Open data e aspetti economici dei dati personali



Similar documents
UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

Unwillingness to Pay for Privacy: A Field Experiment* Dorothea Kübler**, Social Science Research Center (WZB) and Technical University Berlin

DISCLAIMER, TERMS & CONDITIONS OF USE

Access to Front Office services

Adaptive Business Management Systems Privacy Policy

Cloud Services: cosa sono e quali vantaggi portano alle aziende manifatturiere

Declaration of Internet Rights Preamble

McZeely Coterie, LLC Privacy Notice. Effective Date of this Privacy Notice: February 11, 2015.

Life Insurance Basics and Policies Session Three Lesson Three. Producer Responsibilities

SKoolAide Privacy Policy

Trusted Personal Data Management A User-Centric Approach

Legal Notices. Purpose and Scope of Website. StanCorp Financial Group, Inc. Contact Us. Public Affairs. Special Investigations Unit

DARTFISH PRIVACY POLICY

TaxSaverNetwork. Terms of Service

Big Data for Development: What May Determine Success or failure?

Better connections: What makes Australians stay with or switch providers? March 2015

tell you about products and services and provide information to our third party marketing partners, subject to this policy;

An in-depth look into how today s cloud solution providers create and sustain successful partnerships while empowering customers to move to the cloud.

PRIVACY STATEMENT OF THE WEBSITE Page 1 of 7

Online Privacy and Security Statement

(the "Website") is provided by Your Choice Counselling.

THE EFFECT OF ONLINE PRIVACY INFORMATION ON PURCHASING BEHAVIOR: AN EXPERIMENTAL STUDY

Big Data, Big True. IDC Big Data Conference II, Bologna 19 novembre Fabio Rizzotto IT Research&Consulting Director, IDC Italy

REAL ESTATE TECH TRENDS

WHAT INFORMATION IS COLLECTED AT MOTOROLA.COM.VN AND/OR MOTOROLA.VN AND HOW IS IT PROCESSED AND USED?

Resolution on Privacy Protection in Social Network Services

Online Ads: A new challenge for privacy? Jörg Polakiewicz*

SAP Splash Privacy Statement

AdvancedMD Online Privacy Statement

Contact Recommendations from Aggegrated On-Line Activity

Position of the retail and wholesale sector on the Draft Data Protection Regulation in view of the trilogue 2015

Website Privacy Policy

Your use of this site is subject to the following privacy policy statement and the web site terms of service.

Information Collected. Type of Information Collected. We may collect two general types of information when you use the Site:

What are cookies and how does Glendale Career College use them?

Introduction to Firefox OS for developers

Corporate Code of Conduct

User Reference Guide to Internet Trading

ETHICAL ELECTRIC PRIVACY POLICY. Last Revised: December 15, 2015

San Juan County Abstract & Title Company 111 North Orchard Avenue Farmington, NM (505) FAX (505)

VALUING BANKING STOCKS

PRIVACY NOTICE. Last Updated: March 24, 2015

To this end ERCI fully endorses and adheres to the Principles of Personal Data Protection Act (2012). 1. The Purpose:

MRS Guidelines for Business-to-Business Research. October 2011

What is privacy worth?

Introducing Best Practices to Aggregation an EBS Consultation

Thank you for visiting this website, which is owned by Essendant Co.

PRIVACY POLICY AND INFORMATION ON COOKIES

ConteGoView, Inc. Privacy Policy Last Updated on July 28, 2015

BBVA Wallet Application Privacy Policy

How we use cookies on our website

STRATEGIC MANAGEMENT Microsoft s Search

Direct Alloys LLC. An Online Premium Metals Clearinghouse 901 Broad Street Utica, NY Fax

MEMBI PRIVACY POLICY

Privacy Policy MacID. Document last updated Sunday, 28 December 2014 Property of Kane Cheshire

Without prejudice to the generality of the foregoing paragraph, The Gallery Tattoo Studio does not warrant that:

B2B Display Advertising : Find, Nurture, and Harvest

IDT Financial Services Limited. Prime Card Privacy Policy

SmartGrant Web Browser Set-Up

DEMOCRATIZING BIG DATA: THE ETHICAL CHALLENGES OF SOCIAL MINING. Dino PEDRESCHI (KDDLab, Dipartimento di Informatica, Università di Pisa)

The UC Learning Center: Disabling Pop-Up Blockers

Please read this Policy carefully. Your continued use of our sites means that you understand and consent to the terms of this Policy.

MOBILE MARKETING. A guide to how you can market your business to mobile phone users. 2 April 2012 Version 1.0

Customer relationship management MB-104. By Mayank Kumar Pandey Assistant Professor at Noida Institute of Engineering and Technology

FIDELITY APPLICANT PRIVACY AND PROTECTION NOTICE

How To Get Points From Worldpoints

By Emily Hay and Jan Dhont, Data Privacy Department, Lorenz Brussels.

STUDENT MODULE 8.2 CREDIT CARDS AND ONLINE SHOPPING PAGE 1

NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013.

Profound Outdoors Privacy Policy

Small Business Marketing Guide

5. REGISTRATION, TERMS OF CONCLUSION AND WITHDRAWAL FROM CONTRACT

Transcription:

Open data e aspetti economici dei dati personali

http://www.smartdatanet.it/ Fonte: CSI Piemonte 2

Bilanciare diritti e opportunità European Partnership for Big Data Value Chilling effects Incertezza giuridica (IPRs, privacy, aspetti contrattuali) Smart disclosure e data portability come elementi abilitanti Idea di data value networks 3

Archetipo di data value network 4

Big data (?) Why big data evangelists need to be reprogrammed "Too often, big data enables the practice of apophenia: Seeing patterns where none actually exist, simply because enormous quantities of data can offer connections that radiate in all directions. In one notable example, Leinweber (2007) demonstrated that data mining techniques could show a strong but spurious correlation between the changes in the S&P 500 stock index and butter production in Bangladesh 5

Dati e metadati 6

Inferenze indesiderate (?) How browsers affect your job prospects (...) those applicants who have bothered to install new web browsers on their computers (such as Mozilla's Firefox or Google's Chrome) perform better and stay in their posts for 15% longer, on average. Networked employment discrimination algorithmic assessments of workforce data to identify the variables that lead to stronger employee performance; automated systems, algorithms, and existing networks systematically benefits some at the expense of others, often without employers even recognizing the biases of such mechanisms. 7

The dark market for personal data NY TIMES di oggi: «The reputation business is exploding» 8

9

Un habeas corpus digitale? Right to see what data any register stores and request the rectification, actualization or even the destruction of the personal data held. Right to appeal against any violation of the above. Right to reconcile and reuse personal information. 10

Privacy vs open data ( Privacy by design ) In genere, i dati personali possono essere pubblicati se: esiste un consenso informato (revocabile); OR c'è un'obbligazione giuridica; OR i dati sono stati anonimizzati. Esempio: database incidenti Dati sensibili Impact assessment Distinzione sempre più lasca tra chi raccoglie i dati e chi li gestisce 11

Dati e tracce Personal data any information relating to an identified or identifiable individual (data subject) (OECD) Digital footprint All data left behind by users within their use of digital services, and the personally unique arrangement that makes someone identifiable just upon the specific combination of her system information. Internet of Things 12

Digital footprint: tipologie (OECD) Data can be voluntarily shared by a consumer. Data can be observed or recorded, with or without consumers knowledge, or explicit consent. Data that can be inferred. In other cases (Acquisti, 2010), personal data remains protected, either because it was intentionally not disclosed by a consumer, or because the service provider is not able to access it. 13

Personal data vaults Primato degli individui sul controllo dei (propri) dati. Alto livello di accessibilità e leggibilità dei dati. E condivisione selettiva con terzi. Relazioni / accordi di lungo termine. E.g., Personal 14

Approccio centralizzato vs approccio utente-centrico Fonte: Moiso, C., & Minerva, R. (2012, October). Towards a user-centric personal data ecosystem The role of the bank of individuals' data. In Intelligence in Next Generation Networks (ICIN), 2012 16th International Conference on (pp. 202-209). IEEE. 15

Possibili casi d'uso Fonte: Mun, M., Hao, S., Mishra, N., Shilton, K., Burke, J., Estrin, D.,... & Govindan, R. (2010, November). Personal data vaults: a locus of control for personal data streams. In Proceedings of the 6th International COnference (p. 17). ACM. 16

Possibili casi d'uso Automatic and controlled personal information exchange e.g., hotel check-in Vendor Relationship Management Fair personal data marketplace Personal application marketplace come Green Button Fonte: Moiso, C., & Minerva, R. (2012, October). Towards a user-centric personal data ecosystem The role of the bank of individuals' data. In Intelligence in Next Generation Networks (ICIN), 2012 16th International Conference on (pp. 202-209). IEEE. 17

Il valore dei dati personali (dal punto di vista degli individui) Organisations are increasingly in the position of holding information about individuals. A single consumer can experience both benefits and costs from the disclosure of personal information (Hann, 2007). Aan organisation gains clear advantages from being able to increase its knowledge about consumers identity and behaviour. Still, it may deem detrimental for its own business to design too invasive policies (Acquisti, 2010). What seems to matter is that personal data (regardless of its amount) is used in an appropriate context (Nissembaum, 2004) 18

Un possibile paradosso Spiekermann et al. (2001) suggest that even privacy conscious individuals are likely to share sensitive information with strangers, in particular online. Acquisti and Grossklags (2005): almost 90% of individuals declared to be concerned about privacy, but more than 20% of the people in the same sample admitted to have disclosed their social security number for discounts or better services. Beresford et al. (2012): in a context of equal prices, the choice between two different firms to purchase a DVD seemed to give a virtually zero premium to the more privacy-friendly vendor. Nevertheless, 75% of the participants indicated that they have a very strong interest in data protection. Declared vs. revealed preferences. 19

Informazione contestuale [i]ndividuals make privacy-sensitive decisions based on multiple factors, including (but not limited to) what they know, how much they care, and how costly and effective they believe their actions can be. (Acquisti and Grossklags, 2005). Esperimento. 20

Endowment effect Willingess to pay (WTP) vs Willingness to accept (money) (WTA). More than half of subjects endowed with a completely anonymous $10 gift card rejected an offer of $2 to reveal their future purchase data. By contrast, fewer than 10% of subjects endowed with the identified $12 card chose to give up $2 to protect future purchase data. These results imply that consumers endowed with different levels of privacy protection valued the same good, i.e. future privacy protection, in a substantially different way. Most of the consumers whose privacy was fully protected did not considered $2 as a price high enough to sell their future purchasing data, while nine out of ten of the not protected individuals estimated $2 as a too high price to buy protection for future purchase data. 21

Il ruolo dei disclaimer Tsai et al. (2010), different sets of participants were asked to test a new search engine whose results were annotated with icons. 2 products: low privacy concern (batteries), high privacy concern (sex toy), using their credit card. Some participants exposed to icons describing the site privacy policy. Others not, as a control condition. Participants in the privacy information condition were more likely to make purchases from websites offering medium or high levels of privacy (even at higher prices). Quite surprisingly, the premium to privacy was similar in purchasing the batteries and the sex toys. 22

Eterogeneità degli utenti Hann et al. (2007) find three different clusters in terms of privacy evaluation privacy guardians, i.e. people who attach a relatively high value to information privacy [70 85%]; information sellers, who tend to give away personal information with little regard for privacy policies; convenience seekers, people who prefer convenience with little regard for money or website privacy policies. 23

Privacy come bene di scambio (1/2) The existence of a privacy statement makes people more available to share data, even for free (Hui et al., 2007; Tsai et al., 2010; Hann et al., 2007; Tucker, 2012). Joinson et al. (2010) find the existence of a compensatory relationship between privacy and trust. Several studies (Hann et al., 2002; Hann et al., 2007; Tucker, 2012) show that individuals are willing to trade personal information in order to gain convenience in terms of time saving and personalisation of web services Bear in mind that persons differ in terms of opportunity costs. 24

Privacy come bene di scambio (2/2) Social rewards are attractive in balancing privacy concerns and governing individuals behaviour as well (Jiang et al., 2013). Hann et al. (2007) find that a sufficiently large monetary reward significantly increased the relative attractiveness of a website regardless of its privacy policy (WTA). WTP Krasnova et al. (2009) observe that a user would be ready to pay between 14 and 17 Euros/year, if the social network refrained from using her demographic information for personalised advertising. 25