Privacy: how we do it and when it matters most
|
|
- Myles Potter
- 6 years ago
- Views:
Transcription
1 Privacy: how we do it and when it matters most Christena Nippert-Eng, Ph.D. Professor of Sociology Chair, Department of Social Sciences Illinois Institute of Technology Institute for Security, Technology and Society and the Department of Sociology Dartmouth College September 26, 2012
2 Today s talk How do we think about privacy? How do we actually do it? What, exactly, is the anatomy of a privacy violation? How does technology give us a useful entry point for understanding when privacy really matters?
3 Islands of Privacy, 2010 University of Chicago Press 3-year study in Chicago funded by AIM Research Council, Intel Corporation Ethnographic observation of workplaces, homes, public spaces Archival/historical research (academic and popular literature) Content analysis of print media, including 52,500+ newspaper articles from formal interviews, 1-1/2-17 hours long
4 What does privacy mean to you? (n = 57) 1) The ability / power to control access to some thing, place, or piece of information and its dissemination (n = 45) 2) The condition of being: alone / without others demands, interruptions, intrusions / secure, safe, at peace (n = 17) 3) The freedom to do / live / make decisions, without regulation / restriction (n = 7)
5 What does it mean to you if something is private? (n =54) 1) only one person has access to it or it is shared only selectively (n = 52) 2) it is a thing that is mine, part of me, who I am, what I do, what I think (n = 32) 3) it is a thing that is not generally accessible for agreed upon interpersonal and/or socialinteractional reasons (n = 17) 4) it is a thing that is inaccessible under legal, institutional, professional codes (i.e., protected from others use, interest, interference) (n = 12)
6 For more on what s more private or public, time for a tour of people s wallets and purses (with Jay Melican)
7 A two-pile protocol: more private v. more public Okay. Here will be my private pile. Okay. On the back of this card I have the home address and phone number of one of my co-workers. And I was saying, ordinarily, I would consider this whole card all of her personal information to be private. I do consider her home address and phone number private. Ordinarily, I would consider her cell phone to be private, too, with the exception of the fact that she put it on the business card. So, since she put it on her business card, I would-- I would consider this to be public stuff. I ll leave that. That s sort of a category by itself. Okay. I think pretty much-- Now this is [my university] ID, and ordinarily I would consider this to be public, except that it has my Social Security number on it, which makes it go over here [in the more private pile]. And the same thing for the driver s license. You really can t call that private, because you have to produce it for just about everything. But it has your driver s license number on there, which is useful information. All of this other information which people could use against you for, you know, use in order to steal your identity, is on there. So this is sort of in a category by itself, too, because it s actually private information, but you have to produce it every time somebody asks for it. So I don t know how to call that.
8
9 Talk About the Piles 1) Multiple intended Audiences (i.e., For whom is this carried?) Self Self & Selected Others Self & Institutions Self & Anybody 2) Control is the Goal I decide who needs and gets to access this. The more an object reveals identity, the more important it is to control it. 3) Is this object personally meaningful? 4) Would it be bad if I lost it?
10 Sorting model of wallet and purse contents by level of responsibility, meaningfulness of object, and reasons carried. Is this object personally meaningful to me? no yes ATM card Membership cards Credit cards Soc. Sec. Card Carried for self & institutions Alcoholics Anonymous coin Letter from friend Extra money (esp. coins) Gum Tissues Carried for self & anyone Seashell Photos of children Movie stubs Most public/ least private objects Most private/ least public objects Prescription medicine Carried for self, only yes College ID (expired) Carried for self and selected others no Would it be bad for me/those for whom I am responsible if I lost control of this object?
