SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Downloaden Sie, um offline zu lesen
NEW CHALLENGES TO PRIVACY DUE
TO EMERGING TECHNOLOGIES AND
DIFFERENT PRIVACY PERCEPTION OF
YOUNGER GENERATIONS:

THE EU PRACTIS PROJECT
-

NIV_A@MLA/AC/IL
.1
.2

PRACTIS
-

.3

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
–

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
-

-

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
–(Polis

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
!!!
--

YouTube -

Facebook

Talkbacks
Twitter
Whatsup
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
www.youtube.com/watch?v=UrBq5Ble1Oo

Immigrants vs.
Natives
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
P R I VAC Y – AP P R A I S I N G C H AL L E N G E S TO
TECHNOLOGIES AND ETHICS
PROJECT ACRONYM: PRACTIS

PA R T I C I PA N T S : T E L AV I V
U N I V E R S I T Y ( C O O R D I N AT O R ) ,
NEXUS- BERLIN,
N A M O U R U N I V E R S I T Y- B E L G I U M ,
L O D G E U N I V E R S I T Y- P O L A N D ,
T E M P E R E U N I V E R S I T Y- F I N L A N D
ICT

.1

.2
EU-

.3

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
Number of respondents:
1428 respondents•
385 Israel•
177 Finland•
247 Germany•
261 Belgium•
222 Austria•
136 Poland•
Gender of respondents: •
55,7% female•
44,3% male•

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
Students use SNS mostly to communicate and exchange
information with ‚real world„s friends

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
Scenarios show that convenience, discounts, and an increase in security are perceived
as such benefits in everyday life situations.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
1.2. ONLINE ACTIVITIES AS PART OF THE SPHERE OF
PRIVACY

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
1.4. STUDENTS ARE READY TO TRADE OFF PRIVACY
FOR BENEFITS

Scenarios show that convenience, discounts, and an increase in security are perceived
as such benefits in everyday life situations.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
2.2. ADULTS HAVE A DIFFERENT USE OF ONLINE
COMMUNICATION TOOLS
Adults are shorter times online than students.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
2.2. ADULTS HAVE A DIFFERENT USE OF ONLINE
COMMUNICATION TOOLS
Adults use mainly person-to-person type of communication tools: e-mail (students use
mainly SNS)

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
2.3. FEWER ADULTS ARE WILLING TO USE EMERGING
TECHNOLOGIES

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
2. GENERATIONAL DIFFERENCES
1. Adults have a higher awareness for privacy and data
protection

2. Adults have a different use of online communication
tools
3. Fewer adults are willing to use emerging technologies
4. Adults are more willing to trade off privacy for security

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENCES AMONG COUNTRIES:
DIFFERENCES IN PRIVACY AWARENESS
Austria and Germany are more reluctant to use Facebook applications when
personal data is submitted. Israel, Poland, and Finland more willing to use
such applications.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
3.2. DIFFERENCES IN INTERNET USE

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
3.2. DIFFERENCES IN INTERNET USE

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
3.2. DIFFERENCES IN INTERNET USE

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
CROSS COUNTRY ANALYSIS
1. Differences in privacy awareness can be observed:
 Countries with a higher awareness: Germany, Belgium,
Austria
 Countries with a lower awareness: Israel, Poland,
Finland
2. Differences in Internet Use
3. Differences in SNS Use

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES
1. Nanotechnology and New Materials:
Future ultra-sensitive nanosensors are
envisioned, with a dramatic impact on
surveillance and security – and on privacy. It
is expected that such devices will be able,
for example, to detect drugs from saliva
samples of people, or to detect where a
person has been by quickly sampling minute
environmental clues on clothes.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES (CONT’)
2. Medicine, Biology and Biometrics: Such technologies together
with micro sampling devices could be used in the not-distant future to
achieve easy and clandestine approach to personal biological samples
and production of whole genomic sequences data, without permission
of the targeted person. This could result in genetic data being
unwillingly made available to interested bodies such as insurance
companies, and used by them to the detriment of those people, or for
"genetic blackmailing".
With regards to Biometrics, the ubiquitous implementation of new and
emerging surveillance technologies aimed to improve the security, in
face of new threats to the democratic society, is already a fact of life in
many countries.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES (CONT’)
3. Robotics and cyborgs: Depending on their functions

and the variety of embedded sensors, the increasing
interaction of robots with humans poses privacy
concerns, in particular with regards to surveillance.
Moreover, social interaction with robots can have
"chilling effect": It can impact on our sense of being
alone and able to act freely. The mere presence of a
robot, especially a "humanoid" one, may create the
subjective feeling of being watched.
Example: "cyborg insects

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES (CONT’)
4. Cognition: In the not too distant future researchers will
probably achieve the ability to understand and describe the
biochemical and neuro-electrical processes associated with
human intentions, impulses, feelings, etc. and to transfer that
knowledge in terms of formally well-defined processes.
The recently developed "real-time functional MRI" (rtfMRI)
enables watching one‟s own brain activation „live‟, and
progress is made towards directly reading a person‟s
ongoing mental images. One possible application is highly
reliable lie detection, with potential impact on law
enforcement and security but also a dramatic potential for
misuse, e.g. by inappropriately screening employees or
insurance applicants

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES (CONT’)

5. Information and Communication
Technologies: The "digital universe" is growing at
an enormous pace. A significant part of it includes
personal information (“digital shadow”) created by
people or organizations (in everyday activities, and
in many cases unintentionally). The digital trails
that each of us leaves are getting richer as ICTrelated technologies make deeper inroads into our
life
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES (CONT’)
A particularly notable aspect of ICTs is that of Ambient
Intelligence (AmI). AmI, and the closely related concept
of the "Internet of Things" (IoT) pertain to an idea of
ubiquitous "invisible" computers and sensors embedded
everywhere, and a multitude interconnected objects. AmI
system would be able to react appropriately to changes
in its environment, particularly to human behaviours.
As far as privacy is concerned, one key point of AmI
lies in the link between physiological data (gathered
through sensors) and emotional assessments that
automatically take place thanks to complex
algorithms.
Add to all that the “Big Data” capabilities.
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
PRINCIPLES FOR KEEPING REASONABLE PRIVACY
The right to close the door
Consent is a critical key of privacy protection
Transparency

Proportionality (in balance with other societal needs)
Privacy by design
Data Subject's Control
Reveal purpose of data acquisition
Meeting Points

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
PRIVACY CHALLENGES - DEFINITION

The situation in which an
emerging & future technology
is likely to have a negative
implication on privacy;
and
where this negative implication is
likely to be perceived as such in
the future
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
PRIVACY CHALLENGES
Loss of Control
Privacy Divides
Distributed Agencies

Privacy Paradox
Notoriously difficult to define privacy
Privacy vs. efficiency; trade-offs (control, distributed
agency, paradox), national security, law enforcement

Globalization
EU harmonization
Enforcement

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
MAJOR RECOMMENDATIONS
Basket of Solutions
Data Subject's Control
Privacy by Design (PbD)
Encourage the development and exploitation of Privacy Enhancing
Technologies (PETs)
Education program towards "safe use of the Internet“
Define the roles and broaden the scope of the duties of Data Protection
Agencies

Consent
Define by law and regulations the right to close the door and to be
forgotten
Legislation targeting individuals the breach privacy
Meeting Points

Define by law and regulations the requirements for transparency and
proportionality
Data categorization
Labelling
Initiation of a 'grey ecology'

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
MAJOR RECOMMENDATIONS (CONT’)
Reduce privacy divides:
Identify the many causes of privacy divides. Based on the
findings, possible policy responses include:
Raising awareness of privacy issues, so to address
divides that are the result of ignorance.
Providing assistance to those in the need, such as people
with disabilities, the elder, and children.
Simplifying enforcement means so that they are more
accessible to more people; adding legal avenues for
enforcement on behalf of those who do not access the
judicial system.
Regulating data controllers' behaviour, by requiring them
to use simple, easy to understand, ways of conveying
information about their data practices.
Mandatory PETs; regulation of prices of technologies.
The regulation could also require that whenever a
traceless technology alternativePexists, Eit C E P T I O Nbe offered
must O F Y O U N G E R
DIFFERENT
RIVACY P R
GENERATIONS
at the same price as the tracing technology.
–
Niv Ahituv, “The Open Information Society”,
Communications of the ACM, Vol.44, No. 6 (June 2001),
pp 48-52.
www.practis.org

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS

Weitere ähnliche Inhalte

Was ist angesagt?

Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Simon Fraser University
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingDr. Michael Agbaje
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
 
Question chapter 1
Question chapter 1Question chapter 1
Question chapter 1Aten Kecik
 
digital citizenship
digital citizenshipdigital citizenship
digital citizenshiptooraw
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Mattercaitystew
 
Mind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceMind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceStewart Kowalski
 
Intimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourIntimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourKarlos Svoboda
 
Neural devices will change humankind
Neural devices will change humankindNeural devices will change humankind
Neural devices will change humankindKarlos Svoboda
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paperAkshay Sinha
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
Internet Science
Internet ScienceInternet Science
Internet Sciencei_scienceEU
 

Was ist angesagt? (19)

Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart Devices
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital Watermarking
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Question chapter 1
Question chapter 1Question chapter 1
Question chapter 1
 
Djemelle t (1)
Djemelle t (1)Djemelle t (1)
Djemelle t (1)
 
digital citizenship
digital citizenshipdigital citizenship
digital citizenship
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Matter
 
Mind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceMind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber Space
 
Intimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourIntimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviour
 
Neural devices will change humankind
Neural devices will change humankindNeural devices will change humankind
Neural devices will change humankind
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 
Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Internet Science
Internet ScienceInternet Science
Internet Science
 

Andere mochten auch

Nanophotonics Science Camp (29 08-13)
Nanophotonics Science Camp (29 08-13)Nanophotonics Science Camp (29 08-13)
Nanophotonics Science Camp (29 08-13)durnik
 
Lecturer at Erasmus Mundu Spring School (2013)
Lecturer at Erasmus Mundu Spring School (2013)Lecturer at Erasmus Mundu Spring School (2013)
Lecturer at Erasmus Mundu Spring School (2013)durnik
 
Meta13 (19 03-13)
Meta13  (19 03-13)Meta13  (19 03-13)
Meta13 (19 03-13)durnik
 
ICreaNet workshop
ICreaNet workshopICreaNet workshop
ICreaNet workshopgkurtz
 
Stop Rewarding Loyalty
Stop Rewarding LoyaltyStop Rewarding Loyalty
Stop Rewarding LoyaltyWill Lytle
 
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...Alfred Griffioen
 
Virtual conference 2.0
Virtual conference 2.0Virtual conference 2.0
Virtual conference 2.0gkurtz
 
Kempston solicitors
Kempston solicitorsKempston solicitors
Kempston solicitorsAnne Cole
 
Task 7 questionnaire analysis
Task 7 questionnaire analysisTask 7 questionnaire analysis
Task 7 questionnaire analysisandrew_boardy
 
Raspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreRaspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreBenjamin Moore
 
uriPresentation iain goodyear sound design
uriPresentation iain goodyear sound designuriPresentation iain goodyear sound design
uriPresentation iain goodyear sound designcrisgalliano
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentationburak27000
 
Company presentation short
Company presentation shortCompany presentation short
Company presentation shortlotharsindel
 
Roiloannhancach
RoiloannhancachRoiloannhancach
RoiloannhancachNgoc Quang
 

Andere mochten auch (19)

Nanophotonics Science Camp (29 08-13)
Nanophotonics Science Camp (29 08-13)Nanophotonics Science Camp (29 08-13)
Nanophotonics Science Camp (29 08-13)
 
Lecturer at Erasmus Mundu Spring School (2013)
Lecturer at Erasmus Mundu Spring School (2013)Lecturer at Erasmus Mundu Spring School (2013)
Lecturer at Erasmus Mundu Spring School (2013)
 
Meta13 (19 03-13)
Meta13  (19 03-13)Meta13  (19 03-13)
Meta13 (19 03-13)
 
ICreaNet workshop
ICreaNet workshopICreaNet workshop
ICreaNet workshop
 
Stop Rewarding Loyalty
Stop Rewarding LoyaltyStop Rewarding Loyalty
Stop Rewarding Loyalty
 
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...
 
Virtual conference 2.0
Virtual conference 2.0Virtual conference 2.0
Virtual conference 2.0
 
Kempston solicitors
Kempston solicitorsKempston solicitors
Kempston solicitors
 
Task 7 questionnaire analysis
Task 7 questionnaire analysisTask 7 questionnaire analysis
Task 7 questionnaire analysis
 
Raspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreRaspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMoore
 
uriPresentation iain goodyear sound design
uriPresentation iain goodyear sound designuriPresentation iain goodyear sound design
uriPresentation iain goodyear sound design
 
Unidad13
Unidad13Unidad13
Unidad13
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
мк
мкмк
мк
 
Company presentation short
Company presentation shortCompany presentation short
Company presentation short
 
Unidad2
Unidad2Unidad2
Unidad2
 
Urdu 29
Urdu 29Urdu 29
Urdu 29
 
Unidad10
Unidad10Unidad10
Unidad10
 
Roiloannhancach
RoiloannhancachRoiloannhancach
Roiloannhancach
 

Ähnlich wie מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך

Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldTed Myerson
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionIRJET Journal
 
Outline D
Outline DOutline D
Outline Dbutest
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 
CLICKNL DRIVE 2018 | 24 OCT | WE ARE DATA PART 1
CLICKNL DRIVE 2018 | 24 OCT | WE ARE DATA PART 1CLICKNL DRIVE 2018 | 24 OCT | WE ARE DATA PART 1
CLICKNL DRIVE 2018 | 24 OCT | WE ARE DATA PART 1CLICKNL
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Tech and Law Center
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxoreo10
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5mataharitimoer MT
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...
GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...
GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...ijcisjournal
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Harsh Tripathi
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxmohitsrivastavabtech
 

Ähnlich wie מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך (19)

Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
 
Outline D
Outline DOutline D
Outline D
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
204
204204
204
 
CLICKNL DRIVE 2018 | 24 OCT | WE ARE DATA PART 1
CLICKNL DRIVE 2018 | 24 OCT | WE ARE DATA PART 1CLICKNL DRIVE 2018 | 24 OCT | WE ARE DATA PART 1
CLICKNL DRIVE 2018 | 24 OCT | WE ARE DATA PART 1
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
 
9th
9th9th
9th
 
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docxTHE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
THE INTERNET OF THINGS PRIVACY AND SECURITYA Master ThesisSub.docx
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...
GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...
GIVING UP PRIVACY FOR SECURITY: A SURVEY ON PRIVACY TRADE-OFF DURING PANDEMIC...
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01
 
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptxEthics in Cyber Crime_will be helpful for ethics presentation.pptx
Ethics in Cyber Crime_will be helpful for ethics presentation.pptx
 

Kürzlich hochgeladen

Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxryandux83rd
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...HetalPathak10
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxAvaniJani1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 

Kürzlich hochgeladen (20)

Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptx
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 

מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך

  • 1. NEW CHALLENGES TO PRIVACY DUE TO EMERGING TECHNOLOGIES AND DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS: THE EU PRACTIS PROJECT - NIV_A@MLA/AC/IL
  • 3. – DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 4. - - DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 5. –(Polis DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 6. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 9.
  • 10. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 11. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 12. P R I VAC Y – AP P R A I S I N G C H AL L E N G E S TO TECHNOLOGIES AND ETHICS PROJECT ACRONYM: PRACTIS PA R T I C I PA N T S : T E L AV I V U N I V E R S I T Y ( C O O R D I N AT O R ) , NEXUS- BERLIN, N A M O U R U N I V E R S I T Y- B E L G I U M , L O D G E U N I V E R S I T Y- P O L A N D , T E M P E R E U N I V E R S I T Y- F I N L A N D
  • 14. Number of respondents: 1428 respondents• 385 Israel• 177 Finland• 247 Germany• 261 Belgium• 222 Austria• 136 Poland• Gender of respondents: • 55,7% female• 44,3% male• DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 15. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 16. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 17. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 18. Students use SNS mostly to communicate and exchange information with ‚real world„s friends DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 19. Scenarios show that convenience, discounts, and an increase in security are perceived as such benefits in everyday life situations. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 20. 1.2. ONLINE ACTIVITIES AS PART OF THE SPHERE OF PRIVACY DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 21. 1.4. STUDENTS ARE READY TO TRADE OFF PRIVACY FOR BENEFITS Scenarios show that convenience, discounts, and an increase in security are perceived as such benefits in everyday life situations. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 22. 2.2. ADULTS HAVE A DIFFERENT USE OF ONLINE COMMUNICATION TOOLS Adults are shorter times online than students. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 23. 2.2. ADULTS HAVE A DIFFERENT USE OF ONLINE COMMUNICATION TOOLS Adults use mainly person-to-person type of communication tools: e-mail (students use mainly SNS) DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 24. 2.3. FEWER ADULTS ARE WILLING TO USE EMERGING TECHNOLOGIES DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 25. 2. GENERATIONAL DIFFERENCES 1. Adults have a higher awareness for privacy and data protection 2. Adults have a different use of online communication tools 3. Fewer adults are willing to use emerging technologies 4. Adults are more willing to trade off privacy for security DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 26. DIFFERENCES AMONG COUNTRIES: DIFFERENCES IN PRIVACY AWARENESS Austria and Germany are more reluctant to use Facebook applications when personal data is submitted. Israel, Poland, and Finland more willing to use such applications. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 27. 3.2. DIFFERENCES IN INTERNET USE DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 28. 3.2. DIFFERENCES IN INTERNET USE DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 29. 3.2. DIFFERENCES IN INTERNET USE DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 30. CROSS COUNTRY ANALYSIS 1. Differences in privacy awareness can be observed:  Countries with a higher awareness: Germany, Belgium, Austria  Countries with a lower awareness: Israel, Poland, Finland 2. Differences in Internet Use 3. Differences in SNS Use DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 31. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 32. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 33. THREATENING TECHNOLOGIES 1. Nanotechnology and New Materials: Future ultra-sensitive nanosensors are envisioned, with a dramatic impact on surveillance and security – and on privacy. It is expected that such devices will be able, for example, to detect drugs from saliva samples of people, or to detect where a person has been by quickly sampling minute environmental clues on clothes. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 34. THREATENING TECHNOLOGIES (CONT’) 2. Medicine, Biology and Biometrics: Such technologies together with micro sampling devices could be used in the not-distant future to achieve easy and clandestine approach to personal biological samples and production of whole genomic sequences data, without permission of the targeted person. This could result in genetic data being unwillingly made available to interested bodies such as insurance companies, and used by them to the detriment of those people, or for "genetic blackmailing". With regards to Biometrics, the ubiquitous implementation of new and emerging surveillance technologies aimed to improve the security, in face of new threats to the democratic society, is already a fact of life in many countries. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 35. THREATENING TECHNOLOGIES (CONT’) 3. Robotics and cyborgs: Depending on their functions and the variety of embedded sensors, the increasing interaction of robots with humans poses privacy concerns, in particular with regards to surveillance. Moreover, social interaction with robots can have "chilling effect": It can impact on our sense of being alone and able to act freely. The mere presence of a robot, especially a "humanoid" one, may create the subjective feeling of being watched. Example: "cyborg insects DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 36. THREATENING TECHNOLOGIES (CONT’) 4. Cognition: In the not too distant future researchers will probably achieve the ability to understand and describe the biochemical and neuro-electrical processes associated with human intentions, impulses, feelings, etc. and to transfer that knowledge in terms of formally well-defined processes. The recently developed "real-time functional MRI" (rtfMRI) enables watching one‟s own brain activation „live‟, and progress is made towards directly reading a person‟s ongoing mental images. One possible application is highly reliable lie detection, with potential impact on law enforcement and security but also a dramatic potential for misuse, e.g. by inappropriately screening employees or insurance applicants DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 37. THREATENING TECHNOLOGIES (CONT’) 5. Information and Communication Technologies: The "digital universe" is growing at an enormous pace. A significant part of it includes personal information (“digital shadow”) created by people or organizations (in everyday activities, and in many cases unintentionally). The digital trails that each of us leaves are getting richer as ICTrelated technologies make deeper inroads into our life DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 38. THREATENING TECHNOLOGIES (CONT’) A particularly notable aspect of ICTs is that of Ambient Intelligence (AmI). AmI, and the closely related concept of the "Internet of Things" (IoT) pertain to an idea of ubiquitous "invisible" computers and sensors embedded everywhere, and a multitude interconnected objects. AmI system would be able to react appropriately to changes in its environment, particularly to human behaviours. As far as privacy is concerned, one key point of AmI lies in the link between physiological data (gathered through sensors) and emotional assessments that automatically take place thanks to complex algorithms. Add to all that the “Big Data” capabilities. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 39. PRINCIPLES FOR KEEPING REASONABLE PRIVACY The right to close the door Consent is a critical key of privacy protection Transparency Proportionality (in balance with other societal needs) Privacy by design Data Subject's Control Reveal purpose of data acquisition Meeting Points DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 40. PRIVACY CHALLENGES - DEFINITION The situation in which an emerging & future technology is likely to have a negative implication on privacy; and where this negative implication is likely to be perceived as such in the future DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 41. PRIVACY CHALLENGES Loss of Control Privacy Divides Distributed Agencies Privacy Paradox Notoriously difficult to define privacy Privacy vs. efficiency; trade-offs (control, distributed agency, paradox), national security, law enforcement Globalization EU harmonization Enforcement DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 42. MAJOR RECOMMENDATIONS Basket of Solutions Data Subject's Control Privacy by Design (PbD) Encourage the development and exploitation of Privacy Enhancing Technologies (PETs) Education program towards "safe use of the Internet“ Define the roles and broaden the scope of the duties of Data Protection Agencies Consent Define by law and regulations the right to close the door and to be forgotten Legislation targeting individuals the breach privacy Meeting Points Define by law and regulations the requirements for transparency and proportionality Data categorization Labelling Initiation of a 'grey ecology' DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 43. MAJOR RECOMMENDATIONS (CONT’) Reduce privacy divides: Identify the many causes of privacy divides. Based on the findings, possible policy responses include: Raising awareness of privacy issues, so to address divides that are the result of ignorance. Providing assistance to those in the need, such as people with disabilities, the elder, and children. Simplifying enforcement means so that they are more accessible to more people; adding legal avenues for enforcement on behalf of those who do not access the judicial system. Regulating data controllers' behaviour, by requiring them to use simple, easy to understand, ways of conveying information about their data practices. Mandatory PETs; regulation of prices of technologies. The regulation could also require that whenever a traceless technology alternativePexists, Eit C E P T I O Nbe offered must O F Y O U N G E R DIFFERENT RIVACY P R GENERATIONS at the same price as the tracing technology.
  • 44. – Niv Ahituv, “The Open Information Society”, Communications of the ACM, Vol.44, No. 6 (June 2001), pp 48-52. www.practis.org DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS