Category Archives: Privacy

How Companies Can Learn Your Secrets

Description:  “If we wanted to figure out if a customer is pregnant, even if she didn’t want us to know, can you do that? ”

Source: nytimes.com

Date: Feb 16, 2012

the-incredible-story-of-how-target-exposed-a-teen-girls-pregnancy

As the marketers explained to Pole — and as Pole later explained to me, back when we were still speaking and before Target told him to stop — new parents are a retailer’s holy grail. Most shoppers don’t buy everything they need at one store. Instead, they buy groceries at the grocery store and toys at the toy store, and they visit Target only when they need certain items they associate with Target — cleaning supplies, say, or new socks or a six-month supply of toilet paper. But Target sells everything from milk to stuffed animals to lawn furniture to electronics, so one of the company’s primary goals is convincing customers that the only store they need is Target. But it’s a tough message to get across, even with the most ingenious ad campaigns, because once consumers’ shopping habits are ingrained, it’s incredibly difficult to change them.  READ REST OF STORY 

 Questions for discussion:

  1.  Are there any ethical dilemmas to using big data in consumer services?
  2. What other commercial applications can you see for organizations in using big data?
  3. What skill would you need to be able to use Big Data in an organization that you work for?

Your Secrets Companies Can Learn

Description:  “If we wanted to figure out if a customer is pregnant, even if she didn’t want us to know, can you do that? ”

Source: nytimes.com

Date: Feb 16, 2012

the-incredible-story-of-how-target-exposed-a-teen-girls-pregnancy

As the marketers explained to Pole — and as Pole later explained to me, back when we were still speaking and before Target told him to stop — new parents are a retailer’s holy grail. Most shoppers don’t buy everything they need at one store. Instead, they buy groceries at the grocery store and toys at the toy store, and they visit Target only when they need certain items they associate with Target — cleaning supplies, say, or new socks or a six-month supply of toilet paper. But Target sells everything from milk to stuffed animals to lawn furniture to electronics, so one of the company’s primary goals is convincing customers that the only store they need is Target. But it’s a tough message to get across, even with the most ingenious ad campaigns, because once consumers’ shopping habits are ingrained, it’s incredibly difficult to change them.  READ REST OF STORY 

 Questions for discussion:

  1.  Are there any ethical dilemmas to using big data in consumer services?
  2. What other commercial applications can you see for organizations in using big data?
  3. What skill would you need to be able to use Big Data in an organization that you work for?

Can Companies Learn Your Secrets

Description:  “If we wanted to figure out if a customer is pregnant, even if she didn’t want us to know, can you do that? ”

Source: nytimes.com

Date: Feb 16, 2012

the-incredible-story-of-how-target-exposed-a-teen-girls-pregnancy

As the marketers explained to Pole — and as Pole later explained to me, back when we were still speaking and before Target told him to stop — new parents are a retailer’s holy grail. Most shoppers don’t buy everything they need at one store. Instead, they buy groceries at the grocery store and toys at the toy store, and they visit Target only when they need certain items they associate with Target — cleaning supplies, say, or new socks or a six-month supply of toilet paper. But Target sells everything from milk to stuffed animals to lawn furniture to electronics, so one of the company’s primary goals is convincing customers that the only store they need is Target. But it’s a tough message to get across, even with the most ingenious ad campaigns, because once consumers’ shopping habits are ingrained, it’s incredibly difficult to change themREAD REST OF STORY 

 Questions for discussion:

  1.  Are there any ethical dilemmas to using big data in consumer services?
  2. What other commercial applications can you see for organizations in using big data?
  3. What skill would you need to be able to use Big Data in an organization that you work for?

A ‘model’ employee outsource his software job to China

Description: Bob was his company’s best software developer, got glowing performance reviews and earned more than $250,000 a year.

Source: www.theglobeandmail.com

Date: Jan 17, 2013

future-IT17sr1

Bob was paying a Chinese firm about $50,000 a year to do his work, then spent the day surfing the web, watching cat videos and updating his Facebook page.

“This particular case was pretty unique,” computer security investigator Andrew Valentine, who helped uncover Bob’s scheme, said in an e-mail to The Globe and Mail. “We thought it was actually pretty clever.”

Mr. Valentine made Bob’s tale public in a blog post on Monday and it has since been the talk of tech websites.    Read Rest of Story 

 Questions for discussion:

1. Is there an ethical dilemma in what Bob was doing at his place of work?  Why or Why Not??

2.  What benefits can you see with outsourcing as a company?

3.  What pitfalls can you see a company risking by outsourcing?

How could a ‘model’ employee outsource his software job to China

Description: Bob was his company’s best software developer, got glowing performance reviews and earned more than $250,000 a year.

Source: www.theglobeandmail.com

Date: Jan 17, 2013

future-IT17sr1

Bob was paying a Chinese firm about $50,000 a year to do his work, then spent the day surfing the web, watching cat videos and updating his Facebook page.

“This particular case was pretty unique,” computer security investigator Andrew Valentine, who helped uncover Bob’s scheme, said in an e-mail to The Globe and Mail. “We thought it was actually pretty clever.”

Mr. Valentine made Bob’s tale public in a blog post on Monday and it has since been the talk of tech websites.    Read Rest of Story 

 Questions for discussion:

1. Is there an ethical dilemma in what Bob was doing at his place of work?  Why or Why Not??

2.  What benefits can you see with outsourcing as a company?

3.  What pitfalls can you see a company risking by outsourcing?

You’re Not Just The Product, You’re The Ads (And Your Friends Should Thank You)

Description:  Word of mouth, sponsored. Trusted recommendations, promoted. Reviews from friends, endorsed. This is the new lexicon of advertising.

Source: techcrunch.com

Date: Oct 10, 2013

twitter-money

Facebook pioneered this social advertising model in 2011 with its “Sponsored Stories” ad units. Facebook’s filtered News Feed only shows you the most important posts about your friends. But if you Like a brand’s Page or post, check in at a business, download or use an app, or share a link, advertisers can pay to boost that action’s visibility in the feed or have it appear in sidebar ads.

Twitter has social ads too. Its “Promoted Tweets” show posts from businesses you don’t follow. To show these businesses are reputable and relevant the ads show the names of people you follow who follow that business. A Promoted Tweet from HP in my stream mentions three accounts I follow that follow it. Twitter doesn’t use your face, words, or content in its ads, though, and the social context is much less prominent than on Google and Facebook.

Combing social signals with advertising makes marketing seem less generic, which is important considering how many ads we see on a daily basis.  READ REST OF STORY 

 

Questions for discussion:

1. “Without ads, services like Google, Facebook, and Twitter might have to charge.”  Do you agree with this statement?  Why or Why not?

2.  What are the downsides of “you: becoming the ads?

Email Not as Private as you may think?

Description: Some of the free providers of e-mail frequently scan e-mail for keywords, but one company is working to make e-mail more secure.

Source: cnn.com

Date: Aug 21, 2013

 

Questions for discussion:

1. How would you describe to someone why email is not secure and private?

2.  What can an individual do to make thier email more secure and private?