location tracking location tracking
play

Location tracking Location tracking Engineering & Public - PowerPoint PPT Presentation

CyLab Location tracking Location tracking Engineering & Public Policy Lorrie Faith Cranor October 8, 2013 y & c S a e v c i u r P r i t e y l b L a a s b U o 8-533 / 8-733 / 19-608 / 95-818: b r a a t


  1. CyLab Location tracking Location tracking Engineering & Public Policy Lorrie Faith Cranor � October 8, 2013 y & c S a e v c i u r P r i t e y l b L a a s b U o 8-533 / 8-733 / 19-608 / 95-818: b r a a t L o Privacy Policy, Law, and Technology y r C y U H D T T E P . U : / M / C C U . S P S C . 1

  2. Outline • Locating Technologies • Location Risk/Benefit Survey • Location-Sharing Applications and Privacy Controls • Locaccino • How private can location data be? 2

  3. Locating Technologies 3

  4. Global Positioning System 4

  5. WiFi Positioning 5

  6. Cellular Triangulation 6

  7. IP Location 7

  8. Locating Technologies • Platforms – Laptop computers – Mobile phones • Applications – Advertising/Marketing • Location-based advertising – Information services • Directions • Find the nearest … • Local weather, local events – People finding • Meet new friends, play games, socialize • Coordination • Monitor kids, employees, elderly 8

  9. Location Risk/Benefit Survey 9

  10. � Method • Conducted April 2008, n = 587 • Provided list of use scenarios – Rate the likelihood of scenario – Rate the magnitude of harm or benefits • Ranked each risk/benefit � Expected Utility = Likelihood * Magnitude 10

  11. Location-Sharing Applications • Not very useful • People are concerned about their privacy • Risks outweigh benefits 11

  12. Benefit Scenarios 12

  13. Risk Scenarios 13

  14. Location-Sharing Applications and Privacy Controls 14

  15. Privacy features • Most current location sharing services allow sharing to be either on or off, per person • Many have a “make me invisible feature” (e.g. Loopt and Brightkite) • Some have the ability to limit by location granularity (e.g. Google Latitude and FireEagle) • Commercial services don’t have fine-grained privacy controls or ability to see who is tracking your location 15

  16. Loopt privacy settings 16

  17. Loopt privacy settings 17

  18. Google Lattitude privacy settings 18

  19. Google Lattitude privacy settings 19

  20. Google Lattitude privacy settings 20

  21. Location-Sharing Applications • Reviewed 89 Applications in August 2009 – Date of Launch – Privacy Policy – Privacy Controls – Immediately Accessible Privacy Settings 21

  22. Privacy Overview • Types of Applications – Open: Requested by anyone (52) – Closed: Requested by friends only (29) Category Yes No Unknown Not ¡Applicable Privacy ¡Policy 66% 34% -­‑ -­‑ Privacy ¡Controls 76% 17% 1% 6% Accessible ¡Privacy ¡ 17% 75% 2% 6% SeAngs 22

  23. Types of Restrictions • Friends Only (49.4%) • Granularity (11.2%) • Blacklist (15.7%) • Invisible (33.7%) % of applications 23

  24. Types of Restrictions • Per-Request (2.25%) • Time-Expiring (2.25%) 24

  25. Most Frequent Controls • Friends Only (49.4%) • Invisible (33.7%) % of applications 25

  26. Privacy Controls • Frequency of Restrictions 26

  27. Best ways to mitigate the greatest expected risks • Blacklist (16%) • Granularity (12%) • Group-based rules (12%) • Location-based rules (1%) • Time-based rules (1%) % of applications 27

  28. Recommendations for developers • Need for more expressive privacy controls in most applications • Providing expressive controls could reduce concerns • Developers must balance expressiveness and user burden 28

  29. Recommendations for users • Understand why you want to use location- sharing application (social, coordination, etc.) • Find application well-suited to your needs • Configure privacy controls • Avoid public posting of your location with your real name 29

  30. http://locaccino.org 30

  31. 31

  32. 32

  33. 33

  34. 34

  35. 35

  36. 36

  37. 37

  38. 38

  39. 39

  40. 40

  41. 41

  42. 42

  43. 43

  44. 44

  45. http://locaccino.org 45

  46. How private can location data be? 46

  47. Limits on anonymizing location data • Why is it difficult to anonymize location data? • How unique is location data? • Strategies for using location data more anonymously – Example: monitoring highway traffic flow 47

  48. y & c S a e v c i u r P r i e t y l b L a a s b U o b r a a t L o y r C y U H D T T E P . U : / M / C C U . S P C S . Engineering & Public Policy CyLab

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend