C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology History and Philosophy of Privacy September.

Slides:



Advertisements
Similar presentations
Privacy Today Privacy Day January 28, 2008 International Association of Privacy Professionals.
Advertisements

Information for Students MGH Institute of Health Professions Use your down arrow or click your mouse to advance through the presentation.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Netiquette Rules.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Fair Information.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381.
 Discrete data: do the lines between mean anything?  When do you use area charts: does the area mean anything or is it for visual effect?  Stacked charts:
Ethics in a Computing Culture
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Engineering Privacy November 6, 2008.
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
C MU U sable P rivacy and S ecurity Laboratory Philosophical definitions of privacy Lorrie Faith Cranor October 19, 2007.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech / Privacy.
CyLab Usable Privacy and Security Laboratory 1 Privacy Policy, Law and Technology History and Philosophy of Privacy August 31 and.
C MU U sable P rivacy and S ecurity Laboratory Making privacy visible Lorrie Faith Cranor October 19, 2007.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 History and.
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Conceptions.
CyLab Usable Privacy and Security Laboratory 1 Privacy Policy, Law and Technology Fair Information Practices September 7, 2010.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Overview Week 1 - August.
Social Networking in Education Presented by Justin R. Clark.
Allyn & Bacon 2003 Social Work Research Methods: Qualitative and Quantitative Approaches Topic 12: Reviewing Literature and Report Writing.
Privacy and Security Risks in Higher Education
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 History and Philosophy Week.
Privacy and Ubiquitous Computing Deirdre K. Mulligan Acting Clinical Professor of Law Director Samuelson Law, Technology & Public Policy Clinic, Boalt.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 History and Philosophy Week.
Anonymity, Security, Privacy and Civil Liberties
Copyright ©2011, 2008, 2005 Pearson Education, Inc. All rights reserved. Essentials of Human Communication, 7 th Edition Joseph A. DeVito Hunter College.
Arnold Bregt SDI as an organisational infrastructure: Policy & Legal issues 0.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Overview Week 1 - August.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Confidentiality and Security Issues in ART & MTCT Clinical Monitoring Systems Meade Morgan and Xen Santas Informatics Team Surveillance and Infrastructure.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
The Primacy of Privacy: A survey of knowledge and opinions Prof. Masooda Bashir Kevin Hoff Gahyun Jeon.
Introduction To Internet
1 Ethics of Working with Human Subjects (BIOL/CHEM 397 ) Header image designed by Michelle Jordan, UMBC Creative Services, 2009.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
Types of privacy (Solove, Understanding Privacy)
Privacy as Contextual Integrity Helen Nissenbaum Department of Culture & Communications, NYU
Problem Paramount to the success of your effort stated precisely address an important question advance knowledge.
THOMPSON & HENDERSON (2011): CHAPTER 4 Legal and Ethical Considerations for Counselors.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Fair Information Practices September 9, 2008.
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
Topics AUP, Online Safety, and Permission By: Amy Mahon, Amy Lawrence, And Melissa Rafetto By: Amy Mahon, Amy Lawrence, And Melissa Rafetto.
Copyright 2010, The World Bank Group. All Rights Reserved. Recommended Tabulations and Dissemination Section B.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Preparing Novice Teachers in Classroom Management At The Elementary and Secondary Level By: Yelena Patish Charles Peck Elizabeth West Laura Rothenberg.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Privacy Evaluation Framework Overview TCAB Privacy Subcommittee Meeting February 21, 2014.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Child Abuse Prevention EDU 153 Spring Policies for Child Abuse  Preventive Measures  Protective Measures.
Definition: Privacy Psychology: Selective access to oneself or one’s group. Legal: The right to be left alone What is the difference between privacy and.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Protection of Personal Information Act An Analysis on the impact.
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
PRIVACY AND DATA PROTECTION in THE BIG DATA AGE JONATHAN PRICE.
Jim Loter Director of Information Technology
Privacy and the Law.
Health Care: Privacy in a Digital Age
Unit# 5: Internet and Worldwide Web
IT and Society Week 2: Privacy.
STRUCTURE OF THE CHAPTER
Presentation transcript:

