handouts/ho07.tex
changeset 314 e01f55e7485a
parent 313 1d243ac51078
child 315 7bd723cb9b32
equal deleted inserted replaced
313:1d243ac51078 314:e01f55e7485a
     1 \documentclass{article}
     1 \documentclass{article}
     2 \usepackage{../style}
     2 \usepackage{../style}
       
     3 \usepackage{../graphics}
     3 
     4 
     4 \begin{document}
     5 \begin{document}
     5 
     6 
     6 \section*{Handout 7 (Privacy)}
     7 \section*{Handout 7 (Privacy)}
     7 
     8 
     8 The first motor car was invented around 1886. For ten years,
     9 The first motor car was invented around 1886. For ten years,
     9 until 1896, the law in the UK and elsewhere required a person
    10 until 1896, the law in the UK (and elsewhere) required a
    10 to walk in front of any moving car waving a red flag. Cars
    11 person to walk in front of any moving car waving a red flag.
    11 were such a novelty that most people did not know what to make
    12 Cars were such a novelty that most people did not know what to
    12 of them. The person with the red flag was intended to warn the
    13 make of them. The person with the red flag was intended to
    13 public, for example horse owners, about the impending
    14 warn the public, for example horse owners, about the impending
    14 novelty---a car. In my humble opinion, we are at the same
    15 novelty---a car. In my humble opinion, we are at the same
    15 stage of development with privacy. Nobody really knows what it
    16 stage of development with privacy. Nobody really knows what it
    16 is about or what it is good for. All seems very hazy. There
    17 is about or what it is good for. All seems very hazy. There
    17 are a few laws (e.g.~cookie law, right-to-be-forgotten law)
    18 are a few laws (e.g.~cookie law, right-to-be-forgotten law)
    18 which address problems with privacy, but even if they are well
    19 which address problems with privacy, but even if they are well
    19 intentioned, they either back-fire or are already obsolete
    20 intentioned, they either back-fire or are already obsolete
    20 because of newer technologies. The result is that the world of
    21 because of newer technologies. The result is that the world of
    21 ``privacy'' looks a little bit like the old Wild West.
    22 ``privacy'' looks a little bit like the old Wild
       
    23 West---lawless and mythical.
    22 
    24 
    23 For example, UCAS, a charity set up to help students with
    25 For example, UCAS, a charity set up to help students with
    24 applying to universities, has a commercial unit that happily
    26 applying to universities, has a commercial unit that happily
    25 sells your email addresses to anybody who forks out enough
    27 sells your email addresses to anybody who forks out enough
    26 money in order to be able to bombard you with spam. Yes, you
    28 money for bombarding you with spam. Yes, you can opt out very
    27 can opt out very often in such ``schemes'', but in case of
    29 often from such ``schemes'', but in case of UCAS any opt-out
    28 UCAS any opt-out will limit also legit emails you might
    30 will limit also legit emails you might actually be interested
    29 actually be interested in.\footnote{The main objectionable
    31 in.\footnote{The main objectionable point, in my opinion, is
    30 point, in my opinion, is that the \emph{charity} everybody has
    32 that the \emph{charity} everybody has to use for HE
    31 to use for HE applications has actually very honourable goals
    33 applications has actually very honourable goals (e.g.~assist
    32 (e.g.~assist applicants in gaining access to universities),
    34 applicants in gaining access to universities), but the small
    33 but the small print (or better the link ``About
    35 print (or better the link ``About us'') reveals they set up
    34 us'') reveals they set up their organisation so that they can
    36 their organisation so that they can also shamelessly sell the
    35 also shamelessly sell the email addresses they ``harvest''.
    37 email addresses they ``harvest''. Everything is of course very
    36 Everything is of course very legal\ldots{}moral?\ldots{}well
    38 legal\ldots{}moral?\ldots{}well that is in the eye of the
    37 that is in the eye of the beholder. See:
    39 beholder. See:
    38 
    40 
    39 \url{http://www.ucas.com/about-us/inside-ucas/advertising-opportunities} 
    41 \url{http://www.ucas.com/about-us/inside-ucas/advertising-opportunities} 
    40 or
    42 or
    41 \url{http://www.theguardian.com/uk-news/2014/mar/12/ucas-sells-marketing-access-student-data-advertisers}}
    43 \url{http://www.theguardian.com/uk-news/2014/mar/12/ucas-sells-marketing-access-student-data-advertisers}}
    42 
    44 
    51 cookie to advertisers who in turn pay Verizon to tell them
    53 cookie to advertisers who in turn pay Verizon to tell them
    52 everything they want to know about the person who just made
    54 everything they want to know about the person who just made
    53 this request, that is you.
    55 this request, that is you.
    54  
    56  
    55 \begin{center}
    57 \begin{center}
    56 \includegraphics[scale=0.19]{../pics/verizon.png}
    58 \includegraphics[scale=0.17]{../pics/verizon.png}
    57 \end{center}
    59 \end{center}
    58 
    60 
    59 \noindent How disgusting? Even worse, Verizon is not known for
    61 \noindent How disgusting! Even worse, Verizon is not known for
    60 being the cheapest ISP on the planet (completely the
    62 being the cheapest ISP on the planet (completely the
    61 contrary), and also not known for providing the fastest
    63 contrary), and also not known for providing the fastest
    62 possible speeds, but rather for being among the few ISPs in
    64 possible speeds, but rather for being among the few ISPs in
    63 the US with a quasi-monopolistic ``market distribution''.
    65 the US with a quasi-monopolistic ``market distribution''.
    64 
    66 
   135 conclusions, take the example of Stephen Hawking: When he was
   137 conclusions, take the example of Stephen Hawking: When he was
   136 diagnosed with his disease, he was given a life expectancy of
   138 diagnosed with his disease, he was given a life expectancy of
   137 two years. If employers would know about such problems, would
   139 two years. If employers would know about such problems, would
   138 they have employed Hawking? Now, he is enjoying his 70+
   140 they have employed Hawking? Now, he is enjoying his 70+
   139 birthday. Clearly personal medical data needs to stay private.
   141 birthday. Clearly personal medical data needs to stay private.
   140 A movie which has this topic as its main focus is Gattaca from
       
   141 1997, in case you like to watch
       
   142 it.\footnote{\url{http://www.imdb.com/title/tt0119177/}}
       
   143 
       
   144 
   142 
   145 To cut a long story short, I let you ponder about the two
   143 To cut a long story short, I let you ponder about the two
   146 statements that are often voiced in discussions about privacy:
   144 statements which are often voiced in discussions about privacy:
   147 
   145 
   148 \begin{itemize}
   146 \begin{itemize}
   149 \item \textit{``You have zero privacy anyway. Get over it.''}
   147 \item \textit{``You have zero privacy anyway. Get over 
   150 \mbox{}\hfill{}{\small{}by Scott Mcnealy (CEO of Sun)}
   148 it.''}\\
       
   149 \mbox{}\hfill{}{\small{}(by Scott Mcnealy, former CEO of Sun)}
   151 
   150 
   152 \item \textit{``If you have nothing to hide, you have nothing 
   151 \item \textit{``If you have nothing to hide, you have nothing 
   153 to fear.''}
   152 to fear.''}
   154 \end{itemize}
   153 \end{itemize}
   155  
   154  
   156 \noindent If you want to read up further on this topic, I can
   155 \noindent If you like to watch a movie which has this topic as
   157 recommend the following article that appeared in 2011 in the
   156 its main focus I recommend \emph{Gattaca} from
   158 Chronicle of Higher Education
   157 1997.\footnote{\url{http://www.imdb.com/title/tt0119177/}} If
       
   158 you want to read up on this topic, I can recommend the
       
   159 following article that appeared in 2011 in the Chronicle of
       
   160 Higher Education:
   159 
   161 
   160 \begin{center} 
   162 \begin{center} 
   161 \url{http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/} 
   163 \url{http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/} 
   162 \end{center} 
   164 \end{center} 
   163 
   165 
   279 the AOL dataset shows clearly how incomplete such data can be:
   281 the AOL dataset shows clearly how incomplete such data can be:
   280 Although the queries uniquely identified the older lady, she
   282 Although the queries uniquely identified the older lady, she
   281 also looked up diseases that her friends had, which had
   283 also looked up diseases that her friends had, which had
   282 nothing to do with her. Any rational analysis of her query
   284 nothing to do with her. Any rational analysis of her query
   283 data must therefore have concluded, the lady is on her
   285 data must therefore have concluded, the lady is on her
   284 deathbed, while she was actually very much alive and kicking.
   286 death bed, while she was actually very much alive and kicking.
   285 
   287 
   286 \subsubsection*{Differential Privacy}
   288 \subsubsection*{Differential Privacy}
   287 
   289 
   288 Differential privacy is one of the few methods, that tries to 
   290 Differential privacy is one of the few methods that tries to
   289 achieve forward privacy with large datasets. The basic idea
   291 achieve forward privacy. The basic idea is to add appropriate
   290 is to add appropriate noise, or errors, to any query of the
   292 noise, or errors, to any query of the dataset. The intention
   291 dataset. The intention is to make the result of a query 
   293 is to make the result of a query insensitive to individual
   292 insensitive to individual entries in the database. The hope is
   294 entries in the database. That means the results are
   293 that the added error does not eliminate the ``signal'' one is 
   295 approximately the same no matter if a particular individual is
   294 looking for by querying the dataset.
   296 in the dataset or not. The hope is that the added error does
   295 
   297 not eliminate the ``signal'' one is looking for in the
   296 
   298 dataset.
   297 
   299 
   298 \begin{center}
   300 %\begin{center}
   299 User\;\;\;\;    
   301 %User\;\;\;\;    
   300 \begin{tabular}{c}
   302 %\begin{tabular}{c}
   301 tell me $f(x)$ $\Rightarrow$\\
   303 %tell me $f(x)$ $\Rightarrow$\\
   302 $\Leftarrow$ $f(x) + \text{noise}$
   304 %$\Leftarrow$ $f(x) + \text{noise}$
       
   305 %\end{tabular}
       
   306 %\;\;\;\;\begin{tabular}{@{}c}
       
   307 %Database\\
       
   308 %$x_1, \ldots, x_n$
       
   309 %\end{tabular}
       
   310 %\end{center}
       
   311 %
       
   312 %\begin{center}
       
   313 %\begin{tabular}{l|l}
       
   314 %Staff & Salary\\\hline
       
   315 %$PM$ & \pounds{107}\\
       
   316 %$PF$ & \pounds{102}\\
       
   317 %$LM_1$ & \pounds{101}\\
       
   318 %$LF_2$ & \pounds{97}\\
       
   319 %$LM_3$ & \pounds{100}\\
       
   320 %$LM_4$ & \pounds{99}\\
       
   321 %$LF_5$ & \pounds{98}
       
   322 %\end{tabular}
       
   323 %\end{center}
       
   324 %
       
   325 %
       
   326 %\begin{center}
       
   327 %\begin{tikzpicture} 
       
   328 %\begin{axis}[symbolic y coords={salary},
       
   329 %             ytick=data,
       
   330 %             height=3cm]
       
   331 %\addplot+[jump mark mid] coordinates
       
   332 %{(0,salary)   (0.1,salary) 
       
   333 % (0.4,salary) (0.5,salary)  
       
   334 % (0.8,salary) (0.9,salary)};
       
   335 %\end{axis}
       
   336 %\end{tikzpicture}
       
   337 %\end{center}
       
   338 %
       
   339 %\begin{tikzpicture}[outline/.style={draw=#1,fill=#1!20}]
       
   340 %  \node [outline=red]            {red box};
       
   341 %  \node [outline=blue] at (0,-1) {blue box};
       
   342 %\end{tikzpicture}
       
   343 
       
   344 \ldots
       
   345 
       
   346 
       
   347 \subsubsection*{Further Reading}
       
   348 
       
   349 Two cool articles about how somebody obtained via the Freedom
       
   350 of Information Law the taxicab dataset of New York and someone
       
   351 else showed how easy it is to mine for private information: 
       
   352 
       
   353 \begin{center}
       
   354 \begin{tabular}{p{0.8\textwidth}}
       
   355 \url{http://chriswhong.com/open-data/foil_nyc_taxi/}\\
       
   356 \url{http://research.neustar.biz/2014/09/15/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset}
   303 \end{tabular}
   357 \end{tabular}
   304 \;\;\;\;\begin{tabular}{@{}c}
   358 \end{center}
   305 Database\\
   359 
   306 $x_1, \ldots, x_n$
   360 \noindent 
   307 \end{tabular}
       
   308 \end{center}
       
   309 
       
   310 \ldots
       
   311 
       
   312 
       
   313 \subsubsection*{Further Reading}
       
   314 
       
   315 A readable article about how supermarkets mine your shopping
   361 A readable article about how supermarkets mine your shopping
   316 habits (especially how they prey on young exhausted families
   362 habits (especially how they prey on new exhausted parents
   317 ;o) appeared in 2012 in the New York Times:
   363 ;o) appeared in 2012 in the New York Times:
   318 
   364 
   319 \begin{center}
   365 \begin{center}
   320 \url{http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html}
   366 \url{http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html}
   321 \end{center}
   367 \end{center}
   347 
   393 
   348 http://randomwalker.info/teaching/fall-2012-privacy-technologies/?
   394 http://randomwalker.info/teaching/fall-2012-privacy-technologies/?
   349 http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
   395 http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
   350 http://repository.cmu.edu/cgi/viewcontent.cgi?article=1077&context=hcii
   396 http://repository.cmu.edu/cgi/viewcontent.cgi?article=1077&context=hcii
   351 https://josephhall.org/papers/NYU-MCC-1303-S2012_privacy_syllabus.pdf
   397 https://josephhall.org/papers/NYU-MCC-1303-S2012_privacy_syllabus.pdf
       
   398 http://www.jetlaw.org/wp-content/uploads/2014/06/Bambauer_Final.pdf
       
   399 
   352 %%% Local Variables: 
   400 %%% Local Variables: 
   353 %%% mode: latex
   401 %%% mode: latex
   354 %%% TeX-master: t
   402 %%% TeX-master: t
   355 %%% End: 
   403 %%% End: