SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Building Trust in a Tense
Information Society
MIT Startup Exchange – Cybersecurity Innovation
Daniel J. Weitzner
Director, Cybersecurity and Internet Policy Research
Initiative
Massachusetts Institute of Technology
28 May 2015
1
Tensions in our Information Society
reduce trust
1. Culture: Normalization of radical transparency
vs trust gap
2. User experience: Increased individual control of
personal data vs. opaque use
3. Political process: Major sector of
economy/society poorly understood
2
The Internet Trust Gap
3
Privacy built on trust, not fine print
No App Low Med. High
*
*
*
Participants based their decision on:
• Familiarity (i.e. trust) with the app.
• The type of app, in particular what
kinds of information the app already
has already access to.
Frequency of use had no effect;
No App Low Med. High
No App Low Med. High No App Low Med. High
No App Low Med. High
*
No App Low Med. High
Privacy Tipping Points in
Smartphones Privacy
Preferences
F Shih, I Liccardi, D Weitzner –
Proceedings ACM CHI, 2015
Normalization of Radical Transparency
Assange
Wall Street
Journal
‘What they
Know”
Manning
Snowden
• Snowden is neither the
first nor the last
• The dramatic response
of Silicon Valley
• Trust will require pro-
active transparency
51. Transparency without trust
Trust Challenge
Judge Reggie B. Walton, Chief Judge,
Foreign Intelligence Surveillance Court
“the court lacks the tools to
independently verify how
often the government’s
surveillance breaks the
court’s rules that aim to
protect Americans’ privacy”
• Washington Post, August 15,
2013
61. Transparency without trust
Growing Individual Control
7
• Personal health data tied to
individual
• How will this shape privacy
expectations?
2. Control vs opacity
Opaque decision making with ‘big data’
8
New Privacy Priorities: Prevent
Discrimination and Sustain Trust
Discrimination: “The
increasing use of
algorithms to make
eligibility decisions must
be carefully monitored for
potential discriminatory
outcomes for
disadvantaged groups,
even absent
discriminatory intent.“
10
Importance of Accountable Systems
“Although the state of the art is
still somewhat ad hoc, and
auditing is often not automated,
so‐called accountable systems
are beginning to be deployed.
The ability to detect violations of
privacy policies, particularly if the
auditing is automated and
continuous, can be used both to
deter privacy violations and to
ensure that violators are
punished. (pp. 42-43)
11
A Goal by Analogy: Financial Accounting
12
.
.
.
.
.
General Ledger
Transactions
Assets
…
…
Liabilities
…
…
Net Assets
Owners Equity
Financial
Balance Sheet
Accounting rules
Public
Trust
Personal Information Accountability
13
.
.
.
.
.
Personal Information
Transactions
Compliance
• FCRA #
• DAA #
• FISA #
• ECPA #
Non-compliance
• FCRA #
• DAA #
• FISA #
• ECPA #
Total Transactions
Net Accountability
Personal Information
Balance Sheet
Accountable
Systems Reasoning
Public
Trust
Detailed Explanation
“[Recipient,] Fred Agenti, is a member of a
Criminal Justice Agency…”
“Inquiry is about Robert B. Guy and is based on a
personally identifying characteristic…”
14Accountable Systems
REAL-TIME USAGE CONTROL
Confidential
Real-time usage control
Personal Information Balance Sheet
Stop Online Piracy Act: Grass Roots View
17
Stop Online Piracy Act: Engineer’s View
• “If enacted, either of these bills will create an environment
of tremendous fear and uncertainty for technological
innovation, and seriously harm the credibility of the United
States in its role as a steward of key Internet
infrastructure. Regardless of recent amendments to
SOPA, both bills will risk fragmenting the Internet's global
domain name system (DNS) and have other capricious
technical consequences. In exchange for this, such
legislation would engender censorship that will
simultaneously be circumvented by deliberate infringers
while hampering innocent parties' right and ability to
communicate and express themselves online.”
• https://www.eff.org/deeplinks/2011/12/internet-inventors-warn-
against-sopa-and-pipa
18
MIT Cybersecurity and Internet Policy
Research Initiative
19
Social Science
•Nazli Choucri, Political
Science
•Peter Diamond,
Economics
•Michael Fischer,
Anthropology and
Science , Tecnology &
Society
•Kenneth Oye, Political
Science
•Sherry Turkle, Sociology
and Science ,
Technology & Society
Engineering
• Hal Abelson, EECS
• Tim Berners-Lee, CSAIL
• David Clark, CSAIL
• Munther Dahleh, Institute On
Complex & Socio-Tech.
Systems
• Shafi Goldwasser, EECS
• Frans Kaashoek, EECS
• Nancy Leveson, Aeronautics &
Astronautics
• Silvio Micali, EECS
• Ron Rivest, EECS
• Daniela Rus, CSAIL
• Howie Shrobe, CSAIL
• Gerry Sussman, EECS
• Daniel Weitzner, CSAIL
Management
• Andrew Lo, Sloan
• Stu Madnick, Sloan

Weitere ähnliche Inhalte

Was ist angesagt?

Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentationSreejith Nair
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapanrmackinnon
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerceAbegail Roberts
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 

Was ist angesagt? (20)

Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Data Breach Visualization
Data Breach VisualizationData Breach Visualization
Data Breach Visualization
 
Investigating tips
Investigating tipsInvestigating tips
Investigating tips
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Insider threat
Insider threatInsider threat
Insider threat
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 

Ähnlich wie Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group.

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15E Andrew Keeney
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdframsetl
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 

Ähnlich wie Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group. (20)

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 

Mehr von MIT Startup Exchange

STEX Workshop: Batteries and Beyond
STEX Workshop: Batteries and BeyondSTEX Workshop: Batteries and Beyond
STEX Workshop: Batteries and BeyondMIT Startup Exchange
 
Digital Healthcare Innovation Workshop 9.22.15
Digital Healthcare Innovation Workshop 9.22.15Digital Healthcare Innovation Workshop 9.22.15
Digital Healthcare Innovation Workshop 9.22.15MIT Startup Exchange
 
Nanotech and New Materials Workshop 10.29.15
Nanotech and New Materials Workshop 10.29.15Nanotech and New Materials Workshop 10.29.15
Nanotech and New Materials Workshop 10.29.15MIT Startup Exchange
 
Krystyn J. Van Vliet Advanced Manufacturing
Krystyn J. Van Vliet Advanced Manufacturing Krystyn J. Van Vliet Advanced Manufacturing
Krystyn J. Van Vliet Advanced Manufacturing MIT Startup Exchange
 
Brian Anthony MIT STEX Automation Workshop June 17, 2015
Brian Anthony MIT STEX Automation Workshop June 17, 2015Brian Anthony MIT STEX Automation Workshop June 17, 2015
Brian Anthony MIT STEX Automation Workshop June 17, 2015MIT Startup Exchange
 
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspectiveScott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspectiveMIT Startup Exchange
 
Liz Reynolds STEX Automation 6-17-15
Liz Reynolds STEX Automation 6-17-15Liz Reynolds STEX Automation 6-17-15
Liz Reynolds STEX Automation 6-17-15MIT Startup Exchange
 
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. MIT Startup Exchange
 
MIT's Cybersecurity startups by Trond A. Undheim
MIT's Cybersecurity startups by Trond A. UndheimMIT's Cybersecurity startups by Trond A. Undheim
MIT's Cybersecurity startups by Trond A. UndheimMIT Startup Exchange
 
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...MIT Startup Exchange
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT Startup Exchange
 
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,..."MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...MIT Startup Exchange
 
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo.
"The Future of Food,"  Manoj Fenelon, Director of Foresight, PepsiCo. "The Future of Food,"  Manoj Fenelon, Director of Foresight, PepsiCo.
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo. MIT Startup Exchange
 
Food, Sensors, Startups - The Road Ahead From a MIT perspective
Food, Sensors, Startups - The Road Ahead From a MIT perspectiveFood, Sensors, Startups - The Road Ahead From a MIT perspective
Food, Sensors, Startups - The Road Ahead From a MIT perspectiveMIT Startup Exchange
 
Future opportunities for food tech product innovation from a research perspec...
Future opportunities for food tech product innovation from a research perspec...Future opportunities for food tech product innovation from a research perspec...
Future opportunities for food tech product innovation from a research perspec...MIT Startup Exchange
 
Twitter feed - Food Tech Innovation Workshop and Panel Discussion
Twitter feed  - Food Tech Innovation Workshop and Panel DiscussionTwitter feed  - Food Tech Innovation Workshop and Panel Discussion
Twitter feed - Food Tech Innovation Workshop and Panel DiscussionMIT Startup Exchange
 

Mehr von MIT Startup Exchange (20)

