SlideShare a Scribd company logo
1 of 12
Why not all good technologies
get happily embraced by people
Pille Pruulmann-Vengerfeldt
Professor in Media and Communication
Malmö University
DIGITAL TRANSFORMATION FORUM GOVERNANCE x WATCHDOGS May 3-4, 2018
Case of Secure Multiparty Computation
University-SME cooperation
Sharemind is a
database and analytics
system that works on
encrypted data without
decrypting it.
User
perceived
needs
Capabilities
of a given
technology
Contextual
concerns
Too complex to adopt
Too costly to adopt
Lack of trustworthy partners
Legal obstructions
Security concerns
SMC's contribution to problem-solving unclear
Problem could be solved with other means
SMC does not help to solve the underlying
problem
Necessary information would not be accessed
Unclear business value
• Affordances of a given technology
– What we know or perceive about the
capabilities and limitations of the
technology to be
• New technologies are viewed within
the existing framework of
understandings
– The way we conceptualiase privacy
– The way we are used to doing things /
practices
Capabilities
of a given
technology
SECURE MULTIPARTY
COMPUTATION CAN SUCCEED
WHEN
POTENTIAL BARRIERS
Presence of task-technology fit Technology fits ill for the task
Data must be delicate enough Challenge of the demo
The need for data processing must
be regular enough
Unfeasible for the type of data
Coordination costs
Sufficient amount of resources Lack of resources
The enterprise must be big enough
to afford such data processing
Connectivity problems between various
databases
Need to have enough time and
resources to experiment with the
technology in order to imagine
possible uses in the first place
Not enough information on the process
costs of enterprises
Intelligence data may be difficult to
formalize
• Context sensitivity of any given
technology
• Institutional and social contexts
– Legal frameworks, institutional
regulations, norms, ethics
– Peers, sector based preferences
and practices, ethics
Contextual
concerns
SECURE MULTIPARTY
COMPUTATION CAN SUCCEED
WHEN
POTENTIAL BARRIERS
Minimal need for change: good
organizational fit
Avoidance of uncertainty
Low entry barrier, need for a
standardized application
Lack of willingness to change existing
work routines
Desire to see the initial data
Centralization of databases
Desire to avoid the complexity and
uncertainty involved in the adoption of
new technology
Sufficient usability Uncertainty about adoption costs
Compatibility with existing
data analysis software
Implementation may demand too
much organizational effort
Implementation may be too expensive
Low usability (high learning barrier)
Management support
• Dependent on:
– Understanding of social/situational
context
– Peer/sector pressure
– Norms, values, outlook on life
– Existing social practices
• E.g. Ability to „see“ data when
analysing
User
percieved
needs
SECURE MULTIPARTY COMPUTATION
CAN SUCCEED WHEN
POTENTIAL BARRIERS
Being sufficiently informed Insufficient information/communication
Perceived business case Lack of business case
Presence of other users (possibility of
learning from experience)
"Wait-and-see"
Insufficient knowledge
Working principle is not understood
Fear of data leaks "despite everything"
Insufficient knowledge about the
client's actual needs
Presence of perceived need Functional substitute already exists
Sufficient motivation to consider adoption Conduct/ethics/practices
Decreasing the complexity of work
processes
Trusted third party
Negotiations, organizing
Speeding up work processes
Monetary costs
Workaround guaranteed by law
The perceived costs of inaction do not seem
high enough
Privacy as a trade-off
• Trust in third party solutions
– e.g. PayPal, stock market
• Small society challenges
– Accepted level of loss in privacy
– Overkill of technological applications?
• Perceived benefits of publicness
Can uncertain
conditions be
navigagted?
Strategic niche management –
radical technologies need
protection before being eradicated
by markets
Pille Pruulmann-Vengerfeldt, pille.pruulmann.vengerfeldt@mau.se

More Related Content

Similar to Why not all good technologies get happily embraced by people by Pille Pruulmann-Vengerfe

