privacy & cyberspace

30
Privacy & Cyberspace CSCI102 - Systems ITCS905 - Systems MCS9102 - Systems

Upload: tanuja

Post on 23-Jan-2016

80 views

Category:

Documents


5 download

DESCRIPTION

Privacy & Cyberspace. CSCI102 - Systems ITCS905 - Systems MCS9102 - Systems. Privacy in Cyberspace?. Amount of personal information that can be gathered The speed at which personal information can be transmitted The duration of time that information can be retained - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Privacy & Cyberspace

Privacy & Cyberspace

CSCI102 - Systems

ITCS905 - Systems

MCS9102 - Systems

Page 2: Privacy & Cyberspace

2

Privacy in Cyberspace?

• Amount of personal information that can be gathered

• The speed at which personal information can be transmitted

• The duration of time that information can be retained

• The kind of information that can be transferred

Page 3: Privacy & Cyberspace

3

What is Personal Privacy?

• All-or-nothing

or • dilutable?

• Freedom from physical intrusion• Freedom from interference in one’s personal affairs• Access to & control of personal information

Page 4: Privacy & Cyberspace

4

Types of Privacy

• Accessibility privacy

– “being free from intrusion”US constitution 4th amendment – freedom from unreasonable intrusion or seizures by the government

– “right to inviolate personality”

• Response to the camera

– Focus on the harm that can be caused to a person or their possessions

Page 5: Privacy & Cyberspace

5

Types of Privacy

• Decisional Privacy

– Freedom from interference in one’s personal affairs

– No interference in making personal decisions

• Eg: Not denied access to information about birth control

• Eg: “right to die”

• Informational privacy

– One’s right to control access to and the flow of one’s personal information

Page 6: Privacy & Cyberspace

6

Comprehensive Account of Privacy• James Moor (1997)

– “an individual has privacy in a situation if in that particular situation the individual is protected from intrusion, interference, and information access by others”

• Situation is vague

– allowing for ‘zones’, ‘activities’ or ‘relationships’

Page 7: Privacy & Cyberspace

7

Comprehensive Account of Privacy• Naturally private vs. Normatively private

• Having privacy

– Where natural means may lose privacy, but it is not violated

• vs having a right to privacy

– Contexts where the meriting of protection is established

Page 8: Privacy & Cyberspace

8

Why is Privacy Important?

• Valued for its own sake? – intrinsic value (essential)

– (cf: happiness)

• Valued as a means to an end – instrumental worth (contingent)

– (cf: money)

Page 9: Privacy & Cyberspace

9

A Universal Value?

• Cultural variations in the value of privacy• An Intrinsic Value?

– Fried (1990) argued privacy was both intrinsic & instrumental … contingent to achieve an end, but essential to achieve those ends

• A Social Value?– Essential for democracy? (Westin 1967)

– If privacy is an individual value, it is outweighed by issues that benefit a group or society as a whole

– If privacy contributes to the greater social good, then it is closer in worth to competing social values

Page 10: Privacy & Cyberspace

10

Gathering Personal Data

• Cybertech allows data collection about individuals without their knowledge

Page 11: Privacy & Cyberspace

11

Gathering Personal Data: Dataveillance Techniques• Data surveillance & data recording (Roger Clark 1988)

• Mail interception & phone-tapping predate cybertech• Also video cameras & human investigator

• Cybertech however provides an invisible supervisor

• In early terminal based mainframe systems, people feared government dataveillance, now however corporate entities (employers) are probably more feared

Page 12: Privacy & Cyberspace

12

Gathering Personal Data: Internet Cookies• Files on websites that are sent to, and

retrieved from, browsers; to collect information about browsing habits

• Data collected is stored on the user’s hard-disk and can by accessed by a website when next visited. Can occur without a users consent or knowledge

Page 13: Privacy & Cyberspace

13

Gathering Personal Data: Internet Cookies• PRO: allows customised services• CON: a clear privacy invasion

– Normally a cookie only reports to the site that sent it

– Some services can retrieve other site’s cookies

• DoubleClick – banner advert service that appears on many sites, but can collate results from any site carrying that banner

• Should the default setting for browsers be “cookies enabled”?

Page 14: Privacy & Cyberspace

14

Exchanging Personal Data

• Merging Computerised Records

– Seemingly innocent and nonthreatening data collected in one place can become dangerous if combined with data collected elsewhere

– Double Click tried to buy the Abacus Corp, which held marketing info incl. names & telephone numbers

Page 15: Privacy & Cyberspace

15

Exchanging Personal Data

• Matching Computerised Records

– Cross-checking two or more previously unrelated databases

– Consider Goverment agencies and others

• BSAA able to obtain details of business holders

• “minimise government waste”?

