Content sharing services have become immensely popular on the Web. More than 1 billion people use this kind of services to communicate with friends and exchange all sorts of information. In this new context, privacy guarantees are essential: guarantees about the potential release of data to unintended recipients and the use of user data by the service provider. Although the general public is concerned about privacy questions related to unintended audiences, data usage by service providers is still misunderstood. In order to further explore this level of misunderstanding, this work presents the results of a survey conducted among 900 people with the aim of discovering how people care about the use of their personal data by service providers in terms of social media. From the results, we found that: (i) in general people do not read license terms and do not know very much about service policies, and when presented with these policies people do not agree with them; (ii) a good number of people would support alternative models such as paying for privacy or selling their personal data; and (iii) there are some differences between generations in relation to how they care about their data.
In issue 08, we examine the crucial nature and value of social data and why it has become essential for brands to perform all functions of branding, marketing and selling to their customers.
Big Data, Psychografics and Social Media Advertising - Alessandro SistiData Driven Innovation
What if we could use big data analytics to investigate correlation between personality traits of consumers and their behavior on social network? Using such predictive models fostered by the use of Data Management Platform, innovative companies can deliver micro-targeted social media advertising. This speech analizes t the use of big data over the last us presidential campaign: president Trump won the battle against Clinton delivering more than 175.000 variants of targeted social media messages, using this innovative communication campaign on Facebook.
This article written Diarmaid Byrne, Editor, STQ, was published in issue 08 of the Social Technology Quarterly.
Summary: In the face of rising demand for data, privacy and ownership become a critical concern as vast amounts of data are accessed and bartered without the knowledge of people. In such scenarios, it is crucial to determine practices towards maintaining privacy.
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
These are my slides from a custom tool-based demonstration workshop I was asked to do where I went over various free tools that can be used to obtain valuable public data.
The concept of Big Data emphasizes the use of the complete data set to analyze process and predict various phenomena in the business world. This document describes the business uses of Big Data and outlines a Strategy for implementing Big Data analytics for Social Media
In issue 08, we examine the crucial nature and value of social data and why it has become essential for brands to perform all functions of branding, marketing and selling to their customers.
Big Data, Psychografics and Social Media Advertising - Alessandro SistiData Driven Innovation
What if we could use big data analytics to investigate correlation between personality traits of consumers and their behavior on social network? Using such predictive models fostered by the use of Data Management Platform, innovative companies can deliver micro-targeted social media advertising. This speech analizes t the use of big data over the last us presidential campaign: president Trump won the battle against Clinton delivering more than 175.000 variants of targeted social media messages, using this innovative communication campaign on Facebook.
This article written Diarmaid Byrne, Editor, STQ, was published in issue 08 of the Social Technology Quarterly.
Summary: In the face of rising demand for data, privacy and ownership become a critical concern as vast amounts of data are accessed and bartered without the knowledge of people. In such scenarios, it is crucial to determine practices towards maintaining privacy.
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
These are my slides from a custom tool-based demonstration workshop I was asked to do where I went over various free tools that can be used to obtain valuable public data.
The concept of Big Data emphasizes the use of the complete data set to analyze process and predict various phenomena in the business world. This document describes the business uses of Big Data and outlines a Strategy for implementing Big Data analytics for Social Media
Social media platforms have become the norm for companies to engage with customers and communicate information with the rest of the world. These networks also provide data that, when used with social monitoring tools, can be used to mitigate security issues before they become a major problem.
In this presentation you can learn how some of the world’s leading companies are using social intelligence to monitor security threats, identify liabilities, and get ahead of risk.
Covered:
Cyber security attacks
Fraud detection
Intellectual property protection
Executive and talent threats
Ethics in Data Science and Machine LearningHJ van Veen
Introduction and overview on ethics in data science and machine learning, variations and examples of algorithmic bias, and a call-to-action for self-regulation. Given by Thierry Silbermann as part of the Sao Paulo Machine Learning Meetup, theme: "Ethics".
https://www.linkedin.com/in/thierrysilbermann
https://twitter.com/silbermannt
https://github.com/thierry-silbermann
Issue Tracking: How News 'Moves' Through the Mediaevolve24
Target experienced a data breach in late 2013. Within a few minutes of the first blog post, the story spread like wildfire and placed Target in the national spotlight -- and not for a good reason.
This presentation demonstrates how an issue can be tracked by evolve24 to mitigate issues, manage communications and monitor reputation loss.
Full blog post at http://tinyurl.com/3yc8q5. Presented at Graphing Social Patterns, March 3, 2008 in San Diego. Theme: "Social networks will be like air".
In this report, we analyze a sample of settings in Facebook, Google and Windows 10, and show how default settings and dark patterns, techniques and features of interface design meant to manipulate users, are used to nudge users towards privacy intrusive options. The findings include privacy intrusive default settings, misleading wording, giving users an illusion of control, hiding away privacy-friendly choices, take-it-or-leave-it choices, and choice architectures where choosing the privacy friendly option requires more effort for the users.
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks
Chuck Brooks; Subject Matter Expert & Thought leader:
• Cybersecurity & Homeland Security
• Emerging Technologies: Smart Cities, Artificial Intelligence, Quantum Computing, Big Data, and Internet of Things
• Government Relations & Marketing
Social media platforms have become the norm for companies to engage with customers and communicate information with the rest of the world. These networks also provide data that, when used with social monitoring tools, can be used to mitigate security issues before they become a major problem.
In this presentation you can learn how some of the world’s leading companies are using social intelligence to monitor security threats, identify liabilities, and get ahead of risk.
Covered:
Cyber security attacks
Fraud detection
Intellectual property protection
Executive and talent threats
Ethics in Data Science and Machine LearningHJ van Veen
Introduction and overview on ethics in data science and machine learning, variations and examples of algorithmic bias, and a call-to-action for self-regulation. Given by Thierry Silbermann as part of the Sao Paulo Machine Learning Meetup, theme: "Ethics".
https://www.linkedin.com/in/thierrysilbermann
https://twitter.com/silbermannt
https://github.com/thierry-silbermann
Issue Tracking: How News 'Moves' Through the Mediaevolve24
Target experienced a data breach in late 2013. Within a few minutes of the first blog post, the story spread like wildfire and placed Target in the national spotlight -- and not for a good reason.
This presentation demonstrates how an issue can be tracked by evolve24 to mitigate issues, manage communications and monitor reputation loss.
Full blog post at http://tinyurl.com/3yc8q5. Presented at Graphing Social Patterns, March 3, 2008 in San Diego. Theme: "Social networks will be like air".
In this report, we analyze a sample of settings in Facebook, Google and Windows 10, and show how default settings and dark patterns, techniques and features of interface design meant to manipulate users, are used to nudge users towards privacy intrusive options. The findings include privacy intrusive default settings, misleading wording, giving users an illusion of control, hiding away privacy-friendly choices, take-it-or-leave-it choices, and choice architectures where choosing the privacy friendly option requires more effort for the users.
Chuck Brooks thought leadership profile (cybersecurity, homeland security ,em...Chuck Brooks
Chuck Brooks; Subject Matter Expert & Thought leader:
• Cybersecurity & Homeland Security
• Emerging Technologies: Smart Cities, Artificial Intelligence, Quantum Computing, Big Data, and Internet of Things
• Government Relations & Marketing
Having come across many wannabe listeners who are awed by Hindustani Classical Music to the extent that they don't follow their curiosity through, here is my attempt to de-mystify this north Indian form of music. I have consciously attempted to make this simple.
Keynote talk for VL/HCC 2018. I talk about why developers should care about privacy, what privacy is and why it is hard, some of our group's research in building better tools to help developers (in particular, Coconut IDE Plug-in and PrivacyStreams), and lastly some frameworks for thinking about privacy and developers.
I gave this version of my Design for Privacy presentation to the NY Experience Group of Publicis Sapient on Monday, 4 October 2021. It includes examples of privacy and security issues, our role in designing for privacy as design professionals, as well as best practices for privacy to keep in mind.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
Lee Rainie, Director of Internet, Science, and Technology research at the Pew Research Center, presented this material on December 12, 2016 to a working group at the National Academy of Sciences. The group is exploring how to think about creating an academic discipline around "data science."
Program on social media nad mobile device management issues facing employers in 2013, including use of social media in the hiring process from recruiting to background checks; BYOD and other mobile device management policies; drafting social media policies in light of NLRB guidance and enforcement action and protecting your social media assets.
What should organizations be concerned about when using Machine Learning for Predictive Modeling techniques? Divergence Academy and Divergence.AI are leading efforts to bring Algorithmic Accountability awareness to masses.
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
Join eMarketer Principal Analyst David Hallerman as he helps companies involved in the digital ad space figure out the best questions to ask and next steps to take to address digital privacy.
Poder e Contra Poder na Era Digital: Dados abertos governamentaisKellyton Brito
Apresentação realizada no evento "As Relações Governamentais na Era Digital: Estado, Empresas, Poder e a Opinião Pública Digital", ocorrido em Novembro, 2015, na Escola de Economia da FGV EAESP.
Brazilian Government Open Data: Implementation, Challenges, and Potential Opp...Kellyton Brito
Presented at 15th Annual International Conference on Digital Government Research, in Aguascalientes, Mexico, 2014.