11 Shared on a need-to-know basis, wallet and purse contents help us address both The individual burden of publicity + The (increasingly?) individual burden of privacy
12 The wallet and purse analysis also supports the idea of a privacy continuum based on accessibility. Privacy......Publicity The condition of The condition of (Pure) inaccessibility (Pure) accessibility ( Private Public ) That which is That which is completely inaccessible completely accessible See Zerubavel 1987, Allen 1988, Hall 1968, Westin, 1967, Altman 1976, Etzioni 1999, Schwartz, 1966, Warren and Brandeis 1890, Rosen 2000, and Smith 2000
13 How does one actually try to achieve privacy? Selective Concealment and Disclosure Trash management Leave a message Paper trails A trip to the ER
14 For these participants good privacy exists when the things an individual wants to be private are as private (i.e., as inaccessible) as she or he wants them to be. e.g., one s body, a thought, a behavior, relationship, piece of information, chunk of time, a certain space, an object, etc.
15 A violation of privacy occurs when one has not been able to selectively conceal and reveal to control access -- as desired. i.e., Something turns out to be more public than one believes it is, was, should be, or should have been. Look what the cat dragged in
16 Figure 1: A Frame Analysis of Privacy Violations Public B External ( Objective ) Framing of situation/ object/matter of concern (i.e., How private/public others demonstrate this to be) A In-frame (No sense of mismatch) Private Internal ( Socio-Subjective ) Framing of Situation/Object/Matter of Concern (i.e., How private/public the individual understands this to be) Public
17 How is it that the same objective situation the same violation -- can be experienced with such different degrees of magnitude? problem problem problem
18 Factors affecting the experience of a violation 1) Distance from the diagonal (i.e., degree to which one was mistaken) 2) Practical v. Symbolic consequences of violation 3) Difficulty of the recovery process (of getting back into frame) Public External ( Objective ) Framing of situation/ object/matter of concern (i.e., How private/public others demonstrate this to be) Figure 1: A Frame Analysis of Privacy Violations Private B A In-frame (No sense of mismatch) Internal ( Socio-Subjective ) Framing of Situation/Object/Matter of Concern (i.e., How private/public the individual understands this to be) Public
19 Concern about one s privacy being violated at some point in the future of not being able to conceal and reveal as desired has led to a variety of privacy fears. Much of participants everyday behaviors are designed to prevent these fears from coming true. It s a constant, dynamic, adaptive process, though.
20 Formal, interrelated dimensions of fears: 1) The thing one fears will happen 2) The act of violation 3) The information/item lost or uncovered 4) The defensive strategy taken to prevent the violation Diagram by J. Melican, E. Swanson
21 Yet not all fears are serious, nor do even the serious ones always cause us to change our behaviors. When does privacy *really* matter to us?
22 technology + privacy newspaper article coverage Number of articles January 1985 January 1986 January 1987 January 1988 January 1989 January 1990 January 1991 January 1992 January 1993 January 1994 January 1995 January 1996 January 1997 January 1998 January 1999 January 2000 January 2001 January 2002 January 2003
23 Privacy, Families, and ICTs: Privacy Socialization n How do we learn about privacy what it is, how important it should be, how we re supposed to do it? n Focus on the interactional context of the family and the home n Special emphasis on ICTs and social media use to supplement previous findings n 3-month study, again in Chicago n 18 interviews, 9 college students, 9 parents of year olds + 1 family therapist focused on college student population n Again, funded by the Intel Research Council
24 How do the uses of technology in this story reveal 1) The circumstances under which Molly desires more and less privacy, 2) Molly s family role-related expectations of herself and each of her relatives, and 3) the specific nature of the relationship she has with each of them?
25 Overall, privacy seems to especially matter to us when: 1) we enact specific social roles and relationships that have clear privacy-related expectations embedded in them; 2) we experience conflicting desires and demands for others access to us due to membership in multiple social groups; 3) an intimate relationship goes bad, resulting in a real or potential threat to one s identity, reputation, property, etc; 4) we experience a significant violation of our privacy, bringing our self, our privacy expectations, and the likelihood of achieving them into sharp relief.
