COAP:Privacy - part 2: Difference between revisions

The educational technology and digital learning wiki
Jump to navigation Jump to search
mNo edit summary
Line 9: Line 9:
# Each student must read one paper from the reading list below (or part of it). Work will be distributed at the end of lesson 1
# Each student must read one paper from the reading list below (or part of it). Work will be distributed at the end of lesson 1
# Please come back with the following items found in your reading:
# Please come back with the following items found in your reading:
## One '''important idea or fact''' found in the article (issues)
## One or two '''important idea(s) or fact(s)''' found in the article (issues)
## One '''guideline''' for either ''institutions that collect data'' or ''individuals that provide data''
## One '''guideline''' for either ''institutions that collect data'' or ''individuals that provide data''
## One '''question''' you would like to discuss   
## One '''question''' you would like to discuss   
Line 17: Line 17:
==== Defining (Internet) Privacy ====
==== Defining (Internet) Privacy ====


# '''''[http://plato.stanford.edu/entries/privacy/ Privacy]''''', Stanford Encyclopedia of Philosophy, First published Tue May 14, 2002; substantive revision Fri Aug 9, 2013
* '''''[http://plato.stanford.edu/entries/privacy/ Privacy]''''', Stanford Encyclopedia of Philosophy, First published Tue May 14, 2002; substantive revision Fri Aug 9, 2013
#* '''Student''':  
** '''Student''':  
#* Summary: This article discusses the multiple facets of privacy. Good, but somewhat difficult reading.
** Summary: This article discusses the multiple facets of privacy. Good, but somewhat difficult reading.
#* ''Read all''
** ''Read all''
# Daniel J. Solove (2006). '''''Taxonomy Of Privacy''''', University of Pennsylvania Law Review.
 
#* '''Student''': DO
 
#* Read first part of ''The Taxonomy'' (p 483-490) plus the Conclusion.  
* Daniel J. Solove (2006). '''''Taxonomy Of Privacy''''', University of Pennsylvania Law Review.
#* [http://tecfa.unige.ch/guides/privacy/solove-2006-taxonomy.pdf solove-2006-taxonomy.pdf] (access restricted)
** '''Student''':
** Read first part of ''The Taxonomy'' (p 483-490) plus the Conclusion.  
** [http://tecfa.unige.ch/guides/privacy/solove-2006-taxonomy.pdf solove-2006-taxonomy.pdf] (access restricted)


==== Predictive modeling ====
==== Predictive modeling ====


# Honghao Wei, Fuzheng Zhang, Nicholas Jing Yuan, Chuan Cao, Hao Fu, Xing Xie, Yong Rui, and Wei-Ying Ma. 2017. Beyond the Words: Predicting User Personality from Heterogeneous Information. In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining (WSDM '17). ACM, New York, NY, USA, 305-314. DOI: https://doi.org/10.1145/3018661.3018717  
* Honghao Wei, Fuzheng Zhang, Nicholas Jing Yuan, Chuan Cao, Hao Fu, Xing Xie, Yong Rui, and Wei-Ying Ma. 2017. Beyond the Words: Predicting User Personality from Heterogeneous Information. In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining (WSDM '17). ACM, New York, NY, USA, 305-314. DOI: https://doi.org/10.1145/3018661.3018717  
#* Read the summary: [https://blog.acolyer.org/2017/02/16/beyond-the-words-predicting-user-personality-from-heterogeneous-information/ Beyond the words: predicting user personality from heterogeneous information] February 16, 2017
** Read the summary: [https://blog.acolyer.org/2017/02/16/beyond-the-words-predicting-user-personality-from-heterogeneous-information/ Beyond the words: predicting user personality from heterogeneous information] February 16, 2017
#* '''Student''':  
** '''Student''':  
#* Quote: Previous studies have demonstrated that language usage in social media is effective in personality prediction. However, except for single language features, a less researched direction is how to leverage the heterogeneous information on social media to have a better understanding of user personality. In this paper, we propose a Heterogeneous Information Ensemble framework, called HIE, to predict users' personality traits by integrating heterogeneous information including self-language usage, avatar, emoticon, and responsive patterns.
** Quote: Previous studies have demonstrated that language usage in social media is effective in personality prediction. However, except for single language features, a less researched direction is how to leverage the heterogeneous information on social media to have a better understanding of user personality. In this paper, we propose a Heterogeneous Information Ensemble framework, called HIE, to predict users' personality traits by integrating heterogeneous information including self-language usage, avatar, emoticon, and responsive patterns.
# Michal Kosinski, David Stillwell, and Thore Graepel, '''''Private traits and attributes are predictable from digital records of human behavior''''', ''PNAS'' 2013 110 (15) 5802-5805; published ahead of print March 11, 2013, doi:10.1073/pnas.1218772110  
 
