(12) United States Patent (10) Patent No.: US 8,549,651 B2 Callahan Et Al

Total Page:16

File Type:pdf, Size:1020Kb

(12) United States Patent (10) Patent No.: US 8,549,651 B2 Callahan Et Al USOO8549651 B2 (12) United States Patent (10) Patent No.: US 8,549,651 B2 Callahan et al. (45) Date of Patent: Oct. 1, 2013 (54) DETERMINING ATRUST LEVEL INA 2002, 0046243 A1 4/2002 Morris et al. SOCIAL NETWORKENVIRONMENT 2002/0059201 A1 5, 2002 Work 2003/0061503 A1 3/2003 Katz et al. 2003. O145093 A1 7, 2003 Oren (75) Inventors: Ezra Callahan, Palo Alto, CA (US); 2003,0222918 A1 12/2003 Coulthard Aditya Agarwal, San Francisco, CA 2003,0225632 A1 12/2003 Tong (US); Charlie Cheever, Palo Alto, CA 2004/0003283 A1 1/2004 Goodman et al. ............ T13 201 2004.0024846 A1 2/2004 Randall (US); Chris Putnam, Palo Alto, CA 2004/OO88177 A1 5, 2004 Travis (US); Bob Trahan, Palo Alto, CA (US) 2004/O148275 A1 7/2004 Achlioptas 2005, OO15488 A1 1/2005 Bayyapu (73) Assignee: Facebook, Inc., Menlo Park, CA (US) 2005/0O21750 A1 1/2005 Abrams 2005/0097319 A1* 5, 2005 Zhu et al. ...................... T13,166 (*) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 (Continued) U.S.C. 154(b) by 901 days. OTHER PUBLICATIONS (21) Appl. No.: 11/701,595 Flores, Fernando et al. "Computer systems and the design of organi zational interaction.” In ACM Transactions on Information Systems (22) Filed: Feb. 2, 2007 (TOIS), vol. 6, Issue 2, Apr. 1988. (65) Prior Publication Data (Continued) US 2008/O1897.68 A1 Aug. 7, 2008 Primary Examiner — Gilberto Barron, Jr. Assistant Examiner — David Le (51) Int. C. (74) Attorney, Agent, or Firm — Fenwick & West LLP G06F2L/00 (2013.01) (52) U.S. C. (57) ABSTRACT USPC ............................................. 726/26; 705/319 A system and method for determining a trust level for a (58) Field of Classification Search non-approved user in a social network is described. The USPC ...................................................... 707/9, 102 method includes monitoring requests for social network See application file for complete search history. interactions between an approved user and the non-approved (56) References Cited user and determining if each interaction requested is of a first type or a second type. The method further includes increasing U.S. PATENT DOCUMENTS a first trust value when the interaction requested is of the first 5.937,413 A 8/1999 Hyun type and increasing a second trust value when the interaction 6,029,141 A 2/2000 Bezos requested is of the second type. The method further includes 7,013,292 B1 3, 2006 HSu determining the trust level based on the first trust value and 7,249,123 B2 7, 2007 Elder the second trust value. The method further includes changing 7,269,590 B2 9, 2007 Hull the status of the non-approved user to an approved user based 7,353,199 B1 4/2008 DiStefano 7,802,290 B1 9, 2010 Bansal et al. on the trust level, the first trust value and/or the second trust 2001/0037721 A1 1 1/2001 Hasegawa value. 