33rd WATCH: Privacy: Plural, Contextual, Contestable but not Unworkable Deirdre K. Mulligan University of California, Berkeley Thursday March 17, Noon,

Slides:



Advertisements
Similar presentations
Manatt manatt | phelps | phillips New York State Health Information Technology Summit Initiative Overview and Update Rachel Block, Project Director United.
Advertisements

Program Goals: to create a new type of organization - a cyberinfrastructure collaborative for plant science - that will enable new conceptual advances.
The NeTS Program Dr. Joseph B. Evans Program Director Computer and Network Systems Computer & Information Science & Engineering National Science Foundation.
A Practical Framework. RAPID Programme SMEPOL, Cairo, February, An Analytical Framework The political context – political.
W ashington A rea T rustworthy C omputing H our
14th WATCH: Medical Device Cybersecurity: The First 164 Years Kevin Fu University of Massachusetts Amherst. THURSDAY November 15 th, Noon, Room 110 W ashington.
Supporting Research on Campus - Using Cyberinfrastructure (CI) Public research use of ICT has rapidly increased in the past decade, requiring high performance.
Standards Alignment A study of alignment between state standards and the ACM K-12 Curriculum.
Kieran O’Doherty  Science changes our society  Science affects our everyday lives Cell phones; computers … Pharmaceuticals;
Presentation at WebEx Meeting June 15,  Context  Challenge  Anticipated Outcomes  Framework  Timeline & Guidance  Comment and Questions.
16th WATCH: Security, Cybercrime and Scale Cormac Herley Microsoft Research THURSDAY March 21 st, Noon, Room 110 W ashington A rea T rustworthy C omputing.
18th WATCH: An Experiment in Hiring Discrimination via Online Social Networks Alessandro Acquisti Carnegie Mellon University MONDAY Nov. 25 th, Noon, Room.
Future Internet and Multidisciplinary Research Peter Ljungstrand Interactive Institute Chalmers University of Technology TA2 project.
Domain Name Registrant Data: The Privacy Questions Alan Davidson Center for Democracy and Technology
Secure and Trustworthy Cyberspace (SaTC) Program Sam Weber Program Director March 2012.
29th WATCH: Cybersecurity for the Internet of Everything (IoE) Bret Hartman Cisco Systems, Inc. Thursday June 18, Noon, Room 110 W ashington A rea T rustworthy.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
Administrivia Turn in ranking sheets, we’ll have group assignments to you as soon as possible Homeworks Programming Assignment 1 due next Tuesday Group.
Managing Privacy in the Smart Grid Jennifer M. Urban Assistant Clinical Professor of Law Director, Samuelson Law, Technology & Public Policy Clinic UC.
 Critical Enablers for HIV, TB & Malaria Responses UNDP & Global Fund informal session 30 th meeting of the Global Fund Board Dr Mandeep Dhaliwal United.
David C. Croson, Ph.D. Office of the Assistant Director Directorate for Social, Behavioral, and Economic Sciences National Science Foundation
Science at the FDA: Update for the Science Board Jesse L. Goodman, MD, MPH Chief Scientist and Deputy Commissioner for Science and Public Health November.
Privacy on the Books and on the Ground Kenneth A. Bamberger & Deirdre K. Mulligan University of California, Berkeley School of Law and School of Information.
17th WATCH: Cyberwar -- Without the Magical Thinking Stewart A. Baker Steptoe & Johnson THURSDAY July 18 th, Noon, Room 110 W ashington A rea T rustworthy.
26th WATCH: Differential Privacy: Theoretical and Practical Challenges Salil Vadhan Harvard University THURSDAY Jan. 15, Noon, Room 110 W ashington A rea.
21st WATCH: Increasing Trust in the E-Health Environment: Privacy Mechanisms and Policy Problems Maya Bernstein US Department of Health & Human Services.
5th WATCH: So what if I take over a botnet to do my research? An examination of the current state of Ethics in Information and Communications Technology.
AN INVITATION TO LEAD: United Way Partnerships Discussion of a New Way to Work Together. October 2012.
Final Search Terms: Archiving (digital or data) Authentication (data) Conservation (digital or data) Curation (digital or data) Cyberinfrastructure Data.
Key Issues and Challenges in the Deepening Penetration of Demand Response Resources 报 告 人 : Prof. George Gross 报告时间 : 2014 年 11 月 24 日上午 10:00 报告地点 : 清华大学西主楼.
Special Session II Increasing Investment for Disaster Risk Reduction.
Knowledge Transfer - Policy Deirdre K. Mulligan School of Law School of Information University of California, Berkeley.
Session Chair: Peter Doorn Director, Data Archiving and Networked Services (DANS), The Netherlands.
Mongolian Responsible Mining Centre presentation by Mr. O. Zorigt General manager of the MNMA.
Funding HIV/AIDS Research in the Current Environment Celeste Watkins-Hayes, Ph.D. Northwestern University 2009 NSF CAREER Award Recipient 2008 RWJ Health.
Science & Technology Centers Program Center for Science of Information National Science Foundation Science & Technology Centers Program Bryn Mawr Howard.
EIT ICT Labs ICT Innovation & Education & Business Our mission is to foster innovative technology and entrepreneurial talent for economic growth and quality.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Research Recommendations for the Broadband Taskforce Agenda November 23, 2009.
11th WATCH: Security, Privacy, and Usability: Better Together Lorrie Cranor Computer Science & Engineering Science Policy Carnegie Mellon University THURSDAY.
The NEKIA Knowledge Utilization Initiative Board of Directors Meeting Monday April 11, 2005 Montreal.
The Future of Influence Nate Elliott Research Director Forrester Research October 23, 2008.
National Agenda Program Title Name Location Date “ Committed to Excellence ” NACM.
NSF Programs and Possibilities Research Linkages EU-US 23 September 2004 Sylvia Spengler US National Science Foundation.
LIKES: Educating the Next Generation of Knowledge Society Builders Authors: Wingyan Chung, Edward A. Fox, Steven D. Sheetz, Seungwon Yang Presenter: Wingyan.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Cybersecurity: Think Globally, Act Locally Dr. Peter Freeman NSF Assistant Director for CISE Educause Net2003 April 30, 2003.
Racing to the Top: Creating a Flexible Duty of Care to Secure Personal Information Deirdre K. Mulligan Clinical Professor Director, Samuelson Law, Technology.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
Statistics Canada Statistics Canada Statistique Canada Statistique Canada Disseminating gender statistics: The Canadian experience Heather Dryburgh, Ph.D.
1 Technical & Business Writing (ENG-715) Muhammad Bilal Bashir UIIT, Rawalpindi.
Dr Aniyan Varghese eGovernment Unit eGovernment Unit Directorate General Information Society Dr Aniyan Varghese eGovernment.
Incorporating the NACM National Agenda Into your State Association Agenda PRESENTATION AT Name Location Date “ Committed to Excellence ” NATIONAL.
10th WATCH: Barriers to the Science of Security Tom Longstaff National Security Agency John Hopkins University THURSDAY March 15, Noon, Room 110 W ashington.
Chaitan Baru Senior Advisor for Data Science CISE Directorate National Science Foundation NIEHS Webinar October 27, 2015 Image Credit: Exploratorium. Integrating.
WIPO Colloquia on Selected Patent Issues Patents and Transfer of Technology Geneva, 6 November 2007 Sisule F. Musungu Senior Samuelson Fellow, Information.
Overview of the NEH’s Digital Humanities Initiative
EScience for All: Not If, But When Jeannette M. Wing Assistant Director, NSF CISE President’s Professor of Computer Science, CMU.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
University of California at Berkeley Information Systems 106 and Engineering 111 Introduction to Networked Applications and Computing Introduction to course.
