A good customer experience nowadays gets personal. When designing these personalised experiences, we are confronted with a growing challenge: balancing personalisation and privacy. As our data collection increases, so does the importance of compliance. This does not only apply to the current and upcoming privacy laws, but also to consumer’s privacy expectations.
In this session, we will identify best practices regarding privacy on how to comply to the legal framework and how to build user trust. We’ll show you that shaping a privacy experience that leads to consumer trust isn’t one department’s problem, but a company-wide opportunity.
-- ADM.be, September 2015
Privacy by Designer* is a talk about the importance of Privacy for UX, and what practical things we as designers can do that benefit user privacy and UX. From using metaphors to make PETs more understandable, to clearly summarising that too-long-to-read policy legal is urging you to throw at the users.
Presented at php.ghent (<->, which is an approach to embedding pro-active privacy protection into business and technical specifications.)
Lifted by the Cloud is a vision of cloud-based accessibility presentation by Wayne Caswell as part of a contest sponsored by the FCC, the Coleman Institute for Cognitive Disabilities, and Raising the Floor. It’s based on the author’s 2006 presentation on BIG Broadband and Gigabit-to-the-Home.
I gave this version of my Design for Privacy presentation to the NY Experience Group of Publicis Sapient on Monday, 4 October 2021. It includes examples of privacy and security issues, our role in designing for privacy as design professionals, as well as best practices for privacy to keep in mind.
Privacy by Designer* is a talk about the importance of Privacy for UX, and what practical things we as designers can do that benefit user privacy and UX. From using metaphors to make PETs more understandable, to clearly summarising that too-long-to-read policy legal is urging you to throw at the users.
Presented at php.ghent (<->, which is an approach to embedding pro-active privacy protection into business and technical specifications.)
Lifted by the Cloud is a vision of cloud-based accessibility presentation by Wayne Caswell as part of a contest sponsored by the FCC, the Coleman Institute for Cognitive Disabilities, and Raising the Floor. It’s based on the author’s 2006 presentation on BIG Broadband and Gigabit-to-the-Home.
I gave this version of my Design for Privacy presentation to the NY Experience Group of Publicis Sapient on Monday, 4 October 2021. It includes examples of privacy and security issues, our role in designing for privacy as design professionals, as well as best practices for privacy to keep in mind.
Industry Unbound: The Inside Story of Privacy, Data and Corporate PowerBernard Marr
In this article, we look at privacy, data, and corporate power with insights from Professor Ari Waldman, author of the book 'Industry Unbound' about the challenges of data privacy and corporate power of technology companies.
In January, we released Outlook 2014, identifying four key themes that we believed would play a major role in consumer behavior over the coming year:
Internet of Things/Anticipatory Computing
Notification Nation
Data Doing Good
Generation Y and Z
Let’s look back to see where we are now, and look forward to see where the trends are going in the second half of the year.
Enigma is a Global Digital Transformation Agency
We build forward thinking bespoke digital business transformation models & solutions where the main competitors can’t deliver.
It’s the synergy of real time strategy and analytics combined to offline data sets that delivers an immersive experience for your needs.In today’s market where our customers have more choices than ever and competition fierce on their heels, they need to know what’s relevant, what interests and what inspires them as best as possible.
Your data might not tell you everything you need to know, but it’s the best place to start.
The rest, that’s all in the approach you take to execute a strategy or communication and how enticing your engagement is. It’s the interpretation of insight that makes
the real difference.
How Smart Products Help Companies Profit From DataBernard Marr
Data and AI are making our products smarter, which in turn can generate new and valuable data back to businesses. In this article, we explore the important relationship between data in our ever-smarter products.
The SolarWinds hack, first detected in December 2020 and referred to as “the largest and most sophisticated attack the world has ever seen” by the president of Microsoft, was a watershed moment in cybersecurity. Hundreds of organizations, including Fortune 500 companies and government agencies, were affected, with sensitive data compromised. A year on, a major study conducted by Splunk has found that 78% of companies expect the same thing to happen again.
PSFK Presents the Future of Digital Safety & SecurityPSFK
Get the Future of Digital Safety and Security: www.psfk.com/report/future-digital-safety-security
As the importance of digital life grows, so too does the risk of having personal data breached, mismanaged or stolen. This is particularly important in the payments space, where forward thinking companies are developing new ways to protect the safety, security, and privacy of their consumers, and offering greater controls and transparency around personal information to foster trust in both the digital and physical world.
The Future of Digital Safety and Security is a guidebook created by PSFK Labs in partnership with MasterCard in an effort to explore the key issues consumers are facing in the world of digital safety and security. The goal is to give consumers a look at important developing trends in this space, and to provide actionable ideas people can take to stay one step ahead of the curve.
Featured within the 40+ page report, readers can find:
- 9 ways companies are making digital life more secure
- 8 core needs for the modern consumer
- Unique user scenarios built around the newest trends
- Perspectives from leading security experts across the globe
If you are interested in seeing a presentation of this report or would like to understand how PSFK can help your team ideate new possibilities for your brand, contact us at sales@psfk.com
Ver. 1 | Published October 2015
All rights reserved. No parts of this publication may be reproduced without the written permission of PSFK Labs.
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...Bernard Marr
With the explosion of data in recent years, there’s more emphasis on data-based decision-making for all companies. But what if we could process data and act on it in real-time? What if we could be proactive instead of reactive to improve performance?
Rachel Sheppard and Jason Frazier from Mason-McDuffie Mortgage attended the Inman Connect Conference in San Francisco in 2015. This presentation includes several helpful tips we learned from top real estate agents and professionals.
Un estudio reportado por la Harvard Business Review muestra las tres estrategias encontradas para explotar totalmente las capacidades de Big Data y Analytics en una organización, estas son: 1) identificar, combinar y manejar múltiples fuentes de datos. 2) Construir modelos analíticos avanzados para predecir y optimizar resultados. 3) Transformar las capacidades de la organización de tal forma que los datos utilizados y el análisis de los mismos lleven a tomar mejores decisiones. El modelo de Cloud computing sirve para cada uno de las capacidades anteriormente mencionadas.
AI - Artificial Intelligence - Implications for LibrariesBrian Pichman
What does the world of AI (artificial intelligence) mean for libraries? Can AI replace library services or how can libraries leverage the technology for more streamlined services. From Smart Houses, to Robots, to technology yet to be mainstreamed, this session will cover it all to help you better prepare and plan for the future.
Industry Unbound: The Inside Story of Privacy, Data and Corporate PowerBernard Marr
In this article, we look at privacy, data, and corporate power with insights from Professor Ari Waldman, author of the book 'Industry Unbound' about the challenges of data privacy and corporate power of technology companies.
In January, we released Outlook 2014, identifying four key themes that we believed would play a major role in consumer behavior over the coming year:
Internet of Things/Anticipatory Computing
Notification Nation
Data Doing Good
Generation Y and Z
Let’s look back to see where we are now, and look forward to see where the trends are going in the second half of the year.
Enigma is a Global Digital Transformation Agency
We build forward thinking bespoke digital business transformation models & solutions where the main competitors can’t deliver.
It’s the synergy of real time strategy and analytics combined to offline data sets that delivers an immersive experience for your needs.In today’s market where our customers have more choices than ever and competition fierce on their heels, they need to know what’s relevant, what interests and what inspires them as best as possible.
Your data might not tell you everything you need to know, but it’s the best place to start.
The rest, that’s all in the approach you take to execute a strategy or communication and how enticing your engagement is. It’s the interpretation of insight that makes
the real difference.
How Smart Products Help Companies Profit From DataBernard Marr
Data and AI are making our products smarter, which in turn can generate new and valuable data back to businesses. In this article, we explore the important relationship between data in our ever-smarter products.
The SolarWinds hack, first detected in December 2020 and referred to as “the largest and most sophisticated attack the world has ever seen” by the president of Microsoft, was a watershed moment in cybersecurity. Hundreds of organizations, including Fortune 500 companies and government agencies, were affected, with sensitive data compromised. A year on, a major study conducted by Splunk has found that 78% of companies expect the same thing to happen again.
PSFK Presents the Future of Digital Safety & SecurityPSFK
Get the Future of Digital Safety and Security: www.psfk.com/report/future-digital-safety-security
As the importance of digital life grows, so too does the risk of having personal data breached, mismanaged or stolen. This is particularly important in the payments space, where forward thinking companies are developing new ways to protect the safety, security, and privacy of their consumers, and offering greater controls and transparency around personal information to foster trust in both the digital and physical world.
The Future of Digital Safety and Security is a guidebook created by PSFK Labs in partnership with MasterCard in an effort to explore the key issues consumers are facing in the world of digital safety and security. The goal is to give consumers a look at important developing trends in this space, and to provide actionable ideas people can take to stay one step ahead of the curve.
Featured within the 40+ page report, readers can find:
- 9 ways companies are making digital life more secure
- 8 core needs for the modern consumer
- Unique user scenarios built around the newest trends
- Perspectives from leading security experts across the globe
If you are interested in seeing a presentation of this report or would like to understand how PSFK can help your team ideate new possibilities for your brand, contact us at sales@psfk.com
Ver. 1 | Published October 2015
All rights reserved. No parts of this publication may be reproduced without the written permission of PSFK Labs.
