SlideShare a Scribd company logo
1 of 18
Download to read offline
An Automated Negotiation
Agent for Permission
Management
Tim Baarslag, Centrum Wiskunde & Informatica (CWI)
Alper T. Alan, University of Southampton
Richard Gomer, University of Southampton
Muddasser Alam, University of Oxford
Charith Perera, The Open University
Enrico H. Gerding, University of Southampton
M.C. Schraefel, University of Southampton
AAMAS, Sao Paolo, May 2017
Meaningless consent
Despite being asked to "agree" constantly to terms of service, consent
is not currently "meaningful.”
• It is impossible to read all the terms and conditions
• Even if we read them, they are clouded in legal language and difficult to
understand what it means in practice for most people
• Privacy policies are often high level and do not specify exactly who receives
our personal data how it is being used
• There is often no real choice: it is a take-it-or-leave-it proposition
Why is this important?
• Increasing amount information is being collected
• Browsing
• Social media
• Mobile devices
• Internet of Things
• Potential privacy issues
• Many apps collect personally identifiable information
(PII) such as voice, contacts, browsing history, text
messages, location, etc
• Information is in some cases sold to third parties
• Leads to mistrust and loss of revenue, and e.g. ad
blockers
Current Legal Solutions
• EU Cookie Law, adopted May 2011
• The goal was to `make consumers aware of how information about
them is collected and used online, and give them a choice to allow it
or not' http://www.cookielaw.org/the-cookie-law/
• Issues:
• Not many people understand what cookies are
• Still not clear how information is being used
• Often there is no choice
Opportunities for Agent-Based Research
In the age of big data and the Internet of Things, one can no longer rely
on making all decisions manually. Agents can:
• Elicit privacy preferences
• Make privacy setting recommendations
• Automate privacy decisions
• Negotiate privacy agreements
Negotiating App Permissions
• We developed an Android App with no intrinsic
functionality
• Negotiate access to data in return for “points”
• Represents level of service obtained
• Mined from users’ smartphones: access to all
• Contacts
• Messages
• Apps
• Photos
• Browsing history
Why app permissions?
• Access to very privacy
sensitive content
• Permissions give no
understanding of how
information is used
• Clearly defined domain (compared
to terms and conditions)
• Users are already familiar with this
domain
• Easy to do controlled
experiments
Pre-Study Questionnaire
Users are asked demographics
questions and 3 questions for deriving
of a user’s privacy type using Weston’s
Privacy Segmentation Index:
• Fundamentalists (15%): most
protective of privacy
• Pragmatists (79%): weigh the
potential pros and cons
• Unconcerned (6%)
Negotiation Process
• User gets a “default” setting with a given
set of permission and number of points
• Users can choose what permissions to
share and press “quote” to receive an
offer in terms of points
• Each quote has a small quoting cost,
representing effort when users do this in
real settings
• The user can then accept, press a new
quote, or revisit a previous offer. They
can also turn all permissions off and
receive no points.
The Negotiation Agent
• The agent learns the preferences of the user (more
about it on the next slide)
• Agent negotiates behind the scene by requesting quotes
• Uses Pandora’s algorithm to find optimal negotiation strategy
• Shows the result through as the default setting
• User can accept or continue to negotiation manually
(users are not aware of the agent)
• Treatment 2: randomly chosen default settings.
Learning User Preferences
• Results from previous experiments are used to derive preferences for each
privacy type
• Each negotiation interaction results in a set of linear constraints: e.g.
• If user agrees to share Contacts and Messages for 28 points, we know that:
𝑈 𝐶𝑜𝑛𝑡𝑎𝑐𝑡𝑠 + 𝑀𝑒𝑠𝑠𝑎𝑔𝑒𝑠 ≤ 28
• If users declined such an offer, we derive that:
𝑈 𝐶𝑜𝑛𝑡𝑎𝑐𝑡𝑠 + 𝑀𝑒𝑠𝑠𝑎𝑔𝑒𝑠 ≥ 28
• People of the same type (and even individuals) are not necessarily
consistent, and so we find the utility function which maximises the number
of constraints satisfied
• A user’s privacy type in round 1 is based on “declared” privacy type (from
pre-study questionnaire), and in subsequent rounds is updated based on
how much users actually share
Review Screen
• 3 randomly-selected items of each
category were “shared”
• Users can see exactly what data was
shared
• Users can express whether they regret
their sharing decision for each of the
permissions
Evaluation
14
• Lab study in which participants were asked
to download the app on their own
smartphones
• Deception: any data they shared would be
publicly accessible on a website
• Users go through 8 different points scenario.
• Logged user interactions, post-questionnaire
and semi-structured interviews
• In total 66 students took part in the study,
and received cash between £5 and £10
depending on the overall points earned
Results: Accuracy
Results:
sharing and
sensitivity
• Sharing percentages
and retrospective
feelings are comparable
• User behavior is aligned
with their privacy
preferences
Main Results
• Our results show that the agent can accurately automate privacy
decisions on user behalf in line with normal user behavior
• However, the analysis of NASA TLX show that agent does not cause
less overhead
• However, regret is very similar (proportional with amount shared)
Conclusions and Future Work
• Privacy increasingly important in the era of Big Data and the Internet of
Things
• Negotiation allows for fine-grained agreements, as opposed to the current
take-it-or-leave-it approaches
• This work presents the initial steps towards achieving meaningful consent
while minimising user bother
• Future work:
• Include the uses of data (the recipient, retention period, purpose, quality, and
privacy risks) as part of the negotiation domain
• Include more meaningful classification of data (location, time of day, and relation to
other people)
• Personalized preference models and incremental elicitation
• Transfer between different applications/devices, e.g. IoT

More Related Content

What's hot

8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things PayamBarnaghi
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so farPayamBarnaghi
 
KM - Cognitive Computing overview by Ken Martin 13Apr2016
KM - Cognitive Computing overview by Ken Martin 13Apr2016KM - Cognitive Computing overview by Ken Martin 13Apr2016
KM - Cognitive Computing overview by Ken Martin 13Apr2016HCL Technologies
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
Governance of Big Data
Governance of Big DataGovernance of Big Data
Governance of Big DataAlberto Asquer
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Privacy-preserving Analytics and Data Mining at LinkedIn
Privacy-preserving Analytics and Data Mining at LinkedInPrivacy-preserving Analytics and Data Mining at LinkedIn
Privacy-preserving Analytics and Data Mining at LinkedInKrishnaram Kenthapadi
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AIAhmed Banafa
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Datarobkitchin
 
Secure and Smart IoT in Energy Sector
Secure and Smart IoT in Energy Sector Secure and Smart IoT in Energy Sector
Secure and Smart IoT in Energy Sector Ahmed Banafa
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data AnalyticsEMC
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoTW. David Stephenson
 

What's hot (20)

8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things Information Engineering in the Age of the Internet of Things
Information Engineering in the Age of the Internet of Things
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
KM - Cognitive Computing overview by Ken Martin 13Apr2016
KM - Cognitive Computing overview by Ken Martin 13Apr2016KM - Cognitive Computing overview by Ken Martin 13Apr2016
KM - Cognitive Computing overview by Ken Martin 13Apr2016
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Governance of Big Data
Governance of Big DataGovernance of Big Data
Governance of Big Data
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Privacy-preserving Analytics and Data Mining at LinkedIn
Privacy-preserving Analytics and Data Mining at LinkedInPrivacy-preserving Analytics and Data Mining at LinkedIn
Privacy-preserving Analytics and Data Mining at LinkedIn
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
Secure and Smart IoT in Energy Sector
Secure and Smart IoT in Energy Sector Secure and Smart IoT in Energy Sector
Secure and Smart IoT in Energy Sector
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Four essential truths of the IoT
Four essential truths of the IoTFour essential truths of the IoT
Four essential truths of the IoT
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 

Similar to AAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil

Ethics of personalized information filtering
Ethics of personalized information filteringEthics of personalized information filtering
Ethics of personalized information filteringAnsgar Koene
 
AI and us communicating for algorithmic bias awareness
AI and us communicating for algorithmic bias awarenessAI and us communicating for algorithmic bias awareness
AI and us communicating for algorithmic bias awarenessAnsgar Koene
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknownsLisa Marie Martinez
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyJason Hong
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
 
Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online caniceconsulting
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Intro to Demand-Driven Open Data for Data Owners
Intro to Demand-Driven Open Data for Data OwnersIntro to Demand-Driven Open Data for Data Owners
Intro to Demand-Driven Open Data for Data OwnersDavid Portnoy
 
Data Ethics Framework 2.pptx
Data Ethics Framework 2.pptxData Ethics Framework 2.pptx
Data Ethics Framework 2.pptxUgurKaplancali
 
