Privacy: how we do it and when it matters most

Size: px
Start display at page:

Download "Privacy: how we do it and when it matters most"

Transcription

1 Privacy: how we do it and when it matters most Christena Nippert-Eng, Ph.D. Professor of Sociology Chair, Department of Social Sciences Illinois Institute of Technology Institute for Security, Technology and Society and the Department of Sociology Dartmouth College September 26, 2012

2 Today s talk How do we think about privacy? How do we actually do it? What, exactly, is the anatomy of a privacy violation? How does technology give us a useful entry point for understanding when privacy really matters?

3 Islands of Privacy, 2010 University of Chicago Press 3-year study in Chicago funded by AIM Research Council, Intel Corporation Ethnographic observation of workplaces, homes, public spaces Archival/historical research (academic and popular literature) Content analysis of print media, including 52,500+ newspaper articles from formal interviews, 1-1/2-17 hours long

4 What does privacy mean to you? (n = 57) 1) The ability / power to control access to some thing, place, or piece of information and its dissemination (n = 45) 2) The condition of being: alone / without others demands, interruptions, intrusions / secure, safe, at peace (n = 17) 3) The freedom to do / live / make decisions, without regulation / restriction (n = 7)

5 What does it mean to you if something is private? (n =54) 1) only one person has access to it or it is shared only selectively (n = 52) 2) it is a thing that is mine, part of me, who I am, what I do, what I think (n = 32) 3) it is a thing that is not generally accessible for agreed upon interpersonal and/or socialinteractional reasons (n = 17) 4) it is a thing that is inaccessible under legal, institutional, professional codes (i.e., protected from others use, interest, interference) (n = 12)

6 For more on what s more private or public, time for a tour of people s wallets and purses (with Jay Melican)

7 A two-pile protocol: more private v. more public Okay. Here will be my private pile. Okay. On the back of this card I have the home address and phone number of one of my co-workers. And I was saying, ordinarily, I would consider this whole card all of her personal information to be private. I do consider her home address and phone number private. Ordinarily, I would consider her cell phone to be private, too, with the exception of the fact that she put it on the business card. So, since she put it on her business card, I would-- I would consider this to be public stuff. I ll leave that. That s sort of a category by itself. Okay. I think pretty much-- Now this is [my university] ID, and ordinarily I would consider this to be public, except that it has my Social Security number on it, which makes it go over here [in the more private pile]. And the same thing for the driver s license. You really can t call that private, because you have to produce it for just about everything. But it has your driver s license number on there, which is useful information. All of this other information which people could use against you for, you know, use in order to steal your identity, is on there. So this is sort of in a category by itself, too, because it s actually private information, but you have to produce it every time somebody asks for it. So I don t know how to call that.

8

9 Talk About the Piles 1) Multiple intended Audiences (i.e., For whom is this carried?) Self Self & Selected Others Self & Institutions Self & Anybody 2) Control is the Goal I decide who needs and gets to access this. The more an object reveals identity, the more important it is to control it. 3) Is this object personally meaningful? 4) Would it be bad if I lost it?

10 Sorting model of wallet and purse contents by level of responsibility, meaningfulness of object, and reasons carried. Is this object personally meaningful to me? no yes ATM card Membership cards Credit cards Soc. Sec. Card Carried for self & institutions Alcoholics Anonymous coin Letter from friend Extra money (esp. coins) Gum Tissues Carried for self & anyone Seashell Photos of children Movie stubs Most public/ least private objects Most private/ least public objects Prescription medicine Carried for self, only yes College ID (expired) Carried for self and selected others no Would it be bad for me/those for whom I am responsible if I lost control of this object?

11 Shared on a need-to-know basis, wallet and purse contents help us address both The individual burden of publicity + The (increasingly?) individual burden of privacy

12 The wallet and purse analysis also supports the idea of a privacy continuum based on accessibility. Privacy......Publicity The condition of The condition of (Pure) inaccessibility (Pure) accessibility ( Private Public ) That which is That which is completely inaccessible completely accessible See Zerubavel 1987, Allen 1988, Hall 1968, Westin, 1967, Altman 1976, Etzioni 1999, Schwartz, 1966, Warren and Brandeis 1890, Rosen 2000, and Smith 2000

13 How does one actually try to achieve privacy? Selective Concealment and Disclosure Trash management Leave a message Paper trails A trip to the ER

14 For these participants good privacy exists when the things an individual wants to be private are as private (i.e., as inaccessible) as she or he wants them to be. e.g., one s body, a thought, a behavior, relationship, piece of information, chunk of time, a certain space, an object, etc.

