Privacy and Security of Online Social Networks at the Workplace Seda Gürses COSIC/ESAT K.U. Leuven
your mother’s maiden name
your mother’s maiden name privacy security
responsibilization your mother’s maiden name privacy security
SPION responsibilization your mother’s maiden name privacy security
right of the individual to decide hiding information and identity what information about himself should be communicated to the right to be let alone. others and under what Warren & Brandeis (1890) circumstances. (Westin 1970) privacy as separation of privacy confidentiality identities, data as control protection principles privacy as practice the freedom from unreasonable constraints on the construction of one’s own identity (Agre, 1999) transparency and feedback 6
SNS use in SPION ORGANIZATION
SNS ORGANIZATION
SNS ORGANIZATION
SNS ORGANIZATION CUSTOMERS
COMMUNITY OF PRACTICE SNS ORGANIZATION FRIENDS AND FAMILY
SECURITY PRIVACY
security of loss of loss of your reputation efficiency system compensation block monitor through the SNS SNS use SNS
security of loss of loss of your reputation efficiency system SPION! compensation block monitor through the SNS SNS use SNS
COMMUNITY OF PRACTICE SNS ORGANIZATION FRIENDS AND FAMILY SNS profiles your company security of loss of your reputation system
security of loss of COSIC your K.U. Leuven reputation system privacy as confidentiality who is talking query forgery with whom conceal what your conceal communication employees are looking for patterns
security of loss of your DISTRINET, reputation system K.U. Leuven privacy as control information flow robust access control at the control models script level flexible models for sharing securely interact with clear boundaries with 20 mill. TPAs
loss of loss of DTAI, efficiency reputation K.U. Leuven privacy as practice feedback and transparency awareness let employees self- think what your monitor/ develop peer organization or an SNS practices can do with your DATA
security Carnegie Melon loss of University of your nudging efficiency system privacy decisions are difficult to make: bounded cognitive power paternalistic policies steering users through mandate what users design towards more should do... desirable behavior SOFT PATERNALISM
SMIT, what are concepts VUB of trust that come community into play? practices determine community find out how these practices offline can be translated to online SNS loss of loss of reputation efficiency
security loss of of your reputation OWK, system UGhent educational approaches developing evaluation frameworks for what are effective educational and educational models for awareness material effective privacy and security training for SNS?
security loss of of your ICRI, reputation K.U. Leuven system legal matters loss of which legal efficiency what are the frameworks liabilities of apply to SNS? SNS providers? how to interpret data how can they be made protection in more accountable? SNS?
SPION http://www.cosic.esat.kuleuvaen.be/spion/ sguerses@esat.kuleuven.be THANK YOU!
Recommend
More recommend