Big Data / Privacy: Pick One?
|
|
|
- Barbra Brooks
- 10 years ago
- Views:
Transcription
1 Big Data / Privacy: Pick One? A. Michael Froomkin University of Miami School of Law [email protected] 1
2 Privacy, Quickly Has multiple elements including control of access to body, to thoughts, protection of private sphere, and especially intimate relations Today will concentrate on one aspect: ability to control data about oneself Primarily an instrumental value Enhances human freedom, flourishing, experimentation, innovation, selfrealization; protects against discrimination, and also distant, often invisible, exercises of (often algorithmic) power 2
3 Data == Power People with data about you can exercise power over you Market power Government power Special case of both above: Sorting power Can be invisible Can be lifelong Can be very empowering or very damaging Credit scores Citizen safety scores Issues of accurate, inaccurate, and predictive (i.e. speculative) scoring 3
4 Big Data, Quickly US government definition: the growing technological ability to capture, aggregate, and process data EU: the massive and rapid processing of data (through modern data analytics) in the search for information (including unforeseen information) The practice of data mining poses a significant challenge due to the degree of opacity characterising many contemporary data processing activities.... Data mining practices may result in behavioural targeting and further encourage a datafication of society that poses significant challenges for privacy and digital rights in general. Due to such risks as statistical discrimination... Bottom line: Big Data is both a technology and a process with many (reinforcing) parts, each of which can be enabled or, in theory, regulated. It is also, arguably, an ideology. 4
5 Big Data as a Process Data collection Sensors: Smart city, Cell Phones Self surveillance Transactional data: Communications, Shopping, Medical Storage Processing Correlation / Data Mining Issues of identification/ de identification/ re identification Re Use Nature of Big Data projects is to seek unexpected connections 5
6 The Trend is to Ever More (Big) Data More apps creating occasions to create and collect data More monitoring So called self surveillance e.g. Fitbits, Nests Ubiquitous hardware/sensors Bigger aggregations of data Smart cities Fusion centers, DHS, NSA Cost/benefit motivates private sector: costs are dropping, perceived benefits growing 6
7 The Lure of Unexpected Insights What if I told you that...one of the biggest decisions a company makes revolves around the size of its lunch tables? 7
8 Are You Trusted? Or Dangerous? "Beware," a program made by West Safety Services is capable of quickly sorting through billions of publicly available commercial records to alert first responders to potentially dangerous situations, according to the product website. Beware calculates threat scores by assigning people and addresses green, yellow, or red scores with red being highest threat and green being the safest. 8
9 Mixed Blessings of Big Data Benefits Numerous, Usually Concentrated Medical, Epidemiology Security Finance Marketing Urban planning Quantified Self Costs Widespread, Diffuse, Harder to Quantify Privacy reduced or eliminated Increases risk of reprisal for acts Less experimentation Dossiers are bigger Increased opacity in decisionmaking Polity Self censorship Unpredictable consequences of speech, civic choices Less whistleblowing 9
10 More & Better Algorithms As they are fed more data Can infer results about you based on people who share observed traits about you, another way in which there is no occasion for consent on your part, if other have consented to deeper dive into their data Thus, big data is a power shift away from data subject towards those who control and can access the data. 10
11 Common Privacy Protection Techniques Fail Consent to data collection loses what little meaning it has Consent is meaningless for remote sensing In US consent not required for most transactional collection unless sensitive Informed consent is impossible if one cannot predict what effect the data use might have Processing limits are inadequate US law bans discrimination against certain classes e.g. race, religion But no law against discriminating against people who pay for pizza with credit Battle over no fly lists is going very slowly Data anonymization easily undermined Re identification is easy and likely profitable 11
12 Metaproblem: Attitudes As Julie Cohen says, Big Data repackages surveillance as innovation. Plus, Big Data... equates information with truth and more information with more truth, and that denies the possibility that information processing designed simply to identify a pattern might be systematically infused with a particular ideology. [P]rivacy is increasingly cast as the spoiler in this tale, the obstacle to the triumphant march of predictive rationalism.... [I]f information processing is rational, then anything that disrupts information processing, including privacy protection, is presumptively irrational. 12
13 What is to be Done? Big Data cannot be entirely defanged and its users cannot be entirely trusted James Grimmelman If Cohen is correct that Big Data is the result of an ideology then we should be wary of the argument that the value of insights drawn from huge datasets justify the creation of centralized repositories and their use. Privatizing, distributing, or federalizing the data makes little difference. The specter of David Brin (The Transparent Society) haunts privacy studies? 13
14 Try Everything And Do It Soon Regulate sensors/data collection (my favorite) Regulate storage or flows (sharing) Age out data RTBF Regulate use/re use once holding data (but, 1 st Amendment) Focus on discrimination: ban bad algorithms (but enforcement hard, and unconscious biases in algorithmic design or in data set construction) Demand a new due process in data processing Right to contest distant, invisible algorithmic decision making Get notice of when, how and why your data is being processed Invent new ways to opt in and opt out (But opt out options need to be realistic not formalistic) 14
15 Thank You 15
Privacy: Legal Aspects of Big Data and Information Security
Privacy: Legal Aspects of Big Data and Information Security Presentation at the 2 nd National Open Access Workshop 21-22 October, 2013 Izmir, Turkey John N. Gathegi University of South Florida, Tampa,
WHITE PAPER Speech Analytics for Identifying Agent Skill Gaps and Trainings
WHITE PAPER Speech Analytics for Identifying Agent Skill Gaps and Trainings Uniphore Software Systems Contact: [email protected] Website: www.uniphore.com 1 Table of Contents Introduction... 3 Problems...
Social Media and Selection: Ingenuity or Slippery Slope?
Social Media and Selection: Ingenuity or Slippery Slope? Traditionally, applications capturing bio-data, personality or integrity measures, interviews and other assessment instruments have been utilized
Workshop Discussion Notes: Data Supply Chains
Workshop Discussion Notes: Data Supply Chains The Social, Cultural & Ethical Dimensions of Big Data March 17, 2014 - New York, NY http://www.datasociety.net/initiatives/2014-0317/ This document was produced
Event Summary: The Social, Cultural, & Ethical Dimensions of Big Data
Event Summary: The Social, Cultural, & Ethical Dimensions of Big Data March 17, 2014 - New York, NY http://www.datasociety.net/initiatives/2014-0317/ This event summary attempts to capture the broad issues
Intrusive vs. Non-Intrusive Vulnerability Scanning Technology
WHITE PAPER Intrusive vs. Non-Intrusive Vulnerability Scanning Technology Retina Network Security Scanner Table of Contents The Smash-and-Grab: Taking the Low Road 3 The Smooth Caper: Taking the High Road
BIG DATA AND THE INTERNET OF THINGS
BIG DATA AND THE INTERNET OF THINGS 12 September 2013 Robert Bond Partner and Notary Public Janine Regan Solicitor Tughan Thuraisingam Paralegal Our team Speechly Bircham is an ambitious, full-service
(Not So) Smart Cities? The societal drivers and impact of smart environments
(Not So) Smart Cities? The societal drivers and impact of smart environments Gemma Galdon Clavell Departament de Sociologia i Analisi de les Organitzacions Universitat de Barcelona Av. Diagonal, 690 08028
Framework Notes. How has it come to be used or considered by DHS? Where is it used or being considered for use?
Framework for Privacy Analysis of Programs, Technologies, and Applications This document is a recommended framework for analyzing programs, technologies, and applications in light of their effects on privacy
What s Trending in Analytics for the Consumer Packaged Goods Industry?
What s Trending in Analytics for the Consumer Packaged Goods Industry? The 2014 Accenture CPG Analytics European Survey Shows How Executives Are Using Analytics, and Where They Expect to Get the Most Value
Workshop Discussion Notes: Housing
Workshop Discussion Notes: Housing Data & Civil Rights October 30, 2014 Washington, D.C. http://www.datacivilrights.org/ This document was produced based on notes taken during the Housing workshop of the
Population Analytics. Population Analytics: A New Opportunity for Mobile Operators. » Mobile Operators POPULATION ANALYTICS BENEFITS AT A GLANCE
Population Analytics Population Analytics: A New Opportunity for Mobile Operators Few new mobile-based technologies have the potential to change the way that organisations think about their customers and
Technological Tools Trends:
Technological Tools Trends: Prediction Models, Business Intelligence, Big Data and Multichannel Communications James Grace, Contact Center Consultant What is Big Data? Tema según el cronograma What is
SCHOOL SAFETY & VIOLENCE PREVENTION FOR LESBIAN, GAY, BISEXUAL & TRANSGENDER STUDENTS:
SCHOOL SAFETY & VIOLENCE PREVENTION FOR LESBIAN, GAY, BISEXUAL & TRANSGENDER STUDENTS: A Question & Answer Guide for California School Officials & Administrators A publication of the California Safe Schools
The Conference on Computers, Freedom, and Privacy. 'Overseeing' the Poor: Technology Privacy Invasions of Vulnerable Groups
'Overseeing' the Poor: Technology Privacy Invasions of Vulnerable Groups Birny Birnbaum Center for Economic Justice www.cej-online.org Credit Scoring: 21 st Century Redlining and the End of Insurance Why
Workshop Discussion Notes: Interpretation Gone Wrong
Workshop Discussion Notes: Interpretation Gone Wrong The Social, Cultural & Ethical Dimensions of Big Data March 17, 2014 - New York, NY http://www.datasociety.net/initiatives/2014-0317/ This document
Understanding the impact of the connected revolution. Vodafone Power to you
Understanding the impact of the connected revolution Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends, understanding
Value of the EU Data Protection Reform against the Big Data challenges. Keynote address 5th European Data Protection Days Berlin, 4.5.
Value of the EU Data Protection Reform against the Big Data challenges Keynote address 5th European Data Protection Days Berlin, 4.5.2015 Giovanni Buttarelli European Data Protection Supervisor (Check
BIG DATA AND CYBERSECURITY:
BIG DATA AND CYBERSECURITY: Multi Stakeholder Threats and Opportunities A US Speakers Program Embassy of the United States, Serbia September 20-25, 2015 Anne C. Bader Founder The International Cybersecurity
ICT Perspectives on Big Data: Well Sorted Materials
ICT Perspectives on Big Data: Well Sorted Materials 3 March 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations in
Diagrams Helpful for Understanding Critical Thinking and Its Relationship with Teaching and Learning
9 Diagrams Helpful for Understanding Critical Thinking and Its Relationship with Teaching and Learning This section entails diagrams which can help you: 1. make connections between the critical thinking
In which new or innovative ways do you think RPAS will be used in the future?
Written evidence Submitted by Trilateral Research & Consulting On the House of Lords Select Committee on the European Union call for evidence on Civil use of remotely piloted aircraft systems (RPAS) in
Title: From Participatory Culture to Prosumer Capitalism: Imaginaries of Transparency in the Age of Corporate Surveillance
Title: From Participatory Culture to Prosumer Capitalism: Imaginaries of Transparency in the Age of Corporate Surveillance Bio: Pieter Verdegem is Assistant Professor (Tenure Track) in New media and Information
Thinking small about big data: Privacy considerations for the public sector Shaun Brown Partner, nnovation LLP
Thinking small about big data: Privacy considerations for the public sector Shaun Brown Partner, nnovation LLP March 30, 2016 Thinking small about big data: objectives Consider big data as a concept Focus
Statistical Challenges with Big Data in Management Science
Statistical Challenges with Big Data in Management Science Arnab Kumar Laha Indian Institute of Management Ahmedabad Analytics vs Reporting Competitive Advantage Reporting Prescriptive Analytics (Decision
Big Data, Official Statistics and Social Science Research: Emerging Data Challenges
Big Data, Official Statistics and Social Science Research: Emerging Data Challenges Professor Paul Cheung Director, United Nations Statistics Division Building the Global Information System Elements of
The Promise of Industrial Big Data
The Promise of Industrial Big Data Big Data Real Time Analytics Katherine Butler 1 st Annual Digital Economy Congress San Diego, CA Nov 14 th 15 th, 2013 Individual vs. Ecosystem What Happened When 1B
Direct Marketing, Mobile Phones, and Consumer Privacy
Direct Marketing, Mobile Phones, and Consumer Privacy James Nehf* Professor King rightly observes that protecting consumer privacy in the United States is largely the responsibility of individuals. Although
Declaration of Internet Rights Preamble