15 A violation of privacy occurs when one has not been able to selectively conceal and reveal to control access -- as desired. i.e., Something turns out to be more public than one believes it is, was, should be, or should have been. Look what the cat dragged in

16 Figure 1: A Frame Analysis of Privacy Violations Public B External ( Objective ) Framing of situation/ object/matter of concern (i.e., How private/public others demonstrate this to be) A In-frame (No sense of mismatch) Private Internal ( Socio-Subjective ) Framing of Situation/Object/Matter of Concern (i.e., How private/public the individual understands this to be) Public

17 How is it that the same objective situation the same violation -- can be experienced with such different degrees of magnitude? problem problem problem

18 Factors affecting the experience of a violation 1) Distance from the diagonal (i.e., degree to which one was mistaken) 2) Practical v. Symbolic consequences of violation 3) Difficulty of the recovery process (of getting back into frame) Public External ( Objective ) Framing of situation/ object/matter of concern (i.e., How private/public others demonstrate this to be) Figure 1: A Frame Analysis of Privacy Violations Private B A In-frame (No sense of mismatch) Internal ( Socio-Subjective ) Framing of Situation/Object/Matter of Concern (i.e., How private/public the individual understands this to be) Public

19 Concern about one s privacy being violated at some point in the future of not being able to conceal and reveal as desired has led to a variety of privacy fears. Much of participants everyday behaviors are designed to prevent these fears from coming true. It s a constant, dynamic, adaptive process, though.

20 Formal, interrelated dimensions of fears: 1) The thing one fears will happen 2) The act of violation 3) The information/item lost or uncovered 4) The defensive strategy taken to prevent the violation Diagram by J. Melican, E. Swanson

21 Yet not all fears are serious, nor do even the serious ones always cause us to change our behaviors. When does privacy *really* matter to us?

22 technology + privacy newspaper article coverage Number of articles January 1985 January 1986 January 1987 January 1988 January 1989 January 1990 January 1991 January 1992 January 1993 January 1994 January 1995 January 1996 January 1997 January 1998 January 1999 January 2000 January 2001 January 2002 January 2003

23 Privacy, Families, and ICTs: Privacy Socialization n How do we learn about privacy what it is, how important it should be, how we re supposed to do it? n Focus on the interactional context of the family and the home n Special emphasis on ICTs and social media use to supplement previous findings n 3-month study, again in Chicago n 18 interviews, 9 college students, 9 parents of year olds + 1 family therapist focused on college student population n Again, funded by the Intel Research Council

24 How do the uses of technology in this story reveal 1) The circumstances under which Molly desires more and less privacy, 2) Molly s family role-related expectations of herself and each of her relatives, and 3) the specific nature of the relationship she has with each of them?

25 Overall, privacy seems to especially matter to us when: 1) we enact specific social roles and relationships that have clear privacy-related expectations embedded in them; 2) we experience conflicting desires and demands for others access to us due to membership in multiple social groups; 3) an intimate relationship goes bad, resulting in a real or potential threat to one s identity, reputation, property, etc; 4) we experience a significant violation of our privacy, bringing our self, our privacy expectations, and the likelihood of achieving them into sharp relief.

26 Privacy is culturally specific. In the U.S., it is: socially gifted about the self about our relationships with others something to be actively, constantly, personally managed in order to protect it

27 Which big brother are you worried about? This one. For sure.

28 Privacy Why does privacy matter so much in the USA? Individual freedom Membership in social groups Thank you!

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ H. Nissenbaum Privacy as Contextual Integrity (Washington Law Review 2004) Common-Law Right

More information

The User Experience Podcast, episode 10. Original audio published on September

The User Experience Podcast, episode 10. Original audio published on September Card sorting an interview with Donna (Maurer) Spencer The User Experience Podcast, episode 10. Original audio published on September 11 2006 The User Experience podcast is published by Information & Design,

More information

Introduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2

Introduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2 Pi Privacy Introduction The World We Live In: Information collection, exchange, combination, and distribution easier than ever More information access less privacy Trade-offs Privacy vs. need for credentials

More information

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Edited by Mireille Hildebrandt and Katja de Vries New York, New York, Routledge, 2013, ISBN 978-0-415-64481-5

More information

DELAY, REFUSAL AND NEGOTIATION SKILLS SCENARIOS

DELAY, REFUSAL AND NEGOTIATION SKILLS SCENARIOS DELAY, REFUSAL AND NEGOTIATION SKILLS SCENARIOS You and your friends want to lose weight for a school dance. Your friends decide to start smoking and they are really pressuring you to start as well. They

More information

IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES. K.P Jayant, Research Scholar JJT University Rajasthan

IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES. K.P Jayant, Research Scholar JJT University Rajasthan IMPORTANT ASPECTS OF DATA MINING & DATA PRIVACY ISSUES K.P Jayant, Research Scholar JJT University Rajasthan ABSTRACT It has made the world a smaller place and has opened up previously inaccessible markets

