This document summarizes a webinar on trust in digital policy. It discusses the etymology and definitions of trust, examining the difference between trust and trustworthiness. It explores why trust has become a major focus, and frameworks for understanding trust concepts. An applied ethics case study looks at trust issues regarding data. Key questions addressed include how user trust can be restored, and the roles of different stakeholders like governments and companies.
Lee Rainie, Director of Internet, Science, and Technology research at the Pew Research Center, presented this material on December 12, 2016 to a working group at the National Academy of Sciences. The group is exploring how to think about creating an academic discipline around "data science."
Lee Rainie, Director of Internet, Science, and Technology research at the Pew Research Center, presented this material on December 12, 2016 to a working group at the National Academy of Sciences. The group is exploring how to think about creating an academic discipline around "data science."
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
This session from the ARMA Wyoming 2016 Spring Seminar outlined the different security threats social media provides to individuals as well as organizations.
Discover the hard facts and real risks of identity theft from Javelin Strategy & Research. Here we share the 2012 Identity Fraud Report findings that reveal the new fraud frontier of social media and mobile—and why even the most sophisticated technology users are vulnerable. See how individuals and businesses can protect personal information from identity theft while interacting online, and learn more at http://www.LifeLockBusinessSolutions.com.
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
Summary of leadership roles, professional activities and memberships, speeches, and published writings in the areas of cybersecurity, homeland security, emerging technologies, and government affairs
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Compilation of selected articles, interviews, speeches, and media by emerging technology, cybersecurity, and homeland security evangelist, Chuck Brooks
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
This session from the ARMA Wyoming 2016 Spring Seminar outlined the different security threats social media provides to individuals as well as organizations.
Discover the hard facts and real risks of identity theft from Javelin Strategy & Research. Here we share the 2012 Identity Fraud Report findings that reveal the new fraud frontier of social media and mobile—and why even the most sophisticated technology users are vulnerable. See how individuals and businesses can protect personal information from identity theft while interacting online, and learn more at http://www.LifeLockBusinessSolutions.com.
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
Upon completion of this module you will:
- Be able to recognize the necessity of regulating big data
- Understand the difference between privacy and data protection
- Know how to implement actions of data protection into your own (future) company
Duration of the module: approximately 1 – 2 hours
Summary of leadership roles, professional activities and memberships, speeches, and published writings in the areas of cybersecurity, homeland security, emerging technologies, and government affairs
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Compilation of selected articles, interviews, speeches, and media by emerging technology, cybersecurity, and homeland security evangelist, Chuck Brooks
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
Ralph Holz (Technische Universitat Munchen)
Pablo Aragon (Barcelona Media)
Katleen Gabriels (IBBT-SMIT, Vrije Univeriteit Brussel)
Janet Xue (Macquaire University)
Anna Satsiou (Centre for Research and Technology Hellas- Information Technologies Institute)
Sorana Cimpan (Universite De Savoie)
Norbert Blenn (Delft University of Technology)
More information: http://www.internet-science.eu/
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
ROI of Privacy: Building a Case for Investment [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.truste.com/roi-of-privacy-webinar.html
When building a case for privacy investment, privacy pros need to arm themselves with as many ROI metrics of their privacy program as possible. How to get those metrics and how to present them (whether they tie to direct or indirect dollars) is an art form that everyone can work on perfecting.
IAPP and TRUSTe collaborated in the on-demand webinar to discuss the recently published IAPP report, “Getting to the ROI of Privacy”, which offers some persuasive reasons a solid privacy program is worth paying for. Emily Leach, CIPP/US IAPP’s Knowledge Manager were joined by privacy leaders to share their key insights.
To register for upcoming other TRUSTe Webinars (upcoming/on-demand) visit: https://www.truste.com/events/privacy-insight-webinar-schedule/
This is an update of my previous presentation from 2012. I discuss several recent topics including the Witnesses Principle, the rise of Big Metadata, and the need for autonomy and possibly self-awareness for financial instruments designed to hold value for periods greater than a single human lifetime.
Curious about the US National Strategy for Trusted Identities in Cyberspace (NSTIC) and its private sector-lead partner the Identity Ecosystem Steering Group (IDESG)? Look no further. Here is the deck I used to give an update at the Kantara workshop at the Identity Relationship Management Summit.
Dull, Difficult, and Essential: Managing Public RecordsPaul W. Taylor
Keynote to the 2015 Texas eRecords Conference: The unique attribute of public records cannot be overstated: Government is the holder of the singular, authoritative record to which all others refer. As the universe of public records grows in volume, complexity, and variety, policy makers and practitioners are in an unenviable position of managing it all. They are at the nexus of open and big data at a moment when analytics and other technologies hold promise for unlocking both public and private value. The addition of new forms of records - social media, sensors, and both dash and body cams - challenges old practices and assumptions while bringing new urgency to long-standing public policy debates around privacy and security.
What does radical uncertainty mean to communication professionals today? How has it affected stakeholder and consumer expectations? And what are companies doing to meet the challenge?
The price of consumers’ and stakeholders’ support in an age of low trust and high uncertainty is purpose with proof, radical transparency and a seat at the table.
Similar to Webinar The Role of Trust in Digital policy 2016 (20)
Presentation showcases my open data project and an air pollution measurement device Klimerko. Klimerko.org network built by citizens in the SEE. Using #citizenscience and open-source hardware and open-source software as a solution to some environmental challenges and building repairable products sustainable in post covid-19 world.
Intro into origins and concept of multistakeholder approach to Internet governance; @Middle East and Adjoining Countries School on Internet Governance
2014-5-26, Kuwait
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsRosie Wells
Insight: In a landscape where traditional narrative structures are giving way to fragmented and non-linear forms of storytelling, there lies immense potential for creativity and exploration.
'Collapsing Narratives: Exploring Non-Linearity' is a micro report from Rosie Wells.
Rosie Wells is an Arts & Cultural Strategist uniquely positioned at the intersection of grassroots and mainstream storytelling.
Their work is focused on developing meaningful and lasting connections that can drive social change.
Please download this presentation to enjoy the hyperlinks!
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Obesity causes and management and associated medical conditions
Webinar The Role of Trust in Digital policy 2016
1. D E S I R E E M I L O S H E V I C
D I P L O A L U M N I
T U E S D A Y , J U L Y 1 8 T H 2 0 1 6
WEBINAR ON THE ROLE OF TRUST IN
DIGITAL POLICY
CASE STUDY: APPLIED ETHICS IN IG
INSTITUTIONS DEALING WITH
GLOBAL RESOURCES
2. AGENDA
• Trust etymology
• Trust vs trustworthiness
• Why is there so much focus on trust?
• Trust concepts and frameworks
• Applied ethics case study – data
• Role of Trust for Digital Policy?
• Can users’ trust be restored?
• What are stakeholders’ roles?
• Q&A
3. ETYMOLOGY OF WORD TRUST
• Origin
Old Norse –> traustr –> traust –> treysta: strong
-> Trust - Middle English
• C 1200, "reliance on the veracity, integrity, or other
virtues of someone or something; religious faith,"
from Old Norse traust "help, confidence, protection,
support," from Proto-Germanic abstract noun
*traustam (source also of Old Frisian trast, Dutch
troost "comfort, consolation," Old High German trost
"trust, …Gothic trausti "agreement, alliance"
5. TRUST VS TRUSTWORTHINESS
• Research into the roles of trust in our society broad range of
often conflicting theories. Some theorists maintain that trust is a
social virtue that cannot be reduced to strategic self-interest;
trusting another person is ultimately a rational calculation
based on information about that person and his or her
incentives and motivations.
• our trust in persons whom we believe to have strong reasons*
to act in our best interests.
“We are correct when we assume that the main incentive of
those whom we trust is to maintain a relationship with us—
whether it be for reasons of economic benefit or for love and
friendship. “I trust you to be trustworthy – type of trust we place
in individuals or institutions”
6. TRUST VS TRUSTWORTHINESS
• Hardin also makes an important differentiation
between the trust and trustworthiness (Hardin,
2006)explaining that
1. trust is a positive belief that does not need to be
proven
2. whereas trustworthiness is an earned quality,
representing someone reliable, proven and honest
7. WHY IS TRUST THE HOTTEST SUBJECT
IN IG?
• After Snowden revelations, there is a growing anxiety among Internet users
(See: Desiree Miloshevic, Crisis of Trust, Crisis of Accountability 24 june14-
en.pdf)
• Safety and Privacy of citizens is at stake, 45% are changing the way to use the
Internet
• Trust is on top of the mind of all users but also government policy
• “We are at risk of undoing all the progress we have made on the Internet”
Kathy Brown, OECD Ministerial
• https://www.whitehouse.gov/blog/2012/02/24/internet-privacy-protecting-
consumers-building-trust-creating-jobs
• Framework of Trust: trusted networks/ technologies/ users / ecosystem
See: https://www.internetsociety.org/sites/default/files/IG%20and%20Trust%20-
%20BoT%20June%202016%20-%20Final-R.pdf)
8. TRUST IS…
Can trust be measured?
