SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Ethics and Data
Lee Rainie
Director, Internet, Science, and Technology Research
Pew Research Center
Lrainie@pewresearch.org
12.12.16
Digital life in 2025 - Metaverse
The internet will become ‘like electricity’ —
less visible, yet more deeply embedded in
people’s lives for good and ill
Theme 1) Information sharing over the internet will be
effortlessly interwoven into daily life making us smarter,
safer, more efficient. ‘Computication’ involving ‘smart
agents’ will be commonplace.
Theme 2) Artificial intelligence, augmented reality, wearable
devices, and big data will make people more aware of
their world and their own behavior – which will especially
aid in health care.
Theme 3) Social and business encounters will be shaped by
virtual reality and telepresence. Interfaces with data and
objects will change and become easier. Speech and gesture
interaction will matter more
Why big data are different and need fresh
attention from ethics perspectives
• Volume (organic)
• Velocity (real-time)
• Variety (Internet of Things)
• Valence (give analysts more insight)
– Longitudinal
– Location specific
– Combinatorial & searchable
– “Understood” by algorithms
• Variable valuation over time (in ways not
fully known at time of collection)
How ethics enters the picture
Privacy = control of access
Freedom from intrusion—into the body, home, protected space
Physical security—protection from bodily harm done by intrusion
Dignity—not being subject to contacts regarded as degrading
Intimacy—the role of controlling access to the person in creating
intimate relationships
Autonomy—controlling access to the person is important to the
individual’s ability to make central choices about his/her life
Identity—protecting access is critical to individual or group
identity
Equality—ease of access to some but not to others may affect
social positions (e.g. equality of women, racial/ethnic minorities)
1. The balance of
forces has shifted in
the networked
age. People are
now “public by
default and
private by effort.”
-- danah boyd
• Half of internet users say they worry
about the amount of information
available about them online – up from
30% in 20
• Considering the Future of Privacy,
experts argue that privacy is no longer a
“condition” of American life. Rather, it is
becoming a commodity that would be
purchased.
Implications for big data
• Americans want data-sharing arrangements to be
secure
• If security is breached, Americans would like
disclosure mechanisms to be clear and swift
• Americans would like to know if re-identification
processes have compromised their identities
• They would appreciate a process to gain redress
from harms caused by data breaches or re-
identification efforts
2. Privacy is not binary / context matters and
many are in transactional frame of mind
Implications for big data
• Americans are not instinctively opposed to
data collection and use. They want to
understand the tradeoffs.
• This puts some burden on big data analysts to
make the case for their work and the benefits
that will emerge from it.
3. Personal control / agency matters
Implications for big data
• Consent is so context specific, it is hard to
know for certain how to apply it for non-
obvious uses of the data post facto
• Would “due process” mechanisms be better
suited?
• Would “participatory consent” be possible?
4. Many know they do not
know what is going on ….
Those who know the most
are more worried
and wary
Implications for big data
• People do not like surprises and will be
unhappy if their data were used in ways they
did not anticipate or that seem “out of the
blue”
• Is a re-consent process possible?
5. Many are resigned – some are even hopeless –
and their trust is fading
How confident are you that your records at
these places will remain private and secure?
76%
69%
66%
61%
57%
56%
55%
54%
50%
46%
0% 10% 20% 30% 40% 50% 60% 70% 80%
Online advertisers
Social media
Search engines
Retailers
Email provider
Cell telephone
Government agencies
Cable TV
Landline telephone
Credit card
Not too confident / Not at all confident
Implications for big data
• Transparency (including about data transfers)
• Consider new, networked trust-building
mechanisms
– Third party validation
– Updated ethics codes
– “Hold harmless” mechanisms?
• Algorithmic validation / replication
(1) Consumer Privacy Bill of Rights (2) OECD Fair Information Practice Principles
2013
Transparency: easily understandable and
accessible information about privacy and
security practices
Openness Principle: companies should be
open about their practices and policies
related to personal data
Individual Control: consumers have a right
to exercise control over what personal
data companies collect from them and
how they use it
Use Limitation Principle: personal data
should not be disclosed without consumer
consent except when authorized by law
Respect for Context: users have a right to
expect that companies will collect, use,
and disclose personal data in ways that are
consistent with the context in which
consumers provide the data
Purpose Specification Principle: companies
should specify the reasons why data are
collected no later than the time of
collection, and the uses of data should be
compatible with the stated reason for data
collection
Focused Collection: users have a right to
reasonable limits on the personal data that
companies collect and retain
Collection Limitation Principle: there
should be limits on the amount of personal
data collected and, where appropriate, the
company should receive consumer consent
Security: users have right to secure and
responsible handling of personal data
Security Safeguards Principle: personal data
should be reasonably protected against risks
such as loss or unauthorized access,
destruction, use, modification, or disclosure of
data
Access and Accuracy: user have right to access
and correct personal data in usable formats, in
a manner that is appropriate to the sensitivity
of the data and the risk of adverse
consequences to consumers if the data are
inaccurate
Individual Participation Principle: consumers
should be able to receive confirmation that an
entity controls their personal data, and they
should be able to access their data within a
reasonable time, in a practical manner, and in
an intelligible form
Data Quality Principle: personal data should be
relevant to the purposes for which they are
used, and, to the extent necessary for those
purposes, the data should be accurate and kept
up-to-date
Accountability: users can expect that their
personal data will be handled only by
companies with appropriate measures in place
to ensure they follow the Consumer Bill of
Rights
Accountability Principle: entities that control
data should ensure the compliance the other
principles
(1) Consumer Privacy Bill of Rights (continued) (2) OECD Fair Information Practice Principles
2013 (continued)
New Deal on Data
MIT’s Sandy Pentland
1. You have the right to possess data about
yourself
2. You have the right to full control over your
data
3. You have the right to dispose of or distribute
your data
Thank you!
Lee Rainie
lrainie@pewresearch.org
@lrainie
@pewinternet
@pewresearch
Sources
• The State of Privacy in America: What we learned
http://www.pewresearch.org/fact-tank/2016/01/20/the-state-of-privacy-in-america/
• Privacy and Information Sharing
http://www.pewinternet.org/2016/01/14/privacy-and-information-sharing/
• Americans’ Attitudes About Privacy, Security and Surveillance
http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/
• Americans’ Privacy Strategies Post-Snowden
http://www.pewinternet.org/2015/03/16/americans-privacy-strategies-post-snowden/
• Public Perceptions of Privacy and Security in the Post-Snowden Era
http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/
• The Future of Privacy
http://www.pewinternet.org/2014/12/18/future-of-privacy/
• Anonymity, Privacy, and Security Online
http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/
• More Support for Justice Department Than for Apple in Dispute Over Unlocking iPhone
http://www.people-press.org/2016/02/22/more-support-for-justice-department-than-for-apple-in-dispute-over-unlocking-iphone/