2002fOO 19739 A1 2, 2002 Juneau et al. 2002fOO29350 A1 3/2002 Cooper et al. 29 Claims, 6 Drawing Sheets - so 402 Receive Request From Approved User For Interaction With Non-approved User 4.08 44 Is Request Determine First Type First Trust Walue Request? Non-Approved User 4. 408 - a Is Request Yes Determine Second Ty Second Trust Walue E. Non-Approved User 412 Determire Trust Level 414 Set Approved User Flag Change Status To AEEvedSet US 8,549,651 B2 Page 2 (56) References Cited U.S. Appl. No. 1 1/713,455, filed Feb. 28, 2007, Jed Stremel, Systems and Methods for Automatically Locating Web-Based Social Network U.S. PATENT DOCUMENTS Members. 2005, 0108520 A1 5, 2005 Yamamoto et al. U.S. Appl. No. 1 1/701,566, filed Feb. 2, 2007, Jed Stremel, System 2005/O114759 A1 5, 2005 Williams and Method for Automatic Population of a Contact File with Contact 2005. O154639 A1 7/2005 Zetmeir Content and Expression Content. 2005/O15997O A1 7/2005 Buyukkokten U.S. Appl. No. 1 1/502,757, filed Aug. 11, 2006, Andrew Bosworth, 2005/0171799 A1 8, 2005 Hull Systems and Methods for Generating Dynamic Relationship-Based 2005/0171955 A1 8, 2005 Hull Content Personalized for Members of a Web-Based Social Network. 2005/0177385 A1 8, 2005 Hull U.S. Appl. No. 1 1/503,093, filed Aug. 11, 2006, Andrew Bosworth, 2005/O197846 A1 9, 2005 Pezaris Systems and Methods for Measuring User Affinity in a Social Net 2005, 0198020 A1 9, 2005 Garland work Environment. 2005, 0198031 A1* 9, 2005 Pezaris et al. ..................... 707/9 U.S. Appl. No. 1 1/503,037, filed Aug. 11, 2006, Mark Zuckerberg, 2005/O198305 A1 9, 2005 Pezaris 2005/02O3807 A1 9, 2005 Bezos Systems and Methods for Providing Dynamically Selected Media 2005/0216300 A1 9/2005 Appelman Content to a User of an Electronic Device in a Social Network 2005/0216550 A1 9, 2005 Paseman Environment. 2005/0235062 A1* 10, 2005 Lunt et al. ..................... 709,225 U.S. Appl. No. 1 1/503.242, filed Aug. 11, 2006, Mark Zuckerberg, 2005/0256756 A1 11, 2005 Lam System and Method for Dynamically Providing a News Feed About 2005/0289650 A1* 12/2005 Kalogridis ...................... 726/22 a User of a Social Network. 2006,0041543 A1 2/2006 Achlioptas U.S. Appl. No. 1 1/499,093, filed Aug. 2, 2006, Mark Zuckerberg, 2006, OO42483 A1 3, 2006 Work Systems and Methods for Dynamically Generating Segmented Com 2006,0048059 A1 3, 2006 Etkin munity Flyers. 2006, OO52091 A1 3/2006 Onyon U.S. Appl. No. 1 1/580,210, filed Oct. 11, 2006, Mark Zuckerberg, 2006, 0080613 A1 4/2006 Savant System and Method for Tagging Digital Media. 2006/0085419 A1 4/2006 Rosen U.S. Appl. No. 1 1/893,493, filed Aug. 15, 2007, Arieh Steinberg, 2006, O136419 A1 6/2006 Brydon 2006.0143183 A1 6/2006 Goldberg Web-Based Social Network Badges. 2006, O161599 A1 7/2006 Rosen U.S. Appl. No. 1 1/982,974, filed Nov. 5, 2007, Ruchi Sanghvi, Sys 2006, O184617 A1 8, 2006 Nicholas tems and Methods for a Web-Based Social Networking Environment 2006/0184997 A1* 8, 2006 La Rotonda et al. ............. 726/2 Integrated Within One or More Computing and/or Networking Appli 2006, O190281 A1 8, 2006 Kott cations. 