SlideShare una empresa de Scribd logo
1 de 7
Privacy: Can we afford not to? Dr. Karen Sollins MIT Computer Science and Artificial Intelligence Laboratory FIA Meeting, Gent, Belgium, December 17, 2010
What is it about privacy? About The subject: usually a person Identity: set of attributes or claims Separation of inherent or assigned attributes from profiled information Policies about what to share and what not Not about complete isolation
Interesting attributes Identification: name, government id number, address, etc. Authorship: linking identity to resources Communication: Others with whom have communicated Usage: Objects, services, and other resources used
What if we could not control these? Identification: invasion of privacy, masquerading, failure of business relationships,  Authorship: failure of legal contracts, freedom of speech Communication: failure of freedom of association Usage: failure of freedom of thought Consider: requirements of diplomacy, intelligence gathering, proprietary and confidential business Consider: confidentiality of doctor-patient and attorney-client relationships
Consequences of Internet devoid of  privacy No commercial substrate No social substrate No civil substrate Likely: walled gardens in stove-pipe constructions, privacy only controllable in restricted communities
Where does that leave us? Reality: privacy will not be perfect Privacy is not about complete hiding, but controlled sharing with enforcement Privacy will exist in some form, because social, business, and civil arenas cannot exist without them Question: at which layer in the architecture?
Which architectural layer? App space:  user involvement and control Can be end-to-end Transport:  Narrow waist of the architecture – locus of homogeneity VERY difficult to change Below transport: apparent walled gardens, isolation

Más contenido relacionado

Similar a Karen Sollins (MIT, US): Privacy: Can we afford not to?

Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
sadia456189
 
Houston Psychological Association Presentation on Emerging Ethical Challanges...
Houston Psychological Association Presentation on Emerging Ethical Challanges...Houston Psychological Association Presentation on Emerging Ethical Challanges...
Houston Psychological Association Presentation on Emerging Ethical Challanges...
Kristin Scheel
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
blutoothe
 

Similar a Karen Sollins (MIT, US): Privacy: Can we afford not to? (20)

Privacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptxPrivacy and personal information presention of professional practice.pptx
Privacy and personal information presention of professional practice.pptx
 
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than EverMarden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
 
LO2 - Lesson 12 - Legislation
LO2 - Lesson 12 - LegislationLO2 - Lesson 12 - Legislation
LO2 - Lesson 12 - Legislation
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan HeuerYour Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
 
Social Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social NetworksSocial Distortion: Privacy, Consent, and Social Networks
Social Distortion: Privacy, Consent, and Social Networks
 
Privacy, Social Network Sites and the law
Privacy, Social Network Sites and the lawPrivacy, Social Network Sites and the law
Privacy, Social Network Sites and the law
 
Houston Psychological Association Presentation on Emerging Ethical Challanges...
Houston Psychological Association Presentation on Emerging Ethical Challanges...Houston Psychological Association Presentation on Emerging Ethical Challanges...
Houston Psychological Association Presentation on Emerging Ethical Challanges...
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyers
 
So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?So You Want to Protect Privacy: Now What?
So You Want to Protect Privacy: Now What?
 
Media Ethics and Privacy
Media Ethics and PrivacyMedia Ethics and Privacy
Media Ethics and Privacy
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Understanding personal privacy in the age of big online data
Understanding  personal privacy  in the age of big online dataUnderstanding  personal privacy  in the age of big online data
Understanding personal privacy in the age of big online data
 
APR Ethics, Law &Technology
APR Ethics, Law &TechnologyAPR Ethics, Law &Technology
APR Ethics, Law &Technology
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Privacy & Elvis
Privacy & ElvisPrivacy & Elvis
Privacy & Elvis
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Digitalisation and ethics
Digitalisation and ethicsDigitalisation and ethics
Digitalisation and ethics
 

Más de FIA2010

Más de FIA2010 (20)

Future Internet Week Budapest
Future Internet Week  BudapestFuture Internet Week  Budapest
Future Internet Week Budapest
 
Gyula Sallai: Presentation of the next FIA in Budapest
Gyula Sallai: Presentation of the next FIA in Budapest Gyula Sallai: Presentation of the next FIA in Budapest
Gyula Sallai: Presentation of the next FIA in Budapest
 
Ian Brown (Oxford Internet Institute): Constitutions and tussles in cyberspace
Ian Brown (Oxford Internet Institute): Constitutions and tussles in cyberspaceIan Brown (Oxford Internet Institute): Constitutions and tussles in cyberspace
Ian Brown (Oxford Internet Institute): Constitutions and tussles in cyberspace
 
Leslie Daigle (ISOC) - Internet Architecture and Values
Leslie Daigle (ISOC) -  Internet Architecture and ValuesLeslie Daigle (ISOC) -  Internet Architecture and Values
Leslie Daigle (ISOC) - Internet Architecture and Values
 
Dirk Trossen (University of Cambridge): The EIFFEL Think Tank - Agreeing on ...
Dirk Trossen (University of Cambridge):  The EIFFEL Think Tank - Agreeing on ...Dirk Trossen (University of Cambridge):  The EIFFEL Think Tank - Agreeing on ...
Dirk Trossen (University of Cambridge): The EIFFEL Think Tank - Agreeing on ...
 
F.S. Nucci - Search as an architectural component: searching for a new paradigm
F.S. Nucci - Search as an architectural component: searching for a new paradigmF.S. Nucci - Search as an architectural component: searching for a new paradigm
F.S. Nucci - Search as an architectural component: searching for a new paradigm
 
Josef Weber (Siemens): Scenarios for Future Internet Business@Energy
Josef Weber (Siemens): Scenarios for Future Internet Business@EnergyJosef Weber (Siemens): Scenarios for Future Internet Business@Energy
Josef Weber (Siemens): Scenarios for Future Internet Business@Energy
 
Keith Popplewell, Jenny Harding: Realising the Digital Opportunity: Redesigni...
Keith Popplewell, Jenny Harding: Realising the Digital Opportunity: Redesigni...Keith Popplewell, Jenny Harding: Realising the Digital Opportunity: Redesigni...
Keith Popplewell, Jenny Harding: Realising the Digital Opportunity: Redesigni...
 
Josema Cavanillas: An industry view on Future Internet Businesses
Josema Cavanillas: An industry view on Future Internet BusinessesJosema Cavanillas: An industry view on Future Internet Businesses
Josema Cavanillas: An industry view on Future Internet Businesses
 
Ingrid Moerman, Stefan Bouckaert: IP CREW - Cognitive Radio Experimentation ...
Ingrid Moerman, Stefan Bouckaert:  IP CREW - Cognitive Radio Experimentation ...Ingrid Moerman, Stefan Bouckaert:  IP CREW - Cognitive Radio Experimentation ...
Ingrid Moerman, Stefan Bouckaert: IP CREW - Cognitive Radio Experimentation ...
 
Smart Santander
Smart Santander Smart Santander
Smart Santander
 
Ofelia open calls
Ofelia open callsOfelia open calls
Ofelia open calls
 
Julie Marguerite - Tefis open calls (fia dec 2010)
Julie Marguerite - Tefis open calls  (fia dec 2010)Julie Marguerite - Tefis open calls  (fia dec 2010)
Julie Marguerite - Tefis open calls (fia dec 2010)
 
Florian Schreiner: Plans for open calls and offering by BonFIRE
Florian Schreiner: Plans for open calls and offering by BonFIREFlorian Schreiner: Plans for open calls and offering by BonFIRE
Florian Schreiner: Plans for open calls and offering by BonFIRE
 
Jacques Magen - Future Internet Research and Experimentation (FIRE): Successf...
Jacques Magen - Future Internet Research and Experimentation (FIRE): Successf...Jacques Magen - Future Internet Research and Experimentation (FIRE): Successf...
Jacques Magen - Future Internet Research and Experimentation (FIRE): Successf...
 
Obj 1.6 FIRE: Paradiso2 Roger Torrenti
Obj 1.6 FIRE: Paradiso2 Roger Torrenti Obj 1.6 FIRE: Paradiso2 Roger Torrenti
Obj 1.6 FIRE: Paradiso2 Roger Torrenti
 
Mikhail Simonov - The enabling role of the information broker: an example
Mikhail Simonov - The enabling role of the information broker: an example Mikhail Simonov - The enabling role of the information broker: an example
Mikhail Simonov - The enabling role of the information broker: an example
 
J. Cave - Information as an economic good in the future internet
J. Cave - Information as an economic good in the future internetJ. Cave - Information as an economic good in the future internet
J. Cave - Information as an economic good in the future internet
 
Latif Ladid - Ipv6, The two-way internet. The next big thing
Latif Ladid - Ipv6, The two-way internet. The next big thingLatif Ladid - Ipv6, The two-way internet. The next big thing
Latif Ladid - Ipv6, The two-way internet. The next big thing
 
Ranganai Chaparadza: Can Autonomicity help Migration, and what could be a pos...
Ranganai Chaparadza: Can Autonomicity help Migration, and what could be a pos...Ranganai Chaparadza: Can Autonomicity help Migration, and what could be a pos...
Ranganai Chaparadza: Can Autonomicity help Migration, and what could be a pos...
 

Karen Sollins (MIT, US): Privacy: Can we afford not to?

  • 1. Privacy: Can we afford not to? Dr. Karen Sollins MIT Computer Science and Artificial Intelligence Laboratory FIA Meeting, Gent, Belgium, December 17, 2010
  • 2. What is it about privacy? About The subject: usually a person Identity: set of attributes or claims Separation of inherent or assigned attributes from profiled information Policies about what to share and what not Not about complete isolation
  • 3. Interesting attributes Identification: name, government id number, address, etc. Authorship: linking identity to resources Communication: Others with whom have communicated Usage: Objects, services, and other resources used
  • 4. What if we could not control these? Identification: invasion of privacy, masquerading, failure of business relationships, Authorship: failure of legal contracts, freedom of speech Communication: failure of freedom of association Usage: failure of freedom of thought Consider: requirements of diplomacy, intelligence gathering, proprietary and confidential business Consider: confidentiality of doctor-patient and attorney-client relationships
  • 5. Consequences of Internet devoid of privacy No commercial substrate No social substrate No civil substrate Likely: walled gardens in stove-pipe constructions, privacy only controllable in restricted communities
  • 6. Where does that leave us? Reality: privacy will not be perfect Privacy is not about complete hiding, but controlled sharing with enforcement Privacy will exist in some form, because social, business, and civil arenas cannot exist without them Question: at which layer in the architecture?
  • 7. Which architectural layer? App space: user involvement and control Can be end-to-end Transport: Narrow waist of the architecture – locus of homogeneity VERY difficult to change Below transport: apparent walled gardens, isolation