Intro to Ubicomp Privacy Jason I. Hong. Ubicomp envisions –lots of sensors for gathering data –rich world models describing people, places, things –pervasive.

Slides:



Advertisements
Similar presentations
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Advertisements

IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Consumer Powers and Protections
Intro to Business Ch. 4.
Understanding the Role of Corporate Governance: Lessons from the ROSC Program Alex Berg February 2013.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
4.01B Marketing Information Management. A system that analyzes and assesses marketing information, gathered continuously from sources inside and outside.
Privacy on the Net KIDSKIDS –information about kids too readily available to others when kids go online, and kids can thereby be hurt/exploited/etc info.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
Privacy Chris Kelly iLaw July 5, 2002.
Privacy and Sensor Andrew Jason Hong. Characteristics –Real-time, distributed –Invisibility of sensors –Potential scale Questions –What data is collected?
Introduction to Ubicomp Privacy or Is Privacy the Achilles’ Heel of Ubicomp?
Fighting Spam Randy Appleton Northern Michigan University
Location Privacy Christopher Pride. Readings Location Disclosure to Social Relations: Why, When, and What People Want to Share Location Disclosure to.
Reality vs. Perception :: The Real Wealth Gap in America There are 330+ Million In America; only 3 Million people Saw this…. So far.
Interpersonal violence – Violence between individuals in families and communities – is a public health problem.” Etienne Krug Director Department of.
Economics Introduction:
20 Questions: Empowering Consumers. Question One Question: “I’m interested in giving to a variety of causes. How can I be sure a charity is reputable?”
Opportunity Recognition
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
Computers in Society Week 5: Privacy. Some Stories In the US in 1989 an actress opened her door and was shot dead by a stalker. The stalker had gotten.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Privacy Acknowledgement: Jason Hong, CMU. Overview of Privacy Why care? Why is it hard? Thinking about and Designing for Privacy –Specific HCI issues.
Privacy and Personal Information
SAFE: Stop Abuse For Everyone A personal safety training guide for adults with disabilities and care providers Module 1: Keeping Your Money and Stuff Safe.
 Facebook  Twitter  MySpace  Windows LiveSpace.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
The economics of privacy and surveillance: assessing the social costs and benefits Vicki Nash Oxford Internet Institute Web Science June 2015.
Privacy for Pervasive Computing Slides based on
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
Show the "Famous Failures" video at:
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
My Digital Footprint By Alanya Davignon.
Lessons of the Square Watermelon Japanese grocery stores had a problem. They are much smaller than their US counterparts and therefore don't have room.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Joseph Smarr A Practical Vision for Friends-List Portability Joseph Smarr IIW 2007b, 12/5/2007.
Business ethics and social responsibility
Cyber Safety Jamie Salazar.
1.3 Safeguarding Your Privacy Identity Theft is the illegal use of an individual’s personal information.
CHAPTER 5 ETHICS & PRIVACY.
Economic Systems and the American System. Section 1.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
Privacy, data protection and connected cars Lilian Edwards, Professor of Internet Law University of Strathclyde Researcher in Residence, Digital Catapult.
MY DIGITAL FOOTPRINT BY: GRACE MCLEOD. How might your digital footprint Affect your future opportunities ?
MISSION What conditions must be met to ensure that the digital world of work is humane? EntriesTotalBalance Data Protection High and safe standards of.
BBI 2O Name:. With a partner discuss each of the following terms and what they mean to you. Then write IN YOUR OWN WORDS the definitions in the following.
Christian Citizenship in a Digital World Lesson 1: Online Privacy.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
Trialog, Atos, Trilateral, Inria, AUP, Gradiant, UPM, UUlm, Fraunhofer SIT, WIT, KU Leuven Privacy Motivation and Introduction Claudia Roda (AUP) PRIPARE.
Privacy and Public Policy Implications of IoT
Chapter 3: IRS and FTC Data Security Rules
Richard Purcell Corporate Privacy Officer Microsoft Corporation
Privacy Acknowledgement: Jason Hong, CMU.
Privacy and Information
Other Sources of Information
Privacy Acknowledgement: Jason Hong, CMU.
The Rapid Loss of Privacy in the Era of the Internet
What is the minimum age for snapchat?
Presentation transcript:

Intro to Ubicomp Privacy Jason I. Hong

Ubicomp envisions –lots of sensors for gathering data –rich world models describing people, places, things –pervasive networks for sharing This data can be used for good and for bad The Fundamental Tension Find FriendsSmart HomesSmart Stores

“I’ve got nothing to hide” –Protection from spam, identity theft, mugging Surveillance –General suspicion of guilt until proven innocent –Lack of trust in work environments Starting over –Something stupid you did as a kid Creativity and freedom to experiment –Protection from total societies –Room for each person to develop individually “The right to be let alone” Why Care About Privacy? End-User Perspective Everyday RisksExtreme Risks Stalkers, Muggers _________________________________ Well-being Personal safety Employers _________________________________ Over-monitoring Discrimination Reputation Friends, Family _________________________________ Over-protection Social obligations Embarrassment Government __________________________ Civil liberties

Most obvious problem with ubicomp by outsiders Why Care? Designer and App Developer Perspective

“Do I wear badges? No way. I am completely against wearing badges. I don't want management to know where I am. No. I think the people who made them should be taken out and shot... it is stupid to think that they should research badges because it is technologically interesting. They (badges) will be used to track me around. They will be used to track me around in my private life. They make me furious.” Ubicomp “might lead directly to a future of safe, efficient, soulless, and merciless universal surveillance” – Rheingold Why Care? Designer and App Developer Perspective

Hard to define until something bad happens –“Well, of course I didn’t mean to share that” –“You know it when you lose it” Risks not always obvious –Burglars went to airports to collect license plates –Credit info used by kidnappers in South America Malleable depending on situation –Still use credit cards to buy online –Benefit outweighs cost Why is Privacy Hard?

Data getting easier to store –Think embarrassing facts from a long time ago (ex. big hair) –Think function creep (ex. SSNs) Hard to predict effect of disclosure –Hard to tell what credit card companies, Amazon are doing More data means can market to you better –Trust your friend do the right thing? Easy to misinterpret –Went to drug rehabilitation clinic, why? Bad data can be hard to fix –Sen. Ted Kennedy on TSA watch list Why is Privacy Hard?

Scope and scale –Everywhere, any time Easier to collect and share info –Location, activities, habits, hobbies, people with Breaks existing notions of space and time –Close the door –Whisper to people Machine readable and searchable How Ubicomp Changes the Landscape

Transparent Society –Multi-way flow of info (vs one-way to govts or corporations) Don’t care –I’ve got nothing to hide –We’ve always adapted –"You have zero privacy anyway. Get over it." Fundamentalist –Don’t understand the tech –Don’t trust others to do the right thing Pragmatist –Cost-benefit –Communitarian benefit to society as well as individual Some Philosophical Views

Make it easy for organizations to do the right thing –Detecting abuse (ex. honeypots, audits) –Better database aggregation and anonymization –Better org-wide policies and enforcement Make it easy for individuals to share right info with right people at right times –Better ubicomp architectures that put end-users in control Can’t just flip a switch Make it easier for app developers to do right thing –Better UIs (awareness, disclosures, decision-making) –Better design and evaluation methods Fundamental Tech Challenges

Is Privacy Always Good?

Can be used as a shield for abusive behavior Supermarket loyalty cards –Gauge effect of marketing, effects of price and demand –Market to best customers Can streamline economic transactions –Easy credit Reputation management EU – “Regulators prosecuted an animal rights activist who published a list of fur producers and a consumer activist who criticized a large bank on a Web page that named the bank’s directors.” Is Privacy Always Good?

What is the role of tech? How much should it do? –With respect to Market, Law, and Social Norms? What values should we embody in tech? –And how to design for those values? –Is privacy always good to have? How to assess risks better beforehand? Better h/w and s/w architectures? –Physical layer of privacy? Better UIs? Understandable mental models? Metrics for privacy? Third parties / companies that manage your privacy? Discussion Points