2006, O194186 A1 8, 2006 Nanda .S. Appl. No. 1 1/726,962, filed Mar. 23, 2007, Charlie Cheever, 2006/0218225 A1 9, 2006 Hee Voon ystem and Method for Confirming an Association in a Web-Based 2006/0229063 A1 10, 2006 Koch ocial Network. 2006/0230061 A1 10/2006 Sample .S. Appl. No. 1 1/701,744, filed Feb. 2, 2007, Andrew Bosworth, 2006, O24794.0 A1 11, 2006 Zhu ystem and Method for Curtailing Objectionable Behavior in a Web 2006/0248573 A1 11, 2006 Pannu ased Social Network. 2006/0256008 A1 1 1/2006 Rosenberg 2006/0265227 A1 11/2006 Sadamura .S. Appl. No. 1 1/796, 184, filed Apr. 27, 2007, Jared S. Morgenstern, 2006,029.3976 A1 12, 2006 Nam ystem and Method for Giving Gifts and Displaying Assets in a 2007/OOO5683 A1 1/2007 Omidyar ocial Network Environment. 2007/0043947 A1* 2/2007 Mizikovsky et al. ......... 713, 172 .S. Appl. No. 1 1/893.797, filed Aug. 16, 2007, Yun-Fang Juan, 2007/0061405 A1 3/2007 Keohane et al. ystem and Method for Invitation Targeting in a Web-Based Social 2007/OO99609 A1 5, 2007 Cai Network. 2007/0174389 A1 7/2007 Armstrong U.S. Appl. No. 1 1/893,820, filed Aug. 16, 2007, Yun-Fang Juan, 2007/0179905 A1* 8, 2007 Buch et al. ...................... 705/75 Systems and Methods for Keyword Selection in a Web-Based Social 2007/0208613 A1 9, 2007 Backer Network. 2007/0208916 A1 9, 2007 Tomita U.S. Appl. No. 1 1/899,426, filed Sep. 5, 2007, Jared Morgenstem, 2007/0282987 A1 12/2007 Fischer ystemand Method for Collectively Giving Gifts in a SocialNetwork 2008.0005076 A1 1/2008 Payne nvironment. 2008, OO 10343 A1 1/2008 Escaffi 2008/0033776 A1 2/2008 Marchese .S. Appl. No. 12/072,003, filed Feb. 21, 2008, Arieh Steinberg, 2008, OO40428 A1 2, 2008 Wei ystems and Methods for Implementation of a Structured Query 2008/0059992 A1 3/2008 Amidon et al. anguage Interface in a Distributed Database Environment. 2008.007O697 A1 3/2008 Robinson .S. Appl. No. 12/077,070, filed Mar. 13, 2008, Dave Fetterman, 2008.OO77581 A1 3/2008 Drayer et al. ystems and Methods for Network Authentication. 2008, OO864.58 A1 4/2008 Robinson .S. Appl. No. 12/154,504, filed May 23, 2008, Adam D'Angelo, 2008. O115226 A1 5/2008 Welingkar et al. ersonalized Platform for Accessing Internet Applications. .S. Appl. No. 12/156,091, filed May 28, 2008, Mark Zuckerberg, OTHER PUBLICATIONS ystems and Methods for Auction Based Polling. Chipin. Chiplin: The easy way to collect money online). Dec. 15. .S. Appl. No. 12/151,734, filed May 7, 2008, Jared Morgenstem, 2006 http://web.archive.org/web/20061215090739/www.chipin. systems and Methods for Classified Advertising in an Authenticated com/overview. Web-Based Social Network. Parzek. E. Social Networking to Chipln to a Good Cause online). U.S. Appl. No. 12/154,886, filed May 27, 2008, Nico Vera, Systems Business Design Studio, Jun. 29, 2006 http://www. and Methods for Providing Privacy Settings for Applications Asso businessdesignstudio.com/resources/blogger/2006/06 social-net ciated with a User Profile. working-tochipin-to-good.html. U.S. Appl. No. 60/965,624, filed Aug. 20, 2007, Adam D'Angelo, U.S.
