SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
1
March 19, 2014
To: The Federal Trade Commission
Re: Mobile Device Tracking
From: Micah Altman, Director of Research, MIT Libraries;
Non-Resident Senior Fellow, Brookings Institution
I appreciate the opportunity to contribute to the FTC’s considerations of Mobile Device
Tracking. These comments address selected privacy risks and mitigation methods. Our
perspective is informed by substantial advances in privacy science that have been made in the
computer science literature and by recent research conducted by the members of the Privacy
Tools for Sharing Research Data project at Harvard University.1
Scope of information
The speakers focused primarily on businesses use of mobile devices to track consumers’
movements through retail stores and nearby environments. However, as noted in the comments
made by the Center for Digital Democracy [CDD 2014] and in the workshop discussion (as
documented in the transcript), the general scope of mobile information tracking businesses and
third parties extends far beyond this scenario.
Based on the current ability for third parties to collect location information from mobile phones
alone, third parties have the potential to collect extensive, fine grained, continuous and
identifiable records of a persons location and movement history, accompanied with a partial
record of other devices (potentially linked to people) encountered over that history.
Information sensitivity
Generally, information policy should treat information as sensitive when that information, if
linked to a person, even partially or probabilistically, is likely to cause substantial harm. There is
a broad range of informational harms that are recognized by regulation and by researchers and
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
1
The Privacy Tools for Sharing Research Data project is a National Science Foundation funded collaboration at
Harvard University involving the Center for Research on Computation and Society, the Institute for Quantitative
Social Science, the Berkman Center for Internet & Society, and the Data Privacy Lab. More information about the
project can be found at http://privacytools.seas.harvard.edu/.
1
1
The author takes full responsibility for these comments. However, the author wishes to thank the
members of the project for their comments and insights and acknowledge that these comments build
upon joint work conducted with all member of this project and upon previous analysis developed with
David O’Brien and Alexandra Wood (http://informatics.mit.edu/blog/how-provide-public-transparency-
individual-privacy-%E2%80%94-comments-osha).
2
practitioners in the behavioral, medical, and social science fields. [Bankurt & Ander 2006; Lee
1993] Types of potential harms associated with information include loss of insurability, loss of
employability, criminal liability, psychological harm, social harm to a vulnerable group (e.g.
stereotyping), loss of reputation, emotional harm, and dignitary harm.
Knowledge of an individual’s location history and associations with others has the potential to be
used in a wide variety of harmful ways. For example, businesses may use this data for
discriminatory pricing ; employers could use location history to discriminate in hiring; insurers
may red-line specific areas; and third parties could use this information to target users for
physical harm. [NAS 2006] Moreover, since all physical activity has a unique spatial and
temporal context, location history provides a linchpin for integrating multiple sources of data that
may describe an individual.
Re-identification risks
The workshop presenters explained that the MAC addresses associated with identifiers were
routinely ‘hashed’ in an attempt to prevent the data from being identifiable. As discussed in the
workshop, this is a weak protection mechanism. And more genrally, there are many examples of
datasets that were believed to have been anonymized but were later re-identified. For instance,
Latanya Sweeney recently demonstrated how news stories and public records can be used to
identify patients in hospital records that have been anonymized by removing patient names and
addresses. [Sweeney 2013] Using information such as name, age, residence, gender, hospital,
incident date, and details about the incident from news stories, as well as date of birth and ZIP
code from online public records, she was able to successfully identify a significant number of
individual hospitalization records in state hospital data. As another example, Kobbi Nissim and
Eran Tromer recovered records of over one thousand individuals in an anonymized survey by
querying an internet access mechanism hosted by the Israel Central Bureau of Statistics web site
and, furthermore, demonstrated that it is possible to link these records to individuals. [Ziv 2013]
Furthermore, research shows that human mobility patterns are highly predictable [Gonzalez, et.
al 2008] and that these patterns have unique signatures, making them highly identifiable [de
Montjoye, et al 2013] -- even in the absence of associated identifiers or hashes. For example, in
a recent study [de Montjoye, et. al 2013], over 95% of individuals could be identified using only
four location points -- even where location was measured only every hour, and with relatively
low precision.
Moreover, locational traces are difficult or impossible to render non-identifiable using traditional
masking methods. [NAS 2006] Masking through aggregation and perturbation of individual
points is generally insufficient, short of rendering the data useless. [Zimmerman & Pavlik 2008;
de Montjoye et al 2013] More sophisticated approaches have been developed that aggregate
entire location traces rather than individual points [Fung 2010, ch 14] -- but these methods are
