Download presentation
Presentation is loading. Please wait.
Published byEvan Thompson Modified over 9 years ago
1
Eric Horvitz Tadayoshi Kohno Frank McSherry Wendy Seltzer Daniel Weitzner
2
Right of Privacy, Brandeis and Warren, 1890 “Recent inventions and business methods call attention to the next step which must be taken for the protection of the person…”
3
Large amounts of behavioral data becoming available in stream with services Opportunity to learn from data to enhance services, create new services Core research on people and behavior
4
Example: Collaborative Filtering Pref 1 Pref nProducts, Content 1.. m
7
Example: Web search Query 1 Query n Content + Content - Ad + Ad -
8
Obs. 1 Obs. n ActionsServicesFeedback Beyond search… multiple services
9
T ΔtΔt Predestination Project start T ΔtΔt Traffic Advisor Airport 25-min. delay at I-405 & I-90. Suggest I-5 instead. Seattle Center Broad St. closed. Suggest Denny Way instead. On your way to the airport? Park here! $8/day. Directions Specials
10
Protected sensing and personalization Learning privacy preferences and tradeoffs Selective revelation from population data Restricted usage policies Obscuration and anonymity
11
Shroud of privacy Machine learning Predictive model Actions Content Preferences Contextual attributes Sensor data
12
Shroud of privacy Machine learning Predictive model 3rd party content Context Real-time sensor data sensor data Predictions Recommendations Services Prebuilt model (From subjects of study) Actions Content Preferences Contextual attributes Sensor data
13
Email Documents Web activity Location... Personal content and activities store Personalized result ranker Personalized Results from web search engine
14
Common law: “Intrusion upon seclusion” …if the intrusion would be highly offensive to a reasonable person.” “Offensive” changes with time Rapid photography! 1800’s: “Rapid photography!” Ringing a phone! 1920’s: “Ringing a phone!” …intrudes into the private sanctity of the home.
16
Variances Differences Similarities
17
Clusters of kinds of information that are treated similarly
18
Learn from volunteers General application Sensitivity of private information Value of information Identifying a sweet spot? Maximize value at minimum sensitivity Getting the biggest “bang” for the personal data “buck” (with Andreas Krause)
19
Value of personal data in enhanced service: Demographic data Search history (same query, searches per day?) Topic interests (ever visited business, kids, etc., website) User behavior (location, ever changed zip)? Query: sports Pages1 23456 Freq Entropy H = 2.6 123456 Freq Country USA H = 1.7 Entropy Reduction: 0.9
20
Query: “mp3” Prior entropy: 5.82 U(prev_arts) = 0.50 U(prev_reference) = 0.53; Query: “cars” Prior entropy: 4.55 U(prev_arts) = 0.40 U(prev_kids) = 0.41
21
- λ = Value: Diminishing returns (submodular) Cost: Accelerating (supermodular) Optimization Optimal tradeoff! More observations
23
Optimal tradeoff!
24
n=1437
32
Rise of preference and intention machines Managing privacy and confidentiality as critical Directions Protected sensing and personalization for services Learning and harnessing preferences about privacy and privacy tradeoffs
33
© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
34
Microsoft Research Faculty Summit 2007
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.