Knowledge Management in Enterprise 2.0 - Part 4
Knowledge Management in Enterprise 2.0 - Part 4Knowledge Management in Enterprise 2.0 - Part 4
Knowledge Management in Enterprise 2.0 - Part 4
Telekom MMS
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
360 BSI
 
Case Study: BPM Story From Diagnosis To Clinical Treatment
Case Study: BPM Story From Diagnosis To Clinical TreatmentCase Study: BPM Story From Diagnosis To Clinical Treatment
Case Study: BPM Story From Diagnosis To Clinical Treatment
Piotr Jagiello
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
Needa Multani
 

Similar to Why not all good technologies get happily embraced by people by Pille Pruulmann-Vengerfe (20)

Privacy Engineering in the Wild
Privacy Engineering in the WildPrivacy Engineering in the Wild
Privacy Engineering in the Wild
 
Challenges in adapting predictive analytics
Challenges  in  adapting  predictive  analyticsChallenges  in  adapting  predictive  analytics
Challenges in adapting predictive analytics
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
APF2015-slides-general
APF2015-slides-generalAPF2015-slides-general
APF2015-slides-general
 
Knowledge Management in Enterprise 2.0 - Part 4
Knowledge Management in Enterprise 2.0 - Part 4Knowledge Management in Enterprise 2.0 - Part 4
Knowledge Management in Enterprise 2.0 - Part 4
 
Comprehensive Data Governance Program
Comprehensive Data Governance ProgramComprehensive Data Governance Program
Comprehensive Data Governance Program
 
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Case Study: BPM Story From Diagnosis To Clinical Treatment
Case Study: BPM Story From Diagnosis To Clinical TreatmentCase Study: BPM Story From Diagnosis To Clinical Treatment
Case Study: BPM Story From Diagnosis To Clinical Treatment
 
Data mining and privacy preserving in data mining
Data mining and privacy preserving in data miningData mining and privacy preserving in data mining
Data mining and privacy preserving in data mining
 
Ch1
Ch1Ch1
Ch1
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdprSharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
 
Generating actionable consumer insights from analytics
Generating actionable consumer insights from analyticsGenerating actionable consumer insights from analytics
Generating actionable consumer insights from analytics
 
Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity Custodian Interviews - How to Leverage a Valuable Opportunity
Custodian Interviews - How to Leverage a Valuable Opportunity
 
Potential Issues within BCE
Potential Issues within BCEPotential Issues within BCE
Potential Issues within BCE
 

More from DigiComNet

Case Study: Participatory Journalism by Maria-Anna Tanagia
Case Study: Participatory Journalism by Maria-Anna TanagiaCase Study: Participatory Journalism by Maria-Anna Tanagia
Case Study: Participatory Journalism by Maria-Anna Tanagia
DigiComNet
 

More from DigiComNet (20)

Welcoming Remark by Artur Gurau
Welcoming Remark by Artur GurauWelcoming Remark by Artur Gurau
Welcoming Remark by Artur Gurau
 
Using Parody, Memes, and Demotivators to Desacralize Dictatorships by Franciš...
Using Parody, Memes, and Demotivators to Desacralize Dictatorships by Franciš...Using Parody, Memes, and Demotivators to Desacralize Dictatorships by Franciš...
Using Parody, Memes, and Demotivators to Desacralize Dictatorships by Franciš...
 
Comedy, Trolling and the Satire Shield: The True Cost of Comedy on the Inter...
 Comedy, Trolling and the Satire Shield: The True Cost of Comedy on the Inter... Comedy, Trolling and the Satire Shield: The True Cost of Comedy on the Inter...
Comedy, Trolling and the Satire Shield: The True Cost of Comedy on the Inter...
 
Fighting Bad Traditions through Satire by Haris Dedovic
Fighting Bad Traditions through Satire by Haris DedovicFighting Bad Traditions through Satire by Haris Dedovic
Fighting Bad Traditions through Satire by Haris Dedovic
 
Fairytales of Inequality: A Simple Framework for Creating Compelling, Sociall...
Fairytales of Inequality: A Simple Framework for Creating Compelling, Sociall...Fairytales of Inequality: A Simple Framework for Creating Compelling, Sociall...
Fairytales of Inequality: A Simple Framework for Creating Compelling, Sociall...
 