C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology History and Philosophy of Privacy September 2, 2008

C MU U sable P rivacy and S ecurity Laboratory 2 Course project

C MU U sable P rivacy and S ecurity Laboratory 3 Project overview  Individual or small group (up to 3 students)  Pick your own project or one that I suggest  All projects have final paper, presentation, and poster as deliverable  Some projects may have other deliverables such as software, user interface designs, etc.  ech-fa08/project.html ech-fa08/project.html

C MU U sable P rivacy and S ecurity Laboratory 4 Past projects     Several past projects have been turned into a thesis or published paper –The Real ID Act: Fixing Identity Documents with Duct Tape. I/S: A Journal of Law and Policy for the Information Society, Fall/Winter 2005 (Serge Egelman). –How Technology Drives Vehicular Privacy. I/S: A Journal of Law and Policy for the Information Society, 2(3), Fall 2006, (Aleecia McDonald). –Scrubbing Stubborn Data: An evaluation of counter-forensic privacy tools. IEEE Security & Privacy, September/October 2006 (Matthew Geiger). –Peripheral Privacy Notifications for Wireless Networks. In Proceedings of the 2005 Workshop on Privacy in the Electronic Society, 7 November 2005, Alexandria, VA (Braden Kowitz). –Privacy in India: Attitudes and Awareness. In Proceedings of the 2005 Workshop on Privacy Enhancing Technologies (PET2005), 30 May - 1 June 2005, Dubrovnik, Croatia (Ponnurangam Kumaraguru). –PANAMA: Privacy Assured Name-Addressable Messaging Architecture For Unlinkable Instant Message Conversations. INI Thesis 2005 (Ryan Mahon).

C MU U sable P rivacy and S ecurity Laboratory 5 Selecting a research topic

C MU U sable P rivacy and S ecurity Laboratory 6 Selecting a research topic  Brainstorm –What are you interested in? –What would you like to learn more about? –What topics might be relevant to your thesis work? –What topics might be relevant to your future career?  Select a small number of candidate topics (Sept 30)  Read –How much information seems to be available? –Is this topic over done? –What open questions are there? –Do you still find this topic interesting? –Do you have the skills necessary to pursue this topic?  Focus (October 9 - one paragraph description) –Select a topic –Define a focused research question  Read some more –Conduct a “literature review” –Adjust your topic as needed  Write a project proposal (October 23)

C MU U sable P rivacy and S ecurity Laboratory 7 Finding information with search engines

C MU U sable P rivacy and S ecurity Laboratory 8 Finding info with search engines  General purpose search engines –Google, Yahoo, Altavista, A9, etc.  Clustered searching –Vivisimo, Dogpile  Search CS research literature – – – –

C MU U sable P rivacy and S ecurity Laboratory 9 Advanced searching  Boolean searching –Operators: AND, OR, NOT, NEAR –Implied operators: AND is often implied –Parentheses for grouping –Wildcards –Quotes  Getting to know the ins and outs of your favorite search engines –Many search engines do not use pure boolean searching –Most search engines have some special syntax –Search engines use different algorithms to determine best match

C MU U sable P rivacy and S ecurity Laboratory 10 Conceptualizing privacy

C MU U sable P rivacy and S ecurity Laboratory 11 Concept versus right  Privacy as concept –What is it –How and why it is valued  Privacy as right –How it is (or should be) protected By law By policy By technology

C MU U sable P rivacy and S ecurity Laboratory 12 Hard to define “Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all.” Robert C. Post, Three Concepts of Privacy, 89 Geo. L.J (2001).