26 Privacy is culturally specific. In the U.S., it is: socially gifted about the self about our relationships with others something to be actively, constantly, personally managed in order to protect it
27 Which big brother are you worried about? This one. For sure.
28 Privacy Why does privacy matter so much in the USA? Individual freedom Membership in social groups Thank you!
0x1A Great Papers in Computer Security
CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ H. Nissenbaum Privacy as Contextual Integrity (Washington Law Review 2004) Common-Law Right
More informationThe User Experience Podcast, episode 10. Original audio published on September
Card sorting an interview with Donna (Maurer) Spencer The User Experience Podcast, episode 10. Original audio published on September 11 2006 The User Experience podcast is published by Information & Design,
More informationIntroduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2
Pi Privacy Introduction The World We Live In: Information collection, exchange, combination, and distribution easier than ever More information access less privacy Trade-offs Privacy vs. need for credentials
More informationPrivacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology
Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Edited by Mireille Hildebrandt and Katja de Vries New York, New York, Routledge, 2013, ISBN 978-0-415-64481-5
More informationDELAY, REFUSAL AND NEGOTIATION SKILLS SCENARIOS
DELAY, REFUSAL AND NEGOTIATION SKILLS SCENARIOS You and your friends want to lose weight for a school dance. Your friends decide to start smoking and they are really pressuring you to start as well. They
More informationIMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES. K.P Jayant, Research Scholar JJT University Rajasthan
IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES K.P Jayant, Research Scholar JJT University Rajasthan ABSTRACT It has made the world a smaller place and has opened up previously inaccessible markets
More informationSpeaking Notes for Grades 4 to 6 Presentation
Speaking Notes for Grades 4 to 6 Presentation Understanding your online footprint: How to protect your personal information on the Internet SLIDE (1) Title Slide SLIDE (2) Key Points The Internet and you
More informationPARTICIPATORY ACCUSATION
PARTICIPATORY ACCUSATION A. Introduction B. Ask Subject to Describe in Detail How He/She Handles Transactions, i.e., Check, Cash, Credit Card, or Other Incident to Lock in Details OR Slide into Continue
More informationKelly H. Werner, Ph.D. Clinical Psychologist PSY21858
Kelly H. Werner, Ph.D. Clinical Psychologist PSY21858 Intake Questionnaire For this intake questionnaire either type and bold your answers and email it back to me, or print it out and write and circle
More informationHoliday SPENDING A GIFT FROM FIRST SERVICE FEDERAL CREDIT UNION HOLIDAY SPENDING
Holiday SPENDING A GUIDE TO PLANNING AND THINKING THROUGH YOUR HOLIDAY EXPENSES SO YOU CAN SPEND ON WHAT YOU REALLY VALUE AND CUT CORNERS ONLY WHAT DOESN T REALLY MATTER TO YOU. A GIFT FROM FIRST SERVICE
More information>>> ORDER NOW <<< Natalie biography going crazy
Natalie biography going crazy. How many new universities can claim to have only a few of these facilities on their campuses. The result will be a small town "university" which consists of a sole building
More informationThe Teen Cell Phone Agreement
The Teen Cell Phone Agreement FreeTeenHelp.com Dear Caring Adult, This contract is designed to create an open line of communication between you and your kid regarding their cell phone. The goal is to help
More informationComputer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062
Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics
More information7 Secrets To Building A Productive Downline
7 Secrets To Building A Productive Downline Presented By: Mira GRECU Click here to join me in early retirement Legal Stuff No part of this publication may be reproduced or transmitted in any form or by
More informationBOSS PUTS YOU IN CHARGE!
BOSS PUTS YOU IN CHARGE! Here s some good news if you are doing any of these courses the NHS may be able to PAY your tuition fees AND, if your course started after September 2012, you also get a thousand
More informationWithout looking at the worksheets below, listen to your teacher and raise the Offer card if it is an offer and Request card if it s a request.
Offers and requests Without looking at the worksheets below, listen to your teacher and raise the Offer card if it is an offer and Request card if it s a request. Decide if each section below consists
More informationRe: Review of Market and Social Research Privacy Code
http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 31 August 2012 Dr Terry Beed Chair Independent Code Review Panel AMSRO Dear Terry Re: Review of Market and
More informationA Step by Step guide to making and maintaining a Universal Credit claim online
A Step by Step guide to making and maintaining a Universal Credit claim online welfare changes Before you make a Universal Credit Claim To make a Universal Credit claim, you will need: Email address Your
More informationCommunicating Complex Ideas Podcast Transcript (with Ryan Cronin) [Opening credits music]
Communicating Complex Ideas Podcast Transcript (with Ryan Cronin) [Opening credits music] Georgina: Hello, and welcome to the first Moore Methods podcast. Today, we re talking about communicating complex
More informationLesson 2: What is the Mary Kay Way?
