D1 - 25/10/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

Directory and Trust Services (D&TS) Define an Abstract Model Purpose: Document a common terminology that the group can use between the various tracks Identify.
ITU-T SG13 futures session – July 25, D1 Present document contains informations proprietary to France Telecom. Accepting this document means for.
ITU-T SG13 futures session – July 25, D1 France Télécom R&D Present document contains informations proprietary to France Telecom. Accepting this.
March 6, 2012 SOC Reporting: What is New in the Audit Guides?
D1 - 12/05/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
WEB BROWSER PRIVACY & SECURITY Nan Li Informed Consent in the Mozilla Browser: Implementing Value-Sensitive Design 10/13/ Usability Privacy.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
Thursday, July 8, 2004DIMACS Workshop, NJ Instant Messaging and Privacy Sameer Patil University of California, Irvine (& IBM T. J. Watson Research Center)
D1 - 27/06/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
D1 - 29/06/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
ISO 9001 Interpretation : Exclusions
Frequently Asked Questions (FAQ) prepared by some members of the ICH Q9 EWG for example only; not an official policy/guidance July 2006, slide 1 ICH Q9.
 User Manuals come in all types, designs and formats.  This presentation is designed to show a few basic elements that will serve any user manual. 
Contemporary Issues in Canadian Health Care Nola M. Ries, MPA, LLM Adjunct Assistant Professor, University of Victoria Research Associate, Health Law Institute,
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Android Security Enforcement and Refinement. Android Applications --- Example Example of location-sensitive social networking application for mobile phones.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Internal Auditing and Outsourcing
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
Information Asset Classification
Chapter 7 Requirement Modeling : Flow, Behaviour, Patterns And WebApps.
Service Organization Control (SOC) Reporting Options and Information
Using the Internet to Conduct Research What Investigators and IRB Members Should Know -- January 29, Lisa Shickle, MS Analyst, VCU Massey Cancer.
Simplification of lighting and light signalling Regulations (SLR): options and issues Transmitted by the GRE Chair Informal document WP (166th.
Research Methods in Psychology (Pp 1-31). Research Studies Pay particular attention to research studies cited throughout your textbook(s) as you prepare.
MSF Requirements Envisioning Phase Planning Phase.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
© 2002 IBM Corporation IBM Zurich Research Laboratory W3C Workshop on the long term Future of P3P | June © 2003 IBM Corporation Shortcomings.
U N I T E D S T A T E S D E P A R T M E N T O F C O M M E R C E N A T I O N A L O C E A N I C A N D A T M O S P H E R I C A D M I N I S T R A T I O N State.
1 SMT Format Short Story April 24, 2012 ‘Access, Control & Convenience’
Slides to accompany Weathington, Cunningham & Pittenger (2010), Chapter 17: Qualitative and Mixed-Method Research 1.
The Framework for Privacy Policies in the UK: Is telling people what information is gathered about them part of the framework? Does it need to be? Emma.
© 2006 Open Grid Forum Service Level Terms Andrew Grimshaw.
D1 - 27/10/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
Whose Responsibility is it? Karen Korb TELUS Health Solutions November 24, 2009 Privacy and Confidentiality in the EHR:
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
EPrivacy & Consenting Cookies Rakuten LinkShare Symposium 2012 Liz Robertson Jones Day 17 April 2012.
A Use Case Primer 1. The Benefits of Use Cases  Compared to traditional methods, use cases are easy to write and to read.  Use cases force the developers.
Issues in Multiparty Dialogues Ronak Patel. Current Trend  Only two-party case (a person and a Dialog system  Multi party (more than two persons Ex.
ITGS Databases.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
IM NETWORK MEETING 20 TH JULY, 2010 Disclosure Logs.
Health Delivery Services May 29, Eastern Massachusetts Healthcare Initiative Policy Work Group Session 2 May 29, 2009.
Barry’s Buzz Items of interest affecting Local Government Revenue Management.
Computer Science and Engineering 1 Mobile Computing and Security.
SM Sec.1 Dated 13/11/10 STRATEGY & STRUCTURE Group 3.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Data protection—training materials [Name and details of speaker]
D1 - 27/06/2016 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
18 January 2006 Copenhagen ERO - TISPAN WG4 meeting
Acceptable Use Policy (Draft)
Understanding Android Security
Privacy & Confidentiality
Dissemination Workshop for African countries on the Implementation of International Recommendations for Distributive Trade Statistics May 2008,
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
Understanding Android Security
Office of Research Integrity and Protections
Location Capability Negotiation
Shared Infrastructure
Presentation transcript:

D1 - 25/10/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies his or her acknowledgement of the confidential nature of its contents and his or her obligation not to reproduce, transmit to a third party, disclose or use for commercial purposes any of its contents whatsoever without France Telecom’s prior written agreement. France Telecom R&D Division Presence, Privacy and Service Personalization CFP PrivSec WG Launch – August 19, 2005 Edward Mitukiewicz France Telecom (RD/ILAB/BOS)

