To Log or Not to Log? Privacy Risks and Solutions for Lifelogging and Continuous Activity Sharing Applications Blaine Price.

Slides:



Advertisements
Similar presentations
UBIQUITY V3 An extensible platform for creating dynamic, customized, and geocentric native mobile applications.
Advertisements

XProtect ® Professional Efficient solutions for mid-sized installations.
Challenges and Tradeoffs in Activity and Sleep Monitoring Blaine Price.
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
Welcome to the Safer Internet Parent’s Workshop 18 th March 2014.
OfficeTrack Mobile Employees and Fleet Management System.
The Future is Global One World One World One Service One Service One Button.
How to keep your kids safe online
Cyber Safety What Every Parent Needs to Know If your child is surfing the Web, you need to be paddling right alongside him/her.
1 Integrating personal and public transport information Fred Gangemi, Steer Davies Gleave June 21 th 2012.
The State of Security Management By Jim Reavis January 2003.
TO L0G OR NOT TO L0G? Blaine Price, Open University, UK Risks and benefits of emerging life-logging applications.
Mobile Commerce and Ubiquitous Computing
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
My Inventions, My Happiness Seminar & Round Table Discussion on Collection, Dissemination and Commercialization of Real-Time Traffic and Public Transport.
The Internet: SOCIALIZATION vs ISOLATION The Yin and Yang of BEING ONLINE.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Helping your family to stay in control Living with technology.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
TNO Telecom Supporting New Business Models for Machine/Device based Services Professor George Huitema Mobile Billing Systems 2004 Budapest
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
AQA ICT for A2 © Hodder Education 2011 Chapter 1 Future developments.
Topic: Innovation in Alertness Testing Presenter: Henry M. Bowles President of Bowles-Langley Technology, Inc. in Alameda, California
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Internet Safety Night Raising Good Digital Citizens.
International Internship Summer 2008: NICTA (Sydney, AU) Caitlin Cottrill.
© Siemens AG, 2002 s CP RS Agenda The Role of IT for Accident-free Driving Interaction with driver’s physical condition Interaction with the roadside environment.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Helping you and your family to stay in control. YouTubeWhatsApp Instagram Facebook Google Moviestar Planet Twitter Oovoo Amazon Club Penguin.
Zoning: Focused Support Christine Lewis A Carer’s Perspective.
Robert Frost Middle School PTA Meeting November 12, 2015 Presented by Karin M. Wade (7 th Grade Administrator) Parent Survey.
Helping your family to stay in control Living with technology.
Ch. 2: They're Everywhere1 Ch. 2: When They’re Everywhere Vinton G. Cerf (from Beyond Calculation) Rivier College, CS699 Professional Seminar.
Net Cetera Chatting with Kids About Being Online.
THINK CYBER SMART, BE CYBER SMART! CYBER SAFETY AND DIGITAL CITIZENSHIP IN A CLASSROOM.
Technology Tips and Safety for Parents and Teens.
Safe Social Networking: Parent Workshop Helping to keep your children safe online.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
Digital Futures ICT Conference for Schools Southampton, March Heidi Hasbrouck.
A software development company especially related with development of software in education sector. DEN has a highly interactive and user friendly interface.
Telematics derived from the Greek words “Tele” and “matos”, Tele means (far away) and matos means (derivative of Greek word machinari), Combinedly telematics.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
Mission / Core Focus  To open doors of opportunity to small companies in a big-business world.  To be a safer ride option for those who are in a vulnerable.
Internet Safety. Online Concerns: Contact Content Conduct.
Adam Main Enabler Smart Phone New Technology Data Record Collect Software Hardware Observe Activities Interface User Consumer Lives Profile Tracking.
Security and resilience for Smart Hospitals Key findings
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Cloud Security for eHealth – Study Validation
Cyber and Internet Safety (Parents’ Night)
Security service management of tomorrow
Living with technology Helping you and your family to stay in control
Welcome to Parenting in the DigitalAge.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
CYBERSECURITY FOR AUTONOMOUS VEHICLES
Enterprise Productivity Services
Mobile Commerce and the Internet of Things
Tools & Tips for keeping your kids safe online
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Online Safety: Rights and Responsibilities
Erasmus Intensive Program
Mobile Commerce and Ubiquitous Computing
Technology and the NHS.
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

To Log or Not to Log? Privacy Risks and Solutions for Lifelogging and Continuous Activity Sharing Applications Blaine Price

Lifelogging? What is this guy talking about? How many people in the room are lifeloggers/self-quantifier/self-hackers? Personal Informatics

Less common lifelogging...

Some near future or emerging technologies... Automatic location updates for – health, (child) safety, smart traffic/vehicle management – Infrastructure planning Automatic biomedical monitoring (e.g. Breathing, heartrate, stress levels) – Crowd sourcing health/pollution data, vehicles or responding in context of driver’s emotional state Automatic computer work monitoring for office workers – Improved working practices, e.g. Understanding time inefficiencies with , meetings, etc.

Methods for Understanding user privacy requirements and Risks from emerging technologies People are bad at: 1.understanding the future value of revealing private information today 2.understanding the risks from technology they have not yet used or heard of OU/PRiMMA Project: Contravision, User Studies ENISA: Scenario Analysis->Risk analysis

Contravision One short video story in six scenes presented in 2 versions of the same story The protagonist demonstrates technology use, allows user to vicariously experience the technology: – One version everyone has positive experience – Other version highlights privacy risks – Viewers see one version (without being told which) and report on their experience

Scenario Technical Assumptions 1 Network infrastructure expands to blur distinctions between being offline or online seamless interaction between devices, at home, at work and while mobile Powerful new data, video and image-mining technologies will emerge Continued developments in ”green” ICTs promote new services There will be significant advances in battery storage and energy optimisation in devices

Scenario Assumptions 2 Smart devices (e.g. Cameras, mobile phones) continue to evolve, increased storage, processing & networking. Self-locating will be integral part of an ever-increasing range of devices and applications. New smart networked devices, such as bio-sensors, will emerge and will enable the collection of more and new personal data individuals, such as: – Biometric sensors for identification, health management and mood sensing, creating new ways of interacting with devices – Sensors built into every-day objects, such as mirrors, bicycles, automobiles which will be integrated into life-logging applications.

Scenario Family A day in the life of a family in Malmo, Sweden, 5 years from now... Annika, a professional mum, normally office based – subscribes to company work monitoring program to improve her productivity – drives a car that self locates for traffic congestion sharing and helps road infrastructure planning – has a Lifelog Jewellery pendant with a small bluetooth camera – monitors her children’s online activities Bent, a self-employed dad, works from home, – cycles into town to meet clients, cycle has location/pollution sensors – Has asthma, wears biosensor patches monitoring his status, sharing with doctors and his medical insurance company – Uses smartphone for all transactions, automatically sends paperless receipts to tax office for which he receives a discount on his tax

Scenario continued Dana, 14-year old daughter, high school student – Has location tracking phone but hides true location from parents – Posts fake Facebook messages, has really joined a darknet social net to get closer to 16-year old boy Christer, 12-year old son, high school student – Uses knowledge of social network tracking technology to “accidentally” meet a girl he fancies – Mother tracks him playing too many online games with overseas friends and cuts off his gaming access

Risk Analysis Methodology Identify tangible and intangible Assets from scenario Map Threats to each of the vulnerabilities for each Asset Calculate Risk = f(Asset, Vulnerability, Threat) Priority sort Risks, make Recommendations

Overview of Recommendations Transparency and User Control – Both tools and legal requirements for users to see where data is going Security and Privacy by Default – User interface nudges towards privacy – Right to be forgotten Competition – Data portability and interoperability

New Work: Applications of Lifelogging Technologies First studies looking at measuring individuals activities and correlating with how well they are sleeping Exploring privacy issues as they arise in real life use of the technology Exploring individual differences in persuasive technologies for behaviour change

Lifelogging Technologies Persuasive Technologies Working Here

Smartphone Apps Sleep Automation/ Convenience Accuracy/ Precision Data Openness Activity Automation/ Convenience Accuracy/ Precision Data Openness* Non- Invasiveness

Proprietary Devices (Sleep) Data Openness Automation/ Convenience Data Openness Accuracy/ Precision Non- Invasiveness Automation/ Convenience Accuracy/ Precision Automation/ Convenience

Results....not yet Study just about to start.... Results by the end of the Summer... Questions?