Paper available: http://bit.ly/1l6KWPB
Ensaio sobre a necessidade de criação de uma plataforma de dados abertos nacional que possibilite a interoperabilidade entre os sistemas de informação governamentais ou privados, de forma a diminuir o custo e aumentar a qualidade e eficiência dos serviços prestados à população.
Nowadays software systems are essential to the environment of most organizations, and their maintenance is a key point to support business dynamics. Thus, reverse engineering legacy systems for knowledge reuse has become a major concern in software industry. This article, based on a survey about reverse engineering tools, discusses a set of functional and nonfunctional requirements for an effective tool for reverse engineering, and observes that current tools only partly support these requirements. In addition, we define new requirements, based on our group’s experience and industry feedback, and present the architecture and implementation of LIFT: a Legacy InFormation retrieval Tool, developed based on these demands. Furthermore, we discuss the compliance of LIFT with the defined requirements. Finally, we applied the LIFT in a reverse engineering project of a 210KLOC NATURAL/ADABAS system of a financial institution and analyzed its effectiveness and scalability, comparing data with previous similar projects performed by the same institution.
Implementing Web Applications as Social Machines Composition: a Case StudyKellyton Brito
With the evolution of the web and the concepts of web 3.0 as known as programmable web, several issues need to be studied in order to develop, deploy and use this new kind of application in a more effective way, such as communication between systems, unstructured data and non-scalable protocols, among others issues. In this regard, a new concept – named Social Machines – emerged to describe web based information systems that interact for a common purpose. In order to apply and validate in practice this new model, in this paper we describe a case study which implements a web application that is a composition of several public and well-known services from different application domains, such as Wikipedia, Flickr, Twitter, Google Places and Google Maps, following the Social Machines’ model. In the end, we present the results and some improvement suggestions for the model.
Programa Capivara - Seminário Alto Capibaribe - Uso de TIKellyton Brito
Palestra sobre o uso da internet como ferramenta de apoio a educação ambiental, apresentada em 03/02/2012, na Secretaria de Educação de Santa Cruz do Capibaribe/PE, para os professores da rede de ensino das escolas da região.
Esta palestra faz parte dos seminários de educação ambiental do Programa Capivara - Educação Socioambiental na bacia do Capibaribe:
www.programacapivara.org
facebook.com/programacapivara
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
How People Care about their Personal Datatheir Data Released onReleased on Social Media?
1. 11
How People Care aboutHow People Care about
their Personal Datatheir Personal Data
Released onReleased on
Social Media?Social Media?
www.assertlab.com
Universidade Federal de Pernambuco
Universidade Federal Rural de Pernambuco
Centro de Estudos e Sistemas Avançados do Recife
Kellyton Brito ksb@cin.ufpe.br
Frederico Durão freddurao@dcc.ufba.br
Vinicius Garcia vcg@cin.ufpe.br
Silvio Meira silvio@meira.com
3. 33
MotivationMotivation
• More than 1 billion people (>70% of internet
population) use social networks (2011)
• More them 600M use at least daily (2011)
• Facebook achieved 1 Billion users (2012)
• People share a lot of personal information
– Many private details
4. 44
MotivationMotivation
Privacy can be compromised by many ways, for
instance:
The use of private data for marketing purposesThe use of private data for marketing purposes
by the social site or by plugby the social site or by plug--in applicationsin applications
using social site API’susing social site API’s
Among others…
5. 55
MotivationMotivation
People generally feel that the privacyfeel that the privacy of their
personal information is being protectedis being protected by social
media sites
but
A majority of the most popular social media, such
as FacebookFacebook, Twitter and Google Services, Twitter and Google Services (services
such as Google+, YouTube and orkut), expresslyexpressly
declare that the service is allowed to use, sharedeclare that the service is allowed to use, share
and sell (and much more) user data for marketingand sell (and much more) user data for marketing
or any other kind of purposesor any other kind of purposes.
6. 66
The StudyThe Study
• Main question:
How people care about the use of their personal
data by service providers in terms of social media.
• Specific questions:
– RQ1: Do people know about social network
companies’ policies?
– RQ2: Are people satisfied with these policies?
– RQ3: Do people would like a new social network
privacy and sharing model, i.e. Data Marketplace?
– RQ4: Are there differences between generations
related to how they care about their data?
