organisa on
play

Organisa.on Teachers Merel Koning (m.koning@cs.ru.nl) Jaap-Henk - PowerPoint PPT Presentation

01/03/18 Organisa.on Teachers Merel Koning (m.koning@cs.ru.nl) Jaap-Henk Hoepman (jhh@cs.ru.nl) Blackboard is not used Merel Koning Website: www.cs.ru.nl/~jhh/secsem.html Privacy Seminar 2017-2018 Wiki:


  1. 01/03/18 Organisa.on • Teachers – Merel Koning (m.koning@cs.ru.nl) – Jaap-Henk Hoepman (jhh@cs.ru.nl) • Blackboard is not used Merel Koning – Website: www.cs.ru.nl/~jhh/secsem.html Privacy Seminar 2017-2018 – Wiki: hKp://wiki.science.ru.nl/privacy/ 1 01/03/18 2 What is a seminar? Preliminary Course schedule • Seminar – Student lecture – Student paper – Student opposi.on • Grade = weighted average – But only if all grades are at least 5.5 – If not, lowest grade is final grade! • Working in groups • AKendance required 01/03/18 3 01/03/18 4 1

  2. 01/03/18 Topics Research • First come first serve: • analyse a par.cular prac.cal case – loca.on privacy – what are the privacy issues (from a societal and legal perspec.ve) and how are they dealt with – Internet of things – iden.ty management • give a precise and concise problem descrip.on – electronic vo.ng – in technical terms: define your model; your assump.ons – smart metering/smart grids • inves.gate possible PETs that apply – Search/data retrieval – summarise your analysis – anonymous messaging • pick one and solve the problem (involves a protocol) – privacy in big data – describe this in sufficient detail! – Anonymous crypto currencies – …your own… • (informally) prove or argue correctness • Sign up next lecture 01/03/18 5 01/03/18 6 Student lecture Student lecture: grading Content • Goal of lecture • – Argumenta.on • Whether your lecture provides a solid basis and backing of all statements and claims made. – to inform other students about your research – Cohesiveness Whether the rela.onship between the different (sub)topics of your lecture is made clear. • • Important Comprehensiveness – • Whether your lecture covers all important aspects, and clearly separates important issues from secondary details. Equal aKen.on should be paid to technical and legal/societal issues. – make lecture interac.ve • Form Structure – add addi.onal material – • Logical ordering of your lecture, and it's intelligibility. AKrac.veness – • Whether your lecture cap.vates the audience, and whether the message comes across (i.e. whether your lecture connects to what your audience expects and understands). • Discuss draf • Performance Interac.on – • Level of engagement and contact with the audience, level of interac.vity, the way you respond to ques.ons. – Thursday 13:00-13:15 the week before – Lecture technique • They way you speak (comprehensibility), your presence in front of the class, your usage of suppor.ng materials (e.g. powerpoint). The liveliness – mail slides etc. at least 24 hours before and tone of your lecture. 01/03/18 7 01/03/18 8 2

  3. 01/03/18 Student paper Student paper • Goal • Typical structure – Report on research – Context – Express own perspec.ve on PETs – Problem descrip.on • Format • Including legal/social analysis – Roughly 10 pages (excluding references) – Proposed solu.on • A4, reasonable margins, 10-11 pt font – Technical analysis • Beware – Conclusions – Find and use your own literature – Use input obtained during presenta.on in class 01/03/18 9 01/03/18 10 Student paper: planning Student paper: grading Content • Average .mespan • – Technical quality • Whether the paper shows an understanding of the technical issues involved. Correctness of all technical statements and claims. Sufficient level – Literature study: 2 weeks of technical detail – Analysis – Perform research: 2 weeks Whether a proper argumenta.on is given, and whether all main aspects of the topic are addressed, with proper regard of what are the main • points and what are only secondary points. (This covers the criteria argumenta.on, cohesiveness and comprehensiveness used for scoring the presenta.on.) – Write skeleton: 1 week – Quality of references • Whether you found and cite all relevant literature. Originality (finding relevant references yourself) is appreciated. – Write final paper: 3 weeks – Own opinion • Whether the paper clearly expresses and argues your own opinion on the subject maKer. • Deadlines • Form – Style – May 3: Skeleton • Clarity of wri.ng, objec.veness, linguis.c quality (in terms of spelling and grammar). – Structure • Logical structure of the paper, helping the reader understand what he is about to read, giving the paper a natural flow. – June 14: Final paper – AKrac.veness • Formaong of the paper, including precise formaong of the bibliography. • So start April 1 at the latest 01/03/18 11 01/03/18 12 3

  4. 01/03/18 Remaining points • Contribute to the wiki – hKp://wiki.science.ru.nl/privacy/ What is privacy? 01/03/18 13 01/03/18 14 Government surveillance 01/03/18 15 01/03/18 16 4

  5. 01/03/18 Commercial surveillance Predic.ons 01/03/18 17 01/03/18 18 Shopping mall tracking (I call it Mallware) Privacy what is privacy according to you? 01/03/18 19 01/03/18 20 5

  6. 01/03/18 VALUES/GOODS/ENDS of privacy VALUES/GOODS/ENDS of privacy limita.ons • Personal value privacy e.g. Self-expression, Good Reputa.on, Repose, In.macy and Formality, • Na.onal Security, Law Enforcement, Public Right to Know, Human Dignity, Autonomy, Individualism Administra.ve Costs, Public Health, Selfish Individualism, • Societal value privacy e.g. Inefficiency, (libertarian view) Excess of Protec.ons, Privacy Rights Should be Limited Limited Government, Tolera.on, Civility • Both e.g. Intellectual Life, Preferences and Tradi.ons 01/03/18 21 01/03/18 22 Privacy assets Privacy threats E.g. Threats to informa.on privacy: • Informa.on Dissemina.on • Personal data • Informa.on Collec.on – Breach of Confiden.ality • Home – Surveillance – Disclosure – Interroga.on – Exposure • Reputa.on – Increased Accessibility • Informa.on – Blackmail • Informa.on Processing – Appropria.on • Body – Aggrega.on – Distor.on – Iden.fica.on • Etc.. • Invasion – Insecurity – Secondary Use – Intrusion – Exclusion – Decisional Interference 01/03/18 23 01/03/18 24 6

  7. 01/03/18 Aggregation Identification Insecurity Process Secondary Use Exclusion Surveillance Interrogation Disseminate Collect Privacy and identity theory Breach of confidentiality Disclosure Definitions of privacy Exposure Increased availability Invade/Use Blackmail Appropriation Intrusion Distortion Interference Based on: Daniel J. Solove,"A Taxonomy of Privacy" 2006. 01/03/18 25 Brandeis Warren 1890 Wes.n 1968 • Privacy is ‘the right to be let • Privacy is ‘the claim of alone’. individuals, groups, or ins.tu.ons to determine for themselves when, how, and to • ‘Hiding’ what extent informa.on about them is communicated to others’. • ‘Control’ 01/03/18 27 01/03/18 28 7

  8. 01/03/18 Agre and Rotenberg 1998 Nissenbaum 2004 • Privacy is `the freedom from • Contextual integrity: the right to prevent informa.on to flow unreasonable constraints on the from one context to another construc.on of one’s own – [Nissenbaum, 2004] iden.ty’. • ‘Dialogue’ 01/03/18 29 01/03/18 30 Contextual integrity Don’t confuse these concepts! security privacy data protection [FIDIS project] 01/03/18 31 01/03/18 32 8

  9. 01/03/18 Allan Wes.n’s 4 privacy states • 1960 • Privacy is linked to the needs of an individual • Classifica.on derived from case law on privacy torts (US) – Solitude Most complete state of privacy: Individual separated from others Privacy and identity theory – In+macy Beyond in.mate rela.ons. State of in.macy prerequisite for close contact Typologies and taxonomies – Anonymity Public privacy. Freedom from iden.fica.on and surveillance. Public spaces and anonymous publica.on – Reserve Dynamic aspect of privacy in daily interpersonal rela.ons. Psychological barrier against unwanted intrusions 01/03/18 34 Finn, Wright, Friedewald’s types of privacy Finn, Wright, Friedewald’s • 2013 • Privacy of the person • EU data protec.on legisla.on analysis • Privacy of behavior and ac.on • Expanded from Clarke • Privacy of communica.on • Bio-informa.cs, drones etc. • Privacy of data and image • Privacy of thoughts and feelings • Privacy of loca.on and space • Privacy of associa.on 01/03/18 35 01/03/18 36 9

  10. 01/03/18 RFID-enabled travel documents RFID-enabled travel documents • Threats: • Privacy of the person • Assets: • Data collec.on • Privacy of personal data – Informa.on on the chip itself: – Surveillance • Privacy of loca.on and space • Travel routes – Interroga.on when card is issued or when • Privacy of behavior and ac.on error occurs • Frequent des.na.ons • Processing • Rare des.na.ons – Secondary use • Mode of transport. – Aggrega.on – Informa.on in the database: – Insecurity • Dissemina.on • Loca.on .me – Disclosure and exposure • possible co-travelers etc. Invasion • Routes Decisions on iden.fica.on – Iden.ty 01/03/18 37 01/03/18 38 Second genera.on biometrics Second genera.on biometrics • Measurement and analysis of biometric traits: gait analysis, • Privacy of the person voice recogni.on • Privacy of behavior and ac.on • Psychological biometric: pheromone detec.on, heartbeat • Privacy of communica.on analysis, bodyheat etc. • Privacy of data and image • Privacy of thoughts and feelings. • Impact all seven types • Privacy of loca.on and space • Privacy of associa.on 01/03/18 39 01/03/18 40 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend