1 Reading List: Big Data, Security and Privacy Abelson, H. and Kagal, L. (2010) Access Control is an Inadequate Framework for Privacy Protection, W3C Workshop on Privacy for Advanced Web APIs 12/13 (July) London. The authors argue that the current framework for evaluating and assessing privacy risks, information access, or the focus on how information comes to be known, is no longer viable given new big datarelated technologies. Hence, they suggest, focus should instead be given to how information is used, following precedent, e.g., in Brandeis s and Warren s opinions about privacy. Acar, G. et al. (2013) FPDetective: Dusting the Web for Fingerprinters, Proceedings of CCS November. The authors report on the design and implementation of a particular framework (FPDetective) for the detection and analysis of web-based fingerprints, i.e., identifying information for individuals based on web browser use. They conduct a large scale analysis of the million most popular websites and conclude that the adoption of fingerprinting is more widespread than previously thought, arguing that two common countermeasures to fingerprinting are insufficient. The authors suggest that a change in how users, companies, and policy-makers engage with fingerprinting is needed. Aggarwal, C. C. and Yu, P. S. (eds.) (2008) Privacy-Preserving Data Mining: Models and Algorithms, Springer: New York. Al-Khouri, A. (2012) Data Ownership: Who Owns My Data, International Journal of Management & Information Technology, Vol. 2. No. 1, November Alstyne, M. V., Brynjolfsson, E. Madnick, S. (1995) Why Not One Big Database? Principles for Data Ownership, Decision Support Systems Vol. 15 Iss. 4, December, pp Andrews, L. (2012). I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy. Simon and Schuster Billitteri, T. J. et al. (2013) Social Media Explosion: Do social networking sites threaten privacy rights? CQ Researcher (January) 23: Birnhack, M. (2013) S-M-L-XL Data: Big Data as a New Informational Privacy Paradigm. Butler, D. (2007). Data sharing threatens privacy. Nature News, 449(7163), Cate, F. H. and Mayer-Schönberger, V. (2012) Notice and Consent in a World of Big
2 Data, Microsoft Global Privacy Summit Summary Report and Outcomes, November (2013) Notice and consent in a world of Big Data, International Data Privacy Law 3. Cavoukian, A. and Castro, D. (2014) Setting the Record Straight: De-Identification Does Work, Information and Privacy Commissioner, Ontario Canada. Centre for Information Policy Leadership (2013) Big Data and Analytics: Seeking Foundations for Effective Privacy Guidance, A Discussion Document, February. Cisco (2013), Solutionary Boosts Security with Cisco and MapR Technologies, Customer Case Study Cloud Security Alliance (2014) Big Data Working Group: Comment on Big Data and the Future of Privacy, March. Cukier, K and Mayer- Schoenberger, V. (2014) "How Big Data Will Haunt You Forever," Quartz, March 11. Davenport, T. H. and Reidenberg, J. R. (2013) Should the US Adopt European-Style Data Privacy Protection? Wall Street Journal, March. Davenport, T. H., Harris, J. G. (2007) The Dark Side of Customer Analytics, Harvard Business Review, May. Driscoll, K. (2012). From Punched Cards to Big Data : A Social History of Database Populism. communication 1, 1(1). Dwork, D. (2011) A Firm Foundation for Private Data Analysis, Communications of the ACM, This paper outlines a novel approach to data analysis, which aims to maintain the utility of databases while ensuring individual privacy. This approach, differential privacy, separates the utility of the database from individual data by randomizing responses so as to effectively hide the presence or absence of the data of any individual.
4 Participation in Practice (1st ed.). O Reilly Media. Mackie, C. and Bradburn, N. (eds.) (2000) Improving Access to and Confidentiality of Research Data, National Research Council, Washington, D.C. Mundie, C. (2014) Privacy Pragmatism: Focus on Data Use, Not Data Collection, Foreign Affairs, March/April. Nature Editorial (2007) A matter of trust. Nature, 449(7163), (2008) Community cleverness required. Nature, 455(7209), 1. Nissenbaum, H. (2009) Privacy in Context: Technology, Policy, and the Integrity of Social Life, Stanford Law Books, November. Noveck, B.S. (2009) Wiki government: how technology can make government better, democracy stronger, and citizens more powerful. Brookings Institution Press. Rosen, Jeffrey (2011) The Deciders: Facebook, Google, and the Future of Privacy and Free Speech, Constitution 3.0: Freedom and Technological Change, Rosen, J. and Wittes, B. (eds.) Brookings Institution Press: Washington D.C. Rudin, C. (2013) Predictive policing: Using Machine Learning to Detect Patterns of Crime, Wired, August. Saramäki, J. et al. (2014) Persistence of social signatures in human communication, Proceedings of the National Academy of Sciences, 111.3: Shields, G. (2010) Addressing Security and Data Ownership Issues When Choosing a SaaS Provider, Quest Software White Paper. Sifry, M. L. (2011). WikiLeaks and the Age of Transparency. OR Books. Smart Grid Consumer Collaborative (2012) Data Privacy and Smart Meters. Tanner, A. (2013) The Web Cookie Is Dying. Here's the Creepier Technology That Comes Next, Forbes, June.
5 Tene, O. and Polonetsky, J. (2013) A Theory of Creepy: Technology, Privacy and Shifting Social Norms, Yale Journal of Law and Technology 16:59, pp Thierer, A. (2013) Privacy and Security Implications of the Internet of Things. Mercatus Center at George Mason University (2012) Technopanics, Threat Inflation, and the Danger of an Information Technology Precautionary Principle Mercatus Center at GMU No , February. Turow, J. (2012) The Daily You: How the Advertising Industry is Defining your Identity and Your Worth, New Haven: Yale University Press. Vincey, C. (2012). Opendata benchmark: FR vs UK vs US. Presented at the Dataconnexions Launch Conference, Google France, July. Weitzner, D. J. et al. (2014) Consumer Privacy Bill of Rights and Big Data: Response to White House Office of Science and Technology Policy Request for Information, April 4. Wittes, B. (2011) Databuse: Digital Privacy and the Mosaic, Brookings Institute, April. Woodbury, C. (2007) The Importance of Data Classification and Ownership, Sky View Partners, Inc. World Economic Forum (2011) Personal Data: The Emergence of a New Asset Class, prepared in collaboration with Bain & Company, Inc (2012) Rethinking Personal Data: Strengthening Trust, prepared in collaboration with the Boston Consulting Group (2013) Unlocking the Value of Personal Data: From Collection to Usage. This report offers new policy framework for personal data use, given that the latter has become a crucial ingredient for innovation. Discussed are the need for a case-by-case approach to data regulation, and the importance of weighing security concerns against the benefits of freely flowing data.
International Working Group on Data Protection in Telecommunications 675.48.12 Working Paper on Big Data and Privacy Privacy principles under pressure in the age of Big Data analytics 55th Meeting, 5 6
Data Protection Act 1998 Big data and data protection 1 Contents Introduction... 2 Executive summary... 3 What is big data?... 6 Big data and personal data... 10 Anonymisation... 11 Fairness... 14 Conditions
Big Data: Opportunities and Challenges Omar Al-Hujran, Rana Wadi, Reema Dahbour, Mohammad Al-Doughmi Department of Management Information Systems Princess Sumaya University for Technology Amman, Jordan
Big Data for All: Privacy and User Control in the Age of Analytics Omer Tene 1 and Jules Polonetsky 2 Abstract... 2 Introduction... 3 Big Data: Big Benefits... 6 Healthcare... 8 Mobile... 10 Smart grid...
2011 CONSUMER U.S. INTELLECTUAL DATA PRIVACY PROPERTY ENFORCEMENT IN A NETWORKED COORDINATOR WORLD: COVER ANNUAL TITLE REPORT HERE ON A FRAMEWORK FOR PROTECTING PRIVACY INTELLECTUAL AND PROMOTING PROPERTY
Revised March 2014 Data Protection Principles for the 21 st Century Revising the 1980 OECD Guidelines Fred H. Cate Distinguished Professor and C. Ben Dutton Professor of Law, Maurer School of Law, Indiana
March 31, 2014 Big Data Study Office of Science and Technology Policy Eisenhower Executive Office Building 1650 Pennsylvania Avenue, NW Washington, DC 20502 SUBJECT: Request for Information on Big Data
Big Data Privacy Workshop Advancing the State of the Art in Technology and Practice co- hosted by The White House Office of Science & Technology Policy & Massachusetts Institute of Technology MIT Big Data
Using Privacy by Design to Achieve Big Data Innovation Without Compromising Privacy Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada David Stewart National Advanced Analytics Leader
Industry Agenda Unlocking the Value of Personal Data: From Collection to Usage Prepared in collaboration with The Boston Consulting Group February 2013 Section Title I m convinced this longing to balance,
Navigating Big Data s Privacy and Security Challenges kpmg.com Navigating Big Data s Privacy and Security Challenges 1 About the authors Greg Bell is a principal in the Atlanta office of KPMG LLP s (KPMG)
Big Data in Private Sector and Public Sector Surveillance Recent years have seen an explosion in the popularity of big data. This popularity is attributable to a variety of reasons, including the easier
Big Data: Opportunities and Privacy Challenges Hervais Simo Fraunhofer-Institut für Sichere Informationstechnologie, Darmstadt, Germany Table of Content Big Data: Opportunities and Privacy Challenges...
DRAFT VERSION Big Data privacy principles under pressure September 2013 2 Contents Summary... 6 1 Introduction... 8 1.1 Problems for discussion... 8 1.2 Definitions... 9 1.2.1 Big Data... 9 1.2.2 Personal
BIG DATA Preconditions to Productivity Dr. Steve Hallman, DBA 1, Dr. Michel Plaisent 2, Jasur Rakhimov 3, Dr. Prosper Bernard 4 1,3 MBA Program, Park University, Parkville, MO 64152 U.S.A. 2 Management
NESSI White Paper, December 2012 Big Data A New World of Opportunities Contents 1. Executive Summary... 3 2. Introduction... 4 2.1. Political context... 4 2.2. Research and Big Data... 5 2.3. Purpose of
E N V I R O N M E N T A L S C A N CYBERSECURITY Los Angeles and Orange Counties J U N E 2 0 1 2 E N V I R O N M E N T A L S C A N CENTER OF EXCELLENCE Los Angeles and Orange Counties Audrey Reille, Director
PRIVACY IN THE CLOUD AND BIG DATA WHAT FRANCHISORS NEED TO KNOW! By Alec Christie, Partner, DLA Piper Franchisors will already be dealing with a number of day-to-day privacy issues arising from their implementation
ericsson White paper Uen 307 23-3230 February 2014 Guiding principles for security in a networked society The technological evolution that makes the Networked Society possible brings positive change in
Is Big Data too Big for SMEs? MS&E-238: Leading Trends in Information Technology Stanford University Summer 2014 Carl Johan Rising - SUID: 006000731 Michael Kristensen - SUID: 005999170 Steffen Tjerrild-Hansen
CHAPTER 1.3 Big Data Maturity: An Action Plan for Policymakers and Executives BAHJAT EL-DARWICHE VOLKMAR KOCH DAVID MEER RAMEZ T. SHEHADI WALID TOHME Booz & Company The total volume of structured and unstructured
NEW TECHNOLOGY, PERSONAL DATA PROTECTION AND IMPLICATIONS FOR FINANCIAL SERVICES REGULATION Information, Communication and Technology (ICT) developments present a challenge to public expectations about
The Big Data Revolution: Privacy Considerations December 2013 Thomas M. Lenard and Paul H. Rubin 1099 NEW YORK AVE, NW SUITE 520 WASHINGTON, DC 20001 PHONE: 202.828.4405 E-MAIL: firstname.lastname@example.org
Policy Brief No. 5, June 2014 Fencing Out Knowledge Impacts of the Children s Internet Protection Act 10 Years Later Kristen R. Batch Office for Information Technology Policy Office for Intellectual Freedom
Original Research Article Big Data and the brave new world of social media research Big Data & Society July December 2014: 1 11! The Author(s) 2014 DOI: 10.1177/2053951714563194 bds.sagepub.com Ralph Schroeder
64 STAN. L. REV. ONLINE 63 February 2, 2012 SYMPOSIUM ISSUE PRIVACY IN THE AGE OF BIG DATA: A TIME FOR BIG DECISIONS Omer Tene* & Jules Polonetsky** We live in an age of big data. Data has become the raw