SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Digital Health Futures:
Empowerment or coercion
Or,
The Myth of Selective Sharing
Marc Smith
XBOX ONE, TELESCREEN ZERO
Better than Orwell
The telescreen received and transmitted simultaneously. Any
sound that Winston made, above the level of a very low
whisper, would be picked up by it, moreover, so long as he
remained within the field of vision which the metal plaque
commanded, he could be seen as well as heard. There was of
course no way of knowing whether you were being watched
at any given moment. How often, or on what system, the
Thought Police plugged in on any individual wire was
guesswork. It was even conceivable that they watched
everybody all the time. But at any rate they could plug in your
wire whenever they wanted to. You had to live—did live, from
habit that became instinct—in the assumption that every
sound you made was overheard, and, except in darkness,
every movement scrutinized.
http://video.wired.com/watch/new-xbox-kinect-exclusive-wired-video-398878
‘Smith!’ screamed the shrewish voice from the
telescreen.
‘6079 Smith W.! Yes, YOU! Bend lower, please!
You can do better than that. You’re not trying.
Lower, please! THAT’S better, comrade. Now
stand at ease, the whole squad, and watch me.
http://video.wired.com/watch/new-xbox-kinect-exclusive-wired-video-398878
To keep your face expressionless was not
difficult, and even your breathing could be
controlled, with an effort: but you could not
control the beating of your heart, and the
telescreen was quite delicate enough to pick it
up.
http://video.wired.com/watch/new-xbox-kinect-exclusive-wired-video-398878
It was terribly dangerous to let your thoughts
wander when you were in any public place or
within range of a telescreen. The smallest thing
could give you away. A nervous tic, an unconscious
look of anxiety, a habit of muttering to yourself—
anything that carried with it the suggestion of
abnormality, of having something to hide. In any
case, to wear an improper expression on your face
(to look incredulous when a victory was announced,
for example) was itself a punishable offence. There
was even a word for it in Newspeak: FACECRIME, it
was called.
COMPUTER SECURITY IS AN OXYMORON
All health data should be assumed world readable
Information that is
not public
and has not yet been
destroyed
is just waiting to
change to
either
state.
http://www.flickr.com/photos/baileyblack/1545504824/
http://www.fitbit.com/home
https://jawbone.com/up
ACLU Pizza
http://www.aclu.org/pizza/
Risky behavior will be priced in
real time, 3rd glass of wine
tonight? Click here for a $20
extension for alcohol related
injury or illness.
http://www.connectedaction.net/2009/02
/18/the-future-of-helath-insurance-
mobile-medical-sensors-and-dynamic-
pricing/
http://www.ft.com/cms/s/0/c1473442-a6f4-11de-bd14-00144feabdc0.html
Novartis chip to help ensure bitter pills are
swallowed
By Andrew Jack in London
Published: September 21 2009 23:06 | Last
updated: September 21 2009 23:06
technology that inserts a tiny microchip into
each pill swallowed and sends a reminder to
patients by text message if they fail to follow
their doctors’ prescriptions.
the system – which broadcasts from the “chip
in the pill” to a receiver on the shoulder – on
20 patients using Diovan, a drug to lower
blood pressure, had boosted “compliance”
with prescriptions from 30 per cent to 80 per
cent after six months.
Prediction: a mobile App will be more
medically effective than many drugs
If only because it will make you take the drug
properly
Google Flu Tracker
Result: lives that are more publicly
displayed than ever before.
• Add potential improvements in audio and
facial recognition and a new world of
continuous observation and publication
emerges.
• Some benefits, like those displayed by the
Google Flu tracking system, illustrate the
potential for insight from aggregated sensor
data.
• More exploitative applications are also likely.
Information wants to be copied
The Myth of Selective Sharing
Bits exist along a gradient from private to public.
But in practice
they only move
in one direction.
http://www.connectedaction.net/2011/07/25/the-myth-of-selective-sharing-why-all-bits-will-eventually-be-public-or-be-destroyed/
Secure links
between
people and
content…
…are as strong
as the weakest link
Cryptography weakens over time
Eventually, private bits,
even when encrypted,
become public because
the march of computing
power makes their
encryption increasingly
trivial to break.
No one expects
privacy to be
perfect in the
physical world.
Patterns of connection
may uniquely identify
De-anonymizing Social Networks
Arvind Narayanan & Vitaly Shmatikov
http://33bits.org/2009/03/19/de-anonymizing-social-networks/
Abstract:
Operators of online social networks are increasingly sharing potentially sensitive information
about users and their relationships with advertisers, application developers, and data-mining
researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc.
We present a framework for analyzing privacy and anonymity in social networks and develop a
new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its
effectiveness on real-world networks, we show that a third of the users who can be verified to
have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-
sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate. Our
de-anonymization algorithm is based purely on the network topology, does not require creation
of a large number of dummy “sybil” nodes, is robust to noise and all existing defenses, and works
even when the overlap between the target network and the adversary’s auxiliary information is
small.
http://www.flickr.com/photos/docsmith/4502313017
Information that is
not public
and has not yet been
destroyed
is just waiting to
change to
either
state.
Conclusions
 Selling “selective exposure” as a feature has dangerous failure conditions.
 Assume public by default.
 It takes a long time for mitigating technologies to catch up.
 Insurance companies turn out to be the heros in the history of technical risk.
Digital Health Futures:
Empowerment or coercion
Or,
The Myth of Selective Sharing
Marc Smith

Weitere ähnliche Inhalte

Ähnlich wie 20130724 ted x-marc smith-digital health futures empowerment or coercion

Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Lutz Schmitt
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkE Hacking
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)Felipe Prado
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)Felipe Prado
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchismq3XKFc5XR
 
2600 v01 n03 (march 1984)
2600 v01 n03 (march 1984)2600 v01 n03 (march 1984)
2600 v01 n03 (march 1984)Felipe Prado
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible? Mathias Klang
 
Surveillance And Power
Surveillance And PowerSurveillance And Power
Surveillance And PowerMarj Kibby
 
Social engineering, cybernetics and archaeology/genealogy of social movements
Social engineering, cybernetics and archaeology/genealogy of social movements Social engineering, cybernetics and archaeology/genealogy of social movements
Social engineering, cybernetics and archaeology/genealogy of social movements //disruptiVesemiOtics//
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & TechnologyMathias Klang
 
Embracing Postprivacy: Optimism towards a future where there is "Nothing to h...
Embracing Postprivacy: Optimism towards a future where there is "Nothing to h...Embracing Postprivacy: Optimism towards a future where there is "Nothing to h...
Embracing Postprivacy: Optimism towards a future where there is "Nothing to h...Christian Heller
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital eraCHEMISTRY AGENCY
 
Double Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdfDouble Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdfCharlie
 

Ähnlich wie 20130724 ted x-marc smith-digital health futures empowerment or coercion (20)

Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
 
Stalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon TalkStalking a City for Fun and Frivolity" Defcon Talk
Stalking a City for Fun and Frivolity" Defcon Talk
 
2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)2600 v25 n1 (spring 2008)
2600 v25 n1 (spring 2008)
 
2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)2600 v16 n1 (spring 1999)
2600 v16 n1 (spring 1999)
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
 
Surveillance
SurveillanceSurveillance
Surveillance
 
2600 v01 n03 (march 1984)
2600 v01 n03 (march 1984)2600 v01 n03 (march 1984)
2600 v01 n03 (march 1984)
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?
 
Surveillance And Power
Surveillance And PowerSurveillance And Power
Surveillance And Power
 
Data on a leash
Data on a leashData on a leash
Data on a leash
 
Data on a leash
Data on a leashData on a leash
Data on a leash
 
Social engineering, cybernetics and archaeology/genealogy of social movements
Social engineering, cybernetics and archaeology/genealogy of social movements Social engineering, cybernetics and archaeology/genealogy of social movements
Social engineering, cybernetics and archaeology/genealogy of social movements
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Human Rights & Technology
Human Rights & TechnologyHuman Rights & Technology
Human Rights & Technology
 
The next privacy worry is doorbells
The next privacy worry is doorbellsThe next privacy worry is doorbells
The next privacy worry is doorbells
 
Gibson final
Gibson  finalGibson  final
Gibson final
 
Security
SecuritySecurity
Security
 
Embracing Postprivacy: Optimism towards a future where there is "Nothing to h...
Embracing Postprivacy: Optimism towards a future where there is "Nothing to h...Embracing Postprivacy: Optimism towards a future where there is "Nothing to h...
Embracing Postprivacy: Optimism towards a future where there is "Nothing to h...
 
