Paying for Privacy: Consumers & Infrastructures Adam Shostack Presented at 2nd Workshop on Security and Economics Maryland, May.

Slides:



Advertisements
Similar presentations
Privacy and the Use of Cost/Benefit Analysis Professor Peter Swire Ohio State University FTC Workshop on Information Flows June 18, 2003.
Advertisements

Technology Commercialization.
Economics 103 Lecture # 15 Price Searching Continued.
Background Credit reporting agencies are a key player, helping facilitate modern commerce Credit records help predict the risk of a transaction Credit.
Will People Ever Pay for Privacy? Adam Shostack Presented at BlackHat Briefings Amsterdam, May 2003.
Consumer Powers and Protections
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Privacy Chris Kelly iLaw July 5, 2002.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
1 External Costs. 2 Overview An externality is a situation where a third party is affected by an economic activity. The externality can be either positive.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
Data Protection Act. Lesson Objectives To understand the data protection act.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
Economics Introduction:
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Social impacts of the use of it By: Mohamed Abdalla.
Chapter 2 Notes Economic Systems. Economic System The method used by a society to produce and distribute goods and services.
Reducing Crime in Cyberspace: A Privacy Industry View Stephanie Perrin Adam Shostack Zero-Knowledge Systems, Inc.
Chapter 1 Business Information Systems: An Overview
Economic Systems. What is an economic system? Remember SCARCITY – b/c scarcity exist, different societies must come up with methods for distributing their.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Chapter 15 The Marketing Plan. Copyright © Houghton Mifflin Company15-2 Overview Relationship marketing The marketing plan Product/service promotion Online.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Richard M. Alderman University of Houston Law Center
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
DIGITAL CITIZENSHIP/CYBER BULLYING.  Privacy - Protect Personal Information  Respect – Avoiding Cyberbullying, Plagiarism, Downloading Music Appropriately.
Sociology 125 Lecture 20 DEMOCRACY: HOW IT WORKS November 15, 2012.
Making the Case for Health Care Reform. Today l Focusing on costs only as a threat to reform l What do people believe and want? l How we can pre-empt.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Consumer Choice With Uncertainty Part II: Examples Agenda: 1.The Used Car Game 2.Insurance & The Death Spiral 3.The Market for Information 4.The Price.
ETHICS and COMPUTERS An Overview 23/04/2017.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
Internet Safety Internet Safety LPM
Ten Principles of Economics. 1. Trade off -between efficiency and equity Efficiency - the property of society getting the most it can from its scarce.
Chapter Three. SECTION ONE There is a tradition of free enterprise in the United States—a tradition that encourages people to try out their business.
INTERNAL CONTROLS What are they? Why should I care?
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
Understanding Business and Personal Law Consumer Protection Section 15.1 Consumer Protection and Product Liability Years ago, caveat emptor, which means.
Economic Systems 2.1. Economic Systems: Different economic systems have evolved in response to the problem of scarcity. Economic system: A method used.
Chapter 10 Externalities. Market Failure Market failure is when the free market does not provide the best outcome for society. Monopoly is a form of market.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Sociology 125 Lecture 20 DEMOCRACY: HOW IT WORKS November 13, 2014.
Social 30 Still Chapter 2. WORDS  Fundamental Rights  Self-Interest  Private Property  Mercantilism  Free Market Economy.
Economics EOC Review Goal 8 EOC Review. ECONOMIC SYSTEM CHARACTERISTICS TRADITIONAL ECONOMIES An economic system where what is produced is based solely.
Sociology 125 Lectures 19 & 20 DEMOCRACY: HOW IT WORKS November 11 & 16, 2010.
$5 $7 $8 $6 Question #1 Who would you buy your hammer from, an American business, a South American business, an African business or a European business?
The Political Party Platforms:
Richard Purcell Corporate Privacy Officer Microsoft Corporation
Who Uses Encryption? Module 7 Section 3.
Protecting Your Credit
Other Sources of Information
Protecting Yourself from Fraud including Identity Theft
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Presentation transcript:

Paying for Privacy: Consumers & Infrastructures Adam Shostack Presented at 2nd Workshop on Security and Economics Maryland, May 2003

Privacy: Two Intertwined Views Consumers and Privacy What consumers want Identity Infrastructures What governments want What we all get

Does Privacy Matter to People? Polls say that it does Media reports pay it huge attention People seem to care quite deeply

They dont act that way Tell strangers all sorts of things Dont object to intrusive searches Trade DNA for a Big Mac Dont buy privacy products in great bulk Author worked for Zero-Knowledge for three years Still in business, not ruling the world. People wont pay for privacy

People Wont Pay for Privacy Wrong Conclusion People wont pay for things they dont understand: The problem a product solves The way it solves it Freedom Network had both those issues People were amazingly excited by the idea

Quick Review Freedom Net Zero Knowledges Anonymous IP net Real time , web, chat No single trust point Very expensive to operate (ZKS paid) No longer in operation

What is Privacy? Confusing!

