. It should be very easy to
provide an option that turns this data sharing off if I
don't approve of how this information is being shared. I
am not sure that you are taking the users right to control
information seriously.
ThemeS : Data Control

How is privacy being
approached?
ThemeS : Data Control
When you or others who can see your content and
information use an application, your content and
information is shared with the application. We
require applications to respect your privacy, and
your agreement with that application will control
how the application can use, store, and transfer
that content and information.  (To learn more
about Platform, read our Data Use Policy and
Platform  Page.)
Concluding Thoughts
Questions?

More Related Content

Similar to Hands Off My Data! A Comparison of Privacy Representations and Expectations on Facebook

PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxwoodruffeloisa
 
Privacy protecting fitness trackers
Privacy protecting fitness trackersPrivacy protecting fitness trackers
Privacy protecting fitness trackersiwhhu
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docxteresehearn
 
e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES.eu
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
The Intersection of Social Media, HIPAA, and the Workplace
The Intersection of Social Media, HIPAA, and the WorkplaceThe Intersection of Social Media, HIPAA, and the Workplace
The Intersection of Social Media, HIPAA, and the WorkplacePolsinelli PC
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Saide OER Africa
 
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docxPanel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docxaman341480
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Security Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIsSecurity Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIsDr. V Vorvoreanu
 
Security Concerns With Privacy in Social Media
Security Concerns With Privacy in Social MediaSecurity Concerns With Privacy in Social Media
Security Concerns With Privacy in Social MediaKenie Moses
 
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data PrivacyPriyanka Aash
 

Similar to Hands Off My Data! A Comparison of Privacy Representations and Expectations on Facebook (20)

PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docxPSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
PSYC 3500 Strategies for Enhancing Learning and MemorySelf-Evalu.docx
 
Privacy protecting fitness trackers
Privacy protecting fitness trackersPrivacy protecting fitness trackers
Privacy protecting fitness trackers
 
1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx1)Health data is sensitive and confidential; hence, it should .docx
1)Health data is sensitive and confidential; hence, it should .docx
 
e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018
 
iSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaiSPIRT’s Response- White Paper on Data Protection Framework for India
iSPIRT’s Response- White Paper on Data Protection Framework for India
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
The Intersection of Social Media, HIPAA, and the Workplace
The Intersection of Social Media, HIPAA, and the WorkplaceThe Intersection of Social Media, HIPAA, and the Workplace
The Intersection of Social Media, HIPAA, and the Workplace
 
Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)Data Quality: Missing Data (PPT slides)
Data Quality: Missing Data (PPT slides)
 
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docxPanel Presentation Privacy Impact Assessments (PIA)Coordina.docx
Panel Presentation Privacy Impact Assessments (PIA)Coordina.docx
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Hipaa and social media using new
Hipaa and social media using newHipaa and social media using new
Hipaa and social media using new
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Social Lawyers by Nicole Hyland
Social Lawyers by Nicole HylandSocial Lawyers by Nicole Hyland
Social Lawyers by Nicole Hyland
 
Security Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIsSecurity Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIs
 
Security Concerns With Privacy in Social Media
Security Concerns With Privacy in Social MediaSecurity Concerns With Privacy in Social Media
Security Concerns With Privacy in Social Media
 
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
 

More from Hayley V Fuller

Reimagining Devonian Square
Reimagining Devonian SquareReimagining Devonian Square
Reimagining Devonian SquareHayley V Fuller
 
My-Mobile-Self: Platform as Identity
My-Mobile-Self: Platform as IdentityMy-Mobile-Self: Platform as Identity
My-Mobile-Self: Platform as IdentityHayley V Fuller
 
Crises Beyond Brands: Web 2.0 and PR Crises
Crises Beyond Brands: Web 2.0 and PR CrisesCrises Beyond Brands: Web 2.0 and PR Crises
Crises Beyond Brands: Web 2.0 and PR CrisesHayley V Fuller
 
Friendship is Dying, Social is Not
Friendship is Dying, Social is NotFriendship is Dying, Social is Not
Friendship is Dying, Social is NotHayley V Fuller
 
The Searchers: Representation in Film
The Searchers: Representation in FilmThe Searchers: Representation in Film
The Searchers: Representation in FilmHayley V Fuller
 
Gender and Sexuality in Animation
Gender and Sexuality in AnimationGender and Sexuality in Animation
Gender and Sexuality in AnimationHayley V Fuller
 
Participatory TV Fandom & Web 2.0
Participatory TV Fandom & Web 2.0Participatory TV Fandom & Web 2.0
Participatory TV Fandom & Web 2.0Hayley V Fuller
 

More from Hayley V Fuller (7)

Reimagining Devonian Square
Reimagining Devonian SquareReimagining Devonian Square
Reimagining Devonian Square
 
My-Mobile-Self: Platform as Identity
My-Mobile-Self: Platform as IdentityMy-Mobile-Self: Platform as Identity
My-Mobile-Self: Platform as Identity
 
Crises Beyond Brands: Web 2.0 and PR Crises
Crises Beyond Brands: Web 2.0 and PR CrisesCrises Beyond Brands: Web 2.0 and PR Crises
Crises Beyond Brands: Web 2.0 and PR Crises
 
Friendship is Dying, Social is Not
Friendship is Dying, Social is NotFriendship is Dying, Social is Not
Friendship is Dying, Social is Not
 