More information

Speaking Notes for Grades 4 to 6 Presentation

Speaking Notes for Grades 4 to 6 Presentation Speaking Notes for Grades 4 to 6 Presentation Understanding your online footprint: How to protect your personal information on the Internet SLIDE (1) Title Slide SLIDE (2) Key Points The Internet and you

More information

PARTICIPATORY ACCUSATION

PARTICIPATORY ACCUSATION PARTICIPATORY ACCUSATION A. Introduction B. Ask Subject to Describe in Detail How He/She Handles Transactions, i.e., Check, Cash, Credit Card, or Other Incident to Lock in Details OR Slide into Continue

More information

Kelly H. Werner, Ph.D. Clinical Psychologist PSY21858

Kelly H. Werner, Ph.D. Clinical Psychologist PSY21858 Kelly H. Werner, Ph.D. Clinical Psychologist PSY21858 Intake Questionnaire For this intake questionnaire either type and bold your answers and email it back to me, or print it out and write and circle

More information

Holiday SPENDING A GIFT FROM FIRST SERVICE FEDERAL CREDIT UNION HOLIDAY SPENDING

Holiday SPENDING A GIFT FROM FIRST SERVICE FEDERAL CREDIT UNION HOLIDAY SPENDING Holiday SPENDING A GUIDE TO PLANNING AND THINKING THROUGH YOUR HOLIDAY EXPENSES SO YOU CAN SPEND ON WHAT YOU REALLY VALUE AND CUT CORNERS ONLY WHAT DOESN T REALLY MATTER TO YOU. A GIFT FROM FIRST SERVICE

More information

>>> ORDER NOW <<< Natalie biography going crazy

>>> ORDER NOW <<< Natalie biography going crazy Natalie biography going crazy. How many new universities can claim to have only a few of these facilities on their campuses. The result will be a small town "university" which consists of a sole building

More information

The Teen Cell Phone Agreement

The Teen Cell Phone Agreement The Teen Cell Phone Agreement FreeTeenHelp.com Dear Caring Adult, This contract is designed to create an open line of communication between you and your kid regarding their cell phone. The goal is to help

More information

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics

More information

7 Secrets To Building A Productive Downline

7 Secrets To Building A Productive Downline 7 Secrets To Building A Productive Downline Presented By: Mira GRECU Click here to join me in early retirement Legal Stuff No part of this publication may be reproduced or transmitted in any form or by

More information

BOSS PUTS YOU IN CHARGE!

BOSS PUTS YOU IN CHARGE! BOSS PUTS YOU IN CHARGE! Here s some good news if you are doing any of these courses the NHS may be able to PAY your tuition fees AND, if your course started after September 2012, you also get a thousand

More information

Without looking at the worksheets below, listen to your teacher and raise the Offer card if it is an offer and Request card if it s a request.

Without looking at the worksheets below, listen to your teacher and raise the Offer card if it is an offer and Request card if it s a request. Offers and requests Without looking at the worksheets below, listen to your teacher and raise the Offer card if it is an offer and Request card if it s a request. Decide if each section below consists

More information

Re: Review of Market and Social Research Privacy Code

Re: Review of Market and Social Research Privacy Code http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 31 August 2012 Dr Terry Beed Chair Independent Code Review Panel AMSRO Dear Terry Re: Review of Market and

More information

A Step by Step guide to making and maintaining a Universal Credit claim online

A Step by Step guide to making and maintaining a Universal Credit claim online A Step by Step guide to making and maintaining a Universal Credit claim online welfare changes Before you make a Universal Credit Claim To make a Universal Credit claim, you will need: Email address Your

More information

Communicating Complex Ideas Podcast Transcript (with Ryan Cronin) [Opening credits music]

Communicating Complex Ideas Podcast Transcript (with Ryan Cronin) [Opening credits music] Communicating Complex Ideas Podcast Transcript (with Ryan Cronin) [Opening credits music] Georgina: Hello, and welcome to the first Moore Methods podcast. Today, we re talking about communicating complex

More information

Lesson 2: What is the Mary Kay Way?

Lesson 2: What is the Mary Kay Way? Lesson 2: What is the Mary Kay Way? This lesson focuses on the Mary Kay way of doing business, specifically: The way Mary Kay, the woman, might have worked her business today if she were an Independent

More information

Graduates expectations and experience of social care work: Strengths and abilities being nurtured?

Graduates expectations and experience of social care work: Strengths and abilities being nurtured? Dublin Institute of Technology ARROW@DIT Other Resources Languages 2018-03-21 Graduates expectations and experience of social care work: Strengths and abilities being nurtured? Fiona McSweeney Follow this

More information

Theoretical Category 5: Lack of Time

Theoretical Category 5: Lack of Time Themes Description Interview Quotes Real lack of time I mean I don t feel it should be 50% of time or anything like that but I do believe that there should be some protected time to do that. Because I

More information

Challenges and opportunities of digital social research: Access and Anonymity

Challenges and opportunities of digital social research: Access and Anonymity Challenges and opportunities of digital social research: Access and Anonymity Dr. Dan Nunan Henley Business School, University of Reading www.henley.ac.uk Two narratives for social research: Evolution

More information

Law of Attraction. Manifesting your Dreams! Renaye Thornborrow Adventures in Wisdom. Copyright 2011 Renaye Thornborrow All Rights Reserved

Law of Attraction. Manifesting your Dreams! Renaye Thornborrow Adventures in Wisdom. Copyright 2011 Renaye Thornborrow All Rights Reserved DreamPower Kids Skill book 3 of 6 Law of Attraction Manifesting your Dreams! Renaye Thornborrow Adventures in Wisdom All Rights Reserved Table of Contents TABLE OF CONTENTS 2 COACHING NOTES 3 LAW OF ATTRACTION

More information

Your Money Relationship. Quiz. If money was a person, what would your relationship with them look like?

Your Money Relationship. Quiz. If money was a person, what would your relationship with them look like? Your Money Relationship Quiz If money was a person, what would your relationship with them look like? Is your relationship based in love, respect, and gratitude? Or is it based in fear, scarcity, and avoidance?

More information

Being in Care Being in Care

Being in Care Being in Care 1 Contents What if I don t understand the information in this booklet? 4 What promises have been made to children and young people in care in Hackney? 5-6 What is being in care? 7 11 Why am I in care?

More information

An Insider s Guide to Filling Out Your Advance Directive

An Insider s Guide to Filling Out Your Advance Directive An Insider s Guide to Filling Out Your Advance Directive What is an Advance Directive for Healthcare Decisions? The Advance Directive is a form that a person can complete while she still has the capacity

More information

AR: That s great. It took a while for you to get diagnosed? It took 9 years?

AR: That s great. It took a while for you to get diagnosed? It took 9 years? When it comes to it, I just end up describing myself as a battery that needed to be charged I would other teens to know that they aren t alone, and that there are ways that you can manage mito. You have

More information

Village of Lake Bluff Fire Department Application to become a Volunteer Firefighter or EMS Services Member

Village of Lake Bluff Fire Department Application to become a Volunteer Firefighter or EMS Services Member Village of Lake Bluff Fire Department Application to become a Volunteer Firefighter or EMS Services Member Please Read and Sign: I certify that the information provided in this application is true and

More information

Introduction. Data Source

Introduction. Data Source Introduction The emergence of digital technologies including the Internet, smartphones, tablets and other digital devices has increased both the complexity of the core definition of this construct, the

More information

University Lecturer (Research and Teaching, Full- time, Permanent) [SC explains ethics protocols and keeping answers anonymous]

University Lecturer (Research and Teaching, Full- time, Permanent) [SC explains ethics protocols and keeping answers anonymous] 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 11-09. University Lecturer (Research and Teaching, Full- time,

More information

Google SEO Optimization

Google SEO Optimization Google SEO Optimization Think about how you find information when you need it. Do you break out the yellow pages? Ask a friend? Wait for a news broadcast when you want to know the latest details of a breaking

More information

The Samaritan Club of Calgary History Project

The Samaritan Club of Calgary History Project The Samaritan Club of Calgary History Project Interview with Helen Wells by Mara Foster on October 26, 2014 This is October 26, Saturday and I am at Helen Wells home. I am Mara Foster and we are going

More information

Do you currently have coverage in place? If yes: Who do you have coverage through?

Do you currently have coverage in place? If yes: Who do you have coverage through? Mr./Mrs. before we get started, please allow me to tell you about who I am. My name is, I m what you call a Senior Care Advocate I work with seniors to share with them programs and benefits that they can

More information

Circle Link 1 Online Rules of the Road

Circle Link 1   Online Rules of the Road 4 th Grade Scavenger Hunt Links Content Circle Link 1 http://www.commonsensemedia.org/get-cybersmart-phineas-and-ferb Online Rules of the Road 1. Guard your privacy. What people know about you is up to

More information

TOOLS FOR DISTANCE COLLABORATION 2012 OSEP PD CONFERENCE WASHINGTON, DC

TOOLS FOR DISTANCE COLLABORATION 2012 OSEP PD CONFERENCE WASHINGTON, DC SCHOLAR INITIATIVE FULL TRANSCRIPT TOOLS FOR DISTANCE COLLABORATION 2012 OSEP PD CONFERENCE WASHINGTON, DC Mark Horney: Once you get past the contact stage and I ll tell you about my projects and you tell

More information

ACCESS Foundational Skills- Are You - or Someone You Know- Suicidal? (Teacher Resource)

ACCESS Foundational Skills- Are You - or Someone You Know- Suicidal? (Teacher Resource) ACCESS Foundational Skills- Are You - or Someone You Know- Suicidal? (Teacher Resource) If you are feeling suicidal now, please stop long enough to read this. It will only take about five minutes. I do

More information

Clear Your Path To Resolving Conflicts, #2

Clear Your Path To Resolving Conflicts, #2 Clear Your Path To Resolving Conflicts, #2 Clear Your Path To Resolving Conflicts, #2 Copyright 2017 This book was produced using Pressbooks.com, and PDF rendering was done by PrinceXML. Contents 1.

