This document discusses several ways in which information technology and data collection can threaten individual privacy. It explores how the increased collection, sharing, and analysis of personal data online and through devices like smartphones has reduced privacy. While these technologies provide benefits, they also create new questions around who has access to personal information and how it is used. The document examines debates around privacy, trust, consent and whether people have a right to be left alone.
The “Privacy Today” presentation was written for the IAPP by Professor Peter Swire of the Moritz College of Law of the Ohio State University. The materials cover the definition of privacy, ways to protect privacy, privacy harms, and fair information practices. The “Privacy Today” presentation is designed for college and university students.
Licensed under Creative Commons Attribution 3.0 Unported
Explores:
1. Introduction to Privacy Regimes in the United States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data Transfers
5. Data Security Requirements and Data Breach Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
The “Privacy Today” presentation was written for the IAPP by Professor Peter Swire of the Moritz College of Law of the Ohio State University. The materials cover the definition of privacy, ways to protect privacy, privacy harms, and fair information practices. The “Privacy Today” presentation is designed for college and university students.
Licensed under Creative Commons Attribution 3.0 Unported
Explores:
1. Introduction to Privacy Regimes in the United States and Abroad
2. Mobile Applications and Devices
3. Lawful Collection and Use of “Big Data”
4. International Privacy and Cross-Border Data Transfers
5. Data Security Requirements and Data Breach Response
6. IT Outsourcing and the Cloud
7. Recent Developments and Emerging Issues
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
Today, balancing business opportunity and customer's data protection has become a difficult challenge. As technology, data sources and targeting abilities grow, so does the crucial need to respect user privacy and ensure a good data protection. But with laws, practices and definitions that are constantly evolving around the world, it can all seem a bit confusing.
Not sure where to start? Wondering how you can better align with privacy law? Then this webinar is for you.
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
25th May 2018 marks the enforcement date of EU’s General Data Protection Regulation. This new regulation strives to increase privacy for individuals and penalize businesses in breach. The complexity organizations face in managing consumer data is driving the growth of privacy tech solutions that decisively address a slew of privacy compliance challenges.
GDPR is coming for you whether you’re ready or not. Companies must show compliance by May 25, 2018. Take a look at the presentation to learn more about the new law that is going to change the way data is handled across the world. Read about the how it affects you and the steps you can take to make sure you’re GDPR ready!
About Extentia Information Technology:
Extentia is a global technology and services firm that helps clients transform and realize their digital strategies. With a focus on enterprise mobility, cloud computing, and user experiences, Extentia strives to accomplish and surpass your business goals. Our team is differentiated by an emphasis on excellent design skills that we bring to every project. Extentia’s work environment and culture inspire team members to be innovative and creative, and to provide clients with an exceptional partnership experience.
www.extentia.com
The presentation explains about Data Security as an industrial concept. It addresses
its concern on Data Loss Prevention in detail, from what it is, its approach, the best practices and
common mistakes people make for the same. The presentation concludes with highlighting
Happiest Minds' expertise in the domain.
Learn more about Happiest Minds Data Security Service Offerings
http://www.happiestminds.com/IT-security-services/data-security-services/
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
Today, balancing business opportunity and customer's data protection has become a difficult challenge. As technology, data sources and targeting abilities grow, so does the crucial need to respect user privacy and ensure a good data protection. But with laws, practices and definitions that are constantly evolving around the world, it can all seem a bit confusing.
Not sure where to start? Wondering how you can better align with privacy law? Then this webinar is for you.
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
25th May 2018 marks the enforcement date of EU’s General Data Protection Regulation. This new regulation strives to increase privacy for individuals and penalize businesses in breach. The complexity organizations face in managing consumer data is driving the growth of privacy tech solutions that decisively address a slew of privacy compliance challenges.
GDPR is coming for you whether you’re ready or not. Companies must show compliance by May 25, 2018. Take a look at the presentation to learn more about the new law that is going to change the way data is handled across the world. Read about the how it affects you and the steps you can take to make sure you’re GDPR ready!
About Extentia Information Technology:
Extentia is a global technology and services firm that helps clients transform and realize their digital strategies. With a focus on enterprise mobility, cloud computing, and user experiences, Extentia strives to accomplish and surpass your business goals. Our team is differentiated by an emphasis on excellent design skills that we bring to every project. Extentia’s work environment and culture inspire team members to be innovative and creative, and to provide clients with an exceptional partnership experience.
www.extentia.com
The presentation explains about Data Security as an industrial concept. It addresses
its concern on Data Loss Prevention in detail, from what it is, its approach, the best practices and
common mistakes people make for the same. The presentation concludes with highlighting
Happiest Minds' expertise in the domain.
Learn more about Happiest Minds Data Security Service Offerings
http://www.happiestminds.com/IT-security-services/data-security-services/
A description of privacy, on-line privacy, how people loose privacy presented at 'Shaping the future, A Free, Open and Secure Web for all' organised by @mombasatech and @mozillamombasa
5) How charities can protect themselves against data reform - ‘Emerging Digit...Code Computerlove
Steve specialises in compliance for digital marketers, is a member of the DMA Email Council, has authored the DMA email marketing deliverability best practice guide and was recently recognised by Litmus as an email marketing thought leader in the area of deliverability and privacy.
In his Now and Next presentation, Steve will be talking about the EU and UK data protection reforms and what these changes mean now and in the near future for digital marketing within charities.
Social business digital business social media customer serviceRobert Sullivan
in this slide show Robert Sullivan an international public and keynote speaker, consultant and training highlights the importance of social tools/ media in gathering customer Insight. Sullivan then gives examples of the drive towards personalisation and the need to truly understand customers needs and expectations.
He then looks at the importance of Organisational Culture and change in order to move successfully into and through this new world of doing business.
Social business digital business customer service careRobert Sullivan
Looks at customer insight, personalisation and the need for quality in the digital age. Slides from conference speech from international speaker, trainer and academic.
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsTara Aaron
As data sets and analytics sophistication grow, so do consumer's concerns about their privacy and what is being done with their personal information. Legislatures around the world are beginning to respond to these concerns. We present an overview of the General Data Protection Regulation and the California Consumer Protection Act to help companies comply with the law and engender trust with the consumers whose data they hold.
Big Data and Big Law at Walmart - StampedeCon 2013StampedeCon
At the StampedeCon 2013 Big Data conference in St. Louis, Anthony Martin, Chief Privacy and Information Security Counsel at Walmart, presented Big Data and Big Law at Walmart. This is the story of one global, multichannel company’s walk through the increasingly complicated Legal, Compliance, Security maze while trying to recognize the implicit value of Big Data programs.
Social Media and HR Riding the Roller Coasterdebmourey
Social Media goes beyond Facebook and Linked In. In this session we will look at how the social media
tool kit (e.g. Twitter, Ning groups, YouTube, Wikis, StumbleUpon) are not only changing the way that
companies attract and retain employees but also compressing the intersection between marketing and human
resources. Rapidly changing technology requires HR professionals to understand how policies can protect the
organization’s reputation and limit liability.
This course has been delivered at Association of Health Underwriters meetings for Continuing Education Credit.
It is a relatively comprehensive look at Cyber Security, the threats we face - some of which we're still just discovering - and what we can do to prevent becoming a victim of an attack.
Everyone is using social media to promote, but done wrong, it can backfire and tarnish your brand faster than a celebrity spokesperson going into rehab. Check out the latest trends and get practice pointers from those who've learned the hard way.
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
No matter what kind of law practice you have, you need to comply with privacy laws generally and lawyers' ethical duties with respect to privacy, specifically. In this presentation, legal ethics counsel Sarah Banola (Cooper, White and Cooper, LLP) and employment and privacy attorney Diana Maier (Law Offices of Diana Maier) deliver a primer on privacy law and teach you the key areas of privacy law and associated ethical obligations.
Business Law Training: Pushing CCPA Compliance Over the Finish Line: New Deve...Quarles & Brady
California’s passage of the California Consumer Privacy Act marks the first-of-its-kind comprehensive data privacy statute in the United States. Effective January 1, 2020, amendments are sitting on the Governor’s desk for signature, with new initiatives being discussed as we speak. What are the new developments? And at the end of the day, where do you need to be by December 31st? Join us for a lively discussion on the latest best practices for meeting the new data privacy requirements in California.
Want to move your career forward? Looking to build your leadership skills while helping others learn, grow, and improve their skills? Seeking someone who can guide you in achieving these goals?
You can accomplish this through a mentoring partnership. Learn more about the PMISSC Mentoring Program, where you’ll discover the incredible benefits of becoming a mentor or mentee. This program is designed to foster professional growth, enhance skills, and build a strong network within the project management community. Whether you're looking to share your expertise or seeking guidance to advance your career, the PMI Mentoring Program offers valuable opportunities for personal and professional development.
Watch this to learn:
* Overview of the PMISSC Mentoring Program: Mission, vision, and objectives.