Privacy means too much The word has too many meanings People use it sloppily The result is confusion over what people want and will pay for Privacy from the perspective of buyers Important to answering the question Will people pay?

Privacy is Many Things Spam, telemarketers ID theft, CC theft Cookies Total Information Awareness CAPPS II Do Not Call lists Abortion Unobservability Untracability Cryptography Blinding Gut feelings Curtains & Venetian Blinds Unlisted Phone #s Swiss bank accounts Right to be left alone Fair Information Practices and Data Protection Laws Informational self- determination Lie and get away with it

Broad Set of Privacy Tools That Sell Cash and banks Athenian banks and taxation (See Edward Cohen, Athenian Economy and Society, A Banking Perspective, Princeton University Press, 1992) R ers Novelty ID/2nd Passports Curtains Anti-spyware

Tools Dont Address All Problems Maybe the law can help? Almost all built on Fair Information Practices Tradeoff between You must give us this data Well treat it fairly Mandatory tradeoff (one size fits all)

Is Pollution a Good Analogy? Balancing Diverse Interests Production, health, transaction costs Different levels of tolerance for, utility from production and health Clean air markets exist now Consumers marginally involved

Externalities A situation in which someones well- being is affected by anothers action, and they have no control of, or involvement in that action Pollution is a classic example

Looking at the Externality Storage of data creates privacy hazard (Computer security stinks) Users cant insure privacy Hard to measure value Hard to measure risk Risk is a likelihood of a hazard leading to damage ID Theft insurance available May lead to tort claims

Risk & Externality Business are not motivated to protect data as well as the individual who will be hurt by its release e.g., AIDS patient lists Many people not comfortable with this tradeoff Privacy Extremists

Both Sides Are Rational Business needs certain data to function Customer doesnt trust the business Lets not even talk about secondary uses or default states

Both Sides Are Emotional People are tired of privacy invasions Ask the travel business about CAPPS II Businesses are tired of privacy complaints Ask your HR person for privacy problem stories…but only over beer.

Zero-Knowledge Analysis It didnt do well in the market What can we learn from this? NOT: People wont pay for privacy Service didnt meet a meaningful threat that the users cared about

Overview Consumers and Privacy ä Identity and Infrastructure, or Were from the government and were here to help someone pretend to be you.

Identity Whats in a name? A rose by any other name would smell as sweet… But try getting a new ID for Ms. Capulet Common law Use any name you want as long as your intent is not to deceive or defraud

Modern State Welfare systems Immigration problems Require an identity infrastructure Unique identifiers Some biometrics

Identity Infrastructures Hard to build without coercion Diffuse benefits to me of an ID card See Public Key Infrastructure (PKI) industry Businesses can use At least in USA US SSN, no restrictions Dutch passports, illegal to copy German ID cards, # changes every 5 years

Risk Assignment Easy to demand ID Everyone has one Hard not to demand ID If problem, need to justify Hard to check ID carefully Expensive Excludes customers whose money you want

Fake IDs Market driven by ease of demand, problems with checking Drinking laws Employment/Immigration laws

Banks and ID Risk Banks check ID to issue mortgage Rather than meet in the property Reasonable cost/risk tradeoff (for the bank) Banks dont check ID to issue credit cards Consumer credit is useful Reasonable cost/risk tradeoff (for the bank) Rising costs of ID theft

High security ID cards Reduce forgery Increase value of issuance fraud Ignore privacy problems

Forbid non-gov use Aggressive solution Requires explicit cost/benefit analysis Bars hire police to check IDs? Society pays for benefits of stopping underage drinking (or) Tax bars so drinkers pay

Air Travel Security TSA could check ID Other measures more effective? Cockpit doors/tunnels Air Marshals? Focus on threat, not ID checking ID checking seems free Imposes societal privacy cost as ID becomes mandatory

Hard to Forbid ID use US Legal traditions Free speech Free association Free to demand ID Classify ID cards? Exemption for card holder Requires government agencies to treat data carefully Prevents others from using it

Hard to Forbid ID use (2) Liability for storing information insecurely Hard for consumer to find where problem happened Liability for government decision makers? Tax on ID requirement to discourage?

Conclusions ID theft as risk distribution Free riding Inappropriate distribution of risk Possible solutions More work could be interesting