Engaging with Users on Public Social Media
Engaging with Users on Public Social MediaEngaging with Users on Public Social Media
Engaging with Users on Public Social MediaJeffrey Nichols
 
Maxfield_8e_PPT_Ch09 Survey Research.pptx
Maxfield_8e_PPT_Ch09 Survey Research.pptxMaxfield_8e_PPT_Ch09 Survey Research.pptx
Maxfield_8e_PPT_Ch09 Survey Research.pptxMarcCollazo1
 
Maxfield_8e_PPT_Ch09.pptx
Maxfield_8e_PPT_Ch09.pptxMaxfield_8e_PPT_Ch09.pptx
Maxfield_8e_PPT_Ch09.pptxMarcCollazo1
 
Smart Data Module 3 d drive_external data
Smart Data Module 3 d drive_external dataSmart Data Module 3 d drive_external data
Smart Data Module 3 d drive_external datacaniceconsulting
 
Qualitative Research vs Quantitative Research - a QuestionPro Academic Webinar
Qualitative Research vs Quantitative Research - a QuestionPro Academic WebinarQualitative Research vs Quantitative Research - a QuestionPro Academic Webinar
Qualitative Research vs Quantitative Research - a QuestionPro Academic WebinarQuestionPro
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010James Williams
 
Empathy in Monitoring
Empathy in MonitoringEmpathy in Monitoring
Empathy in MonitoringZenoss
 

Similar to AAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil (20)

Ethics of personalized information filtering
Ethics of personalized information filteringEthics of personalized information filtering
Ethics of personalized information filtering
 
AI and us communicating for algorithmic bias awareness
AI and us communicating for algorithmic bias awarenessAI and us communicating for algorithmic bias awareness
AI and us communicating for algorithmic bias awareness
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
 
Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online Module 3 - Improving Current Business with External Data- Online
Module 3 - Improving Current Business with External Data- Online
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Intro to Demand-Driven Open Data for Data Owners
Intro to Demand-Driven Open Data for Data OwnersIntro to Demand-Driven Open Data for Data Owners
Intro to Demand-Driven Open Data for Data Owners
 
Lsntap triage and expert systems slides
Lsntap triage and expert systems slidesLsntap triage and expert systems slides
Lsntap triage and expert systems slides
 
Data Ethics Framework 2.pptx
Data Ethics Framework 2.pptxData Ethics Framework 2.pptx
Data Ethics Framework 2.pptx
 
Engaging with Users on Public Social Media
Engaging with Users on Public Social MediaEngaging with Users on Public Social Media
Engaging with Users on Public Social Media
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
Maxfield_8e_PPT_Ch09 Survey Research.pptx
Maxfield_8e_PPT_Ch09 Survey Research.pptxMaxfield_8e_PPT_Ch09 Survey Research.pptx
Maxfield_8e_PPT_Ch09 Survey Research.pptx
 
Maxfield_8e_PPT_Ch09.pptx
Maxfield_8e_PPT_Ch09.pptxMaxfield_8e_PPT_Ch09.pptx
Maxfield_8e_PPT_Ch09.pptx
 
Smart Data Module 3 d drive_external data
Smart Data Module 3 d drive_external dataSmart Data Module 3 d drive_external data
Smart Data Module 3 d drive_external data
 
Qualitative Research vs Quantitative Research - a QuestionPro Academic Webinar
Qualitative Research vs Quantitative Research - a QuestionPro Academic WebinarQualitative Research vs Quantitative Research - a QuestionPro Academic Webinar
Qualitative Research vs Quantitative Research - a QuestionPro Academic Webinar
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010
 
Empathy in Monitoring
Empathy in MonitoringEmpathy in Monitoring
Empathy in Monitoring
 

More from Charith Perera

SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...
SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...
SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...Charith Perera
 
UCC-2016, 6-9 May December, Shanghai, China
UCC-2016, 6-9 May December, Shanghai, ChinaUCC-2016, 6-9 May December, Shanghai, China
UCC-2016, 6-9 May December, Shanghai, ChinaCharith Perera
 
Privacy Mindset for Developing Internet of Things Applications for Social Sen...
Privacy Mindset for Developing Internet of Things Applications for Social Sen...Privacy Mindset for Developing Internet of Things Applications for Social Sen...
Privacy Mindset for Developing Internet of Things Applications for Social Sen...Charith Perera
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, GermanyCharith Perera
 
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United StatesSEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United StatesCharith Perera
 
IS-EUD-2015, Madrid, Spain, 27 May 2015
IS-EUD-2015, Madrid, Spain, 27 May 2015IS-EUD-2015, Madrid, Spain, 27 May 2015
IS-EUD-2015, Madrid, Spain, 27 May 2015Charith Perera
 
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014Charith Perera
 
HICSS-2014-Big Island, Hawaii, United States, 08 January 2014
HICSS-2014-Big Island, Hawaii, United States, 08 January 2014HICSS-2014-Big Island, Hawaii, United States, 08 January 2014
HICSS-2014-Big Island, Hawaii, United States, 08 January 2014Charith Perera
 
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013 COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013 Charith Perera
 
SKG-2013, Beijing, China, 03 October 2013
SKG-2013, Beijing, China, 03 October 2013SKG-2013, Beijing, China, 03 October 2013
SKG-2013, Beijing, China, 03 October 2013Charith Perera
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013Charith Perera
 
ACC-2012, Bangalore, India, 28 July, 2012
ACC-2012, Bangalore, India, 28 July, 2012ACC-2012, Bangalore, India, 28 July, 2012
ACC-2012, Bangalore, India, 28 July, 2012Charith Perera
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012Charith Perera
 
PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012Charith Perera
 
iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012Charith Perera
 

More from Charith Perera (15)

SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...
SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...
SL2College: Undergraduate Research and higher Education, March 2017, Peradeni...
 
UCC-2016, 6-9 May December, Shanghai, China
UCC-2016, 6-9 May December, Shanghai, ChinaUCC-2016, 6-9 May December, Shanghai, China
UCC-2016, 6-9 May December, Shanghai, China
 
Privacy Mindset for Developing Internet of Things Applications for Social Sen...
Privacy Mindset for Developing Internet of Things Applications for Social Sen...Privacy Mindset for Developing Internet of Things Applications for Social Sen...
Privacy Mindset for Developing Internet of Things Applications for Social Sen...
 
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United StatesSEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
SEAMS-2016, 16-17 May, 2016, Austin, Texas, United States
 
IS-EUD-2015, Madrid, Spain, 27 May 2015
IS-EUD-2015, Madrid, Spain, 27 May 2015IS-EUD-2015, Madrid, Spain, 27 May 2015
IS-EUD-2015, Madrid, Spain, 27 May 2015
 
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014
 
HICSS-2014-Big Island, Hawaii, United States, 08 January 2014
HICSS-2014-Big Island, Hawaii, United States, 08 January 2014HICSS-2014-Big Island, Hawaii, United States, 08 January 2014
HICSS-2014-Big Island, Hawaii, United States, 08 January 2014
 
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013 COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
 
SKG-2013, Beijing, China, 03 October 2013
SKG-2013, Beijing, China, 03 October 2013SKG-2013, Beijing, China, 03 October 2013
SKG-2013, Beijing, China, 03 October 2013
 
MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013MDM-2013, Milan, Italy, 6 June, 2013
MDM-2013, Milan, Italy, 6 June, 2013
 
ACC-2012, Bangalore, India, 28 July, 2012
ACC-2012, Bangalore, India, 28 July, 2012ACC-2012, Bangalore, India, 28 July, 2012
ACC-2012, Bangalore, India, 28 July, 2012
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
 
PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012PIMRC-2012, Sydney, Australia, 28 July, 2012
PIMRC-2012, Sydney, Australia, 28 July, 2012
 
iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

AAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil

  • 1. An Automated Negotiation Agent for Permission Management Tim Baarslag, Centrum Wiskunde & Informatica (CWI) Alper T. Alan, University of Southampton Richard Gomer, University of Southampton Muddasser Alam, University of Oxford Charith Perera, The Open University Enrico H. Gerding, University of Southampton M.C. Schraefel, University of Southampton AAMAS, Sao Paolo, May 2017
  • 2.
  • 3. Meaningless consent Despite being asked to "agree" constantly to terms of service, consent is not currently "meaningful.” • It is impossible to read all the terms and conditions • Even if we read them, they are clouded in legal language and difficult to understand what it means in practice for most people • Privacy policies are often high level and do not specify exactly who receives our personal data how it is being used • There is often no real choice: it is a take-it-or-leave-it proposition
  • 4. Why is this important? • Increasing amount information is being collected • Browsing • Social media • Mobile devices • Internet of Things • Potential privacy issues • Many apps collect personally identifiable information (PII) such as voice, contacts, browsing history, text messages, location, etc • Information is in some cases sold to third parties • Leads to mistrust and loss of revenue, and e.g. ad blockers
  • 5. Current Legal Solutions • EU Cookie Law, adopted May 2011 • The goal was to `make consumers aware of how information about them is collected and used online, and give them a choice to allow it or not' http://www.cookielaw.org/the-cookie-law/ • Issues: • Not many people understand what cookies are • Still not clear how information is being used • Often there is no choice
  • 6. Opportunities for Agent-Based Research In the age of big data and the Internet of Things, one can no longer rely on making all decisions manually. Agents can: • Elicit privacy preferences • Make privacy setting recommendations • Automate privacy decisions • Negotiate privacy agreements
  • 7. Negotiating App Permissions • We developed an Android App with no intrinsic functionality • Negotiate access to data in return for “points” • Represents level of service obtained • Mined from users’ smartphones: access to all • Contacts • Messages • Apps • Photos • Browsing history
  • 8. Why app permissions? • Access to very privacy sensitive content • Permissions give no understanding of how information is used • Clearly defined domain (compared to terms and conditions) • Users are already familiar with this domain • Easy to do controlled experiments
  • 9. Pre-Study Questionnaire Users are asked demographics questions and 3 questions for deriving of a user’s privacy type using Weston’s Privacy Segmentation Index: • Fundamentalists (15%): most protective of privacy • Pragmatists (79%): weigh the potential pros and cons • Unconcerned (6%)
  • 10. Negotiation Process • User gets a “default” setting with a given set of permission and number of points • Users can choose what permissions to share and press “quote” to receive an offer in terms of points • Each quote has a small quoting cost, representing effort when users do this in real settings • The user can then accept, press a new quote, or revisit a previous offer. They can also turn all permissions off and receive no points.
  • 11. The Negotiation Agent • The agent learns the preferences of the user (more about it on the next slide) • Agent negotiates behind the scene by requesting quotes • Uses Pandora’s algorithm to find optimal negotiation strategy • Shows the result through as the default setting • User can accept or continue to negotiation manually (users are not aware of the agent) • Treatment 2: randomly chosen default settings.
  • 12. Learning User Preferences • Results from previous experiments are used to derive preferences for each privacy type • Each negotiation interaction results in a set of linear constraints: e.g. • If user agrees to share Contacts and Messages for 28 points, we know that: 𝑈 𝐶𝑜𝑛𝑡𝑎𝑐𝑡𝑠 + 𝑀𝑒𝑠𝑠𝑎𝑔𝑒𝑠 ≤ 28 • If users declined such an offer, we derive that: 𝑈 𝐶𝑜𝑛𝑡𝑎𝑐𝑡𝑠 + 𝑀𝑒𝑠𝑠𝑎𝑔𝑒𝑠 ≥ 28 • People of the same type (and even individuals) are not necessarily consistent, and so we find the utility function which maximises the number of constraints satisfied • A user’s privacy type in round 1 is based on “declared” privacy type (from pre-study questionnaire), and in subsequent rounds is updated based on how much users actually share
  • 13. Review Screen • 3 randomly-selected items of each category were “shared” • Users can see exactly what data was shared • Users can express whether they regret their sharing decision for each of the permissions
  • 14. Evaluation 14 • Lab study in which participants were asked to download the app on their own smartphones • Deception: any data they shared would be publicly accessible on a website • Users go through 8 different points scenario. • Logged user interactions, post-questionnaire and semi-structured interviews • In total 66 students took part in the study, and received cash between £5 and £10 depending on the overall points earned
  • 16. Results: sharing and sensitivity • Sharing percentages and retrospective feelings are comparable • User behavior is aligned with their privacy preferences
  • 17. Main Results • Our results show that the agent can accurately automate privacy decisions on user behalf in line with normal user behavior • However, the analysis of NASA TLX show that agent does not cause less overhead • However, regret is very similar (proportional with amount shared)
  • 18. Conclusions and Future Work • Privacy increasingly important in the era of Big Data and the Internet of Things • Negotiation allows for fine-grained agreements, as opposed to the current take-it-or-leave-it approaches • This work presents the initial steps towards achieving meaningful consent while minimising user bother • Future work: • Include the uses of data (the recipient, retention period, purpose, quality, and privacy risks) as part of the negotiation domain • Include more meaningful classification of data (location, time of day, and relation to other people) • Personalized preference models and incremental elicitation • Transfer between different applications/devices, e.g. IoT