kosa - theory for privacy measuring v2

37

Upload: dr-tracy-ann-kosa

Post on 07-Aug-2015

126 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Kosa - Theory for Privacy Measuring v2
Page 2: Kosa - Theory for Privacy Measuring v2
Page 3: Kosa - Theory for Privacy Measuring v2
Page 4: Kosa - Theory for Privacy Measuring v2
Page 5: Kosa - Theory for Privacy Measuring v2
Page 6: Kosa - Theory for Privacy Measuring v2
Page 7: Kosa - Theory for Privacy Measuring v2
Page 8: Kosa - Theory for Privacy Measuring v2
Page 9: Kosa - Theory for Privacy Measuring v2
Page 10: Kosa - Theory for Privacy Measuring v2
Page 11: Kosa - Theory for Privacy Measuring v2
Page 12: Kosa - Theory for Privacy Measuring v2

Why Privacy?

Page 13: Kosa - Theory for Privacy Measuring v2

Discipline Specificity

Page 14: Kosa - Theory for Privacy Measuring v2
Page 15: Kosa - Theory for Privacy Measuring v2
Page 16: Kosa - Theory for Privacy Measuring v2
Page 17: Kosa - Theory for Privacy Measuring v2

Problem

● Research across disciplines suffers because there is no unifed mechanism for measurement

● Computer science has focussed on policy enforcement, ontologies and taxonomies

● Nobody looks at individual privacy preferences in a given environment, which is the basis for legislation

– And also how requirements must be derived

Page 18: Kosa - Theory for Privacy Measuring v2

2 Examples

● Facebook● Twitter

Page 19: Kosa - Theory for Privacy Measuring v2

People on Facebook

Page 20: Kosa - Theory for Privacy Measuring v2

People on Facebook

Page 21: Kosa - Theory for Privacy Measuring v2
Page 22: Kosa - Theory for Privacy Measuring v2
Page 23: Kosa - Theory for Privacy Measuring v2

Versus

Page 24: Kosa - Theory for Privacy Measuring v2
Page 25: Kosa - Theory for Privacy Measuring v2
Page 26: Kosa - Theory for Privacy Measuring v2

Hypothesis

● Disregarding the value-based approach to privacy, it's possible to dervie a finite representation based on discrete factors

● The representation can be used to understand privacy betteracross disciplines

– Standardization– Measurement– Management

Page 27: Kosa - Theory for Privacy Measuring v2

Theoretical Framework

● Scientific / mathematical determinism● Plus.

Page 28: Kosa - Theory for Privacy Measuring v2

The States

1)Private: existence is unknown

2)Unidentified: presence is known

3)Anonymous: information known but no identity

4)Masked: identity linkage is concealed

5)De-identified: identity is not directly linked

6)Pseudonymous: identity is falsefied

7)Confidential: identity is known for a specific purpose

8)Identified: capable of being distinguised

9)Public: everything is known and assigned

Page 29: Kosa - Theory for Privacy Measuring v2
Page 30: Kosa - Theory for Privacy Measuring v2

Factors

● Human: considerations when privacy decisions are made

● Technology: services that computers perform related to information management

● Data Types: types of identifiable information

● Recepient: machine v. human● Architecture: characteristics of the physical

environment

Page 31: Kosa - Theory for Privacy Measuring v2

Human

● Human privacy rules are specific to the establishment; they are reflected in the physical structure and properties of society

● Each individual has a social contact threshold which determines how they exercise their privacy rights

● Examples:● Subject matter of the object● Control of disclosure, information, audience● Social structure and condition● Visibility● Expectations

Page 32: Kosa - Theory for Privacy Measuring v2

Data Types

● Notion of privacy as information protection is well represented in legislaiton and regulation across the world

● Less widely used is the notion of identifiability: that data exists that may or may not include the traditional identifiers, e.g. Name, but may still uniquely identify a person● What is more private: a phone number or a

prescription?

Page 33: Kosa - Theory for Privacy Measuring v2

Technology

● Computers are generally accepted to be an effective tool for information management; used to acquire, organize, retrieve, search and maintain information

● This happens increasingly without human intervention

● When it comes to managing information about an identifiable person, there are a discrete number of functions that computers can provide

● Examples:● Network, hosting, registration, mail, website/portal, software,

backup

Page 34: Kosa - Theory for Privacy Measuring v2

Proposed Formalization

1) Sn = w H f (H )+ wD f (D)+ wT f (T )

2) f (Factor) = (w1F1 + w2 F2 +... + wn Fn )

3) The more positive the individual factors, the higher to total result of the factor set, the more likely the individual will move to a lower state of privacy, Sm>Sn

Page 35: Kosa - Theory for Privacy Measuring v2

Transitions

● Forward● I disclose about me, my objects● You disclose about me, my objects

● Backward● information redaction● information protection

Page 36: Kosa - Theory for Privacy Measuring v2

Questions For You

● How do people make decisions?● Specifically in social situations?

● How does space change behaviour?● Any suggestions for testing?● What are the other disciplines that talk about

space, privacy, representation of self?● Suggestions on theoretical frameworks?

Page 37: Kosa - Theory for Privacy Measuring v2

An Offer