Top Banner
SOCIAL MEDIA PRIVACY AND SECURITY EXP-50-CS CLASS #5, 2/19/14 TUFTS UNIVERSITY JESSE LITTLEWOOD ABOUT.ME/JESSE.LITTLEWOOD @J_LITTLEWOOD
28

Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

Aug 20, 2015

Download

Social Media

jlittlew
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

S O C I A L M E D I A P R I VA C Y A N D S E C U R I T Y

E X P - 5 0 - C S C L A S S # 5 , 2 / 1 9 / 1 4

T U F T S U N I V E R S I T Y J E S S E L I T T L E W O O D A B O U T. M E / J E S S E . L I T T L E W O O D @ J _ L I T T L E W O O D

Page 2: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

A G E N D A

• Twitter

• Lightning Talks

• Recap previous week: Media Theory; Economics

• Reflections from assignment

• Social Media Privacy

• Next week

Page 3: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

L I G H T N I N G TA L K S

• A brief, seven minute presentation on a specific example of social media that describes it, analyzes it, and critiques it.

• Live demo, slides or still images (4-5 recommended)

• Based on the topic we are discussing that week

• Starts next week:

Page 4: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

L O R I K E N D A L L : C O M M U N I T Y A N D T H E I N T E R N E T

Wikipedia 1. Group Of People 2. Who Interact Via Communication Media

Contance Porter 1. Purpose 2. Place 3. Platform 4. Interaction Structure 5. Profit Model

Mynatt Et All 1. Persistence 2. Periodicity 3. Boundaries 4. Engagement 5. Authoring

Feenberg And Bakardjieva 1. Identification With Symbols/Ritual Practices 2. Acceptance Of Common Rules 3. Mutual Aid 4. Mutual Respect 5. Authentic Communication

R E C A P F R O M L A S T W E E K• “Community” is used ad nauseum in marketing speak

• Actual community, or “networked individualism?”

• No clear definition

• Does Facebook have community?

• Does Reddit have community?

Page 5: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

M C L U H A N : C U B I S T PA I N T I N G S

Photo Credit: http://www.flickr.com/photos/duchamp/28643060/

R E C A P F R O M L A S T W E E K• Example: Cubist paintings. (Nude Descending a Staircase, No. 2 by Macel Duchamp)

• Painting vs. a melody — “what is it about?”

• Representation was the content

• Cubism dispenses with representation via perspective

• Cubism is “about” the medium, more or less.

Page 6: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

D O N A L D N O R M A N — A F F O R D A N C E S

R E C A P F R O M L A S T W E E K• “Affordance” — what is/isn’t possiblewith the state of the world

• Norman applied the termto a perceived dimension

• A plate or button affords pushing

• A bar or handle affords pulling

• What are some examples of digital affordances?

Page 7: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

S O C I A L M E D I A P R I VA C Y A N D S E C U R I T Y

• Its all about the data.

• What makes digital information different from other information?

• 1) Permance to digital data

• 2) Context is changeable —

• 3) Portable

• 4) No social cues

• 5) Altered

• 6) Don’t know who is accessing our data

• 7) Open to access by more people; faster; distributed

• 8) More deliberate; edited; planned

• 9) Can be hidden from you; yet still associated with you

• 10) Someone is probably making money — you have to spend money on digital systems — so someone needs to recoup it.

Page 8: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

B O R N D I G I TA L : PA L F R E Y A N D G A S S E R

• Digital Natives & Digital Immigrants

• Digital identity

• Problems

• Solutions

• Digital dossier

• Problems

• Solutions

Page 9: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

T W O S U R V E Y S O F I N T E R N E T U S E R S

• boyd and Hargittai

• Youth apparently do care about privacy, and often change their settings

• Typically more worried about other people seeing you than institutions

• More familiar you are with technology, more likely you are to engage in privacy settings

• Pew Research Center

• 28% try to hide from ads

• 36% use a fake name or nickname

• 33% are against internet anonymity

• Young people do more to hide

• … young people have more online

Page 10: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

A L AW F I R M TA K E S O N S O C I A L M E D I A P O L I C I E S

• Written by a law firm, so different perspective than academics.

• Facebook is a scapegoat.

• Low comprehension of policies in general — poorly written, repetitious. Intentionally hard to decipher?

Page 11: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

H O W D I D W E G E T H E R E ? — D I G I TA L I D E N T I T Y

• Mark Zuckerberg says: social norms have changed.

• http://readwrite.com/2010/01/09/facebooks_zuckerberg_says_the_age_of_privacy_is_ov#awesm=~owlxg0fOdK7hlC (2:29)

Page 12: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

Z U C K E R B E R G I N 2 0 1 0 O N P R I VA C Y

• "When I got started in my dorm room at Harvard, the question a lot of people asked was 'why would I want to put any information on the Internet at all? Why would I want to have a website?'

• "And then in the last 5 or 6 years, blogging has taken off in a huge way and all these different services that have people sharing all this information. People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people. That social norm is just something that has evolved over time.