Lesson 2: What is the Mary Kay Way? This lesson focuses on the Mary Kay way of doing business, specifically: The way Mary Kay, the woman, might have worked her business today if she were an Independent
More informationGraduates expectations and experience of social care work: Strengths and abilities being nurtured?
Dublin Institute of Technology ARROW@DIT Other Resources Languages 2018-03-21 Graduates expectations and experience of social care work: Strengths and abilities being nurtured? Fiona McSweeney Follow this
More informationTheoretical Category 5: Lack of Time
Themes Description Interview Quotes Real lack of time I mean I don t feel it should be 50% of time or anything like that but I do believe that there should be some protected time to do that. Because I
More informationChallenges and opportunities of digital social research: Access and Anonymity
Challenges and opportunities of digital social research: Access and Anonymity Dr. Dan Nunan Henley Business School, University of Reading www.henley.ac.uk Two narratives for social research: Evolution
More informationLaw of Attraction. Manifesting your Dreams! Renaye Thornborrow Adventures in Wisdom. Copyright 2011 Renaye Thornborrow All Rights Reserved
DreamPower Kids Skill book 3 of 6 Law of Attraction Manifesting your Dreams! Renaye Thornborrow Adventures in Wisdom All Rights Reserved Table of Contents TABLE OF CONTENTS 2 COACHING NOTES 3 LAW OF ATTRACTION
More informationYour Money Relationship. Quiz. If money was a person, what would your relationship with them look like?
Your Money Relationship Quiz If money was a person, what would your relationship with them look like? Is your relationship based in love, respect, and gratitude? Or is it based in fear, scarcity, and avoidance?
More informationBeing in Care Being in Care
1 Contents What if I don t understand the information in this booklet? 4 What promises have been made to children and young people in care in Hackney? 5-6 What is being in care? 7 11 Why am I in care?
More informationAn Insider s Guide to Filling Out Your Advance Directive
An Insider s Guide to Filling Out Your Advance Directive What is an Advance Directive for Healthcare Decisions? The Advance Directive is a form that a person can complete while she still has the capacity
More informationAR: That s great. It took a while for you to get diagnosed? It took 9 years?
When it comes to it, I just end up describing myself as a battery that needed to be charged I would other teens to know that they aren t alone, and that there are ways that you can manage mito. You have
More informationVillage of Lake Bluff Fire Department Application to become a Volunteer Firefighter or EMS Services Member
Village of Lake Bluff Fire Department Application to become a Volunteer Firefighter or EMS Services Member Please Read and Sign: I certify that the information provided in this application is true and
More informationIntroduction. Data Source
Introduction The emergence of digital technologies including the Internet, smartphones, tablets and other digital devices has increased both the complexity of the core definition of this construct, the
More informationUniversity Lecturer (Research and Teaching, Full- time, Permanent) [SC explains ethics protocols and keeping answers anonymous]
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 11-09. University Lecturer (Research and Teaching, Full- time,
More informationGoogle SEO Optimization
Google SEO Optimization Think about how you find information when you need it. Do you break out the yellow pages? Ask a friend? Wait for a news broadcast when you want to know the latest details of a breaking
More informationThe Samaritan Club of Calgary History Project
The Samaritan Club of Calgary History Project Interview with Helen Wells by Mara Foster on October 26, 2014 This is October 26, Saturday and I am at Helen Wells home. I am Mara Foster and we are going
More informationDo you currently have coverage in place? If yes: Who do you have coverage through?
Mr./Mrs. before we get started, please allow me to tell you about who I am. My name is, I m what you call a Senior Care Advocate I work with seniors to share with them programs and benefits that they can
More informationCircle Link 1 Online Rules of the Road
4 th Grade Scavenger Hunt Links Content Circle Link 1 http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb Online Rules of the Road 1. Guard your privacy. What people know about you is up to
More informationTOOLS FOR DISTANCE COLLABORATION 2012 OSEP PD CONFERENCE WASHINGTON, DC
SCHOLAR INITIATIVE FULL TRANSCRIPT TOOLS FOR DISTANCE COLLABORATION 2012 OSEP PD CONFERENCE WASHINGTON, DC Mark Horney: Once you get past the contact stage and I ll tell you about my projects and you tell
More informationACCESS Foundational Skills- Are You - or Someone You Know- Suicidal? (Teacher Resource)
ACCESS Foundational Skills- Are You - or Someone You Know- Suicidal? (Teacher Resource) If you are feeling suicidal now, please stop long enough to read this. It will only take about five minutes. I do
More informationClear Your Path To Resolving Conflicts, #2
Clear Your Path To Resolving Conflicts, #2 Clear Your Path To Resolving Conflicts, #2 Copyright 2017 This book was produced using Pressbooks.com, and PDF rendering was done by PrinceXML. Contents 1.
More informationDiana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA Health Insurance Portability and Accountability Act (HIPAA)
Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA 30030 Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES I. COMMITMENT TO YOUR PRIVACY: DIANA GORDICK,
More informationBuild dōterra. Find your WHY? Why do you want to share and earn with dōterra? Some people start a dōterra business because they love the products
Build dōterra dōterra means "Gift of the Earth." It is a Natural Healthcare Company that uses the power of essential oils to create a natural and less toxic life style through their essential oils and
More informationViolent Intent Modeling System
for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716
More informationRights and Responsibilities
Rights and Responsibilities What are rights? RIGHTS are the rules that help make everyone equal. You have some rights when you are born. These are called human rights because every person has them. You
More informationNot-Too-Silly Stories
Not-Too-Silly Stories by Jens Alfke ~ January 2, 2010 is is a free-form, story-oriented, rules-lite, GM-less roleplaying game. It s a bit like a highly simplified version of Universalis. I designed it
More informationAustralian Census 2016 and Privacy Impact Assessment (PIA)
http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 12 February 2016 Mr David Kalisch Australian Statistician Australian Bureau of Statistics Locked Bag 10,
More informationHELP! I'VE LOST MY MOJO!
HELP! I'VE LOST MY MOJO! Here are 4 different exercises that will help you explore what s happening. Pick the one that feels like the most appropriate for how you re currently feeling. Feeling not good
More informationSupport Needs Questionnaire
Support Needs Questionnaire Version 2.3: February 2011 Name: Address: This questionnaire is for you to complete with the social worker from Newcastle City Council Adult and Culture Services. You will already
More informationThe Changing Face of Benefits. Samuel s Journey. Do you receive Social Security Disability Insurance? Do you want to find a job and go to work?
The Changing Face of Benefits Samuel s Journey Do you receive Social Security Disability Insurance? Do you want to find a job and go to work? Meet Samuel, he has the same goal. Developed by National Office:
More informationUsing Google Analytics to Make Better Decisions
Using Google Analytics to Make Better Decisions This transcript was lightly edited for clarity. Hello everybody, I'm back at ACPLS 20 17, and now I'm talking with Jon Meck from LunaMetrics. Jon, welcome
More informationGoals are reached by making good choices. Bad choices make it harder to reach your goals.
DON T METH WITH US SCRIPT I am and I am with the San Juan Rotary Club. Does anyone know what Rotary is? Rotary is people who form a club and they are leaders in the community and they are business owners
More informationHabits of Unhappy People
Habits of Unhappy People by HENRIK EDBERG Image by Mitya Kuznetsov (license). Very little is needed to make a happy life; it is all within yourself, in your way of thinking. Marcus Aurelius Let us be grateful
More informationMoney Responsibility
Student Activities $ Lesson Two Money Responsibility 03/09 money responsibility directions Money choices are sometimes difficult. Consider each of these situations. You may want to print these and cut
More informationTranscript for Session 049
Transcript for Session 049 Listen to the podcast session, see resources & links: http://chandoo.org/session49/ Transcript: Hi and welcome to http://chandoo.org podcast. This is session number 49. We are
More informationChildren in care and care leavers
The Pledge to Children in care and care leavers This is East Riding of Yorkshire Council s Pledge. It is a promise made by the council and its partners to all children and young people in care and to care
More informationThe Senior Portrait Telechart
(When The Parent Is Calling) By Charles J. Lewis, M. Photog. Cr. Prospect's Name Sales Person Today's Date Ask a couple of questions from step 1, (placing a check mark in the box to the left of each question
More informationDr Fiona McSweeney and Dr Dave Williams Dublin Institute of Technology
Dr Fiona McSweeney and Dr Dave Williams Dublin Institute of Technology Literature suggests that the transition to practice has not being investigated with social care practitioners. Asking students about
More informationHow to get your dream life in 3 easy steps.
How to get your dream life in 3 easy steps. What is your current reality? Do you like it? Do you like the life that you are living right now? Do you feel lost? Stressed? Worried about your future? Not
More informationLAB3-R04 A Hard Privacy Impact Assessment. Post conference summary
LAB3-R04 A Hard Privacy Impact Assessment Post conference summary John Elliott Joanne Furtsch @withoutfire @PrivacyGeek Table of Contents THANK YOU... 3 WHAT IS PRIVACY?... 3 The European Perspective...
More informationOVERCOMING TEAM BUILDING OBJECTIONS
OVERCOMING TEAM BUILDING OBJECTIONS I don t have time If I could teach you how to earn an extra $100 per week that s $400 per month working 3 hours a week, and eventually double that to $200 per week,
More informationFredericksburg Academy Junior Questionnaire College Counseling Office
Fredericksburg Academy Junior Questionnaire College Counseling Office In order for me to get to know you and to best advocate for you to colleges, I need some honest and sincere information from you. Please
More informationModule 6: Coaching Them On The Decision Part 1
Module 6: Coaching Them On The Decision Part 1 We ve covered building rapport, eliciting their desires, uncovering their challenges, explaining coaching, and now is where you get to coach them on their
More informationElevator Music Jon Voisey
Elevator Music 2003 Phil Angela Operator An elevator. CHARACTERS SETTING AT RISE is standing in the elevator. It stops and Phil gets on. Can you push 17 for me? Sure thing. Thanks. No problem. (The elevator
More informationLOY LOY - THE SAVINGS GAME
LOY LOY - THE SAVINGS GAME Instructions V-0 INTRODUCTION FOR PLAYTESTING GROUPS If you have the game to use for playtesting you can read the following script first: Thanks: for joining us for this playtest
More informationYOUR RIGHTS. In Intermediate Care Facilities for Persons with. Mental Retardation (ICF-MR) Programs. Texas Department of Aging and Disability Services
YOUR In Intermediate Care Facilities for Persons with RIGHTS Mental Retardation (ICF-MR) Programs For additional copies of this publication, contact Consumer Rights and Services DADS Media Services 11P450
More informationFirst Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following
Privacy Notice Introduction This document refers to personal data, which is defined as information concerning any living person (a natural person who hereafter will be called the Data Subject) that is
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework
INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number
More informationThe Key to It All: YOUR PERSONAL MONEY MAP NUMBERS
MODULE 2 * TO USE THE INTERACTIVE FIELDS IN THIS DOCUMENT, PLEASE DOWNLOAD AND OPEN WITH ADOBE READER The Key to It All: YOUR PERSONAL MONEY MAP NUMBERS Hi and welcome to module 2! You are about to begin
More informationWhat to expect at your outpatient consultation. Hospitals + Health Checks + Physio + Gyms
What to expect at your outpatient consultation. Hospitals + Health Checks + Physio + Gyms We are here to answer any questions you have about surgery. We listen to you and guide you through every part of
More informationPolicy Contents. Policy Information. Purpose and Summary. Scope. Published on Policies and Procedures (http://policy.arizona.edu)
Published on Policies and Procedures (http://policy.arizona.edu) Home > Intellectual Property Policy Policy Contents Purpose and Summary Scope Definitions Policy Related Information* Revision History*
More informationDo you know how to look after your money?
