20
Privacy Research Paradigms in Computer Science Seda Gürses MCC / ILI/ ISTC Social Computing NYU 1 Thursday, February 5, 15

Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

Embed Size (px)

Citation preview

Page 1: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

Privacy Research Paradigms in

Computer ScienceSeda Gürses

MCC / ILI/ ISTC Social Computing

NYU

1Thursday, February 5, 15

Page 2: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

2

2Thursday, February 5, 15

Page 3: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

solutions from privacy research

3

storage privacy anonymous

communications database anonymization

IDMS

differential Privacy

privacy policy languages

Feedback and Awareness

Systems

attribute based credentials

discrimination aware data mining

private information

retrieval

3Thursday, February 5, 15

Page 4: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

privacy research paradigms

privacy as

confidentiality

the right to be let alone. Warren & Brandeis (1890)

concealing information and/or identity (by default)

anonymous communications

storage privacy

4

differential privacy

private information

retrieval

attribute based credentials

4Thursday, February 5, 15

Page 5: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

privacy research paradigms

privacy as

confidentiality

the right to be let alone. Warren & Brandeis (1890)

concealing information and/or identity (by default)

5

distributed trust model: avoid single point of failure

data minimization: every bit counts

open source: it takes a village to keep it secure

5Thursday, February 5, 15

Page 6: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

privacy research paradigms

privacy as

confidentiality

the right to be let alone. Warren & Brandeis (1890)

concealing information and identity

privacy as control

personal information, FIPPs, transparency

right of the individual to decide what information about himself should be communicated to others and under what circumstances. (Westin 1970)

6

6Thursday, February 5, 15

Page 7: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

privacy research paradigms

privacy as control

FIPPs, organizational compliance, data subject participation

right of the individual to decide what information about himself should be communicated to others and under what circumstances. (Westin 1970)

IDMS

Privacy Policy Languages

Privacy Settings

Purpose Based Access

Control

7

database anonymization

Privacy Labels/Signals

7Thursday, February 5, 15

Page 8: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

privacy research paradigms

privacy as control

right of the individual to decide what information about himself should be communicated to others and under what circumstances. (Westin 1970)

8

transparency

individual participation

data minimization (diff. trust model)

(DHS) FIPPsFIPPs, organizational compliance, data subject participation

8Thursday, February 5, 15

Page 9: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

identity management

9

9Thursday, February 5, 15

Page 10: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

privacy policies

10

10Thursday, February 5, 15

Page 11: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

privacy research paradigms

privacy as practice

the freedom from unreasonable constraints on the construction of

one’s own identity (Agre, 1999)transparency and feedback

Feedback and Awareness

Systems Discrimination aware data mining

privacy nudges

11

11Thursday, February 5, 15

Page 12: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

privacy research paradigms

privacy as practice

the freedom from unreasonable constraints on the construction of

one’s own identity (Agre, 1999)transparency and feedback

12

aid in privacy decision making and nudges

salient controls according to user expectations

support collective practices throughout time

12Thursday, February 5, 15

Page 13: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

13Thursday, February 5, 15

Page 14: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

14Thursday, February 5, 15

Page 15: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

15Thursday, February 5, 15

Page 16: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

16Thursday, February 5, 15

Page 17: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

privacy research paradigms

privacy as practice

the freedom from unreasonable constraints on the construction of

one’s own identity (Agre, 1999)transparency and feedback

privacy as

confidentiality

the right to be let alone. Warren & Brandeis (1890)

concealing information and identity

privacy as control separation of

identities, FIPPs

right of the individual to decide what information about himself should be communicated to others and under what circumstances. (Westin 1970)

17

17Thursday, February 5, 15

Page 18: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

18

service provider implements part: private information retrievalattribute based credentials

autonomous applications: pgpghostery

collaborative applications: distributed SNSTORmulti-party computationopen standards?

dependent solely on service provider:privacy settings on social networkinfo privacy

legislation

priv

acy

func

tiona

lity

depe

nden

cy o

n se

rvic

e pr

ovid

er

18Thursday, February 5, 15

Page 19: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

19

people-centric

familyfriendscommunitiescitizensconsumers

infrastructure/techno-centricstandard protocolsbrowsersmobile phones

organization-centricCRMFacebook (as platform and app)Hospital Management System

19Thursday, February 5, 15

Page 20: Privacy Research Paradigms in Computer Science · privacy research paradigms privacy as confidentiality the right to be let alone. Warren & Brandeis (1890) concealing information

Thank you!

- [email protected]

20

20Thursday, February 5, 15