Introduction to Ubicomp Privacy or Is Privacy the Achilles’ Heel of Ubicomp?

Slides:



Advertisements
Similar presentations
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Advertisements

Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Privacy Chris Kelly iLaw July 5, 2002.
Applications and Privacy Issues with Sensor Nets Jason Hong Carnegie Mellon University.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
Privacy and Sensor Andrew Jason Hong. Characteristics –Real-time, distributed –Invisibility of sensors –Potential scale Questions –What data is collected?
March 13, 2004Securing Privacy Conference1 SENSOR NETWORKS & PRIVACY Pamela Samuelson, UC Berkeley, Securing Privacy Conference, March 13, 2004.
3 Ethics and Privacy.
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
1 Requirements Analysis and Design Engineering Southern Methodist University CSE 7313.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Basic Persuasion Skills in Employee Ownership Corey Rosen National Center for Employee Ownerships.
6.2.1 Computer Applications How the use of technology affects humans CYBERBULLYING Slide Show created by Mae Thomas Sep 2009.
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Science What is “Safety” Freedom from danger Safety is the condition of being protected against failure, breakage, error, accidents, or harm. (Protection.
Digital Citizenship - Framework for Teaching Digital Citizenship Mike Ribble Instructional Services Coordinator College of Education Kansas State University.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
Internet Safety Plan Sophomore Year. Essential Questions How will I know what risks I am exposing myself to when I make decisions online? How will I be.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
DIGITAL FOOTPRINT Everything you do is online. How you can protect yourself and your info.
Privacy for Pervasive Computing Slides based on
Intro to Ubicomp Privacy Jason I. Hong. Ubicomp envisions –lots of sensors for gathering data –rich world models describing people, places, things –pervasive.
Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems Marc Langheinrich - Swiss Federal Institute of Technology, Zurich Whitney Hess.
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
MISSION What conditions must be met to ensure that the digital world of work is humane? EntriesTotalBalance Data Protection High and safe standards of.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
Prof. James A. Landay University of Washington Spring 2008 Web Interface Design, Prototyping, and Implementation Ubicomp Design Pre-Patterns May 29, 2008.
Privacy and Public Policy Implications of IoT
Creating your online identity
Consultation: Your Say ….
UNIT 4 – THE COST OF FREE LESSON 4.
Richard Purcell Corporate Privacy Officer Microsoft Corporation
K-3 Student Reflection and Self-Assessment
Other Sources of Information
UNIT 4 – THE COST OF FREE LESSON 6.
Protecting Business Assets While Enabling Performance
Being Aware of What You Share
IT and Society Week 2: Privacy.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Introduction to Ubicomp Privacy or Is Privacy the Achilles’ Heel of Ubicomp?

Protection from spam, identity theft, mugging Discomfort over surveillance –Lack of trust in work environments –Might affect performance, mental health –May contribute to feeling of lack of control over life Starting over –Something stupid you did as a kid Creativity and freedom to experiment –Protection from total societies –Room for each person to develop individually Lack of adoption of ubicomp tech Why Care About Privacy? End-User Perspective Everyday RisksExtreme Risks Stalkers, Muggers _________________________________ Well-being Personal safety Employers _________________________________ Over-monitoring Discrimination Reputation Friends, Family _________________________________ Over-protection Social obligations Embarrassment Government __________________________ Civil liberties

Ubicomp envisions –lots of sensors for gathering data –rich world models describing people, places, things –pervasive networks for sharing This data can be used for good and for bad The Fundamental Tension Find FriendsSmart HomesSmart Stores

Most obvious problem with ubicomp by outsiders Why Care? Designer and App Developer Perspective

“Do I wear badges? No way. I am completely against wearing badges. I don't want management to know where I am. No. I think the people who made them should be taken out and shot... it is stupid to think that they should research badges because it is technologically interesting. They (badges) will be used to track me around. They will be used to track me around in my private life. They make me furious.” Ubicomp “might lead directly to a future of safe, efficient, soulless, and merciless universal surveillance” – Rheingold Why Care? Designer and App Developer Perspective

What is Privacy? No standard definition, many different perspectives Different kinds of privacy –Bodily, Territorial, Communication, Information

What is Information Privacy? Many different philosophical views on info privacy –Different views -> different values -> different designs –Note that these are not necessarily mutually exclusive

Principles vs Common Interest Principled view -> Privacy as a fundamental right –Embodied by constitutions, longstanding legal precedent –Government not given right to monitor people Common interest -> Privacy wrt common good –Emphasizes positive, pragmatic effects for society Examples: –National ID cards, mandatory HIV testing

Self-determination vs Personal Privacy Self-determination (aka data protection) –Arose due to increasing number of databases in 1970s –“Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” (Westin) –Led to Fair Information Practices (more shortly) –More of individual with respect to government and orgs Personal privacy –How I express myself to others and control access to myself –More of individual with respect to other individuals

Self-determination vs Personal Privacy Examples: –Facebook –Cell phone communication –Instant messaging

Privacy as Solitude “The right to be let alone” People tend to devise strategies “to restrict their own accessibility to others while simultaneously seeking to maximize their ability to reach people” –(Darrah et al 2001) Example: –Spam protection, undesired social obligations Ubicomp: –Able to turn system off, invisible mode

Privacy as Anonymity Hidden among a crowd Example: –Web proxy to hide actual web traffic Ubicomp: –Location anonymity –“a person” vs “Asian person” vs “Jason Hong”

Transparent Society –Multi-way flow of info (vs one-way to govts or corporations) Don’t care –I’ve got nothing to hide –We’ve always adapted –"You have zero privacy anyway. Get over it." Fundamentalist –Don’t understand the tech –Don’t trust others to do the right thing Pragmatist –Cost-benefit –Communitarian benefit to society as well as individual Other Views on Privacy

You know it when you lose it

Hard to define until something bad happens –“Well, of course I didn’t mean to share that” Risks not always obvious –Burglars went to airports to collect license plates –Credit info used by kidnappers in South America Change in comfort with time and/or experience Cause and effect may be far in time and space Malleable depending on situation –Still use credit cards to buy online –Benefit outweighs cost Why is Privacy Hard?

