The economics of privacy and surveillance: assessing the social costs and benefits Vicki Nash Oxford Internet Institute Web Science June 2015.

Slides:



Advertisements
Similar presentations
EU Privacy Directive. What is a directive? A piece of European legislation, passed by bureaucrats, addressed to member states Member states must ensure.
Advertisements

1 Collective Awareness Platforms "The views expressed in this presentation are those of the author and do not necessarily reflect the views of the European.
1 IS THERE A FUNDAMENTAL RIGHT TO FORGET? Bruxelles – 20 May 2009.
Gender Perspectives in Introduction to Competition Policy Gender Module #6 ITU Workshops on Sustainability in Telecommunication Through Gender & Social.
Professor Miriam Lips Victoria University of Wellington New Zealanders privacy behaviours in the age of big data Privacy Forum 7 May 2014.
Wrap-up session Theme 5 Topic 5.2 – Pricing Strategies 5 th World Water Forum, 20 March 2009 – Istanbul, Turkey Monica Scatasta Environment Directorate,
Open Public Services Listening Exercise Summary November 2011.
CHAPTER 4 E-ENVIRONMENT
Socio-economic Sciences & Humanities – Opportunities in Horizon 2020 Conference “Achieving Impact”, Athens, Christina Bitterberg,
©2002, Pearson Education Canada 1.1 c h a p t e r 1 1 MANAGING THE DIGITAL FIRM: CANADA AND BEYOND CANADA AND BEYOND.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Definitions  eBusiness The use of computer based information systems for the management and coordination.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Innovating in the Digital Ecology: Social Issues and Consequences Professor Robin Mansell London School of Economics and Political Science HEPTech Academia.
J.R. Smith, CEO AVG Technologies. Introduction Privacy and cybersecurity are closely linked issues: to advance the latter it is important to adequately.
A New Approach to More Effective Regulation? 4 th Symposium on Regulatory Reform, Institute of International Parliamentary Affairs. Dr. Bettina Lange,
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
Business Strategy Evaluation & Recommendations EVALUATE BUSINESS STRATEGY Internal Assessments Evaluation : Bridge of Business-To-Customer Information.
Regulatory Innovation: EMSs as Environmental Regulatory Tools Jason Morrison Pacific Institute for Studies in Development, Environment, and Security (
Andrea Ricci - ISIS Brussels, 12 April 2012 Smart Grids: Overview of the study and main challenges 1.
Privacy of Home Energy Usage Data Jim Williams June 26, 2012 Jim Williams June 26, 2012.
Recommendation of the OECD Council for enhanced access and more effective use of public sector information 11 th Meeting of the PSI Group European Commission.
Big Data and Governance in the United Kingdom AAAS, February 13 th 2015 Dr Claire Craig Director, Government Office for Science, UK.
Data Governance: Addressing the Big Data Challenge IT.CAN 2015 Information Technology Law Spring Forum May 4, 2015 Adam Kardash Partner, Privacy & Data.
“What’s Ethics Got To Do With It” Presentation to the Canberra Evaluation Forum Gary Kent Head Governance Australian Institute of Health and Welfare.
Protecting privacy: Regulation and its unintended consequences for survey research Dr. Dan Nunan Henley Business School, University of Reading
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Privacy & How IT Will Help JEFF NORTHROP, CTO
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
The Missing Link: Technical Standards and Solutions The EU iGaming Debate: An update Why standards are important to operators.
Data protection and compliance in context 19 November 2007 Stewart Room Partner.
Internet & Privacy Y. POULLET Prof. at the Univ. of Namur and Liege Dean of the Faculty of Law of Namur Director of the CRID
1 TINF 2010 Tuesday 30 November 2010 Present and Future Regulation of Electronic Communications Vesa Terävä European Commission Information Society & Media.
© Allen & Overy April 2015 Katia Manhaeve - Catherine Di Lorenzo The Internet of Things.
Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts.
1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
FINTECH – THE POLICY AGENDA Mick Mc Ateer, Co-Director, Financial Inclusion Centre Chair, EC Financial Services User Group (FSUG)
Professor Jonathan Raper City University London & Placr Ltd. Rejecting the privacy transaction.
A deep history 1828 Speaker Marko Štajduhar dating back to
Maria Eduarda Gonçalves DINÂMIA’CET-IUL, ISCTE-IUL
Privacy and Public Policy Implications of IoT
Judicial Training on Data Protection and Privacy Rights
Promoting Regional Capital Market Integration
Managing the (Traffic) Managers
Microsoft 365 Get help with regulatory compliance
E-Commerce: Doing Business on the Internet
eHealth in the Region of the Americas:
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Competition, Regulation, The Digital Marketplace Session: Disruptive Technologies and Economic Regulations Dr. Derek Ireland : Policy Consultant and Lecturer.
The Legal Framework of the Digital Surveillance Economy Roger Clarke & Angela Daly APSN – Uni Hong Kong – 27 September 2017 Xamax Consultancy,
Introduction to GDPR 09/11/2018.
Afef Abrougui and Koliwe Majama Internet Freedom Festival, March 2017
Regulation and Digital Rights: The Big Picture
Living Online Consumer research to inform consumer protections in the digital economy ACCAN Conference 12 Sept 2018 Lauren Solomon Chief Executive Officer.
Reflections on PIPEDA and the Future of Privacy Law in Canada
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
Session 8: Innovative Uses of Captives: Cyber and Beyond
New Approaches to Governance
IT and Society Week 2: Privacy.
Presentation transcript:

