privacy with internet

92
Privacy with Internet Mathias Klang

Upload: mathias-klang

Post on 04-Dec-2014

681 views

Category:

Technology


3 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Privacy with Internet

Privacy with InternetMathias Klang

Page 2: Privacy with Internet

“Having two identities for yourself is an example of a lack of integrity”

Mark Zuckerberg (2010)

Page 3: Privacy with Internet
Page 4: Privacy with Internet
Page 5: Privacy with Internet
Page 6: Privacy with Internet
Page 7: Privacy with Internet

History: how did we get to this?

Page 8: Privacy with Internet

Privacy?

Page 9: Privacy with Internet

privacy(from Latin: privatus "separated from the rest, deprived of something, esp. office, participation in the government", from privo "to deprive") is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. (Wikipedia)

Page 10: Privacy with Internet

Historical & socio-biological construct

Page 11: Privacy with Internet
Page 12: Privacy with Internet

The Right to Privacy

The intensity and complexity of life, attendant upon advancing civilization, have rendered necessary some retreat from the world…solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon his privacy, subjected him to mental pain and distress…

Warren and Brandeis The Right to Privacy, 4 Harvard Law Review 193 (1890)

Page 13: Privacy with Internet

The gaze Data collectionData analysis

Page 14: Privacy with Internet

Data

Spatial

Page 15: Privacy with Internet

Technology threats

Page 16: Privacy with Internet
Page 17: Privacy with Internet
Page 18: Privacy with Internet

Paparazzi (1898)

Page 19: Privacy with Internet

The execution of Ruth Snyder 1928

Page 20: Privacy with Internet
Page 21: Privacy with Internet
Page 22: Privacy with Internet
Page 23: Privacy with Internet

Democratization of surveillance

Page 24: Privacy with Internet
Page 25: Privacy with Internet

Child Locator GPS Watch

Page 26: Privacy with Internet

Teen arrive alive

Page 27: Privacy with Internet

& other interesting toys

Page 28: Privacy with Internet

AM/FM Clock radio wireless hidden camera

Page 29: Privacy with Internet

Shower AM-FM Mirror Radio

Page 30: Privacy with Internet

And what about Manufacturers responsibility?

Page 31: Privacy with Internet

regulation

Page 32: Privacy with Internet

The law

Page 33: Privacy with Internet

Law is a system of rules and guidelines which are enforced… to govern behavior, wherever possible. It shapes … and serves as a social mediator of relations between people.

Page 34: Privacy with Internet

Norms from above

Page 35: Privacy with Internet

Power to the people: Democracy

Page 36: Privacy with Internet

Power of the technocracy

Page 37: Privacy with Internet

Socio-legal regulation

Page 38: Privacy with Internet

Law

Contextual & programmed social

rules

Architecture

Page 39: Privacy with Internet

Technology makes society

Page 40: Privacy with Internet

Only technology(spot the ethical dilemma?)

Page 41: Privacy with Internet

Data protection laws

Page 42: Privacy with Internet

Swedish Datalagen1973

Data Protection Directive

1995

PUL1998

1984 1997

Nokia 6120Mac Classic

Page 43: Privacy with Internet

Personuppgiftslagen (1998)

Page 44: Privacy with Internet

All information that directly or indirectly points to a live physical person

Page 45: Privacy with Internet

Autonomy – user control

45

Page 46: Privacy with Internet

Harmless – ordinary – Sensitive data

Page 47: Privacy with Internet

Ramsbrofallet (2001)

Page 48: Privacy with Internet

Bodil Lindqvist (2003)

Page 49: Privacy with Internet

And then…

Page 50: Privacy with Internet

But first technological change – why it matters

Page 51: Privacy with Internet

Game changer: storage

Page 52: Privacy with Internet

Game changer: communication

Page 53: Privacy with Internet

Digitalization

Connectivity

Storage

Devices

Page 54: Privacy with Internet

Flickr

2000

2001

2002

2003 2005

2004 2006

Wikipedia

Linkedin

Blog

ger 1

999

Second Life

My Space

Skype

Digg

Facebook

Ning

YouTube

Twitter

Spotify

Google c:a 1998

2008

2007 2009

Farmville

iphone

WikileaksAngry Birds

Page 55: Privacy with Internet

Theoretical rights become inevitable

practice

Page 56: Privacy with Internet

Technology changing society, but social rules slow to evolve…

Page 57: Privacy with Internet

Surveillance: A gaze from above

Page 58: Privacy with Internet

powerHow is surveillance possible?

Page 59: Privacy with Internet

The stateInformation gathering

Page 60: Privacy with Internet
Page 61: Privacy with Internet
Page 62: Privacy with Internet

Sousveillance: A gaze from below

Page 63: Privacy with Internet

Social tiesHow is sousveillance possible?

Page 64: Privacy with Internet

“friends”

Page 65: Privacy with Internet

Strength of Weak ties“Weak ties provide people with access to information and resources beyond those available in their own social circle; but strong ties have greater motivation to be of assistance and are typically more easily available.” (Granovetter, 1983, pp 209)

Page 66: Privacy with Internet

Autoveillance: a gaze from within

Page 67: Privacy with Internet

Exhibitionism?How is autoveillance possible?

Page 68: Privacy with Internet

myself

Page 69: Privacy with Internet

We leak information

Page 70: Privacy with Internet

Compartmentalization

Page 71: Privacy with Internet

Analog social norms

Page 72: Privacy with Internet

Protection from the outer gaze

Page 73: Privacy with Internet

Theory?Narcissism is a term with a wide range of meanings, depending on whether it is used to describe a central concept of psychoanalytic theory, a mental illness, a social or cultural problem, or simply a personality trait. Except in the sense of primary narcissism or healthy self-love, "narcissism" usually is used to describe some kind of problem in a person or group's relationships with self and others. (wikipedia)

Page 74: Privacy with Internet

Data analysis

Page 75: Privacy with Internet

Eula: Licensing to

the weak

Page 76: Privacy with Internet

Today we have a mix of sur, sous & autoveillance. regulation mainly focuses on surveillance.

Page 77: Privacy with Internet

End of privacy?

Page 78: Privacy with Internet

The Hive-mind

Page 79: Privacy with Internet

If you have done nothing wrong,

you have nothing to fear

Page 80: Privacy with Internet

threats?

Page 81: Privacy with Internet

Other people Cyberbullying

StalkingBurgulary

Page 82: Privacy with Internet

Corporations

Page 83: Privacy with Internet

We have (theoretical) control over Big Brother

Page 84: Privacy with Internet

If you are not paying for it, you're not the customer; you're the product being sold.

Page 85: Privacy with Internet

State & Corporations

Page 86: Privacy with Internet

The filter bubbleEli Pariser

Page 87: Privacy with Internet

Identity & Information junk food.

Page 88: Privacy with Internet

The Net delusionEvgeny Morozov

Page 89: Privacy with Internet

Technology is not inherently democratic

Page 90: Privacy with Internet

A Squirrel Dying In Your Front Yard May Be More Relevant To

Your Interests Right Now Than People

Dying In AfricaMark Zuckerberg

Page 91: Privacy with Internet

Thank you.

Page 92: Privacy with Internet

Information• All images from www.flickr.com (unless specifically stated)

• Image & licensing info in the notes section of slides

• Presentation licensed: Creative Commons BY-NC-SA

• The presentation can be downloaded from: www.slideshare.net/klang

• More information about me: www.techrisk.se & www.digital-rights.net

• Mathias Klang. [email protected] or @klang67