Privacy – Appraising Challenges to Technologies and Ethics Aharon Hauptman, Yair Sharan Interdisciplinary Center for Technology Analysis and Forecasting.

Slides:



Advertisements
Similar presentations
Chapter 12 - Health Care Trends and Forecasts McGraw-Hill © 2010 by The McGraw-Hill Companies, Inc. All rights reserved 12-1.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
UPM E.U.I.T. Diatel Xi Chen Internet of Things UPM E.U.I.T. Diatel Xi Chen
Chapter 1 Business Driven Technology
Spyware and Adware Rick Carback 9/18/2005
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
ד " ר אהרון האופטמן הכינוס השנתי ה-16 של איגוד האינטרנט הישראלי – קץ עידן הפרטיות – האמנם? המרכז הבינתחומי לניתוח וחיזוי טכנולוגי.
1. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer.
CertAnon A Proposal for an Anonymous WAN Authentication Service David Mirra CS410 January 30, 2007.
“Hospital Information System: A Transition to a Health Information System” Kiki Tsitoyanni Presales Manager Soren Hayrabedyan Consultant H-SYSTEMS, Health.
Telecommuting Teleworking Video-Conferencing Codes of Conduct
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Personalized Medicine Research at the University of Rochester Henry Kautz Department of Computer Science.
Issues Raised by ICT.
Presentation By Deepak Katta
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
The Social Effect of Information System
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Anonymity, Security, Privacy and Civil Liberties
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
MIS – 3030 Business Technologies Cloud Computing & Services IoT.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Chapter 12 The Macro Environment – Technological Influences
1 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 What Is Computer Literacy? To be computer literate, you must: –Understand a computer’s.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Security of the Distributed Electronic Patient Record: A Case-Based Approach James G. Anderson, Ph.D. Purdue University.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
PLUG IT IN SIX Protecting Your Information Assets.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Social Media And Ethics It is a choice of Professionalism.
Collaboration in eRegion- ICT for Growth and Empowerment Bror Salmelin Head of Unit, New working environments European Commission, DG Information Society.
Topic 5: Basic Security.
GLOBAL INITIATIVE FOR INCLUSIVE ICTs Promoting the Rights of Persons with Disabilities in the Digital Age Leveraging Mobile For Accessible.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
NEW TECHNOLOGY. TECHNOLOGY OF TOMORROW By understanding computers of today, you’ll be able to take advantage of & understand technologies of tomorrow.
Safe’n’Sec IT security solutions for enterprises of any size.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Ambient Intelligence: Everyday Living Aid System for Elders
Any criminal action perpetrated primarily through the use of a computer.
Internet of Things. Creating Our Future Together.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
Computer Security Keeping you and your computer safe in the digital world.
Internet of Things – Getting Started
Remarks by Dr Mawaki Chango Kara University DigiLexis Consulting
REPORT THE 2017 APPLICATION INTELLIGENCE
Hotspot Shield Protect Your Online Identity
ASSET - Automotive Software cyber SEcuriTy
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Other Sources of Information
Presentation transcript:

Privacy – Appraising Challenges to Technologies and Ethics Aharon Hauptman, Yair Sharan Interdisciplinary Center for Technology Analysis and Forecasting (ICTAF) at Tel-Aviv University Current Research: Global Perspectives – following OECD conference Jerusalem, 26 October 2010

PRACTIS Main Goals Identify and assess potential impacts of emerging technologies on: Threats to privacy Privacy enhancement Change of perception of privacy Propose means to cope with future risks while maximizing the benefits from new technologies (e.g including privacy consideration in Life Cycle Analysis (LCA) of new products)

Horizon Scanning 4 Not only ICT ! Nano, Bio, Robotics, Materials, Cognition, Converging Technologies…

A worldwide system of interconnected intuitive networks that pay attention to us, knows our likes and desires, and proactively feeds us the information we need to act (or acts by itself)... Internet of Things (IoT), Ambient Intelligence (AmI)

Dark-side scenarios: IoT develops rapidly but privacy & security lag behind Surveillance, identity theft, new crime opportunities… Any personal object may be tagged (by RFID etc) Example (trivial?): robbers use RFID readers to select victims by info about purchased items...

Online behavioral targeted advertising Threats: Manipulation of consumers by advertisers by using huge sets of data about them Impact on perception? Advertisers restrict their use of behavioural advertising because of growing consumer privacy concerns (Ponemon Inst.) Israeli computer scientists: “new generation of malware will mine social networks for people's private patterns of behavior…..the value of this data makes it almost inevitable that malicious attackers will attempt to steal it” Technology Review, Oct 8, 2010

“ undetectable video cameras, microphones and transmitters anywhere one wishes”. Nano – the death of privacy? “Does this technology represent the death of privacy as we know it?” M. D. Mehta (Univ. of Winnipeg), “On Nano-Panopticism: A Sociological Perspective” “Molecularly naked” patients: nano-devices “could allow insurance companies to know more about our bodies than we do” C. Toumey, “Nature Nanotechnology”, Apr

“trillions of nanoscale sensors and actuators embedded in the environment…. in everyday electronics…track hospital equipment, sniff out pesticides in food, “recognize” the person using them and adapt.” HP Vision: Central Nervous System for the Earth (CeNSE) will cost "next to nothing, yet measure everything." Availability of unprecedented amounts of (private?) data

2027: Computers can read the information recorded in the human brain The forthcoming Brain Revolution Delphi Foresight (Japan, 2005): The present: Emotiv’s headset can interpret user’s thoughts and emotions

Synthetic Telepathy Synthetic Telepathy "By 2035, an implantable chip could be wired directly to the user’s brain….. including mind-to-mind or telepathic dialogue.” (UK MOD think tank) Ultimate invasion of privacy? Or total change of privacy perception? – if even thinking is not private anymore!

Intelligent humanoid robots Threats: Surveillance, autonomous privacy violation? Change of perception: Acceptance of robots as friends? Even today people become emotionally attached to robots. Can lead to a disclosure of personal information (that may be of interest for third parties…) Privacy enhancement: Prevent privacy intrusions by strangers or other robots?

Privacy Enhancing Technologies  SFE: Secure function evaluation  PPDM: Privacy preserving data mining (extracting useful info from databases without exposing personal details)  Traceless Biometrics  …. PLCA: Privacy-oriented Life Cycle Analysis (for new products development)

“Invisibility Cloak” “Invisibility Cloak” Metamaterials (with negative refractive index) can hide objects from sight or make them appear as other objects. 14 Perfect PET? Or total change of privacy perception?

PRACTIS – School Survey on Privacy ~18 schools in 6 countries, > 1000 students (ages 16-18) Six privacy-oriented scenarios Examples: Scenario: Rock Concert A venue that hosts rock concerts offers personalized electronic bracelet. Bracelet owners benefit from many advantages. Would you use such an electronic bracelet? No □ Yes □

Scenario: PC/Internet A window warns you that spyware has been detected and proposes a link to download the latest spyware remover. If yes, under which circumstances would you use the link? As problems have been detected, I download it. □ If it’s for free, I’d download. □ If I get a coupon for online-shopping, I’d download. □ If I can win something, I’d download □ Other: □ Would you download the software? No □ Yes □

Health monitoring sensors To improve your health, miniature sensors (worn / implanted) are given for free. Health parameters are displayed on your cellphone and are sent to medical service providers. It helps you to know your condition and to get better and cheaper medical treatment/medications. The same data informs doctors and your insurance company what and how much you eat, drink, or smoke, and when you go to bed. Would you use such medical sensors? No □ Yes □ Yes, but only if they are not implanted □ Yes, but only if I decide when I do the tests and to whom I send the information □ If no, why:

Risks vs. benefits: change of perception?

Thank you! 19 Comments? Ideas?