Privacy in the digital era
Privacy in the digital eraPrivacy in the digital era
Privacy in the digital era
 
Double Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdfDouble Bill WarGames and Die Hard 40.pdf
Double Bill WarGames and Die Hard 40.pdf
 

Mehr von Marc Smith

How to use social media network analysis for amplification
How to use social media network analysis for amplificationHow to use social media network analysis for amplification
How to use social media network analysis for amplificationMarc Smith
 
Think link what is an edge - NodeXL
Think link   what is an edge - NodeXLThink link   what is an edge - NodeXL
Think link what is an edge - NodeXLMarc Smith
 
2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshowMarc Smith
 
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNAMarc Smith
 
20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...Marc Smith
 
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...Marc Smith
 
2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media snaMarc Smith
 
2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXLMarc Smith
 
Think Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsThink Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsMarc Smith
 
2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formattedMarc Smith
 
2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network AnalysisMarc Smith
 
20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...Marc Smith
 
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...Marc Smith
 
2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyerMarc Smith
 
20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …Marc Smith
 
20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...Marc Smith
 
20111123 mwa2011-marc smith
20111123 mwa2011-marc smith20111123 mwa2011-marc smith
20111123 mwa2011-marc smithMarc Smith
 
20111103 con tech2011-marc smith
20111103 con tech2011-marc smith20111103 con tech2011-marc smith
20111103 con tech2011-marc smithMarc Smith
 
2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-BoxMarc Smith
 
20110830 Introducing the Social Media Research Foundation
20110830 Introducing the Social Media Research Foundation20110830 Introducing the Social Media Research Foundation
20110830 Introducing the Social Media Research FoundationMarc Smith
 

Mehr von Marc Smith (20)

How to use social media network analysis for amplification
How to use social media network analysis for amplificationHow to use social media network analysis for amplification
How to use social media network analysis for amplification
 
Think link what is an edge - NodeXL
Think link   what is an edge - NodeXLThink link   what is an edge - NodeXL
Think link what is an edge - NodeXL
 
2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow2017 05-26 NodeXL Twitter search #shakeupshow
2017 05-26 NodeXL Twitter search #shakeupshow
 
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
2016 SocialMedia.Org Marc Smith-NodeXL-Social Media SNA
 
20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...20151001 charles university prague - marc smith - node xl-picturing political...
20151001 charles university prague - marc smith - node xl-picturing political...
 
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
 
2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna2015 pdf-marc smith-node xl-social media sna
2015 pdf-marc smith-node xl-social media sna
 
2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL2014 TheNextWeb-Mapping connections with NodeXL
2014 TheNextWeb-Mapping connections with NodeXL
 
Think Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming SkillsThink Link: Network Insights with No Programming Skills
Think Link: Network Insights with No Programming Skills
 
2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted2013 passbac-marc smith-node xl-sna-social media-formatted
2013 passbac-marc smith-node xl-sna-social media-formatted
 
2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis2013 NodeXL Social Media Network Analysis
2013 NodeXL Social Media Network Analysis
 
20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...20121010 marc smith - mapping collections of connections in social media with...
20121010 marc smith - mapping collections of connections in social media with...
 
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
20121001 pawcon 2012-marc smith - mapping collections of connections in socia...
 
2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer2012 ona practitioner-courseflyer
2012 ona practitioner-courseflyer
 
20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …20120622 web sci12-won-marc smith-semantic and social network analysis of …
20120622 web sci12-won-marc smith-semantic and social network analysis of …
 
20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...20120301 strata-marc smith-mapping social media networks with no coding using...
20120301 strata-marc smith-mapping social media networks with no coding using...
 
20111123 mwa2011-marc smith
20111123 mwa2011-marc smith20111123 mwa2011-marc smith
20111123 mwa2011-marc smith
 
20111103 con tech2011-marc smith
20111103 con tech2011-marc smith20111103 con tech2011-marc smith
20111103 con tech2011-marc smith
 
2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box2011 IEEE Social Computing Nodexl: Group-In-A-Box
2011 IEEE Social Computing Nodexl: Group-In-A-Box
 
20110830 Introducing the Social Media Research Foundation
20110830 Introducing the Social Media Research Foundation20110830 Introducing the Social Media Research Foundation
20110830 Introducing the Social Media Research Foundation
 

Kürzlich hochgeladen

Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammamahmedjiabur940
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一uodye
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxRishabh332761
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理uodye
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证ehyxf
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证ehyxf
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Priya Reddy
 
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime GuwahatiGuwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahatimeghakumariji156
 
Mass storage systems presentation operating systems
Mass storage systems presentation operating systemsMass storage systems presentation operating systems
Mass storage systems presentation operating systemsnight1ng4ale
 
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样ayoqf
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证wpkuukw
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信oopacde
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryoyebolasonuga14
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证ehyxf
 
Call Girls Amethi 9332606886 HOT & SEXY Models beautiful and charming call g...
Call Girls Amethi  9332606886 HOT & SEXY Models beautiful and charming call g...Call Girls Amethi  9332606886 HOT & SEXY Models beautiful and charming call g...
Call Girls Amethi 9332606886 HOT & SEXY Models beautiful and charming call g...Sareena Khatun
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一ougvy
 
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...vershagrag
 

Kürzlich hochgeladen (20)

Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
 
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime GuwahatiGuwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
 
Mass storage systems presentation operating systems
Mass storage systems presentation operating systemsMass storage systems presentation operating systems
Mass storage systems presentation operating systems
 
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratory
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
 
Call Girls Amethi 9332606886 HOT & SEXY Models beautiful and charming call g...
Call Girls Amethi  9332606886 HOT & SEXY Models beautiful and charming call g...Call Girls Amethi  9332606886 HOT & SEXY Models beautiful and charming call g...
Call Girls Amethi 9332606886 HOT & SEXY Models beautiful and charming call g...
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
 
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
Low Cost Patna Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Gi...
 
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get CytotecBuy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
 
Critical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptxCritical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptx
 

20130724 ted x-marc smith-digital health futures empowerment or coercion

  • 1. Digital Health Futures: Empowerment or coercion Or, The Myth of Selective Sharing Marc Smith
  • 2. XBOX ONE, TELESCREEN ZERO Better than Orwell
  • 3. The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level of a very low whisper, would be picked up by it, moreover, so long as he remained within the field of vision which the metal plaque commanded, he could be seen as well as heard. There was of course no way of knowing whether you were being watched at any given moment. How often, or on what system, the Thought Police plugged in on any individual wire was guesswork. It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.
  • 5. ‘Smith!’ screamed the shrewish voice from the telescreen. ‘6079 Smith W.! Yes, YOU! Bend lower, please! You can do better than that. You’re not trying. Lower, please! THAT’S better, comrade. Now stand at ease, the whole squad, and watch me.
  • 7. To keep your face expressionless was not difficult, and even your breathing could be controlled, with an effort: but you could not control the beating of your heart, and the telescreen was quite delicate enough to pick it up.
  • 9. It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself— anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face (to look incredulous when a victory was announced, for example) was itself a punishable offence. There was even a word for it in Newspeak: FACECRIME, it was called.
  • 10.
  • 11. COMPUTER SECURITY IS AN OXYMORON All health data should be assumed world readable
  • 12. Information that is not public and has not yet been destroyed is just waiting to change to either state. http://www.flickr.com/photos/baileyblack/1545504824/
  • 15. Risky behavior will be priced in real time, 3rd glass of wine tonight? Click here for a $20 extension for alcohol related injury or illness. http://www.connectedaction.net/2009/02 /18/the-future-of-helath-insurance- mobile-medical-sensors-and-dynamic- pricing/
  • 16. http://www.ft.com/cms/s/0/c1473442-a6f4-11de-bd14-00144feabdc0.html Novartis chip to help ensure bitter pills are swallowed By Andrew Jack in London Published: September 21 2009 23:06 | Last updated: September 21 2009 23:06 technology that inserts a tiny microchip into each pill swallowed and sends a reminder to patients by text message if they fail to follow their doctors’ prescriptions. the system – which broadcasts from the “chip in the pill” to a receiver on the shoulder – on 20 patients using Diovan, a drug to lower blood pressure, had boosted “compliance” with prescriptions from 30 per cent to 80 per cent after six months.
  • 17. Prediction: a mobile App will be more medically effective than many drugs If only because it will make you take the drug properly
  • 19. Result: lives that are more publicly displayed than ever before. • Add potential improvements in audio and facial recognition and a new world of continuous observation and publication emerges. • Some benefits, like those displayed by the Google Flu tracking system, illustrate the potential for insight from aggregated sensor data. • More exploitative applications are also likely.
  • 20. Information wants to be copied
  • 21. The Myth of Selective Sharing Bits exist along a gradient from private to public. But in practice they only move in one direction. http://www.connectedaction.net/2011/07/25/the-myth-of-selective-sharing-why-all-bits-will-eventually-be-public-or-be-destroyed/
  • 23. …are as strong as the weakest link
  • 24.
  • 25. Cryptography weakens over time Eventually, private bits, even when encrypted, become public because the march of computing power makes their encryption increasingly trivial to break.
  • 26. No one expects privacy to be perfect in the physical world.
  • 27. Patterns of connection may uniquely identify De-anonymizing Social Networks Arvind Narayanan & Vitaly Shmatikov http://33bits.org/2009/03/19/de-anonymizing-social-networks/ Abstract: Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc. We present a framework for analyzing privacy and anonymity in social networks and develop a new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its effectiveness on real-world networks, we show that a third of the users who can be verified to have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo- sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate. Our de-anonymization algorithm is based purely on the network topology, does not require creation of a large number of dummy “sybil” nodes, is robust to noise and all existing defenses, and works even when the overlap between the target network and the adversary’s auxiliary information is small.
  • 28.
  • 29.
  • 31. Information that is not public and has not yet been destroyed is just waiting to change to either state.
  • 32. Conclusions  Selling “selective exposure” as a feature has dangerous failure conditions.  Assume public by default.  It takes a long time for mitigating technologies to catch up.  Insurance companies turn out to be the heros in the history of technical risk.
  • 33. Digital Health Futures: Empowerment or coercion Or, The Myth of Selective Sharing Marc Smith

Hinweis der Redaktion

  1. http://www.planetebook.com/1984.asp
  2. http://video.wired.com/watch/new-xbox-kinect-exclusive-wired-video-398878WAR IS PEACE FREEDOM IS SLAVERY IGNORANCE IS STRENGTH
  3. http://www.planetebook.com/1984.aspWAR IS PEACE FREEDOM IS SLAVERY IGNORANCE IS STRENGTH
  4. http://www.planetebook.com/1984.aspWAR IS PEACE FREEDOM IS SLAVERY IGNORANCE IS STRENGTH
  5. http://video.wired.com/watch/new-xbox-kinect-exclusive-wired-video-398878
  6. http://www.planetebook.com/1984.aspWAR IS PEACE FREEDOM IS SLAVERY IGNORANCE IS STRENGTH
  7. http://video.wired.com/watch/new-xbox-kinect-exclusive-wired-video-398878WAR IS PEACE FREEDOM IS SLAVERY IGNORANCE IS STRENGTH
  8. http://www.flickr.com/photos/baileyblack/1545504824/
  9. http://www.fitbit.com/homehttps://jawbone.com/up
  10. The aggregate data from social media is creating new opportunities for gaining insights into macro trends across populations.http://www.google.org/flutrends/
  11. http://www.flickr.com/photos/53366513@N00/67046506/sizes/o/
  12. http://www.connectedaction.net/2011/07/25/the-myth-of-selective-sharing-why-all-bits-will-eventually-be-public-or-be-destroyed/
  13. http://www.flickr.com/photos/lizjones/1571656758/sizes/o/
  14. http://www.flickr.com/photos/kjander/3123883124/sizes/o/
  15. http://xkcd.com/538/
  16. http://www.flickr.com/photos/shinythings/154815871/sizes/l/
  17. http://en.wikipedia.org/wiki/List_of_boiler_explosions
  18. http://farm1.staticflickr.com/6/9574329_805ef06d9c_o.jpghttp://www.flickr.com/photos/22739418@N02/8748724893http://www.flickr.com/photos/10418101@N03/2153464224http://en.wikipedia.org/wiki/Fire_sprinkler
  19. http://www.flickr.com/photos/docsmith/4502313017