* Benefits for Volunteer Mentors: Professional development, networking, personal satisfaction, and recognition.
* Advantages for Mentees: Career advancement, skill development, networking, and confidence building.
* Program Structure and Expectations: Mentor-mentee matching process, program phases, and time commitment.
* Success Stories and Testimonials: Inspiring examples from past participants.
* How to Get Involved: Steps to participate and resources available for support throughout the program.
Learn how you can make a difference in the project management community and take the next step in your professional journey.
About Hector Del Castillo
Hector is VP of Professional Development at the PMI Silver Spring Chapter, and CEO of Bold PM. He's a mid-market growth product executive and changemaker. He works with mid-market product-driven software executives to solve their biggest growth problems. He scales product growth, optimizes ops and builds loyal customers. He has reduced customer churn 33%, and boosted sales 47% for clients. He makes a significant impact by building and launching world-changing AI-powered products. If you're looking for an engaging and inspiring speaker to spark creativity and innovation within your organization, set up an appointment to discuss your specific needs and identify a suitable topic to inspire your audience at your next corporate conference, symposium, executive summit, or planning retreat.
About PMI Silver Spring Chapter
We are a branch of the Project Management Institute. We offer a platform for project management professionals in Silver Spring, MD, and the DC/Baltimore metro area. Monthly meetings facilitate networking, knowledge sharing, and professional development. For event details, visit pmissc.org.
The Impact of Artificial Intelligence on Modern Society.pdfssuser3e63fc
Just a game Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?Assignment 3
1. What has made Louis Vuitton's business model successful in the Japanese luxury market?
2. What are the opportunities and challenges for Louis Vuitton in Japan?
3. What are the specifics of the Japanese fashion luxury market?
4. How did Louis Vuitton enter into the Japanese market originally? What were the other entry strategies it adopted later to strengthen its presence?
5. Will Louis Vuitton have any new challenges arise due to the global financial crisis? How does it overcome the new challenges?
This comprehensive program covers essential aspects of performance marketing, growth strategies, and tactics, such as search engine optimization (SEO), pay-per-click (PPC) advertising, content marketing, social media marketing, and more
2. INFORMATION TECHNOLOGY ERODES PRIVACY
• COLLECTION, EXCHANGE, COMBINATION, AND DISTRIBUTION
OF INFORMATION EASIER THAN EVER, LESSENS PRIVACY
• “YOU HAVE ZERO PRIVACY ANYWAY. GET OVER IT.”
• WE WILL CONSIDER HOW WE LEAVE AN “ELECTRONIC TRAIL” OF INFORMATION BEHIND US AND
WHAT OTHERS CAN DO WITH THIS INFO
3. DEFINING PRIVACY
• PRIVACY RELATED TO NOTION OF ACCESS
• ACCESS
• PHYSICAL PROXIMITY TO A PERSON
• KNOWLEDGE ABOUT A PERSON
• PRIVACY IS A “ZONE OF INACCESSIBILITY”
• PRIVACY VIOLATIONS ARE AN AFFRONT TO HUMAN DIGNITY
• TOO MUCH INDIVIDUAL PRIVACY CAN HARM SOCIETY
• WHERE TO DRAW THE LINE?
• HARMS OF PRIVACY
• COVER FOR ILLEGAL OR IMMORAL ACTIVITIES
• IGNORED PEOPLE ON SOCIETY’S FRINGES
• BENEFITS OF PRIVACY
• FREEDOM TO BE YOURSELF
• DEVELOPMENT OF LOVING, TRUSTING, CARING, INTIMATE RELATIONSHIPS
• QUESTION: IS THERE AN NATURAL RIGHT TO PRIVACY?
5. PRIVACY AND TRUST
• PERHAPS MODERN LIFE IS ACTUALLY MORE PRIVATE THAN
LIFE CENTURIES AGO
• MOST PEOPLE DON’T LIVE WITH EXTENDED FAMILIES
• AUTOMOBILE ALLOWS US TO TRAVEL ALONE
• TELEVISION V. PUBLIC ENTERTAINMENT
• CHALLENGE: WE NOW LIVE AMONG STRANGERS
• REMEDY: ESTABLISHING REPUTATIONS
• ORDEAL, SUCH AS LIE DETECTOR TEST OR DRUG TEST
• CREDENTIAL, SUCH AS DRIVER’S LICENSE, KEY, ID CARD, COLLEGE DEGREE
• ESTABLISHING REPUTATION IS DONE AT THE COST OF
REDUCING PRIVACY
6. CASE STUDY: NEW PARENTS
• SULLIVANS HAVE A BABY GIRL
• BOTH WORK; THEY ARE CONCERNED ABOUT PERFORMANCE OF FULL-TIME NANNY
• PURCHASE PROGRAM THAT ALLOWS MONITORING THROUGH LAPTOP’S CAMERA PLACED IN
FAMILY ROOM
• THEY DO NOT INFORM NANNY SHE IS BEING MONITORED
7. DISCLOSING INFORMATION
• PUBLIC RECORD: INFORMATION ABOUT AN INCIDENT OR ACTION REPORTED TO A GOVERNMENT
AGENCY FOR PURPOSE OF INFORMING THE PUBLIC
• EXAMPLES: BIRTH CERTIFICATES, MARRIAGE LICENSES, MOTOR VEHICLE RECORDS, CRIMINAL RECORDS,
DEEDS TO PROPERTY
• PRIVATE RECORDS
• EXAMPLES: CREDIT CARD PURCHASES, PURCHASES MADE WITH LOYALTY CARDS, VOLUNTARY
DISCLOSURES, POSTS TO SOCIAL NETWORK SITES
8. DATA GATHERING AND PRIVACY IMPLICATIONS
• FACEBOOK TAGS
• FACEBOOK ALLOWS USERS TO TAG PEOPLE WHO ARE ON THEIR LIST OF FRIENDS
• ABOUT 100 MILLION TAGS ADDED PER DAY IN FACEBOOK
• FACEBOOK USES FACIAL RECOGNITION TO SUGGEST NAME OF FRIEND APPEARING IN
PHOTO
• DOES THIS FEATURE INCREASE RISK OF IMPROPER TAGGING?
• ENHANCED 911 SERVICES
• CELL PHONE PROVIDERS IN UNITED STATES REQUIRED TO TRACK LOCATIONS OF
ACTIVE CELL PHONES TO WITHIN 100 METERS
• ALLOWS EMERGENCY RESPONSE TEAMS TO REACH PEOPLE IN DISTRESS
• WHAT IF THIS INFORMATION IS SOLD OR SHARED?
• REWARDS OR LOYALTY PROGRAMS
• SHOPPERS WHO BELONG TO STORE’S REWARDS PROGRAM CAN SAVE
MONEY ON MANY OF THEIR PURCHASES
• COMPUTERS USE INFORMATION ABOUT BUYING HABITS TO PROVIDE
PERSONALIZED SERVICE
• SHOPRITE COMPUTERIZED SHOPPING CARTS WITH POP-UP ADS
• DO CARD USERS PAY LESS, OR DO NON-USERS GET OVERCHARGED?
• RFID TAGS
• RFID: RADIO FREQUENCY IDENTIFICATION
• AN RFID TAG IS A TINY WIRELESS TRANSMITTER
• MANUFACTURERS ARE REPLACING BAR CODES WITH RFID TAGS
• CONTAIN MORE INFORMATION
• CAN BE SCANNED MORE EASILY
• IF TAG CANNOT BE REMOVED OR DISABLED, IT BECOMES A TRACKING DEVICE
• PUBLIC RECORDING DEVICES
• PUBLIC CAMERAS IN CITIES
• POLICE BODY CAMS
• COOKIES
• COOKIE: FILE PLACED ON COMPUTER’S HARD DRIVE BY A WEB SERVER
• CONTAINS INFORMATION ABOUT VISITS TO A WEB SITE
• ALLOWS WEB SITES TO PROVIDE PERSONALIZED SERVICES
• PUT ON HARD DRIVE WITHOUT USER’S PERMISSION
• YOU CAN SET WEB BROWSER TO ALERT YOU TO NEW COOKIES OR TO BLOCK COOKIES
ENTIRELY
9. CREDIT REPORTS
• EXAMPLE OF HOW INFORMATION ABOUT CUSTOMERS CAN ITSELF BECOME A
COMMODITY
• CREDIT BUREAUS
• KEEP TRACK OF AN INDIVIDUAL’S ASSETS, DEBTS, AND HISTORY OF PAYING BILLS AND
REPAYING LOANS
• SELL CREDIT REPORTS TO BANKS, CREDIT CARD COMPANIES, AND OTHER POTENTIAL LENDERS
• SYSTEM GIVES YOU MORE CHOICES IN WHERE TO BORROW MONEY
• POOR CREDIT CAN HURT EMPLOYMENT PROSPECTS
• QUESTION: HOW IS THIS DIFFERENT FROM ANY COMPANY SELLING/USING YOUR
INFORMATION?