STEX Workshop: Batteries and Beyond
STEX Workshop: Batteries and BeyondSTEX Workshop: Batteries and Beyond
STEX Workshop: Batteries and Beyond
 
Digital Healthcare Innovation Workshop 9.22.15
Digital Healthcare Innovation Workshop 9.22.15Digital Healthcare Innovation Workshop 9.22.15
Digital Healthcare Innovation Workshop 9.22.15
 
Nanotech and New Materials Workshop 10.29.15
Nanotech and New Materials Workshop 10.29.15Nanotech and New Materials Workshop 10.29.15
Nanotech and New Materials Workshop 10.29.15
 
2015 2016 stex workshop schedule
2015 2016 stex workshop schedule2015 2016 stex workshop schedule
2015 2016 stex workshop schedule
 
SHORTLIST
SHORTLISTSHORTLIST
SHORTLIST
 
Krystyn J. Van Vliet Advanced Manufacturing
Krystyn J. Van Vliet Advanced Manufacturing Krystyn J. Van Vliet Advanced Manufacturing
Krystyn J. Van Vliet Advanced Manufacturing
 
Brian Anthony MIT STEX Automation Workshop June 17, 2015
Brian Anthony MIT STEX Automation Workshop June 17, 2015Brian Anthony MIT STEX Automation Workshop June 17, 2015
Brian Anthony MIT STEX Automation Workshop June 17, 2015
 
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspectiveScott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
 
Liz Reynolds STEX Automation 6-17-15
Liz Reynolds STEX Automation 6-17-15Liz Reynolds STEX Automation 6-17-15
Liz Reynolds STEX Automation 6-17-15
 
Stex intro automation_2015
Stex intro automation_2015Stex intro automation_2015
Stex intro automation_2015
 
Automation agenda
Automation agendaAutomation agenda
Automation agenda
 
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
 
MIT's Cybersecurity startups by Trond A. Undheim
MIT's Cybersecurity startups by Trond A. UndheimMIT's Cybersecurity startups by Trond A. Undheim
MIT's Cybersecurity startups by Trond A. Undheim
 
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,..."MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
 
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo.
"The Future of Food,"  Manoj Fenelon, Director of Foresight, PepsiCo. "The Future of Food,"  Manoj Fenelon, Director of Foresight, PepsiCo.
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo.
 
Food, Sensors, Startups - The Road Ahead From a MIT perspective
Food, Sensors, Startups - The Road Ahead From a MIT perspectiveFood, Sensors, Startups - The Road Ahead From a MIT perspective
Food, Sensors, Startups - The Road Ahead From a MIT perspective
 
Future opportunities for food tech product innovation from a research perspec...
Future opportunities for food tech product innovation from a research perspec...Future opportunities for food tech product innovation from a research perspec...
Future opportunities for food tech product innovation from a research perspec...
 
Twitter feed - Food Tech Innovation Workshop and Panel Discussion
Twitter feed  - Food Tech Innovation Workshop and Panel DiscussionTwitter feed  - Food Tech Innovation Workshop and Panel Discussion
Twitter feed - Food Tech Innovation Workshop and Panel Discussion
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group.

  • 1. Building Trust in a Tense Information Society MIT Startup Exchange – Cybersecurity Innovation Daniel J. Weitzner Director, Cybersecurity and Internet Policy Research Initiative Massachusetts Institute of Technology 28 May 2015 1
  • 2. Tensions in our Information Society reduce trust 1. Culture: Normalization of radical transparency vs trust gap 2. User experience: Increased individual control of personal data vs. opaque use 3. Political process: Major sector of economy/society poorly understood 2
  • 4. Privacy built on trust, not fine print No App Low Med. High * * * Participants based their decision on: • Familiarity (i.e. trust) with the app. • The type of app, in particular what kinds of information the app already has already access to. Frequency of use had no effect; No App Low Med. High No App Low Med. High No App Low Med. High No App Low Med. High * No App Low Med. High Privacy Tipping Points in Smartphones Privacy Preferences F Shih, I Liccardi, D Weitzner – Proceedings ACM CHI, 2015
  • 5. Normalization of Radical Transparency Assange Wall Street Journal ‘What they Know” Manning Snowden • Snowden is neither the first nor the last • The dramatic response of Silicon Valley • Trust will require pro- active transparency 51. Transparency without trust
  • 6. Trust Challenge Judge Reggie B. Walton, Chief Judge, Foreign Intelligence Surveillance Court “the court lacks the tools to independently verify how often the government’s surveillance breaks the court’s rules that aim to protect Americans’ privacy” • Washington Post, August 15, 2013 61. Transparency without trust
  • 7. Growing Individual Control 7 • Personal health data tied to individual • How will this shape privacy expectations? 2. Control vs opacity
  • 8. Opaque decision making with ‘big data’ 8
  • 9.
  • 10. New Privacy Priorities: Prevent Discrimination and Sustain Trust Discrimination: “The increasing use of algorithms to make eligibility decisions must be carefully monitored for potential discriminatory outcomes for disadvantaged groups, even absent discriminatory intent.“ 10
  • 11. Importance of Accountable Systems “Although the state of the art is still somewhat ad hoc, and auditing is often not automated, so‐called accountable systems are beginning to be deployed. The ability to detect violations of privacy policies, particularly if the auditing is automated and continuous, can be used both to deter privacy violations and to ensure that violators are punished. (pp. 42-43) 11
  • 12. A Goal by Analogy: Financial Accounting 12 . . . . . General Ledger Transactions Assets … … Liabilities … … Net Assets Owners Equity Financial Balance Sheet Accounting rules Public Trust
  • 13. Personal Information Accountability 13 . . . . . Personal Information Transactions Compliance • FCRA # • DAA # • FISA # • ECPA # Non-compliance • FCRA # • DAA # • FISA # • ECPA # Total Transactions Net Accountability Personal Information Balance Sheet Accountable Systems Reasoning Public Trust
  • 14. Detailed Explanation “[Recipient,] Fred Agenti, is a member of a Criminal Justice Agency…” “Inquiry is about Robert B. Guy and is based on a personally identifying characteristic…” 14Accountable Systems
  • 17. Stop Online Piracy Act: Grass Roots View 17
  • 18. Stop Online Piracy Act: Engineer’s View • “If enacted, either of these bills will create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. Regardless of recent amendments to SOPA, both bills will risk fragmenting the Internet's global domain name system (DNS) and have other capricious technical consequences. In exchange for this, such legislation would engender censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties' right and ability to communicate and express themselves online.” • https://www.eff.org/deeplinks/2011/12/internet-inventors-warn- against-sopa-and-pipa 18
  • 19. MIT Cybersecurity and Internet Policy Research Initiative 19 Social Science •Nazli Choucri, Political Science •Peter Diamond, Economics •Michael Fischer, Anthropology and Science , Tecnology & Society •Kenneth Oye, Political Science •Sherry Turkle, Sociology and Science , Technology & Society Engineering • Hal Abelson, EECS • Tim Berners-Lee, CSAIL • David Clark, CSAIL • Munther Dahleh, Institute On Complex & Socio-Tech. Systems • Shafi Goldwasser, EECS • Frans Kaashoek, EECS • Nancy Leveson, Aeronautics & Astronautics • Silvio Micali, EECS • Ron Rivest, EECS • Daniela Rus, CSAIL • Howie Shrobe, CSAIL • Gerry Sussman, EECS • Daniel Weitzner, CSAIL Management • Andrew Lo, Sloan • Stu Madnick, Sloan

Hinweis der Redaktion

  1. How does trust gap effect commerce?
  2. Discuss tensions in our information society and how it shapes our research agenda
  3. Why does trust matter?
  4. Month long intensive study of smart phone users: How does context change amount of information shared? Major factor - Trusted app/collector: More info shared Use beneficial to individual: more shared But, More detail about purpose: less sharing Therefore – building broad trust in operation of systems is necessary
  5. Second tension – users experience and come to expect more control, ie personal health apps
  6. But large scale analytics tend to undermine trust because of their opacity Consider traditional credit scoring and new alternative ML-driven scoring from companies like Zest
  7. WH Big Data Privacy recognized risk of discrimination and need to build trust
  8. Accountable systems as a trust-building mechanism
  9. This is our ultimate goal: Predictable and reliable application of public rules to privacy data (red) producing a summary representation of any given financial entity (green) This is the basis for trillions of economic activity around the world – we should be aspire to this.
  10. Trust requires understanding of how systems function – just like accountable systems Fear that SOPA would ‘break the Internet’
  11. Very distinguished group of engineers express concern about destabilizing the DNS – but no data no abstract model of the DNS infrastructure from which to predict impact of law Opinion based on intuition – may well have been right, but it felt awkward.