Location tracking Location tracking Engineering & Public - - PowerPoint PPT Presentation

location tracking location tracking
SMART_READER_LITE
LIVE PREVIEW

Location tracking Location tracking Engineering & Public - - PowerPoint PPT Presentation

CyLab Location tracking Location tracking Engineering & Public Policy Lorrie Faith Cranor October 8, 2013 y & c S a e v c i u r P r i t e y l b L a a s b U o 8-533 / 8-733 / 19-608 / 95-818: b r a a t


slide-1
SLIDE 1

1

Location tracking Location tracking

Lorrie Faith Cranor

October 8, 2013 8-533 / 8-733 / 19-608 / 95-818: Privacy Policy, Law, and Technology

C y L a b U s a b l e P r i v a c y & S e c u r i t y L a b

  • r

a t

  • r

y H T T P : / / C U P S . C S . C M U . E D U

Engineering & Public Policy

CyLab

slide-2
SLIDE 2

2

Outline

  • Locating Technologies
  • Location Risk/Benefit Survey
  • Location-Sharing Applications and Privacy

Controls

  • Locaccino
  • How private can location data be?
slide-3
SLIDE 3

3

Locating Technologies

slide-4
SLIDE 4

4

Global Positioning System

slide-5
SLIDE 5

5

WiFi Positioning

slide-6
SLIDE 6

6

Cellular Triangulation

slide-7
SLIDE 7

7

IP Location

slide-8
SLIDE 8

8

Locating Technologies

  • Platforms

– Laptop computers – Mobile phones

  • Applications

– Advertising/Marketing

  • Location-based advertising

– Information services

  • Directions
  • Find the nearest …
  • Local weather, local events

– People finding

  • Meet new friends, play games, socialize
  • Coordination
  • Monitor kids, employees, elderly
slide-9
SLIDE 9

9

Location Risk/Benefit Survey

slide-10
SLIDE 10

10

Method

  • Conducted April 2008, n = 587
  • Provided list of use scenarios

– Rate the likelihood of scenario – Rate the magnitude of harm or benefits

  • Ranked each risk/benefit
  • Expected Utility = Likelihood * Magnitude
slide-11
SLIDE 11

11

Location-Sharing Applications

  • Not very useful
  • People are concerned about their privacy
  • Risks outweigh benefits
slide-12
SLIDE 12

12

Benefit Scenarios

slide-13
SLIDE 13

13

Risk Scenarios

slide-14
SLIDE 14

14

Location-Sharing Applications and Privacy Controls

slide-15
SLIDE 15

15

Privacy features

  • Most current location sharing services allow

sharing to be either on or off, per person

  • Many have a “make me invisible feature” (e.g.

Loopt and Brightkite)

  • Some have the ability to limit by location

granularity (e.g. Google Latitude and FireEagle)

  • Commercial services don’t have fine-grained

privacy controls or ability to see who is tracking your location

slide-16
SLIDE 16

16

Loopt privacy settings

slide-17
SLIDE 17

17

Loopt privacy settings

slide-18
SLIDE 18

18

Google Lattitude privacy settings

slide-19
SLIDE 19

19

Google Lattitude privacy settings

slide-20
SLIDE 20

20

Google Lattitude privacy settings

slide-21
SLIDE 21

21

Location-Sharing Applications

  • Reviewed 89 Applications in August 2009

– Date of Launch – Privacy Policy – Privacy Controls – Immediately Accessible Privacy Settings

slide-22
SLIDE 22

22

Privacy Overview

  • Types of Applications

– Open: Requested by anyone (52) – Closed: Requested by friends only (29)

Category Yes No Unknown Not ¡Applicable Privacy ¡Policy 66% 34%

  • ­‑
  • ­‑

Privacy ¡Controls 76% 17% 1% 6% Accessible ¡Privacy ¡ SeAngs 17% 75% 2% 6%

slide-23
SLIDE 23

23

Types of Restrictions

  • Friends Only (49.4%)
  • Granularity (11.2%)
  • Blacklist (15.7%)
  • Invisible (33.7%)

% of applications

slide-24
SLIDE 24

24

Types of Restrictions

  • Per-Request (2.25%)
  • Time-Expiring (2.25%)
slide-25
SLIDE 25

25

Most Frequent Controls

  • Friends Only (49.4%)
  • Invisible (33.7%)

% of applications

slide-26
SLIDE 26

26

Privacy Controls

  • Frequency of Restrictions
slide-27
SLIDE 27

27

Best ways to mitigate the greatest expected risks

  • Blacklist (16%)
  • Granularity (12%)
  • Group-based rules (12%)
  • Location-based rules (1%)
  • Time-based rules (1%)

% of applications

slide-28
SLIDE 28

28

Recommendations for developers

  • Need for more expressive privacy controls

in most applications

  • Providing expressive controls could reduce

concerns

  • Developers must balance expressiveness

and user burden

slide-29
SLIDE 29

29

Recommendations for users

  • Understand why you want to use location-

sharing application (social, coordination, etc.)

  • Find application well-suited to your needs
  • Configure privacy controls
  • Avoid public posting of your location with

your real name

slide-30
SLIDE 30

30

http://locaccino.org

slide-31
SLIDE 31

31

slide-32
SLIDE 32

32

slide-33
SLIDE 33

33

slide-34
SLIDE 34

34

slide-35
SLIDE 35

35

slide-36
SLIDE 36

36

slide-37
SLIDE 37

37

slide-38
SLIDE 38

38

slide-39
SLIDE 39

39

slide-40
SLIDE 40

40

slide-41
SLIDE 41

41

slide-42
SLIDE 42

42

slide-43
SLIDE 43

43

slide-44
SLIDE 44

44

slide-45
SLIDE 45

45

http://locaccino.org

slide-46
SLIDE 46

46

How private can location data be?

slide-47
SLIDE 47

47

Limits on anonymizing location data

  • Why is it difficult to anonymize location

data?

  • How unique is location data?
  • Strategies for using location data more

anonymously

– Example: monitoring highway traffic flow

slide-48
SLIDE 48

C y L a b U s a b l e P r i v a c y & S e c u r i t y L a b

  • r

a t

  • r

y H T T P : / / C U P S . C S . C M U . E D U

Engineering & Public Policy

CyLab