1 / 17

Privacy as contextual integrity

Privacy as contextual integrity. Helen Nissenbaum New York University http://www.nyu.edu/projects/nissenbaum September 6, 2007 Ars Electronica, Linz Support from: NSF ITR-0331542: Sensitive Information in a Wired World. the conundrum ….

elden
Download Presentation

Privacy as contextual integrity

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy as contextual integrity Helen Nissenbaum New York University http://www.nyu.edu/projects/nissenbaum September 6, 2007 Ars Electronica, Linz Support from: NSF ITR-0331542: Sensitive Information in a Wired World.

  2. the conundrum … Nissenbaum/Ars Electronica '07

  3. Privacy threats of IT and associated socio-technical practices • Tracking and monitoring RFID, EZ Pass, online-tracking, ISP “clickstream” monitoring, CCTV, biometrics, VSCS, auto “black boxes,” DRM, ubicomp, etc. • Aggregation and analysis databases, data warehouses, data mining, e.g. LM-Households. ChoicePoint, MATRIX, Census, Credit Bureaus, Rapleaf, etc. • Publication online public records, e.g. court records, Social networking sites, e.g. blogs, MySpace, Facebook, flickr, etc. Nissenbaum/Ars Electronica '07

  4. solutions? Interest-based scuffles: “the privacy preference” vs. competing claims Privacy a fundamental human right defined as: Alan Westin: “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” Jeffrey Reimann: ”the condition under which others are deprived of access to you at their discretion.” Michael Froomkin: “the ability to control the acquisition or release of information about oneself.” Ruth Gavison:”limiting the degree of access others have to you via information, attention, or physical proximity.” Nissenbaum/Ars Electronica '07

  5. Invoke the private/public dichotomy The private ~ a realm deserving privacy protection The public ~ a realm not deserving privacy protection …anything goes? Public and private what? … actors, realms, information proves too much and too little Nissenbaum/Ars Electronica '07

  6. Intuitions, gut reactions … do not reside primarily at the level of interest based scuffles (privacy is not merely a preference) nor fully accounted by fundamental, (familiar) moral and political principles. social contexts as unit of analysis for privacy Nissenbaum/Ars Electronica '07

  7. Privacy as Contextual Integrity Contexts… Structured social settings (“Institutions”) Characterized by roles, relationships, power structures, canonical activities, strategies, norms (rules), enforcement mechanisms, and internal values (goals, ends, purposes) E.g. health-care, education, politics, religious observance Nissenbaum/Ars Electronica '07

  8. more about contexts… Evolved over time in cultures and societies, subject to historical, cultural, geographic contingencies May be nested, overlap, conflict May be more or less explicit, formalized, institutionalized (e.g. class clown vs judge) May be more or less “complete” Nissenbaum/Ars Electronica '07

  9. Among the normscontext-relative Informational Norms In a context, the flow of information of a certain type about a subject (acting in a particular capacity/role) from oneactor (could be the subject) to anotheractor (in a particular capacity/role) is governed by a particular transmission principle. key parameters: contexts, attributes, actors, transmission principles Nissenbaum/Ars Electronica '07

  10. Formal representation of an Informational Norm in Temporal Logic From: A. Barth, A. Datta, J. Mitchell, and H. Nissenbaum, “Privacy and Contextual Integrity: Framework and Applications,”Proceedings of the IEEE Symposium on Security and Privacy, Forthcoming 2006 Nissenbaum/Ars Electronica '07

  11. Transmission Principles** some examples: Consent (subject controls) Notice (subject is/is not aware of transmission) Compulsion (e.g. earnings to IRS) Confidentiality Sale Reciprocity Entitlement, desert Etc… Nissenbaum/Ars Electronica '07

  12. Descriptive power of CI Contextual Integrity is preserved when informational norms of a context are respected; it is violated when any of the norms are breached. ~ When people complain, look for CI violations not preferences! ~ Surveillance is NOT always problematic ~ Privacy is NOT control over information about oneself ~ Privacy is NOT secrecy; it is appropriate flow Nissenbaum/Ars Electronica '07

  13. Is CI conservative?Is a violation of CI always a problem? traditional wisdom, but … Opportunity Costs“perhaps there is something better…” Tyranny of the Normal “change can be liberating…” Nissenbaum/Ars Electronica '07

  14. How to evaluate challenges to entrenched norms?? Two key steps … Moral and political considerations Harm (e.g. stigma, discrimination, identity theft) Justice, balance of power, fair distribution of goods Freedom, autonomy, democracy, property Countervailing considerations (security, efficiency, etc.) Relation to values/goals of context healthcare (psychotherapy) Friendship (Tripp/Lewinsky) Anonymity in democratic elections TMN and websearch privacy; CASSIE in public libraries Mobility on the roads (VSCS) Nissenbaum/Ars Electronica '07

  15. Technologies “Cassie” VSCS Rapleaf, Choicepoint Court records online Nissenbaum/Ars Electronica '07

  16. TMN: Lightweight Firefox plugin for “privacy through obfuscation”… site of resistanceAvailable at: http://mrl.nyu.edu/~dhowe/TrackMeNot/Or: https://addons.mozilla.org/enUS/firefox/addon/3173 Nissenbaum/Ars Electronica '07

  17. Does CI have all the answers? Nissenbaum/Ars Electronica '07

More Related