surveillance   44235

« earlier    

RT : A number of us (inc ) enumerated the many reasons why this sort of is a very bad idea, n…
surveillance  from twitter
5 hours ago by jace
Targeting Ads Without Creeping Out Your Customers
Next, we wanted to see what effect adherence to—or violation of—privacy norms would have on ad performance. So we divided participants in our study into three groups. In a simulation of acceptable, first-person sharing, one group first browsed a website; on that same site we later displayed an ad accompanied by the disclosure “You are seeing this ad based on the products you clicked on while browsing our website.” In a simulation of unacceptable, third-party sharing, another group browsed a website and then visited a second site, where we displayed an ad accompanied by the disclosure “You are seeing this ad based on the products you clicked on while browsing a third-party website.” The final group served as a control; like the other groups, these participants engaged in a browsing task and were then shown a targeted ad, but without a message. In all groups, we measured interest in purchasing the advertised product as well as the likelihood that participants would visit the advertiser’s website. Additionally, to understand how these three ad scenarios affected consumers’ attitudes, we asked all participants which they valued more: the personalization of ads or the privacy of their data.

We found that when unacceptable, third-party sharing had occurred, concerns about privacy outweighed people’s appreciation for ad personalization. Those attitudes in turn predicted interest in purchasing, which was approximately 24% lower in the group exposed to unacceptable sharing than in both the first-party sharing and the control groups—a clear indication of backlash.
We also found that when trust was high, disclosing acceptable flows actually boosted click-through rates. In a set of field experiments, we partnered with Maritz Motivation Solutions, which runs redemption websites for loyalty programs such as airline frequent-flier programs, a context in which consumer trust tends to be high. These sites use the same technology as the large e-commerce sites, except that the currency is points instead of money. In one experiment, when we revealed first-party sharing by telling shoppers that an advertisement was based on their activity on the site, click-through rates increased by 11%, the time spent viewing the advertised product rose by 34%, and revenue from the product grew by 38%.
In a novel experiment, MIT’s Catherine Tucker partnered with a nonprofit that advertised on Facebook. The nonprofit targeted 1.2 million Facebook users with calls to action such as “Help girls in East Africa change their lives through education.” For half those users, the ad was also personalized, openly invoking an attribute that a user had revealed on Facebook. For example, an ad might read, “As a fan of Beyoncé, you know that strong women matter,” if a user had liked the popular singer on Facebook. Midway through this experiment, Facebook instated new privacy features that gave users more control over their personal information (without changing the attributes that advertisers could use to target people). The social media platform allowed people to keep their connections private and to manage their privacy settings more easily. Before this policy change, the personalized ads did not perform particularly well; if anything, users were slightly less likely to click on them than on generic ads. After the change, however, the personalized ads were almost twice as effective as the generic ones. In other words, when consumers are given greater say over what happens with the information they’ve consciously shared, transparently incorporating it can actually increase ad performance.
Revealing why personal data has been used to generate ads can help consumers realize the upside of targeted ads. In one experiment by Tiffany Barnett White of the University of Illinois and her colleagues, a personalized ad by a movie rental company that invoked users’ physical locations backfired, but its performance improved when the copy explained why the physical location was important: The consumer was eligible for a service not available in all places. A commitment to provide justification can also foster appropriate use of data. If you have difficulty coming up with a good reason for the way you use consumers’ data, it should give you pause.
by:LeslieKJohn  by:TamiKim  by:KateBarasz  from:HarvardBusinessReview  marketing  advertising  surveillance  privacy  interesting 
8 hours ago by owenblacker
Yes! Broad support for based export controls on technologies ⏬…
trade  surveillance  humanrights  from twitter_favs
10 hours ago by schee
Against an Increasingly User-Hostile Web -
We're quietly replacing an open web that connects and empowers with one that restricts and commoditizes people. We need to stop it.
computers  Internet  surveillance  privacy 
22 hours ago by tardigrader
It's the (Democracy-Poisoning) Golden Age of Free Speech | WIRED
“The freedom of speech is an important democratic value, but it’s not the only one. In the liberal tradition, free speech is usually understood as a vehicle—a necessary condition for achieving certain other societal ideals: for creating a knowledgeable public; for engendering healthy, rational, and informed debate; for holding powerful people and institutions accountable; for keeping communities lively and vibrant. What we are seeing now is that when free speech is treated as an end and not a means, it is all too possible to thwart and distort everything it is supposed to deliver.”
Zeynep_Tufekci  Wired  2018  free_speech  advertising  Facebook  Google  censorship  surveillance  trust  attention  truth  democracy  regulation 
yesterday by Preoccupations
Artfully asking questions | Exposing the Invisible
!Mediengruppe Bitnik -- a conceptual hacker artist group, on the things they have to consider, like pushing legal boundaries, why they see themselves as artists and not activists: artists can raise questions without answers, activists need the answers
artist  hackers  surveillance  pirate_radio 
yesterday by jcretan
IRIN | Spies Sans Frontières?
A months-long investigation by IRIN into the secretive intelligence-linked firm Palantir, reveals a cosying up to aid organisations large and small, including a bargain-basement contract with a sensitive UN agency, and a flirtation with the international response to the Ebola outbreak.
readinpocket  surveillance 
yesterday by patrick
À combien l’État évalue le coût de la surveillance d'une personne par un FAI ? - Politique - Numerama
Le gouvernement a fait publier au Journal officiel un arrêté fixant le barème destiné à rembourser les fournisseurs d'accès à Internet, les opérateurs et les prestataires de services Internet qui mettent en œuvre, à sa demande, des techniques de renseignement.
surveillance  police  isp  lang:fr  economy  GlobenetSelection  france  intelligence 
yesterday by whilelm
One of the reasons I have dedicated my life to fighting against the mass of people of color.
surveillance  from twitter_favs
2 days ago by mathpunk
Q & A: US Warrantless Surveillance Under Section 702 of the Foreign Intelligence Surveillance Act | Human Rights Watch
This is the kind of stuff that Bellovin would take some exception with, but it's basically what I assume to be true. Some of the links/citations might be helpful.
section_702  surveillance  NSA  FISA  human_rights 
3 days ago by jcretan