The Searchers: Representation in Film
The Searchers: Representation in FilmThe Searchers: Representation in Film
The Searchers: Representation in Film
 
Gender and Sexuality in Animation
Gender and Sexuality in AnimationGender and Sexuality in Animation
Gender and Sexuality in Animation
 
Participatory TV Fandom & Web 2.0
Participatory TV Fandom & Web 2.0Participatory TV Fandom & Web 2.0
Participatory TV Fandom & Web 2.0
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Hands Off My Data! A Comparison of Privacy Representations and Expectations on Facebook

  • 1. Hands Off My Data! A Comparison of Privacy Representations and Expectations on Facebook Hayley V Fuller
  • 4. Literature Review Privacy: What do we know? Privacy as Data Control Privacy as Dignity { { • Westin (1967) •Smith (2000)
  • 5. RQ1: How does Facebook represent online privacy within policy, as reflected in the Statement of Rights and Responsibilities (SRR)? RQ2: What are Facebook users’ expectations of online privacy, as reflected in user comments outlining privacy concerns in response to Facebook’s SRR? RQ3: How do user and Facebook (as reflected in the SRR) conceptualizations of privacy compare to one another? REsearch Questions
  • 7. Fair Information Principles (FIPs) Accountability Identifying Purposes Consent An organization is responsible for personal information under its control and shall designate an individual or individuals who are accountable for the organization’s compliance with the following principles (PIPEDA, 2011, p. 36). The purposes for which personal information is collected shall be identified by the organization at or before the time the information is collected (PIPEDA, 2011, p. 36). The knowledge and consent of the individual are required for the collection, use, or disclosure of personal information, except where inappropriate (PIPEDA, 2011, p. 37). Limiting Collection The collection of personal information shall be limited to that which is necessary for the purposes identified by the organization. Information shall be collected by fair and lawful means (PIPEDA, 2011, p. 39). Limiting Use, Disclosure, and Retention Personal information shall not be used or disclosed for purposes other than those for which it was collected, except with the consent of the individual or as required by law. Personal information shall be retained only as long as necessary for the fulfillment of those purposes (PIPEDA, 2011, p. 39). Accuracy Safeguards Openness Individual Access Challenging Compliance Personal information shall be as accurate, complete, and up-to-date as is necessary for the purposes for which it is to be used (PIPEDA, 2011, p. 40). Personal information shall be protected by security safeguards appropriate to the sensitivity of the information (PIPEDA, 2011, p. 40). An organization shall make readily available to individuals specific information about its policies and practices relating to the management of personal information (PIPEDA, 2011, p. 41). Upon request, an individual shall be informed of the existence, use, and disclosure of his or her personal information and shall be given access to that information. An individual shall be able to challenge the accuracy and completeness of the information and have it amended as appropriate (PIPEDA, 2011, p. 42). An individual shall be able to address a challenge concerning compliance with the above principles to the designated individual or individuals accountable for the organization’s compliance (PIPEDA, 2011, p. 43).
  • 8. FIPs Category Number of Sections of SRR Coded Using FIPs Categories 18 % of Total Number of Sections Limited Collection 10 8% Limiting Use/ Disclosure/Retention 27 23% Accuracy Safeguards 8 11 8% 9% Openness 15 13% Accountability Identifying Purposes 0 2 0% 1.7% Individual Access Challenging Compliance 0 0 Consent 16% 0% 0% Total Sections: 116 Findings Privacy in the SRR: FIPs Coding
  • 9. FIPs Category Consent Limiting Use/Disclosure/ Retention % of Total SRR % of Policy Changes between 2011 and 2012 16% (18 of 116 sections) 23% (27 of 116 sections) 25% 31% Findings Privacy in the SRR: Policy vs Stylistic Changes
  • 10. FIP Category Number of Comments per category 51 % of Total Privacy Comments (out of 316) 16% 2 0.6% Limiting Use/ Disclosure/Retention 105 33% Accuracy Safeguards Openness Accountability Identifying Purposes Individual Access Challenging Compliance Approval/Disapproval Statements 5 0 41 0 0 0 0 112 1.5% 0% 13% 0% 0% 0% 0% 36% Consent Limited Collection Findings Privacy in the Comments: FIPs
  • 11. When you or others who can see your content and information use an application, your content and information is shared with the application. We require applications to respect your privacy, and your agreement with that application will control how the application can use, store, and transfer that content and information.  (To learn more about Platform, read our Data Use Policy and Platform  Page.) Findings Privacy in the Comments: SRR Section 2.3
  • 12. 70% of all user comments were related to SRR Section 2.3 60% of those comments were about data control Findings Comparison of Privacy Concerns
  • 13. ThemeS & Discussion Privacy Issues and Themes Primary privacy issues: 1) Limiting Use/Disclosure/Retention 2) Consent Section 2.3 themes: 1) Data Control 2) Threats
  • 14. ThemeS : Data Control Don Myra Gasser 2.3 needs to change in two ways. Friends use of me [sic] FB information can not be shared with any other applications. It should be very easy to provide an option that turns this data sharing off if I don't approve of how this information is being shared. I am not sure that you are taking the users right to control information seriously.
  • 15. ThemeS : Data Control How is privacy being approached?
  • 16. ThemeS : Data Control When you or others who can see your content and information use an application, your content and information is shared with the application. We require applications to respect your privacy, and your agreement with that application will control how the application can use, store, and transfer that content and information.  (To learn more about Platform, read our Data Use Policy and Platform  Page.)