7. 77
The MethodThe Method
• The questionnaire
– Defined by Computer Science Researchers + a
Psychologist
– Short brief about privacy, survey goals, estimated
response time
– Ten questions: 3 demographic and 7 specific
– Pilot with 6 respondents
8. 88
Data CollectionData Collection
• Online questionnaire
• Viral approach: Facebook, twitter, e-mail and IM’s
• People reached 2.348 clicks - bit.ly statistcs
• 900 respondents from 16 countries
– 95% brazilians
9. 99
ValidityValidity
• Descriptive analysis:
– Each question separately and data crossing
• 95% brazilians
– Study cannot be generalized to entire internet
population
– One of the biggest social media population (2nd on
the facebook)
• Successful viral advertising
– All ages achieved
– Example: 14% of Generation Z (12 to 19 years old) x
Brazilian population from 10 to 19 is 17,9%.
12. 1212
RQ1: Do people know about social networkRQ1: Do people know about social network
companies’ policies?companies’ policies?
Do you usually read carefully the termsDo you usually read carefully the terms
of agreementof agreement, especially those lines
addressing information copyrights?
Do you knowDo you know that while transferring a file
or content through a social software youyou
are (in most cases) sharing your file’sare (in most cases) sharing your file’s
copyrightscopyrights with the social media
company?
13. 1313
RQ2: Are people satisfied with theseRQ2: Are people satisfied with these
policies?policies?
Do you fearDo you fear that social applications (such
as facebook or twitter) collect, maintain,collect, maintain,
analyze and commercialize the data youanalyze and commercialize the data you
provide?provide?
Have you ever considered giving upHave you ever considered giving up using
some social applications for fear ofapplications for fear of
misuse or commercializationmisuse or commercialization of your
personal data?
14. 1414
RQ3: do people like a new social network privacyRQ3: do people like a new social network privacy
and sharing model, i.e. Data Marketplaceand sharing model, i.e. Data Marketplace
What do you think about a marketplaceWhat do you think about a marketplace
in which the social applications reward
you for making use of your personal data?
Would you pay for a serviceWould you pay for a service that gives
you total control over the data that you
publish on social applications (beyond
application level features such as privacy
settings)?
15. 151515
11 -- Does people knows aboutDoes people knows about
social network companies’social network companies’
policies?policies?
• Definitely not!
• 55% have never read terms of agreement and
copyrights, and only 4% always read it
• As a consequence, they do not know that they
are sharing their copyrights (54%)
16. 161616
22 -- Are people satisfied withAre people satisfied with
these policies?these policies?
• Definitely not!
• 83% fear that social applications collect,
maintain, analize and commercialize their data
• And 68% think about give up from these
applications fearing misuse or
commercialization of their personal data
17. 171717
33 -- Do people would like a newDo people would like a new
social network privacy and sharingsocial network privacy and sharing
model, i.e. Data Marketplace?model, i.e. Data Marketplace?
• Some people
• 32% thinks that a Data Marketplace would be
the ideal scenario
• But 63% do not believe that it is possible
• 55% could pay for a service that guarantee
their privacy
• 11% for sure
• But 40% not at all
18. 1818
People Keener to Pay for PrivacyPeople Keener to Pay for Privacy
• People concerned to configure their visibility
settings
• People that read and know about companies
agreement terms and copyright sharing
• People that fear the misuse of their data
think about giving up applications and are
keener to pay for privacy.
• These people would like the DataMarket model
19. 191919
44 –– Are there differencesAre there differences
between generations related tobetween generations related to
how they care about theirhow they care about their
data?data?
20. 2020
Terms of agreement and copyrightsTerms of agreement and copyrights
• Young people don’t read!
Do you usually read carefully the terms of agreement,
especially those lines addressing information copyrights?
21. 2121
Fear aboutFear about data misuse or commercedata misuse or commerce
• Older people think about give up applications, and youngest
have higher rates of “I do not care”
• Younger people more tolerant if they need services
26. 2626
Final ConclusionsFinal Conclusions
• People do not read license terms and
consequently do not know very much about
services policies;
• People care about their privacy, and fear that
social applications collect, maintain, analyze and
commercialize their data;
• A good number of people would support
alternative models such as paying for privacy or
selling their personal data;
• There are some differences between generations
in relation to how they care about their data.
27. 2727
Final ConclusionsFinal Conclusions
• Considering survey results, probably there is a
new market for:
(i) New social sites that emphasize these privacy
questions
(ii) A new Data Marketplace service that could allow
social applications reward users for making use
of their personal data.
28. 282828
How people cares aboutHow people cares about
their personal datatheir personal data
released onreleased on
social medias?social medias?
www.assertlab.com
Universidade Federal de Pernambuco
Universidade Federal Rural de Pernambuco
Centro de Estudos e Sistemas Avançados do Recife
Kellyton Brito ksb@cin.ufpe.br
Frederico Durão freddurao@dcc.ufba.br
Vinicius Garcia vcg@cin.ufpe.br
Silvio Meira silvio@meira.com