SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Lift Asia 09
    Jeju, Korea



                                  Jean-Henry Morin
                        University of Geneva – CUI
                       Dept. of Information Systems

                       Jean-Henry.Morin@unige.ch
                             http://jean-henry.com/
Lift Asia, Sept 16-17, 2009
New Media Warrants New Thinking




                         © Chappatte in "Le Temps" (Geneva), Jan 21, 2006
J.-H. Morin
How did we get here…
                      … a dystopian scenario ?




http://www.flickr.com/search/?q=DRM

      J.-H. Morin
Remix et ©




Universal Music VS dancing toddler




                                     Mannie Garcia, 2006   VS   Shepard Fairey


                                                                          4
 J.-H. Morin
Where did we go wrong?

•     Where did User Experience go ?

•     Where did Superdistribution go ?

•     Where are the innovative Business Models, the
      Real-time Marketers, etc. ?

•     Did DRM curb those that it meant ?

•     Wasn’t DRM supposed to be an enabler ?

J.-H. Morin
Can we finally make DRM
        “FUN” (i.e., User Friendly ;-) ?
 •  Assuming       :
        •  DRM is likely to stay and be needed (managed content)
        •  Absolute security is neither achievable nor desirable
        •  Given the right User Experience and Business Models
           most users smoothly comply (e.g., iTunes)
        •  Most users aren’t criminals

 •  We needed to take a step back to :
        •  Critically re-think DRM
        •  Reconsider the debate outside the either/or extremes of
           total vs. no security
        •  Re-design DRM from ground up

                                                                     6
J.-H. Morin
Rethinking & Redesigning DRM
•  Acknowledge the Central role of the User and User
   Experience
    •  Reinstate Users in their roles & rights
    •  Presumption of innocence & the burden of proof
•  Fundamental guiding principle to Rethink and Redesign
   DRM : Feltens’ “Copyright Balance” principle (Felten,
   2005)
         “Since lawful use, including fair use, of copyrighted works is in the
          public interest, a user wishing to make lawful use of copyrighted
            material should not be prevented from doing so by any DRM
                                                                    system.”
•  Claim and Proposition :
    •  Put the trust back into the hands of the users
    •  Reverse the distrust assumption
    •  Requires a major paradigm shift
                                                                            7
 J.-H. Morin
Rethinking & Redesigning DRM
                                     (cont.)
•  Exception Management in DRM environments, mixing
   water with fire ? Not necessarily !
    •  Reversing the distrust assumption puts the user “in
       charge”, facing his responsibilities
    •  Allow users to make Exception Claims, granting them
       Short Lived Licenses based on some form of logging and
       monitoring
    •  Use Credentials as tokens for logging to detect and
       monitor abuses
    •  Credential are Revocable in order to deal with abuse and
       misuse situations
    •  Mutually acknowledged need for managed content while
       allowing all actors a smooth usability experience

                            (Morin and Pawlak, 2007, 2008); (Morin 2008, 2009)   8
J.-H. Morin
Exception Management in DRM
                     Environments
                                      (Morin and Pawlak, 2007, 2008); (Morin 2008, 2009)

 •  What is an Exception ?
        •  A claim made by a user wishing to rightfully access /
           use content
 •  Based on « real world » credential patterns
        •     Delegation model based on chained authorities
        •     Credential authorities closer to the users
        •     Locally managed and held by users (credential store)
        •     Short lived or fixed life time
        •     Revocable
        •     Late binding (enforcement point)
 •  Model is auditable for abuse and includes
    revocation capabilities
        •  Burden of proof on the party having a justifiable reason
           to claim abuse (presumption of innocence)
        •  Monitoring in near real time of security policies        9
J.-H. Morin
A “Serious” problem in Social
                    Networks and Services
 Socially-Responsible Management of
  Personal Information
        •  Personal Information

              •  Different from Personally Identifying Information (PII)
                 •  Subject to legal frameworks in most countries

              •  Increasingly shared on social networks
                 •  Blurring boundaries between private and public life


      Legitimate concern (i.e., rights) over our
      information in terms of lifetime, usage
      purposes, access, etc.
                                                                          10
J.-H. Morin
Problems and Issues

        •  Publish / share once, publish / share
              forever
              • Indexing and searching

        •  Who “owns” and manages YOUR
              information (SLAs) ? Raging debates.
              • Who’s information is it ?
              • Do you retain control ?

        •  Semantic searching capabilities

                                                     11
J.-H. Morin
The Right to Forget

        •  Right to Forget : fundamental
              human right threatened by the digital
              nature of information (i.e., searchable)

        •  Traditional Media (i.e., non digital)
              “Memory” erodes over time
               • Labor and cost intensive

        •  Digital Media, requires explicit human
              intervention to “make forget” information
              (Rouvroy, 2007)

                                                          12
J.-H. Morin
Anonymity and Privacy

        •  Anonymity and Privacy are fundamental
              to social networking
              • It’s not a “bug”, it’s a feature !
              • It’s not schizophrenia !
                 •  Multiple legitimate personas (e.g., work, family,
                  communities, etc.)
              • How do we deal with it in a socially-
                responsible and ethically sustainable way ?
                 •  Cyber bullying (e.g., Akple in Korea)

        Requires traceability and accountability of
         information (i.e., managed information)
                                                                        13
J.-H. Morin
Key Question

        •  Is Privacy and personal information
              threatened by current social
              networking services ?

        •  We contend there is a need for
              Managed Personal Information
              • Socially-responsible and sustainable

 How can we retain an acceptable (by all) level of
   control over our personal information ?


                                                       14
J.-H. Morin
Proposition
                                                      (Morin, 2009)



        •  Personal Information should be
              augmented with a layer accounting for its
              management
        •  Alongside other metadata increasingly
              used in addressing the semantic
              dimension of our electronic services

        •  We argue DRM combined with Exception
              Management may be a promising path
              towards :
              • Socially-Responsible management of personal
                information in social networks and services
                                                              15
J.-H. Morin
Conclusion


 •  Can DRM “go green” before we all “go
      dark” ?


 •  If so, we might be able to address some
      “Serious” societal issues while having
      “Fun” along the way !




                                               16
J.-H. Morin
Security is bypassed not
                       attacked
                Inspired by Adi Shamir, Turing Award lecture, 2002




                                                           Thank you




                                                                 Jean-Henry Morin
                                                       University of Geneva – CUI
                                                      Dept. of Information Systems

                                                       Jean-Henry.Morin@unige.ch
                                                             http://jean-henry.com/

                                                                                17
J.-H. Morin

Más contenido relacionado

Similar a Lift Asia09 Morin

Itri icl 0116_distribute
Itri icl 0116_distributeItri icl 0116_distribute
Itri icl 0116_distribute
Fuming Shih
 
Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)
lbaruh
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
kmtj1979
 
Records and information management presentation 2012
Records and information management presentation 2012Records and information management presentation 2012
Records and information management presentation 2012
LRNcorporation
 
Emergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKINGEmergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKING
Ann DeMarle
 
Jordon paschal and deon Rogers comm 303
Jordon paschal and deon Rogers comm 303Jordon paschal and deon Rogers comm 303
Jordon paschal and deon Rogers comm 303
jordonp
 

Similar a Lift Asia09 Morin (20)

Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
MKT231 Week 4
MKT231 Week 4MKT231 Week 4
MKT231 Week 4
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)
 
Itri icl 0116_distribute
Itri icl 0116_distributeItri icl 0116_distribute
Itri icl 0116_distribute
 
Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)Privacy by Design (ECREA Preconference 12)
Privacy by Design (ECREA Preconference 12)
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
ThinkData @ NIA, Korea, 2012
ThinkData @ NIA, Korea, 2012ThinkData @ NIA, Korea, 2012
ThinkData @ NIA, Korea, 2012
 
Myne Business Plan
Myne Business PlanMyne Business Plan
Myne Business Plan
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Records and information management presentation 2012
Records and information management presentation 2012Records and information management presentation 2012
Records and information management presentation 2012
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike BaileySocial Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
 
Ftc Drm Future Morin
Ftc Drm Future MorinFtc Drm Future Morin
Ftc Drm Future Morin
 
Emergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKINGEmergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKING
 
How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...
 