More information

Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA Health Insurance Portability and Accountability Act (HIPAA)

Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA Health Insurance Portability and Accountability Act (HIPAA) Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA 30030 Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES I. COMMITMENT TO YOUR PRIVACY: DIANA GORDICK,

More information

Build dōterra. Find your WHY? Why do you want to share and earn with dōterra? Some people start a dōterra business because they love the products

Build dōterra. Find your WHY? Why do you want to share and earn with dōterra? Some people start a dōterra business because they love the products Build dōterra dōterra means "Gift of the Earth." It is a Natural Healthcare Company that uses the power of essential oils to create a natural and less toxic life style through their essential oils and

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

Rights and Responsibilities

Rights and Responsibilities Rights and Responsibilities What are rights? RIGHTS are the rules that help make everyone equal. You have some rights when you are born. These are called human rights because every person has them. You

More information

Not-Too-Silly Stories

Not-Too-Silly Stories Not-Too-Silly Stories by Jens Alfke ~ January 2, 2010 is is a free-form, story-oriented, rules-lite, GM-less roleplaying game. It s a bit like a highly simplified version of Universalis. I designed it

More information

Australian Census 2016 and Privacy Impact Assessment (PIA)

Australian Census 2016 and Privacy Impact Assessment (PIA) http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 12 February 2016 Mr David Kalisch Australian Statistician Australian Bureau of Statistics Locked Bag 10,

More information

HELP! I'VE LOST MY MOJO!

HELP! I'VE LOST MY MOJO! HELP! I'VE LOST MY MOJO! Here are 4 different exercises that will help you explore what s happening. Pick the one that feels like the most appropriate for how you re currently feeling. Feeling not good

More information

Support Needs Questionnaire

Support Needs Questionnaire Support Needs Questionnaire Version 2.3: February 2011 Name: Address: This questionnaire is for you to complete with the social worker from Newcastle City Council Adult and Culture Services. You will already

More information

The Changing Face of Benefits. Samuel s Journey. Do you receive Social Security Disability Insurance? Do you want to find a job and go to work?

The Changing Face of Benefits. Samuel s Journey. Do you receive Social Security Disability Insurance? Do you want to find a job and go to work? The Changing Face of Benefits Samuel s Journey Do you receive Social Security Disability Insurance? Do you want to find a job and go to work? Meet Samuel, he has the same goal. Developed by National Office:

More information

Using Google Analytics to Make Better Decisions

Using Google Analytics to Make Better Decisions Using Google Analytics to Make Better Decisions This transcript was lightly edited for clarity. Hello everybody, I'm back at ACPLS 20 17, and now I'm talking with Jon Meck from LunaMetrics. Jon, welcome

More information

Goals are reached by making good choices. Bad choices make it harder to reach your goals.

Goals are reached by making good choices. Bad choices make it harder to reach your goals. DON T METH WITH US SCRIPT I am and I am with the San Juan Rotary Club. Does anyone know what Rotary is? Rotary is people who form a club and they are leaders in the community and they are business owners

More information

Habits of Unhappy People

Habits of Unhappy People Habits of Unhappy People by HENRIK EDBERG Image by Mitya Kuznetsov (license). Very little is needed to make a happy life; it is all within yourself, in your way of thinking. Marcus Aurelius Let us be grateful

More information

Money Responsibility

Money Responsibility Student Activities $ Lesson Two Money Responsibility 03/09 money responsibility directions Money choices are sometimes difficult. Consider each of these situations. You may want to print these and cut

More information

Transcript for Session 049

Transcript for Session 049 Transcript for Session 049 Listen to the podcast session, see resources & links: http://chandoo.org/session49/ Transcript: Hi and welcome to http://chandoo.org podcast. This is session number 49. We are

More information

Children in care and care leavers

Children in care and care leavers The Pledge to Children in care and care leavers This is East Riding of Yorkshire Council s Pledge. It is a promise made by the council and its partners to all children and young people in care and to care

More information

The Senior Portrait Telechart

The Senior Portrait Telechart (When The Parent Is Calling) By Charles J. Lewis, M. Photog. Cr. Prospect's Name Sales Person Today's Date Ask a couple of questions from step 1, (placing a check mark in the box to the left of each question

More information

Dr Fiona McSweeney and Dr Dave Williams Dublin Institute of Technology

Dr Fiona McSweeney and Dr Dave Williams Dublin Institute of Technology Dr Fiona McSweeney and Dr Dave Williams Dublin Institute of Technology Literature suggests that the transition to practice has not being investigated with social care practitioners. Asking students about

More information

How to get your dream life in 3 easy steps.

How to get your dream life in 3 easy steps. How to get your dream life in 3 easy steps. What is your current reality? Do you like it? Do you like the life that you are living right now? Do you feel lost? Stressed? Worried about your future? Not

More information

LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary

LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary LAB3-R04 A Hard Privacy Impact Assessment Post conference summary John Elliott Joanne Furtsch @withoutfire @PrivacyGeek Table of Contents THANK YOU... 3 WHAT IS PRIVACY?... 3 The European Perspective...

More information

OVERCOMING TEAM BUILDING OBJECTIONS

OVERCOMING TEAM BUILDING OBJECTIONS OVERCOMING TEAM BUILDING OBJECTIONS I don t have time If I could teach you how to earn an extra $100 per week that s $400 per month working 3 hours a week, and eventually double that to $200 per week,

More information

Fredericksburg Academy Junior Questionnaire College Counseling Office

Fredericksburg Academy Junior Questionnaire College Counseling Office Fredericksburg Academy Junior Questionnaire College Counseling Office In order for me to get to know you and to best advocate for you to colleges, I need some honest and sincere information from you. Please

More information

Module 6: Coaching Them On The Decision Part 1

Module 6: Coaching Them On The Decision Part 1 Module 6: Coaching Them On The Decision Part 1 We ve covered building rapport, eliciting their desires, uncovering their challenges, explaining coaching, and now is where you get to coach them on their

More information

Elevator Music Jon Voisey

Elevator Music Jon Voisey Elevator Music 2003 Phil Angela Operator An elevator. CHARACTERS SETTING AT RISE is standing in the elevator. It stops and Phil gets on. Can you push 17 for me? Sure thing. Thanks. No problem. (The elevator

More information

LOY LOY - THE SAVINGS GAME

LOY LOY - THE SAVINGS GAME LOY LOY - THE SAVINGS GAME Instructions V-0 INTRODUCTION FOR PLAYTESTING GROUPS If you have the game to use for playtesting you can read the following script first: Thanks: for joining us for this playtest

More information

YOUR RIGHTS. In Intermediate Care Facilities for Persons with. Mental Retardation (ICF-MR) Programs. Texas Department of Aging and Disability Services

YOUR RIGHTS. In Intermediate Care Facilities for Persons with. Mental Retardation (ICF-MR) Programs. Texas Department of Aging and Disability Services YOUR In Intermediate Care Facilities for Persons with RIGHTS Mental Retardation (ICF-MR) Programs For additional copies of this publication, contact Consumer Rights and Services DADS Media Services 11P450

More information

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following Privacy Notice Introduction This document refers to personal data, which is defined as information concerning any living person (a natural person who hereafter will be called the Data Subject) that is

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

The Key to It All: YOUR PERSONAL MONEY MAP NUMBERS

The Key to It All: YOUR PERSONAL MONEY MAP NUMBERS MODULE 2 * TO USE THE INTERACTIVE FIELDS IN THIS DOCUMENT, PLEASE DOWNLOAD AND OPEN WITH ADOBE READER The Key to It All: YOUR PERSONAL MONEY MAP NUMBERS Hi and welcome to module 2! You are about to begin

More information

What to expect at your outpatient consultation. Hospitals + Health Checks + Physio + Gyms

What to expect at your outpatient consultation. Hospitals + Health Checks + Physio + Gyms What to expect at your outpatient consultation. Hospitals + Health Checks + Physio + Gyms We are here to answer any questions you have about surgery. We listen to you and guide you through every part of

More information

Policy Contents. Policy Information. Purpose and Summary. Scope. Published on Policies and Procedures (http://policy.arizona.edu)

Policy Contents. Policy Information. Purpose and Summary. Scope. Published on Policies and Procedures (http://policy.arizona.edu) Published on Policies and Procedures (http://policy.arizona.edu) Home > Intellectual Property Policy Policy Contents Purpose and Summary Scope Definitions Policy Related Information* Revision History*

More information

Do you know how to look after your money?

Do you know how to look after your money? We all want a better life. And a better life is possible. A good place to begin is learning to love and care for the things we have. Then you have a lot, my friend. And all of those are very valuable.

More information

CHILDREN S GUIDE 5-12YRS

CHILDREN S GUIDE 5-12YRS Say Hi to Mo CHILDREN S GUIDE 5-12YRS WELCOME PACK & INFORMATION Mosaic Monkey) says... Mo (the Welcome to Mosaic Foster Care This booklet should tell you everything you need to know about being in foster

More information

Archival & Historical Committee March 7, 2009 Washington, DC

Archival & Historical Committee March 7, 2009 Washington, DC Archival & Historical Committee March 7, 2009 Washington, DC Interview with Marcelino Oliva, DO, FACOFP In Memory of Frank J. McDevitt, DO, FACOFP AOA President 1981-1982 ACOFP Family Physician of Year

More information

MY VOICE, MY CHOICE. This Book belongs to

MY VOICE, MY CHOICE. This Book belongs to MY VOICE, MY CHOICE This Book belongs to A Competency Building Workbook My Voice, My Choice is a project that helps you get to know yourself better, and for others to get to know you better. Self-Determination

More information

Basics of Education Advocacy

Basics of Education Advocacy Basics of Education Advocacy So, my name is Julie Pautsch and I m the attorney that runs the education pro bono project and so this is basic education advocacy for special education. I am not going to

More information

My Advance Care Plan & Guide Plan the healthcare you want in the future and for the end of your life

My Advance Care Plan & Guide Plan the healthcare you want in the future and for the end of your life My Advance Care Plan & Guide Plan the healthcare you want in the future and for the end of your life Name: Date: The conversations you have with your whānau and loved ones in thinking about your advance

More information

Instructions for development of an assent script

Instructions for development of an assent script Human Research Protection Program Institutional Review Board Assent Script Template: Ages 7-11 Instructions for development of an assent script ASSENT OF MINOR (AGES 7-11) Children should be approached

More information

! 1. Telling Your Story. An Ambassador s guide to writing and speaking about the gift of life. By: Brianna Doby, donor daughter Positive Rhetoric

! 1. Telling Your Story. An Ambassador s guide to writing and speaking about the gift of life. By: Brianna Doby, donor daughter Positive Rhetoric ! 1 Telling Your Story An Ambassador s guide to writing and speaking about the gift of life By: Brianna Doby, donor daughter Positive Rhetoric ! 2 Thank you for volunteering to be an Ambassador with LifeSource.

More information

Your Rights. In An ICF-MR Program

Your Rights. In An ICF-MR Program Your Rights In An ICF-MR Program This Book Belongs To: Published by: SPINDLETOP MENTAL HEALTH AND MENTAL RETARDATION SERVICES AND MENTAL RETARDATION November, 1998 Table of Contents A Special Note About

More information

MITI Coding - Behavioral Counts

MITI Coding - Behavioral Counts An Initial Interview University of New Mexico Center on Alcoholism, Substance Abuse, and Addictions Tape B Phase I Part 2 Motivational Interviewing Professional Training Videotape Series 1998 MITI Coding

More information

Our Digital Future: An Interview with the UM Dean of School of Information

Our Digital Future: An Interview with the UM Dean of School of Information University of Michigan Deep Blue deepblue.lib.umich.edu 2011-01 Our Digital Future: An Interview with the UM Dean of School of Information MacKie-Mason, Jeffrey K.; Peters, Allison; Wang, Julia; Zhang,

More information

Raising Difficult Issues with Your Service Provider

Raising Difficult Issues with Your Service Provider Sel f-de ter m in at ion Series Raising Difficult Issues with Your Service Provider Determine Your Destiny Raising Difficult Issues with Your Service Provider Prepared by: Carol A. Petersen, M.Ed. Jessica

More information

Digital Citizenship Continuum

Digital Citizenship Continuum Digital Citizenship Continuum -curricular Competencies (Develop Thinking, Develop Identity and Interdependence, Develop Literacies, and Develop Social Responsibility) support student achievement and the

More information

Alexander Patterson Interview Transcript

Alexander Patterson Interview Transcript Alexander Patterson Interview Transcript INTERVIEWER: Could you please state your name and affiliation with the Railway Mail Service? Alexander Patterson: Well, Alexander Patterson Jr., and I was with

More information

What are References?

What are References? References Boston University College of Engineering Career Development Office 44 Cummington Street, Room 112 Boston, MA 02215 (617) 353-5731 www.bu.edu/eng/careers What are References? References are individuals

More information

KETONX SAMPLE TRAINING

KETONX SAMPLE TRAINING HOW TO EXPLODE YOUR BUSINESS IN 10 DAYS 1. Develop Ketopia Sample Packs 2. Create a Prospect Profile 3. Ask Qualifying Questions 4. Follow the Pre-Sample Script 5. Follow-Up & Close the Sale Using Script

More information

Episode 6: Can You Give Away Too Much Free Content? Subscribe to the podcast here.

Episode 6: Can You Give Away Too Much Free Content? Subscribe to the podcast here. Episode 6: Can You Give Away Too Much Free Content? Subscribe to the podcast here. Hey everybody! Welcome to episode number 6 of my podcast. Today I m going to be talking about using the free strategy

More information

A Human Factors Approach to. Healthcare

A Human Factors Approach to. Healthcare A Human Factors Approach to Securing Information Technology in Healthcare Kelly Caine Principal Research Scientist School of Informatics & Computing Center for Law, Ethics, and Applied Research in Health

More information

1. How old were you when you had your first drink? Describe what happened and how you felt.

1. How old were you when you had your first drink? Describe what happened and how you felt. Introduction Congratulations and welcome to treatment! You have made a monumental step in recovery. You can be proud of yourself. You can feel confident that treatment works. Ninety percent of patients

More information

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP

ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: BRIDGING THE GAP Association for Information Systems AIS Electronic Library (AISeL) MWAIS 2007 Proceedings Midwest (MWAIS) December 2007 ETHICS AND THE INFORMATION SYSTEMS DEVELOPMENT PROFESSIONAL: ETHICS AND THE INFORMATION

More information

THE COFFEE SHOP INTERVIEW

THE COFFEE SHOP INTERVIEW Thank you so much for taking the time to participate in the webinar. I promised you two of my secret weapons and here they are! First we have the 7 steps I live every day of my life by. Those steps guide

More information

MS Learn Online Feature Presentation. Career Crossroads: Maximize Your Potential

MS Learn Online Feature Presentation. Career Crossroads: Maximize Your Potential MS Learn Online Feature Presentation I m so sorry I m late! I got caught up with stuff at work, and completely lost track of time. You need one of these. Girl, you know I do not do digital. As far as I

More information

How To Ace Any Job Interview

How To Ace Any Job Interview Page 1 of 1 Contents Interviewing Tips: Interview For Success... 9 Interviewing Tips: What You Can Expect From An Interview... 10 Interviewing Tips: How To Guarantee You'll Perform Well... 11 Interviewing

More information

Privacy Policy Framework

Privacy Policy Framework Privacy Policy Framework Privacy is fundamental to the University. It plays an important role in upholding human dignity and in sustaining a strong and vibrant society. Respecting privacy is an essential

More information

Mock Sides: Original Scripts for Workshop Actors TAKING ADVANTAGE. Written by. David Dalton & Chad Schnackel

Mock Sides: Original Scripts for Workshop Actors TAKING ADVANTAGE. Written by. David Dalton & Chad Schnackel TAKING ADVANTAGE Written by David Dalton & Chad Schnackel Pages: 4+ Characters: Catherine, 70+ Simon, 25+ Luke, 25+ Synopsis: Catherine meets with a shady scam artist, Simon. Fortunately her nephew Luke

More information

Advance Care Planning Conversations:

Advance Care Planning Conversations: Advance Care Planning Conversations: A Guide for You and Your Substitute Decision Maker Read this to learn about: How you can prepare for having Advance Care Planning Conversations What it means to be

More information

SECTION 2. Computer Applications Technology

SECTION 2. Computer Applications Technology SECTION 2 Computer Applications Technology 2.1 What is Computer Applications Technology? Computer Applications Technology is the study of the integrated components of a computer system (such as hardware,

More information

November 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University

November 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University Keynote Speaker Penn State Panelists Rebecca Wang Eric P. S. Baumer November 6, 2017 Haiyan Jia Gaia Bernstein Seton Hall University School of Law Najarian Peters Seton Hall University School of Law OVERVIEW

More information

Professional Etiquette

Professional Etiquette Module 3: PROFESSIONAL ETIQUETTE 1 Your Passport to Professionalism: Module 3 Professional Etiquette Steps in this module: 1. Learn: Read the following document. 2. Complete the checklist response activity

More information

It Can Wait By Megan Lebowitz. Scene One. (The scene opens with Diana sitting on a chair at the table, texting. There are four chairs at the table.

It Can Wait By Megan Lebowitz. Scene One. (The scene opens with Diana sitting on a chair at the table, texting. There are four chairs at the table. It Can Wait By Megan Lebowitz Scene One (The scene opens with Diana sitting on a chair at the table, texting. There are four chairs at the table.) (Mrs. Jones enters) Mrs. Jones: Diana, please get off

More information

Examples of Referrals Requests

Examples of Referrals Requests 1) A Dating Coach Examples of Referrals Requests Background: Laura is a personal life coach specializing in helping women date and find a spouse. Laura is like an ultimate big sister" - a senior female

More information

How to Communicate Effectively With Anyone: Persuasion Mastery. Elizabeth Oprah

How to Communicate Effectively With Anyone: Persuasion Mastery. Elizabeth Oprah How to Communicate Effectively With Anyone: Persuasion Mastery Elizabeth Oprah Copyright 2012 by Elizabeth Oprah All rights reserved. The reproduction or utilization of this work in whole in part, in any

More information