Location Intelligence. Privacy Augsburg 2020 Anto Aasa - - PowerPoint PPT Presentation

location intelligence
SMART_READER_LITE
LIVE PREVIEW

Location Intelligence. Privacy Augsburg 2020 Anto Aasa - - PowerPoint PPT Presentation

Location Intelligence. Privacy Augsburg 2020 Anto Aasa http://aasa.ut.ee/augsburg Location intelligence (LI) or spatial intelligence process of deriving meaningful insight from geospatial data relationships to solve a particular


slide-1
SLIDE 1

Location Intelligence. Privacy

Augsburg 2020 Anto Aasa

http://aasa.ut.ee/augsburg

slide-2
SLIDE 2

Location intelligence (LI)

  • or spatial intelligence
  • process of deriving meaningful insight from geospatial data

relationships to solve a particular problem.

  • It involves layering multiple data sets spatially and/or

chronologically, for easy reference on a map.

  • John Snow (London 1854)

http://aasa.ut.ee/augsburg

slide-3
SLIDE 3
  • Using IT services

– Collecting of the personal information

  • Sensitive data
  • Preferences
  • Behaviour, attitudes, social situation
  • Tracking

– Recording – Processing – Communicating

http://aasa.ut.ee/augsburg

slide-4
SLIDE 4
  • Acceptance of IT services strongly depends on

the existence of technical mechanisms for protecting the user’s privacy

– Data protection law

2011

slide-5
SLIDE 5

Data protection law 2014

http://aasa.ut.ee/augsburg

slide-6
SLIDE 6

6

https://static.ftitechnology.com/docs/third-party/forrester- 2015-data-privacy.pdf

slide-7
SLIDE 7

www.privacyinternational.org

http://aasa.ut.ee/augsburg

slide-8
SLIDE 8
  • Cloud computing
  • Server parks
  • Who’s law?

http://aasa.ut.ee/augsburg

slide-9
SLIDE 9

http://aasa.ut.ee/augsburg

slide-10
SLIDE 10

http://aasa.ut.ee/augsburg

slide-11
SLIDE 11

Game of drones

http://aasa.ut.ee/augsburg

slide-12
SLIDE 12
  • Compared to conventional IT services LBSs impose

much higher requirements on mechanisms for saving privacy:

– Location information passes many actors along the LBS supply chain – Tracking during everyday activities – Location information is often desired to be saved more than other personal information

http://aasa.ut.ee/augsburg

slide-13
SLIDE 13

dilemma in privacy protection for LBSs

  • Positioning and tracking represent inherent key functions

without which LBSs will not work and even make any sense at all.

  • The same functions represent a potential source for misuse

and are therefore the reason LBSs are often exposed to distrust in public, which may prevent the success of LBSs in general. Desired function Misuse

slide-14
SLIDE 14

http://aasa.ut.ee/augsburg

slide-15
SLIDE 15

What is privacy?

http://aasa.ut.ee/augsburg

Different meaning

slide-16
SLIDE 16

http://aasa.ut.ee/augsburg

Google Street View Land Board orthophoto

slide-17
SLIDE 17

http://aasa.ut.ee/augsburg

Google Street View

slide-18
SLIDE 18

http://ring24.positium.com

slide-19
SLIDE 19

Privacy

  • Many definitions
  • Privacy is often equated with confidentiality or anonymity
  • „Privacy is the claim of individuals, groups, and institutions to

determine for themselves, when, how, and to what extent information about them is communicated to others“ (Westin, 1970)

http://aasa.ut.ee/augsburg

slide-20
SLIDE 20

Privacy principles

  • Collection limitation
  • Data Quality
  • Purpose specification
  • Use limitation
  • Security safeguards
  • Openness
  • Individual participation
  • Accountability
slide-21
SLIDE 21

Personal data is

  • any information relating to an identified or identifiable natural

person ('data subject');

  • an identifiable person is one who can be identified, directly or

indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity

– (Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data) – link

slide-22
SLIDE 22

Surveillance process

  • Content

– Interception, reading SMS messages, bank operations, internet preferences, …

  • Dynamics

– Regularities in movement, behaviour

slide-23
SLIDE 23

Guidelines for Location-Based Services

  • to promote and protect user privacy as new and exciting LBSs

are developed and deployed.

http://files.ctia.org/pdf/CTIA_LBS_Best_Practices_Adopted_03_10.pdf

slide-24
SLIDE 24

Fundamental principles:

  • LBS Providers must ensure that users receive meaningful

notice about how location information will be used, disclosed and protected so that users can make informed decisions whether or not to use the LBS and thus will have control over their location information.

  • LBS Providers must ensure that users consent to the use or

disclosure of location information, and LBS Providers bear the burden of demonstrating such consent. Users must have the right to revoke consent or terminate the LBS at any time.