The Institute Centre for Policy and Development Practice The Institute Centre for Policy and Development Practice Barnabas Mwansa Founder & Institute Director.
EDUCATION & OUTREACH NSF site visit October 19, 2015 Salil Vadhan and Urs Gasser Supported by the NSF Secure & Trustworthy Cyberspace (SaTC) program, the.
Annual meeting of the Center for Climate and Energy Decision Making Carnegie Mellon University, Pittsburgh, PA 2016 May Inês Azevedo – Co Director.
In Defense of Regulated Market Economy 32E28000 Legal Environment of Business PhD, Jukka Mäkinen Senior University Lecturer Aalto University School of.
STRATEGIC ACADEMIC UNIT “PEOPLE & TECHNOLOGIES”
The National Data Guardian review & Government response
TRUST:Team for Research in Ubiquitous Secure Technologies
Chapter 13 Building Evidence-Based Family Policy:
Presentation transcript:

33rd WATCH: Privacy: Plural, Contextual, Contestable but not Unworkable Deirdre K. Mulligan University of California, Berkeley Thursday March 17, Noon, Room 110 W ashington A rea T rustworthy C omputing H our NSF Stafford I Room 110, Noon Public Invited About the WATCH series: Transforming today’s trusted but untrustworthy cyberinfrastructure into one that can meet society’s growing demands requires both technical advances and improved understanding of how people and organizations of many backgrounds perceive, decide to adopt, and actually use technology. WATCH aims to provide thought-provoking talks by innovative thinkers with ideas that illuminate these challenges and provide signposts toward solutions. The series is jointly organized by NSF’s Computer Science and Engineering (CISE) and Social, Behavioral, and Economic (SBE) Directorates and sponsored by the CISE Secure and Trustworthy Cyberspace (SaTC) Program. Talks will be recorded and made available over the Internet. Questions/comments about WATCH? Contact Nina Amla Thursday, Mar 17, 2016 Abstract The scholarly literature presents a dizzying array of diverging definitions of privacy. Privacy is equally ambiguous in practice, where it is invoked to protect a wide range of interests based on an equally wide range of justifications. While the frequency and intensity of privacy debates are evidence of its salience to contemporary life, its contestability has intensely troubling practical consequences. Privacy is decreed too fickle and indeterminate to be advanced through legislative, regulatory, and technical means. Ambiguity becomes an excuse for disregarding privacy claims-despite visceral and broad appeal, and vociferous support. In this talk, I argue that privacy is an "essentially-contested concept," and that its contestability is a source of value and power that ought to be preserved. I then offer a multi- dimensional analytic of privacy that helps unpack privacy's meaning in specific contexts and contests. Using the analytic to explore privacy claims in high-profile privacy cases reveals the complex array of privacy concepts raised by technical change, and the sort of design and policy choices that can address them. Privacy's essential contestability is key to its ongoing relevance and utility in political and social life, but successfully leveraging it requires tools that ease privacy work by unpacking it's meaning in contexts. Speaker Deirdre K. Mulligan is an Associate Professor in the School of Information at UC Berkeley, co-Director of the Berkeley Center for Law & Technology, Chair of the Board of Directors of the Center for Democracy and Technology, a Fellow at the Electronic Frontier Foundation, and Policy lead for the NSF-funded TRUST Science and Technology Center. Prior to joining the School of Information in 2008, she was a Clinical Professor of Law, founding Director of the Samuelson Law, Technology & Public Policy Clinic, and Director of Clinical Programs at the UC Berkeley School of Law (Boalt Hall). Mulligan’s current research agenda focuses on information privacy and security, including exploring users' conceptions of privacy in the online environment and their relation to existing theories of privacy. Her book with Berkeley Prof. Kenneth Bamberger, Privacy on the Ground: Driving Corporate Behavior in the United States and Europe, from MIT Press can be found at: