SlideShare una empresa de Scribd logo
1 de 9
Privacy in a digital world
Rob Kitchin
NIRSA, National University of Ireland Maynooth
Introduction
• Digital footprints (data individuals leave behind)
• Data shadows (information about individuals generated by
others)
• Unique IDs for people, institutions, objects, interactions,
transactions and territories
• Increasingly being harvested, combined, analyzed, acted
upon
Fair Information Practice Principles
Principle Description
Notice Individuals are informed that data are being generated and the
purpose to which the data will be put
Choice Individuals have the choice to opt-in or opt-out as to whether and
how their data will be used or disclosed
Consent Data are only generated and disclosed with the consent of
individuals
Security Data are protected from loss, misuse, unauthorized access,
disclosure, alteration and destruction
Integrity Data are reliable, accurate, complete and current
Access Individuals can access, check and verify data about themselves
Accountability The data holder is accountable for ensuring the above principles
and has mechanisms in place to assure compliance
Data type Data collected by Uber android app (from Hein 2014)
Accounts log email log
App Activity name, package name, process number of activity, processed id
App Data Usage Cache size, code size, data size, name, package name
App Install installed at, name, package name, unknown sources enabled, version code, version
name
Battery health, level, plugged, present, scale, status, technology, temperature, voltage
Device Info board, brand, build version, cell number, device, device type, display, fingerprint, IP,
MAC address, manufacturer, model, OS platform, product, SDK code, total disk
space, unknown sources enabled
GPS accuracy, altitude, latitude, longitude, provider, speed
MMS from number, MMS at, MMS type, service number, to number
NetData bytes received, bytes sent, connection type, interface type
PhoneCall call duration, called at, from number, phone call type, to number
SMS from number, service number, SMS at, SMS type, to number
TelephonyInfo cell tower ID, cell tower latitude, cell tower longitude, IMEI, ISO country code, local
area code, MEID, mobile country code, mobile network code, network name,
network type, phone type, SIM serial number, SIM state, subscriber ID
WifiConnection BSSID, IP, linkspeed, MAC addr, network ID, RSSI, SSID
WifiNeighbors BSSID, capabilities, frequency, level, SSID
Root Check root status code, root status reason code, root version, sig file version
Malware Info algorithm confidence, app list, found malware, malware SDK version, package list,
reason code, service list, sigfile version
A Taxonomy of Privacy (compiled from Solove 2006)
Domain Privacy breach Description
Information
Collection
Surveillance Watching, listening to, or recording of an individual’s activities
Interrogation Various forms of questioning or probing for information
Information
Processing
Aggregation The combination of various pieces of data about a person
Identification Linking information to particular individuals
Insecurity Carelessness in protecting stored information from leaks and
improper access
Secondary Use Use of information collected for one purpose for a different
purpose without the data subject’s consent
Exclusion Failure to allow the data subject to know about the data that others
have about her and participate in its handling and use, including
being barred from being able to access and correct errors
Information
Dissemination
Breach of Confidentiality Breaking a promise to keep a person’s information confidential
Disclosure Revelation of information about a person that impacts the way
others judge her character
Exposure Revealing another’s nudity, grief, or bodily functions
Increased Accessibility Amplifying the accessibility of information
Blackmail Threat to disclose personal information
Appropriation The use of the data subject’s identity to serve the aims and
interests of another
Distortion Dissemination of false or misleading information about individuals
Invasion Intrusion Invasive acts that disturb one’s tranquillity or solitude
Decisional Interference Incursion into the data subject’s decisions regarding her private
Loss of privacy effects
• Extensive dataveillance/surveillance
• social sorting
• control creep
• dynamic pricing
• anticipatory governance
• data security/protection – cybercrimes
The principles of Privacy by Design
Principle Description
Proactive not reactive;
preventative not remedial
IT systems should seek to anticipate privacy concerns rather
than seeking to resolve privacy infractions once they have
incurred
Privacy as the default
setting
Privacy is automatically protected and does not require action
on behalf of an individual
Privacy embedded into
design
Privacy protections are core features of the design and
architecture of IT systems and is not and bolt-on feature
Full functionality -
positive-sum, not zero-sum
All legitimate interests and objectives are accommodated,
rather than there being trade-offs between privacy and other
considerations such as security
End-to-end security - full
lifecycle protection
Privacy is embedded into the system from ingestion to disposal
Visibility and
transparency - keep it
open
Component parts and operations are visible and transparent to
users and providers alike and are subject to independent
verification
Respect for user privacy -
keep it user-centric
A system should be built around, protect the interests, and
empower individuals
Conclusion
• Privacy is multidimensional in nature
• Notions & practices of privacy are changing rapidly
• Has all kinds of direct and indirect effects
• Technology & industry are running ahead of legislators;
as are states
• There is no teleological inevitability to the emerging
privacy landscape
• It is incumbent on states to address privacy issues and
to find a balance with respect to interests of citizens,
states and industry
Rob.Kitchin@nuim.ie
@robkitchin
http://www.nuim.ie/progcity
@progcity

Más contenido relacionado

La actualidad más candente

Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project DIPRC2019
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
[2011] Integrated Legislation Information Management System - Igor Andonovski
[2011] Integrated Legislation Information Management System - Igor Andonovski[2011] Integrated Legislation Information Management System - Igor Andonovski
[2011] Integrated Legislation Information Management System - Igor Andonovskie-Democracy Conference
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsDennis Jacob
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and InvestigationNeha Raju k
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Neha Raju k
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research DirectionsDavide Nardone
 
Iot enabled technologies
Iot enabled technologiesIot enabled technologies
Iot enabled technologiesShilpaKrishna6
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSChidiogo Mbonu
 

La actualidad más candente (20)

Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
 
Me and My Big Data Project
Me and My Big Data Project Me and My Big Data Project
Me and My Big Data Project
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
[2011] Integrated Legislation Information Management System - Igor Andonovski
[2011] Integrated Legislation Information Management System - Igor Andonovski[2011] Integrated Legislation Information Management System - Igor Andonovski
[2011] Integrated Legislation Information Management System - Igor Andonovski
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
Computer forensics and Investigation
Computer forensics and InvestigationComputer forensics and Investigation
Computer forensics and Investigation
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2Computer forensics and investigation module 1 topic 2
Computer forensics and investigation module 1 topic 2
 
Iot and ethics
Iot and ethicsIot and ethics
Iot and ethics
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
 
S719a
S719aS719a
S719a
 
Iot enabled technologies
Iot enabled technologiesIot enabled technologies
Iot enabled technologies
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 

Destacado

Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)Mainard Gallagher
 
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...robkitchin
 
Code acts in code/space
Code acts in code/spaceCode acts in code/space
Code acts in code/spacerobkitchin
 
Big Data: Implications for Marketing and Strategy
Big Data: Implications for Marketing and StrategyBig Data: Implications for Marketing and Strategy
Big Data: Implications for Marketing and StrategyC.K. Kumar
 
C6 deploying applications to your private cloud 7 to 10 times faster
C6   deploying applications to your private cloud 7 to 10 times fasterC6   deploying applications to your private cloud 7 to 10 times faster
C6 deploying applications to your private cloud 7 to 10 times fasterDr. Wilfred Lin (Ph.D.)
 
A7 getting value from big data how to get there quickly and leverage your c...
A7   getting value from big data how to get there quickly and leverage your c...A7   getting value from big data how to get there quickly and leverage your c...
A7 getting value from big data how to get there quickly and leverage your c...Dr. Wilfred Lin (Ph.D.)
 
Large-scale digitisation options at the Natural History Museum, London.
Large-scale digitisation options at the Natural History Museum, London.Large-scale digitisation options at the Natural History Museum, London.
Large-scale digitisation options at the Natural History Museum, London.Vince Smith
 
Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)robkitchin
 
Methodological principles in dealing with Big Data, Reijo Sund
Methodological principles in dealing with Big Data, Reijo SundMethodological principles in dealing with Big Data, Reijo Sund
Methodological principles in dealing with Big Data, Reijo SundTilastokeskus
 
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...robkitchin
 
Big data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shiftsBig data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shiftsrobkitchin
 
Praxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin DashboardPraxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin Dashboardrobkitchin
 
Dublin dashboard launch
Dublin dashboard launchDublin dashboard launch
Dublin dashboard launchrobkitchin
 
Big data and smart cities: Key data issues
Big data and smart cities: Key data issuesBig data and smart cities: Key data issues
Big data and smart cities: Key data issuesrobkitchin
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internetxtin101
 
Chapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile DevicesChapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile Devicesxtin101
 
Smart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perilsSmart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perilsrobkitchin
 

Destacado (20)

Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
Rob Kitchin Smart Cities 08th March 2016 (Smart Dublin)
 
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
Urban indicators, city benchmarking, and real time dashboards: Knowing and go...
 
Code acts in code/space
Code acts in code/spaceCode acts in code/space
Code acts in code/space
 
Big Data: Implications for Marketing and Strategy
Big Data: Implications for Marketing and StrategyBig Data: Implications for Marketing and Strategy
Big Data: Implications for Marketing and Strategy
 
C6 deploying applications to your private cloud 7 to 10 times faster
C6   deploying applications to your private cloud 7 to 10 times fasterC6   deploying applications to your private cloud 7 to 10 times faster
C6 deploying applications to your private cloud 7 to 10 times faster
 
Git Internals
Git InternalsGit Internals
Git Internals
 
A7 getting value from big data how to get there quickly and leverage your c...
A7   getting value from big data how to get there quickly and leverage your c...A7   getting value from big data how to get there quickly and leverage your c...
A7 getting value from big data how to get there quickly and leverage your c...
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Large-scale digitisation options at the Natural History Museum, London.
Large-scale digitisation options at the Natural History Museum, London.Large-scale digitisation options at the Natural History Museum, London.
Large-scale digitisation options at the Natural History Museum, London.
 
Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)Data-driven urbanism (Amsterdam, Jan 2017)
Data-driven urbanism (Amsterdam, Jan 2017)
 
Methodological principles in dealing with Big Data, Reijo Sund
Methodological principles in dealing with Big Data, Reijo SundMethodological principles in dealing with Big Data, Reijo Sund
Methodological principles in dealing with Big Data, Reijo Sund
 
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
The Impact of the Data Revolution on Official Statistics: Opportunities, Chal...
 
Big data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shiftsBig data, new epistemologies and paradigm shifts
Big data, new epistemologies and paradigm shifts
 
Praxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin DashboardPraxis and politics of urban data: Building the Dublin Dashboard
Praxis and politics of urban data: Building the Dublin Dashboard
 
Dublin dashboard launch
Dublin dashboard launchDublin dashboard launch
Dublin dashboard launch
 
Big data and smart cities: Key data issues
Big data and smart cities: Key data issuesBig data and smart cities: Key data issues
Big data and smart cities: Key data issues
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internet
 
Chapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile DevicesChapter 06 Inside Computers and Mobile Devices
Chapter 06 Inside Computers and Mobile Devices
 
Big Search with Big Data Principles
Big Search with Big Data PrinciplesBig Search with Big Data Principles
Big Search with Big Data Principles
 
Smart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perilsSmart cities: realising the promises while minimizing the perils
Smart cities: realising the promises while minimizing the perils
 

Similar a Privacy in a digital world

Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Dr. Prashant Vats
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfNikhil Khunteta
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...CREST @ University of Adelaide
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howlandnado-web
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docxMohsin Abbas
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 

Similar a Privacy in a digital world (20)

Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Mobileprivacyazahir
MobileprivacyazahirMobileprivacyazahir
Mobileprivacyazahir
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howland
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Data security
Data securityData security
Data security
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 

Más de robkitchin

The right to the smart city
The right to the smart cityThe right to the smart city
The right to the smart cityrobkitchin
 
Adoption gap issues in smart cities
Adoption gap issues in smart citiesAdoption gap issues in smart cities
Adoption gap issues in smart citiesrobkitchin
 
Citizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart CityCitizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart Cityrobkitchin
 
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...robkitchin
 
Planning in an era of smart urbanism
Planning in an era of smart urbanismPlanning in an era of smart urbanism
Planning in an era of smart urbanismrobkitchin
 
Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...robkitchin
 
Funding models for open access digital repositories
Funding models for open access digital repositoriesFunding models for open access digital repositories
Funding models for open access digital repositoriesrobkitchin
 
Housing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to CrisisHousing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to Crisisrobkitchin
 
Smart cities, big data & their consequences
Smart cities, big data & their consequencesSmart cities, big data & their consequences
Smart cities, big data & their consequencesrobkitchin
 
The crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsThe crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsrobkitchin
 

Más de robkitchin (10)

The right to the smart city
The right to the smart cityThe right to the smart city
The right to the smart city
 
Adoption gap issues in smart cities
Adoption gap issues in smart citiesAdoption gap issues in smart cities
Adoption gap issues in smart cities
 
Citizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart CityCitizenship, social justice, and the Right to the Smart City
Citizenship, social justice, and the Right to the Smart City
 
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
Being a ‘citizen’ in the smart city: Up and down the scaffold of smart citize...
 
Planning in an era of smart urbanism
Planning in an era of smart urbanismPlanning in an era of smart urbanism
Planning in an era of smart urbanism
 
Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...Why the National Spatial Strategy failed and prospects for the National Plann...
Why the National Spatial Strategy failed and prospects for the National Plann...
 
Funding models for open access digital repositories
Funding models for open access digital repositoriesFunding models for open access digital repositories
Funding models for open access digital repositories
 
Housing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to CrisisHousing in Ireland: From Crisis to Crisis
Housing in Ireland: From Crisis to Crisis
 
Smart cities, big data & their consequences
Smart cities, big data & their consequencesSmart cities, big data & their consequences
Smart cities, big data & their consequences
 
The crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and mapsThe crisis in Ireland in graphs and maps
The crisis in Ireland in graphs and maps
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Privacy in a digital world

  • 1. Privacy in a digital world Rob Kitchin NIRSA, National University of Ireland Maynooth
  • 2. Introduction • Digital footprints (data individuals leave behind) • Data shadows (information about individuals generated by others) • Unique IDs for people, institutions, objects, interactions, transactions and territories • Increasingly being harvested, combined, analyzed, acted upon
  • 3. Fair Information Practice Principles Principle Description Notice Individuals are informed that data are being generated and the purpose to which the data will be put Choice Individuals have the choice to opt-in or opt-out as to whether and how their data will be used or disclosed Consent Data are only generated and disclosed with the consent of individuals Security Data are protected from loss, misuse, unauthorized access, disclosure, alteration and destruction Integrity Data are reliable, accurate, complete and current Access Individuals can access, check and verify data about themselves Accountability The data holder is accountable for ensuring the above principles and has mechanisms in place to assure compliance
  • 4. Data type Data collected by Uber android app (from Hein 2014) Accounts log email log App Activity name, package name, process number of activity, processed id App Data Usage Cache size, code size, data size, name, package name App Install installed at, name, package name, unknown sources enabled, version code, version name Battery health, level, plugged, present, scale, status, technology, temperature, voltage Device Info board, brand, build version, cell number, device, device type, display, fingerprint, IP, MAC address, manufacturer, model, OS platform, product, SDK code, total disk space, unknown sources enabled GPS accuracy, altitude, latitude, longitude, provider, speed MMS from number, MMS at, MMS type, service number, to number NetData bytes received, bytes sent, connection type, interface type PhoneCall call duration, called at, from number, phone call type, to number SMS from number, service number, SMS at, SMS type, to number TelephonyInfo cell tower ID, cell tower latitude, cell tower longitude, IMEI, ISO country code, local area code, MEID, mobile country code, mobile network code, network name, network type, phone type, SIM serial number, SIM state, subscriber ID WifiConnection BSSID, IP, linkspeed, MAC addr, network ID, RSSI, SSID WifiNeighbors BSSID, capabilities, frequency, level, SSID Root Check root status code, root status reason code, root version, sig file version Malware Info algorithm confidence, app list, found malware, malware SDK version, package list, reason code, service list, sigfile version
  • 5. A Taxonomy of Privacy (compiled from Solove 2006) Domain Privacy breach Description Information Collection Surveillance Watching, listening to, or recording of an individual’s activities Interrogation Various forms of questioning or probing for information Information Processing Aggregation The combination of various pieces of data about a person Identification Linking information to particular individuals Insecurity Carelessness in protecting stored information from leaks and improper access Secondary Use Use of information collected for one purpose for a different purpose without the data subject’s consent Exclusion Failure to allow the data subject to know about the data that others have about her and participate in its handling and use, including being barred from being able to access and correct errors Information Dissemination Breach of Confidentiality Breaking a promise to keep a person’s information confidential Disclosure Revelation of information about a person that impacts the way others judge her character Exposure Revealing another’s nudity, grief, or bodily functions Increased Accessibility Amplifying the accessibility of information Blackmail Threat to disclose personal information Appropriation The use of the data subject’s identity to serve the aims and interests of another Distortion Dissemination of false or misleading information about individuals Invasion Intrusion Invasive acts that disturb one’s tranquillity or solitude Decisional Interference Incursion into the data subject’s decisions regarding her private
  • 6. Loss of privacy effects • Extensive dataveillance/surveillance • social sorting • control creep • dynamic pricing • anticipatory governance • data security/protection – cybercrimes
  • 7. The principles of Privacy by Design Principle Description Proactive not reactive; preventative not remedial IT systems should seek to anticipate privacy concerns rather than seeking to resolve privacy infractions once they have incurred Privacy as the default setting Privacy is automatically protected and does not require action on behalf of an individual Privacy embedded into design Privacy protections are core features of the design and architecture of IT systems and is not and bolt-on feature Full functionality - positive-sum, not zero-sum All legitimate interests and objectives are accommodated, rather than there being trade-offs between privacy and other considerations such as security End-to-end security - full lifecycle protection Privacy is embedded into the system from ingestion to disposal Visibility and transparency - keep it open Component parts and operations are visible and transparent to users and providers alike and are subject to independent verification Respect for user privacy - keep it user-centric A system should be built around, protect the interests, and empower individuals
  • 8. Conclusion • Privacy is multidimensional in nature • Notions & practices of privacy are changing rapidly • Has all kinds of direct and indirect effects • Technology & industry are running ahead of legislators; as are states • There is no teleological inevitability to the emerging privacy landscape • It is incumbent on states to address privacy issues and to find a balance with respect to interests of citizens, states and industry