Weitere ähnliche Inhalte

Was ist angesagt?

Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 

Was ist angesagt? (20)

Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
  Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...  Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
Best Practices For Seizing Electronic Evidence v.3: A Pocket Guide for Firs...
 
Big Data Analytics Powerpoint Presentation Slide
Big Data Analytics Powerpoint Presentation SlideBig Data Analytics Powerpoint Presentation Slide
Big Data Analytics Powerpoint Presentation Slide
 
استبيان المواطنة الرقمية
استبيان المواطنة الرقميةاستبيان المواطنة الرقمية
استبيان المواطنة الرقمية
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Generative AI Risks & Concerns
Generative AI Risks & ConcernsGenerative AI Risks & Concerns
Generative AI Risks & Concerns
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Aruba 3810M 16SFP+ 2-slot Switch - JL075A Datasheet
Aruba 3810M 16SFP+ 2-slot Switch - JL075A DatasheetAruba 3810M 16SFP+ 2-slot Switch - JL075A Datasheet
Aruba 3810M 16SFP+ 2-slot Switch - JL075A Datasheet
 
EON Reality Knowledge Metaverse Program (EKM Program)
EON Reality Knowledge Metaverse Program (EKM Program)EON Reality Knowledge Metaverse Program (EKM Program)
EON Reality Knowledge Metaverse Program (EKM Program)
 
Microsoft AI Platform - AETHER Introduction
Microsoft AI Platform - AETHER IntroductionMicrosoft AI Platform - AETHER Introduction
Microsoft AI Platform - AETHER Introduction
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
The new world: The challenges and promises of the metaverse for retailers
The new world: The challenges and promises of the metaverse for retailersThe new world: The challenges and promises of the metaverse for retailers
The new world: The challenges and promises of the metaverse for retailers
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Children as target of cyber crimes
Children as target of cyber crimesChildren as target of cyber crimes
Children as target of cyber crimes
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Ähnlich wie Ethics and Big Data

ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
Pranav Godse
 
Mit csail-tr-2007-034
Mit csail-tr-2007-034Mit csail-tr-2007-034
Mit csail-tr-2007-034
vafopoulos
 

Ähnlich wie Ethics and Big Data (20)

ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois[AIIM18] GDPR: whose job is it now? - Paul Lanois
[AIIM18] GDPR: whose job is it now? - Paul Lanois
 
Future of Information Ethics.pptx
Future of Information Ethics.pptxFuture of Information Ethics.pptx
Future of Information Ethics.pptx
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
Marcus Comiter, "Data Policy for Internet of Things Healthcare Devices: Align...
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
MyData-nordic-model
MyData-nordic-modelMyData-nordic-model
MyData-nordic-model
 
My Data - A Nordic Model for human-centered personal data management and proc...
My Data - A Nordic Model for human-centered personal data management and proc...My Data - A Nordic Model for human-centered personal data management and proc...
My Data - A Nordic Model for human-centered personal data management and proc...
 
Ethics In DW & DM
Ethics In DW & DMEthics In DW & DM
Ethics In DW & DM
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Mit csail-tr-2007-034
Mit csail-tr-2007-034Mit csail-tr-2007-034
Mit csail-tr-2007-034
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 

Mehr von Pew Research Center's Internet & American Life Project

Mehr von Pew Research Center's Internet & American Life Project (20)

Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
 
Trust, Facts, Democracy
Trust, Facts, DemocracyTrust, Facts, Democracy
Trust, Facts, Democracy
 
Skills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 FactsSkills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 Facts
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Online Harassment 2017
Online Harassment 2017Online Harassment 2017
Online Harassment 2017
 
10 facts about jobs in the future
10 facts about jobs in the future10 facts about jobs in the future
10 facts about jobs in the future
 
Education in the age of fake news and disputed facts
Education in the age of fake news and disputed factsEducation in the age of fake news and disputed facts
Education in the age of fake news and disputed facts
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
The new landscape of facts and trust
The new landscape of facts and trustThe new landscape of facts and trust
The new landscape of facts and trust
 
The secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries addressThe secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries address
 
How People Fit Libraries Into Their Lives
How People Fit Libraries Into Their LivesHow People Fit Libraries Into Their Lives
How People Fit Libraries Into Their Lives
 
The New Age of Politics and Media
The New Age of Politics and MediaThe New Age of Politics and Media
The New Age of Politics and Media
 
Digital Divides – Feeding America
Digital Divides – Feeding AmericaDigital Divides – Feeding America
Digital Divides – Feeding America
 
Operating in the Age of Always-On Media
Operating in the Age of Always-On MediaOperating in the Age of Always-On Media
Operating in the Age of Always-On Media
 
Digital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance ForumDigital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance Forum
 
How the public grades libraries – and uses libraries
How the public grades libraries – and uses librariesHow the public grades libraries – and uses libraries
How the public grades libraries – and uses libraries
 
How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
 
Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)
 
The Puzzles Librarians Need to Solve - Vala 2016
The Puzzles Librarians Need to Solve - Vala 2016The Puzzles Librarians Need to Solve - Vala 2016
The Puzzles Librarians Need to Solve - Vala 2016
 

Kürzlich hochgeladen

一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 

Kürzlich hochgeladen (20)

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 

Ethics and Big Data

  • 1. Ethics and Data Lee Rainie Director, Internet, Science, and Technology Research Pew Research Center Lrainie@pewresearch.org 12.12.16
  • 2. Digital life in 2025 - Metaverse The internet will become ‘like electricity’ — less visible, yet more deeply embedded in people’s lives for good and ill
  • 3. Theme 1) Information sharing over the internet will be effortlessly interwoven into daily life making us smarter, safer, more efficient. ‘Computication’ involving ‘smart agents’ will be commonplace.
  • 4. Theme 2) Artificial intelligence, augmented reality, wearable devices, and big data will make people more aware of their world and their own behavior – which will especially aid in health care.
  • 5. Theme 3) Social and business encounters will be shaped by virtual reality and telepresence. Interfaces with data and objects will change and become easier. Speech and gesture interaction will matter more
  • 6. Why big data are different and need fresh attention from ethics perspectives • Volume (organic) • Velocity (real-time) • Variety (Internet of Things) • Valence (give analysts more insight) – Longitudinal – Location specific – Combinatorial & searchable – “Understood” by algorithms • Variable valuation over time (in ways not fully known at time of collection)
  • 7. How ethics enters the picture Privacy = control of access Freedom from intrusion—into the body, home, protected space Physical security—protection from bodily harm done by intrusion Dignity—not being subject to contacts regarded as degrading Intimacy—the role of controlling access to the person in creating intimate relationships Autonomy—controlling access to the person is important to the individual’s ability to make central choices about his/her life Identity—protecting access is critical to individual or group identity Equality—ease of access to some but not to others may affect social positions (e.g. equality of women, racial/ethnic minorities)
  • 8. 1. The balance of forces has shifted in the networked age. People are now “public by default and private by effort.” -- danah boyd
  • 9.
  • 10. • Half of internet users say they worry about the amount of information available about them online – up from 30% in 20 • Considering the Future of Privacy, experts argue that privacy is no longer a “condition” of American life. Rather, it is becoming a commodity that would be purchased.
  • 11. Implications for big data • Americans want data-sharing arrangements to be secure • If security is breached, Americans would like disclosure mechanisms to be clear and swift • Americans would like to know if re-identification processes have compromised their identities • They would appreciate a process to gain redress from harms caused by data breaches or re- identification efforts
  • 12. 2. Privacy is not binary / context matters and many are in transactional frame of mind
  • 13.
  • 14.
  • 15. Implications for big data • Americans are not instinctively opposed to data collection and use. They want to understand the tradeoffs. • This puts some burden on big data analysts to make the case for their work and the benefits that will emerge from it.
  • 16. 3. Personal control / agency matters
  • 17.
  • 18.
  • 19. Implications for big data • Consent is so context specific, it is hard to know for certain how to apply it for non- obvious uses of the data post facto • Would “due process” mechanisms be better suited? • Would “participatory consent” be possible?
  • 20. 4. Many know they do not know what is going on …. Those who know the most are more worried and wary
  • 21.
  • 22. Implications for big data • People do not like surprises and will be unhappy if their data were used in ways they did not anticipate or that seem “out of the blue” • Is a re-consent process possible?
  • 23. 5. Many are resigned – some are even hopeless – and their trust is fading
  • 24. How confident are you that your records at these places will remain private and secure? 76% 69% 66% 61% 57% 56% 55% 54% 50% 46% 0% 10% 20% 30% 40% 50% 60% 70% 80% Online advertisers Social media Search engines Retailers Email provider Cell telephone Government agencies Cable TV Landline telephone Credit card Not too confident / Not at all confident
  • 25. Implications for big data • Transparency (including about data transfers) • Consider new, networked trust-building mechanisms – Third party validation – Updated ethics codes – “Hold harmless” mechanisms? • Algorithmic validation / replication
  • 26. (1) Consumer Privacy Bill of Rights (2) OECD Fair Information Practice Principles 2013 Transparency: easily understandable and accessible information about privacy and security practices Openness Principle: companies should be open about their practices and policies related to personal data Individual Control: consumers have a right to exercise control over what personal data companies collect from them and how they use it Use Limitation Principle: personal data should not be disclosed without consumer consent except when authorized by law Respect for Context: users have a right to expect that companies will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data Purpose Specification Principle: companies should specify the reasons why data are collected no later than the time of collection, and the uses of data should be compatible with the stated reason for data collection Focused Collection: users have a right to reasonable limits on the personal data that companies collect and retain Collection Limitation Principle: there should be limits on the amount of personal data collected and, where appropriate, the company should receive consumer consent
  • 27. Security: users have right to secure and responsible handling of personal data Security Safeguards Principle: personal data should be reasonably protected against risks such as loss or unauthorized access, destruction, use, modification, or disclosure of data Access and Accuracy: user have right to access and correct personal data in usable formats, in a manner that is appropriate to the sensitivity of the data and the risk of adverse consequences to consumers if the data are inaccurate Individual Participation Principle: consumers should be able to receive confirmation that an entity controls their personal data, and they should be able to access their data within a reasonable time, in a practical manner, and in an intelligible form Data Quality Principle: personal data should be relevant to the purposes for which they are used, and, to the extent necessary for those purposes, the data should be accurate and kept up-to-date Accountability: users can expect that their personal data will be handled only by companies with appropriate measures in place to ensure they follow the Consumer Bill of Rights Accountability Principle: entities that control data should ensure the compliance the other principles (1) Consumer Privacy Bill of Rights (continued) (2) OECD Fair Information Practice Principles 2013 (continued)
  • 28. New Deal on Data MIT’s Sandy Pentland 1. You have the right to possess data about yourself 2. You have the right to full control over your data 3. You have the right to dispose of or distribute your data
  • 30. Sources • The State of Privacy in America: What we learned http://www.pewresearch.org/fact-tank/2016/01/20/the-state-of-privacy-in-america/ • Privacy and Information Sharing http://www.pewinternet.org/2016/01/14/privacy-and-information-sharing/ • Americans’ Attitudes About Privacy, Security and Surveillance http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/ • Americans’ Privacy Strategies Post-Snowden http://www.pewinternet.org/2015/03/16/americans-privacy-strategies-post-snowden/ • Public Perceptions of Privacy and Security in the Post-Snowden Era http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/ • The Future of Privacy http://www.pewinternet.org/2014/12/18/future-of-privacy/ • Anonymity, Privacy, and Security Online http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/ • More Support for Justice Department Than for Apple in Dispute Over Unlocking iPhone http://www.people-press.org/2016/02/22/more-support-for-justice-department-than-for-apple-in-dispute-over-unlocking-iphone/