3
new, not in common practice, and may still leak sensitive information about individuals.
A stronger new mathematical privacy guarantee known as differential privacy has been
developed which can provide provable privacy. [Dwork 2011] Protecting geospatial using
differential privacy is possible in practice [Mir, et al 2013] -- but this currently requires that
private data be stored with a trusted party, and only queries on the data be made publicly
available. No method currently exists that allows detailed location data to be and then safely
published.
Review, reporting, and information accountability
Because of the inherent identifiability and sensitivity of the data, individuals would clearly
benefit from a regulation that provided increased transparency and accountability for data
collection and subsequent use. The current regulatory framework largely lacks mechanisms that
would provide accountability for harm arising from misuse of disclosed data.
Consent to data collection, while it should be required is not sufficient protection -- privacy
policies are dauntingly complex for individuals to understand, and many summaries provided by
data collectors are inaccurate. [Cranor 2012] Furthermore, data collectors will generally have be
better informed of potential and actual data use, and in the face of ubiquitous data collection
practices, consumers find it difficult to effectively withhold consent -- the playing field is uneven.
Thus, transparency, restrictions on disclosure, and accountability for misuse are all essential to
achieving an optimal balance of social benefit and individual privacy protection. [Weitzner, et al
2008] Accountability mechanisms should enable individuals to find out where data describing
them has been distributed and used, set forth penalties for misuse, and provide harmed
individuals with a right of action
A Modern Approach to Sharing Location Information
Addressing privacy risks requires a sophisticated approach, and the privacy protections currently
used for location data not take advantage of advances in data privacy research or the nuances
they provide in terms of dealing with different kinds of data and finely matching sensitivity to
risk. Like treatment of other risks to subjects, treatment of privacy risks should be based on a
scientifically informed analysis that includes the likelihood of such risks being realized, the
extent and type of the harms that would result from realization of those risks, the efficacy of
computational or statistical methods to mitigate risks and monitor access, and the availability of
legal remedies to those harmed. [Vadhan, et al 2010]
A modern approach to privacy protection recognizes the following three principles:
4
● The risks of informational harm are generally not a simple function of the presence or
absence of specific fields, attributes, or keywords in the released set of data. Instead,
much of the potential for individual harm stems from what one can learn about
individuals from the data release as a whole when linked with existing data.
● Redaction, pseudonymization and hashing, are often neither an adequate nor appropriate
practice, and releasing less information is not always a better approach to privacy. As
noted above, simple redaction of information that has been identified as sensitive is often
not a guarantee of privacy protection. Moreover, in the case of location traces, even
substantial aggregation of data often fails to provide adequate privacy protection.
● Thoughtful analysis with expert consultation is necessary in order to evaluate the
sensitivity of the data collected and their associated re-identification risks and to design
useful and safe release mechanisms. Naïve use of any data sharing model, including
those we describe below, is unlikely to provide adequate protection.
References
de Montjoye, Yves-Alexandre, et al. "Unique in the Crowd: The privacy bounds of human
mobility." Scientific reports 3 (2013).
Elizabeth A. Bankert and Robert J. Andur, Institutional Review Board: Management and
Function (Boston: Jones and Bartlett, 2006);
Cranor, Lorrie Faith. "Necessary but not sufficient: Standardized mechanisms for privacy notice
and choice." J. on Telecomm. & High Tech. L.10 (2012): 273.
Cynthia Dwork, “A Firm Foundation for Private Data Analysis,” Communications of the ACM
(2011): 1, 86-95
Fung, Benjamin CM, et al. Introduction to privacy-preserving data publishing: concepts and
techniques. CRC Press, 2010.
Gonzalez, Marta C., Cesar A. Hidalgo, and Albert-Laszlo Barabasi. "Understanding individual
human mobility patterns." Nature 453.7196 (2008): 779-782.
Krishnaram Kenthapadi, Nina Mishra, and Kobbi Nissim, “Denials Leak Information:
Simulatable Auditing,” Journal of Computer and System Sciences 79.8 (2013): 1322-1340.
5
Raymond M. Lee, Doing Research on Sensitive Topics (London: SAGE, 1993).
NAS 2006, Putting People on the Map: Protecting
Confidentiality with Linked Social-Spatial Data
Latanya Sweeney, “Matching Known Patients to Health Records in Washington State Data”
(July 2013), available at http://dataprivacylab.org/projects/wa/1089-1.pdf.
Salil Vadhan, et al., Re: Advance Notice of Proposed Rulemaking: Human Subjects Research
Protections (2010), available at http://dataprivacylab.org/projects/irb/Vadhan.pdf.
Daniel J. Weitzner, et al., “Information Accountability,” Communications of the ACM 51.6
(2008): 82-87.
Amitai Ziv, “Israel's ‘Anonymous’ Statistics Surveys Aren't So Anonymous,” Haaretz (Jan. 7,
2013), http://www.haaretz.com/news/national/israel-s-anonymous-statistics-surveys-aren-t-so-
anonymous-1.492256.
Zimmerman, D. L., Pavlik, C. (2008). Quantifying the effects of mask metadata disclosure and
multiple releases on the confidentiality of geographically masked health data. Geographical
Analysis 40.1, 52 (25).

Weitere ähnliche Inhalte

Was ist angesagt?

Data Sharing & Data Citation
Data Sharing & Data CitationData Sharing & Data Citation
Data Sharing & Data CitationMicah Altman
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeJosh Cowls
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingMicah Altman
 
EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonPaul Simon
 
Redistricting and Voting Technology
Redistricting and Voting TechnologyRedistricting and Voting Technology
Redistricting and Voting TechnologyMicah Altman
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerCharleston Conference
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Micah Altman
 
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...Micah Altman
 
Share: Science Information Life Cycle
Share: Science Information Life CycleShare: Science Information Life Cycle
Share: Science Information Life Cyclekauberry
 
Ontology-enabled Healthcare Applications exploiting Physical-Cyber-Social Big...
Ontology-enabled Healthcare Applications exploiting Physical-Cyber-Social Big...Ontology-enabled Healthcare Applications exploiting Physical-Cyber-Social Big...
Ontology-enabled Healthcare Applications exploiting Physical-Cyber-Social Big...Amit Sheth
 
2017 sa tc_pi_meeting_-_poster final 2
2017 sa tc_pi_meeting_-_poster final 22017 sa tc_pi_meeting_-_poster final 2
2017 sa tc_pi_meeting_-_poster final 2Monireh Ebrahimi
 
Information seeking
Information seekingInformation seeking
Information seekingAzeem Zam
 
A survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsA survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsunyil96
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialKa_Kinder
 

Was ist angesagt? (20)

Data Sharing & Data Citation
Data Sharing & Data CitationData Sharing & Data Citation
Data Sharing & Data Citation
 
Accessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science KnowledgeAccessing and Using Big Data to Advance Social Science Knowledge
Accessing and Using Big Data to Advance Social Science Knowledge
 
La ricerca scientifica nell'era dei Big Data - Sabina Leonelli
La ricerca scientifica nell'era dei Big Data - Sabina LeonelliLa ricerca scientifica nell'era dei Big Data - Sabina Leonelli
La ricerca scientifica nell'era dei Big Data - Sabina Leonelli
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul Simon
 
Redistricting and Voting Technology
Redistricting and Voting TechnologyRedistricting and Voting Technology
Redistricting and Voting Technology
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...Making Decisions in a World Awash in Data: We’re going to need a different bo...
Making Decisions in a World Awash in Data: We’re going to need a different bo...
 
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...
 
Share: Science Information Life Cycle
Share: Science Information Life CycleShare: Science Information Life Cycle
Share: Science Information Life Cycle
 
Ontology-enabled Healthcare Applications exploiting Physical-Cyber-Social Big...
Ontology-enabled Healthcare Applications exploiting Physical-Cyber-Social Big...Ontology-enabled Healthcare Applications exploiting Physical-Cyber-Social Big...
Ontology-enabled Healthcare Applications exploiting Physical-Cyber-Social Big...
 
Internet Research Ethics and IRBs
Internet Research Ethics and IRBsInternet Research Ethics and IRBs
Internet Research Ethics and IRBs
 
2017 sa tc_pi_meeting_-_poster final 2
2017 sa tc_pi_meeting_-_poster final 22017 sa tc_pi_meeting_-_poster final 2
2017 sa tc_pi_meeting_-_poster final 2
 
Information seeking
Information seekingInformation seeking
Information seeking
 
A survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methodsA survey of confidential data storage and deletion methods
A survey of confidential data storage and deletion methods
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 Tutorial
 

Ähnlich wie Mobile Device Tracking Privacy Risks

Mapping the Risk-Utility Landscape of Mobile Data for Sustainable Development...
Mapping the Risk-Utility Landscape of Mobile Data for Sustainable Development...Mapping the Risk-Utility Landscape of Mobile Data for Sustainable Development...
Mapping the Risk-Utility Landscape of Mobile Data for Sustainable Development...UN Global Pulse
 
UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)
UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)
UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)Alex Rutherford
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationiWriteEssays
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionThe Rockefeller Foundation
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_defAlessandro Mantelero
 
Privacy tool osha comments
Privacy tool osha commentsPrivacy tool osha comments
Privacy tool osha commentsMicah Altman
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfAsefaAdimasu2
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxturveycharlyn
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usageijtsrd
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul LanoisAIIM International
 
Personal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | WhitepaperPersonal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | WhitepaperAlejandro Franceschi
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxurvashipundir04
 

Ähnlich wie Mobile Device Tracking Privacy Risks (20)

Mapping the Risk-Utility Landscape of Mobile Data for Sustainable Development...
Mapping the Risk-Utility Landscape of Mobile Data for Sustainable Development...Mapping the Risk-Utility Landscape of Mobile Data for Sustainable Development...
Mapping the Risk-Utility Landscape of Mobile Data for Sustainable Development...
 
UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)
UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)
UNGP_ProjectSeries_Mobile_Data_Privacy_2015 (1)
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for Action
 
Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_def
 
Privacy tool osha comments
Privacy tool osha commentsPrivacy tool osha comments
Privacy tool osha comments
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
big-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdfbig-data-and-data-sharing_ethical-issues.pdf
big-data-and-data-sharing_ethical-issues.pdf
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usage
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
Personal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | WhitepaperPersonal Identifiability of User Tracking Data | Whitepaper
Personal Identifiability of User Tracking Data | Whitepaper
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
 

Mehr von Micah Altman

Selecting efficient and reliable preservation strategies
Selecting efficient and reliable preservation strategiesSelecting efficient and reliable preservation strategies
Selecting efficient and reliable preservation strategiesMicah Altman
 
Well-Being - A Sunset Conversation
Well-Being - A Sunset ConversationWell-Being - A Sunset Conversation
Well-Being - A Sunset ConversationMicah Altman
 
Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...Micah Altman
 
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019Micah Altman
 
Well-being A Sunset Conversation
Well-being A Sunset ConversationWell-being A Sunset Conversation
Well-being A Sunset ConversationMicah Altman
 
Can We Fix Peer Review
Can We Fix Peer ReviewCan We Fix Peer Review
Can We Fix Peer ReviewMicah Altman
 
Academy Owned Peer Review
Academy Owned Peer ReviewAcademy Owned Peer Review
Academy Owned Peer ReviewMicah Altman
 
Redistricting in the US -- An Overview
Redistricting in the US -- An OverviewRedistricting in the US -- An Overview
Redistricting in the US -- An OverviewMicah Altman
 
A Future for Electoral Districting
A Future for Electoral DistrictingA Future for Electoral Districting
A Future for Electoral DistrictingMicah Altman
 
A History of the Internet :Scott Bradner’s Program on Information Science Talk
A History of the Internet :Scott Bradner’s Program on Information Science Talk  A History of the Internet :Scott Bradner’s Program on Information Science Talk
A History of the Internet :Scott Bradner’s Program on Information Science Talk Micah Altman
 
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...Micah Altman
 
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...Micah Altman
 
Utilizing VR and AR in the Library Space:
Utilizing VR and AR in the Library Space:Utilizing VR and AR in the Library Space:
Utilizing VR and AR in the Library Space:Micah Altman
 
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-NotsCreative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-NotsMicah Altman
 
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...Micah Altman
 
Ndsa 2016 opening plenary
Ndsa 2016 opening plenaryNdsa 2016 opening plenary
Ndsa 2016 opening plenaryMicah Altman
 
Software Repositories for Research-- An Environmental Scan
Software Repositories for Research-- An Environmental ScanSoftware Repositories for Research-- An Environmental Scan
Software Repositories for Research-- An Environmental ScanMicah Altman
 
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...Micah Altman
 
Gary Price, MIT Program on Information Science
Gary Price, MIT Program on Information ScienceGary Price, MIT Program on Information Science
Gary Price, MIT Program on Information ScienceMicah Altman
 
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...Attribution from a Research Library Perspective, on NISO Webinar: How Librari...
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...Micah Altman
 

Mehr von Micah Altman (20)

Selecting efficient and reliable preservation strategies
Selecting efficient and reliable preservation strategiesSelecting efficient and reliable preservation strategies
Selecting efficient and reliable preservation strategies
 
Well-Being - A Sunset Conversation
Well-Being - A Sunset ConversationWell-Being - A Sunset Conversation
Well-Being - A Sunset Conversation
 
Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...
 
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019
 
Well-being A Sunset Conversation
Well-being A Sunset ConversationWell-being A Sunset Conversation
Well-being A Sunset Conversation
 
Can We Fix Peer Review
Can We Fix Peer ReviewCan We Fix Peer Review
Can We Fix Peer Review
 
Academy Owned Peer Review
Academy Owned Peer ReviewAcademy Owned Peer Review
Academy Owned Peer Review
 
Redistricting in the US -- An Overview
Redistricting in the US -- An OverviewRedistricting in the US -- An Overview
Redistricting in the US -- An Overview
 
A Future for Electoral Districting
A Future for Electoral DistrictingA Future for Electoral Districting
A Future for Electoral Districting
 
A History of the Internet :Scott Bradner’s Program on Information Science Talk
A History of the Internet :Scott Bradner’s Program on Information Science Talk  A History of the Internet :Scott Bradner’s Program on Information Science Talk
A History of the Internet :Scott Bradner’s Program on Information Science Talk
 
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...
 
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...
 
Utilizing VR and AR in the Library Space:
Utilizing VR and AR in the Library Space:Utilizing VR and AR in the Library Space:
Utilizing VR and AR in the Library Space:
 
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-NotsCreative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots
 
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...
 
Ndsa 2016 opening plenary
Ndsa 2016 opening plenaryNdsa 2016 opening plenary
Ndsa 2016 opening plenary
 
Software Repositories for Research-- An Environmental Scan
Software Repositories for Research-- An Environmental ScanSoftware Repositories for Research-- An Environmental Scan
Software Repositories for Research-- An Environmental Scan
 
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...
 
Gary Price, MIT Program on Information Science
Gary Price, MIT Program on Information ScienceGary Price, MIT Program on Information Science
Gary Price, MIT Program on Information Science
 
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...Attribution from a Research Library Perspective, on NISO Webinar: How Librari...
Attribution from a Research Library Perspective, on NISO Webinar: How Librari...
 

Kürzlich hochgeladen

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Kürzlich hochgeladen (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Mobile Device Tracking Privacy Risks

  • 1. 1 March 19, 2014 To: The Federal Trade Commission Re: Mobile Device Tracking From: Micah Altman, Director of Research, MIT Libraries; Non-Resident Senior Fellow, Brookings Institution I appreciate the opportunity to contribute to the FTC’s considerations of Mobile Device Tracking. These comments address selected privacy risks and mitigation methods. Our perspective is informed by substantial advances in privacy science that have been made in the computer science literature and by recent research conducted by the members of the Privacy Tools for Sharing Research Data project at Harvard University.1 Scope of information The speakers focused primarily on businesses use of mobile devices to track consumers’ movements through retail stores and nearby environments. However, as noted in the comments made by the Center for Digital Democracy [CDD 2014] and in the workshop discussion (as documented in the transcript), the general scope of mobile information tracking businesses and third parties extends far beyond this scenario. Based on the current ability for third parties to collect location information from mobile phones alone, third parties have the potential to collect extensive, fine grained, continuous and identifiable records of a persons location and movement history, accompanied with a partial record of other devices (potentially linked to people) encountered over that history. Information sensitivity Generally, information policy should treat information as sensitive when that information, if linked to a person, even partially or probabilistically, is likely to cause substantial harm. There is a broad range of informational harms that are recognized by regulation and by researchers and                                                                                                                 1 The Privacy Tools for Sharing Research Data project is a National Science Foundation funded collaboration at Harvard University involving the Center for Research on Computation and Society, the Institute for Quantitative Social Science, the Berkman Center for Internet & Society, and the Data Privacy Lab. More information about the project can be found at http://privacytools.seas.harvard.edu/. 1 1 The author takes full responsibility for these comments. However, the author wishes to thank the members of the project for their comments and insights and acknowledge that these comments build upon joint work conducted with all member of this project and upon previous analysis developed with David O’Brien and Alexandra Wood (http://informatics.mit.edu/blog/how-provide-public-transparency- individual-privacy-%E2%80%94-comments-osha).
  • 2. 2 practitioners in the behavioral, medical, and social science fields. [Bankurt & Ander 2006; Lee 1993] Types of potential harms associated with information include loss of insurability, loss of employability, criminal liability, psychological harm, social harm to a vulnerable group (e.g. stereotyping), loss of reputation, emotional harm, and dignitary harm. Knowledge of an individual’s location history and associations with others has the potential to be used in a wide variety of harmful ways. For example, businesses may use this data for discriminatory pricing ; employers could use location history to discriminate in hiring; insurers may red-line specific areas; and third parties could use this information to target users for physical harm. [NAS 2006] Moreover, since all physical activity has a unique spatial and temporal context, location history provides a linchpin for integrating multiple sources of data that may describe an individual. Re-identification risks The workshop presenters explained that the MAC addresses associated with identifiers were routinely ‘hashed’ in an attempt to prevent the data from being identifiable. As discussed in the workshop, this is a weak protection mechanism. And more genrally, there are many examples of datasets that were believed to have been anonymized but were later re-identified. For instance, Latanya Sweeney recently demonstrated how news stories and public records can be used to identify patients in hospital records that have been anonymized by removing patient names and addresses. [Sweeney 2013] Using information such as name, age, residence, gender, hospital, incident date, and details about the incident from news stories, as well as date of birth and ZIP code from online public records, she was able to successfully identify a significant number of individual hospitalization records in state hospital data. As another example, Kobbi Nissim and Eran Tromer recovered records of over one thousand individuals in an anonymized survey by querying an internet access mechanism hosted by the Israel Central Bureau of Statistics web site and, furthermore, demonstrated that it is possible to link these records to individuals. [Ziv 2013] Furthermore, research shows that human mobility patterns are highly predictable [Gonzalez, et. al 2008] and that these patterns have unique signatures, making them highly identifiable [de Montjoye, et al 2013] -- even in the absence of associated identifiers or hashes. For example, in a recent study [de Montjoye, et. al 2013], over 95% of individuals could be identified using only four location points -- even where location was measured only every hour, and with relatively low precision. Moreover, locational traces are difficult or impossible to render non-identifiable using traditional masking methods. [NAS 2006] Masking through aggregation and perturbation of individual points is generally insufficient, short of rendering the data useless. [Zimmerman & Pavlik 2008; de Montjoye et al 2013] More sophisticated approaches have been developed that aggregate entire location traces rather than individual points [Fung 2010, ch 14] -- but these methods are
  • 3. 3 new, not in common practice, and may still leak sensitive information about individuals. A stronger new mathematical privacy guarantee known as differential privacy has been developed which can provide provable privacy. [Dwork 2011] Protecting geospatial using differential privacy is possible in practice [Mir, et al 2013] -- but this currently requires that private data be stored with a trusted party, and only queries on the data be made publicly available. No method currently exists that allows detailed location data to be and then safely published. Review, reporting, and information accountability Because of the inherent identifiability and sensitivity of the data, individuals would clearly benefit from a regulation that provided increased transparency and accountability for data collection and subsequent use. The current regulatory framework largely lacks mechanisms that would provide accountability for harm arising from misuse of disclosed data. Consent to data collection, while it should be required is not sufficient protection -- privacy policies are dauntingly complex for individuals to understand, and many summaries provided by data collectors are inaccurate. [Cranor 2012] Furthermore, data collectors will generally have be better informed of potential and actual data use, and in the face of ubiquitous data collection practices, consumers find it difficult to effectively withhold consent -- the playing field is uneven. Thus, transparency, restrictions on disclosure, and accountability for misuse are all essential to achieving an optimal balance of social benefit and individual privacy protection. [Weitzner, et al 2008] Accountability mechanisms should enable individuals to find out where data describing them has been distributed and used, set forth penalties for misuse, and provide harmed individuals with a right of action A Modern Approach to Sharing Location Information Addressing privacy risks requires a sophisticated approach, and the privacy protections currently used for location data not take advantage of advances in data privacy research or the nuances they provide in terms of dealing with different kinds of data and finely matching sensitivity to risk. Like treatment of other risks to subjects, treatment of privacy risks should be based on a scientifically informed analysis that includes the likelihood of such risks being realized, the extent and type of the harms that would result from realization of those risks, the efficacy of computational or statistical methods to mitigate risks and monitor access, and the availability of legal remedies to those harmed. [Vadhan, et al 2010] A modern approach to privacy protection recognizes the following three principles:
  • 4. 4 ● The risks of informational harm are generally not a simple function of the presence or absence of specific fields, attributes, or keywords in the released set of data. Instead, much of the potential for individual harm stems from what one can learn about individuals from the data release as a whole when linked with existing data. ● Redaction, pseudonymization and hashing, are often neither an adequate nor appropriate practice, and releasing less information is not always a better approach to privacy. As noted above, simple redaction of information that has been identified as sensitive is often not a guarantee of privacy protection. Moreover, in the case of location traces, even substantial aggregation of data often fails to provide adequate privacy protection. ● Thoughtful analysis with expert consultation is necessary in order to evaluate the sensitivity of the data collected and their associated re-identification risks and to design useful and safe release mechanisms. Naïve use of any data sharing model, including those we describe below, is unlikely to provide adequate protection. References de Montjoye, Yves-Alexandre, et al. "Unique in the Crowd: The privacy bounds of human mobility." Scientific reports 3 (2013). Elizabeth A. Bankert and Robert J. Andur, Institutional Review Board: Management and Function (Boston: Jones and Bartlett, 2006); Cranor, Lorrie Faith. "Necessary but not sufficient: Standardized mechanisms for privacy notice and choice." J. on Telecomm. & High Tech. L.10 (2012): 273. Cynthia Dwork, “A Firm Foundation for Private Data Analysis,” Communications of the ACM (2011): 1, 86-95 Fung, Benjamin CM, et al. Introduction to privacy-preserving data publishing: concepts and techniques. CRC Press, 2010. Gonzalez, Marta C., Cesar A. Hidalgo, and Albert-Laszlo Barabasi. "Understanding individual human mobility patterns." Nature 453.7196 (2008): 779-782. Krishnaram Kenthapadi, Nina Mishra, and Kobbi Nissim, “Denials Leak Information: Simulatable Auditing,” Journal of Computer and System Sciences 79.8 (2013): 1322-1340.
  • 5. 5 Raymond M. Lee, Doing Research on Sensitive Topics (London: SAGE, 1993). NAS 2006, Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data Latanya Sweeney, “Matching Known Patients to Health Records in Washington State Data” (July 2013), available at http://dataprivacylab.org/projects/wa/1089-1.pdf. Salil Vadhan, et al., Re: Advance Notice of Proposed Rulemaking: Human Subjects Research Protections (2010), available at http://dataprivacylab.org/projects/irb/Vadhan.pdf. Daniel J. Weitzner, et al., “Information Accountability,” Communications of the ACM 51.6 (2008): 82-87. Amitai Ziv, “Israel's ‘Anonymous’ Statistics Surveys Aren't So Anonymous,” Haaretz (Jan. 7, 2013), http://www.haaretz.com/news/national/israel-s-anonymous-statistics-surveys-aren-t-so- anonymous-1.492256. Zimmerman, D. L., Pavlik, C. (2008). Quantifying the effects of mask metadata disclosure and multiple releases on the confidentiality of geographically masked health data. Geographical Analysis 40.1, 52 (25).