SlideShare a Scribd company logo
1 of 37
Networked Privacy in the Age of
Surveillance, Sousveillance, Coveillance
Lee Rainie (@lrainie)
Director, Internet, Science, and Technology Research
Pew Research Center
1.23.15
Harvard University - “Privacy in a Networked World”
1. Privacy is not binary / context matters
2. Personal control / agency matters
3. Trade-offs are part of the bargain
4. The young are more focused on
networked privacy than their elders
5. Many know they do not
know what is going on
6. People are growing hopeless
and their trust is fading
The balance of forces has shifted in the
world of networked information that is
persistent, scalable, searchable,
spreadable …
… created and shared by networked
individuals
----
The new reality is that people are “public
by default and private by effort”
-- danah boyd
• On a typical day, how much control do you
have over information that is collected about
you and how it is used?
• 47% say “a lot” or “some”
• 50% say “not much control” or “no control at
all”
Surveillance
• 80% of adults “agree” or “strongly agree” that
Americans should be concerned about the
government’s monitoring of phone calls and
internet communications.
• 54% of adults have become less confident
over time that the surveillance programs are
serving the public interest.
• Do you think the courts and judges do a good
job balancing the public’s right to privacy and
the needs of law enforcement and intelligence
agencies to collect information for
investigations?
• Yes - 48%
• No – 49%
v
v
v
v
v
• 68% of internet users believe current laws are
not good enough in protecting people’s
privacy online and 24% believe current laws
provide reasonable protections.
• 64% believe the government should do more
to regulate advertisers, compared with 34%
who think the government should not get
more involved.
• 55% “agree” or “strongly agree” with the
statement: “I am willing to share some
information about myself with companies in
order to use online services for free.”
Knowledge quiz
True or False: When a company posts a privacy
policy, it ensures that the company keeps
confidential all the information it collects on
users.
• 44% were correct the answer is FALSE
• 52% were incorrect
• 4% refused to answer
Privacy strategies that people don’t
know about
• 39% don’t know about anonymity software
such as Tor
• 37% don’t know about using locally-
networked communications such as FireChat
• 31% don’t know about email encryption
• 31% don’t know about privacy enhancing
browser plug-ins such as DoNotTrackMe or
Privacy Badger
Sousveillance
How confident are you that your records at
these companies will remain safe and private?
76%
69%
66%
61%
57%
56%
55%
54%
50%
46%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Online advertisers
Social media
Search engines
Retailers
Email provider
Cell telephone
Government agencies
Cable TV
Landline telephone
Credit card
Not too confident / Not at all confident
Accessing government data
• 37% have done this for Federal government
information
• 34% have done this for state government
information
• 32% have done this for local government
information
• This comes to 67% of adults who used the
internet or an app to access government
information or data across the three levels of
government.
Transparency demands
• 5% of respondents think the Federal government
very effectively shares the data it collects with
the general public, with another 39% saying this
is done somewhat effectively.
• 5% of respondents say their state government
very effectively shares data with the general
public, with another 44% saying their state does
this somewhat effectively.
• 7% of respondents say their local government
share data very effectively, with another 45%
saying this is done somewhat effectively.
Coveillance
• 86% of internet users try to be anonymous at
least occasionally
• 59% do not believe it is possible to be
completely anonymous online, while 37% of
them believe it is possible.
Personal information online
% of adult internet users who say this information about them is available online
20%
21%
21%
24%
29%
30%
38%
44%
46%
50%
66%
0% 20% 40% 60% 80%
Your political party / affiliation
Video of you
Your home phone number
Your cell number
Which groups / orgs you belong to
Your home address
Things you’ve written using your name
Your employer / company you work for
Your email address
Your birth date
A photo of you
Who users try to avoid
% of adult internet users who say they have used the internet in ways to avoid being observed or
seen by …
4%
5%
6%
6%
11%
14%
17%
19%
19%
28%
33%
0% 10% 20% 30% 40%
Law enforcement
The government
Companies / people who run the website you visited
Companies / people who might want payment for files you…
Employer, supervisor, coworkers
Family members or romantic partner
People who might criticize / harass you
People from your past
Certain friends
Advertisers
Hackers or criminals
Young adults are the most likely to have had major
problems with personal information and identity
28%
23%
7%
13%
11%
22%
15%
14%
6%
4%
17%
2%
11%
2%
1%
9%
3%
8%
4%
0%
10%
20%
30%
Had email or SNS
account compromised
or taken over without
permission
Been stalked or
harassed online
Had important info
stolen such as SSN,
credit card, bank info
Had reputation
damaged because of
something that
happened online
Online events led you
into physical danger
Ages 18-29 Ages 30-49 Ages 50-64 Ages 65+
• 62% adults have ever used a search engine to
look up their own name or see what
information about them is on the internet
• 47% say they generally assume that people
they meet will search for information about
them on the internet
• When asked if they feel as though their own
efforts to protect the privacy of their personal
information online are sufficient, 61% say they
feel as though they “would like to do more,”
while 37% say they “already do enough.”
• 88% of adults “agree” (49%) or “strongly
agree” (39%) that it would be very difficult to
remove inaccurate information about them
online.
Future public reaction?
Thank you!
Lee Rainie
lrainie@pewinternet.org
@lrainie
@pewinternet
@pewresearch