Politics and Humor by Mladen Ivanovich
Politics and Humor by Mladen IvanovichPolitics and Humor by Mladen Ivanovich
Politics and Humor by Mladen Ivanovich
 
Welcoming remark by Veranika Laputska
Welcoming remark by Veranika LaputskaWelcoming remark by Veranika Laputska
Welcoming remark by Veranika Laputska
 
The Fly Bottle: How Humor, Satire, and Social Media can make us Savvier News ...
The Fly Bottle: How Humor, Satire, and Social Media can make us Savvier News ...The Fly Bottle: How Humor, Satire, and Social Media can make us Savvier News ...
The Fly Bottle: How Humor, Satire, and Social Media can make us Savvier News ...
 
Using Games in Education: Building a Team of Developers and Philosophers to B...
Using Games in Education: Building a Team of Developers and Philosophers to B...Using Games in Education: Building a Team of Developers and Philosophers to B...
Using Games in Education: Building a Team of Developers and Philosophers to B...
 
How is Influencer Marketing and Advertainment Changing the World of Marketing...
How is Influencer Marketing and Advertainment Changing the World of Marketing...How is Influencer Marketing and Advertainment Changing the World of Marketing...
How is Influencer Marketing and Advertainment Changing the World of Marketing...
 
Changing the World One Joke at a Time by Omri Marcus
Changing the World One Joke at a Time by Omri MarcusChanging the World One Joke at a Time by Omri Marcus
Changing the World One Joke at a Time by Omri Marcus
 
Digital Communication Network Strategy by Artur gurau
Digital Communication Network Strategy by Artur gurauDigital Communication Network Strategy by Artur gurau
Digital Communication Network Strategy by Artur gurau
 
Creating Investigative Stories with Impact: An Audience Perspective by Julia ...
Creating Investigative Stories with Impact: An Audience Perspective by Julia ...Creating Investigative Stories with Impact: An Audience Perspective by Julia ...
Creating Investigative Stories with Impact: An Audience Perspective by Julia ...
 
Governance vs. e-Governance; Democracy vs. e-Democracy by Iulia Drajneanu
Governance vs. e-Governance; Democracy vs. e-Democracy by Iulia DrajneanuGovernance vs. e-Governance; Democracy vs. e-Democracy by Iulia Drajneanu
Governance vs. e-Governance; Democracy vs. e-Democracy by Iulia Drajneanu
 
For Facts’ Sake by Aaron Sharockman
For Facts’ Sake by Aaron Sharockman For Facts’ Sake by Aaron Sharockman
For Facts’ Sake by Aaron Sharockman
 
Case Study: Participatory Journalism by Maria-Anna Tanagia
Case Study: Participatory Journalism by Maria-Anna TanagiaCase Study: Participatory Journalism by Maria-Anna Tanagia
Case Study: Participatory Journalism by Maria-Anna Tanagia
 
Tag a Problem! Direct Political Communication in Social Networks by Diktor De...
Tag a Problem! Direct Political Communication in Social Networks by Diktor De...Tag a Problem! Direct Political Communication in Social Networks by Diktor De...
Tag a Problem! Direct Political Communication in Social Networks by Diktor De...
 
Newsrooms are Shrinking. Here’s how they’re Finding New Ways to Hold the Gove...
Newsrooms are Shrinking. Here’s how they’re Finding New Ways to Hold the Gove...Newsrooms are Shrinking. Here’s how they’re Finding New Ways to Hold the Gove...
Newsrooms are Shrinking. Here’s how they’re Finding New Ways to Hold the Gove...
 
Technology Innovations that can Change Journalism as Watchdogs by Djordje Pad...
Technology Innovations that can Change Journalism as Watchdogs by Djordje Pad...Technology Innovations that can Change Journalism as Watchdogs by Djordje Pad...
Technology Innovations that can Change Journalism as Watchdogs by Djordje Pad...
 
How Engaged Journalism is the Key to Open Society by Adam Thomas
How Engaged Journalism is the Key to Open Society by Adam Thomas    How Engaged Journalism is the Key to Open Society by Adam Thomas
How Engaged Journalism is the Key to Open Society by Adam Thomas
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Why not all good technologies get happily embraced by people by Pille Pruulmann-Vengerfe

  • 1. Why not all good technologies get happily embraced by people Pille Pruulmann-Vengerfeldt Professor in Media and Communication Malmö University DIGITAL TRANSFORMATION FORUM GOVERNANCE x WATCHDOGS May 3-4, 2018
  • 2. Case of Secure Multiparty Computation
  • 3. University-SME cooperation Sharemind is a database and analytics system that works on encrypted data without decrypting it.
  • 4. User perceived needs Capabilities of a given technology Contextual concerns Too complex to adopt Too costly to adopt Lack of trustworthy partners Legal obstructions Security concerns SMC's contribution to problem-solving unclear Problem could be solved with other means SMC does not help to solve the underlying problem Necessary information would not be accessed Unclear business value
  • 5. • Affordances of a given technology – What we know or perceive about the capabilities and limitations of the technology to be • New technologies are viewed within the existing framework of understandings – The way we conceptualiase privacy – The way we are used to doing things / practices Capabilities of a given technology
  • 6. SECURE MULTIPARTY COMPUTATION CAN SUCCEED WHEN POTENTIAL BARRIERS Presence of task-technology fit Technology fits ill for the task Data must be delicate enough Challenge of the demo The need for data processing must be regular enough Unfeasible for the type of data Coordination costs Sufficient amount of resources Lack of resources The enterprise must be big enough to afford such data processing Connectivity problems between various databases Need to have enough time and resources to experiment with the technology in order to imagine possible uses in the first place Not enough information on the process costs of enterprises Intelligence data may be difficult to formalize
  • 7. • Context sensitivity of any given technology • Institutional and social contexts – Legal frameworks, institutional regulations, norms, ethics – Peers, sector based preferences and practices, ethics Contextual concerns
  • 8. SECURE MULTIPARTY COMPUTATION CAN SUCCEED WHEN POTENTIAL BARRIERS Minimal need for change: good organizational fit Avoidance of uncertainty Low entry barrier, need for a standardized application Lack of willingness to change existing work routines Desire to see the initial data Centralization of databases Desire to avoid the complexity and uncertainty involved in the adoption of new technology Sufficient usability Uncertainty about adoption costs Compatibility with existing data analysis software Implementation may demand too much organizational effort Implementation may be too expensive Low usability (high learning barrier) Management support
  • 9. • Dependent on: – Understanding of social/situational context – Peer/sector pressure – Norms, values, outlook on life – Existing social practices • E.g. Ability to „see“ data when analysing User percieved needs
  • 10. SECURE MULTIPARTY COMPUTATION CAN SUCCEED WHEN POTENTIAL BARRIERS Being sufficiently informed Insufficient information/communication Perceived business case Lack of business case Presence of other users (possibility of learning from experience) "Wait-and-see" Insufficient knowledge Working principle is not understood Fear of data leaks "despite everything" Insufficient knowledge about the client's actual needs Presence of perceived need Functional substitute already exists Sufficient motivation to consider adoption Conduct/ethics/practices Decreasing the complexity of work processes Trusted third party Negotiations, organizing Speeding up work processes Monetary costs Workaround guaranteed by law The perceived costs of inaction do not seem high enough
  • 11. Privacy as a trade-off • Trust in third party solutions – e.g. PayPal, stock market • Small society challenges – Accepted level of loss in privacy – Overkill of technological applications? • Perceived benefits of publicness
  • 12. Can uncertain conditions be navigagted? Strategic niche management – radical technologies need protection before being eradicated by markets Pille Pruulmann-Vengerfeldt, pille.pruulmann.vengerfeldt@mau.se