These Fascinating Examples Show Why Streaming Data And Real-Time Analytics Ma...Bernard Marr
With the explosion of data in recent years, there’s more emphasis on data-based decision-making for all companies. But what if we could process data and act on it in real-time? What if we could be proactive instead of reactive to improve performance?
Rachel Sheppard and Jason Frazier from Mason-McDuffie Mortgage attended the Inman Connect Conference in San Francisco in 2015. This presentation includes several helpful tips we learned from top real estate agents and professionals.
Un estudio reportado por la Harvard Business Review muestra las tres estrategias encontradas para explotar totalmente las capacidades de Big Data y Analytics en una organización, estas son: 1) identificar, combinar y manejar múltiples fuentes de datos. 2) Construir modelos analíticos avanzados para predecir y optimizar resultados. 3) Transformar las capacidades de la organización de tal forma que los datos utilizados y el análisis de los mismos lleven a tomar mejores decisiones. El modelo de Cloud computing sirve para cada uno de las capacidades anteriormente mencionadas.
AI - Artificial Intelligence - Implications for LibrariesBrian Pichman
What does the world of AI (artificial intelligence) mean for libraries? Can AI replace library services or how can libraries leverage the technology for more streamlined services. From Smart Houses, to Robots, to technology yet to be mainstreamed, this session will cover it all to help you better prepare and plan for the future.
La planificación es un proceso que implica la organización secuencial y cronológica de las actividades, parte de un análisis y reflexión de qué aprendizajes se deben lograr teniendo en cuenta:
Las características de los niños y niñas
Sus necesidades de aprendizaje
El conocimiento de los lineamientos del nivel como son los principios y enfoque.
El contexto en el que se desarrolla el trabajo pedagógico
Debe responder a ¿Qué queremos lograr? ¿Cómo lo logramos?, ¿Con qué lo logramos?, ¿Cómo sabemos que lo estamos logrando?
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Designbradley_g
A presentation by Commissioner Cavoukian to the Canadian Institute Advertising and Marketing Law Conference on how Privacy by Design can give a sustainable competitive advantage in advertising and marketing.
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
Want to win over both existing and potential customers? Show them you value their privacy rights. And make opting in or out of targeted services and marketing a breeze. Businesses build trust by giving consumers control over their personal information. When you prioritize privacy, everyone wins!
How to accelerate the setup and management of complex cookie activities while ensuring compliance with privacy laws in all countries you operate in? How to use consumer trust as a competitive advantage?
In this webinar, you will learn:
- How to solve the challenge of identifying customers and respecting their choices across devices and browsers
- How to ensure a frictionless consent choice experience for your customers
- How to manage different and evolving cookie requirements and always stay compliant with data privacy laws
- What is Trustworthy AI and why it is important
TrustUX: balancing personalisation and privacy to create understanding and tr...Ann Wuyts
Sources list: http://www.keek.be/2015/trustux-sources/ (Stats, Quotes, ..)
A talk about ux, trust and privacy - and how these are becoming increasing important in human-computer interaction. This connection we have with our smart-everythings, it is no longer merely about exchanging data back and forth. Our connection with computers now does revolve around values which we normally find in human-to-human relationships: understanding and trust.
We humans expect that these machines do the computing effort to understand us; smart personalisation.We also expect that we can trust these machines – and the companies behind them - to keep what they learn about us to themselves. We expect them to respect our privacy. Our security.
And as designers, we need to deliver great, personal experiences. We also need to deliver trustworthy products. We owe it to both our users and the people who hire us to actively think about privacy, and to implement privacy in the flows and designs we deliver.
Marketing Brief describes the issue of Wi-Fi use in common household items that are controlled by smart phone, and computer apps. Communicating data security and making consumers aware about the risk of convinice within your smartphone
Where is customer engagement headed? Do you know? How will artificial intelligence impact healthcare and consumer decision-making. At DAVE 2017 our speakers will share two years of research into consumer behavior in an intelligent era. Sept 14-15. Learn more!
Marketing ecosystem: 7 challenges facing marketers todayTony Davis
The marketing technology landscape has exploded. Marketers are spoiled for choice with an array of platforms, products, integrations and connections. In this presentation, we take a step back from the technology to look at 7 major challenges faced by marketers wanting to navigate the marketing ecosystem.
The Digital Insurer speaks at AIA's inaugral bancassurance seminarThe Digital Insurer
The Digital Insurer was pleased to talk about how to think digital and transform face -to-face bancassurance models in Asia.
visit the-digital-insurer.com for more information on the conference.
Digital thinking to transform face-to-face insurance in Asia by Hugh TerryThe Digital Insurer
These are the slides presented by The Digital Insurer at the Insurancecom conference in HK at the Ritz Carlton on 2nd December 2014.