We all want a better life. And a better life is possible. A good place to begin is learning to love and care for the things we have. Then you have a lot, my friend. And all of those are very valuable.
More informationCHILDREN S GUIDE 5-12YRS
Say Hi to Mo CHILDREN S GUIDE 5-12YRS WELCOME PACK & INFORMATION Mosaic Monkey) says... Mo (the Welcome to Mosaic Foster Care This booklet should tell you everything you need to know about being in foster
More informationArchival & Historical Committee March 7, 2009 Washington, DC
Archival & Historical Committee March 7, 2009 Washington, DC Interview with Marcelino Oliva, DO, FACOFP In Memory of Frank J. McDevitt, DO, FACOFP AOA President 1981-1982 ACOFP Family Physician of Year
More informationMY VOICE, MY CHOICE. This Book belongs to
MY VOICE, MY CHOICE This Book belongs to A Competency Building Workbook My Voice, My Choice is a project that helps you get to know yourself better, and for others to get to know you better. Self-Determination
More informationBasics of Education Advocacy
Basics of Education Advocacy So, my name is Julie Pautsch and I m the attorney that runs the education pro bono project and so this is basic education advocacy for special education. I am not going to
More informationMy Advance Care Plan & Guide Plan the healthcare you want in the future and for the end of your life
My Advance Care Plan & Guide Plan the healthcare you want in the future and for the end of your life Name: Date: The conversations you have with your whānau and loved ones in thinking about your advance
More informationInstructions for development of an assent script
Human Research Protection Program Institutional Review Board Assent Script Template: Ages 7-11 Instructions for development of an assent script ASSENT OF MINOR (AGES 7-11) Children should be approached
More information! 1. Telling Your Story. An Ambassador s guide to writing and speaking about the gift of life. By: Brianna Doby, donor daughter Positive Rhetoric
! 1 Telling Your Story An Ambassador s guide to writing and speaking about the gift of life By: Brianna Doby, donor daughter Positive Rhetoric ! 2 Thank you for volunteering to be an Ambassador with LifeSource.
More informationYour Rights. In An ICF-MR Program
Your Rights In An ICF-MR Program This Book Belongs To: Published by: SPINDLETOP MENTAL HEALTH AND MENTAL RETARDATION SERVICES AND MENTAL RETARDATION November, 1998 Table of Contents A Special Note About
More informationMITI Coding - Behavioral Counts
An Initial Interview University of New Mexico Center on Alcoholism, Substance Abuse, and Addictions Tape B Phase I Part 2 Motivational Interviewing Professional Training Videotape Series 1998 MITI Coding
More informationOur Digital Future: An Interview with the UM Dean of School of Information
University of Michigan Deep Blue deepblue.lib.umich.edu 2011-01 Our Digital Future: An Interview with the UM Dean of School of Information MacKie-Mason, Jeffrey K.; Peters, Allison; Wang, Julia; Zhang,
More informationRaising Difficult Issues with Your Service Provider
Sel f-de ter m in at ion Series Raising Difficult Issues with Your Service Provider Determine Your Destiny Raising Difficult Issues with Your Service Provider Prepared by: Carol A. Petersen, M.Ed. Jessica
More informationDigital Citizenship Continuum
Digital Citizenship Continuum -curricular Competencies (Develop Thinking, Develop Identity and Interdependence, Develop Literacies, and Develop Social Responsibility) support student achievement and the
More informationAlexander Patterson Interview Transcript
Alexander Patterson Interview Transcript INTERVIEWER: Could you please state your name and affiliation with the Railway Mail Service? Alexander Patterson: Well, Alexander Patterson Jr., and I was with
More informationWhat are References?
References Boston University College of Engineering Career Development Office 44 Cummington Street, Room 112 Boston, MA 02215 (617) 353-5731 www.bu.edu/eng/careers What are References? References are individuals
More informationKETONX SAMPLE TRAINING
HOW TO EXPLODE YOUR BUSINESS IN 10 DAYS 1. Develop Ketopia Sample Packs 2. Create a Prospect Profile 3. Ask Qualifying Questions 4. Follow the Pre-Sample Script 5. Follow-Up & Close the Sale Using Script
More informationEpisode 6: Can You Give Away Too Much Free Content? Subscribe to the podcast here.
Episode 6: Can You Give Away Too Much Free Content? Subscribe to the podcast here. Hey everybody! Welcome to episode number 6 of my podcast. Today I m going to be talking about using the free strategy
More informationA Human Factors Approach to. Healthcare
A Human Factors Approach to Securing Information Technology in Healthcare Kelly Caine Principal Research Scientist School of Informatics & Computing Center for Law, Ethics, and Applied Research in Health
More information1. How old were you when you had your first drink? Describe what happened and how you felt.
Introduction Congratulations and welcome to treatment! You have made a monumental step in recovery. You can be proud of yourself. You can feel confident that treatment works. Ninety percent of patients
More informationETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP
Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION
More informationTHE COFFEE SHOP INTERVIEW
Thank you so much for taking the time to participate in the webinar. I promised you two of my secret weapons and here they are! First we have the 7 steps I live every day of my life by. Those steps guide
More informationMS Learn Online Feature Presentation. Career Crossroads: Maximize Your Potential
MS Learn Online Feature Presentation I m so sorry I m late! I got caught up with stuff at work, and completely lost track of time. You need one of these. Girl, you know I do not do digital. As far as I
More informationHow To Ace Any Job Interview
Page 1 of 1 Contents Interviewing Tips: Interview For Success... 9 Interviewing Tips: What You Can Expect From An Interview... 10 Interviewing Tips: How To Guarantee You'll Perform Well... 11 Interviewing
More informationPrivacy Policy Framework
Privacy Policy Framework Privacy is fundamental to the University. It plays an important role in upholding human dignity and in sustaining a strong and vibrant society. Respecting privacy is an essential
More informationMock Sides: Original Scripts for Workshop Actors TAKING ADVANTAGE. Written by. David Dalton & Chad Schnackel
TAKING ADVANTAGE Written by David Dalton & Chad Schnackel Pages: 4+ Characters: Catherine, 70+ Simon, 25+ Luke, 25+ Synopsis: Catherine meets with a shady scam artist, Simon. Fortunately her nephew Luke
More informationAdvance Care Planning Conversations:
Advance Care Planning Conversations: A Guide for You and Your Substitute Decision Maker Read this to learn about: How you can prepare for having Advance Care Planning Conversations What it means to be
More informationSECTION 2. Computer Applications Technology
SECTION 2 Computer Applications Technology 2.1 What is Computer Applications Technology? Computer Applications Technology is the study of the integrated components of a computer system (such as hardware,
More informationNovember 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University
Keynote Speaker Penn State Panelists Rebecca Wang Eric P. S. Baumer November 6, 2017 Haiyan Jia Gaia Bernstein Seton Hall University School of Law Najarian Peters Seton Hall University School of Law OVERVIEW
More informationProfessional Etiquette
Module 3: PROFESSIONAL ETIQUETTE 1 Your Passport to Professionalism: Module 3 Professional Etiquette Steps in this module: 1. Learn: Read the following document. 2. Complete the checklist response activity
More informationIt Can Wait By Megan Lebowitz. Scene One. (The scene opens with Diana sitting on a chair at the table, texting. There are four chairs at the table.
It Can Wait By Megan Lebowitz Scene One (The scene opens with Diana sitting on a chair at the table, texting. There are four chairs at the table.) (Mrs. Jones enters) Mrs. Jones: Diana, please get off
More informationExamples of Referrals Requests
1) A Dating Coach Examples of Referrals Requests Background: Laura is a personal life coach specializing in helping women date and find a spouse. Laura is like an ultimate big sister" - a senior female
More informationHow to Communicate Effectively With Anyone: Persuasion Mastery. Elizabeth Oprah
How to Communicate Effectively With Anyone: Persuasion Mastery Elizabeth Oprah Copyright 2012 by Elizabeth Oprah All rights reserved. The reproduction or utilization of this work in whole in part, in any
More information