Recommended publications
  • Computer Engineer Ruchi Sanghvi
    STEM TRAILBLAZER BIOS COMPUTER ENGINEER RUCHI SANGHVI THIS PAGE LEFT BLANK INTENTIONALLY STEM TRAILBLAZER BIOS COMPUTER ENGINEER RUCHI SANGHVI LAURA HAMILTON WAXMAN Lerner Publications Minneapolis For Caleb, my computer wizard Copyright © 2015 by Lerner Publishing Group, Inc. All rights reserved. International copyright secured. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, photocopying, recording, or otherwise—without the prior written permission of Lerner Publishing Group, Inc., except for the inclusion of brief quotations in an acknowledged review. Lerner Publications Company A division of Lerner Publishing Group, Inc. 241 First Avenue North Minneapolis, MN 55401 USA For reading levels and more information, look up this title at www.lernerbooks.com. Content Consultant: Robert D. Nowak, PhD, McFarland-Bascom Professor in Engineering, Electrical and Computer Engineering, University of Wisconsin–Madison Library of Congress Cataloging-in-Publication Data Waxman, Laura Hamilton. Computer engineer Ruchi Sanghvi / Laura Hamilton Waxman. pages cm. — (STEM trailblazer bios) Includes index. ISBN 978–1–4677–5794–2 (lib. bdg. : alk. paper) ISBN 978–1–4677–6283–0 (eBook) 1. Sanghvi, Ruchi, 1982–—Juvenile literature. 2. Computer engineers—United States— Biography—Juvenile literature. 3. Women computer engineers—United States—Biography— Juvenile literature. I. Title. QA76.2.S27W39 2015 621.39092—dc23 [B] 2014015878 Manufactured in the United States of America 1 – PC – 12/31/14 The images in this book are used with the permission of: picture alliance/Jan Haas/Newscom, p. 4; © Dinodia Photos/Alamy, p. 5; © Tadek Kurpaski/flickr.com (CC BY 2.0), p.
    [Show full text]
  • Coders-Noten.Indd 1 16-05-19 09:20 1
    Noten coders-noten.indd 1 16-05-19 09:20 1. DE SOFTWARE-UPDATE DIE DE WERKELIJKHEID HEEFT VERANDERD 1 Adam Fisher, Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom, (New York: Twelve, 2017), 357. 2 Fisher, Valley of Genius, 361. 3 Dit segment is gebaseerd op een interview van mij met Sanghvi, en op verscheidene boeken, artikelen en video’s over de begindagen van Facebook, waaronder: Daniela Hernandez, ‘Facebook’s First Female Engineer Speaks Out on Tech’s Gender Gap’, Wired, 12 december 2014, https://www.wired.com/2014/12/ruchi-qa/; Mark Zucker berg, ‘Live with the Original News Feed Team’, Facebookvideo, 25:36, 6 september 2016, https://www.facebook.com/zuck/ videos/10103087013971051; David Kirkpatrick, The Facebook Effect: The Inside Story of the Company That Is Connecting the World (New York: Simon & Schuster, 2011); INKtalksDirector, ‘Ruchi Sanghvi: From Facebook to Facing the Unknown’, YouTube, 11:50, 20 maart 2012, https://www.youtube.com/watch?v=64AaXC00bkQ; TechCrunch, ‘TechFellow Awards: Ruchi Sanghvi’, TechCrunch-video, 4:40, 4 maart 2012, https://techcrunch.com/video/techfellow-awards-ruchi- coders-noten.indd 2 16-05-19 09:20 sanghvi/517287387/; FWDus2, ‘Ruchi’s Story’, YouTube, 1:24, 10 mei 2013, https://www.youtube.com/watch?v=i86ibVt1OMM; alle video’s geraadpleegd op 16 augustus 2018. 4 Clare O’Connor, ‘Video: Mark Zucker berg in 2005, Talking Facebook (While Dustin Moskovitz Does a Keg Stand)’, Forbes, 15 augustus 2011, geraadpleegd op 7 oktober 2018, https://www.forbes.com/sites/ clareoconnor/2011/08/15/video-mark-Zucker berg-in-2005-talking- facebook-while-dustin-moskovitz-does-a-keg-stand/#629cb86571a5.
    [Show full text]
  • Two Cheers for Corporate Experimentation: the A/B Illusion and the Virtues of Data-Driven Innovation
    MEYER FINAL.DOCX (DO NOT DELETE) 5/7/15 10:47 PM TWO CHEERS FOR CORPORATE EXPERIMENTATION: THE A/B ILLUSION AND THE VIRTUES OF DATA-DRIVEN INNOVATION MICHELLE N. MEYER* INTRODUCTION: TWO FRAMES FOR THINKING ABOUT CORPORATE EXPERIMENTATION ...................................................................................... 274 I. BACKGROUND TO THE FACEBOOK EXPERIMENT ............................................. 279 A. Facebook’s Algorithmic News Feed Practice ............................ 279 B. The Emotional Valence of News Feed Posts .............................. 282 C. Four Hypotheses about the Effects of News Feed .................... 283 D. The Facebook “Emotional Contagion” Experiment ................ 285 II. FRAME ONE: HUMAN SUBJECTS RESEARCH ................................................ 287 A. Subjects Gave No Ethically Meaningful Consent to the Experiment ......................................................................................... 288 B. Why Consent Is Not Always an Ethical Requirement of Human Subjects Research ............................................................ 292 C. Was Informed Consent an Ethical Requirement of the Facebook Experiment? ................................................................... 298 1. Infeasibility ................................................................................... 298 2. Incompletely Informed Consent .......................................... 298 3. Debriefing ...................................................................................... 300 4. Minimal
    [Show full text]
  • A COUNTERFACTUAL ANALYSIS of GOOGLE and FACEBOOK PRIVACY INCIDENTS Ira S
    PRIVACY BY DESIGN: A COUNTERFACTUAL ANALYSIS OF GOOGLE AND FACEBOOK PRIVACY INCIDENTS Ira S. Rubinstein † & Nathaniel Good †† ABSTRACT Regulators here and abroad have embraced “privacy by design” as a critical element of their ongoing revision of current privacy laws. The underlying idea is to “build in” privacy— in the form of Fair Information Practices or (“FIPs”)—when creating software products and services. But FIPs are not self-executing. Rather, privacy by design requires the translation of FIPs into engineering and usability principles and practices. The best way to ensure that software includes the broad goals of privacy as described in the FIPs and any related corporate privacy guidelines is by including them in the definition of software “requirements.” And a main component of making a specification or requirement for software design is to make it concrete, specific, and preferably associated with a metric. Equally important is developing software interfaces and other visual elements that are focused around end-user goals, needs, wants, and constraints. This Article offers the first comprehensive analysis of engineering and usability principles specifically relevant to privacy. Based on a review of the technical literature, it derives a small number of relevant principles and illustrates them by reference to ten recent privacy incidents involving Google and Facebook. Part I of this Article analyzes the prerequisites for undertaking a counterfactual analysis of these ten incidents. Part II presents a general review of the design principles relevant to privacy. Part III turns to ten case studies of Google and Facebook privacy incidents, relying on the principles identified in Part II to discover what went wrong and what the two companies might have done differently to avoid privacy violations and consumer harms.
    [Show full text]
  • </Coding in Python>
    </Coding_In_Python> Lex Smirnow Table of Contents Introduction ……………………………………………………………………….. 3 ​ Chapter 1: The Recent History of Coding…………………………………….…....4 ​ ​ Chapter 2: The Creation of Python …………………………………………….…..6 ​ ​ Chapter 3: The Appeal of Python.………………………………………………….8 ​ ​ Chapter 4: Who is Guido Van Rossum?…………………………………………. 10 ​ Chapter 5: Python in the World of Coding………………………………………. 11 ​ ​ ​ Conclusion……………………………………………………………………….. 12 ​ ​ Works and Images Cited ………………………………………………………… 13 ​ 2 Introduction Python is a topic that has recently interested me, and that I found fascinating. My father had been using Python for most of his career and had a chance to work with Guido Van Rossum, creator of Python. What had started out as an interest quickly grew into a passion. Soon after I began my expert project my father started teaching me how to code in Python. From here my interest grew to a desire to participate in the annual Python convention known as PyCon. I also made a poster proposal for PyCon and to my surprise the proposal was accepted. All of this has snowballed into me having invested hundreds of hours into Python and learning to code. I am glad that I decided to research Python for my expert topic. It is something that I feel indescribably passionate about. 3 Chapter 1: The Recent History of Coding Mary Allen Wilkes wanted to be something completely unrelated from a coder. Mary wanted to be a trial lawyer and ended up becoming one after she finished being a software engineer. Her teacher suggested to Mary that she should get into the software development field. Once Mary was a software engineer she, and a few others, were tasked with building the world's first personal computer called the Laboratory INstrument Computer (LINC).
    [Show full text]
  • Were We Destined to Live in Facebook's World?
    TECHNOLOGY Were We Destined to Live in Facebook’s World? The author of a new book, Antisocial Media, discusses whether the rise of Facebook was inevitable. ALEXIS C. MADRIGAL JUL 24, 2018 Mark Zuckerberg leaving a meeting with French President Emmanuel Macron. (REUTERS/CHRISTIAN HARTMANN) More than 2 billion people have come to accept that Facebook is, more or less, what a social network is. Its highly particular and historically contingent bundle of features and applications has become the yardstick by which all other networks (outside China) are measured. But was this Facebook inevitable, or have the company and its users simply fallen into this particular configuration? For example, Facebook began as a simple desktop website in which people could connect to friends in a small number of universities through MySpace-like profiles. But then came the News Feed in 2006, which collected and ranked the different things your friends were doing (like posting new pictures or breaking up). People hated it, even according to the engineers who worked on it. “A lot of folks wanted us to shut News Feed down. And most other companies would have done precisely that, especially if 10% of their users threatened to boycott the product,” recalled Ruchi Sanghvi, an engineer on the original team, in 2016. They didn’t, though, because as Sanghvi explained, to their minds it “was actually working.” “Amidst all the chaos, all the outrage, we noticed something unusual,” she wrote on her Facebook page. “Even though everyone claimed they hated it, engagement had doubled.” The “feed” format spread far and wide.
    [Show full text]
  • My Culture Day Activity Booklet
    My Culture Day Activity Booklet Click on the link for an introduction to My Culture Day: https://youtu.be/1NgpMQnf71M Name: Theme: Divided but United Together/Apart You will use this booklet throughout ‘My Culture Day’, completing the different activities /challenges and sharing your work through SMHW. If you want, you can join in and see what everyone else is up to by sharing* what you do during the day via the school’s twitter: @northacad #mycultureday *Please check with a parent/guardian before uploading any pictures of yourself on social media The aim of the day is for you to celebrate your own culture whilst learning about and celebrating other cultures too! It’s also a day for our whole school community to come together and share our experiences even though we’re apart during school closures. Contents: Part One – Making a Difference • Taking care of me • Caring for my family and friends/my planet/my community Part Two – One World Together • Food from around the world • Literature from around the world • Cultural figures from around the world *Don’t forget to check out the school’s website for videos of different staff members sharing experiences from their own cultures! Enjoy the day! You can access the complete PowerPoint for these activities on ShowMyHomework or the school website on the ‘My Culture Day’ page! See link here: https://youtu.be/HR_I4ARJ5-4 Or Or PDF :https://www.northampton- academy.org/Portals/0/Documents/My%20Culture%20Day%202020/Part%201%20Activities/Make%20a%20Difference%20at%20Home%20Challenge%20 Presentation.pdf Once you’ve chosen your Challenge Task, look at the PowerPoint for step-by-step instructions! Then complete the reflection below: Food from Around the World Recipe 1: Goulash Country of Origin: Hungary This is what it should look like! Serves 6 Research Task: Prep time 20 minutes What can you find out about Hungary? Cooking time 2 hours What language do they speak? What’s their and 35 minutes weather like? What other dishes are popular here? Create a fact file! Ingredients: Method: 1kg good braising steak, preferably chuck 1.
    [Show full text]
  • Ruchi Sanghvi and Aditya Agarwal Drafted a Family Mission Statement
    in On a recent jaunt through Italy, Ruchi Sanghvi and Aditya Agarwal drafted a family mission statement. Dedicated to their soon-to-arrive child (their son Avyan was born in October), the parents-to-be applied some Silicon Valley muscle—he’s the vice president of engineering at the file-sharing behemoth Drop- box; she was Facebook’s first fe- NET WORTH male engineer who is now explor- Sanghvi and Agarwal RD first met asO engineering ing the venture capital scene—to o the decidedly more chaotic world of M F students at Carnegie To Mellon University parenting. Though Lake Como and ES, Sho its languid shores aren’t exactly as- . S sociated with industrious behav- O iour, the two devoted nearly five STUDI hours to a “robust discussion,” be- CNE A fore settling on seven ironclad val- , ues. Among them were “compete . JEANS o with yourself” and “always think AM g from first principles.” FERRA RE It’s compliCATED O If their tenacious approach to child- SALVAT rearing sounds like it was plucked ELT, B from a start-up’s strategy plan, it’s . ATM , not entirely accidental. “Ruchi IRT H loves being intentional,” Aggarwal S VIN. says. “We’ve been working together N A longer than we’ve been dating,” re- L veals Sanghvi, referring to their 16-year-old connection that began DITYA: JACKET, JACKET, DITYA: in the labs at Carnegie Mellon Uni- A versity, where Agarwal embarked on a steadfast two-year pursuit af- SSI. ON Ro ter first spotting Sanghvi (“a vision o in white trackpants and a purple sweatshirt”).
    [Show full text]
  • PRIVACY by DESIGN: a COUNTERFACTUAL ANALYSIS of GOOGLE and FACEBOOK PRIVACY INCIDENTS Ira S
    PRIVACY BY DESIGN: A COUNTERFACTUAL ANALYSIS OF GOOGLE AND FACEBOOK PRIVACY INCIDENTS Ira S. Rubinstein † & Nathaniel Good †† ABSTRACT Regulators here and abroad have embraced “privacy by design” as a critical element of their ongoing revision of current privacy laws. The underlying idea is to “build in” privacy— in the form of Fair Information Practices or (“FIPs”)—when creating software products and services. But FIPs are not self-executing. Rather, privacy by design requires the translation of FIPs into engineering and usability principles and practices. The best way to ensure that software includes the broad goals of privacy as described in the FIPs and any related corporate privacy guidelines is by including them in the definition of software “requirements.” And a main component of making a specification or requirement for software design is to make it concrete, specific, and preferably associated with a metric. Equally important is developing software interfaces and other visual elements that are focused around end-user goals, needs, wants, and constraints. This Article offers the first comprehensive analysis of engineering and usability principles specifically relevant to privacy. Based on a review of the technical literature, it derives a small number of relevant principles and illustrates them by reference to ten recent privacy incidents involving Google and Facebook. Part I of this Article analyzes the prerequisites for undertaking a counterfactual analysis of these ten incidents. Part II presents a general review of the design principles relevant to privacy. Part III turns to ten case studies of Google and Facebook privacy incidents, relying on the principles identified in Part II to discover what went wrong and what the two companies might have done differently to avoid privacy violations and consumer harms.
    [Show full text]
  • Exploiting My Peruvian Friend How Mark Zuckerberg, Joe Green, and FWD.Us Lie and Accelerate the Brain Drain from South America
    Summer 2014 The Social Contract Exploiting My Peruvian Friend How Mark Zuckerberg, Joe Green, and FWD.us lie and accelerate the brain drain from South America BY STUART H. HURLBERT mmediately below is a letter from a Peruvian two jobs to pay for school, but that was nothing com- would-be immigrant broadcast by FWD.us on April pared to what came next. I3, 2014. Below that is my response to this new Peru- After graduation, I had only one year to stay and vian friend, and then a look at a January 30 message work. I made the most of the time by earning the Apple from FWD.us to the U.S. Congress, and finally, below WWDC scholarship and launching my first startup, that a description of how FWD.us president Joe Green inClass. But that didn’t matter with my visa deadline disported himself, defaming opponents of open borders looming in May 2011. immigration at a meeting in San Diego, California on Thankfully, I was able to get a 17-month STEM July 26, 2013. extension on my visa and continued working to grow The major objective of FWD.us is, in a nutshell, to my company. My product reached close to 3 million stu- massively increase the number of foreign hi tech work- dents around the world with the goal of helping every ers given permanent residency in the U.S., starting with student stay more organized in school. expanded quotas for H-1B visas. Unwittingly, FWD. After successfully starting inClass, I moved on us also supports, via so-called “comprehensive immi- to chase a bigger fish.