« earlier    

related tags

2009  2016.election  2017  2018  351  aadhaar  aaronsw  abuse  academia  adversarial-classification  adversarial  advertising  ai  airbus  algeria  algorithms  amazon  america  android  app  archive  artist  asia  assangejulian  assistant  attention  australia  behavior  bigbrother  bigdata  billboard  biometric  blackpantherparty  breach  bt  bug  businessmodels  by:katebarasz  by:lesliekjohn  by:tamikim  camera  camouflage  canada  cars  cctv  censorship  china  cia  civil/rights/movement  classification  cloud  comcast  communication  communications  computers  congress  consent  control  corporate  corruption  cryptography  customers  cybersecurity  data-dealer  data  database  dc:creator=ceglowskimaciej  dc:creator=scottpeter  dctagged  debt  democracy  detection  digital  discrimination  disguise  dividuum  diy  donaldtrump  dragnet  earthobservation  eavesdropping  echo  economy  education  eff  ellsbergdaniel  encryption  eo  ethics  europe  exploit  face-recognition  face  facebook  facerecognition  facial  fail  fb  fbi  fees  film  fingerprinting  fisa  flaneur  forman/james  france  free_speech  freedom  freespeech  from:harvardbusinessreview  fuck-everything  funding  gafa  garbage  gfw  gifts  globenetselection  google  government  guide  guiyang  hackers  hacks  handover  harassment  heather_dewey-hagborg  highereducation  history  home  homeoffice  human-rights  human_rights  humanrights  identity  image  immigration  india  indiastack  inlink  intelligence  interesting  internet  internetofthings  iot  isp  jamesrisen  journalism  km  lang:de  lang:fr  law  lawenforcement  linkfodder  linux  longread  macos  manningchelsea  marketing  marketisation  media  methodology  methods  microsoft  military  monitoring  morocco  musicindustry  nationalsecurity  native_americans  nazis  net.neutrality  networking  news  nixonrichard  nsa  ofs  opensource  oppression  oregon  otf  overv  ovum  panopticon  personal  pirate_radio  police  police_state  policy  politics  portland  precrime  privacy  privatisation  propaganda  radio  radlib  readinpocket  recognition  reconnaissance  reference  regulation  research  resistance  rights  risks  rubbish  russia  sadiqkhan  satellite  section_702  security  self-driving  sensors  shopping  skype  smartcity  sncc  snowdenedward  social  socialcredit  socialmedia  society  spacenews  spain  spending  spielbergsteven  spotify  spying  stickers  stoneoliver  strategy  students  stuff  syllabus  teachers  tech  technology  tef  terrorism  text  thalesalenia  thepost  toread  trade  trash  trumpdonald  trust  truth  tuitionfees  tvaftertv  uk  universities  us  usa  uspoli  ux  video  vietnam  vision  voice  war  web  whistleblower  whistleblowers  whistleblowing  wikileaks  wired  wishlist  wlan  wot  ww1  youngtoby  zeynep_tufekci 

Copy this bookmark: