Copyright, 2000-02 1 E-Consent A Critical Element of Trust in e-Business Roger Clarke, Xamax Consultancy Pty Ltd

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

EC Admin Functionality Enhancements December 2001 Release
Copyright Trust Among Mobile Business Partners Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, U.N.S.W.,
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
1 UNIVERSITIES of AUSTRALASIA BENCHMARKING RISK MANAGEMENT BILL DUNNE DIRECTOR RISK MANAGEMENT UNSW. PROUDLY SPONSORED BY UNIMUTUAL.
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Copyright, Invitation to Research RESEARCH ETHICS Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong Visiting.
Copyright Digital Privacy Roger Clarke, Xamax Consultancy, Canberra Board Member, Australian Privacy Foundation Visiting Professor, Unis. of.
Copyright, A Pilot Study of the Effectiveness of Privacy Policy Statements Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor,
Chapter 24 Quality Management.
Chapter 7 Constructors and Other Tools. Copyright © 2006 Pearson Addison-Wesley. All rights reserved. 7-2 Learning Objectives Constructors Definitions.
Chapter 1 The Study of Body Function Image PowerPoint
© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
Jeff Mischkinsky Nickolas Kavantzas Goran Olsson Web Services Choreography.
The Managing Authority –Keystone of the Control System
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Confidence in E-government Services ITU-T Workshop on.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
E-Marketplaces.
State of New Jersey Department of Health and Senior Services Patient Safety Reporting System Module 2 – New Event Entry.
Determine Eligibility Chapter 4. Determine Eligibility 4-2 Objectives Search for Customer on database Enter application signed date and eligibility determination.
Computer Security CIS326 Dr Rachel Shipsey.
South East Personalisation IT Workshop 11 th June 2010 Working in partnership with Improvement and Efficiency South East.
Plan My Care Brokerage Training Working in partnership with Improvement and Efficiency South East.
Presented by Brad Jacobson The Publisher on the Web Exploiting the new online sales channels.
Vendor Statements of Work: Your Role as an IT Professional Theresa Rowe | June 2011.
Privacy Impact Assessment Future Directions TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
The Welsh Procurement Card at Aberystwyth University
P-Card User Guide Standard Profile July RCNJ-BOA Purchasing Card User Guide – Standard Profile Ramapo College and Bank of America VISA Procurement.
14. LETTERS OF CREDIT: PROCEDURES 1. LETTERS OF CREDIT I.THE NEED FOR LETTERS OF CREDIT A. USES TO THE SELLER WITH A FIRST-TIME CUSTOMER WITH A CREDIT.
1 CIFTclinic 1.1 Software for Clinics. 2 CIFTclinic Software for Medical Clinics, which addresses the requirements of practicing doctors to automate Medical.
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
1 Welcome to SAPS Webmail. 2 Things we will learn about: 1. Login to mail.
IONA Technologies Position Paper Constraints and Capabilities for Web Services
Digital Futures International Forum - Tuesday 18th September 1 Digital Futures International Forum The Digitisation Standard: Back & Forth Stephen Clarke.
31242/32549 Advanced Internet Programming Advanced Java Programming
HR Essentials: Employment Contracts Presented by Kristin Ramsey Associate Director.
Services Course Windows Live SkyDrive Participant Guide.
Macromedia Dreamweaver MX 2004 – Design Professional Dreamweaver GETTING STARTED WITH.
Pasewark & Pasewark Microsoft Office XP: Introductory Course 1 INTRODUCTORY MICROSOFT WORD Lesson 8 – Increasing Efficiency Using Word.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
20&27 May Agenda 1.Highlight the difference between system flow of e- Invoice and paper invoice – 15 minutes 2.Demonstrate the operation procedure.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Audit of the Capital Acquisition and Repayment.
International Opportunities
James A. Senn’s Information Technology, 3rd Edition
Designing and Managing Integrated Marketing Channels
Direct Marketing What is Direct Marketing?
Chapter 11: E-Commerce.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
Presented by: HCN Clinical Operations Team. 2 TopicPage Top Reasons to have and use the Patient Portal3 Sample Portal Websites4 Portal 1016 Meaningful.
South Dakota Library Network MetaLib User Interface South Dakota Library Network 1200 University, Unit 9672 Spearfish, SD © South Dakota.
® NSTIC’s Effects on Privacy The Need to Balance Identity and Privacy- Protection with Market Forces in the National Strategy for Trusted Identities in.
12-CRS-0106 REVISED 8 FEB 2013 PRESENTS Payment Functionality.

Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Internet Security for Small & Medium Business Week 6
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Electronic Transactions & Authentication
Dashboard eHealth services: actual mockup
Presentation transcript:

Copyright, E-Consent A Critical Element of Trust in e-Business Roger Clarke, Xamax Consultancy Pty Ltd eConsent02.ppt 15th Bled Electronic Commerce Conference, Bled, Slovenia, June 2002

Copyright, E-Consent A Critical Element of Trust in e-Business Agenda Trust in e-Business Consent Definition Contexts Characteristics e-Consent Process Object Implementations Implementability

Copyright, Fundamental Risks in All Markets That Are Perceived to Be Greater in Marketspaces Seller Default Buyer Default Market Operator Default Intermediary Default Service-Provider Default Tradable Item Quality Fulfilment Quality

Copyright, Trust as an e-Business Enabler Cyberspace adds to Uncertainties, Risk Lack of Information Jurisdictional Issues What are you doing with my money? Will you really deliver the goods? What are you going to do with my data?

Copyright, Trust confident reliance by one party about the behaviour of the other parties Origins in kinship groups Extensible to cultural affinity (i.e. friends) Not directly extensible to business relationships In business, its merely what a party has to depend on when no other form of risk amelioration strategy is available

Copyright, Sources of Trust Direct Relationship kinship, mateship, principal-agent, contract, multiple prior transactions Direct Experience prior exposure, a prior transaction or trial Referred Trust 'word-of-mouth', reputation, accreditation Symbols of Trust or Images of Trust brands, meta-brands

Copyright, Latest in a Long Line of Marketer Manoeuvres Dynamic Consumer Profiling Self-Identifying Data, consensually provided the click-trail Self-Identifying Data, acquired by trickery e.g. pseudo-surveys, cookies, web-bugs,... Server-Driven Client-Side Processing JavaScript, Java Applets, CaptiveX, spy-ware,... Self-Identifying Personal Profile Data aka 'Identity Management' esp. MS Passport / wallets, but also Liberty Alliance

Copyright, Trust Through Buyer Protection Service Longevity and Reliability Transparency of Data About the Seller Fairness of Marketspace Processes Security of Tradable Items and Funds Risk Allocation / Clarity of Risk Exposure Safeguards such as Warranties, Recourse, Insurance, a Credible Insurer of Last Resort Protections for the Buyers Data

Copyright, Consent concurrence by a party with an action to be taken by another party

Copyright, Consent Context: The Human Body medical procedures drug prescription, innoculation, surgery acquisition and use of body fluids/tissue/organs donations of blood, semen, bone marrow, kidneys organ donations from the dead acquisition and testing of body tissue/fluids health care diagnostics substance abuse testing suspect identification and suspect elimination

Copyright, Consent Contexts: e-Business Promotion and Marketing Price, and Terms of Contract (Invitation to Treat) Offer Acceptance Payments Handling of Purchaser Data Commercial Confidence Privacy

Copyright, Consent and Consumer Marketing Practices on the street via mass media at an exhibition site the telephone physical mail-box -box

Copyright, Contracting and Payments Declaration of Offer Signification of Acceptance Consumer Choice Evidence of Offer and Acceptance Consent to Use Credit-Card Details: Once and Destroy? Once and Retain? Once and Retain, and Re-Use?

Copyright, Consent and Personal Data Consumer Expectations privacy is a 'fundamental human right' excited (and/or numbed) by abuses excited by advocates and the media Particularly Serious Concerns anti-discrimination categories taxation and financial data health data household data location data for persons-at-risk

Copyright, Consent, Personal Data and the Law General Privacy Laws: OECD Guidelines as a framework, 1980 EU Directive on Data Protection, 1995/98 US – a scatter of laws, but intransigence re a general law, hence 'safe harbor'/FCC Specific Laws, e.g. Spam EU Directive on Cookies? Standards, e.g. Cookies RFCs 2964, 2965

Copyright, Consent, Personal Data and Australian Law Under the Privacy Act 1988 as amended by the Privacy Amendment (Private Sector) Act 2000, wef 21 Dec 01: collection, use and disclosure of personal data are all subject to controls based on consent direct marketing is subject to some specific provisions (much less than the EU demands) what it all means in particular contexts is far from clear; but a level of expectation has been created

Copyright, Characteristics of Consent – 1 of 2 {express in writing OR express unrecorded OR implied OR inferred} {declared by 'opt-in' OR presumed with 'opt-out', but subject to the absence of express denial}

Copyright, Characteristics of Consent - 2 of 2 legal capacity physical and intellectual capacity informed what scope of actions who may take such action for what purpose may it be taken over what time-period does it apply freely-given revocable and variable delegable

Copyright, e-Consent signification by recorded electronic means of concurrence or otherwise with an action to be taken by another party To achieve trust in the e-business context, recording is essential, in order to enable authentication Recording by electronic means is highly desirable, so as to use the same facilities as the e-business transaction, and to enable automated processing of the consent

Copyright, The e-Consent Process

Copyright, (1)Initiation two parties enter into some form of information interchange, resulting in an intention by one party to provide consent to an action by another possibilities include: -interchange an exchange between browser and web-server telephone conversation personal contact

Copyright, (2)Declaration of the Consent could be performed on the consent-givers own computing facility, or through interactions between the facilities of the two parties possibly an -interchange, or an exchange between a browser plug-in and web-server script possibly on the site of the marketer or an agent (accountant, solicitor, financial adviser, health care professional), with a signature on an office-copy of the printed document, or a keystroke on a computer

Copyright, (3)Expression of an e-Consent Object (e.g. for the Specific Purpose of Data Access) Access to by for in is [consented to | denied] by

Copyright, (4)Transmission of the e-Consent Object Transmission Security: virtual private networks (VPNs) channel-encryption measures e.g. SSL/TLS message-encryption tools such as PGP

Copyright, (5)Authentication of the e-Consent Authentication of Individual Identity possibly digital signature, perhaps using a secure token and even biometrics more easily password / PIN / passphrase Alternatives: Anonymity Pseudonymity Authentication of Attributes / Credentials Authentication of Value

Copyright, Conventional X.509-Based PKI the maths makes lots of unjustifed assumptions private key generation is insecure private key storage is insecure (and unsecureable) X.509 certificates are privacy-hostile acquiring a certificate is utterly privacy-hostile fine print in CAs' contracts denies all liability key revocation is largely unsupported the industry is built on mythology no effective open, public schemes exist if they ever did, they'd be highly privacy-invasive

Copyright, What Conventional PKI Does It provides to the recipient of a message zero assurance about the identity of the sender It provides assurance only that the device that signed the message had access to a particular private key

Copyright, (6)Application of the e-Consent Display-Only; but with logging, log-analysis, exception-reporting, powers, action against abuses Authorisation / Access Control: permission to access a resource (data, a process) based on consent (or legal authority, or power) absence of permission results in denial of access ('gatekeeper'); or qualified access (with controls as above)

Copyright, Subtleties in an e-Consent Object specific, operational definitions of domains on which data-items are defined, e.g. which data, which other party or which category of parties, which purpose supplementary data (e.g. re power of attorney) general consent with specific denial (all except...) general denial with specific consent (none except...) a hierarchy of such qualifications reliable date-time stamps, to support authentication

Copyright, Existing Implementations? 'I accept' buttons (which deny consumer choice) Info-mediaries as agents (are there any?) MS Open Profiling Standard (OPS) (RIP?) So-called Identity Management schemes: MS XP,.NET, Passport, wallet, web-services AOL Screen Name, and Quick Checkout Liberty Alliance - W3C Platform for Privacy Preferences (P3P) - or just Platform for Publishing Privacy Policies (P4P)

Copyright, Implementability Marketer uses P3P-like syntax to declare terms, in XML format, in a document on the web-site Consumer uses a browser to access it, and a plug-in to analyse the content and display it Consumer uses a browser plug-in and templates to express a consent in XML format Consumer transmits the consent using SSL Marketer uses a CGI script to analyse it, and either accept, reject, or enter into negotiations

Copyright, e-Consent CONCLUSIONS a critical element of trust in e-business requires maturation beyond old-fashioned 'consumer as prey' marketing philosophies requires inversion of current thinking about 'identity management' and marketer- controlled storage of personal data implementable using existing technologies a research opportunity a business opportunity