Protecting Children’s Personal Information: Using Contextual Integrity Theory to Examine Information Boundary on Mobile Devices Ying Chen*, Sencun Zhu*,

Slides:



Advertisements
Similar presentations
Child-friendly Terms of Use: Empowering children through social media Veronica Donoso 2 December, ICT coalition forum, Brussels.
Advertisements

Children Aged 5 to
InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
1 Disclosure and Privacy 10: Inter-Act, 13 th Edition 10: Inter-Act, 13 th Edition.
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
Pediatric Ethics Subcommittee of Pediatric Advisory Committee, September 10, 2004 Analysis of Research Protocols Involving Children: Combining Subparts.
Handle with care : Digital marketing and online behavioural advertising Global guidance to help improve consumer trust in practice, techniques and messages.
Problems with Notice and Consent? Helen Nissenbaum, NYU INCO-TRUST Workshop, May Work supported by: NSF ITR : Sensitive Information in.
On Privacy and Compliance: Philosophy and Law meets Computer Science Anupam Datta Stanford University Oakland PC Crystal Ball Workshop January 2007.
Abstract This study examines the factors that influence the mode choice of students traveling to and from school. A paper survey was developed and conducted.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Helping your family to stay in control Living with technology.
ICTS and VIOLENCE AGAINST CHILDREN: MINIMISING RISKS AND RELEASING POTENTIAL EXPERT CONSULTATION Costa Rica, 9-10 June 2014 Renato Leite Monteiro Council.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Y OUNG C YPRIOT I NTERNET USERS : A QUANTITATIVE SURVEY IN THE CONTEXT OF EU K IDS O NLINE (Co-authors: Tatjana Taraszow & Yiannis Laouris) May 2008.
Staying Safe on the Internet Parent/Carer Meeting Tuesday 24 th March 2015.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
Students in our 5 th grade classrooms are going to receive their own iPad to use during the school day. This allows for even more opportunities for creativity,
Contextual Integrity as a Normative Guide for Privacy Helen Nissenbaum New York University * School of Information, UC Berkeley April 2, 2008 * Supported.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
Legal and Ethical Issues Counseling Children. Child and Adolescent Clients Counselors who work with children and adolescents under the age of 18 may experience.
Android Security Model that Provide a Base Operating System Presented: Hayder Abdulhameed.
Mobile Usage Patterns and Privacy Implications Michael Mitchell March 27, 2015 Ratnesh Patidar, Manik Saini, Parteek Singh, An-I Wang Florida State University.
Model-Driven Engineering of Behaviors in User Interfaces Efrem Mbaki & Jean Vanderdonckt Université catholique de Louvain (UCL) Louvain School of Management.
I.H. TorosluESSW Workshop Budapest May 20, A Semantic based Privacy Framework for Web Services Arif Tumer, Asuman Dogac, Hakki Toroslu Middle East.
Interpersonal Privacy Nudge for Promoting Privacy Protective Behaviors on Social Network Sites Haiyan Jia & Heng Xu College of Information Sciences and.
Use of information technology in the educational system in Bulgaria State policy of implementing security and safety measures of pupils in network.
9th International Conference “Keeping children and young people safe online” 1 Szymon Wójcik Nobody’s Children Foundation Warsaw, Poland.
Technology Safety for Children Carol Lawrence, Technology TOSA.
Helping your family to stay in control Living with technology.
Online Safety Parent Workshop Helping to keep your children safe online.
PEDAGOGICAL TOOLS METHODOLOGICAL CRITERIA. The methodological tools should… - be culturally sensitive, - consider age and use the knowledge of old generation.
1 Clara Sommarin, Child Protection Specialist Exploitation and Violence UNICEF Headquarters ICTs and Child Participation ICTS AND VIOLENCE AGAINST CHILDREN:
Welcome to the parents’ forum. Facts Social media Cyber-bullying Keeping your child safe School policy.
20-April-07UNECE Transport Division Road Safety Week 23 – 27 April 2007.
Increasing throughput and success rate in open and distance learning using mobile technology: A case study By Nkhangweleni Patrick Mafenya.
Chapter 5 Ethical Concerns in Research. Historical Perspective on Ethics Nazi Experimentation in WWII –“medical experiments” –Nuremberg War Crime Trials.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
MODULE 1 – THE LAW OF WAR + REPORTING On completion of this module, participants will understand that the aim of the course is to introduce the law applicable.
Powered by Parents e-Safety questionnaire Tuesday, February 16, 2016.
Safe Social Networking: Parent Workshop Helping to keep your children safe online.
ELWORTH & E-SAFETY EXTRACTS FROM E-SAFETY PARENTS PRESENTATION – WEDNESDAY 4 TH NOVEMBER.
Internet Safety at DESS. What Children do Online and the risks they are exposed to The following presentation outlines the various activities that children.
Digital Futures ICT Conference for Schools Southampton, March Heidi Hasbrouck.
Protecting Children from Bullying and Cyberbullying: Awareness Raising and Public Policies: Some examples from Ireland Brian O’Neill Dublin Institute of.
1. Scope of Application 2. Use Case Actors Data Flows Touch Points Initial PI 3. PI - at Touch Points In Internal Out 4. PI - Operational Privacy Policies.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
Awareness Raising Session for Parents and Carers Mr Norris E-Safety.
HEBER PRIMARY SCHOOL PARENT AND PUPIL E-SAFETY WORKSHOP in CLASS 6K
Staying Safe Aims Clip To let you know about communication apps that children are using. To give you some ‘How to’ guides to set parental filters for the.
Safeguarding Key Stage 3
E-Safety for parents What you need to know…..
Club Drug Use and Risky Sexual Behavior Among Latino and Other MSM
Research Ethics Matthew Billington
CHILDREN PROTECTING THEMSELVES
E-safety and Social Media
Increasing Safety for your Child On-line and in the Real World.
De Bohun Primary School
Introduction for Families
The Male Circumcision Project
“Location Privacy Protection for Smartphone Users”
Brian O’Neill Dublin Institute of Technology 9/10 May Florence
PRIVACY PRESENTATION TO THE SPRING 2013 CONFERENCE BY HANK MOORLAG
E-Safety.
Child Safety Online.
Presentation transcript:

Protecting Children’s Personal Information: Using Contextual Integrity Theory to Examine Information Boundary on Mobile Devices Ying Chen*, Sencun Zhu*, Yilu Zhou +, Heng Xu* *The Pennsylvania State University + Fordham University

Children’s Privacy Risk with Mobile Use 25% of toddlers used their parents’ smartphones in % of American children aged between 6 and 12 want iPad for Christmas gift Nearly 10% children get first mobile phone by the age 5

Children’s Privacy Risk with Mobile Use Children’s personal information (CPI) can be easily leaked via mobile use Sharing CIP on mobile devices to third-parties exposes children to risks such as cyber-solicitation Only 13% of mobile apps have privacy policies regarding collection and distribution of children’s personal information

Parents Unaware of Privacy Risks

Let strangers know these information is dangerous for children Where are you at this moment? How can I bond with you?

Contextual Integrity Theory as a Theoretical Framework We use the contextual integrity theory to examine information boundaries on mobile platforms We aim at developing quantitative measures of privacy risks on children’s mobile apps We propose context-based mobile privacy controls, and perform a case study to examine the information boundaries among the top 49 coloring apps

Contextual Integrity Theory as a Theoretical Framework Nissenbaum’s theory of contextual integrity argues that privacy concerns are not absolute but largely depend on the context. In general, contextual integrity conceptualizes privacy as the flow of information of a certain type (attributes) about a subject from a sender to a recipient, governed by a particular transmission principle in a given context.

Four Elements

Case Study Exploiting contextual integrity theory to Establish a context-based access control mechanism on mobile platforms Quantitatively measure privacy risks of children’s mobile apps

Context-based Access Control on Mobile Platforms The safety level of disclosing CPI on mobile devices highly depends on the context When children use mobile devices in risky times, unprotected locations, or without guardians’ companion, mobile platforms should automatically limit the disclosure of CPI Rules can be designed on mobile platforms to limit disclosure of certain types of CPI under certain context

Quantitative Privacy Risk Measures on Mobile Apps Measure the privacy risk levels of mobile apps with three dimensions in contextual integrity: 1.actors, 2.attributes, and 3.transmission principles We conducted an experiment to show how the proposed method can effectively measure apps’ privacy risks and help parents choose safe apps for their children.

Case study

Thanks! Protecting Children’s Personal Information: Using Contextual Integrity Theory to Examine Information Boundary on Mobile Devices Ying Chen, Sencun Zhu, Yilu Zhou, Heng Xu