10. INSTAGRAM’S PROPOSED CHANGE TO TERMS OF
SERVICE
• LATE 2012: INSTAGRAM ANNOUNCED CHANGES
• PRIVACY POLICY
• TERMS OF SERVICE
• LEGAL EXPERTS: INSTAGRAM AND FACEBOOK WOULD HAVE
RIGHT TO USE PHOTOS IN ADS WITHOUT PERMISSION
• INSTAGRAM CEO: NEW POLICY MISUNDERSTOOD
• CHANGED ADVERTISING SECTION OF TERMS OF SERVICE
AGREEMENT BACK TO ORIGINAL VERSION
11. DATA MINING
• SEARCHING RECORDS IN ONE OR MORE DATABASES, LOOKING FOR PATTERNS OR RELATIONSHIPS
• CAN BE USED TO CREATE PROFILES OF INDIVIDUALS
• ALLOWS COMPANIES TO BUILD MORE PERSONAL RELATIONSHIPS WITH CUSTOMERS
• EXAMPLES: AMAZON, NETFLIX
• QUESTION: WHO OWNS THE DATA?
12. DATA MINING EXAMPLES
• LOTUS DEVELOPMENT CORPORATION DEVELOPED CD WITH INFORMATION ON 120 MILLION
AMERICANS
• PLANNED TO SELL CD TO TARGETED SMALL BUSINESSES THAT WANTED TO CREATE MAILING LISTS
BASED ON VARIOUS CRITERIA, SUCH AS HOUSEHOLD INCOME
• DUE TO 30,000 COMPLAINTS ABOUT PRIVACY LOTUS DROPPED PLANS TO SELL CD
• IN 2011 TWO MALLS RECORDED MOVEMENT OF SHOPPERS BY TRACKING LOCATIONS OF CELL
PHONES
• HOW MUCH TIME PEOPLE SPEND IN EACH STORE?
• DO PEOPLE WHO SHOP AT X ALSO SHOP AT Y?
• ARE THERE UNPOPULAR AREAS OF MALL?
• SMALL SIGNS INFORMED SHOPPERS OF STUDY
• AFTER PROTEST, MALL QUICKLY HALTED STUDY
Editor's Notes
Privacy natural right
Privacy rights stem from property rights: “a man’s home is his castle”
Coercive Acts before American Revolution led to 3rd Amendment to U.S. Constitution
Samuel Warren and Louis Brandeis: People have “the right to be let alone”
Judith Jarvis Thomson: “Privacy rights” overlap other rights
Conclusion: Privacy is not a natural right, but it is a prudential right
Princess Diana – deemed driver was drunk by alleged paparrazi was to blame
Rule Utilitarian
If everyone monitored nannies, it would not remain a secret for long
Consequences
Nannies would be on best behavior in front of camera
Might reduce child abuse and parents’ peace of mind
Would also increase stress and reduce job satisfaction of child care providers
Might result in higher turnover rate and less experienced pool of nannies, who would provide lower-quality care
Harms appear greater than benefits, so we conclude action was wrong
Social Contract Theory
It is reasonable for society to give people privacy in their own homes
Nanny has a reasonable expectation that her interactions with baby inside home are private
Sullivan’s decision to secretly monitor the nanny is wrong because it violates her privacy
Kantian Evaluation
Imagine rule, “An employer may secretly monitor the work of an employee who works with vulnerable people”
If universalized, there would be no expectation of privacy by employees, so secret monitoring would be impossible
Proposed rule is self-defeating, so it is wrong for Sullivans to act according to the rule
Virtue Ethics
Sullivans are responsible for well-being of their daughter
Chose nanny through concern for baby: characteristic of good parents
Daughter is truly defenseless, unable to communicate with them
Decision to monitor can be viewed as characteristic of good parents
Would also expect them to cease monitoring once assured nanny is doing well
Computerized databases and Internet have made public records much easier to access
Social Network Analysis
Collect information from social networks to inform decisions
Police use Facebook and Twitter posts to deploy officers on big party nights
Banks combine social network data with credit reports to determine creditworthiness
Opt-in: Consumer must explicitly give permission before the organization can share info
Opt-out: Organization can share info until consumer explicitly forbid it
Opt-in is a barrier for new businesses, so direct marketing organizations prefer opt-out
Collaborative Filtering
Form of data mining
Analyze information about preferences of large number of people to predict what one person may prefer
Explicit method: people rank preferences
Implicit method: keep track of purchases
Used by online retailers and movie sites