The economics of privacy and surveillance: assessing the social costs and benefits Vicki Nash Oxford Internet Institute Web Science June 2015

Four years ago…

The economics of privacy & surveillance Consumers want to access cheaper goods and services, and to minimise their search costs. Producers want to sell us goods and services, and our data helps them price maximise. Personal data has a value: to advertisers, producers, governments and criminals. Individuals suffer from cognitive bias Parties in data transactions may have asymmetric access to information Companies collecting or selling on personal data may not account for negative externalities As it becomes cheaper to collect and store personal data, more of it is likely to be gathered and held. (From Brown, I. in Latzer, M. & Bauer, J.M. (2015))

Flickr: Rachel Lovinger Flickr: KnitSpirit Flickr: Christian Haugen

Flickr: Jason Armstrong Data subjects are vulnerable.

Key challenges for policy in 2011 Ensuring meaningful consent and control of one’s own data Improving transparency of what data held, where, by whom and for what Ensuring predictable and equal enforcement of data protection legislation Regulating for the whole ecology of data actors Enabling identity and authentication services whilst preserving privacy

…and for other societal actors Expanding the range of privacy-preserving products and services Stimulating public debate about privacy norms and behaviours Providing multi-disciplinary perspectives on privacy Educating and supporting users Considering the implications of digital legacies after death

The Internet of Things is here

New EU Data Protection Regulation is on its way

The full extent of state surveillance has been revealed

New business models and services

Deletion and rights of erasure

So, some progress: INNOVATION LIMITED REGULATORY ADVANCE PUBLIC DEBATE But what old and new challenges remain?

Flickr: Jason Armstrong Data subjects are *still* vulnerable.

Flickr: Jason Armstrong Data subjects are *still* vulnerable. Big data: for the public good? The personal and social costs of ‘free’

Flickr: Jason Armstrong Data subjects are *still* vulnerable.

“That the excess of data can pose a danger to freedom and democracy is as significant as (if not more significant than) the lack of data, has mostly been lost on those cheerleading for Internet freedom” (Morozov 2012) Flickr: Edith Soto “Our very presence in the world has changed this digital totality and we cannot have the right to rewrite history to erase those traces.” (David Omand, former GCHQ Director, quoted in the Guardian, 19/2/15)

Flickr: Jason Armstrong Data subjects are *still* vulnerable. Big data: for the public good?

Security Privacy Utility Public good Efficiency Moving beyond Privacy vs Security

Thank