Paper Presentation at the Workshop on Usable Privacy & Security for Mobile Devices (U-PriSM) at the Symposium On Usable Privacy and Security (SOUPS) 2012
Paper can be found here: http://appanalysis.org/u-prism/soups12_mobile-final11.pdf
Full journal paper (under review): http://bit.ly/TiiSprivacy
Helping Users with Information Disclosure Decisions: Potential for Adaptation...Bart Knijnenburg
油
The document describes an experiment that tested different types of justifications for personal information disclosure requests from mobile apps. The experiment tested different justification types (no justification, usefulness for the user, number of others disclosing, usefulness for others, explanation), disclosure request order (context data first vs demographics first), and measured their impact on disclosure rates, perceived value of disclosure, perceived privacy threat, trust in the company, and satisfaction with the system. The results showed that no justification led to the highest disclosure rates, and justifications were perceived as generally helpful except for number of others. The justification of usefulness for others led to higher perceived privacy threat and lower trust in the company.
At the Advertising Research Foundations (ARF) 2011 annual re:think convention, a key issues forum presentation was held entitled Research Quality. The topic of Research Quality forum was Should We Dismantle the Factory?An Approach to Evaluate Data Collected from Multiple Sample Sources and Generated through Different Approaches. Measuring online research was discussed. George Terhanian, Ph.D. presented and Gian Fulgoni moderated.
Simplifying Privacy Decisions: Towards Interactive and Adaptive SolutionsBart Knijnenburg
油
The document discusses approaches to simplifying privacy decisions through interactive and adaptive solutions. It first examines how transparency and control approaches have limitations due to bounded rationality, information overload, and choice overload. It then discusses privacy nudging and persuasion approaches using defaults, justifications, and framing to influence decisions. However, these approaches can also reduce user satisfaction and autonomy. The document proposes an adaptive privacy procedure to provide contextualized nudges based on a dynamic understanding of user concerns.
Information Disclosure Profiles for Segmentation and RecommendationBart Knijnenburg
油
The document discusses moving beyond a one-size-fits-all approach to privacy by developing privacy profiles based on different tendencies to disclose types of information. These profiles can be used to provide tailored privacy recommendations and defaults by predicting a user's disclosure behaviors based on their profile, type of information, and recipient. The goal is to support individual privacy preferences while reducing the complexity of privacy controls.
The document discusses both the promises and perils of big data. It outlines how big data can enable powerful personalized recommendations through techniques like matrix factorization but also how overfitting and a lack of domain knowledge can limit solutions. It emphasizes the need for user experiments to evaluate recommendations and the importance of balancing privacy concerns with personalization through transparency and adaptive defaults.
Explaining the User Experience of Recommender Systems with User ExperimentsBart Knijnenburg
油
A talk I gave at the Netflix offices on July 2nd, 2012.
Please do not use any of the slides or their contents without my explicit permission (bart@usabart.nl for inquiries).
Counteracting the negative effect of form auto-completion on the privacy calc...Bart Knijnenburg
油
This document discusses how form auto-completion tools can negatively impact users' privacy calculus by making it too easy to disclose information without weighing risks and benefits. The researchers propose two new tools - Remove FormFiller and Add FormFiller - that allow users to manually remove or add filled fields, hypothesizing this will reinstate the privacy calculus. They conducted an experiment where participants used an auto-completion tool on forms for different websites (a blog, job site, health insurer). Results showed perceived risk was lower and relevance higher when the type of information matched the website purpose, supporting the role of purpose-specificity in disclosure decisions.
The document discusses human centered software design (HCSD) and its benefits. It promotes incorporating human-centered design (HCD) methods into traditional software engineering processes. These methods include interviews, personas, scenarios, storyboards and user testing. When done effectively through iterative design and testing with users, HCSD can lead to increased traffic, sales, user happiness and productivity. The document uses examples from various companies and from a student project at UC Irvine to show how HCSD works in practice.
Recommendations and Feedback - The user-experience of a recommender systemBart Knijnenburg
油
The document summarizes research on evaluating the user experience of recommender systems. It presents hypotheses about how personalized recommendations versus random recommendations affect user perception, choice satisfaction, and feedback behavior. An experiment tested the hypotheses using a video recommender system and found that personalized recommendations increased perceived quality and choice satisfaction, which in turn increased feedback intentions. Privacy concerns decreased feedback intentions while trust in technology reduced privacy concerns. The summarizes lessons learned and discusses areas for future work such as confirming results in other systems and incorporating additional influences.
Inspectability and Control in Social RecommendersBart Knijnenburg
油
1. The study examined how providing users with inspectability and control over recommendations in a social recommender system impacts user experience.
2. The results showed that giving users inspectability through a full graph interface increased understandability and perceived control compared to a list interface. It also improved users' recognition of known recommendations.
3. Allowing users to control recommendations at the item level led to higher novelty through fewer known recommendations, while control at the friend level increased accuracy.
4. Overall, the findings suggest that social recommenders should provide users with inspectability and control through a simple interface to improve the user experience.
Preference-based Location Sharing: Are More Privacy Options Really Better?Bart Knijnenburg
油
1. The document examines how adding and removing location sharing options affects user preferences. It studies four options: nothing, city, city block, and exact location.
2. The researchers hypothesize that removing the "city" option will either cause users to choose more private options proportionally, or to shift more towards the more revealing "block" option, depending on how close "city" is perceived to the other options.
3. A user study found that when "city" was removed, the share of users choosing "block" increased significantly, suggesting "city" is perceived closer to "block" than "nothing." Adding an "exact" option caused proportional increases across options, suggesting equal perceived distances.
This document presents research on profiling Facebook users' privacy behaviors. A survey was conducted with over 300 Facebook users to understand their use of various privacy features and settings. Statistical analysis identified 14 distinct privacy behavior factors. Further analysis classified users into 6 privacy behavior profiles, ranging from "Privacy Maximizers" to "Privacy Minimalists". The profiles differed in their use of features like friend lists, untagging posts, and restricting profile access. The research aims to better understand how to personalize privacy tools based on users' tendencies.
Tutorial on Conducting User Experiments in Recommender SystemsBart Knijnenburg
油
The document provides an introduction to user experiments for evaluating recommender systems. It discusses developing a theoretical framework for user-centric evaluation with four key aspects: 1) measuring how system algorithms and interactions influence user experience and behavior, 2) considering subjective user perceptions and experiences in addition to objective behaviors, 3) accounting for personal and situational characteristics that may impact results, and 4) linking objective system aspects to subjective experience to understand how system aspects affect user experience. The goal is to scientifically evaluate recommender systems from the user perspective using this comprehensive framework.
Drexel University: Business and Privacy in the Cloud Jim Adler
油
This document discusses business and privacy in cloud computing. It covers what cloud computing is, how data is used and accessed in the cloud, and issues around data control and privacy. Key points addressed include the vast amount of data being uploaded to the cloud, both personal and non-personal data, as well as concerns users have around how their data may be used or shared. The document also discusses how concepts of public and private have evolved with technology and cloud computing.
Gianni Cooreman is a business consultant specializing in big data. He has over 6 years of experience researching technology and 1 year of experience in analytics and strategy. Some of the key topics he discusses in the document include:
- Defining big data as high-volume, high-velocity, and high-variety data that exceeds typical storage and processing capabilities.
- Emphasizing that big data is about solving complex problems faster and more accurately to drive business value.
- Noting that people and organizations need to challenge assumptions, use data to support discussions, and generate explanations to gain credibility for big data projects.
- Suggesting opportunities exist in breaking down corporate silos and combining different data sources
Business considerations for privacy and open data: how not to get caught outtheODI
油
When all around you seems to be going "open", what should you know and bear in mind to avoid a privacy debacle. Unless your data is solely about inanimate objects, there will be privacy considerations for your business or organisation. Done properly, suitable consideration may be trivial; done badly, it can be catastrophic, and hindsight is always better when the stories are about a different organisation.With kittens and hopefully some humour, Sam Smith of Privacy International covers how your organisation can avoid a future audience laughing (uncomfortably) at the privacy choices you should have made for your users, your customers and citizens.
The document discusses trends in the mobile industry for 2013. It notes that as of 2012, there were over 2.5 billion people online globally, accounting for about 35% of the global population. Mobile traffic already accounts for 15% of total internet traffic and is growing quickly. Device sales, especially smartphones and tablets, are pushing more people onto the mobile internet as PC shipments declined in 2012. Tablets are poised for a large increase in sales in 2013, though their adoption has so far been highest among wealthier and older users due to lack of carrier subsidies.
This document discusses running an agile Fortune 500 company and the role of data science. It notes that a typical global company has many divisions and employees across many countries. It then discusses how the original question of data science being a fad is incorrect, and that companies need to understand how to utilize data science rather than seeing data scientists as a commodity. The document outlines how data science uses techniques from fields like machine learning, statistics, and big data. It provides demographic details on data scientists and discusses common misconceptions around data science.
Disrupting technologies like Data Science and Knowledge Automation are projected to have an economic impact of trillions of dollars in the next decade.
This presentation was given at the Dallas Tableau User Group on Oct 29, 2103 and
Using Predictive Analytics for Anticipatory Investigation and InterventionJon Gosier
油
The proliferation and adoption of data, sensors, mobile phones and social media technology present new ways of capturing conversations surrounding events in real-time. There is high demand for products that allow law enforcement and criminal investigators and others to explore events by monitoring many transmedia sources (social media sources like Facebook and Twitter, photos, news sources, and tweets) and relating that activity to historic data sets like neighborhood maps, crime databases and other digital records.
!
Using a combination of the data-analysis products available from D8A Group, weve been monitoring unfolding events in real-time to illustrate the ways our technology platforms can be used by public safety officials to make data informed decisions in real-time public safety.
Developing a Social Intelligence Program - FSMUW2O Group
油
The document discusses best practices for social media analytics and metrics. It recommends taking a two-pronged approach of using social data to both improve programs through real-time insights, as well as prove business value through weekly and monthly reporting. Key elements for success include using the right tools, developing a social intelligence supply chain, institutionalizing metrics and models, and planning human resources like a training program. The overall goal is to gain valuable intelligence from social media data to inform business decisions.
This document discusses how artificial intelligence is improving the analysis of social and customer data. It notes that language is complex with implicit meanings and that current text analytics have poor precision and recall. Machine learning, through supervised, unsupervised, and semi-supervised techniques, provides better analysis by discovering unseen patterns. Active machine learning replaces boolean searches with custom classifiers that achieve over 90% relevancy. Clear performance metrics make the models more transparent. Studies show these AI approaches achieve over 95% precision in social conversation analysis. They can help with brand equity, campaign measurement, customer experience, and linking social data to sales metrics.
The document discusses moving beyond transparency and control as the primary ways to address privacy concerns. It proposes a Privacy Adaptation Procedure that uses adaptive nudges based on contextualizing individual privacy preferences. These nudges would take into account the type of information, user characteristics, context, and other factors to determine the optimal default settings and justifications for different individuals in different situations. Examples show how nudges could be tailored depending on privacy profiles, gender, disclosure tendencies, and other variables.
Saiful Hidayat Internet/IT sebagai Wahana Syiar DigitalSaiful Hidayat
油
Internet and information technology can be used as a medium for digital da'wah. Telkom Indonesia aims to encourage the development of a healthy digital creative industry and community in Indonesia through various "Indigo Initiatives". These initiatives include programs like Indigo Fellowship which provides workshops, coaching and seed capital for creative business ideas. The infrastructure being developed includes digital content platforms, payment systems, and broadband/broadcast networks to support various sectors like SMEs, education and government. The goal is to promote "valuetainment creativity" and give people freedom to express themselves through the digital tools and platforms.
Artistic interventions can trigger social revolution by using open data, creativity, and participation. They use beautification, entertainment, education, and shock effects to play, open eyes, inspire, and inform through guerrilla art, street art, flashmobs, and creative use of social media and augmented reality apps. Open data and free information through co-creation, crowd-sourcing, open innovation, Creative Commons, and open government can fuel the information society.
The document discusses the rise of social media and its impact on business. It notes that new technologies have enabled people to share information and experiences online rather than relying on traditional organizations. This has led to more collaboration and collective action as people organize without traditional hierarchies. Businesses must adapt to this new environment by embracing new forms of social interaction and developing disruptive business models.
Does Data Quality lays in facts, or in acts?jeansoulin
油
Invited keynote at the workshop: "Quality assessment of geospatial data: does it fit your needs?". 20th AGILE conference. Association of Geographic Information Laboratories in Europe. Wageningen, NL. May 2016.
The document discusses human centered software design (HCSD) and its benefits. It promotes incorporating human-centered design (HCD) methods into traditional software engineering processes. These methods include interviews, personas, scenarios, storyboards and user testing. When done effectively through iterative design and testing with users, HCSD can lead to increased traffic, sales, user happiness and productivity. The document uses examples from various companies and from a student project at UC Irvine to show how HCSD works in practice.
Recommendations and Feedback - The user-experience of a recommender systemBart Knijnenburg
油
The document summarizes research on evaluating the user experience of recommender systems. It presents hypotheses about how personalized recommendations versus random recommendations affect user perception, choice satisfaction, and feedback behavior. An experiment tested the hypotheses using a video recommender system and found that personalized recommendations increased perceived quality and choice satisfaction, which in turn increased feedback intentions. Privacy concerns decreased feedback intentions while trust in technology reduced privacy concerns. The summarizes lessons learned and discusses areas for future work such as confirming results in other systems and incorporating additional influences.
Inspectability and Control in Social RecommendersBart Knijnenburg
油
1. The study examined how providing users with inspectability and control over recommendations in a social recommender system impacts user experience.
2. The results showed that giving users inspectability through a full graph interface increased understandability and perceived control compared to a list interface. It also improved users' recognition of known recommendations.
3. Allowing users to control recommendations at the item level led to higher novelty through fewer known recommendations, while control at the friend level increased accuracy.
4. Overall, the findings suggest that social recommenders should provide users with inspectability and control through a simple interface to improve the user experience.
Preference-based Location Sharing: Are More Privacy Options Really Better?Bart Knijnenburg
油
1. The document examines how adding and removing location sharing options affects user preferences. It studies four options: nothing, city, city block, and exact location.
2. The researchers hypothesize that removing the "city" option will either cause users to choose more private options proportionally, or to shift more towards the more revealing "block" option, depending on how close "city" is perceived to the other options.
3. A user study found that when "city" was removed, the share of users choosing "block" increased significantly, suggesting "city" is perceived closer to "block" than "nothing." Adding an "exact" option caused proportional increases across options, suggesting equal perceived distances.
This document presents research on profiling Facebook users' privacy behaviors. A survey was conducted with over 300 Facebook users to understand their use of various privacy features and settings. Statistical analysis identified 14 distinct privacy behavior factors. Further analysis classified users into 6 privacy behavior profiles, ranging from "Privacy Maximizers" to "Privacy Minimalists". The profiles differed in their use of features like friend lists, untagging posts, and restricting profile access. The research aims to better understand how to personalize privacy tools based on users' tendencies.
Tutorial on Conducting User Experiments in Recommender SystemsBart Knijnenburg
油
The document provides an introduction to user experiments for evaluating recommender systems. It discusses developing a theoretical framework for user-centric evaluation with four key aspects: 1) measuring how system algorithms and interactions influence user experience and behavior, 2) considering subjective user perceptions and experiences in addition to objective behaviors, 3) accounting for personal and situational characteristics that may impact results, and 4) linking objective system aspects to subjective experience to understand how system aspects affect user experience. The goal is to scientifically evaluate recommender systems from the user perspective using this comprehensive framework.
Drexel University: Business and Privacy in the Cloud Jim Adler
油
This document discusses business and privacy in cloud computing. It covers what cloud computing is, how data is used and accessed in the cloud, and issues around data control and privacy. Key points addressed include the vast amount of data being uploaded to the cloud, both personal and non-personal data, as well as concerns users have around how their data may be used or shared. The document also discusses how concepts of public and private have evolved with technology and cloud computing.
Gianni Cooreman is a business consultant specializing in big data. He has over 6 years of experience researching technology and 1 year of experience in analytics and strategy. Some of the key topics he discusses in the document include:
- Defining big data as high-volume, high-velocity, and high-variety data that exceeds typical storage and processing capabilities.
- Emphasizing that big data is about solving complex problems faster and more accurately to drive business value.
- Noting that people and organizations need to challenge assumptions, use data to support discussions, and generate explanations to gain credibility for big data projects.
- Suggesting opportunities exist in breaking down corporate silos and combining different data sources
Business considerations for privacy and open data: how not to get caught outtheODI
油
When all around you seems to be going "open", what should you know and bear in mind to avoid a privacy debacle. Unless your data is solely about inanimate objects, there will be privacy considerations for your business or organisation. Done properly, suitable consideration may be trivial; done badly, it can be catastrophic, and hindsight is always better when the stories are about a different organisation.With kittens and hopefully some humour, Sam Smith of Privacy International covers how your organisation can avoid a future audience laughing (uncomfortably) at the privacy choices you should have made for your users, your customers and citizens.
The document discusses trends in the mobile industry for 2013. It notes that as of 2012, there were over 2.5 billion people online globally, accounting for about 35% of the global population. Mobile traffic already accounts for 15% of total internet traffic and is growing quickly. Device sales, especially smartphones and tablets, are pushing more people onto the mobile internet as PC shipments declined in 2012. Tablets are poised for a large increase in sales in 2013, though their adoption has so far been highest among wealthier and older users due to lack of carrier subsidies.
This document discusses running an agile Fortune 500 company and the role of data science. It notes that a typical global company has many divisions and employees across many countries. It then discusses how the original question of data science being a fad is incorrect, and that companies need to understand how to utilize data science rather than seeing data scientists as a commodity. The document outlines how data science uses techniques from fields like machine learning, statistics, and big data. It provides demographic details on data scientists and discusses common misconceptions around data science.
Disrupting technologies like Data Science and Knowledge Automation are projected to have an economic impact of trillions of dollars in the next decade.
This presentation was given at the Dallas Tableau User Group on Oct 29, 2103 and
Using Predictive Analytics for Anticipatory Investigation and InterventionJon Gosier
油
The proliferation and adoption of data, sensors, mobile phones and social media technology present new ways of capturing conversations surrounding events in real-time. There is high demand for products that allow law enforcement and criminal investigators and others to explore events by monitoring many transmedia sources (social media sources like Facebook and Twitter, photos, news sources, and tweets) and relating that activity to historic data sets like neighborhood maps, crime databases and other digital records.
!
Using a combination of the data-analysis products available from D8A Group, weve been monitoring unfolding events in real-time to illustrate the ways our technology platforms can be used by public safety officials to make data informed decisions in real-time public safety.
Developing a Social Intelligence Program - FSMUW2O Group
油
The document discusses best practices for social media analytics and metrics. It recommends taking a two-pronged approach of using social data to both improve programs through real-time insights, as well as prove business value through weekly and monthly reporting. Key elements for success include using the right tools, developing a social intelligence supply chain, institutionalizing metrics and models, and planning human resources like a training program. The overall goal is to gain valuable intelligence from social media data to inform business decisions.
This document discusses how artificial intelligence is improving the analysis of social and customer data. It notes that language is complex with implicit meanings and that current text analytics have poor precision and recall. Machine learning, through supervised, unsupervised, and semi-supervised techniques, provides better analysis by discovering unseen patterns. Active machine learning replaces boolean searches with custom classifiers that achieve over 90% relevancy. Clear performance metrics make the models more transparent. Studies show these AI approaches achieve over 95% precision in social conversation analysis. They can help with brand equity, campaign measurement, customer experience, and linking social data to sales metrics.
The document discusses moving beyond transparency and control as the primary ways to address privacy concerns. It proposes a Privacy Adaptation Procedure that uses adaptive nudges based on contextualizing individual privacy preferences. These nudges would take into account the type of information, user characteristics, context, and other factors to determine the optimal default settings and justifications for different individuals in different situations. Examples show how nudges could be tailored depending on privacy profiles, gender, disclosure tendencies, and other variables.
Saiful Hidayat Internet/IT sebagai Wahana Syiar DigitalSaiful Hidayat
油
Internet and information technology can be used as a medium for digital da'wah. Telkom Indonesia aims to encourage the development of a healthy digital creative industry and community in Indonesia through various "Indigo Initiatives". These initiatives include programs like Indigo Fellowship which provides workshops, coaching and seed capital for creative business ideas. The infrastructure being developed includes digital content platforms, payment systems, and broadband/broadcast networks to support various sectors like SMEs, education and government. The goal is to promote "valuetainment creativity" and give people freedom to express themselves through the digital tools and platforms.
Artistic interventions can trigger social revolution by using open data, creativity, and participation. They use beautification, entertainment, education, and shock effects to play, open eyes, inspire, and inform through guerrilla art, street art, flashmobs, and creative use of social media and augmented reality apps. Open data and free information through co-creation, crowd-sourcing, open innovation, Creative Commons, and open government can fuel the information society.
The document discusses the rise of social media and its impact on business. It notes that new technologies have enabled people to share information and experiences online rather than relying on traditional organizations. This has led to more collaboration and collective action as people organize without traditional hierarchies. Businesses must adapt to this new environment by embracing new forms of social interaction and developing disruptive business models.
Does Data Quality lays in facts, or in acts?jeansoulin
油
Invited keynote at the workshop: "Quality assessment of geospatial data: does it fit your needs?". 20th AGILE conference. Association of Geographic Information Laboratories in Europe. Wageningen, NL. May 2016.
The document summarizes key findings from recent Pew Research Center reports on digital technology and social media usage:
1) A majority of Facebook users do not actually derive enjoyment from using the social media site, with only 4% reporting pleasure from it.
2) Mobile internet access has grown significantly, with 89% of adults now owning smartphones or tablets on which they access apps and location-based services.
3) Social media engagement continues rising, with 59% of all U.S. adults now using social networking sites like Facebook.
This document discusses privacy challenges related to emerging technologies like big data, merged realities, and cognitive computing. It provides an overview of these technologies and their implications for privacy. The role of information professionals in addressing privacy issues is also examined. Key points discussed include how new technologies often conflict with privacy, the global scale of data collection, and how technology could also help manage privacy concerns.
Toegegeven, sommige van deze '100 awesome marketing stats' gaan sec over de USA. En diverse statistieken geven de situatie weer van 2011. Toch is deze informatie van DutchmarQ partner HubSpot juist ook in 2012 bijzonder waardevol om de kracht van de juiste content aan te geven. Outbound marketing op basis van betaalde media die de klant onderbreekt en afleidt heeft z'n langste tijd gehad.
Tijd voor inbound marketing. Juist ook in B2B/ business to business.
Doelgroep: professionals met de rol van interim marketing directeur, marketing directeur, commercieel directeur, sales directeur of algemeen manager.
This document provides an overview of a tutorial on event processing under uncertainty. It begins with an introduction that discusses how most real-world data contains some level of uncertainty and an illustrative example of using event processing to detect crimes from uncertain video surveillance and citizen reports. It then outlines the topics to be covered, including representing and modeling different types of uncertainty, and extending event processing techniques to handle uncertain event data.
The document discusses the role of technology in mobile advertising. It begins with comparisons of mobile advertising to other media like TV, print, and internet in terms of growth and impact. It describes how mobile advertising has evolved from early push messaging to more advanced targeted and interactive ads. It outlines how mobile data and targeting capabilities allow for highly personalized ads. The document advocates for an approach to mobile advertising that combines computer science, data analysis, and creative advertising to most effectively reach customers.
ITI Turner Question Paper MCQ E-Book Free DownloadSONU HEETSON
油
ITI Turner Question Paper MCQ Book PDF Free Download. All Questions collected from NIMI Mock Test, CTS Bharat Skills Question Bank, Previous Exam papers. Helpful for CTS Trade Theory 1st & 2nd Year CBT Exam,油Apprentice test, AITT, ISRO, DRDO, NAVY, ARMY, Naval Dockyard, Tradesman, Training Officer, Instructor, RRB ALP CBT 2,油Railway Technician, CEPTAM, BRO, PWD, PHED, Air India, BHEL, BARC, IPSC, CISF, CTI, HSFC, GSRTC, GAIL, PSC, Viva, Tests, Quiz油& all other technical competitive exams.
How to create security group category in Odoo 17Celine George
油
This slide will represent the creation of security group category in odoo 17. Security groups are essential for managing user access and permissions across different modules. Creating a security group category helps to organize related user groups and streamline permission settings within a specific module or functionality.
Digital Tools with AI for e-Content Development.pptxDr. Sarita Anand
油
This ppt is useful for not only for B.Ed., M.Ed., M.A. (Education) or any other PG level students or Ph.D. scholars but also for the school, college and university teachers who are interested to prepare an e-content with AI for their students and others.
Chapter 1. Basic Concepts of Strategic Management.pdfRommel Regala
油
This course provides students with a comprehensive understanding of strategic management principles, frameworks, and applications in business. It explores strategic planning, environmental analysis, corporate governance, business ethics, and sustainability. The course integrates Sustainable Development Goals (SDGs) to enhance global and ethical perspectives in decision-making.
This course provides students with a comprehensive understanding of strategic management principles, frameworks, and applications in business. It explores strategic planning, environmental analysis, corporate governance, business ethics, and sustainability. The course integrates Sustainable Development Goals (SDGs) to enhance global and ethical perspectives in decision-making.
Managing expiration dates of products in odooCeline George
油
Odoo allows users to set expiration dates at both the product and batch levels, providing flexibility and accuracy. By using Odoo's expiration date management, companies can minimize waste, optimize stock rotation, and maintain high standards of product quality. The system allows users to set expiration dates at both the product and batch levels, providing flexibility and accuracy.
The Constitution, Government and Law making bodies .saanidhyapatel09
油
This PowerPoint presentation provides an insightful overview of the Constitution, covering its key principles, features, and significance. It explains the fundamental rights, duties, structure of government, and the importance of constitutional law in governance. Ideal for students, educators, and anyone interested in understanding the foundation of a nations legal framework.
How to Configure Proforma Invoice in Odoo 18 SalesCeline George
油
In this slide, well discuss on how to configure proforma invoice in Odoo 18 Sales module. A proforma invoice is a preliminary invoice that serves as a commercial document issued by a seller to a buyer.
A PPT on the First Three chapters of Wings of FireBeena E S
油
Privacy in Mobile Personalized Systems - The Effect of Disclosure Justifications
1. Privacy in Mobile Personalized Systems
The Effect of Disclosure Justi鍖cations
Bart P. Knijnenburg Alfred Kobsa Gokay Saldamli
Department of Informatics, UC Irvine Department of Informatics, UC Irvine Samsung R&D Research
Samsung R&D Research
2. Mobile apps need personal data
Mobile applications often
use personalization
This requires personal
information
- Demographical data (e.g.
age, hobbies, income)
- Contextual data (e.g. app
usage, calendar, location)
INFORMATION AND COMPUTER SCIENCES
3. Let users control their disclosure
Problem: Many people are
not comfortable disclosing
diverse personal information
FTC, CPBoR: let users
decide
Privacy calculus: trade off
between bene鍖ts and risks
INFORMATION AND COMPUTER SCIENCES
4. Help users decide what to disclose
Problem: This trade-off is
dif鍖cult!
Lack of knowledge about
positive and negative
consequences
CPBoR: informed choice
Previous research:
justi鍖cations
INFORMATION AND COMPUTER SCIENCES
5. Justi鍖cation types
Explain the reason why the information is requested
May prove the legitimacy of the disclosure request
Highlight the bene鍖ts of disclosure
Privacy calculus: tip the scales in favor of the bene鍖ts
Appeal to the social norm
Eschew privacy calculus by conforming to the majority
INFORMATION AND COMPUTER SCIENCES
6. Our starting point
Previous work: Justi鍖cations seem to work
- They increase disclosure
- They increase user satisfaction
-not always tested
Our goal: Find out which one works best
INFORMATION AND COMPUTER SCIENCES
14. Results
Perceived(value(of(
Perceived value of
Disclosure*behavior* disclosure(help(
disclosure help: *
Demographics*disclosure * ***"
*Context*disclosure*
Context"鍖rst" Demographics"鍖rst" 1,00" Context"鍖rst" ***"
Demograpics"鍖rst"
100%"
3 items, e.g. The system
0,75" **"
90%" helped 1"
me to make a
***" 0,50"
80%"
tradeoff between privacy
70%" 0,25" *" **" *"
60%" and usefulness *" *"
0,00"
50%"
#0,25"
Higher for all except
40%"
30%" #0,50"
number of others
20%" #0,75"
10%"
#1,00"
0%"
none" useful"for"you" #"of"others" useful"for"others" explanaDon"
INFORMATION AND COMPUTER SCIENCES
15. Results
Perceived(privacy(
Disclosure*behavior* threat(
*
Perceived privacy threat:
Demographics*disclosure * *Context*disclosure*
Context"鍖rst" Demographics"鍖rst" 1,00" Context"鍖rst" Demograpics"鍖rst"
100%"
3 items, e.g. The system 0,75"
90%" 1" *"
80%"
has too much information
***" 0,50"
70%" about me 0,25" *" **" *"
60%" 0,00" *" *"
50%"
Higher for useful for others #0,25"
40%"
30%" #0,50"
20%" #0,75"
10%"
#1,00"
0%"
none" useful"for"you" #"of"others" useful"for"others" explanaDon"
INFORMATION AND COMPUTER SCIENCES
16. Results
Trust&in&the&&
Trust in the company: Disclosure*behavior* company&
*
Demographics*disclosure * *Context*disclosure*
4 items, e.g. I believe this
Context"鍖rst" Demographics"鍖rst" 1,00" Context"鍖rst" Demograpics"鍖rst"
100%" company is honest when
0,75"
90%" 1"
80%"
it comes ***"using the
to 0,50"
70%" information I provide 0,25" *" **" *"
60%" 0,00" *" *"
Generally lower, especially
50%"
$0,25"
40%"
for useful for others
30%" $0,50" 1"
20%" $0,75" **"
10%"
$1,00"
0%"
none" useful"for"you" #"of"others" useful"for"others" explanaDon"
INFORMATION AND COMPUTER SCIENCES
17. Results
Sa#sfac#on)with))
Disclosure*behavior* the)system)
*
Demographics*disclosure * *Context*disclosure*
Satisfaction with the system:
Context"鍖rst" Demographics"鍖rst" 1,00" Context"鍖rst" Demograpics"鍖rst"
100%"
0,75"
90%" 6 items,1"e.g. Overall, Im
***" 0,50"
80%"
satis鍖ed with the system
70%" 0,25" *" **" *"
60%" 0,00" *" *"
Lower for any justi鍖cation!
50%"
$0,25"
40%"
30%" $0,50"
1"
20%" $0,75" **" **"
10%"
$1,00" ***"
0%"
none" useful"for"you" #"of"others" useful"for"others" explanaDon"
INFORMATION AND COMPUTER SCIENCES
18. Conclusion
Justi鍖cations did not have the expected effects
No increase in disclosure
No decrease in perceived threat, no increase in trust
Satisfaction is lower
...but participants liked the disclosure help!
INFORMATION AND COMPUTER SCIENCES
19. Re鍖ection
Why did this happen?
Possible reason 1: Justi鍖cations are seen as persuasion
But participants liked the disclosure help
Possible reason 2: Low percentages cause disappointment
Disclosure only starts to increase at around 90% for the
number of others justi鍖cation
Possible reason 3: Justi鍖cations carry an implicit warning
They signal that the disclosure decision is not trivial
INFORMATION AND COMPUTER SCIENCES
20. Discussion
None of our justi鍖cation messages seemed to work very well
Is there a golden justi鍖cation?
Different justi鍖cations may work for different types of users
Has anyone tried tailored disclosure help?
We provided objective information for privacy decisions
Should we do this even if it reduces users satisfaction?
INFORMATION AND COMPUTER SCIENCES
22. Discussion
None of our justi鍖cation messages seemed to work very well
Is there a golden justi鍖cation?
Different justi鍖cations may work for different types of users
Has anyone tried tailored disclosure help?
We provided objective information for privacy decisions
Should we do this even if it reduces users satisfaction?
INFORMATION AND COMPUTER SCIENCES