More Related Content

What's hot

Making Child Welfare More Social: How Social Media Can Influence Child Welfar...
Making Child Welfare More Social: How Social Media Can Influence Child Welfar...Making Child Welfare More Social: How Social Media Can Influence Child Welfar...
Making Child Welfare More Social: How Social Media Can Influence Child Welfar...Brittany Smith
 
Information 2.0 and beyond where are we going
Information 2.0 and beyond  where are we goingInformation 2.0 and beyond  where are we going
Information 2.0 and beyond where are we goingHero Wa
 

What's hot (20)

Teens and Sexting
Teens and SextingTeens and Sexting
Teens and Sexting
 
The New Age of Politics and Media
The New Age of Politics and MediaThe New Age of Politics and Media
The New Age of Politics and Media
 
Social media and civic life
Social media and civic lifeSocial media and civic life
Social media and civic life
 
Digital Politics: Pew Research findings on technology and campaign 2012
Digital Politics: Pew Research findings on technology and campaign 2012Digital Politics: Pew Research findings on technology and campaign 2012
Digital Politics: Pew Research findings on technology and campaign 2012
 
Teens and Social Media: An Overview
Teens and Social Media: An OverviewTeens and Social Media: An Overview
Teens and Social Media: An Overview
 
The state of social media
The state of social mediaThe state of social media
The state of social media
 
The Fourth Digital Revolution
The Fourth Digital RevolutionThe Fourth Digital Revolution
The Fourth Digital Revolution
 
Social Media – Making it Business Relevant
Social Media – Making it Business RelevantSocial Media – Making it Business Relevant
Social Media – Making it Business Relevant
 
News Consumption 2010: Portable, Participatory and Personal
 News Consumption 2010: Portable, Participatory and Personal  News Consumption 2010: Portable, Participatory and Personal
News Consumption 2010: Portable, Participatory and Personal
 
Trends to Watch: News and Information Consumption
Trends to Watch: News and Information ConsumptionTrends to Watch: News and Information Consumption
Trends to Watch: News and Information Consumption
 
Networked: The New Social Operating System in Civic Life
Networked: The New Social Operating System in Civic LifeNetworked: The New Social Operating System in Civic Life
Networked: The New Social Operating System in Civic Life
 
Navigating the New Health Care Delivery System
Navigating the New Health Care Delivery SystemNavigating the New Health Care Delivery System
Navigating the New Health Care Delivery System
 
The new landscape of facts and trust
The new landscape of facts and trustThe new landscape of facts and trust
The new landscape of facts and trust
 
Social networks for parents
Social networks for parentsSocial networks for parents
Social networks for parents
 
’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...
’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...
’How do they even do that?’: How Today’s Technology is Shaping Tomorrow’s Stu...
 
Making Child Welfare More Social: How Social Media Can Influence Child Welfar...
Making Child Welfare More Social: How Social Media Can Influence Child Welfar...Making Child Welfare More Social: How Social Media Can Influence Child Welfar...
Making Child Welfare More Social: How Social Media Can Influence Child Welfar...
 
The State of Facebook
The State of FacebookThe State of Facebook
The State of Facebook
 
Operating in the Age of Always-On Media
Operating in the Age of Always-On MediaOperating in the Age of Always-On Media
Operating in the Age of Always-On Media
 
Information 2.0 and beyond where are we going
Information 2.0 and beyond  where are we goingInformation 2.0 and beyond  where are we going
Information 2.0 and beyond where are we going
 
Information 2.0 and Beyond: Where are we, where are we going?
Information 2.0 and Beyond: Where are we, where are we going?Information 2.0 and Beyond: Where are we, where are we going?
Information 2.0 and Beyond: Where are we, where are we going?
 

Viewers also liked

inTV - Harnessing the power of conversations - infographic
inTV - Harnessing the power of conversations - infographic inTV - Harnessing the power of conversations - infographic
inTV - Harnessing the power of conversations - infographic Belinda Barker
 

Viewers also liked (20)

The Next Digital Disruptions
The Next Digital DisruptionsThe Next Digital Disruptions
The Next Digital Disruptions
 
How Libraries Fit into Community Education Ecosystems
How Libraries Fit into Community Education EcosystemsHow Libraries Fit into Community Education Ecosystems
How Libraries Fit into Community Education Ecosystems
 
How Scientists Engage the Public
How Scientists Engage the PublicHow Scientists Engage the Public
How Scientists Engage the Public
 
Digital Divides – Feeding America
Digital Divides – Feeding AmericaDigital Divides – Feeding America
Digital Divides – Feeding America
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
 
How the public grades libraries – and uses libraries
How the public grades libraries – and uses librariesHow the public grades libraries – and uses libraries
How the public grades libraries – and uses libraries
 
The Changing Digital Landscape: Where Things are Heading
The Changing Digital Landscape: Where Things are HeadingThe Changing Digital Landscape: Where Things are Heading
The Changing Digital Landscape: Where Things are Heading
 
The Puzzles Librarians Need to Solve - Vala 2016
The Puzzles Librarians Need to Solve - Vala 2016The Puzzles Librarians Need to Solve - Vala 2016
The Puzzles Librarians Need to Solve - Vala 2016
 
The Next Library and the People Who Will Use It
The Next Library and the People Who Will Use ItThe Next Library and the People Who Will Use It
The Next Library and the People Who Will Use It
 
Digital Divides 2015
Digital Divides 2015Digital Divides 2015
Digital Divides 2015
 
Digital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance ForumDigital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance Forum
 
Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)
 
Personal. Portable. Participatory. Pervasive.
Personal. Portable. Participatory. Pervasive.Personal. Portable. Participatory. Pervasive.
Personal. Portable. Participatory. Pervasive.
 
The Unmentionables of Health: Caregiving
The Unmentionables of Health: CaregivingThe Unmentionables of Health: Caregiving
The Unmentionables of Health: Caregiving
 
The Rise of the e-Patient
The Rise of the e-PatientThe Rise of the e-Patient
The Rise of the e-Patient
 
inTV - Harnessing the power of conversations - infographic
inTV - Harnessing the power of conversations - infographic inTV - Harnessing the power of conversations - infographic
inTV - Harnessing the power of conversations - infographic
 
Use of digital technology by different income groups
Use of digital technology by different income groupsUse of digital technology by different income groups
Use of digital technology by different income groups
 
Mobile Health in Context: How Information is Woven Into Our Lives
Mobile Health in Context:  How Information is Woven Into Our LivesMobile Health in Context:  How Information is Woven Into Our Lives
Mobile Health in Context: How Information is Woven Into Our Lives
 
Teens & Technology: Understanding the Digital Landscape
Teens & Technology: Understanding the Digital LandscapeTeens & Technology: Understanding the Digital Landscape
Teens & Technology: Understanding the Digital Landscape
 

Similar to Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance

Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaUjjwal Singh
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueMindMake - Parenting & Education
 
internet promotions
internet promotionsinternet promotions
internet promotionsnewvision2
 
Pew internet research report reputation management and social media
Pew internet research report reputation management and social mediaPew internet research report reputation management and social media
Pew internet research report reputation management and social mediaDillard University Library
 
Research: Online reputation management
Research: Online reputation managementResearch: Online reputation management
Research: Online reputation managementMitya Voskresensky
 
Pip reputation management
Pip reputation managementPip reputation management
Pip reputation managementMarketingfacts
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Ipsos UK
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartJorge Borges
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation finLiz Gannes
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1KR_Barker
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for FamiliesSusan Chavez
 
Privacy and Your Digital Footprint
Privacy and Your Digital FootprintPrivacy and Your Digital Footprint
Privacy and Your Digital FootprintStephanieSellan
 