The theme of the conference was profitable strategies for growth in 2015 and this presentation focuses on the opportunity to use digital thinking and trends to create Agency 2.0 and Banca 2.0 models
Building Engaging Websites and Digital ExperiencesDNN
It's harder than ever to reach your target audience online. In a 2014 research study commissioned by DNN, 79% of marketing executives say it's a challenge to get (and hold) the attention of target customers. To stand a chance, you need to build engaging websites and digital experiences.
Stefan Tornquist, VP Research at Econsultancy shares trends, best practices and case studies around engaging websites and digital experiences. In this presentation, Stefan shares:
- Challenges of connecting to digitally-empowered customers
- Methods of engagement through customer experience mapping
- Challenges and opportunities in building great digital experiences
- Case studies showcasing best practices in engaging digital experiences
On the 5th December 2013, Intelecom took a trip into the future to look at the trends which will influence our contact centres and the way in which we deliver customer service. Featuring a fascinating key note from Gartner, Intelecom also took the opportunity to dispel some of the myths surrounding Cloud contact centres and highlighted the growing importance of Social Media in customer service.
Data privacy awareness is on the rise. Users become more and more concerned with how online service providers collect and protect their personal information. And so should you. Discover how to balance the risks and benefits of collecting data in the age of customer centricity.
Designing for privacy: 3 essential UX habits for product teamsBlock Party
Slides covering Block Party's "3 UX habits for privacy" shared in the 2024 SXSW keynote "Privacy-in-Progress: Redefining the Boundaries of Being Online."
In this keynote, diversity in tech advocate and Block Party CEO Tracy Chou and Block Party’s Head of Product Design Deonne Castaneda share where online privacy is now and what more we can do to shape a privacy-forward, safer Internet together.
You can watch the full talk on YouTube:
https://www.youtube.com/watch?v=TBQ4aNBAuJQ
For the 3 UX habits for privacy, skip to 24:11 — or use this link:
https://youtu.be/TBQ4aNBAuJQ?si=Deg5a7zWKwI1liu_&t=1451
When people are your most important asset: Data Governance, Privacy & UXAnn Wuyts
Note: quality render, readable version available on Speaker Deck at http://bit.ly/1Bs9Gcz
Data, knowledge about your customers, is the only durable competitive advantage for organisations. People expect personal experiences and data-fuelled smart devices and - soon - agents. Shareholders expect data-driven business and decisions. At the same time, regulatory pressure is increasing (long live the GDPR), customers demand they can trust you with their data, and internally all departments need to be able to trust the quality of the data exchanged. So how do you balance this? Good Data Governance, and for that you need to involve and engage a wide network of people across all departments which work with customer and business data. And let's face it, nowadays, that's every department. From maintenance to marketing to the more obvious IT. A short presentation about getting everybody on board - from enlisting the data scientists dealing with big data for agile data governance, to empowering your existing Stewards more.
Privacy Intro voor SETUP Utrecht's "16.8 miljoen Nederlanders in één verjaard...Ann Wuyts
Korte privacy introductie gegeven op Medialab SETUP's '16.8 miljoen cadeausuggesties' hackathon/sprint:
"Hoe moeilijk is het om een database van alle Nederlanders te bouwen? Medialab SETUP onderzoekt de kansen en risico's van big data en bouwt De Nationale Verjaardagskalender; een database met de verjaardagen van alle 16.8 miljoen Nederlanders. Inclusief cadeausuggesties voor iedereen, op basis van ieders persoonlijke interesses. Zodat jouw cadeau altijd in de smaak valt!"
Meer info hierover op http://setup.nl/content/168-miljoen-cadeausuggesties-sprint
Dear Marketers, How Badly Do You Know Me!Ann Wuyts
Marketers do not understand consumers' concerns regarding consent. As it comes to data privacy and opt in to receiving marketing communications, marketers underestimate by up to 100% all our areas of concern. However, they also underestimate our willingness to (re)opt-in to some of their lists - if there's value in return, of course.
(tldr summary of 'Marketers underestimate our trust issues' at http://www.keek.be/2014/marketers-underestimate-our-trust-issues/ )
Designing dashboards for a Sense of ControlAnn Wuyts
What makes dashboards so appealing to the human mind? We love dashboards because they help us establish a sense of control.
Good dashboard design offers this sense of control in three ways: it gives us a clear understanding of the current situation, the resources to predict and plan for the future, and it helps us complete critical tasks in time.
These, and the 'context' and work routine in which a dashboard will get used, are things not to loose sight of when working on dashboard functionality, UI and UX.
( This slideshow is a summary from the article on Dashboards & creating a Sense of Control at http://www.keek.be/2014/designing-dashboards-for-a-sense-of-control/ )
The shrinking display ads performance leads to two distinctly different tactics for advertising, programmatic trading and native advertising, according to the PWC Global Entertainment and Media Outlook.
Yet, using the ambient presence of ubiquitous computing in our lives in combination with artificial intelligence, it is possible to enhance the quality of programmatic by offering more value, personalisation and better taking context into account.
Automated does not have to mean impersonal, and AI gives us the possibility to add quality to quantity.
Natuurlijk kan je nooit genoeg over privacy weten, maar als ik - momenteel - 9 dingen moet uitkiezen:
1. Aangifteplicht
2. Vrijstelling klantencommunicatie
3. Verantwoordelijkheden verantwoordelijke van de verwerking
4. Wat een digitale handtekening is
5. Een icon set voor de gestandaardiseerde privacy mededeling?
6. Je werkgever mag niet (zomaar) in je mail snuffelen
7. Bewaartermijnen hou je best zo kort mogelijk
8. Beveilig ook alle persoonlijke 'devices'
9. Verplichting tot informeren & sensibiliseren personeel
Mobile, Smart & Context-Aware touches on the age of context, computing in function of living, the four phases of cognizant computing according to Gartner (Sync Me, See Me, Know Me, Be Me), contextualization and detection of user habits, monetization of context, being part of your customer's story, value and trust.
Made for Jini. Learn more how to make your service context-aware at http://enterprise.jini.co
MomoBXL - Pat Walsche on World-wide Privacy RecommendationsAnn Wuyts
Pat Walsche, GSMA's Director of Privacy, talk at Mobile Mondays Brussels on world-wide privacy recommendations. Major take-aways: privacy done right & building trust is a business opportunity.
* Privacy is a place to be alone, without fear of observation.
* Users do care: 92% is concerned about their personal data, 81% is doing efforts to safeguard their data, and 76% is selected whom they share data with.
* There's a patchwork of data laws, and (luckily) many local privacy guidelines initiatives are started, however, there is hardly any coordination world-wide.
* The cookie laws have actually undermined privacy, as they got people used to saying "Yes", regardless if the degree of 'invasiveness' of data being collected
* There's also definitely issues on OS level.
* Privacy (done right) is a huge business opportunity.
* All stakeholders in the mobile ecosystem have the responsibility to help build trust. Stop scaring customers away.
For Apps for Antwerp, we've decided we'd look into the littering problem, and how we could use the garbage bin dataset to make keeping the city clean as effortless and fun as possible. In short, our app is marketing for rubbish bins.
Little did we know that a team that formed spontaneously on the spot, would manage to sweep away a 'Concept' price. Yeey for us! ;)
Team members:
Farah Okka - okkafarah@hotmail.com
Ann Wuyts - @vintfalken
Stijn Willems - @doozmen
Claes Buckwalter - @claesbuckwalter
Severi Ally Steven - allyseveri@gmail.com
Thomas Leterme - @jixop
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
1. www.collibra.com Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
building
consumer
trust
stop hiding behind
your privacy policy
Ann Wuyts (@vintfalken)
Visual & UX Designer at
2. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Having knowledge of the customer is
the only durable competitive
advantage for companies.
Bruce Kasanoff, the author of Smart Customers, Stupid Companies
3. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Four phases of cognizant
computing
Gartner, Future of Smart Devices, 2013
1. SYNC ME
2. SEE ME
3. KNOW ME
4. BE ME
Store copies of my digital assets and keep it in sync across all end points and contexts
Know where I am (and have been) on the internet and in the real world. Understand my mood
and context to better align services
Understand what I want and need and proactively present it to me
Act on my behalf based on learned and explicit rules
94% COMPLETED
82% WEARABLES UPDATE
31% … LOADING DATA
INITIALIZING.. 12%
4. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
‘Know me’ lock-in
I’m not leaving these behind Could not do without.. So easy that you remember!
On top of increased spend due to personalization of offers
5. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Users expect Personalistation
& Personal
Experiences for the ‘most personal device ever’ are..
RELEVANT
are you engaging at the right moment?
GLANCEABLE
can you deliver value in milliseconds?
PERSONAL
do you approach people in the right
manner?
6. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
No other Apple device has ever
been so connected to the wearer.
It is important to be
mindful of this connection .
Apple Watch Human Interface Design Guidelines, 2015
7. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Machine-to-human relationships are
now about human-to-human values
UNDERSTANDING PERSONALISATION
H2H M2H
TRUST PRIVACY
8. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
The Privacy Challenge
Concern about privacy jumped 5 points between 2014 and 2015. 2nd Annual Poll on How Personal
Technology is Changing our Lives -
January 2015, Microsoft
9. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Loss of control
Privacy challenge: user point of view
91% of adults ‘agree’ or ‘strongly agree’ that
consumers have lost control over how
personal information is collected and used by
companies.
Pew Research Privacy Panel Survey, January 2014
10. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Lack of transparency
Privacy challenge: user point of view
People are fearful of sharing their data largely
because companies and government have not
been good at clearly explaining how they use
it.
Data Dialog, Demos 2012
11. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Understanding ‘privacy’
Privacy challenge: user point of view
Pew Research Privacy Panel Survey, January 2014
12. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“
Privacy ≠ Security
Co-founder of AlertMe
- Pilgrim Baert
Security is a very important topic, but it’s primarily a
technical topic, and to a large extent it’s a very well-
understood one. If you pay attention to security, it is
possible to get it right, whereas privacy is something
that’s much more fluid and is much more about social
norms, expectations, implicit contracts between
consumers and providers.”
13. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
1. Compliance
Why should organisations care about privacy?
14. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
2. Competitive advantage
Privacy is not only a
fundamental right, it can
also be a competitive
advantage .
Neelie Kroes
Conform to EU legislation?
Ready for the world market!
People can trust you with their digital identities?
Sets you apart from competition
Why care?
15. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“
2014 US Consumer Data Privacy Study: Consumer Privacy Edition, TRUSTe
9 out of 10 consumers avoid doing
business with companies who they
feel are not protecting their privacy
online
16. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
3. Privacy is part of the product
Why care?
proportionality
trust
PRIVACY PILLAR
PRODUCT
17. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Privacy as
a Trading
Function?
Customer Data: Designing for
Transparancy and Trust
– by Timothy Morey, Theodore Forbath, And Allison
Schoop, May 2015 (Harvard Business Review)
18. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Data in
exchange for
saving money,
time, and
energy
19. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“61% of adults “disagree” or “strongly disagree”
with the statement:
“I appreciate that online services are more
efficient because of the increased access they
have to my personal data.
But are we doing a good job at offering them these savings?
Pew, 2014
20. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Privacy is a fundamental component
of the product experience
BUSINESS
VALUE
CONSUMER
VALUE
PRIVACY
PERSONALISATION
GREAT UX
21. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Being credible
useful
usable desirable
credible
valuable
findable accessible
User Experience Honeycomb (Peter Morville)
credible
2004
the information you
present to users
2015
taking responsibility to
keep personal data safe
22. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Delivering understanding & trust
We owe it to both our users and the people who hire us to actively think about privacy, and to
implement privacy in the flows and designs we deliver.
B. We need to deliver trustworthy
products.
A. We need to deliver great,
personal experiences.
23. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
• Privacy
• Personalisation
• Both
• Neither
Q 01 What do you feel has most weight in your
organisation?
24. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Privacy requires a clear mandate
to get things done
You can’t do it alone. It is multi-disciplinary and cross-departmental.
Everybody accepts it is important –
but not a single department has it as
a priority.
Have privacy as part as the project
plan and estimates as soon as
possible.
A continuous need to explain the
significance of privacy in the overall
product & company picture
Have privacy as a deliverable, avoids the
delays & soring costs of adding it after
the facts.
25. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
• Yes, very much so
• Mostly legal
• Mostly IT
• It’s a department on its own
Q 02 Do you feel ‘privacy’ is treated as cross-
departmental at your organisation?
26. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Making a
case for
education(knowledge = control)
27. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“
Reality check on IoT
Acquity Group, 2015
87% of consumers has never heard
of the Internet of Things
However, they are more familiar with connected objects in specific contexts.
• ‘IoT’ is an industry term
• Consumer understanding is limited to the vertical (industry-specific) level, where as the IoT is inherently horizontal
28. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“
Understanding the connected ecosystem
Consumer understanding of IoT as a term, nevermind
a phenomenon, is extremely low. To understand that a
device is connected is not the same as understanding
the implications of a connected ecosystem—of the
Internet of Things.
Altimeter, 2015
29. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“
Please explain
85% of consumers wants to
understand more about how their
data is collected before using
connected devices
2014 TRUSTe Privacy Index: Internet of Things Edition, TRUSTe
30. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“
Privacy policies is no guarantee (but the consumer does not know that)
65% do not know that the statement “When a
website has a privacy policy, it means the site
will not share my information with other websites
and companies without my permission” is false.
The Tradeoff Fallacy: How Marketers are Misrepresenting American
Consumers and Opening them Up to Exploitation
Turow, Hennessy, Draper
31. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
So let’s just do this?
email
password
If
have
read
and
agreed
to
the
terms
of
service and
privacy
policy.
SIGN UP
32. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Let’s don our white hats!
Educate users
on privacy
and security.
Marketing then gets to sell this as if we are white knights in shiny armor saving the users in distress. ;)
33. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Axiom’s
AboutTheData
34. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Google ads
on the
London Tube
35. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Education: seize the moment
Can everybody access your email
on your phone?
Make sure only you can access your
email – and password resets – on
your phone.
Protecting your iOS or Android
device using an access code or
gesture takes only 2 minutes to set
up. Let’s show you.
Hi!
Instructions
to
reset
your
password
have
been
sent
to
i****
@
g****.com
If
they
do
not
arrive
within
5
minutes,
please
click
here.
36. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Education: don’t be afraid to point to third party resources or tools
Bye bye little black book. Have you
ever tried a password manager?
A password manager is a software
application that helps a user store
and organize passwords. Learn
more on wikipedia.
(Because so many of you asked:
here at the Xcomp offices, we use
Last Pass)
Hi!
Instructions
to
reset
your
password
have
been
sent
to
i****
@
g****.com
If
they
do
not
arrive
within
5
minutes,
please
click
here.
**********
*******
**************
***
37. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
In case of
breach
• Consider a breach likely – and
prepare accordingly
• Do not play the victim
• Be accountable
• Take ownership
• Express regaret
1. What happened? (tell what you know at that time)
crisis communications
(works for downtime communication too)
2. What is being done *NOW*? (investigate, take systems offline, ..)
3. How does this affect your customers? (both short- and long term)
4. What are you doing to minimize risk? What can your customers do?
5. How do people get more information or updates?
(folluw up) 6. What are you doing prevent this from happening again?
38. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
• Yes
• No
• Somewhat
Q 03 Educate
Does your organisation provides additional
informational resources around privacy and
security? (e.g. disclosures, partner lists, risks, opportunities, 3rd
party resources or tools, risk assessment tools, .. )
39. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Informed
consent(transparency & control) Yes, I do!
40. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“
Step 1: Get consent
Privacy does not benefit from a
“do first, ask forgiveness later” strategy.
(avoid: “Hey, we just lost all this data of yours you did not we had in the first place.”)
(what), why, where, to whomset correct expectations
41. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“
Step 1: Get explicit consent
By signing this contract, you agree
we have the right to collect and
pass on all your information. In
case you do not want your bank to
pass on your credit information to
third partners and other divisions,
please write ‘I do not agree’ on the
contract and hand it over to the
person behind the till.
EXPLICIT EXPLICIT NOT EXPLICIT
(hidden opt-out)
NO YES
IF YOU AGREE, PLEASE
CHECK THIS BOX:
42. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“
Step 1: Get informed, explicit consent
Users don’t want simple things.
They want things they can
understand.
@jnd1er (UX lx 2011)
43. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Design for
informed
No surprises
Option:
Offer a tldr; summary
44. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
One-page
privacy
policies
No surprises
• one-page privacy policy
• will go in effect October 15
• “simpler, clearer and more
transparent” (Chief Legal Officer
Harvey Anderson)
• challenged other companies to
do the same
45. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
46. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“AVG’s new privacy policy is
uncomfortably honest about
tracking users.”
In making its privacy policy easier to understand, AVG has also opened itself up
to a backlash.
- Columnist Jared Newman
Damned if you do, and damned if you don’t. Resulting PCWorld headline:
47. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Fix?
• Add a paid option that collects
and passes on fewer data
(‘business’?)
• Offer a clear comparison
Aka
give people
CHOICE
Rather we have only the essential data
required to keep you secure? Compare
our free to our pro offerings
48. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
• Yes
• No
• Somewhat
Q 04 Informed consent
Does your organisation require users to give their
informed consent?
49. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Choice(control)
50. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Choice
ACCESS DURATION
People forget to ‘revoke’ things.
Supply limited time access
options:
WeChat: location discoverable
for 10 minutes (default)
LinkedIn: access duration
settings (weeks -> months ->
years)
51. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Choice
OFFER ALTERNATIVES:NO BINARY YES/NO TO ALL SERVICES
In your designs and flows, take into account both having
and not having the data.
Design personalized experiences for
when you have data.
Design good alternatives for not
having the data.
Today will be sunny
Weather for Olen, Belgium where we
know you live.
Check out the weather!
Antwerpen
52. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Choice
MAKE IT EASY TO LEAVE
BUT CONVINCE THEM TO STAY
Think about WHY people are
leaving, and offer alternatives.
“snooze” services
less-email-option
reset profile/account
..
(and remember data portability!)
53. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Do you want to know
if your friends are
(action/mood/..) ?
Do you want your friends
to know if you are
(action/mood/..) ?
Don’t allowOK
Choice: keep peer-to-peer privacy in mind
Ask the right question: not do you want to see, but are you willing for others to see..
54. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
• Yes
• No
• Somewhat
Q 05 Choice
Does your organisation provide users with options
towards the collection, use, sharing, storage of their
data?
55. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Empower(control – agency matters!)
56. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Empower
Easy access overview
of privacy settings
CLEAR & CONSISTENT, SO
PEOPLE CAN TRUST YOU TO
POINT OUT PRIVACY RELATED
FEATURES & SETTINGS.
57. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
REWARD SECURE BEHAVIOUR
Users that enable two-step
security on their accounts will
now receive a 10% discount off
their monthly bill Mailchimp bill.
Empower
Offer the tools
& reward usage
58. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Empower
Tools to make secure
habits easy
BURNER ACCOUNTS
Kinja introduced these for
anonymous commenting. They
made private keys
understandable through
metaphor.
“…if you lose the burner key
initially issued we will not be
able to retrieve this information
for you or reset the account.
Save your key.”
59. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Because…
EXPLAIN YOUR MAGIC – WHY
DO YOU NEED THE DATA?
When users know of the
existence of a certain algorithm,
their satisfaction with the
product increases over time ,
probably as they start to
understand its workings better.
Yet when they discovered an
algorithm they were previously
unaware of, users felt betrayed.
60. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
WORST CASE SCENARIO
“In the extreme case, it may be that whenever a software developer in Menlo
Park adjusts a parameter, someone somewhere wrongly starts to believe
themselves to be unloved. ”
– Eslami et all.
61. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Because allows people to correct
you when you are wrong
Show people their data selfs
If we are going to allow algorithms and
expert rules to steer our behaviour, we
must know they understand that
correctly. Training is essential!
Allow for:
- Correction
- Reset
62. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
• Yes
• No
• Somewhat
Q 06 Empower
Does your organisation provides tools that allow
your user to be in control of their data?
(beyond emailing privacy @ organisation.com ;))
63. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Value
Exchange(control)
64. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Reflect all data collected in functionality
65. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Accelerometer
Gyroscope
Microphone
Camera
In-App Usage
GPS
Expected
value
User
acceptance
Wi-Fi
Browsing History
The more permissions are required, more added value is expected from the mobile app.
Calendar
SMS
Light
GSR
Privacy as a trading function: quality
66. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Beware
location
Special data which under the
GDPR will require extra safety
measures
avoid when possible
coarse location
67. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
• Yes
• No
• Somewhat
Q 07 Value Exchange
Do you feel your organisation offers fair value for
the consumer data it collects?
68. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“As a species we have had roughly 100,000
years to develop our behavioral norms in the
physical world; but we have had barely 100
years to develop such norms in the digital world.
69. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
We are influencing what is
acceptable.
70. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
“
We are
building the
future.
Let’s do so
responsibly,
together!
Build consumer trust
Stop hiding behind your privacy policy
Ann Wuyts (@vintfalken)
Visual & UX Designer at Collibra
71. Stop
hiding
behind
your privacy
policy:
Building
Consumer
Trust
–ADM
info
session
on
Privacy
&
UX
Credits &
further
reading
materials
Check these out!
On
the
Paradox
of
the
Simple
Privacy
Policy by
Jedidiah
Bracy,
CIPP/E,
CIPP/US
https://iapp.org/news/a/on-‐the-‐paradox-‐of-‐the-‐simple-‐privacy-‐policy/
The
IoT Manifeto
http://iotmanifesto.org/
Consumer
Perceptions
of
Privacy
in
the
Internet
of
Things
(Altimeter)
http://www.altimetergroup.com/pdf/reports/Consumer-Perceptions-Privacy-IoT-Altimeter-Group.pdf
Few
Feel
that
the
Government
or
Advertisers
can
be
Trusted
-‐Pew
Research
Privacy
Panel
Survey,
January
2014
http://www.pewinternet.org/2014/11/12/few-‐feel-‐that-‐the-‐government-‐or-‐advertisers-‐can-‐be-‐trusted/
Views
from
Around
the
Globe
-‐2nd
Annual
Poll
on
How
Personal
Technology
is
Changing
our
Lives,
January
2015,
Microsoft
http://mscorp.blob.core.windows.net/mscorpmedia/2015/01/2015DavosPollFINAL.pdf
Gartner
Says
by
2017
Your
Smartphone
Will
Be
Smarter
Than
You (Gartner)
http://www.gartner.com/newsroom/id/2621915
The Obvious Data Usage Principle
http://www.keek.be/2015/the-obvious-data-usage-principle/
Transparency
about
algorithms
leads
to
increased
product
satisfaction
http://www.keek.be/2015/transparency-about-algorithms-leads-to-increased-product-satisfaction/
A
list
of
41
questions
worth
asking
to
better
understand
the
ethical
implications
of
the
technologies
we
create
and
use:
http://thefrailestthing.com/2014/11/29/do-artifacts-have-ethics/
.. and a little thought
exercise:
Do artefacts have
ethics?