Distribution of this document is subject to France Telecom’s authorization D2 - 25/10/2015 France Telecom R&D Division Outline  Assorted musings to facilitate future CFP PrivSec WG discussions  Focused on the complexities of managing privacy-aware presence  Limited to a few illustrative examples based on some lessons from a particular prototyping project and ideas from recently published research papers  …NOT an attempt to  Develop a general problem statement and/or comprehensive issue list (albeit doing this and/or describing the current landscape seems to be a good idea!)  Consider broader topics of trust/identity management – e.g., in the context of collecting, mining, distributing and protecting sensitive personal data

Distribution of this document is subject to France Telecom’s authorization D3 - 25/10/2015 France Telecom R&D Division Privacy Management: Current Practices  Multiple, uncoordinated control points – difficult to manage  Call handling preferences – call waiting: divert or accept  Messaging specific options – IM  Device controls – on/off, sounds/alerts  Control settings – preferences, cookies, tokens  Integrated policy-based solutions – too complex for the user  Who do you want to communicate with and under what circumstances  How do you want to communicate when and where  What information should be shared with whom under what circumstances  Which policy should be activated when …

Distribution of this document is subject to France Telecom’s authorization D4 - 25/10/2015 France Telecom R&D Division Personalization: Opportunities & Risks  Users like service personalization, but want control over  What, how and when relevant data is collected, processed and published  How such data is used – e.g., ONLY to provide a better service  Service providers recognize the “added value” potential of personalization – enabled by the availability of data on user interactions with services  Conversion of such data into usable information is difficult – e.g., integration of bits and pieces of data from multiple sources  Using that info to provide a better user experience usually requires  Compliance with the applicable regulations  User consent – often limited to a specific and context dependent purpose

Distribution of this document is subject to France Telecom’s authorization D5 - 25/10/2015 France Telecom R&D Division Presence and Privacy: See What?  Value of presence grows with the richness and reliability of the available data (“see/be seen before you communicate” )  e.g., location, availability and communication preferences  Information disclosure restrictions and preferences (e.g., “only to authorized parties and only the minimum required”) – considering  Granularity of the available data – access to all vs. certain subsets  Exact vs. “blurred” responses  Requestor specific vs. ”one-size-fits-all” responses  Personalization requirements add more complexities …

Distribution of this document is subject to France Telecom’s authorization D6 - 25/10/2015 France Telecom R&D Division User Location: Intel Study (CHI2005)  Users tend to share their location info selectively  Users decisions depended on who was requesting the location info, why the requester wanted it, and what level of detail would be most useful  Study participants were typically willing to disclose either the most useful detail or nothing about their location  Privacy control becomes a critical issue in the development of location-aware communications  Users want to stay in control of their location information – the challenge is to enable them to do this effectively  Privacy management has to help users to disclose location in order to facilitate interpersonal interactions – without raising any fears of being monitored Source: Intel Research – Consolvo et al.

Distribution of this document is subject to France Telecom’s authorization D7 - 25/10/2015 France Telecom R&D Division Privacy Preferences: More Studies  Peoples’ willingness to share information seems to depend primarily on who they are sharing it with  Same privacy preferences are more likely to be applied to the same inquirer in different situations than to different inquirers in the same situation – this could help to reduce the underlying complexities and simplify the UI  Clustering might help to specify and refine over time what users wish to share with whom in what situation  Information items AND peoples’ views of others they wish to share certain types of information with tend to cluster into a manageable set of categories Sources: UCalBerkely and UofMich/Microsoft Research

Distribution of this document is subject to France Telecom’s authorization D8 - 25/10/2015 France Telecom R&D Division Presence and Privacy: Illustrative Example  Combining address book info with inferences – based on user’s location, calendar and “context aware” privacy policies – could allow for some see before you communicate and be seen enhancements  Although such presence-aware privacy controls might help users to decide if, when and how others can see their location and/or communicate, user interface complexity becomes a problem… Your friends are there You are here Source: “Friend Tracker”

Distribution of this document is subject to France Telecom’s authorization D9 - 25/10/2015 France Telecom R&D Division Privacy Management: Design Pitfalls  Obscuring potential or actual information flow  Users should understand the extent of a system’s potential for disclosure – e.g., privacy implication of Low vs. High settings? – AND  what information is actually being disclosed to whom – e.g., browser cookies?  Emphasizing configuration over action  Designs should not require excessive configuration to manage privacy!  Lacking coarse-grained control  Designs should not forgo a top-level mechanism for halting/resuming disclosure – e.g., simple mechanism for excluding the current purchase from a shopping profile  Inhibiting existing practice  Designs should not inhibit users from transferring established social practice to emerging technologies – e.g., support for a social nuance: there could be value in keeping the caller ignorant of the reason for not answering the phone Source: UCB – Scott Lederer et al.

Distribution of this document is subject to France Telecom’s authorization D /10/2015 France Telecom R&D Division thanks!