handouts/ho07.tex
changeset 307 98ee5f760a8c
child 308 2a814c06ae03
equal deleted inserted replaced
306:c3ad0cf9db50 307:98ee5f760a8c
       
     1 \documentclass{article}
       
     2 \usepackage{../style}
       
     3 
       
     4 \begin{document}
       
     5 
       
     6 \section*{Handout 7 (Privacy)}
       
     7 
       
     8 The first motor car was invented around 1886. For ten years,
       
     9 until 1896, the law in the UK and elsewhere required a person
       
    10 to walk in front of any moving car waving a red flag. Cars
       
    11 were such a novelty that most people did not know what to make
       
    12 of them. The person with the red flag was intended to warn the
       
    13 public, for example horse owners, about the impending
       
    14 novelty---a car. In my humble opinion, we are at the same
       
    15 stage of development with privacy. Nobody really knows what it
       
    16 is about or what it is good for. All seems very hazy. The
       
    17 result is that the world of ``privacy'' looks a little bit
       
    18 like the old Wild West. For example, UCAS, a charity set up to
       
    19 help students apply to universities, has a commercial unit
       
    20 that happily sells your email addresses to anybody who forks
       
    21 out enough money in order to bombard you with spam. Yes, you
       
    22 can opt out very often, but in case of UCAS any opt-out will
       
    23 limit also legit emails you might actually be interested
       
    24 in.\footnote{The main objectionable point, in my opinion, is
       
    25 that the \emph{charity} everybody has to use for HE
       
    26 applications has actually very honourable goals (e.g.~assist
       
    27 applicants in gaining access to universities), but in their
       
    28 small print (or better under the link ``About us'') reveals
       
    29 they set up their organisation so that they can also
       
    30 shamelessly sell email addresses the ``harvest''. Everything
       
    31 is of course very legal\ldots{}moral?\ldots{}well that is in
       
    32 the eye of the beholder. See:
       
    33 
       
    34 \url{http://www.ucas.com/about-us/inside-ucas/advertising-opportunities} 
       
    35 or
       
    36 \url{http://www.theguardian.com/uk-news/2014/mar/12/ucas-sells-marketing-access-student-data-advertisers}}
       
    37 
       
    38 Verizon, an ISP who provides you with connectivity, has found
       
    39 a ``nice'' side-business too: When you have enabled all
       
    40 privacy guards in your browser, the few you have at your
       
    41 disosal, Verizon happily adds a kind of cookie to your
       
    42 HTTP-requests.\footnote{\url{http://webpolicy.org/2014/10/24/how-verizons-advertising-header-works/}}
       
    43 As shown in the picture below, this cookie will be sent to
       
    44 every web-site you visit. The web-sites then can forward the
       
    45 cookie to advertisers who in turn pay Verizon to tell them
       
    46 everything they want to know about the person who just made
       
    47 this request, that is you.
       
    48  
       
    49 \begin{center}
       
    50 \includegraphics[scale=0.21]{../pics/verizon.png}
       
    51 \end{center}
       
    52 
       
    53 \noindent How disgusting? Even worse, Verizon is not known for
       
    54 being the cheapest ISP on the planet (completely the
       
    55 contrary), and also not known for providing the fastest
       
    56 possible speeds, but rather for being among the few ISPs in
       
    57 the US with a quasi-monopolistic ``market distribution''.
       
    58 Well, we could go on and on\ldots{}and that has not even
       
    59 started us yet with all the naughty things NSA \& Friends are
       
    60 up to. 
       
    61 
       
    62 Why does privacy matter? Nobody, I think, has a conclusive
       
    63 answer to this question. Maybe the following four notions
       
    64 clarify the picture somewhat: 
       
    65 
       
    66 \begin{itemize}
       
    67 \item \textbf{Secrecy} is the mechanism used to limit the
       
    68       number of principals with access to information (e.g.,
       
    69       cryptography or access controls). For example I better
       
    70       keep my password secret, otherwise people from the wrong
       
    71       side of the law might impersonate me.
       
    72 
       
    73 \item \textbf{Confidentiality} is the obligation to protect
       
    74       the secrets of other people or organisations (secrecy
       
    75       for the benefit of an organisation). For example as a
       
    76       staff membee at King's I have access to data, even
       
    77       private data, I am allowed to use in my work but not
       
    78       allowed to disclose to anyone else.
       
    79 
       
    80 \item \textbf{Anonymity} is the ability to leave no evidence of
       
    81       an activity (e.g., sharing a secret). This is not equal
       
    82         with privacy---anonymity is required in many 
       
    83         circumstances, for example for whistle-blowers, 
       
    84         voting, exam marking and so on.
       
    85 
       
    86 \item \textbf{Privacy} is the ability or right to protect your
       
    87       personal secrets (secrecy for the benefit of an
       
    88       individual). For example, in a job interview, I might
       
    89       not like to disclose that I am pregnant, if I were
       
    90       a woman, or that I am a father. Similarly, I might not
       
    91       like to disclose my location data, because thieves might
       
    92       break into my house if they know I am away at work. 
       
    93       Privacy is essentially everything which `shouldn't be
       
    94       anybodies business'.
       
    95 
       
    96 \end{itemize}
       
    97 
       
    98 \noindent While this might provide us with some rough
       
    99 definitions, the problem with privacy is that it is an
       
   100 extremely fine line what should stay private and what should
       
   101 not. For example, since I am working in academia, I am very
       
   102 happy to be essentially a digital exhibitionist: I am happy to
       
   103 disclose all `trivia' related to my work on my personal
       
   104 web-page. This is a kind of bragging that is normal in
       
   105 academia (at least in the CS field). I am even happy that
       
   106 Google maintains a profile about all of my academic papers and
       
   107 their citations. 
       
   108 
       
   109 On the other hand I would be very peeved if anybody had a too
       
   110 close look on my private live---it shouldn'd be anybodies
       
   111 business. The reason is that knowledge about my private life
       
   112 usually is used against me. As mentioned above, public
       
   113 location data might mean I get robbed. If supermarkets build a
       
   114 profile of my shopping habits, they will use it to
       
   115 \emph{their} advantage---surely not to \emph{my} advantage.
       
   116 Also whatever might be collected about my life will always be
       
   117 an incomplete, or even misleading, picture---I am sure my
       
   118 creditworthiness score was temporarily(?) destroyed by not
       
   119 having a regular income in this country (before coming to
       
   120 King's I worked in Munich). To correct such incomplete or
       
   121 flawed data there is, since recently, a law that allows you to
       
   122 check what information is held about you for determining your
       
   123 creditworthiness. But this concerns only a very small part of
       
   124 the data that is held about me/you.
       
   125 
       
   126 This is an endless field. I let you ponder about the two
       
   127 statements that are often float about in discussions about
       
   128 privacy:
       
   129 
       
   130 \begin{itemize}
       
   131 \item \textit{``You have zero privacy anyway. Get over it.''}\\
       
   132 \mbox{}\hfill{}Scott Mcnealy (CEO of Sun)
       
   133 
       
   134 \item \textit{``If you have nothing to hide, you have nothing 
       
   135 to fear.''}
       
   136 \end{itemize}
       
   137  
       
   138 \noindent There are some technical problems that are easier to
       
   139 discuss and that often have privacy implications. The problem
       
   140 I want to focus on is how to safely disclose datasets. What
       
   141 can go wrong with this can be illustrated with three examples:
       
   142 
       
   143 \begin{itemize}
       
   144 \item In 2006 a then young company called Netflix offered a 1
       
   145       Mio \$ prize to anybody who could improve their movie
       
   146       rating algorithm. For this they disclosed a dataset
       
   147       containing 10\% of all Netflix users (appr.~500K). They
       
   148       removed names, but included numerical ratings as well as
       
   149       times of ratings. Though some information was perturbed
       
   150       (i.e., slightly modified).
       
   151       
       
   152       Two researchers took that data and compared it with
       
   153       public data available from the International Movie
       
   154       Database (IMDb). They found that 98 \% of the entries
       
   155       could be re-identified: either by their ratings or by
       
   156       the dates the ratings were uploaded. 
       
   157 
       
   158 \item In the 1990, medical databases were routinely made
       
   159       publicised for research purposes. This was done in
       
   160       anonymised form with names removed, but birth dates,
       
   161       gender, ZIP-code were retained.
       
   162       
       
   163 \end{itemize}
       
   164 
       
   165 
       
   166 \end{document}
       
   167 
       
   168 http://randomwalker.info/teaching/fall-2012-privacy-technologies/?
       
   169 http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
       
   170 http://repository.cmu.edu/cgi/viewcontent.cgi?article=1077&context=hcii
       
   171 https://josephhall.org/papers/NYU-MCC-1303-S2012_privacy_syllabus.pdf
       
   172 %%% Local Variables: 
       
   173 %%% mode: latex
       
   174 %%% TeX-master: t
       
   175 %%% End: