Privacy in context Author: Helen Nissenbaum Juan Lockett, Junghwan Shin, J. Karlo Pajota, Mike Nguyen, Vikesh Parmar, Wing Shan Ho (Rosana), Adom Greene,

Slides:



Advertisements
Similar presentations
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Advertisements

Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. It protects the right to: -Express ourselves.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER SEVEN NETWORKS: MOBILE BUSINESS CHAPTER SEVEN NETWORKS:
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Chapter 6 Database Design
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
3 Ethics and Privacy.
6 Chapter 6 Database Design Hachim Haddouti. 6 2 Hachim Haddouti and Rob & Coronel, Ch6 In this chapter, you will learn: That successful database design.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
CHAPTER OVERVIEW SECTION 7.1 – Connectivity: The Business Value of a Networked World Overview of a Connected World Benefits of a Connected World Challenges.
19 Managing Personal Communications 1. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 19-2 Chapter Questions  How can companies.
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
C4- Social, Legal, and Ethical Issues in the Digital Firm
21st Century Skills Initiatives
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Privacy as contextual integrity Helen Nissenbaum New York University September 6, 2007 Ars Electronica, Linz Support.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
IST 210 Database Design Process IST 210 Todd S. Bacastow January 2005.
Week 4 Lecture Part 3 of 3 Database Design Samuel ConnSamuel Conn, Faculty Suggestions for using the Lecture Slides.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford
Contextual Integrity as a Normative Guide for Privacy Helen Nissenbaum New York University * School of Information, UC Berkeley April 2, 2008 * Supported.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
Privacy in Context Helen Nissenbaum Department of Culture and Communication New York University m Research supported.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
Technical Session 1: Enhancing Resilience at the Local Level Background document IFRC & ADRRN.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Computer Science and Engineering 1 Mobile Computing and Security.
CHAPTER 5 ETHICS & PRIVACY.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
IST 210 Database Design Process IST 210, Section 1 Todd S. Bacastow January 2004.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
BIS 220 MASTER Leading through innovation/bis220masterdotcom.
1 Ethics of Computing MONT 113G, Spring 2012 Session 27 Ethics in IT Societies III Privacy.
Judicial Training on Data Protection and Privacy Rights
Privacy and the Law.
DATA SECURITY FOR MEDICAL RESEARCH
Add video notes to lecture
Data and database administration
INF 103 MART Successful Learning/inf103mart.com
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Chapter 6 Database Design
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
19 Managing Personal Communications
INF 103 Education for Service-- snaptutorial.com.
INF 103 Teaching Effectively-- snaptutorial.com
INF 103 Education for Service-- tutorialrank.com
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
INFS 452 – Computer Ethics & Society
18734: Foundations of Privacy
Presentation transcript:

Privacy in context Author: Helen Nissenbaum Juan Lockett, Junghwan Shin, J. Karlo Pajota, Mike Nguyen, Vikesh Parmar, Wing Shan Ho (Rosana), Adom Greene, James Turman

Introduction Part I : Information Technology’s Power and Threat Part II: Critical Survey of Predominant Approaches to Privacy Part III: The Framework of Contextual Integrity

Part I: Chapter 1 Overview of technology-based systems and practices that are seen as threats to privacy Closed-Circuit Television Sensor Networks Data records

Part I: Chapter 1 Overview of technology-based systems and practices that are seen as threats to privacy Mobile Phone Triangulation Global Positioning Systems (GPS) Tracking Applications

Part I: Chapter 1 Overview of technology-based systems and practices that are seen as threats to privacy In Public Roadways: License Plate Readers

Part I: Chapter 1 Overview of technology-based systems and practices that are seen as threats to privacy In Online Monitoring:

Part I: Chapter 1 Overview of technology-based systems and practices that are seen as threats to privacy Uses of Radio Frequency Identification (RFID): ●Road toll systems ●Proximity cards ●Keyless automobile entry ●Tracking of air cargo ●Wristbands for newborn ●Implantable transponder chip ●Tracking of goods along distribution channel ●RFID-enabled passports ●RFID-enabled Identification cards

Part I: Chapter 2 Knowing Us Better than We Know Ourselves: Massive and Deep Databases Three areas of information science and technology have contributed to the landscape of threat 1.Capacity2. The Internet3. Advances in Computer Software

Part I: Chapter 2 The Four Pivotal Transformations 1. Democratization of Database Technologies: 2. Information Mobility: EMR EHR Vendors

Part I: Chapter 2 The Four Pivotal Transformations 3. Information Aggregation: 4. Information from Data, Knowledge from Information: DB 1 DB 2 Internet

Part I: Chapter 2 The Four Pivotal Transformations Netflix’s recommendation engine Amazon’s item-to-item collaborative filtering

Part I: Chapter 2 Online Data Vendors ●Acxiom Corporation ●ChoicePoint, Inc. ●First Advantage Corporation

Part I: Chapter 3 ●Capacity to Spread and Find Everything, Everywhere ●Enhanced powers to gather and stockpile information have yielded socio-technical practices often experienced as threats to privacy

Part I: Chapter 3 cont. ●Public records are government records about individuals that are open to public inspection without restriction

Part I: Chapter 3 cont. ●The degree of their accessibility is generally determined by two regulatory regimes exerting force in opposite directions. ●1966 Freedom of Information Act ●1974 Privacy Act

Part I: Chapter 3 cont. ●Social networking sites constitute a subdomain of the larger social software ecosystem,sometimes called Web 2.0 ●a loose class of Web sites dedicated to creating and maintaining social ties, groups, and networks.

Part I: Chapter 3 cont. ●At least three different types of privacy issues have arises in the context of social network sites.

Part II Chapter 4 Locating the Value in Privacy Ruth Gavison: privacy locates its value in its functional relationship to valued ends, including human well-being and development, creativity, autonomy, mental health, and liberty

Part II Chapter 4 cont. Hoven: Four types of moral reasons for why privacy deserves protection: 1. Information-based harm: ●increase critical transactions through internet and phone ●unrestricted availability of information e.g SSN, passwords ●protects against identity theft and undesirable access to personal information

Part II Chapter 4 cont. 2. Informational inequality: ●e.g get a job, obtain a critical loan ●We have little or no voice or choice in the data collections and sharing process ●We do not know who has what information, how they got it... ●restricts the ability of governments, corporations, etc. to collect information about individuals in a one-way

Part II Chapter 4 cont. 3. Informational injustice: ●e.g a job candidate's medical history or religious affiliation found in company’s file → may affect the hiring manager’s decision ●ensures that information is only used in the appropriate context

Part II Chapter 4 cont. 4. Encroachment on moral autonomy: ●allows individuals to independently pursue moral development ●the capacity to reflect on our moral career, ●identify with our own moral choice ●without interference of others ●without pressure to conform to the “normal” or socially desired identities

Chapter 5: Privacy in Private Private and Public ●Private and public have varying meaning from arena to arena o to citizens private means familial, or intimate relations o public means civic actions beyond the home and the personal

Chapter 5: Privacy in Private continued Information:Private versus public ●Scope and extent of privacy protection o FERPA(Family Education Rights and Privacy Act) o HIPPA(Health Insurance Portability and Accountability Act) o Video Privacy Protection Act o US Patriot Act o FCC’s Net Neutrality Act

Chapter 5: Privacy in Private continued Interactions, Gray Areas, and Applications ●Garbage is considered a gray area because it has been ruled public domain by the courts ●Internet ●Telephone conversations

Part II: Chapter 6 Skeptic’s points against privacy: 1.Convenience over privacy 2.“Media exhibitionism” ●People unaware their information is being used ●Key point: The framework of contextual integrity is able to respond to all challenges

C hapter 7: Context Informational Norms ●Contextual Integrity ○ holds when context of relative informational norms are respected; it is violated when they are breached ●Attributes ○ type of information ●The inappropriateness of flow of information ○ Sender, Receiver, Type of Information Google + & Facebook Health care information

Part III: Chapter 8 Contextual integrity as a justification ●Adheres to currently accepted norms o Cost of any new practice not adhering to norms is not justified ●Tyranny of the normal o Unless the technology is accepted as normal it is not accepted at all ●Conservatism o expectations being fulfilled o violation of conservative norms is a breach of contextual integrity

Part III: Chapter 8 continued Contextual values vs. value of contexts ●Contextual norms are to be overcome when novel practices are clearly needed ●When a current practice is in violation of norms o What are it’s information flows? o What is the main context? o How and why does it defy norms? o What are the moral factors? o Where does it deviate from the norms?

Part III: Chapter 9 Privacy Rights in Context: Applying the framework ●Privacy is one of the most enduring social issues associated with information technologies. ○Public discourse through radical transformations of technology from stand-alone computers. ○Housing massive databases of government and other large institutions. ○To the current distributed network of computers with linked information systems, such as the World Wide Web, networked mobile devices, video and radio-frequency surveillance systems, and computer- enabled biometric identification.

Part III: Chapter 9 cont. ●Contextual integrity ties adequate protection for privacy to norms of specific contexts, demanding that information gathering and dissemination be appropriate to that context and obey the governing norms of distribution within it. ●Three key elements of the framework - explanation, evaluation and prescription. ○Explanation - Affect people’s reactions to new systems or practices. ○Evaluation - Resolve a controversy, or at least to clarify what is at stake. ○Prescription - Resistance and protest

Part III: Chapter 9 cont ●Problems arise when policies governing systems and practices assume that only the private warrants privacy protection and for the rest, anything goes. ●The new system violates contextual integrity. ○CCTV - Control over personal information. ○RFID - Information transmit ○Online - Network diminishes information flow etc ○Search engines - Personal information. ○Social network - Privacy sharing ●Conclusion - controversial issues of privacy have been in the world. Information technology has good things but bad things.