Trust is a subjective matter … Trust is contextual…
Need to separate normative questions of Ethics and Trust
from questions coming from psychology and other
sciences (e.g. individuals don’t recognize it until it’s lost)
We can only study how is trust perceived to get a more
objective insight
What kind of perceived trust is required for digital policies?
9. HOW MUCH TRUST IS THERE?
Trust fell in businesses sector from 59% to 57%
Non- Governmental Organisations (NGOs) from 66% to
63%
Media (from 53% to 51%) between 2014 and 2015
Only trust in governments rose during this time (from 45% to
48%), but they were still perceived as the most
untrustworthy form of organisation in the study.
Source: The Edelman Trust Barometer 2015
10. restoring USERS’ TRUST IN?
• Networks (Infrastructure) Layer I
• Technologies (Protocol and Application Layers: Layer II
and II
• Companies, on-line platforms and devices!
(facebook, gmail, laptops, tablets, mobile phones,
desktops )
• Cloud services, ISPs
• Internet governance Institutions
• National governments
“Trust takes years to build, seconds to break and forever to
repair.”
11. TRUST AND APPLIED ETHICS
ETHICS &
RELATIONSHIPS
NORMATIVE
1. INERNET USERS vs INTERNET USERS
e.g. bullying, online violence
2. INTERNET USERS vs
CORPORATIONS
3. USERS/MEMBERS vs INTERNET
GOVERNANCE INSTITUTIONS
e.g. USERS and DNS policies in
ICANN e.g. MEMBERS OF RIRs
POLITICAL PHILOSOPHY
NORMATIVE
RELATIONSHIP BETWEEN
USERS/CITIZENS AND THE STATE -
Governments
e.g. Snowden revelations
CORPORATIONS AND
GOVERNMENTS
12. IMPORTANT SEPARATION
Ethical and Normative
Level:
How things should
ideally look like with
regards to trust, if we
were completely
rational beings?
Empirical and
Pshychological
How things currently
are with regards to
perception of trust in
real life, since there is
always a lack of
information, unrealistic
beliefs and
expectations, personal
interests, and unequal
power relations
between stakeholders
13. SECURITY AND TRUST – David CLARK
• On July 16, 1992, Prof. David Clark articulated what would become the
creed of the Internet engineering community. He was giving a
presentation A Cloudy Crystal Ball: A Vision into the Future at the IETF. It
was era of turmoil and uncertainty as the privatization of the Internet
(the transformation of the Internet from NSFNET to commercial
networks) was in its infancy.
“We Reject: Kings, Presidents, and Voting.
We Believe in: Running Code and Rough Consensus
Our best success was not computing, but hooking people together!
The hacks of today are the commonplace of tomorrow!
Security is a CRITICAL problem!
What we should do: Fix insecure services: PASSWORDS, etc.
The problem is assigning the correct degree of fear to distant
elephants.
If we have a problem it is due to too much success.”
See http://cybertelecom.blogspot.de/2016/07/1992-july-16-david-clark-
articulates.html
14. WHAT ARE THE ROLES OF STKHDRS?
• There is no one treaty that would fix this or legislation that
would solve issue of trust
• Can’t just focus on technology, we need to take in law
and global politics
• Commercial interests have impact on the IG ecosystem
not necessarily good for the Internet e.g, botnets, ISPs –
slowing traffic
• Commercial aspects are not apparent enough
• Can we imagine a healthy development of our digital
society without solving the post-Snowden challenges it
brings to citizens, technology, community and
governments as well?
15. RIR CASE STUDY
• MOST CRITICAL FOR TRUST:
Members of studied IG organisations perceive the role of the
board and relationship of their organisation with the wider
Internet community as critical for continuing to have trust in
the organisation
MOST DAMAGING FOR TRUST:
• a non-transparent act of an organisation.
• not addressing adequately external regulatory threats
• deviation from policies
CONCLUSIONS:
• Demand for transparency
• Demand for slightly conservative business predictability
• Organisation/institution - True to its core mission.