Jordon paschal and deon Rogers comm 303
Jordon paschal and deon Rogers comm 303Jordon paschal and deon Rogers comm 303
Jordon paschal and deon Rogers comm 303
 
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
Jonathan Cave, University of Warwick (Plenary): Agreeing to Disagree About Pr...
 
Ethical Questions for Producing Pervasive Media
Ethical Questions for Producing Pervasive MediaEthical Questions for Producing Pervasive Media
Ethical Questions for Producing Pervasive Media
 

Más de University of Geneva

DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
University of Geneva
 

Más de University of Geneva (19)

Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
 
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
 
La Transition Numérique
La Transition NumériqueLa Transition Numérique
La Transition Numérique
 
Swiss Data Protection Day 2016
Swiss Data Protection Day 2016Swiss Data Protection Day 2016
Swiss Data Protection Day 2016
 
Privacy by Design et Privacy by Default : Le point de vue de l'informaticien
Privacy by Design et Privacy by Default : Le point de vue de l'informaticienPrivacy by Design et Privacy by Default : Le point de vue de l'informaticien
Privacy by Design et Privacy by Default : Le point de vue de l'informaticien
 
Swiss digital Agenda debate @Lift15
Swiss digital Agenda debate @Lift15 Swiss digital Agenda debate @Lift15
Swiss digital Agenda debate @Lift15
 
La confiance à l’ère du numérique
La confiance à l’ère du numériqueLa confiance à l’ère du numérique
La confiance à l’ère du numérique
 
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
 
Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society  Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society
 
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
 
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting DemocracyLift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
 
Talk Prix 2013 du PPDT Genève
Talk Prix 2013 du PPDT GenèveTalk Prix 2013 du PPDT Genève
Talk Prix 2013 du PPDT Genève
 
Iff jam-2012-slides
Iff jam-2012-slidesIff jam-2012-slides
Iff jam-2012-slides
 
Keynote 5th Swiss Data Protection day, 2012
Keynote 5th Swiss Data Protection day, 2012Keynote 5th Swiss Data Protection day, 2012
Keynote 5th Swiss Data Protection day, 2012
 
First20120426jhm
First20120426jhmFirst20120426jhm
First20120426jhm
 
Causerie ThinkData April 2012
Causerie ThinkData April 2012Causerie ThinkData April 2012
Causerie ThinkData April 2012
 
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
 
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
 
Lecture Ajm Unine 2009 04 03
Lecture Ajm Unine 2009 04 03Lecture Ajm Unine 2009 04 03
Lecture Ajm Unine 2009 04 03
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Lift Asia09 Morin

  • 1. Lift Asia 09 Jeju, Korea Jean-Henry Morin University of Geneva – CUI Dept. of Information Systems Jean-Henry.Morin@unige.ch http://jean-henry.com/ Lift Asia, Sept 16-17, 2009
  • 2. New Media Warrants New Thinking © Chappatte in "Le Temps" (Geneva), Jan 21, 2006 J.-H. Morin
  • 3. How did we get here… … a dystopian scenario ? http://www.flickr.com/search/?q=DRM J.-H. Morin
  • 4. Remix et © Universal Music VS dancing toddler Mannie Garcia, 2006 VS Shepard Fairey 4 J.-H. Morin
  • 5. Where did we go wrong? •  Where did User Experience go ? •  Where did Superdistribution go ? •  Where are the innovative Business Models, the Real-time Marketers, etc. ? •  Did DRM curb those that it meant ? •  Wasn’t DRM supposed to be an enabler ? J.-H. Morin
  • 6. Can we finally make DRM “FUN” (i.e., User Friendly ;-) ? •  Assuming : •  DRM is likely to stay and be needed (managed content) •  Absolute security is neither achievable nor desirable •  Given the right User Experience and Business Models most users smoothly comply (e.g., iTunes) •  Most users aren’t criminals •  We needed to take a step back to : •  Critically re-think DRM •  Reconsider the debate outside the either/or extremes of total vs. no security •  Re-design DRM from ground up 6 J.-H. Morin
  • 7. Rethinking & Redesigning DRM •  Acknowledge the Central role of the User and User Experience •  Reinstate Users in their roles & rights •  Presumption of innocence & the burden of proof •  Fundamental guiding principle to Rethink and Redesign DRM : Feltens’ “Copyright Balance” principle (Felten, 2005) “Since lawful use, including fair use, of copyrighted works is in the public interest, a user wishing to make lawful use of copyrighted material should not be prevented from doing so by any DRM system.” •  Claim and Proposition : •  Put the trust back into the hands of the users •  Reverse the distrust assumption •  Requires a major paradigm shift 7 J.-H. Morin
  • 8. Rethinking & Redesigning DRM (cont.) •  Exception Management in DRM environments, mixing water with fire ? Not necessarily ! •  Reversing the distrust assumption puts the user “in charge”, facing his responsibilities •  Allow users to make Exception Claims, granting them Short Lived Licenses based on some form of logging and monitoring •  Use Credentials as tokens for logging to detect and monitor abuses •  Credential are Revocable in order to deal with abuse and misuse situations •  Mutually acknowledged need for managed content while allowing all actors a smooth usability experience (Morin and Pawlak, 2007, 2008); (Morin 2008, 2009) 8 J.-H. Morin
  • 9. Exception Management in DRM Environments (Morin and Pawlak, 2007, 2008); (Morin 2008, 2009) •  What is an Exception ? •  A claim made by a user wishing to rightfully access / use content •  Based on « real world » credential patterns •  Delegation model based on chained authorities •  Credential authorities closer to the users •  Locally managed and held by users (credential store) •  Short lived or fixed life time •  Revocable •  Late binding (enforcement point) •  Model is auditable for abuse and includes revocation capabilities •  Burden of proof on the party having a justifiable reason to claim abuse (presumption of innocence) •  Monitoring in near real time of security policies 9 J.-H. Morin
  • 10. A “Serious” problem in Social Networks and Services Socially-Responsible Management of Personal Information •  Personal Information •  Different from Personally Identifying Information (PII) •  Subject to legal frameworks in most countries •  Increasingly shared on social networks •  Blurring boundaries between private and public life Legitimate concern (i.e., rights) over our information in terms of lifetime, usage purposes, access, etc. 10 J.-H. Morin
  • 11. Problems and Issues •  Publish / share once, publish / share forever • Indexing and searching •  Who “owns” and manages YOUR information (SLAs) ? Raging debates. • Who’s information is it ? • Do you retain control ? •  Semantic searching capabilities 11 J.-H. Morin
  • 12. The Right to Forget •  Right to Forget : fundamental human right threatened by the digital nature of information (i.e., searchable) •  Traditional Media (i.e., non digital) “Memory” erodes over time • Labor and cost intensive •  Digital Media, requires explicit human intervention to “make forget” information (Rouvroy, 2007) 12 J.-H. Morin
  • 13. Anonymity and Privacy •  Anonymity and Privacy are fundamental to social networking • It’s not a “bug”, it’s a feature ! • It’s not schizophrenia ! •  Multiple legitimate personas (e.g., work, family, communities, etc.) • How do we deal with it in a socially- responsible and ethically sustainable way ? •  Cyber bullying (e.g., Akple in Korea) Requires traceability and accountability of information (i.e., managed information) 13 J.-H. Morin
  • 14. Key Question •  Is Privacy and personal information threatened by current social networking services ? •  We contend there is a need for Managed Personal Information • Socially-responsible and sustainable How can we retain an acceptable (by all) level of control over our personal information ? 14 J.-H. Morin
  • 15. Proposition (Morin, 2009) •  Personal Information should be augmented with a layer accounting for its management •  Alongside other metadata increasingly used in addressing the semantic dimension of our electronic services •  We argue DRM combined with Exception Management may be a promising path towards : • Socially-Responsible management of personal information in social networks and services 15 J.-H. Morin
  • 16. Conclusion •  Can DRM “go green” before we all “go dark” ? •  If so, we might be able to address some “Serious” societal issues while having “Fun” along the way ! 16 J.-H. Morin
  • 17. Security is bypassed not attacked Inspired by Adi Shamir, Turing Award lecture, 2002 Thank you Jean-Henry Morin University of Geneva – CUI Dept. of Information Systems Jean-Henry.Morin@unige.ch http://jean-henry.com/ 17 J.-H. Morin