83 research outputs found
The Application of the Right to be Forgotten in the Machine Learning Context: From the Perspective of European Laws
The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.
This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can hardly be removed from the entire cyberspace. There is also evidence in the technical, legal, and social spheres to elaborate on the mismatch between the rules of the right to be forgotten and the novel machinery background based on the above reasons.
To mitigate these issues, this article will draw lessons from the cyberspace regulation theories and expound on their insights into realizing the right and the strategies they offered to reframe a new legal scheme of the right. This innovative framework entails a combination of technological, legal, and possibly social measures taken by online intermediaries which make critical decisions on the personal data given the so-called stewardship responsibilities. Therefore, the application of the right to be forgotten in the machinery landscape will plausibly be more effective
Privacy, Space and Time: a Survey on Privacy-Preserving Continuous Data Publishing
Sensors, portable devices, and location-based services, generate massive amounts of geo-tagged, and/or location- and user-related data on a daily basis. The manipulation of such data is useful in numerous application domains, e.g., healthcare, intelligent buildings, and traffic monitoring, to name a few. A high percentage of these data carry information of users\u27 activities and other personal details, and thus their manipulation and sharing arise concerns about the privacy of the individuals involved. To enable the secure—from the users\u27 privacy perspective—data sharing, researchers have already proposed various seminal techniques for the protection of users\u27 privacy. However, the continuous fashion in which data are generated nowadays, and the high availability of external sources of information, pose more threats and add extra challenges to the problem. In this survey, we visit the works done on data privacy for continuous data publishing, and report on the proposed solutions, with a special focus on solutions concerning location or geo-referenced data
The Contemporary Face of Transnational Criminal Organizations and the Threat they Pose to U.S. National Interest: A Global Perspective.
Traditional organized crime groups have consistently posed issues for la w enforcement; however, the contemporary TCOs present an even greater security risk and threat. TCOs thrive in countries with a weak rule of law and present a great threat to regional security in many parts of the world. Bribery and corruption employed by these groups further serve to destabilize already weak governments. These TCOs also present a major threat to U.S. and world financial systems by exploiting legitimate commerce, and in some cases creating parallel markets (“Transnational Organized,” 2011) . Finally, one of the most significant threats posed by contemporary TCOs is their alliances and willingness to work with terrorist and extremist organizations. This paper will focus on contemporary TCOs by giving a brief overview of the most common criminal enterprises associated with these groups, the nexus between various TCOs, the nexus between TCOs and terrorist and extremist groups, case studies highlighting the nexus, and the threats they pose to U.S. national interests
Documenting and Digitizing with Dignity: Ethical Considerations and the West African Frontier Force Personnel Records
This article explores considerations arising from the digitization of the personnel records from the West African Frontier Force held at the Sierra Leone Public Archives. These records reflect a knowable and living past and contain sensitive and confidential information including medical and personal details not normally disclosed to the public. Best practice and ethics must be taken into account to protect the privacy of these subjects, but this approach applies beyond these records to all those concerning the trans-Atlantic slave trade. Digital best practice emphasizes the human dignity of what might otherwise be regarded as data alone. We begin by exploring the archive itself as an abstract and then a physical concept, as in many cases archives are the homes of documents which are vital to our research, but these documents may be in precarious condition. By reflecting on the archive as an object, our concern for best practice extends to respecting both the provenance of the primary sources and the people who preserve them. The second topic we explore is a methodological and ethical one: the organization, anonymization, and standardization of data and metadata. This portion of our article is intended to serve as a guide for other, similar research projects, offering a method of efficiently organizing complex systems of documents, particularly those where the original file structure should be maintained as closely as possible to preserve meaning. We finally consider the challenge of placing soldiers’ origins onto a mapped topography, which leads us to analyze the considerable issues around colonial mapping as a whole, and to develop a way of navigating this hurdle. Our article illuminates various challenges as we digitize and trace individual lives within complex archival data. In each case we have described the challenge we found, analyzed it, and developed ways of addressing or solving problems which we believe will stand as best practice when applied beyond our project.Cet article examine certaines des consĂ©quences de la numĂ©risation des dossiers du personnel de la West African Frontier Force conservĂ©s dans les archives publiques de la Sierre Leone. Ces dossiers rendent possible l’accès Ă une image d’un passĂ© encore vif, puisqu’ils contiennent des informations dĂ©licates et confidentielles, telles que des dĂ©tails mĂ©dicaux et personnels, qui ne sont pas normalement rĂ©vĂ©lĂ©s au public. Il faut tenir compte des bonnes pratiques et de l’éthique pour protĂ©ger la vie privĂ©e des sujets, et cela doit s’appliquer Ă toutes les archives liĂ©es Ă la traite des esclaves transatlantique. Les bonnes pratiques numĂ©riques valorisent la dignitĂ© humaine des personnes qui risqueraient autrement d’être traitĂ©es comme des donnĂ©es. Dans cet article, nous commençons d’abord Ă explorer l’archive sous ses aspects fragmentaires ainsi que physiques : dans certains cas, les archives abritent des documents essentiels Ă nos recherches, mais cela dans des conditions très prĂ©caires. Nos rĂ©flexions sur la matĂ©rialitĂ© de l’archive nous ont menĂ©s Ă de bonnes pratiques qui respectent aussi bien la provenance des sources primaires que les personnes qui les conservent. Nous passons ensuite Ă des considĂ©rations mĂ©thodologiques et Ă©thiques : comment organiser, anonymiser et standardiser les donnĂ©es et les mĂ©tadonnĂ©es. Nous espĂ©rons que cette section servira de guide Ă d’autres projets de recherche semblables en proposant une mĂ©thode efficace pour organiser des systèmes complexes de documents, surtout pour ceux oĂą il faudrait respecter le plus possible la structure d’origine des fichiers pour en respecter la signification. Enfin, nous abordons les problèmes que pose la localisation des origines des soldats sur les cartes topographiques ; cela nous a amenĂ©s Ă analyser les divers problèmes de la cartographie coloniale dans sa globalitĂ©, et ainsi Ă trouver des solutions adĂ©quates. Notre article Ă©claire les dĂ©fis de la recherche et de la numĂ©risation de vies individuelles Ă travers des donnĂ©es d’archives complexes : dans chaque cas, nous avons dĂ©crit et analysĂ© les obstacles auxquels nous avons Ă©tĂ© confrontĂ©s et les moyens trouvĂ©s pour les affronter ou les rĂ©soudre, avec la conviction qu’ils pouvaient constituer de bonnes pratiques qui pouvaient ĂŞtre appliquĂ©es Ă d’autres projets.Este articulo examina algunas consecuencias de la digitalizaciĂłn de los expedientes del personal de la West African Frontier Force conservados en los archivos pĂşblicos de Sierra Leone. Estos expedientes ofrecen la imagen de un pasado accesible a nuestro conocimiento y aĂşn vivo, ya que conservan informaciones delicadas y confidenciales, tales como detalles mĂ©dicos y personales, que no se entregan habitualmente al pĂşblico. Es necesario tomar en cuenta las buenas prácticas y la Ă©tica para proteger la vida privada de los sujetos, y el mismo mĂ©todo puede aplicarse a todos los archivos vinculados con la trata transatlántica de esclavos. Las buenas prácticas en el ámbito de la digitalizaciĂłn enfatizan la dignidad humana de personas que, de otra manera, correrĂan peligro de ser tratadas como datos. Consideramos, primero, el archivo tanto en sus aspectos abstractos como fĂsicos: en ciertos casos, los archivos conservan documentos esenciales para nuestras investigaciones, pero en condiciones precarias. Nuestras reflexiones sobre la materialidad del archivo nos han llevado a buenas prácticas que respetan tanto el origen de las fuentes primarias como las personas que las conservan. Luego pasamos a consideraciones metodolĂłgicas y Ă©ticas: cĂłmo organizar, anonimizar y estandarizar los datos y los metadatos, esperando servir de guĂa a otros proyectos de investigaciĂłn parecidos, proponiendo una metodologĂa eficaz para organizar sistemas complejos de documentos, sobre todo en los casos en que habrĂa que respetar lo más posible la estructura de origen de los archivos para que no se pierda su significado. Por Ăşltimo, abordamos los problemas que plantea la localizaciĂłn de los orĂgenes de los soldados en las cartas topográficas, lo que nos ha llevado a analizar los diversos aspectos problemáticos de la cartografĂa colonial, y a encontrar soluciones adecuadas. Nuestro artĂculo aclara los desafĂos de la investigaciĂłn y de la digitalizaciĂłn de vidas individuales a travĂ©s de los datos de archivos complejos: en cada caso, hemos descrito y analizado los obstáculos y encontrado maneras de sortearlos, con la convicciĂłn de que nuestras soluciones podrán ser aplicadas en otros proyectos.Este artigo examina algumas consequĂŞncias da digitalização dos registos do pessoal da West African Frontier Force, guardados nos arquivos pĂşblicos da Sierra Leone. Estes registos deixam a imagem de um passado acessĂvel ao nosso conhecimento e ainda vivo, ao conter informações sensĂveis e confidenciais, como pormenores mĂ©dicos e pessoais, que nĂŁo seriam normalmente revelados ao pĂşblico. Importa considerar as boas práticas e a Ă©tica para proteger a vida privada dos indivĂduos, e o mesmo mĂ©todo pode ser aplicado a todos os arquivos ligados ao trato transatlântico de escravos. As boas práticas digitais realçam a dignidade humana das pessoas que de outra maneira riscariam ser tratadas como dados. Consideramos primeiro o arquivo no seu aspecto abstrato mas tambĂ©m fĂsico: em alguns casos, os arquivos conservam documentos essenciais para as nossas pesquisas, mas em condições muito precárias. As nossas reflexões sobre a materialidade do arquivo levaram-nos a considerar boas práticas que respeitam tanto a procedĂŞncia das fontes primárias quanto as pessoas que as conservam. Passamos a seguir Ă considerações metodolĂłgicas e Ă©ticas: como organizar, anonimizar e uniformizar os dados e os metadados, esperando assim guiar outros projetos de investigação similares, ao propor um mĂ©todo eficiente para organizar sistemas complexos de documentos, sobretudo nos casos em que seria necessário respeitar quanto possĂvel a estrutura original dos ficheiros para nĂŁo perder sua significação. Por fim, abordamos os problemas que coloca a localização das origens dos soldados nos mapas topográficos, o que nos levou a analizar os diferentes aspectos problemáticos da cartografia colonial, e assim encontrar soluções apropriadas. O nosso artigo esclarece os desafios da pesquisa e da digitalização de vidas individuais atravĂ©s de dados de arquivo complexos: em cada caso, descrevemos e analisamos as dificuldades e os meios para contorná-las, com a convicção que estas soluções poderĂŁo ser aplicadas em outros projetos
Untangling the Web: A Guide To Internet Research
[Excerpt] Untangling the Web for 2007 is the twelfth edition of a book that started as a small handout. After more than a decade of researching, reading about, using, and trying to understand the Internet, I have come to accept that it is indeed a Sisyphean task. Sometimes I feel that all I can do is to push the rock up to the top of that virtual hill, then stand back and watch as it rolls down again. The Internet—in all its glory of information and misinformation—is for all practical purposes limitless, which of course means we can never know it all, see it all, understand it all, or even imagine all it is and will be. The more we know about the Internet, the more acute is our awareness of what we do not know. The Internet emphasizes the depth of our ignorance because our knowledge can only be finite, while our ignorance must necessarily be infinite. My hope is that Untangling the Web will add to our knowledge of the Internet and the world while recognizing that the rock will always roll back down the hill at the end of the day
Pay For (Privacy) Performance: Holding Social Network Executives Accountable for Breaches in Data Privacy Protection
Social networking has proliferated over the past years and is now being utilized by a large percentage of the world’s population. Social networks substantially contribute to enhanced speech, creativity, and communication. Yet, their practices of collecting and monetizing personal data of users pose severe privacy risks. Compelling social networks to internalize these risks is crucial for the healthy evolution of social networking. This article proposes a novel approach to address this challenge: to link executive compensation in social networking firms to the quality of data protection the company provides to its users. This proposal is different from other solutions that have been proposed in the context of social media privacy in two significant ways. First, the direct policy object is not the firm itself. Rather, I propose that executive compensation should be keyed to the level of privacy protection the firm provides to its users. Second, the proposal advances a dynamic solution, where privacy practices would adapt to changing privacy expectations. Implementation of my proposal would yield a number of key advantages. First, it would create a powerful incentive for executives of social networks to internalize the harms they cause to users’ privacy. Second, it would provide firsthand and up-to-date information about users’ changing needs and interests. Third, it would align the interests of social media executives with the long-term interests of shareholders to maintain users’ trust in social media, in order for social networks to continue to attract a high volume of users and activity. For reasons I explore herein, shareholders are not likely to achieve this goal themselves. Fourth, it would simplify the privacy enforcement process and reduce its costs. Finally, it would allow social networks to develop and grow, by allowing use of private data, as long as privacy considerations are internalized
Economic essays on privacy, big data, and climate change
This doctoral thesis aims to advance our understanding of major topics of concern in the 21st century using theoretical as well as empirical economic methodologies. All three topics do and will continue to affect people’s lives as they can substantially shape the functioning of our societies. Thematically linked, Chapter 2 and 3 both focus on privacy choices and their consequences in the context of big data algorithms that target individual consumers. In contrast, Chapter 3 and 4 are linked methodologically as both present results from economic laboratory experiments, where the former focuses on cognitive challenges of individual decision-makers and the latter on challenges to coordination and cooperation between decision-makers. Chapter 2 presents results from a theoretical model where consumers face a monopolistic seller who is not only capable of perfect price discrimination but also more strategically sophisticated than the consumers. The model shows that consumers use a costly privacy-protective sales channel even in the absence of an explicit taste for privacy if they are not too strategically sophisticated. Chapter 3 presents results from an economic laboratory experiment related to the model developed before. Finding substantial deviations from Nash equilibrium predictions. Addressing cognitive constraints often present in privacy choices, some evidence for two alternative explanations is found: level-k thinking and reinforcement learning. A policy treatment resembling privacy-by-default mechanisms leads to a strong increase in hiding behavior. Chapter 4 presents results from an economic laboratory experiment of a dynamic resource extraction game that mimics the global multi-generation planning problem for climate change and fossil fuel extraction. The findings from this experiment suggest that successful cooperation does not only need to overcome a gap between individual incentives and public interests. There is also a fundamental heterogeneity between subjects with respect to beliefs and preferences about the way in which this should be achieved
Location Privacy Protection in the Mobile Era and Beyond
As interconnected devices become embedded in every aspect of our lives, they accompany
many privacy risks. Location privacy is one notable case, consistently recording an individual’s
location might lead to his/her tracking, fingerprinting and profiling. An individual’s
location privacy can be compromised when tracked by smartphone apps, in indoor spaces,
and/or through Internet of Things (IoT) devices. Recent surveys have indicated that users
genuinely value their location privacy and would like to exercise control over who collects
and processes their location data. They, however, lack the effective and practical tools to
protect their location privacy. An effective location privacy protection mechanism requires
real understanding of the underlying threats, and a practical one requires as little changes to
the existing ecosystems as possible while ensuring psychological acceptability to the users.
This thesis addresses this problem by proposing a suite of effective and practical privacy
preserving mechanisms that address different aspects of real-world location privacy threats.
First, we present LP-Guardian, a comprehensive framework for location privacy protection
for Android smartphone users. LP-Guardian overcomes the shortcomings of existing
approaches by addressing the tracking, profiling, and fingerprinting threats posed by
different mobile apps while maintaining their functionality. LP-Guardian requires modifying
the underlying platform of the mobile operating system, but no changes in either the apps
or service provider. We then propose LP-Doctor, a light-weight user-level tool which allows
Android users to effectively utilize the OS’s location access controls. As opposed to
LP-Guardian, LP-Doctor requires no platform changes. It builds on a two year data collection
campaign in which we analyzed the location privacy threats posed by 1160 apps for
100 users. For the case of indoor location tracking, we present PR-LBS (Privacy vs. Reward
for Location-Based Service), a system that balances the users’ privacy concerns and
the benefits of sharing location data in indoor location tracking environments. PR-LBS
fits within the existing indoor localization ecosystem whether it is infrastructure-based
or device-based. Finally, we target the privacy threats originating from the IoT devices
that employ the emerging Bluetooth Low Energy (BLE) protocol through BLE-Guardian.
BLE-Guardian is a device agnostic system that prevents user tracking and profiling while
securing access to his/her BLE-powered devices. We evaluate BLE-Guardian in real-world
scenarios and demonstrate its effectiveness in protecting the user along with its low overhead
on the user’s devices.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/138563/1/kmfawaz_1.pd
- …