Guidelines for Location-Based Services

slide-25
SLIDE 25

Notice

  • Potential users must be informed about how their location

information will be used, disclosed and protected.

  • If, LBS Providers want to use location information for a new

purpose not disclosed in the original notice, they must provide users with further notice and obtain consent to the new or

  • ther use.

Guidelines for Location-Based Services

slide-26
SLIDE 26

Notice

  • how long any location information will be retained, if at all
  • LBS Providers that share location information with third parties

must disclose what information will be provided

  • LBS Providers must inform users how they may terminate the

LBS

Guidelines for Location-Based Services

slide-27
SLIDE 27

Consent

  • LBS Providers must obtain user consent to the use or disclosure
  • f location information before initiating an LBS
  • LBS Providers must allow users to revoke their prior consent

Guidelines for Location-Based Services

slide-28
SLIDE 28

Safeguards

  • 1. Security of Location Information
  • 2. Storage of Location Information
  • 3. Reporting Abuse
  • 4. Compliance with Laws
  • 5. Compliance with Guidelines

Guidelines for Location-Based Services

slide-29
SLIDE 29

Four states of privacy:

  • Anonymity permits the engagement and interaction with
  • thers without being identified
  • Solitude is the right of being alone and secure from intrusion,

interruption, and observation.

  • Intimacy is the right to decide with whom, how much, and

when to interact.

  • Reserve is the freedom to withhold a personal information or

the option to choose when to express it

http://aasa.ut.ee/augsburg

slide-30
SLIDE 30

Concepts and Mechanisms for Privacy Protection

  • Secure communications
  • Privacy policies
  • Anonymization
  • Identifier abstraction
  • Information content abstraction

http://aasa.ut.ee/augsburg

slide-31
SLIDE 31

Secure Communications

  • Location dissemination
  • Negotiating and enforcing privacy policies
  • Managing anonymity
  • Identifier abstraction

http://aasa.ut.ee/augsburg

slide-32
SLIDE 32

Privacy Policies

  • 1. Actor constraints
  • 2. Service constraints
  • 3. Time constraints
  • 4. Location constraints
  • 5. Notification constraints
  • 6. Accuracy constraints
  • 7. Identity constraints

http://aasa.ut.ee/augsburg

slide-33
SLIDE 33

Target must have full control on how location information is treated. 1) the target must be able to identify LBS users and providers that have access to its location information; 2) target may identify a set of LBSs or types of LBSs for which it either grants

  • r denies acces to its location information and allows or not to process it

for service operation; 3) target must be able to restrict positioning to a certain period of time; 4) must be possible to limit positioning and location information access to predefined locations; 5) target can specify whether or not it wishes to be informed about positioning attempts. Upon arrival of such notification, it can authorize or deny positioning; 6) target can degrade the accuracy of location information; 7) target can determine to pass location informatin to other actors either by using a pseudonym insted of its true identity or without any identity at all.

http://aasa.ut.ee/augsburg

slide-34
SLIDE 34

Anonymization

  • Policies are efficient if all actors are trustworthy
  • LBS actor may „talk about the target behind its back“

– Misbehavior or negligence of an actor – Attacks from hackers – Unauthorized access from insiders – Technical & human errors

  • Pseudonymization

http://aasa.ut.ee/augsburg

slide-35
SLIDE 35

Identifier abstraction

  • Identifier is replaced by a pseudonym

– Permanent pseudonym – Temporary pseudonym

http://aasa.ut.ee/augsburg

slide-36
SLIDE 36

Information content abstraction

  • Degrading the the resolution of location information in space,

time, or both

  • To make a certain target’s location data indistinguishable from
  • ther persons staying close
  • K-anonymity

http://aasa.ut.ee/augsburg

slide-37
SLIDE 37

K-anonymity

http://aasa.ut.ee/augsburg

slide-38
SLIDE 38

LBS privacy protection

Secure communication Authentication Integrity Confidentiality Policies Specification Enforcement Anonymization Identifier abstraction Content astraction

http://aasa.ut.ee/augsburg

slide-39
SLIDE 39
  • Communication
  • Location
  • Habits
  • Identification

http://aasa.ut.ee/augsburg

slide-40
SLIDE 40

Location intelligence

  • Spatial intelligence
  • Meaningful insight from geospatial data relationships to solve

a particular problem

  • Layering multiple datasets
  • London 1854, John Snow

http://aasa.ut.ee/augsburg

slide-41
SLIDE 41

https://www.forbes.com/sites/louiscolumbus/2018/02/11/what-new-in-location- intelligence-for-2018/#679b157f14b5

slide-42
SLIDE 42

Crowd sensing

  • Evacuation plan

– Real time emergency GIS

  • Mass events
  • Commuting
  • Transportation

http://aasa.ut.ee/augsburg

slide-43
SLIDE 43

Evacuation plan?

http://aasa.ut.ee/augsburg

slide-44
SLIDE 44

Mobile Positioning Data for the Mobility Studies

http://aasa.ut.ee/augsburg

slide-45
SLIDE 45
  • Call detail records (CDR) – location, time of

call and user id.

