Dr. Nicholas Shaw IEEE Senior Member EDS, an HP Company Privacy Enhancing Technologies (PET)

Slides:



Advertisements
Similar presentations
Digital Citizenship in the Classroom
Advertisements

Digital Citizenship Corbin Elementary.
ELECTRONIC COMMERCE Online Services Electronic Commerce Electronic commerce is the buying and selling of products and services electronically over the.
Our Digital World Second Edition
E-Business for Airlines Unit 11
Chapter 11 Privacy Policies and Behavioral Marketing.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Everywhere you look, the majority of people are on their phones… This affects communication skills People rarely talk in person anymore, If they need.
Role of ICT in Business ITCA Lesson 1: Overview. ICT Defined Information and communications technology (ICT) is often used as an extended synonym for.
COMP6005 An Introduction to Computing An Introduction to Computing Privacy and Ethical Issues.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
E-commerce E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. In this section: E-commerce.
Beware: Do NOT advertise on Facebook and other social media sites.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Karolina Muszyńska Based on
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Laura Swearingen Bellville Independent School District 2011.
What the hell is. Free software is software that anyone is free to use, copy, improve, examine or distribute, either free of cost or for a price. More.
Location-Based Services: Time for a Privacy Check-In Nicole A. Ozer, Esq. Technology and Civil Liberties Policy Director ACLU of Northern California dotrights.org/LBS.
Overview of Electronic Commerce. Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.Define electronic commerce (EC) and describe its.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
HCIMA Unit 3 The Internet Revolution and Electronic Tools Next slide.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
The Internet & The Manager. Introduction Most companies realize that the Internet is here to stay. Business leaders realize that in order to maintain.
Use of Electronic and Internet advertising options Standard 3.4.
STUDENTS AND THE INTERNET WHAT WE NEED TO KNOW. Issues  Internet Safety  Cyberbullying  Social Media  Digital Citizenship.
Using OBDII To Create New Revenue Streams and Business Models Highlight – Audiovox Car Connection.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
Mobile Computing and Commerce Mata kuliah: M Konsep E-Business Tahun: 2010.
Interorganisational Systems. Interorganisational Systems Information Partnering It is the driving force behind the emerging electronic marketplace. Case:
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Digital Access Digital Commerce Digital Communication Digital Literacy Digital Etiquette Digital Law Digital Rights and Responsibilities Digital Health.
Travelers and location-information in the mobile environment – consumer attitudes and a prototype of a service for early adopters of mobile Internet service.
CS5038 The Electronic Society Lecture: Social Networking Lecture Outline Social Networking Service Social Networking Sites –Bebo –Friendster –MySpace Social.
link2 is a GPS software application designed specifically to link professionals.
Targeted Behavioral Advertising Ariel Pierre Section 001.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
. Market Share, Target, Growth Prospects. Business Target Target End Users Corporations (PII Protection) (Social Networks, ISP’s)
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
CTH Session 6. Search engines What are search engines ? Examples of search engines?
The Moat Your defense of fat profits. The moat Definition: Moat is the long term structural competitive advantage. Function: Moat is the defense of your.
Fundamentals of Information Systems, Sixth Edition Chapter 1 Part A An Introduction to Information Systems in Organizations.
What and Who they are For Social Networking sites are an online means of communication between people located in different parts of the world. It is an.
Sales Knowledge: Customers, Products, Technologies 6 Dudut Urip Prasetyo
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Overview of Electronic Commerce. Learning Objectives 1. Define electronic commerce (EC) and describe its various categories. 2. Describe and discuss the.
Sarah Manuel Final Presentation MCO435-Social Media.
 Electronic commerce, commonly known as E- commerce or E- Commerce, is trading in products or services using computer networks, such as the Internet.
Social media is a competitive market. In the rush to add new features to current offerings, user privacy sometimes gets left on the back burner. Apps.
TwitHere Bartosz MALOCHA Ioannis PAPATHANASIOU Luis SALAZAR Jakub SENDOR Sharique KHAN Mobile Communications Services Applications Challenge Feb. 19th.
WELCOME Mobile Applications Testing
Electronic Business Systems
A.M. Mustehsan E Commerce: Chapter-1
Digital Citizenship.
Lecture 7 Ch.8 Web 2.0 and Social Media.
Digital Citizenship.
Overview Social media applications inform, educate, and entertain people through online (multi-)media A social networking application allows users to create.
Chapter 1 Overview of Electronic Commerce
Marketing and Advertising in E-Commerce
Smart Portal To Protect Child Online
Use of Electronic and Internet advertising options
– Communication Technology in a Changing World
Digital Citizenship.
Digital Citizenship.
Privacy and Data Mining
Presentation transcript:

Dr. Nicholas Shaw IEEE Senior Member EDS, an HP Company Privacy Enhancing Technologies (PET)

Overview of Privacy Privacy-enhancing technologies (PET) are tools formed to protect the service user, rather than the service itself. PET are the means to protect the privacy of individuals. Internet/Web (social networking/e-commerce) Mobile-based (cell phones/GPS/m-commerce) Non-compute-based (RealID) Before discussing PET, one must have a fundamental understanding of Privacy

Overview of Privacy One definition of Privacy is the right of entities to determine by themselves when, how, and to what extent information about them (personally identifiable information or PII) is communicated to others Travelocity (airlines, hotels, rental cars, and partners of each) Information about you is valuable Companies exist to sell information about you! Behavioral Targeting/User Profiling (Google mail) Data Mining Sometimes more information protects privacy Companies walk a thin line between competitive edge and losing customers due to trust issues Employment (Facebook, MySpace, Boseman, MT) Insurance (example: LBS) Crime (example: LBS)

Overview of Privacy Privacy Policies Natural Language Long In Legalese Not often read Electronic Privacy Policy Lanaguage P3P <50% of e-commerce sites have electronic versions Dont often match the natural language versions

Overview of Privacy How one views privacy is in the eyes of the individual: Age (generational) Grown up with computers Didnt grow up with computers Occupation Uses computers daily in work versus those who dont Involved in marketing versus those who arent Experience (those who have been burned versus those who havent) Location High tech area versus low tech Availability of stores (urban) versus low availability (rural)

Types of Data Breaches Internal Intentional (unhappy employees, criminal) Unintentional Accidental (system admins working on systems without enough sleep) Stupid (employees leaving laptops in car, in plain view) External (hackers trying to break into systems) Of all breaches, the most prevalent and dangerous are internal.

Types of Attacks Internet (Web) and Mobile (Location-Based Services – LBS) Behavioral Targeting (user profiling) Misuse of personal information Use for other than stated in privacy policy Sale for profit Criminal Other (use by companies in hiring/firing such as use of Facebook/Myspace data or to change rates or cancel insurance policies) E-/M-commerce (M-commerce is mobile-based commerce) Need for profit drives collection/use of personal information User Trust Need to balance the advantages of using PII with alienating customers Non-computer-based (calling your cell phone)

Behavioral Targeting Example Prepare two Google gmails to yourself (without a subject): I like bananas I need an airplane, hotel, and car reservation Now, when you get the s back, open them and look at the top bar and side. What youll see is information (using airplane, hotel, car) are advertisements from rental companies, hotels, etc. For bananas I received ads on yogurt, fruit, etc. The ads constantly change everytime you open the up. This is behavioral targeting but the interesting aspect is that your is being read by Google (automated bots).

PET Categories SOFTWAREHARDWAREPERSONAL ACTION AnonymizersBiometricsAnti-Wardriving AuditingData Encryption, at restDo Not Call Registry Anti-Virus/rootkitsData Encryption, end-to-endDelete Histories Compliance ToolsData Lifecycle ManagementDocument Disposal Data Encryption Enhancing Computer Network Security Do Not Track Registry Data Leak Prevention (DLP) FirewallsOff-site Storage Data Lifecycle Management RealIDOpt-In (behavioral targeting) Data ShufflingSmart CardsParental Controls FirewallsPrivacy By Design ID ManagementSecurity Ratings Software PatchesUnsecure Repositories Spam Filters SQL Injection Virtual Private Networking Web Browsers

Software PET Most users implement some level of PET on their systems such as encryption, anti-virus (AV) software, anonymous web browsers such as Google Chrome or Internet Explorer (IE) 8 Newer technologies such as Data Leak Prevention (DLP), also called Information Leak Prevention (ILP) deploy capabilities such as data in motion, in use, and at rest Data/Information Lifecycle Management, while understood, is still relatively new Often implemented for production servers Rarely implemented by users Questionable when it comes to PII

Hardware PET Typical hardware PET include firewalls and routers Biometric scanners (finger print) are becoming more common on laptop devices with the scanners built right in at the factory Smart cards, such as the CAC (Common Authentication Card) used by the military, are also becoming more common Whereas most encryption today is software-based, hardware- based encryption is gaining and prices are dropping. The advantages of hardware encryption include automatic encryption/decryption of data and no impact to performance While controversial, RealID is a PET

User Actions PET All of these PET require actions from the user such as Opt- in/Opt-out, signing up such as for Do Not Call/Track, etc. Anti-wardriving (the practice of driving around with a WiFi finder) Deletion of histories is required unless the user is using a software solution such as IE 8 or Google Chrome which do not save histories or cookies when in stealth mode Off-site storage is a staple of production systems and is now being offered by the major vendors across the Internet Document disposal is actually part of DLM (see software PET) – in short, users get rid of files they dont need Privacy By Design is considering privacy when developing a system, e.g. designing privacy aspects into the product versus adding them on later

References Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). L-diversity: Privacy beyond k- anonymity. ACM Trans. Knowl. Discov. Data, 1(1), 3. Mont, M. C., & Beato, F. (2007). On Parametric Obligation Policies: Enabling Privacy-Aware ILM in Enterprises. Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), Govil, J., Kaur, N., Kaur, H., & Govil, J. (2008). Data/Information Lifecycle Management: A Solution for Taming Data Beast. Fifth International Conference on Information Technology: New Generations, Bulbul, H. I., Batmaz, I., & Ozel, M. (2008). Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols. 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop, Adelaide, Australia. Kang, Y., Lee, H., Chun, K., Song, J. (2007). Classification of Privacy Enhancing Technologies in Life-cycle of Information. International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE '07), Salas, P. P., & Krishnan, P. (2008). Testing Privacy Policies using Models. Sixth IEEE International Conference on Software Engineering and Formal Methods, Ofuonye, E., Beatty, P., Reay, I., Dick, S., & Miller, J. (2008). How Do We Build Trust into E-commerce Web Sites? IEEE Software, 25(5), 7-9. Boritz, J. E., No, W. G., & Sundarraj, R. P. (2008). Internet Privacy in E-Commerce: Framework, Review, and Opportunities for Future Research. 41st Hawaii International Conference on System Sciences, Gupta, S., Jain, S., Kazi, M., Deshpande, B., Bedekar, M., & Kapoor, K. (2008). Personalization of Web Search Results Based on User Profiling. First International Conference on Emerging Trends in Engineering and Technology,

References Smith, R., & Shao, J. (2007). Privacy and E-commerce: A Consumer-centric Perspective. Electronic Commerce Research, 7(2), Hecker, M., Dillon, T., & Change, E. (2008). Privacy Ontology Support for E-Commerce. IEEE Internet Computing, Jing, R., Yu, J., Jiang, Z. (2008). Exploring Influencing Factors in E-Commerce Transaction Behaviors International Symposium on Electronic Commerce and Security Robbins, J., & Sabo, J. (2006). Managing Information Privacy: Developing a Context for Security and Privacy Standards Convergence. IEEE Security & Privacy, 4(4), Reay, Ian, Dick, Scott, & Miller, James (2009). A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations. ACM Transactions on the Web (TWEB), 3(2), Duma, Claudiu, Herzog, Almut, & Shahmehri, Nahid (2007). Privacy in the Semantic Web: What Policy Languages Have to Offer. Paper presented at the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY '07). Hansen, Marit, Schwartz, Ari, & Cooper, Alissa (2008). Privacy and Identity Management. IEEE Security & Privacy, 6(2), Decker, Michael (2008). Location Privacy-An Overview. Paper presented at the 7th International Conference on Mobile Business, Xu, Toby, & Cai, Ying (2007). Location Anonymity in Continuous Location-Based Services. Paper presented at the 15th International Symposium on Advances in Geographic Information Systems (GIS '07), Seattle, WA.

References Beatty, Patricia, Reay, Ian, Dick, Scott, & Miller, James (2007). P3P Adoption on E-Commerce Web Sites: A Survey and Analysis. [Feature]. IEEE Internet Computing, 11(2), Kojima, Takao, & Itakura, Jukio (2008, October 31, 2008). Proposal of Privacy Policy Matching Engine. Paper presented at the 4th ACM Workshop on Digital Identity Management (DIM '08), Fairfax, VA. Yan, J., Liu, N., Wang, G., Zhang, W., Jiang, Y., & Chen, Z. (2009). How Much Can Behavioral targeting Help Online Advertising? Proceedings of the 18th International Conference on WWW, Yaveroglu, I., & Donthu, N. (2008). Advertising Repetition and Placement Issues in On-Line Environments. Journal of Advertising, 37(2),