    [Show full text]
  • Silicon Valley Tiene Poder, Dinero E Inversores Dispuestos a SILICON Que Cualquiera Pueda Terminar Econvirtiéndose En Mark Zuckerberg O En Larry Ellison
    FUN&PLEASURE EL ÉXITO FEMENINO EXISTE Es lo que han querido transmitir las periodistas Insiyah Saeed y Nora Poggi en su documental She Started It (Ella empezó), que gra- baron el año pasa- do con el objetivo de dar visibilidad a los referentes feme- ninos en el mundo de la tecnología. MUJERES EN n este pequeño oasis situado en el valle de Santa Clara, al sur de San Francisco, no es oro todo lo que reluce. Silicon Valley tiene poder, dinero e inversores dispuestos a SILICON que cualquiera pueda terminar Econvirtiéndose en Mark Zuckerberg o en Larry Ellison. ¿Milagro o realidad? Sim- plemente, que recibe cerca de un tercio VALLEY del total de la inversión de capital riesgo en Estados Unidos y, con eso, todos son NO TODO aplausos. Sin embargo hay algo que llama poderosamente la atención y es el bajo SIGUE IGUAL número de mujeres que trabaja en esta meca dorada de la tecnología. Así nos lo Sólo una de cada diez empresas allí explica la periodista Nora Poggi, coautora están lideradas por mujeres y es normal que del documental She Started It y que nos estén solas en las juntas de accionistas. confirma que Silicon Valley tiene un serio En este complejo tecnológico californiano, problema de igualdad. “Los hombres y las admirado por todos, existe un problema de mujeres no tienen las mismas oportunidades igualdad. ¿Quieres saber por qué? allí pero eso está cambiando, quizá más Texto: Elena Mandacen rápido de lo que pensamos. En el año 2013, sólo el 13 por ciento de todos los fondos de capital riesgo fueron a mujeres, frente a 2009 que eran menos del 10 por ciento; millones de usuarios.
    [Show full text]
  • Production: Produced by Members of the Berkeley Technology Law Journal
    Production: Produced by members of the Berkeley Technology Law Journal. All editing and layout done using Microsoft Word. Printer: Joe Christensen, Inc., Lincoln, Nebraska. Printed in the U.S.A. The paper used in this publication meets the minimum requirements of American National Standard for Information Sciences—Permanence of Paper for Library Materials, ANSI Z39.48—1984. Copyright © 2013 Regents of the University of California. All Rights Reserved. Berkeley Technology Law Journal University of California School of Law 3 Boalt Hall Berkeley, California 94720-7200 [email protected] http://www.btlj.org BERKELEY TECHNOLOGY LAW JOURNAL VOLUME 28 NUMBER 2 FALL 2013 TABLE OF CONTENTS ARTICLES A SIMPLE APPROACH TO SETTING REASONABLE ROYALTIES FOR STANDARD-ESSENTIAL PATENTS ............................................................................... 1135 Mark A. Lemley & Carl Shapiro “GENTLY DOWN THE STREAM”: WHEN IS AN ONLINE PERFORMANCE PUBLIC UNDER COPYRIGHT? ....................................................................................... 1167 Daniel Brenner FINDING THE POINT OF NOVELTY IN SOFTWARE PATENTS ................................ 1217 Bernard Chao REFORMING SURVEILLANCE LAW: THE SWISS MODEL .......................................... 1261 Susan Freiwald & Sylvain Métille PRIVACY BY DESIGN: A COUNTERFACTUAL ANALYSIS OF GOOGLE AND FACEBOOK PRIVACY INCIDENTS ................................................................................ 1333 Ira S. Rubinstein & Nathaniel Good SUBSCRIBER INFORMATION The Berkeley Technology
    [Show full text]