  • Database: 2006 … today.

Passive Mobile Positioning: Memory files of mobile operators

slide-46
SLIDE 46

Spatial resolution of CDR

100km

slide-47
SLIDE 47

Data processing & Modelling…

Anchor points model:

  • Home
  • Work
  • Other
  • leisure,
  • household,
  • second home
  • etc
slide-48
SLIDE 48

Mobile Census

slide-49
SLIDE 49

Distribution of mobile calls

http://aasa.ut.ee/augsburg

slide-50
SLIDE 50

Commuting

slide-51
SLIDE 51

Routing, OD-matrix

slide-52
SLIDE 52

Central places & hinterlands

Commuters

Central place Urban region

slide-53
SLIDE 53

Migration patterns

http://aasa.ut.ee/augsburg

slide-54
SLIDE 54

Movement during Christmas Eve

slide-55
SLIDE 55

Metallica concert in Tallinn

http://aasa.ut.ee/augsburg

slide-56
SLIDE 56

Tourism: Estonians abroad

slide-57
SLIDE 57

Latvian fishermen on lake Peipsi

slide-58
SLIDE 58

Behavioural rhythms, physiology

Diurnal Weekly Seasonal

slide-59
SLIDE 59

Chronotypes

Weekday Time, h

slide-60
SLIDE 60

Seasonality of mobile calls

http://aasa.ut.ee/augsburg

slide-61
SLIDE 61

Social networks

slide-62
SLIDE 62

Mirror of wealthy world?

slide-63
SLIDE 63

GPS-data

– App MobilityLog – Agreement with user – Different sensors – Algorithms detect:

  • Stop
  • Move
  • Mode
  • Regularity
slide-64
SLIDE 64

What mobility? Boring life…

slide-65
SLIDE 65

Individual tracking

  • LBS
  • Location bank

http://aasa.ut.ee/augsburg

slide-66
SLIDE 66

http://aasa.ut.ee/augsburg

Activity space

slide-67
SLIDE 67

Tracing E-mail location

http://aasa.ut.ee/augsburg

slide-68
SLIDE 68

Street cameras

http://aasa.ut.ee/augsburg

slide-69
SLIDE 69

Face detection

http://aasa.ut.ee/augsburg

slide-70
SLIDE 70

Google Street View

http://aasa.ut.ee/augsburg

slide-71
SLIDE 71

Phone tracking

http://aasa.ut.ee/augsburg

slide-72
SLIDE 72

Flickr

http://www.girardin.org/fabien/tracing/

http://aasa.ut.ee/augsburg

slide-73
SLIDE 73

Identification of photocamera

http://www.geek.com/news/facebook-developing-way-to-fingerprint-the-camera-you-used-to-take-a-photo-1634542/

http://aasa.ut.ee/augsburg

slide-74
SLIDE 74

Self exposure

http://aasa.ut.ee/augsburg

slide-75
SLIDE 75

Location intelligence application areas

  • Location-based advertising;
  • Mobility of people;
  • Transportation and traffic;
  • Urban and rural planning;
  • Tourism;
  • Marketing;
  • Social-media;
  • Participatory democracy;
  • Safety and security;
  • Scientific research;

http://aasa.ut.ee/augsburg

slide-76
SLIDE 76

10 20 30 40 50 60 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 kell (h) hulk mehed naised

Differences of visiting dating portals between gender.

ICT records everything

Male Female Time Number of visits

http://aasa.ut.ee/augsburg

slide-77
SLIDE 77

Diurnal patterns of visiting gender-oriented portals

5 10 15 20 25 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 auto24 perekool

Car Family

http://aasa.ut.ee/augsburg

slide-78
SLIDE 78

Time when people start to move

0% 5% 10% 15% 20% 25% 30% 35% 40% 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 mees naine

Mobile positioning data Male Female

http://aasa.ut.ee/augsburg

slide-79
SLIDE 79

Diurnal rhythm of bank card usage

5 10 15 20 25 30 35 40 45 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24

http://aasa.ut.ee/augsburg

slide-80
SLIDE 80

Weekly rhythm of bank card usage

10 20 30 40 50 60 70 80 1 2 3 4 5 6 7

http://aasa.ut.ee/augsburg

slide-81
SLIDE 81

http://aasa.ut.ee/augsburg

https://www.r-bloggers.com/what-programming-languages-are-used-most-on-weekends/

slide-82
SLIDE 82

http://aasa.ut.ee/augsburg

slide-83
SLIDE 83

http://aasa.ut.ee/augsburg

http://aasa.ut.ee/augsburg/literature