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...soissues
 
FOR RELEASE APRIL 30, 2018 BY Aaron Smith and .docx
FOR RELEASE APRIL 30, 2018 BY Aaron Smith and .docxFOR RELEASE APRIL 30, 2018 BY Aaron Smith and .docx
FOR RELEASE APRIL 30, 2018 BY Aaron Smith and .docxalfred4lewis58146
 

Similar to Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance (20)

Cyber Security Awareness Survey: India
Cyber Security Awareness Survey: IndiaCyber Security Awareness Survey: India
Cyber Security Awareness Survey: India
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Teen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety InstitueTeen Identity Theft Presentation - Family Online Safety Institue
Teen Identity Theft Presentation - Family Online Safety Institue
 
internet promotions
internet promotionsinternet promotions
internet promotions
 
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and PrivacyDo you feel secure online? Beliefs and Attitudes on Security and Privacy
Do you feel secure online? Beliefs and Attitudes on Security and Privacy
 
Pew internet research report reputation management and social media
Pew internet research report reputation management and social mediaPew internet research report reputation management and social media
Pew internet research report reputation management and social media
 
Research: Online reputation management
Research: Online reputation managementResearch: Online reputation management
Research: Online reputation management
 
Pip reputation management
Pip reputation managementPip reputation management
Pip reputation management
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
Teens Strangers Amanda Lenhart
Teens Strangers Amanda LenhartTeens Strangers Amanda Lenhart
Teens Strangers Amanda Lenhart
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation fin
 
Governing as social networking
Governing as social networkingGoverning as social networking
Governing as social networking
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Privacy and Your Digital Footprint
Privacy and Your Digital FootprintPrivacy and Your Digital Footprint
Privacy and Your Digital Footprint
 
Education in the age of fake news and disputed facts
Education in the age of fake news and disputed factsEducation in the age of fake news and disputed facts
Education in the age of fake news and disputed facts
 
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
Teens, Online Stranger Contact & Cyberbullying - What the research is telling...
 
willweeverhaveprivacyonline
willweeverhaveprivacyonlinewillweeverhaveprivacyonline
willweeverhaveprivacyonline
 
FOR RELEASE APRIL 30, 2018 BY Aaron Smith and .docx
FOR RELEASE APRIL 30, 2018 BY Aaron Smith and .docxFOR RELEASE APRIL 30, 2018 BY Aaron Smith and .docx
FOR RELEASE APRIL 30, 2018 BY Aaron Smith and .docx
 

More from Pew Research Center's Internet & American Life Project

More from Pew Research Center's Internet & American Life Project (11)

Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
 
Trust, Facts, Democracy
Trust, Facts, DemocracyTrust, Facts, Democracy
Trust, Facts, Democracy
 
Skills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 FactsSkills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 Facts
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Online Harassment 2017
Online Harassment 2017Online Harassment 2017
Online Harassment 2017
 
10 facts about jobs in the future
10 facts about jobs in the future10 facts about jobs in the future
10 facts about jobs in the future
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
The secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries addressThe secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries address
 
How People Fit Libraries Into Their Lives
How People Fit Libraries Into Their LivesHow People Fit Libraries Into Their Lives
How People Fit Libraries Into Their Lives
 
Knowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of ThingsKnowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of Things
 

Recently uploaded

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 

Recently uploaded (17)

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 

Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance

  • 1. Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance Lee Rainie (@lrainie) Director, Internet, Science, and Technology Research Pew Research Center 1.23.15 Harvard University - “Privacy in a Networked World”
  • 2.
  • 3. 1. Privacy is not binary / context matters
  • 4. 2. Personal control / agency matters
  • 5. 3. Trade-offs are part of the bargain
  • 6. 4. The young are more focused on networked privacy than their elders
  • 7. 5. Many know they do not know what is going on
  • 8. 6. People are growing hopeless and their trust is fading
  • 9. The balance of forces has shifted in the world of networked information that is persistent, scalable, searchable, spreadable … … created and shared by networked individuals ---- The new reality is that people are “public by default and private by effort” -- danah boyd
  • 10. • On a typical day, how much control do you have over information that is collected about you and how it is used? • 47% say “a lot” or “some” • 50% say “not much control” or “no control at all”
  • 12.
  • 13. • 80% of adults “agree” or “strongly agree” that Americans should be concerned about the government’s monitoring of phone calls and internet communications. • 54% of adults have become less confident over time that the surveillance programs are serving the public interest.
  • 14.
  • 15. • Do you think the courts and judges do a good job balancing the public’s right to privacy and the needs of law enforcement and intelligence agencies to collect information for investigations? • Yes - 48% • No – 49%
  • 17.
  • 18. • 68% of internet users believe current laws are not good enough in protecting people’s privacy online and 24% believe current laws provide reasonable protections. • 64% believe the government should do more to regulate advertisers, compared with 34% who think the government should not get more involved.
  • 19. • 55% “agree” or “strongly agree” with the statement: “I am willing to share some information about myself with companies in order to use online services for free.”
  • 20. Knowledge quiz True or False: When a company posts a privacy policy, it ensures that the company keeps confidential all the information it collects on users. • 44% were correct the answer is FALSE • 52% were incorrect • 4% refused to answer
  • 21. Privacy strategies that people don’t know about • 39% don’t know about anonymity software such as Tor • 37% don’t know about using locally- networked communications such as FireChat • 31% don’t know about email encryption • 31% don’t know about privacy enhancing browser plug-ins such as DoNotTrackMe or Privacy Badger
  • 23.
  • 24. How confident are you that your records at these companies will remain safe and private? 76% 69% 66% 61% 57% 56% 55% 54% 50% 46% 0% 10% 20% 30% 40% 50% 60% 70% 80% Online advertisers Social media Search engines Retailers Email provider Cell telephone Government agencies Cable TV Landline telephone Credit card Not too confident / Not at all confident
  • 25. Accessing government data • 37% have done this for Federal government information • 34% have done this for state government information • 32% have done this for local government information • This comes to 67% of adults who used the internet or an app to access government information or data across the three levels of government.
  • 26. Transparency demands • 5% of respondents think the Federal government very effectively shares the data it collects with the general public, with another 39% saying this is done somewhat effectively. • 5% of respondents say their state government very effectively shares data with the general public, with another 44% saying their state does this somewhat effectively. • 7% of respondents say their local government share data very effectively, with another 45% saying this is done somewhat effectively.
  • 28. • 86% of internet users try to be anonymous at least occasionally • 59% do not believe it is possible to be completely anonymous online, while 37% of them believe it is possible.
  • 29. Personal information online % of adult internet users who say this information about them is available online 20% 21% 21% 24% 29% 30% 38% 44% 46% 50% 66% 0% 20% 40% 60% 80% Your political party / affiliation Video of you Your home phone number Your cell number Which groups / orgs you belong to Your home address Things you’ve written using your name Your employer / company you work for Your email address Your birth date A photo of you
  • 30. Who users try to avoid % of adult internet users who say they have used the internet in ways to avoid being observed or seen by … 4% 5% 6% 6% 11% 14% 17% 19% 19% 28% 33% 0% 10% 20% 30% 40% Law enforcement The government Companies / people who run the website you visited Companies / people who might want payment for files you… Employer, supervisor, coworkers Family members or romantic partner People who might criticize / harass you People from your past Certain friends Advertisers Hackers or criminals
  • 31.
  • 32.
  • 33. Young adults are the most likely to have had major problems with personal information and identity 28% 23% 7% 13% 11% 22% 15% 14% 6% 4% 17% 2% 11% 2% 1% 9% 3% 8% 4% 0% 10% 20% 30% Had email or SNS account compromised or taken over without permission Been stalked or harassed online Had important info stolen such as SSN, credit card, bank info Had reputation damaged because of something that happened online Online events led you into physical danger Ages 18-29 Ages 30-49 Ages 50-64 Ages 65+
  • 34. • 62% adults have ever used a search engine to look up their own name or see what information about them is on the internet • 47% say they generally assume that people they meet will search for information about them on the internet
  • 35. • When asked if they feel as though their own efforts to protect the privacy of their personal information online are sufficient, 61% say they feel as though they “would like to do more,” while 37% say they “already do enough.” • 88% of adults “agree” (49%) or “strongly agree” (39%) that it would be very difficult to remove inaccurate information about them online.

Editor's Notes

  1. Title: Sur-veillance, Sous-veillace and Co-veillance Abstract: Personal privacy in the networked age is limited by three dimensions of “veillance.” They shape people’s behavior and their anxieties about the future of privacy. Lee Rainie will present the latest survey findings from the Pew Research Center about how people try to navigate this new environment in their relationship with government, commercial enterprises, and each other. He will also discuss how some technologists are trying to respond.
  2. http://www.danah.org/papers/talks/2010/SXSW2010.html