• "We view it as our role in the system to constantly be innovating and be updating what our system is to reflect what the current social norms are.

• "A lot of companies would be trapped by the conventions and their legacies of what they've built, doing a privacy change - doing a privacy change for 350 million users is not the kind of thing that a lot of companies would do. But we viewed that as a really important thing, to always keep a beginner's mind and what would we do if we were starting the company now and we decided that these would be the social norms now and we just went for it."

Page 13: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

T H E M E S S A G E FA C E B O O K U S E R S S AW I N D E C E M B E R 2 0 0 9 .

source: http://firstmonday.org/ojs/

index.php/fm/article/viewArticle/3086/2589

Page 14: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

T E R M S O F S E R V I C E A N D P R I VA C Y P O L I C I E S

• Can and do change

• http://mattmckeon.com/facebook-privacy/

Page 15: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

SOURCE: techcrunch.com/2012/08/25/5-design-tricks-facebook-uses-to-affect-your-privacy-decisions/

Page 16: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

SOURCE: techcrunch.com/2012/08/25/5-design-tricks-facebook-uses-to-affect-your-privacy-decisions/

Page 17: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

SOURCE: techcrunch.com/2012/08/25/5-design-tricks-facebook-uses-to-affect-your-privacy-decisions/

Page 18: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5
Page 19: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

H O W D I D W E G E T H E R E ? — D I G I TA L D O S S I E R

• Click tracking

• Metadata

• Facial recognition

• Geolocation data

• Digital is very trackable!

Page 20: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

W H AT S T H E W O R S T T H AT C A N H A P P E N ?

• MORIS Iris and Facial recognition:

• https://www.youtube.com/watch?v=jk-NL71IwjY#t=215

!

• Why Privacy Matters:

• http://www.ted.com/talks/alessandro_acquisti_why_privacy_matters.html

Page 21: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

S Y S T E M S A N D P O T E N T I A L S O L U T I O N S

Page 22: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

O N E S O L U T I O N — FA R O F F — I S A “ V R M ”

• Doc Searls on vendor relationship management:

• https://www.youtube.com/watch?v=gXgyFk3A2to

Page 23: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

K N O W L E D G E I S P O W E R

• Track (and visualize!) the trackers

• https://addons.mozilla.org/en-US/firefox/addon/lightbeam/

• Google Ad Settings — who does Google think you are? (and opt-out if you want to)

• https://www.google.com/settings/u/0/ads

• Terms of Service; Didn’t Read

• http://tosdr.org/

Page 24: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

A D B L O C K I N G

• https://adblockplus.org

Page 25: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

S M A L L G R O U P E X E R C I S E

• You are an on-campus group “Jumbos for Digital Privacy.”

• Your charter is to educate and mobilize your peers to understand and take control over their digital footprint (their identity and dossier).

• You are going to use social media marketing for outreach.

• Develop a draft social media marketing plan from now till the end of the semester. Be realistic with time!

• Audience: students (any particular segments? How does the research/surveys help us here? Most at risk?)

• Core Messages/Narratives: ______

• Messengers: ______

• Channels: ______

• Tactics/Content (5 most effective things to do, and why): ______

Page 26: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

E X E R C I S E R E S U LT S

• Group 1:

• Audience — student influencers — juniors & seniors.

• Messages/narrative - Digital ID is part of your future; easy for future employers to find info about you. Be careful and aware.

• Messenger — authority — CDO, student influencer on Facebook (ppl get lots of likes)

• Channels — Facebook — testimonials from employers (not a myth!)

• Tactics — Testimonials from employers; live demo of an employer how they search info on you.

!

!

• Group 2: expose people/selves — read a Tufts Daily article: this is what I found out about you while you were reading this article.

• Narrative: look at how easy it is to find out about you. Do you want life to be that easily accessible?

!

• Group 3:

• Tufts Daily

• FB Class groups.

• Posters of people and facts about them from their social data.

• - Organize a talk about privacy on campus and target everyone — take info on people who are here on facebook and showing info about them as a demo

• Employer testimonials

• Guidelines for online brochure on improving your privacy settings.

Page 27: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

N E X T W E E K : I N F O R M AT I O N , C R O W D S O U R C I N G A N D T H E B I A S O F T H E F I LT E R B U B B L E

• Wikipedia and Reddit’s hive-mind

• Eroding of the line between rumor and truth

• One third of U.S. adults get news via Facebook

• The filter bubble

Page 28: Social Media Privacy and Security -- Tufts University EXP-50-CS Spring 2014: Social Media -- Lecture 5

N E X T W E E K : I N F O R M AT I O N , C R O W D S O U R C I N G A N D T H E B I A S O F T H E F I LT E R B U B B L E

• Reading:

• Shirky, Clay. Here Comes Everybody. Chapters 3 and 4, Everyone Is a Media Outlet and Publish, Then Filter. Pp 55-108.

• Pariser, Eli. The Filter Bubble: What the Internet is Hiding From You. Introduction. Pp. 1-20