Download - Privacy in ubicomp
![Page 1: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/1.jpg)
PRIVACY IN UBICOMP
![Page 2: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/2.jpg)
Weiser: Privacy a key challenge
![Page 3: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/3.jpg)
Privacy and technology Type of information collected? Who has access? Access for what purpose? How long is information stored? In what format is information stored? What levels of accuracy and precision?
![Page 4: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/4.jpg)
IRB release form example Type of information collected:
Speech Interactions with GUI, devices Data generated by devices Physiological measures from on-body
sensors (e.g. ECG) Off-body sensors (e.g. eye tracker) Video Questionnaire answers
![Page 5: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/5.jpg)
Who has access? Andrew Kun, students, staff Researchers from other institutions Consumers of printed and online media
(scientific publications, blogs, etc.)
![Page 6: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/6.jpg)
Access for what purpose? Development of user interfaces for cars
and handheld devices
![Page 7: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/7.jpg)
How long is information stored? “The data will be stored for future use in
our research.” = “We have no plans to ever destroy the
data.”
![Page 8: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/8.jpg)
In what format is info stored? Not specified No link to participant other than in video
data
![Page 9: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/9.jpg)
What levels of accuracy, precision?
Not specified = nothing omitted (e.g. face recognizable in video)
![Page 10: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/10.jpg)
Privacy and technology Internet – no privacy, but… China:
Filter search engines: if you filter, you may know who submitted the query Should companies sell equipment or leave
China? Self-censorship:
Individuals Companies: e.g. Windows Live Spaces
Should companies practice self-censorship or leave China?
![Page 11: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/11.jpg)
Jeremy Bentham’s Panopticon
![Page 12: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/12.jpg)
Privacy and technology China:
MySpace: can denounce other users
![Page 13: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/13.jpg)
Of course, this is nothing new…
![Page 14: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/14.jpg)
Forbidden topics? Political: Taiwan independence Religious: e.g. Falun Gong Sex: e.g. Muzi Mei blog
![Page 15: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/15.jpg)
Contrast: First Amendment
![Page 16: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/16.jpg)
Need another horror story? Nazi censuses using IBM technology:
Identified Jews, homosexuals, Jehovah’s Witnesses, etc.
![Page 17: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/17.jpg)
What is privacy? 1215: Magna
Carta King will bound
by law
![Page 18: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/18.jpg)
1361: Justices of the Peace Act Sentences for:
Peeping Toms Eavesdroppers
![Page 19: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/19.jpg)
“My home is my castle” 1763: William Pitt
(later PM)
![Page 20: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/20.jpg)
Warren and Brandeis 1890: “the right to be let
alone”
![Page 21: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/21.jpg)
1967: Alan Westin Individuals, groups, institutions When, how and to what extent
information about them communicated to others
= Information privacy
![Page 22: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/22.jpg)
Privacy over the centuries Focus shift from local to remote:
Local/physical: Bodily Territorial
Solitude Information Communication
![Page 23: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/23.jpg)
Ubicomp effects? Local privacy under attack again!
Speech recognition for eavesdropping Smart shirt: ECG Smart fridge: what you eat/buy Robots, cameras: what’s inside your house Etc.
![Page 24: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/24.jpg)
Gary T. Marx: Personal border crossings
Borders: Natural Social Spatial or temporal Due to ephemeral or transitory effects
![Page 25: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/25.jpg)
Natural borders Walls, doors Clothing Darkness Sealed letters Phone calls
![Page 26: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/26.jpg)
Social borders Family Doctor, lawyer
![Page 27: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/27.jpg)
Spatial and temporal borders Spatial: work vs. private life Temporal: past transgressions
![Page 28: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/28.jpg)
Ephemeral/transitory effects Will anybody remember today’s lecture
in detail?
![Page 29: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/29.jpg)
The end of the ephemeral? Lifelogging: Steve Mann Helping people with amnesia, etc.:
Microsoft SenseCam (pdf, video)
![Page 30: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/30.jpg)
Solove’s privacy taxonomy Tort law = remedies for civil wrongs Data holders and information:
Collection Surveillance Interrogation
Processing Aggregation, etc.
Dissemination Breach of confidentiality, etc.
![Page 31: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/31.jpg)
Why do we need privacy? Privacy = property
Can sell it as a commodity Trust market forces
But…
![Page 32: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/32.jpg)
Why do we need privacy? Autonomy of the individual
Experiment Maintaining different faces Allow for emotional release functionality
![Page 33: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/33.jpg)
Why do we need privacy? Social good necessary for functioning of
a democracy Enables citizens to participate
![Page 34: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/34.jpg)
Do people care about location privacy?
John Krumm, "Inference Attacks on Location Tracks", Fifth International Conference on Pervasive Computing (Pervasive 2007), May 13-16, 2007, Toronto, Ontario, Canada. (PDF) (PPT) (PPT 2007)
![Page 35: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/35.jpg)
People Don’t Care About Location Privacy – John Krumm, Pervasive’07
(1) Danezis, G., S. Lewis, and R. Anderson. How Much is Location PrivacyWorth? in Fourth Workshop on the Economics of Information Security.2005. Harvard University.
• 74 U. Cambridge CS students• Would accept £10 to reveal 28 days of measured locations (£20 for commercial use) (1)
• 226 Microsoft employees• 14 days of GPS tracks in return for 1 in 100 chance for $200 MP3 player• 62 Microsoft employees• Only 21% insisted on not sharing GPS data outside
• 11 with location-sensitive message service in Seattle• Privacy concerns fairly light (2)
(2) Iachello, G., et al. Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. in UbiComp 2005: Ubiquitous Computing. 2005. Tokyo, Japan.
(3) Kaasinen, E., User Needs for Location-Aware Mobile Services. Personal and Ubiquitous Computing, 2003. 7(1): p. 70-79.
• 55 Finland interviews on location-aware services• “It did not occur to most of the interviewees that they could be located while using the service.” (3)
![Page 36: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/36.jpg)
Legal background Established in tort law:
Intrusion upon solitude, private affairs Public disclosure of embarrassing personal
facts Publicity placing one in false light in public
eye Appropriation of name/likeness
How to hack RFID-enabled credit cards for $8
![Page 37: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/37.jpg)
Privacy/data protection law Tort law: two individuals Privacy/data protection law: government
or industry and individual Basis: OECD Fair Information Principles
![Page 38: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/38.jpg)
OECD Fair Information Principles
Collection limitation Data quality Purpose specification Use limitation Security safeguards Openness Individual participation Accountability
![Page 39: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/39.jpg)
Legislative approaches US:
Overarching privacy laws for federal government
As-needed for state/local government and private organizations
EU: Overarching privacy laws for all entities
![Page 40: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/40.jpg)
Interpersonal privacy Most people won’t sue (tort), they will
not use your design So…
Privacy is not a binary function. More than yes/no.
Privacy is a social process. Continually adjusted.
![Page 41: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/41.jpg)
The elderly, ubicomp and privacy
Ethical Technology in the Homes of Seniors at Indiana University (ETHOS): Ambient Clock (video)
![Page 42: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/42.jpg)
Ubicomp for couples Empathy Mirror:
Kang-Hao Chang et al. CHI 2008 (pdf, video)
CoupleVibe: Elizabeth Bales et al. Ubicomp 2009 (pdf)
![Page 43: Privacy in ubicomp](https://reader035.vdocument.in/reader035/viewer/2022062501/568165c2550346895dd8cb00/html5/thumbnails/43.jpg)
RFID The hype: IBM commercial video The most boring video of all time:
RFID parking The RFID Ecosystem at the
University of Washington (video)