C MU U sable P rivacy and S ecurity Laboratory 13 Some definitions from the literature  Personhood  Intimacy  Secrecy  Contextual integrity  Limited access to the self  Control over information

C MU U sable P rivacy and S ecurity Laboratory 14 Limited access to self “Being alone.” - Shane (age 4) “the right to be let alone” - Samuel D. Warren and Louis D. Brandeis, The Right to Privacy, 4 Harv. L. Rev. 193 (1890) “our concern over our accessibility to others: the extent to which we are known to others, the extent to which others have physical access to us, and the extent to which we are the subject of others attention. - Ruth Gavison, “Privacy and the Limits of the Law,” Yale Law Journal 89 (1980)

C MU U sable P rivacy and S ecurity Laboratory 15 Control over information “Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” “…each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication….” Alan Westin, Privacy and Freedom, 1967

C MU U sable P rivacy and S ecurity Laboratory 16 Realizing limited access and control  Limited access –Laws to prohibit or limit collection, disclosure, contact –Technology to facilitate anonymous transactions, minimize disclosure  Control –Laws to mandate choice (opt-in/opt-out) –Technology to facilitate informed consent, keep track of and enforce privacy preferences

C MU U sable P rivacy and S ecurity Laboratory 17 Westin’s four states of privacy  Solitude –individual separated form the group and freed form the observation of other persons  Intimacy –individual is part of a small unit  Anonymity –individual in public but still seeks and finds freedom from identification and surveillance  Reserve –the creation of a psychological barrier against unwanted intrusion - holding back communication

C MU U sable P rivacy and S ecurity Laboratory 18 Westin’s four functions of privacy  Personal autonomy –control when you go public about info  Emotional release –be yourself –permissible deviations to social or institutional norms  Self-evaluation  Limited and protected communication

C MU U sable P rivacy and S ecurity Laboratory 19 Solove’s privacy taxonomy  Information Collection –Surveillance –Interrogation  Information Processing –Aggregation –Identification –Insecurity –Secondary Use –Exclusion  Information Dissemination –Breach of Confidentiality –Disclosure –Exposure –Increased Accessibility –Blackmail –Appropriation –Distortion  Invasion –Intrusion –Decisional Interference

C MU U sable P rivacy and S ecurity Laboratory 20 Information vs. decisional privacy  Information privacy concerns the collection, use, and disclosure of personal information  Decisional privacy concerns the freedom to make decisions about one's body and family

C MU U sable P rivacy and S ecurity Laboratory 21 Multiple facets of privacy  How can posting personal information about myself on my web site result in a reduction of my privacy? How can it result in an increase in my privacy?

C MU U sable P rivacy and S ecurity Laboratory 22 Privacy as animal instinct?  Is privacy necessary for species survival? Eagles eating a deer carcass

C MU U sable P rivacy and S ecurity Laboratory 23 History

C MU U sable P rivacy and S ecurity Laboratory 24 Information privacy  In 17th century America, colonists began to collect information about each other –Census, birth and death records, school records, tax records  Informants reported people who behaved badly –Disorderly children, nightwalkers, Sabbath breakers, atheists, drunks

C MU U sable P rivacy and S ecurity Laboratory 25 Privacy of personal space  Historically, depended a lot on the type and proximity of available housing  In 18th century Europe, most people lived in cities where houses were close together, but small number of people lived in each house  In 18th century America, people lived far away from each other but many people lived in each house and even shared beds

C MU U sable P rivacy and S ecurity Laboratory 26 Communication privacy  When all communication was oral, communication privacy depended on –Communicating without someone overhearing –Communicating with people who wouldn’t tell others  Written communications brought new opportunities for privacy violations  In 18th century America, postal mail was not necessarily private –Sealing wax, basic encryption used to increase privacy – Congress made it illegal to open other peoples’ mail –Later the invention of the adhesive envelope increased communications privacy

C MU U sable P rivacy and S ecurity Laboratory 27 Telegraph  In the late nineteenth century the telegraph became a popular means of long distance communication  Messages could be coded, but you could not recover damages due to transmission errors if the message was coded  Telegraph operators were supposed to keep messages confidential  Occasional subpoenas for telegraph messages

C MU U sable P rivacy and S ecurity Laboratory 28 Cameras  Cameras, especially portable “snap” cameras (1888), raised new privacy concerns  Telephoto lenses  Video cameras  Hidden cameras  Web cams  Satellite images

C MU U sable P rivacy and S ecurity Laboratory 29 Privacy History References  Robert Ellis Smith Ben Franklin’s Web Site: Privacy and Curiosity from Plymouth Rock to the Internet. Providence: Privacy Journal.  Alan Westin Privacy and Freedom. New York: Atheneum.