Declaration of Internet Rights Preamble The Internet has played a decisive role in redefining public and private space, structuring relationships between people and between people and institutions. It
www.cloudcomputingintelligence.com PREDICTIONS FOR 2016
Cloud Computing Intelligence www.cloudcomputingintelligence.com PREDICTIONS FOR 2016 The data race is on for 2016 Tableau s Bob Middleton spells out his top ten trends for 2016, from cloud price wars to
Big Data for Social Good. Nuria Oliver, PhD Scientific Director User, Data and Media Intelligence Telefonica Research
Big Data for Social Good Nuria Oliver, PhD Scientific Director User, Data and Media Intelligence Telefonica Research 6.8 billion subscriptions 96% of world s population (ITU) Mobile penetration of 120%
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design. Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014
Privacy & Big Data: Enable Big Data Analytics with Privacy by Design Datenschutz-Vereinigung von Luxemburg Ronald Koorn DRAFT VERSION 8 March 2014 Agenda? What is 'Big Data'? Privacy Implications Privacy
Report on Data Aggregation Kelly Heffner, Rachel Popkin, Reem Alsweilem, Anjuli Kannan
The Electronic Frontier Foundation Defending Freedom in the Digital World Report on Data Aggregation Kelly Heffner, Rachel Popkin, Reem Alsweilem, Anjuli Kannan Introduction The primary concern of the
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE
DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE INTRODUCTION RESEARCH IN PRACTICE PAPER SERIES, FALL 2011. BUSINESS INTELLIGENCE AND PREDICTIVE ANALYTICS
UK technical non-paper: e-commerce
UK technical non-paper: e-commerce In a letter to Commission President Juncker on 12 January, Prime Minister David Cameron set out the UK vision for the digital single market: The UK proposes that the
Big Marketing Executive Summary. The case for marketing to react to consumer opinions on personalisation
Big Marketing Executive Summary The case for marketing to react to consumer opinions on personalisation Produced by GfK and the Guardian Media Network for the Guardian Changing Advertising Summit 2013
Analytics For Everyone - Even You
White Paper Analytics For Everyone - Even You Abstract Analytics have matured considerably in recent years, to the point that business intelligence tools are now widely accessible outside the boardroom
A Future Without Secrets. A NetPay Whitepaper. www.netpay.co.uk www.netpay.ie. more for your money
A Future Without Secrets A NetPay Whitepaper A Future Without Secrets The new business buzz word is Big Data - everyone who is anyone in business is talking about it, but is this terminology just another
DATA MINING - 1DL105, 1DL025
DATA MINING - 1DL105, 1DL025 Fall 2009 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht09 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
What mathematical optimization can, and cannot, do for biologists. Steven Kelk Department of Knowledge Engineering (DKE) Maastricht University, NL
What mathematical optimization can, and cannot, do for biologists Steven Kelk Department of Knowledge Engineering (DKE) Maastricht University, NL Introduction There is no shortage of literature about the
Security Information & Event Management (SIEM) Sri Carlyle Country Manager
Security Information & Event Management (SIEM) Sri Carlyle Country Manager LogPoint Introduction Founded i 2001, Copenhagen, Denmark 100 % Danish ownership Yearly growth: 100 percent 70 employees: 20 Sales/admin
Managing risk in healthcare startups
Managing risk in healthcare startups Venture capital investors focus on risk and how they can decrease it. They want to make sure the entrepreneur knows about the risks ahead, and how is he planning to
Customer Relationship Management (CRM)
Customer Relationship Management (CRM) Customer relationship management, or CRM, is an approach to doing business that can transform the performance and profitability of an organisation. It is about putting
WHO GLOBAL COMPETENCY MODEL
1. Core Competencies WHO GLOBAL COMPETENCY MODEL 1) COMMUNICATING IN A CREDIBLE AND EFFECTIVE WAY Definition: Expresses oneself clearly in conversations and interactions with others; listens actively.
POLICY. Responsible Use of Social Media
POLICY Responsible Use of Social Media Contact Officer Director of Personnel Director of Communications & Participation Senior Project Manager: Corporate Policies (Policy author) Purpose The primary aims
Achievements and challenges of the single market. S&D responses to citizens top 10 concerns
Achievements and challenges of the single market S&D responses to citizens top 10 concerns The European economic model must be based on three principles: competition which stimulates, co-operation which
SEVEN SHADES OF MOBILE. The Hidden Motivations of Mobile Users
SEVEN SHADES OF MOBILE The Hidden Motivations of Mobile Users 7 Shades of Mobile: The Hidden Motivations of Mobile Users AOL - BBDO Mobile Research October 2012 Surface level view = surface level insights
EFFECTIVE PERFORMANCE APPRAISALS
EFFECTIVE PERFORMANCE APPRAISALS When used correctly, the performance appraisal process is a useful technique to hold employees accountable for desired results, and aligning them with business strategy.
Operating in a New Digital Economy. DAV Management Limited. Delivering your strategy in a world becoming increasingly digital. www.davmanagement.
Operating in a New Digital Economy Delivering your strategy in a world becoming increasingly digital DAV Management Limited www.davmanagement.com Copyright Copyright DAV Management Limited 2015 All Rights
Collaborations between Official Statistics and Academia in the Era of Big Data
Collaborations between Official Statistics and Academia in the Era of Big Data World Statistics Day October 20-21, 2015 Budapest Vijay Nair University of Michigan Past-President of ISI [email protected] What
Situational Awareness Through Network Visualization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction
RESPONSE TO FCC CONSULTATION. Notice of Proposed Rulemaking on Protecting and Promoting the Open Internet GN Docket No. 14-28
RESPONSE TO FCC CONSULTATION Notice of Proposed Rulemaking on Protecting and Promoting the Open Internet GN Docket No. 14-28 Introduction European Digital Rights (EDRi) is an association of 36 digital
How Covert Agents Infiltrate the Internet to Manipulate, Deceive,...
DISPATCHES How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations By Glenn Greenwald 24 Feb 2014, 6:25 PM EST 1 of 17 02/25/2014 10:22 AM A page from a GCHQ top secret
Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits
Big Data, Key Challenges: Privacy Protection & Cooperation Observations on international efforts to develop frameworks to enhance privacy while realising big data s benefits Seminar arranged by the Office
Customer Relationship Management (CRM) Business Guide. Superfast Business Wales
Superfast Business Wales Customer Relationship Management, or CRM, is an approach to doing business that can transform the performance and profitability of an organisation. Business Guide Customer Relationship
Employee Engagement Special Report
Employee Engagement Special Report Leveraging Engagement for Profitability What is an engaged employee and how important are they to my business? An engaged employee cares about more than just receiving
Trusted Personal Data Management A User-Centric Approach
GRUPPO TELECOM ITALIA Future Cloud Seminar Oulu, August 13th 2014 A User-Centric Approach SKIL Lab, Trento - Italy Why are we talking about #privacy and #personaldata today? 3 Our data footprint Every
Data Empowered Utilities
Data Empowered Utilities Data analytics: Empowering utilities to solve today s problems while building tomorrow s business Author: Thomas Zimmermann, CEO Smart Grid Services, Smart Grid Division, Siemens
No Hiding Place. Insurance Fraud Exposed. September 2012
No Hiding Place Insurance Fraud Exposed September 2012 NO HIDING PLACE INSURANCE FRAUD EXPOSED 3 Executive summary Every hour of every day 15 fraudulent insurance claims are exposed in the UK. Insurance
Cybercrime Prevention and Awareness
April, 2014 Cybercrime Prevention and Awareness Basic Security Principles to Help You Better Navigate Through Cyberspace To join conference call dial (305) 433-6663 option 4 PIN # 42014 Presented by: Miguel
DATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
End-Of-Course Writing Prompts
Some say that the journey is more important than the destination. They argue that people find more joy and satisfaction in working toward a goal than in achieving it. Others say that it is the destination
Employee Engagement Survey Results. Sample Company. All Respondents
Employee Engagement Survey Results All Respondents Summary Results from 246 Respondents February, 2009 Table of Contents All Respondents (n = 246) 1 Employee Engagement Two-Factor Profile of Employee Engagement
Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights
A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.
37 Marketing Automation Best Practices David M. Raab Raab Associates Inc.
37 Marketing Automation Best Practices David M. Raab Raab Associates Inc. Many companies today have installed marketing automation or demand generation software.* But buying a system is like joining a
The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology
The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology Evidence from the UK Computing Research Committee Definitive. 1 September 2015 The UK Computing Research
INTRODUCE workshop by explaining that today is about core transferable skills of telephone skills.
WELCOME delegates INTRODUCE yourself plus background. INTRODUCE workshop by explaining that today is about core transferable skills of telephone skills. POINT OUT: Telephone techniques are all about how