• Nothing to fear if you’ve done nothing wrong?

– Privacy is a legal right

– Legal rights are not absolute

– Violating the law forfeits legal rights______________________________

– Criminals forfeit right to privacy

Page 16: Privacy & Cyberspace

16

Mining Personal Data

• Data mining is the indirect gathering of information through analysis of implicit patterns discoverable in data

• Can generate new & non-obvious classification & categories

• Current laws do not address the use of data-mined information

Page 17: Privacy & Cyberspace

17

Data Mining Practices and Privacy Concerns• Privacy laws cover personal data that is:

– Explicit in databases

– Confidential in nature

– Exchanged between or across databases

• But not situations where information is:

– Implicit in the data

– Non-confidential in nature

– Not exchanged between databases

Page 18: Privacy & Cyberspace

18

Data Mining Practices and Privacy Concerns

• Data-mined information = ‘new’ facts, relations etc

• Often assumed to be public in nature

• Consider online agents etc which analyse e-commerce trends to modify product placement etc.

Page 19: Privacy & Cyberspace

19

Protecting Personal Privacy in Public

• NPI: Non-Public Personal Information

– Medical & financial records etc

• PPI: Public Personal Information

– Place of work, car you drive, school you attended etc.

– PPI tends to have little or no protection

Page 20: Privacy & Cyberspace

20

Protecting Personal Privacy in Public

• In a physical shop they may record what you actually buy

• In an online shop they can record every move you make, build a profile and sell it!

Page 21: Privacy & Cyberspace

21

Protecting Personal Privacy in Public

• Should business be able to ‘own’ information about us and then sell it as they see fit?

• Old legal rule: “anything put by a person in the public domain becomes public information” – should this hold in the face of data mining and profiling?

Page 22: Privacy & Cyberspace

22

Search Engines

• Content search allows search for instances of names

• Many email lists and discussion boards are archived

Page 23: Privacy & Cyberspace

23

Accessing Personal Records

• Pre cybertech, PPI was available to costly to gather and analyse. Now it is cheap and easy to gather and analyse

• Should all ‘public’ information be made available on the Internet?

– Does the government have no right to withhold public information from analysis on the Internet?

Page 24: Privacy & Cyberspace

24

Privacy Enhancing Tools (PET)

• E-comm sector lobbying for self-regulation & voluntary controls, but privacy advocates want more powerful legislation

• PET is a compromise

– Set of tools used by individuals,

• Eg: encryption (incl. PGP)

• Eg: Anonymizer.com

• Eg: Crowds

– Not always usable for e-commerce

Page 25: Privacy & Cyberspace

25

User Education About PET

• No requirement for online entrepreneurs to advise users of PET options, or to make such tools available

• PETs not bundled with mainstream OSs or appls

• Judith deCow (1997) suggests we should “presume in favour of privacy” and develop ways to “allow individuals to determine for themselves how and when that presumption should be overridden”

Page 26: Privacy & Cyberspace

26

PET & Informed Consent

• Informed consent is the traditional model for disclosure of personal data

• Online activities do not always adhere the principle

– You may willingly reveal personal data for one purpose, but have no knowledge of any secondary purposes

Page 27: Privacy & Cyberspace

27

PET & Informed Consent

• Does the online vendor now ‘own’ the data and have the right to use it in any way or sell it etc.?

• What sort of informed consent can apply to data mining where unexpected linkages and facts can emerge afterwards?

• Currently the software industry operates largely on ‘presumed consent’

Page 28: Privacy & Cyberspace

28

PET & Social Equity

• Users should be empowered to choose when to disclose

• Some sites offer financial incentives to participate in data gathering – discounts etc

– Is this fair for low-income users?

• Is it right that people can negotiate or barter away their rights? What if privacy is a morel and/or human right?

• Could we see a “privacy rich – privacy poor” divide?

Page 29: Privacy & Cyberspace

29

Industry Self-Regulation

• PETs may not be sufficient but alternatives to legislation may still exist

– Industry standards

– Self-regulation

• W3C announced P3P in 1997

– Platform for privacy preferences

– Allows browser set privacy options to be set in advance

• Doesn’t impact on the use made of details that are released

– Negotiation agent & trust engine technologies

• TRUSTe – a self-regulatory branding system

Page 30: Privacy & Cyberspace

30

Privacy Laws & Data-Protection Principles• Many countries considering strong

privacy legislation

• US lags far behind the Europeans in this regard

• Euro legislation centres on processing and flow rather than on recording & storage