Privacy with Internet

Post on 04-Dec-2014

682 views 3 download

description

 

Transcript of Privacy with Internet

Privacy with InternetMathias Klang

“Having two identities for yourself is an example of a lack of integrity”

Mark Zuckerberg (2010)

History: how did we get to this?

Privacy?

privacy(from Latin: privatus "separated from the rest, deprived of something, esp. office, participation in the government", from privo "to deprive") is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. (Wikipedia)

Historical & socio-biological construct

The Right to Privacy

The intensity and complexity of life, attendant upon advancing civilization, have rendered necessary some retreat from the world…solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon his privacy, subjected him to mental pain and distress…

Warren and Brandeis The Right to Privacy, 4 Harvard Law Review 193 (1890)

The gaze Data collectionData analysis

Data

Spatial

Technology threats

Paparazzi (1898)

The execution of Ruth Snyder 1928

Democratization of surveillance

Child Locator GPS Watch

Teen arrive alive

& other interesting toys

AM/FM Clock radio wireless hidden camera

Shower AM-FM Mirror Radio

And what about Manufacturers responsibility?

regulation

The law

Law is a system of rules and guidelines which are enforced… to govern behavior, wherever possible. It shapes … and serves as a social mediator of relations between people.

Norms from above

Power to the people: Democracy

Power of the technocracy

Socio-legal regulation

Law

Contextual & programmed social

rules

Architecture

Technology makes society

Only technology(spot the ethical dilemma?)

Data protection laws

Swedish Datalagen1973

Data Protection Directive

1995

PUL1998

1984 1997

Nokia 6120Mac Classic

Personuppgiftslagen (1998)

All information that directly or indirectly points to a live physical person

Autonomy – user control

45

Harmless – ordinary – Sensitive data

Ramsbrofallet (2001)

Bodil Lindqvist (2003)

And then…

But first technological change – why it matters

Game changer: storage

Game changer: communication

Digitalization

Connectivity

Storage

Devices

Flickr

2000

2001

2002

2003 2005

2004 2006

Wikipedia

Linkedin

Blog

ger 1

999

Second Life

My Space

Skype

Digg

Facebook

Ning

YouTube

Twitter

Spotify

Google c:a 1998

2008

2007 2009

Farmville

iphone

WikileaksAngry Birds

Theoretical rights become inevitable

practice

Technology changing society, but social rules slow to evolve…

Surveillance: A gaze from above

powerHow is surveillance possible?

The stateInformation gathering

Sousveillance: A gaze from below

Social tiesHow is sousveillance possible?

“friends”

Strength of Weak ties“Weak ties provide people with access to information and resources beyond those available in their own social circle; but strong ties have greater motivation to be of assistance and are typically more easily available.” (Granovetter, 1983, pp 209)

Autoveillance: a gaze from within

Exhibitionism?How is autoveillance possible?

myself

We leak information

Compartmentalization

Analog social norms

Protection from the outer gaze

Theory?Narcissism is a term with a wide range of meanings, depending on whether it is used to describe a central concept of psychoanalytic theory, a mental illness, a social or cultural problem, or simply a personality trait. Except in the sense of primary narcissism or healthy self-love, "narcissism" usually is used to describe some kind of problem in a person or group's relationships with self and others. (wikipedia)

Data analysis

Eula: Licensing to

the weak

Today we have a mix of sur, sous & autoveillance. regulation mainly focuses on surveillance.

End of privacy?

The Hive-mind

If you have done nothing wrong,

you have nothing to fear

threats?

Other people Cyberbullying

StalkingBurgulary

Corporations

We have (theoretical) control over Big Brother

If you are not paying for it, you're not the customer; you're the product being sold.

State & Corporations

The filter bubbleEli Pariser

Identity & Information junk food.

The Net delusionEvgeny Morozov

Technology is not inherently democratic

A Squirrel Dying In Your Front Yard May Be More Relevant To

Your Interests Right Now Than People

Dying In AfricaMark Zuckerberg

Thank you.

Information• All images from www.flickr.com (unless specifically stated)

• Image & licensing info in the notes section of slides

• Presentation licensed: Creative Commons BY-NC-SA

• The presentation can be downloaded from: www.slideshare.net/klang

• More information about me: www.techrisk.se & www.digital-rights.net

• Mathias Klang. klang@ituniv.se or @klang67