Data getting easier to store –Think embarrassing facts from a long time ago (ex. big hair) –Think function creep (ex. SSNs) Hard to predict effect of disclosure –Hard to tell what credit card companies, Amazon are doing Market incentives not aligned Easy to misinterpret –Went to drug rehabilitation clinic, why? Bad data can be hard to fix –Sen. Ted Kennedy on TSA watch list Why is Privacy Hard?

Fair Information Practices (FIPs) Based on Self-determination / Data Protection view Set of principles stating how organizations should handle personal information Note: many variants of FIPs

Fair Information Practices (FIPs) Openness and transparency Individual participation Collection limitation Data quality Use limitation Reasonable security Accountability

Adapting FIPs for Ubicomp Presents a method for analyzing ubicomp systems Assume designers trying to do “the right thing” ™ –Versus evil people actively trying to intrude Notice –Physical beacons beaming out P3P policies –Personal system that logs policies Issues –Overwhelmed by notifications? –Understandability of notifications?

Adapting FIPs for Ubicomp Choice and consent –Need a way to confirm that a person has consented –Can digitally sign a “contract” notification Issues –How can people specify their policies? –Can policies match what people really want? –How to make people aware of auto-accepts? –What if people don’t have a real choice

Adapting FIPs for Ubicomp Anonymity and Pseudonymity –Try to eliminate any trace of identity –Or have a disposable identifier not linked to actual identity Issues –What kinds of services can be offered anonymously? –Business models for anonymous services?

Adapting FIPs for Ubicomp Proximity –Limit behavior of smart objects based on proximity Ex. “Record voice only if owner nearby” –Simple mental model, could be hard to implement though –Weakness: could be easy to subvert Locality –Information tied to places it was collected –Require physical proximity to query –Weakness: limits some utility (ex. Find friend)

Adapting FIPs for Ubicomp Access and Recourse –How to know what the system knows about you? –What mechanisms for recourse? Suggests minimizing information collected to avoid this issue (possible in practice?)

Design for Privacy in Ubiquitous Computing Environments Presents a method for analyzing ubicomp systems –Looks primarily at control and feedback –Looks at networked media spaces, audio-video connections between two locations –More of a personal privacy approach One point they briefly mention is value proposition –At EuroPARC people generally do not worry much about privacy. They feel that the benefits of RAVE outweigh their concerns. This is because the design has evolved together with a culture of trust and acceptable practices relating to its use. Individual freedom was fostered to use, customise, or ignore the technology.

Framework Capture –What kind of information? –Video? Identity? Activity (documents, keypresses, etc) Construction –How is information processed? Stored? Accessibility –Who can see the information? Purpose –How is information used? Might be used?

(Some) Criteria for Evaluating Systems Appropriate timing Perceptibility Unobtrusiveness Low effort Meaningful Low Cost

Discussion Points Is Privacy Always Good?

Can be used as a shield for abusive behavior Supermarket loyalty cards –Gauge effect of marketing, effects of price and demand –Market to best customers Can streamline economic transactions –Easy credit Reputation management EU – “Regulators prosecuted an animal rights activist who published a list of fur producers and a consumer activist who criticized a large bank on a Web page that named the bank’s directors.” Discussion Points Is Privacy Always Good?

Discussion Points Ways of Simplifying Privacy for People? Lots of effort across various systems –Mobile Phone, TiVo, Smart Car, Smart Home, Workplace –Analogy: privacy across various web sites Ways of making it easier for people? –What kinds of tools? –Third party organizations? (MedicAlert)

Breakout Groups Group A: Is privacy always good? –In what cases not? –Too much privacy? (ie get used to it, like security cams?) Group B: How to simplify privacy for people in ubicomp? –Core technologies? –Third parties? –User interfaces?

What is the role of tech? How much should it do? –With respect to Market, Law, and Social Norms? What values should we embody in tech? –And how to design for those values? –Is privacy always good to have? How to assess risks better beforehand? Better h/w and s/w architectures? –Physical layer of privacy? Better UIs? Understandable mental models? Metrics for privacy? Third parties / companies that manage your privacy? Discussion Points

Make it easy for organizations to do the right thing –Detecting abuse (ex. honeypots, audits) –Better database aggregation and anonymization –Better org-wide policies and enforcement Make it easy for individuals to share right info with right people at right times –Better ubicomp architectures that put end-users in control Can’t just flip a switch Make it easier for app developers to do right thing –Better UIs (awareness, disclosures, decision-making) –Better design and evaluation methods Fundamental Tech Challenges

Scope and scale –Everyone, everywhere, any time More personal –Location, activities, habits, hobbies, people with Breaks existing notions of how world works –Close the door –Whisper to people Connected –Easy to share with others Machine readable and searchable How Ubicomp Changes the Landscape