Download presentation
Presentation is loading. Please wait.
Published byMeryl Henry Modified over 9 years ago
1
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 1 Privacy and technology Week 13 - November 23
2
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 2 Administrivia Returning rough drafts today Please follow our suggestions If we wrote that you have a lot of work left to do, we really mean it I will try to review 2nd drafts if you send them to me Homework 13 (last homework!) will be reading and summary/highlight only - Due November 30 http://lorrie.cranor.org/courses/fa04/hw13.html http://lorrie.cranor.org/courses/fa04/hw13.html November 30: Current issues discussion, will probably focus on issues that have been raised on class mailing list December 2: Assemble posters in class December 3: Poster session 3-5 pm Please fill out faculty course evaluations! I would also like feedback on books and guest speakers
3
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 3 Homework 11 Discussion http://lorrie.cranor.org/courses/fa04/hw 11.html http://lorrie.cranor.org/courses/fa04/hw 11.html Cases where US government used personal data to violate civil liberties of US citizens Brin: “Can we stand living our lives exposed to scrutiny... if in return we get flashlights of our own?”
4
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 4 Privacy invasive technologies Location tracking (cell phones, GPS devices that phone home, etc.) RFID Transit cards Computer software that phones home Devices that phone home Video cameras (hidden cameras, cell phones) Personalized ecommerce sites Automobile data recorders Face recognition
5
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 5 The Global Positioning System (GPS) Radio-navigation system operated by US DoD Comprised of 24 satellites and 5 ground stations Uses satellites like “man-made stars” to triangulate and calculate 3D position from 4 satellite signals Receivers listen for radio beacons and triangulate their position Typical accuracy in meters, cm accuracy possible DoD intentionally degraded accuracy until May 2000 One-way system If receivers are to report their location back they must use another system, for example cellular phone network Does not work indoors
6
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 6 Radio-frequency identification (RFID) Tags Antenna bonded to small silicon chip encapsulated in glass or plastic (as small as grain of rice) Unpowered (passive) tags and powered (active) tags Readers Broadcast energy to tags, causing tags to broadcast data Energy from readers can also power onboard sensors or cause tag to write new data to memory Read ranges currently a few centimeters up to a few meters
7
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 7 Current and near term uses of RFID Automobile immobilizers Animal tracking Building proximity cards Payment systems Automatic toll collection Inventory management (mostly at pallet level) Prevent drug counterfeiting Passports
8
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 8 Electronic Product Code Standard managed by EPCglobal Relatively small tags Inexpensive No encryption, limited security Kill feature Password feature Designed to replace UPC bar codes 96-bit+ serial number Object Name Service (ONS) database operated by EPCglobal
9
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 9 Ecommerce personalization Ecommerce web sites increasingly offer personalized features Targeted marketing Build relationships with customers Personalization may be: Based on explicit or implicit data Task/session focused or profile based User initiated or system initiated Prediction based or content based
10
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 10 Problems Ecommerce personalization may not actually work for most sites Jupiter report says Personalization features can quadruple site costs Most consumers have never customized a site Consumers say personalization not a factor in purchase decisions Consumers concerned about privacy issues More cost effective ways of achieving goals
11
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 11 Privacy risks Unsolicited marketing Computer can “figure things out about me” Inaccurate inferences -“My TiVo thinks I’m gay!” Surprisingly accurate inferences Profiles may facilitate price discrimination Concern about being charged higher prices Concern about being treated differently Revealing personal info to other users of a computer Revealing info to family members or co-workers Revealing secrets that can unlock many accounts Exposing secrets to criminals Info may be subpoenaed Info may be used for government surveillance
12
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 12 Risks may be magnified in future Wireless location tracking Semantic web applications Ubiquitous computing (Maybe personalization will be more effective in these contexts than it is for today’s ecommerce web sites?)
13
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 13 Privacy risks from RFID?
14
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 14 Applying FIPs to ecom personalization Fair information practice principles can be a useful guide for thinking about privacy risks Lessons from 8 OECD principles: Collect only the data you need Don’t use data to make irrelevant inferences Allow individuals to update and correct their profiles Notify individuals about data collected and how it will be used Don’t allow data collected for personalization to be used for other purposes without user consent Use appropriate security safeguards to protect stored profiles and information in transit Be proactive about developing policies, procedures, and software to support compliance with FIPPs
15
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 15 Applying FIPs to RFID?
16
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 16 Relevant laws and self regulation US has mostly sector-specific privacy laws Financial, healthcare, and childrens’ sites most affected by privacy laws Industry guidelines may require privacy notices or opt-outs or limit what may be included in a profile European countries have more comprehensive privacy laws Privacy notices and access provisions required Limitations on secondary uses and data sharing In some cases, limitations on use of server logs and on automated use of profile data for decision-making In some cases pseudonymous services required
17
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 17 Reducing privacy risks No single approach will always work Several approaches to “collection limitation” - reduce amount of data stored by web site to reduce exposure Approaches that put users in control address “data quality” and “individual participation,” and facilitate obtaining consent in compliance with “use limitation”
18
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 18 Tends to be More Privacy Invasive Tends to be Less Privacy Invasive Data collection method Implicit Explicit Duration Persistent (profile) Transient (task or session) User involvement System initiated User initiated Reliance on predictions Predication based Content based Axes of personalization
19
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 19 Pseudonymous profiles Useful for reducing risk and complying with privacy laws when personal info is not needed for personalization But, profile may become identifiable because of unique combinations of info, links with log data, unauthorized access to user’s computer, etc. Profile info should always be stored separately from web usage logs and transaction records that might contain IP addresses or PII Architectures for pseudonymous profiles across web sites proposed by Arlein, Jain, Jaobsson, Monrose, and Reiter (EC’00) Kobsa and Schreck (TOIT 2003)
20
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 20 Client-side profiles Useful for reducing risk and complying with laws But risk of exposure to other users of computer remains; storing profiles in encrypted form on user’s computer can help Client-side profiles may be stored in cookies that are replayed to the server, which discards them after use Client-side scripting may allow personalization without ever sending personal info to the server Architecture for recommendation system in which individuals compute their own recommendations without revealing their individual data proposed by Canny (IEEE Symposium on Security and Privacy 2002)
21
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 21 Task-based personalization Focus on data associated with current session or task - no user profile need be stored anywhere May allow for simpler (and less expensive) system architecture too! May eliminate problem of system making recommendations that are not relevant to current task Less “spooky” to users - relationship between current task and resultant personalization usually obvious
22
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 22 Putting users in control Users should be able to control what information is stored in their profile how it may be used and disclosed Developing a good user interface to do this is complicated Setting preferences can be tedious Creating overall rules that can be applied on the fly as new profile data is collected requires deep understanding and ability to anticipate privacy concerns Approach that provides reasonable default rules with the ability to add/change them for all data or on a case-by-case basis seems promising Privacy preference prompts in transaction process may help Use of multiple personae may help
23
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 23 Amazon critique Customizing profile requires navigating through several menus There should be easier ways of getting to this info at the times when it is likely to be most relevant Users can rate purchases or have them excluded from recommendations, but not removed from profile If items must remain in profile for legal reasons, users should be able to request that they not be accessible online Every time a user makes a new purchase that they want to rate or exclude they have to edit profile info There should be a way to set up default rules Amazon already allows users to store multiple credit cards and addresses - why not allow users to create personae linked to each with option of keeping recommendations separate (would allow easy way to separate work/home/gift personae)? Likewise, how about an “I didn’t buy it for myself” check-off box (perhaps automatically checked if gift wrapping is requested)
24
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 24 RFID privacy proposals
25
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor http://lorrie.cranor.org/courses/fa04/ 25 Happy Thanksgiving!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.