University Of Technology Sydney @Information Innovation series - - PowerPoint PPT Presentation

university of technology sydney
SMART_READER_LITE
LIVE PREVIEW

University Of Technology Sydney @Information Innovation series - - PowerPoint PPT Presentation

Consumer Privacy Literacy In Digital Technologies Zablon Pingo PhD. Candidate University Of Technology Sydney @Information Innovation series Privacy instincts My father died while I was 7 years-old While in school I avoided disclosing


slide-1
SLIDE 1

Consumer Privacy Literacy In Digital Technologies

Zablon Pingo

  • PhD. Candidate

University Of Technology Sydney @Information Innovation series

slide-2
SLIDE 2

Privacy instincts

  • My father died while I was 7 years-old
  • While in school I avoided disclosing this to other kids!!
  • Why?
  • Wanted to be like other kids not viewed as less fortunate
  • I was worried about the vulnerability from bullies knowing

my status

  • But I was comfortable to disclose to teachers (Managing

information boundaries between students and teachers)

slide-3
SLIDE 3

Privacy

Privacy is an individual(group, or institutions) right to determine when, how and to what extent information about themselves is shared with others (Westin, 1967) Privacy can be defined as a dynamic process of social boundary management by which individuals grant or deny access to other individuals or one’s group (Westin, 1967)

slide-4
SLIDE 4

Data Collection and Context collapse

(Christl, 2017)

slide-5
SLIDE 5

Privacy risks Online

  • Price discrimination
  • Manipulation
  • Financial Loss
  • Identity theft
  • Loss of Jobs/employability …....
slide-6
SLIDE 6

Privacy protection approaches

Information Systems (technical and security Perspective) Legal/Regulato ry Perspective Consumer Awareness Perspective?

slide-7
SLIDE 7

Why consumers privacy awareness is important?

  • The privacy discussion has shifted from

structuralistic to individualistic due to increased technological innovations and commercial interests(Fornaciari, 2014)

  • Increasingly privacy is a socially and

economically negotiated construct which calls for consumers to make value judgment and cost-benefit analysis in the trade-off

slide-8
SLIDE 8

Why Privacy Awareness is Important

  • The blurriness of online and offline activities
  • Reputation and Identity management
  • Preventing Harm
  • Limited control of personal Information about

individuals online

slide-9
SLIDE 9
  • Digital technologies make personal information public by default;

private by effort (boyd, 2011).

  • Privacy Paradox- Discrepancy between people’s privacy concerns and

actual behaviour (Barnes, 2006;Taddicken & Jers, 2011).

  • Users want privacy but they seldom know “how to specify” and “what

to seek” for their own privacy’ (Shapiro, 2010)

  • Technological solutions are not effective in protection of privacy

(Sweeney, 2013).

  • Self-regulation through privacy policies not open or transparent

(Clarke, 2010).

Why privacy literacy?

slide-10
SLIDE 10

Dimension to Consumers Privacy literacy/Awareness

(1) Knowledge about practices of organizations, institutions and

  • nline service providers;

(2) Knowledge about laws and legal aspects of online data protection (4) Knowledge about users strategies for online privacy management (3) Knowledge about technical aspects of online privacy (Trepte et al., 2015)

slide-11
SLIDE 11

Contextual Integrity

“Information flow Norms”

  • Company Vs. Individual = Confidentiality
  • Individual Vs. Individual = Reciprocity

Sensitive and Non-sensitive?

Collapse of Contextual integrity in Technologies

(Nissenbaum,2004)

slide-12
SLIDE 12

Research question

  • How do users of digital technologies protect

personal Data and manage their privacy? And for what reasons?

  • What strategies do individuals deploy to

protect information privacy?

slide-13
SLIDE 13

Research method

Qualitative Approach – Face-to-face semi-structured interviews with users

  • f Fitness and Loyalty cards.

– Twenty three (N=23) participants – Sydney, Australia based participants – Participants’ education levels- undergraduate students and above – Recruited through Listserves, University Facebook group, word of mouth, leaflets, Bulletins

– Online walkthroughs (Google name search and reflection) – Privacy settings and reflections

slide-14
SLIDE 14

Participants Digital Technologies Use

Social Media Loyalty cards Fitness Trackers LinkedIn Reward Cards Apple Watch Twitter Flybys Garmin Facebook Myers TomTom Instagram Velocity card Fitbit YouTube Frequent flyer Xiaomi Flickr Pinterest

slide-15
SLIDE 15

Findings

slide-16
SLIDE 16
  • 1. A negotiating attitude towards data sharing
  • “It dependents attitude” in readiness to share fitness and

Loyalty cards data in exchange for benefits/instant gratification

“I am open to doing that, because it reduces cost, for minimal effort on my part. Reduced privacy for at least some money.”

  • Users of activity trackers regard privacy as a psychologically distant

phenomena without any real-life impacts

slide-17
SLIDE 17
  • 2. Personal Data “Literacies”

Appropriateness of information

Mental calculus

“On Facebook I'm quite careful so no address no phone numbers, year of birth, gender,

  • location. My current status is like I'm studying I’m married. So I would share that. So some

very basic demographics but nothing that can link me to where I live unless they can still find it somehow.”

Personal Data Minimisation Efforts

  • Provision of only compulsory information

“I just provide my name email address and any other compulsory data that would have been indicated as Required.” (Kelly)

slide-18
SLIDE 18

18

  • 3. Information Avoidance, Privacy Policies and Privacy

Management

  • Privacy policies complexity
  • Lack of choices- Opt-in Vs. opt-out options

“If you actually want to use technological devices or applications then 90% of the cases you have to agree with the privacy condition as presented or you cannot use in the application. If you want the app, you have to agree it’s not an option.” (Marcello)

  • Vulnerability through Information Avoidance as a coping mechanism

“I am lazy with privacy policies, because it’s too long and I think that makes me very

loose with my privacy.”

slide-19
SLIDE 19
  • 4. Privacy Boundary management
  • Interpersonal boundary management
  • Reputation management
  • Institutional boundary management
slide-20
SLIDE 20
  • Context collapse navigation using Pseudonym accounts as a means

to creating a personal “space”

“I would share a lot of things, I don't really want to be that public because Twitter is a very public medium. When I'm frustrated with work or something else I don't want people to link me to that person who works

  • r when I'm frustrated with life or because I'm a Christian. Sometimes I'll post Christian stuff. I don't want

people necessarily at work to think that's how I think about life” (Julie)

  • Monitoring online digital footprint and reputation management

“I do want that when people Google me I do want them to see my LinkedIn profile, that’s really the only thing I try to publish as much as possible. I do want people to see my YouTube video because it's about my research; staff profiles, that’s fine. My Facebook doesn't come up and I think and that's the way I want it” (Elaine)

a)Personal Boundary management

slide-21
SLIDE 21
  • Interpersonal boundary management in social media

Facebook for social and quasi-professional LinkedIn for professional purposes Twitter for personal and quasi-professional purposes, Instagram for personal hobbies and self-promotion.

“I really don't get a lot out there in my Facebook timeline, Twitter is sort of quasi professional, I think my main motivation in maintaining that profile to appear visible; look like a somewhat active member of the field. LinkedIn is purely a sort of networking for work purposes and on Snapchat I will snap regularly with friends and Instagram is kind of much about myself - sort of a record of my photos.” (Joe)

slide-22
SLIDE 22

b)Institutional boundary management

  • Managing personal data collection

“…….I think once or twice I did sign in with Facebook because of the convenience. But now I usually get them to e-mail me a link to reset my password and then I reset everywhere else. So even though they say would you like to sign in through Facebook, I usually say no. I don't know I just prefer to have that account with just that. And Facebook with just Facebook some things I don't see the relevance of signing up because I don't want Facebook to know what I'm buying. They might soon know for some reasons but I don't want to be the one creating the direct link” (Kelly)

slide-23
SLIDE 23

5.Control over personal data

  • Lack of control of personal Data

“Having control over what gets pushed out I suppose is really up to one to actively manage your privacy. That's what I feel like whether or not people choose to do that's a different story. And that would then I guess involve looking at the privacy statements if they just made the font bigger and the terminology clearer. I would be happy, [but] because they don't really want to tell you the truth and they want to find a way to always fake. I know I'm sounding like a conspiracy theorist but companies just want to find a way to exploit you.”

(AOIC, 2016)

slide-24
SLIDE 24
  • Use of Privacy settings
  • Understanding of openness of the

platform- (Public by default and private by effort)

  • Tagging
  • Blocking

6.Technical Skills in use of Technologies

slide-25
SLIDE 25
  • Most people regard privacy as a psychological distance

something that happen on virtual world not in real-life

  • Constraints in Privacy policies (Information Overload and

lack of choices)

  • Complexities of navigating context collapse in Information

Technologies

  • 7. Challenges to online privacy management
slide-26
SLIDE 26

Privacy Awareness

Knowledge of personal data Risk Understanding Information exposure Knowledge on Collection of Information Responsibilities to protect privacy

Implications of Privacy Literacy/Awareness

slide-27
SLIDE 27

Privacy Awareness

  • Personal Data = Real people
  • Transparency & Accountability
  • Enhance individuals knowledge to privacy

management and rights

slide-28
SLIDE 28

Conclusion

  • Privacy management is technology dependent
  • Consumers/user actively manage privacy in

social networks compared to others technologies like fitness trackers and loyalty systems Obar (2015) raises concerns over consumers “intellectual detachment to engage in protecting their privacy”.

slide-29
SLIDE 29

References

  • Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9). doi: http://dx.doi.org/10.5210/fm.v11i9.1394
  • Christl, W., Kopp, K., & Riechert, P. U. (2017a). Corporate surveillance in everydaylife Retrieved from http://crackedlabs.org/en/corporate-surveillance
  • Fornaciari, F. (2014a). Pricey privacy: Framing the economy of information in the digital age. First Monday, 19(12).
  • Shapiro, S. (2010). Privacy by design: moving from art to practice. Communications of the ACM, 53(6), 27-29. doi:10.1145/1743546.1743559
  • Taddicken, M., & Jers, C. (2011). The uses of privacy online: trading a loss of privacy for social web gratifications? Privacy online (pp. 143-156): Springer.
  • Trepte S. et al. (2015) Do People Know About Privacy and Data Protection Strategies? Towards the “Online Privacy Literacy Scale” (OPLIS). In: Gutwirth S., Leenes R.,

de Hert P. (eds) Reforming European Data Protection Law. Law, Governance and Technology Series, vol 20. Springer, Dordrecht

  • Westin, A. F. (1967). Privacy and freedom. New York: Athenaeum.