2015 National BDPA Technology Conference Big Data: Cool, Creepy or Privacy Violation? Arlonda Stevens August 18-22, 2015 Washington, DC.

Slides:



Advertisements
Similar presentations
Office of the Information and Privacy Commissioner, Ontario, Canada
Advertisements

EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
3.04 Understand the use of direct marketing to attract attention and to build a brand.
Creating the Ultimate Online Customer-Service Experience Stefan Beeli, Vice President ESP Computer Services Choosing the proper level of Technology A look.
 Organizations need to interact with their publics  The interaction between organization- publics is a mediated process.
1 Copyright © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
CHAPTER 4 E-ENVIRONMENT
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009.
Securing North America’s Power Grid Dr. Ann Cavoukian, Ontario information and privacy commissioner Mark Fabro CISSP, CISM, President and Chief Security.
The popularity of the social networks. The most popular social networks.
How is the IT-Driven Concept of “Permission Marketing” Changing the Way Companies Establish Customer Relationships Using “Old” Media as well as New? By.
An Analysis of The Mobile Market and Location-Based Services What About Wireless…?
MKTG 420 Professor Frank Pons Spring 2005 CONSUMER BEHAVIOR.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Consumer motivation CHAPTER 8. Consumer motivation Represents the drive to satisfy both physiological and psychological needs through product purchase.
Consumer Motivation. Represents the drive to satisfy both physiological and psychological needs through product purchase and consumption Gives insights.
Privacy by Design
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
8 | 2Copyright © Houghton Mifflin Company. All rights reserved. Part Four Using Technology And Information To Build Customer Relationships.
Competition-Enhancing Enforcement in Privacy: A Remedy for the Anti-Privacy Market Chris Jay Hoofnagle Director, Information Privacy Programs UC Berkeley.
Consumer Behavior, Market Research
Customer Loyalty and Customer Retention. 2 Outline Definition of Customer Loyalty What Affects Customer Loyalty Relationship programs Customer life cycle.
Privacy, Security, and trust in cloud computing BY: SIANI PEARSON PRESENTED BY: KIA MANOOCHEHRI.
C HAPTER 4 MANAGING MARKETING INFORMATION CRS Questions & Answers.
Direct and Online Marketing: The New Marketing Model
Internet Advertising © 2001 Ann Schlosser, University of Washington Business School.
Privacy: Do We Need It? Mike Gurski Senior Policy & Technology Advisor Information & Privacy Commission, Ontario Canada JetNet September 25, 2001 Ottawa.
Annual Workshop February 5th, A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]
Chapter no : 4 How Advertising work
The Marketing Research Process and Proposals
Communicating with Key Stakeholders Corporate Communication Chapter 8 (2) Dr. Inas A.Hamid.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
10-1 Chapter 10 Direct Marketing.
© 2005 Pearson Education Canada Inc.1-1 Chapter 1 Integrated Marketing Communications: An Overview.
Human-Computer Interaction Overview ● Benefits of more usable Websites ● History of HCI ● Goals of HCI ● User-Centered Methodology.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Marketing Research Approaches. Research Approaches Observational Research Ethnographic Research Survey Research Experimental Research.
The Internet of Things and Consumer Protection
Privacy and Free Speech: It's Good for Business Nicole A. Ozer, Esq. Technology and Civil Liberties Policy Director ACLU of Northern California Online.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Consumer Motivation.
Strategic Research. Holiday Inn Express Stays Smart What research results led to an upgrade of all Holiday Inn Express bathrooms? How did their agency,
Fred Carter Senior Policy & Technology Advisor Information and Privacy Commissioner Ontario, Canada MISA Ontario Cloud Computing Transformation Workshop.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts.
Big Data Definition VolumeVelocity Varity ComplicityVariability.
Behavioral Advertising Privacy, Consumer Attitudes and Best Practices Carolyn Hodge, VP of Communications, TRUSTe David W. Stark CIPP, VP & North America.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Towards an IoT Good Practice Workshop organized by the DC IoT on 12 November 2015, 09:00 – 10:30, Joao Pessoa.
TRANSACTIONAL DATA. TRANSACTION DATA THE COLLECTED INFORMATION ABOUT THE SELL AND PURCHASE TRANSACTION IS THE ACTIVITIES THAT OCCUR EVERY TIME YOU BUY.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
Journal Entry 4 If you were developing a new candy bar, what type of things would you want to know before marketing it?
18. Sustainable Marketing in the Global Marketplace.
Privacy and Public Policy Implications of IoT
Security Standard: “reasonable security”
Payment Instruments, Financial Privacy and Online Purchases
Internet of (Every)Things
Chapter # 1 Overview of Ethics
Marketing Management Dr. Aravind Banakar –
Marketing Management
Swedbank’s view on GDPR: challenges and opportunities
Spyware. By: Katheryn L. Gaston.
Google Privacy Policy Karen Tao.
A New Technology for Video Surveillance Cameron Serles
Direct and Online Marketing: The New Marketing Model
802E Privacy Report Date: Authors: January 2016
Presentation transcript:

2015 National BDPA Technology Conference Big Data: Cool, Creepy or Privacy Violation? Arlonda Stevens August 18-22, 2015 Washington, DC

Presentation Objectives You will… 1.Be able to define “creepy” 2.Understand key factors that lead to perceived creepiness 3.Gain a broader awareness as to why you need to protect consumer data from misuse and abuse 4.Learn new ways to minimize perceived creepiness 2015 National BDPA Annual Technology Conference 2

Agenda  Cool or Creepy?  What Is Creepy?  Problem of Practice  Motivation for Study  Research, Findings & Creepy Quadrant  Impact of Creepiness on the Firm  Minimize Creepy  Trust  Transparency  Control  Conclusion  Discussion  Questions and Answers 2015 National BDPA Annual Technology Conference 3

Dilbert on Data 2015 National BDPA Annual Technology Conference 4

Cool, Creepy or Privacy Violation? What is your reaction? You are a member of the Loyalty and Rewards program at your local grocery store. In order to reap the savings benefits your card is swiped at the beginning of your purchase. At the end of your purchase, along with your receipt, you receive coupons for products that you frequently purchase National BDPA Annual Technology Conference 5

Cool, Creepy or Privacy Violation? *Ur, B., Leon, P. G., Cranor, L. F., Shay, R., & Wang, Y. (2012, July). Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security (p. 4). ACM National BDPA Annual Technology Conference 6

Cool, Creepy or Privacy Violation? PORSCHE MAKES DIRECT MAIL PERSONAL... AND A LITTLE BIT CREEPY 2015 National BDPA Annual Technology Conference 7

What Is Creepy?  Eerie feeling  Scary  Big Brother Watching  Invasion of Privacy  Unexpected Use of Information  Know too much NO UNIFIED DEFINITION, BUT A COMMON 2015 National BDPA Annual Technology Conference 8 Feeling

Problem of Practic e THEY SAY WE SAY  Marketers  Data Brokers  Data Aggregators  Online Advertisers  Government  Internet Users  Consumers  Privacy Advocates Problem: Increasing consumer concern over the collection, use and sharing of personal information and the analytics resulting in inferred profiles and behavior 9

Motivation For Stud y  Term frequently used to describe marketing messages  Growing consumer concern over collection and use of data  91% of consumers concerned about data collection and use practices (Pew Research Report, 2014)  Collision of Marketing & Privacy  Personalized Communication – based on Big Data Analytics  Right Message, Right Person, Right Time  Big data benefits at the expense of consumer privacy 2015 National BDPA Annual Technology Conference What is really behind the word “creepy” – what do we really mean? 10

Phase I - Research Overview Phase I: Qualitative - What is Creepy? Towards Understanding That Eerie Feeling When It Seems the Internet "Knows" You Two Questions 1.What is Creepy? 2.What key factors make a personalized communication or ad creepy? 2015 National BDPA Annual Technology Conference 11

Phase II - Research Overview Phase II: Quantitative -Demystifying Creepy Marketing Communications Two More Questions 1.To what extent does online information privacy concerns, perceived surveillance, perceived anonymity and transparency affect an unsolicited personalized marketing communication to be perceived as “creepy” 2.To what extent does consumer-firm trust mediate these factors on perceived creepiness? 2015 National BDPA Annual Technology Conference 12

Defining Creepy Creepy is… An emotional reaction to an experience, interaction or unsolicited communication where personal information has been unknowingly collected and used invoking feelings of apprehensiveness and unsettlement National BDPA Annual Technology Conference 13

Creepy is about emotional reaction 2015 National BDPA Annual Technology Conference 14

8 Key Findings 1.Creepy Is Widespread 2.Creepy and Privacy Intrusive are related, BUT Different 3.“THEY” are in Control 4.Lack of Control led to safeguarding information even when nothing to hide 2015 National BDPA Annual Technology Conference 15

8 Key Findings 5.Experience Of Creepy Does Not Diminish Internet Usage 6.Transparency has a negative effect on the perceived creepiness 7.Control has a negative effect on perceived creepiness 8.Online privacy concerns has a positive effect on perceived creepiness 2015 National BDPA Annual Technology Conference 16

What Creepy Is Not 2015 National BDPA Annual Technology Conference 17 Creepy doesn’t necessarily mean a privacy intrusion

2015 National BDPA Annual Technology Conference Transparency ~ Control ~ Trust 18

So what! & Why Does This Matter?  Awareness of consumer concerns expectations  Marketers & Technologists, Data handlers understand interplay of transparency, trust and control  Companies change behaviors  Avoid harm  Protect brand and reputation  Avoid government sanctions  Trust/Distrust – Consumer Firm Know creepy to avoid creepy! 2015 National BDPA Annual Technology Conference 19

What Can You Do? Transparency ~ Control ~ Trust  Privacy By Design  Protect and Safeguard Customer Information from nefarious uses  Voice of Reason – just because we can, should we?  Be Transparent ~ Disclosure  Consumer Control ~ Opt Out 2015 National BDPA Annual Technology Conference 20

You Can… Implement Privacy By Design (PbD)  Concept developed by the former Information and Privacy Commissioner of Ontario, Dr. Ann Cavoukian in the 90’s,  Imbed privacy throughout the design process 2015 National BDPA Annual Technology Conference 21

Privacy By Design (PbD) Founded on 7 Key Principles 1.Proactive not Reactive; Preventative not Remedial 2.Privacy as the Default Setting 3.Privacy Embedded into Design 4.Full Functionality – Positive-Sum, not Zero-Sum 5.End-to-End Security – Full Lifecycle Protection 6.Visibility and Transparency – Keep it Open 7.Respect for User Privacy – Keep it User-Centric 2015 National BDPA Annual Technology Conference 22

You Can… Protect and Safeguard Customer Information from nefarious uses  Technology  Processes  Educate Data Handlers 2015 National BDPA Annual Technology Conference 23

You Can… Voice of Reason – just because we can, should we?  Able to inform colleagues about uses and misuses of data  Consumer perspective 2015 National BDPA Annual Technology Conference 24

You Can… Be Transparent  Disclosure to consumers on data collection, use and sharing practices  Cookies used or other tracking tactics and devices  Privacy Notice 2015 National BDPA Annual Technology Conference 25

You Can… Provide Consumers with Control  Allow consumers to Opt Out  Allow consumers to obtain information that you have about them  Allow consumers to correct inaccurate information 2015 National BDPA Annual Technology Conference 26

Big Data 2015 National BDPA Annual Technology Conference 27 Cool, Creepy or Privacy Violation?

Conclusion  Comments & Discussion  Questions & Answers 2015 National BDPA Annual Technology Conference 28

Contact Information Arlonda Stevens, Privacy Advisor PNC Bank PhD. Candidate, 2016 Weatherhead School of Management Case Western Reserve University, Cleveland, Ohio National BDPA Annual Technology Conference 29