01/03/18 Organisa.on • Teachers – Merel Koning (m.koning@cs.ru.nl) – Jaap-Henk Hoepman (jhh@cs.ru.nl) • Blackboard is not used Merel Koning – Website: www.cs.ru.nl/~jhh/secsem.html Privacy Seminar 2017-2018 – Wiki: hKp://wiki.science.ru.nl/privacy/ 1 01/03/18 2 What is a seminar? Preliminary Course schedule • Seminar – Student lecture – Student paper – Student opposi.on • Grade = weighted average – But only if all grades are at least 5.5 – If not, lowest grade is final grade! • Working in groups • AKendance required 01/03/18 3 01/03/18 4 1
01/03/18 Topics Research • First come first serve: • analyse a par.cular prac.cal case – loca.on privacy – what are the privacy issues (from a societal and legal perspec.ve) and how are they dealt with – Internet of things – iden.ty management • give a precise and concise problem descrip.on – electronic vo.ng – in technical terms: define your model; your assump.ons – smart metering/smart grids • inves.gate possible PETs that apply – Search/data retrieval – summarise your analysis – anonymous messaging • pick one and solve the problem (involves a protocol) – privacy in big data – describe this in sufficient detail! – Anonymous crypto currencies – …your own… • (informally) prove or argue correctness • Sign up next lecture 01/03/18 5 01/03/18 6 Student lecture Student lecture: grading Content • Goal of lecture • – Argumenta.on • Whether your lecture provides a solid basis and backing of all statements and claims made. – to inform other students about your research – Cohesiveness Whether the rela.onship between the different (sub)topics of your lecture is made clear. • • Important Comprehensiveness – • Whether your lecture covers all important aspects, and clearly separates important issues from secondary details. Equal aKen.on should be paid to technical and legal/societal issues. – make lecture interac.ve • Form Structure – add addi.onal material – • Logical ordering of your lecture, and it's intelligibility. AKrac.veness – • Whether your lecture cap.vates the audience, and whether the message comes across (i.e. whether your lecture connects to what your audience expects and understands). • Discuss draf • Performance Interac.on – • Level of engagement and contact with the audience, level of interac.vity, the way you respond to ques.ons. – Thursday 13:00-13:15 the week before – Lecture technique • They way you speak (comprehensibility), your presence in front of the class, your usage of suppor.ng materials (e.g. powerpoint). The liveliness – mail slides etc. at least 24 hours before and tone of your lecture. 01/03/18 7 01/03/18 8 2
01/03/18 Student paper Student paper • Goal • Typical structure – Report on research – Context – Express own perspec.ve on PETs – Problem descrip.on • Format • Including legal/social analysis – Roughly 10 pages (excluding references) – Proposed solu.on • A4, reasonable margins, 10-11 pt font – Technical analysis • Beware – Conclusions – Find and use your own literature – Use input obtained during presenta.on in class 01/03/18 9 01/03/18 10 Student paper: planning Student paper: grading Content • Average .mespan • – Technical quality • Whether the paper shows an understanding of the technical issues involved. Correctness of all technical statements and claims. Sufficient level – Literature study: 2 weeks of technical detail – Analysis – Perform research: 2 weeks Whether a proper argumenta.on is given, and whether all main aspects of the topic are addressed, with proper regard of what are the main • points and what are only secondary points. (This covers the criteria argumenta.on, cohesiveness and comprehensiveness used for scoring the presenta.on.) – Write skeleton: 1 week – Quality of references • Whether you found and cite all relevant literature. Originality (finding relevant references yourself) is appreciated. – Write final paper: 3 weeks – Own opinion • Whether the paper clearly expresses and argues your own opinion on the subject maKer. • Deadlines • Form – Style – May 3: Skeleton • Clarity of wri.ng, objec.veness, linguis.c quality (in terms of spelling and grammar). – Structure • Logical structure of the paper, helping the reader understand what he is about to read, giving the paper a natural flow. – June 14: Final paper – AKrac.veness • Formaong of the paper, including precise formaong of the bibliography. • So start April 1 at the latest 01/03/18 11 01/03/18 12 3
01/03/18 Remaining points • Contribute to the wiki – hKp://wiki.science.ru.nl/privacy/ What is privacy? 01/03/18 13 01/03/18 14 Government surveillance 01/03/18 15 01/03/18 16 4
01/03/18 Commercial surveillance Predic.ons 01/03/18 17 01/03/18 18 Shopping mall tracking (I call it Mallware) Privacy what is privacy according to you? 01/03/18 19 01/03/18 20 5
01/03/18 VALUES/GOODS/ENDS of privacy VALUES/GOODS/ENDS of privacy limita.ons • Personal value privacy e.g. Self-expression, Good Reputa.on, Repose, In.macy and Formality, • Na.onal Security, Law Enforcement, Public Right to Know, Human Dignity, Autonomy, Individualism Administra.ve Costs, Public Health, Selfish Individualism, • Societal value privacy e.g. Inefficiency, (libertarian view) Excess of Protec.ons, Privacy Rights Should be Limited Limited Government, Tolera.on, Civility • Both e.g. Intellectual Life, Preferences and Tradi.ons 01/03/18 21 01/03/18 22 Privacy assets Privacy threats E.g. Threats to informa.on privacy: • Informa.on Dissemina.on • Personal data • Informa.on Collec.on – Breach of Confiden.ality • Home – Surveillance – Disclosure – Interroga.on – Exposure • Reputa.on – Increased Accessibility • Informa.on – Blackmail • Informa.on Processing – Appropria.on • Body – Aggrega.on – Distor.on – Iden.fica.on • Etc.. • Invasion – Insecurity – Secondary Use – Intrusion – Exclusion – Decisional Interference 01/03/18 23 01/03/18 24 6
01/03/18 Aggregation Identification Insecurity Process Secondary Use Exclusion Surveillance Interrogation Disseminate Collect Privacy and identity theory Breach of confidentiality Disclosure Definitions of privacy Exposure Increased availability Invade/Use Blackmail Appropriation Intrusion Distortion Interference Based on: Daniel J. Solove,"A Taxonomy of Privacy" 2006. 01/03/18 25 Brandeis Warren 1890 Wes.n 1968 • Privacy is ‘the right to be let • Privacy is ‘the claim of alone’. individuals, groups, or ins.tu.ons to determine for themselves when, how, and to • ‘Hiding’ what extent informa.on about them is communicated to others’. • ‘Control’ 01/03/18 27 01/03/18 28 7
01/03/18 Agre and Rotenberg 1998 Nissenbaum 2004 • Privacy is `the freedom from • Contextual integrity: the right to prevent informa.on to flow unreasonable constraints on the from one context to another construc.on of one’s own – [Nissenbaum, 2004] iden.ty’. • ‘Dialogue’ 01/03/18 29 01/03/18 30 Contextual integrity Don’t confuse these concepts! security privacy data protection [FIDIS project] 01/03/18 31 01/03/18 32 8
01/03/18 Allan Wes.n’s 4 privacy states • 1960 • Privacy is linked to the needs of an individual • Classifica.on derived from case law on privacy torts (US) – Solitude Most complete state of privacy: Individual separated from others Privacy and identity theory – In+macy Beyond in.mate rela.ons. State of in.macy prerequisite for close contact Typologies and taxonomies – Anonymity Public privacy. Freedom from iden.fica.on and surveillance. Public spaces and anonymous publica.on – Reserve Dynamic aspect of privacy in daily interpersonal rela.ons. Psychological barrier against unwanted intrusions 01/03/18 34 Finn, Wright, Friedewald’s types of privacy Finn, Wright, Friedewald’s • 2013 • Privacy of the person • EU data protec.on legisla.on analysis • Privacy of behavior and ac.on • Expanded from Clarke • Privacy of communica.on • Bio-informa.cs, drones etc. • Privacy of data and image • Privacy of thoughts and feelings • Privacy of loca.on and space • Privacy of associa.on 01/03/18 35 01/03/18 36 9
01/03/18 RFID-enabled travel documents RFID-enabled travel documents • Threats: • Privacy of the person • Assets: • Data collec.on • Privacy of personal data – Informa.on on the chip itself: – Surveillance • Privacy of loca.on and space • Travel routes – Interroga.on when card is issued or when • Privacy of behavior and ac.on error occurs • Frequent des.na.ons • Processing • Rare des.na.ons – Secondary use • Mode of transport. – Aggrega.on – Informa.on in the database: – Insecurity • Dissemina.on • Loca.on .me – Disclosure and exposure • possible co-travelers etc. Invasion • Routes Decisions on iden.fica.on – Iden.ty 01/03/18 37 01/03/18 38 Second genera.on biometrics Second genera.on biometrics • Measurement and analysis of biometric traits: gait analysis, • Privacy of the person voice recogni.on • Privacy of behavior and ac.on • Psychological biometric: pheromone detec.on, heartbeat • Privacy of communica.on analysis, bodyheat etc. • Privacy of data and image • Privacy of thoughts and feelings. • Impact all seven types • Privacy of loca.on and space • Privacy of associa.on 01/03/18 39 01/03/18 40 10
Recommend
More recommend