Privacy as contextual integrity Helen Nissenbaum New York University September 6, 2007 Ars Electronica, Linz Support.

Slides:



Advertisements
Similar presentations
Liberalism and the Limits of Multiculturalism Raphael Cohen-Almagor University of Haifa, ISRAEL.
Advertisements

Identifiability: A Useful or Decrepit Concept in Research Ethics? Sara C. Hull, PhD Faculty, Clinical Center Department of Bioethics Director, NHGRI Bioethics.
INTERNATIONAL UNION FOR CONSERVATION OF NATURE. 2 Implemented in 12 countries of Africa, Asia, Latin America and the Middle East, through IUCN regional.
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
Tri-Council Policy Statement 2010 Ethical Conduct for Research Involving Humans.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Challenges to freedom of expression The right to freedom of expression is a “foundation right” in society. It protects the right to: -Express ourselves.
Ethnocultural Minorities in Liberal Democracies Raphael Cohen-Almagor University of Haifa, ISRAEL Will Kymlicka Queen's University, CANADA.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford), and Helen Nissenbaum (NYU) TRUST Winter.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Problems with Notice and Consent? Helen Nissenbaum, NYU INCO-TRUST Workshop, May Work supported by: NSF ITR : Sensitive Information in.
Privacy Chris Kelly iLaw July 5, 2002.
1 Arja Kuula, Development Manager, Finnish Social Science Data Archive, University of Tampere Ethics Review in Finland IASSIST conference 2010 Cornell.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
1 Who Gets to Know? Child Welfare & Confidentiality John L. Saxon Institute of Government The University of North Carolina at Chapel Hill February, 2004.
On Privacy and Compliance: Philosophy and Law meets Computer Science Anupam Datta Stanford University Oakland PC Crystal Ball Workshop January 2007.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
3 Ethics and Privacy.
Contextual Integrity in PORTIA PI: Helen Nissenbaum Students: Timothy Weber & Michael Zimmer New York University In collaboration with: Sam Hawala (U.S.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
The principles used by AUTEC in granting ethical approval for research.
Managing Ethics and Social Responsibility
Privacy in context Author: Helen Nissenbaum Juan Lockett, Junghwan Shin, J. Karlo Pajota, Mike Nguyen, Vikesh Parmar, Wing Shan Ho (Rosana), Adom Greene,
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Nationalism Michael Lacewing
1 The interplay of stopping computer crime while protecting privacy Svein Yngvar Willassen Department of Telematics, Norwegian University of Science and.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)
The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford
Contextual Integrity as a Normative Guide for Privacy Helen Nissenbaum New York University * School of Information, UC Berkeley April 2, 2008 * Supported.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
Privacy in Context Helen Nissenbaum Department of Culture and Communication New York University m Research supported.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
Ethics: The Challenges in International Research Prof Wendy Moyle, Deputy Director RCCCPI, Griffith University Asia-Pacific Research Symposium, Gold Coast.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Types of privacy (Solove, Understanding Privacy)
Methodological Framework for the Assessment of Governance Institutions P. Diaz and A. Rojas PFRA Workshop, March 17, 2006.
Privacy as Contextual Integrity Helen Nissenbaum Department of Culture & Communications, NYU
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
Sociological Analysis of Education Theories of Schooling.
Approved for Public Release. Distribution Unlimited. 1 Government Privacy Rick Newbold, JD, MBA, CIPP/G Futures Branch 28.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Cultural Competence Considerations [and other alliterations] in International Research IRB 2 Continuing Education March 10, 2015.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford) Helen Nissenbaum (NYU)
CHAPTER 5 ETHICS & PRIVACY.
© Plan Plan’s Security Framework – A Refresher. © Plan Understanding Ourselves Values - Child Rights, Impartial, Neutral, Sensitive Mandate - Child Centred,
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
The Ethics of Privacy in the Digital Society Ethical issues of emerging information and communication technologies Professor Bernd Carsten Stahl.
Medical Ethics  A set of guidelines concerned with questions of right & wrong, of duty & obligation, of moral responsibility.  Ethical dilemma is a.
IR 306 Foreign Policy Analysis
Chapter 8 Small Group Communication and Leadership.
Research Ethics Dr Nichola Seare Aston Health Research & Innovation Cluster.
Ethical, Social, and Political Issues in E-commerce
SoBigData Ethics Unpacking Privacy Designing for Responsibility
Lecture 8.1 LIBERALISM A. Alternative to realism
Tri-Council Policy Statement 2010
Privacy and the library patron: an ongoing ethical challenge
Multi-level citizenship: causes and opportunities The Dynamics of Citizenship in the Post-Political World, Stockholm University, May Andreas.
Data Protection in a Tutorial Context
18734: Foundations of Privacy
Democracy in the United States
Glossary Glossary.
Reflections on information sharing in health privacy law in New Zealand There are at least five sides to every issue – the patient’s right to medical privacy,
IT and Society Week 2: Privacy.
Ethics and Politics of Computational Social Science
Presentation transcript:

Privacy as contextual integrity Helen Nissenbaum New York University September 6, 2007 Ars Electronica, Linz Support from: NSF ITR : Sensitive Information in a Wired World.

Nissenbaum/Ars Electronica '07 the conundrum …

Nissenbaum/Ars Electronica '07 Privacy threats of IT and associated socio-technical practices Tracking and monitoring RFID, EZ Pass, online-tracking, ISP “clickstream” monitoring, CCTV, biometrics, VSCS, auto “black boxes,” DRM, ubicomp, etc. Aggregation and analysis databases, data warehouses, data mining, e.g. LM- Households. ChoicePoint, MATRIX, Census, Credit Bureaus, Rapleaf, etc. Publication online public records, e.g. court records, Social networking sites, e.g. blogs, MySpace, Facebook, flickr, etc.

Nissenbaum/Ars Electronica '07 solutions? Interest-based scuffles: “the privacy preference” vs. competing claims Privacy a fundamental human right defined as: Alan Westin: “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” Jeffrey Reimann: ”the condition under which others are deprived of access to you at their discretion.” Michael Froomkin: “the ability to control the acquisition or release of information about oneself.” Ruth Gavison:”limiting the degree of access others have to you via information, attention, or physical proximity.”

Nissenbaum/Ars Electronica '07 Invoke the private/public dichotomy The private ~ a realm deserving privacy protection The public ~ a realm not deserving privacy protection …anything goes? Public and private what? … actors, realms, information proves too much and too little

Nissenbaum/Ars Electronica '07 Intuitions, gut reactions … do not reside primarily at the level of interest based scuffles (privacy is not merely a preference) nor fully accounted by fundamental, (familiar) moral and political principles. social contexts as unit of analysis for privacy

Nissenbaum/Ars Electronica '07 Privacy as Contextual Integrity Contexts … Structured social settings (“Institutions”) Characterized by roles, relationships, power structures, canonical activities, strategies, norms (rules), enforcement mechanisms, and internal values (goals, ends, purposes) E.g. health-care, education, politics, religious observance

Nissenbaum/Ars Electronica '07 more about contexts… Evolved over time in cultures and societies, subject to historical, cultural, geographic contingencies May be nested, overlap, conflict May be more or less explicit, formalized, institutionalized (e.g. class clown vs judge) May be more or less “complete”

Nissenbaum/Ars Electronica '07 Among the norms context-relative Informational Norms In a context, the flow of information of a certain type about a subject (acting in a particular capacity/role) from one actor (could be the subject) to another actor (in a particular capacity/role) is governed by a particular transmission principle. key parameters: contexts, attributes, actors, transmission principles

Nissenbaum/Ars Electronica '07 Formal representation of an Informational Norm in Temporal Logic From: A. Barth, A. Datta, J. Mitchell, and H. Nissenbaum, “Privacy and Contextual Integrity: Framework and Applications,” Proceedings of the IEEE Symposium on Security and Privacy, Forthcoming 2006

Nissenbaum/Ars Electronica '07 Transmission Principles** some examples: Consent (subject controls) Notice (subject is/is not aware of transmission) Compulsion (e.g. earnings to IRS) Confidentiality Sale Reciprocity Entitlement, desert Etc…

Nissenbaum/Ars Electronica '07 Descriptive power of CI Contextual Integrity is preserved when informational norms of a context are respected; it is violated when any of the norms are breached. ~ When people complain, look for CI violations not preferences! ~ Surveillance is NOT always problematic ~ Privacy is NOT control over information about oneself ~ Privacy is NOT secrecy; it is appropriate flow

Nissenbaum/Ars Electronica '07 Is CI conservative? Is a violation of CI always a problem? traditional wisdom, but … Opportunity Costs “perhaps there is something better…” Tyranny of the Normal “change can be liberating…”

Nissenbaum/Ars Electronica '07 How to evaluate challenges to entrenched norms?? Two key steps … Moral and political considerations Harm (e.g. stigma, discrimination, identity theft) Justice, balance of power, fair distribution of goods Freedom, autonomy, democracy, property Countervailing considerations (security, efficiency, etc.) Relation to values/goals of context healthcare (psychotherapy) Friendship (Tripp/Lewinsky) Anonymity in democratic elections TMN and websearch privacy; CASSIE in public libraries Mobility on the roads (VSCS)

Nissenbaum/Ars Electronica '07 Technologies “Cassie” VSCS Rapleaf, Choicepoint Court records online

Nissenbaum/Ars Electronica '07 TMN: Lightweight Firefox plugin for “privacy through obfuscation” … site of resistance Available at: Or:

Nissenbaum/Ars Electronica '07 Does CI have all the answers?