yaser ghanam. john has an account in each of the three entities you have. choose one entity to be...
TRANSCRIPT
Yaser GhanamYaser Ghanam
John has an account in each of the three entities you have. Choose one entity to be YOU (as a group). Assume you have unconditional access to the
databases of the other two. Using this data, how can you improve your
business?
Example: As eBay, how can I use info from my client’s PayPal account and his CoverMe insurance account to improve my business?
“A funeral home obtained the names and addresses of people diagnosed with cancer, and contacted a Montreal woman on the list about buying a burial plot and pre-paid funeral services. ”
http://www.media-awareness.ca/english/issues/privacy/why_issue_privacy.cfm
“A candy company got hold of the names of people in a weight watchers program, and sent them chocolate bars in the mail.”
http://www.media-awareness.ca/english/issues/privacy/why_issue_privacy.cfm
“Participants in a medical research study reported an increase in difficulties getting employment and insurance after they gave genetic samples to the researchers.”
http://www.media-awareness.ca/english/issues/privacy/why_issue_privacy.cfm
John has an account in each of the three entities you have. Choose one entity to be YOU (as a group). Assume you have unconditional access to the
databases of the other two. Using this data, how can you improve your
service?
Example: As eBay, how can I use info from my client’s PayPal account and his CoverMe insurance account to improve my service?
What is privacy?How does it affect you?Do we care about privacy?Borders of privacy Information collectionContext aware systemsDesign for privacy
Your information -> Heaven for Marketing telemarketers, junk mail, spam email.
Social implications Someone gets access to your online
dating account (your wife/husband!!) Political misuse
IBM's Hollerith punch card technology was used to collect census data, later used by the Nazis to identify Jews for transport to extermination camps.
Black, E. (2001). IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America's Most Powerful Corporation. New York: Crown.
Exercise: I am currently conducting a market
research as part of my business plan for a new set of products to the market. Are you willing to voluntarily give me permission to have copies of the receipts of all shopping transactions you make for 12 months?
What if I give you 5% of the overall total reported on these receipts?
A study was conducted to answer this question.
75% of people were concerned about their privacy or commercial profiling
BUT: in exchange for uncertain, smallish gains
87% of participants disclosed large amounts of private information.
“people do not act according to their stated preferences” User preference Vs. Behaviour: Spiekermann, Grossklags, Berendt (2001) Stated Privacy
Preferences versus Actual Behaviour in EC environments: a Reality Check, Proc 5th Int Conf Wirtschaftsinformatik.
Natural borders: Physical limitations of observations walls, doors, clothing, darkness, also sealed letters, phone calls.
Example: A context-aware wearable system The feeling of having someone (or something) constantly
peeking over our shoulder and second guessing us Such information might be able to determine:▪ your physical data (were you at the crime scene?) ▪ your intentions (by assessing the data feed from body sensors)
Which motivates legislation that would make the deletion of such information a crime▪ just as recent laws against cybercrime
Gary T. Marx. Murky conceptual waters: The public and the private. Ethics and Information Technology, 3(3):157–169, 2001.
Social borders: Expectations about confidentiality for members of certain social roles: family, doctors,
lawyers. also expectations that your colleagues will not read
your personal fax messages, or material left lying around the photocopy machine.
Example: Wearable health monitoring devices improve
information flow to your physicians and their personnel.
Yet, it threatens to facilitate data sharing beyond local clinic staff to include your health insurer and employer.
Gary T. Marx. Murky conceptual waters: The public and the private. Ethics and Information Technology, 3(3):157–169, 2001.
Spatial or temporal borders: The expectations of people that parts of their life, can remain separate. a wild adolescent time should not interfere with today’s life as
a father also your work colleagues and friends in your favourite club.
Example: Mileage programs allow airlines to increase customer loyalty
and provide consumers with free flights and other reward. Different values to each customer ( “gold,” “silver”) Sales agents asses my “net worth” to the company, and offer
me special services (if I am “valuable”)
Gary T. Marx. Murky conceptual waters: The public and the private. Ethics and Information Technology, 3(3):157–169, 2001.
Borders due to ephemeral or transitory effects an action that we hope gets forgotten soon. also old pictures and letters that we put out in our
trash. our expectations of being able to have information
simply pass away unnoticed or forgotten.
Example: Memory Amplifier: Any statement I make during a
private conversation could potentially be played back.
Even if this information would never get disclosed to others:▪ Do you want to deal with people who have perfect memories?Gary T. Marx. Murky conceptual waters: The public and the private. Ethics and
Information Technology, 3(3):157–169, 2001.
In the solution you provided earlier, what privacy borders you might have crossed? Natural Social Spatial/Temporal Ephemeral/Transitory
Phone calls Internet usageSocial networks
Personal info, educational background, religious views, activities, friends, friends of friends ... Etc.
RFID technology Search engines
Blaine A. Price1, Karim Adam, BasharNuseibeh, Keeping Ubiquitous Computing to Yourself: a practical model for user control of privacy.
Raw
Derived
Carman Neustaedter and Saul Greenberg, The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness, UbiComp 2003, LNCS 2864.
Boyle, M., Neustaedter, C. and Greenberg, S. Privacy Factors in Video‐based Media Spaces. In Harrison, S. (Ed.) Media Space: 20+ Years of Mediated Life.Springer
Always-on, video-basedAwareness of others’ presence &
activities
Camera state: play, pause or stop
Capturing angle: control what is on focus
Video fidelity: blurring, frame rate, frame size
Easy-off button: turn off the cameraGesture (de)activation: camera &
microphone
Telecommuter detectionFamily/Friend detectionVisual/Audio feedback
Privacy is a concern with new technologies.
Solutions need to balance privacy with: Unobtrusiveness (Wearable) Awareness (HMS) Convenience (Google)
At the end, it is all up to us.
In the video: One guest said: “Google does do some nasty
stuff… They know so much about people!” Another said: “Their point is that it does make
your searches better.”
Similarly, health monitoring systems One might say: “They expose so much info
about your activities, diets, moods…” Another says: “But they improve health
awareness!”
Where do you stand?