#* '''Student''':  
 
#* Quote: We show that easily accessible digital records of behavior, Facebook Likes, can be used to automatically and accurately predict a range of highly sensitive personal attributes including: sexual orientation, ethnicity, religious and political views, personality traits, intelligence, happiness, use of addictive substances, parental separation, age, and gender.
* Michal Kosinski, David Stillwell, and Thore Graepel, '''''Private traits and attributes are predictable from digital records of human behavior''''', ''PNAS'' 2013 110 (15) 5802-5805; published ahead of print March 11, 2013, doi:10.1073/pnas.1218772110  
#* See also: [http://mypersonality.org/wiki/doku.php MyPersonality Database]
** '''Student''':  
#* ''Read the whole article''
** Quote: We show that easily accessible digital records of behavior, Facebook Likes, can be used to automatically and accurately predict a range of highly sensitive personal attributes including: sexual orientation, ethnicity, religious and political views, personality traits, intelligence, happiness, use of addictive substances, parental separation, age, and gender.
#* [http://tecfa.unige.ch/guides/privacy/Kosinski-PNAS-2013.pdf Kosinski-PNAS-2013.pdf]  (access restricted)
** See also: [http://mypersonality.org/wiki/doku.php MyPersonality Database]
** ''Read the whole article''
** [http://tecfa.unige.ch/guides/privacy/Kosinski-PNAS-2013.pdf Kosinski-PNAS-2013.pdf]  (access restricted)


==== Young people's behavior ====
==== Young people's behavior ====


# Boyd, Danah and Marwick, Alice E., '''''Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies''''' (September 22, 2011). A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, September 2011. Available at SSRN: http://ssrn.com/abstract=1925128
* Boyd, Danah and Marwick, Alice E., '''''Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies''''' (September 22, 2011). A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, September 2011. Available at SSRN: http://ssrn.com/abstract=1925128
#* '''Student''': GP
** '''Student''':  
#* This paper represents an ethnographic study on what is teen's privacy and how it is managed
** This paper represents an ethnographic study on what is teen's privacy and how it is managed
#* Read at least "Privacy in Public" (last section) plus another section on a topic that is of interest.
** Read at least "Privacy in Public" (last section) plus another section on a topic that is of interest.
#* [http://tecfa.unige.ch/guides/privacy/boyd-marwick-2011.pdf boyd-marwick-2011.pdf]  (access restricted)
** [http://tecfa.unige.ch/guides/privacy/boyd-marwick-2011.pdf boyd-marwick-2011.pdf]  (access restricted)
# Hoofnagle, Chris Jay and King, Jennifer and Li, Su and Turow, Joseph, '''''How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies?''''' (April 14, 2010). Available at SSRN: http://ssrn.com/abstract=1589864 or http://dx.doi.org/10.2139/ssrn.1589864  
 
#* '''Student''': EN
* Hoofnagle, Chris Jay and King, Jennifer and Li, Su and Turow, Joseph, '''''How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies?''''' (April 14, 2010). Available at SSRN: http://ssrn.com/abstract=1589864 or http://dx.doi.org/10.2139/ssrn.1589864  
#* Quote: We conclude then that that young-adult Americans have an aspiration for increased privacy even while they participate in an online reality that is optimized to increase their revelation of personal data.
** '''Student''':
#* ''Skim the whole paper''
** Quote: We conclude then that that young-adult Americans have an aspiration for increased privacy even while they participate in an online reality that is optimized to increase their revelation of personal data.
#* [http://tecfa.unige.ch/guides/privacy/hoofnagle-et-al-2010.pdf hoofnagle-et-al-2010.pdf]  (access restricted)
** ''Skim the whole paper''
# Marwick, Alice E. and Murgia-Diaz, Diego and Palfrey, John G., '''''Youth, Privacy and Reputation''''' (Literature Review). Berkman Center Research Publication No. 2010-5; Harvard Public Law Working Paper No. 10-29. Available at SSRN: http://ssrn.com/abstract=1588163 (80 pages)
** [http://tecfa.unige.ch/guides/privacy/hoofnagle-et-al-2010.pdf hoofnagle-et-al-2010.pdf]  (access restricted)
#* '''Student''': SM
 
#* Quote: The scope of this literature review is to map out what is currently understood about the intersections of youth, reputation, and privacy online, focusing on youth attitudes and practices. We summarize both key empirical studies from quantitative and qualitative perspectives and the legal issues involved in regulating privacy and reputation. This project includes studies of children, teenagers, and younger college students.
 
#* ''Read pages 60-65''
* Marwick, Alice E. and Murgia-Diaz, Diego and Palfrey, John G., '''''Youth, Privacy and Reputation''''' (Literature Review). Berkman Center Research Publication No. 2010-5; Harvard Public Law Working Paper No. 10-29. Available at SSRN: http://ssrn.com/abstract=1588163 (80 pages)
#* [http://tecfa.unige.ch/guides/privacy/marwick-et-al-2010.pdf marwick-et-al-2010.pdf]  (access restricted)
** '''Student''':
** Quote: The scope of this literature review is to map out what is currently understood about the intersections of youth, reputation, and privacy online, focusing on youth attitudes and practices. We summarize both key empirical studies from quantitative and qualitative perspectives and the legal issues involved in regulating privacy and reputation. This project includes studies of children, teenagers, and younger college students.
** ''Read pages 60-65''
** [http://tecfa.unige.ch/guides/privacy/marwick-et-al-2010.pdf marwick-et-al-2010.pdf]  (access restricted)


==== Privacy on the Internet - practical and technical issues ====
==== Privacy on the Internet - practical and technical issues ====


# Djordje Krivokapi, '''''Who Should Take Care of Identity, Privacy and Reputation?''''' in Cortesi et al., Digitally Connected: Global Perspectives on Youth and Digital Media (March 26, 2015). Berkman Center Research Publication No. 2015-6. Available at SSRN: http://ssrn.com/abstract=2585686 or http://dx.doi.org/10.2139/ssrn.2585686  
* Djordje Krivokapi, '''''Who Should Take Care of Identity, Privacy and Reputation?''''' in Cortesi et al., Digitally Connected: Global Perspectives on Youth and Digital Media (March 26, 2015). Berkman Center Research Publication No. 2015-6. Available at SSRN: http://ssrn.com/abstract=2585686 or http://dx.doi.org/10.2139/ssrn.2585686  
#* '''Student''': NT
** '''Student''':
#* ''Read the whole article by Krivokapi (5 pages, p. 35-40)''
** ''Read the whole article by Krivokapi (5 pages, p. 35-40)''
#* [http://tecfa.unige.ch/guides/privacy/cortesi-gasser-eds-2015.pdf cortesi-gasser-eds-2015.pdf]
** [http://tecfa.unige.ch/guides/privacy/cortesi-gasser-eds-2015.pdf cortesi-gasser-eds-2015.pdf]
# Seda Gürses. 2014. ''''' Can you engineer privacy?'''''. Commun. ACM 57, 8 (August 2014), 20-23. DOI=10.1145/2633029 http://doi.acm.org/10.1145/2633029  
 
#* '''Student''':  
 
#* Quote: We cannot engineer society, but neither are our societies independent of the systems we engineer. Hence, as practitioners and researchers we have the responsibility to engineer systems that address privacy concerns.
* Seda Gürses. 2014. ''''' Can you engineer privacy?'''''. Commun. ACM 57, 8 (August 2014), 20-23. DOI=10.1145/2633029 http://doi.acm.org/10.1145/2633029  
#* ''Read the whole article (pages 20-23)''
** '''Student''':  
#* [http://tecfa.unige.ch/guides/privacy/gurses-2014.pdf gurses-2014.pdf]  (access restricted)
** Quote: We cannot engineer society, but neither are our societies independent of the systems we engineer. Hence, as practitioners and researchers we have the responsibility to engineer systems that address privacy concerns.
# Paul Weiser and Simon Scheider. 2014. '''''A civilized cyberspace for geoprivacy.''''' In Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis (GeoPrivacy '14), Carsten Kessler, Grant D. McKenzie, and Lars Kulik (Eds.). ACM, New York, NY, USA, , Article 5 , 8 pages. DOI=10.1145/2675682.2676396 http://doi.acm.org/10.1145/2675682.2676396  
** ''Read the whole article (pages 20-23)''
#* '''Student''': JA
** [http://tecfa.unige.ch/guides/privacy/gurses-2014.pdf gurses-2014.pdf]  (access restricted)
#* ''Read sections 1,2, 6 (conclusion) and try 5''
 
#* [http://tecfa.unige.ch/guides/privacy/weiser-et-al-2014.pdf weiser-et-al-2014.pdf]  (access restricted)
 
# Fabian, B., Bender, B., & Weimann, L. (2015). '''''E-Mail Tracking in Online Marketing-Methods, Detection, and Usage''', Wirtschaftsinformatik (pp. 1100-1114). ''
* Paul Weiser and Simon Scheider. 2014. '''''A civilized cyberspace for geoprivacy.''''' In Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis (GeoPrivacy '14), Carsten Kessler, Grant D. McKenzie, and Lars Kulik (Eds.). ACM, New York, NY, USA, , Article 5 , 8 pages. DOI=10.1145/2675682.2676396 http://doi.acm.org/10.1145/2675682.2676396  
#* '''Student''':  
** '''Student''':
#* Quote: EMail tracking uses personalized links and pictures for gathering in-formation on user behavior, for example, where, when, on what kind of device, and how often an e-mail has been read. This information can be very useful for marketing  purposes.  On  the  other  hand,  privacy  and security  requirements  of customers could be violated by tracking.
** ''Read sections 1,2, 6 (conclusion) and try 5''
#* ''Read All''
** [http://tecfa.unige.ch/guides/privacy/weiser-et-al-2014.pdf weiser-et-al-2014.pdf]  (access restricted)
#* [http://tecfa.unige.ch/guides/privacy/barocas-et-al-2014.pdf fabian-2015.pdf]  (access restricted)
 
# Solon Barocas and Helen Nissenbaum. 2014. '''''Big data's end run around procedural privacy protections'''''. Commun. ACM 57, 11 (October 2014), 31-33. DOI=10.1145/2668897 http://doi.acm.org/10.1145/2668897  
 
#* '''Student''': YA
* Fabian, B., Bender, B., & Weimann, L. (2015). '''''E-Mail Tracking in Online Marketing-Methods, Detection, and Usage''', Wirtschaftsinformatik (pp. 1100-1114). ''
#* Quote: When consent is given (or not withheld) or the data is anonymized, virtually any information practice becomes permissible.
** '''Student''':  
#* ''Read all''
** Quote: EMail tracking uses personalized links and pictures for gathering in-formation on user behavior, for example, where, when, on what kind of device, and how often an e-mail has been read. This information can be very useful for marketing  purposes.  On  the  other  hand,  privacy  and security  requirements  of customers could be violated by tracking.
#* [http://tecfa.unige.ch/guides/privacy/barocas-et-al-2014.pdf barocas-et-al-2014.pdf]  (access restricted)
** ''Read All''
# Tanmay Sinha, Vrns Srikanth, Mangal Sain, and Hoon Jae Lee. 2013. '''''Trends and research directions for privacy preserving approaches on the cloud.''''' In Proceedings of the 6th ACM India Computing Convention (Compute '13). ACM, New York, NY, USA, , Article 21 , 12 pages. DOI=10.1145/2522548.2523138 http://doi.acm.org/10.1145/2522548.2523138  
** [http://tecfa.unige.ch/guides/privacy/barocas-et-al-2014.pdf fabian-2015.pdf]  (access restricted)
#* '''Student''':  
 
#* ''Read sections 1,6,7,8''
 
#* [http://tecfa.unige.ch/guides/privacy/tanmay-et-al-2013.pdf tanmay-et-al-2013.pdf]  (access restricted)
* Solon Barocas and Helen Nissenbaum. 2014. '''''Big data's end run around procedural privacy protections'''''. Commun. ACM 57, 11 (October 2014), 31-33. DOI=10.1145/2668897 http://doi.acm.org/10.1145/2668897  
# '''''[http://en.wikipedia.org/wiki/Internet_privacy#Risks_to_Internet_privacy Risks to Internet Privacy]''''' (Wikipedia chapter of the Internet Privacy article)
** '''Student''':  
#* '''Student''':  
** Quote: When consent is given (or not withheld) or the data is anonymized, virtually any information practice becomes permissible.
#* ''Read all''
** ''Read all''
# Robert Faris and David R. O’Brien, '''''Data and Privacy''''', in Gasser et al. in Gasser, Urs and Zittrain, Jonathan and Faris, Robert and Heacock Jones, Rebekah, Internet Monitor 2014: Reflections on the Digital World: Platforms, Policy, Privacy, and Public Discourse (December 15, 2014). Berkman Center Research Publication No. 2014-17. Available at SSRN: http://ssrn.com/abstract=2538813.
** [http://tecfa.unige.ch/guides/privacy/barocas-et-al-2014.pdf barocas-et-al-2014.pdf]  (access restricted)
#* '''Student''':
 
#* Quote: The mismatch between traditional mechanisms for preserving privacy and the realities of digital networks are more apparent each day. The Internet, “the world’s biggest copy machine,”1 has eliminated the principal mechanism for preserving privacy; it used to be expensive to record and maintain information on the everyday comings and goings of citizens.
 
#* Read the introduction (p. 63-65) plus 2-3 following ultra-short articles
* Tanmay Sinha, Vrns Srikanth, Mangal Sain, and Hoon Jae Lee. 2013. '''''Trends and research directions for privacy preserving approaches on the cloud.''''' In Proceedings of the 6th ACM India Computing Convention (Compute '13). ACM, New York, NY, USA, , Article 21 , 12 pages. DOI=10.1145/2522548.2523138 http://doi.acm.org/10.1145/2522548.2523138  
#* [http://tecfa.unige.ch/guides/privacy/gasser-et-al-2014.pdf gasser-et-al-2014.pdf]
** '''Student''':  
** ''Read sections 1,6,7,8''
** [http://tecfa.unige.ch/guides/privacy/tanmay-et-al-2013.pdf tanmay-et-al-2013.pdf]  (access restricted)
 
 
* [http://en.wikipedia.org/wiki/Internet_privacy*Risks_to_Internet_privacy Risks to Internet Privacy] (Wikipedia chapter of the Internet Privacy article)
** '''Student''':  
** ''Read all''
 
 
* Robert Faris and David R. O’Brien, '''''Data and Privacy''''', in Gasser et al. in Gasser, Urs and Zittrain, Jonathan and Faris, Robert and Heacock Jones, Rebekah, Internet Monitor 2014: Reflections on the Digital World: Platforms, Policy, Privacy, and Public Discourse (December 15, 2014). Berkman Center Research Publication No. 2014-17. Available at SSRN: http://ssrn.com/abstract=2538813.
** '''Student''':
** Quote: The mismatch between traditional mechanisms for preserving privacy and the realities of digital networks are more apparent each day. The Internet, “the world’s biggest copy machine,”1 has eliminated the principal mechanism for preserving privacy; it used to be expensive to record and maintain information on the everyday comings and goings of citizens.
** Read the introduction (p. 63-65) plus 2-3 following ultra-short articles
** [http://tecfa.unige.ch/guides/privacy/gasser-et-al-2014.pdf gasser-et-al-2014.pdf]


==== Mobile apps and other data from your mobile ====
==== Mobile apps and other data from your mobile ====


# '''''[https://www.priv.gc.ca/media/nr-c/2014/bg_140910_e.asp Results of the 2014 Global Privacy Enforcement Network Sweep]''''', OTTAWA, September 10, 2014
* '''''[https://www.priv.gc.ca/media/nr-c/2014/bg_140910_e.asp Results of the 2014 Global Privacy Enforcement Network Sweep]''''', OTTAWA, September 10, 2014
#* '''Student''': JW
** '''Student''':  
#* Quote: The second Global Privacy Enforcement Network (GPEN) Privacy Sweep demonstrates the ongoing commitment of privacy enforcement authorities to work together to promote privacy protection around the world. Some 26 privacy enforcement authorities in 19 countries participated in the 2014 Sweep, which took place May 12-18. Over the course of the week, participants downloaded 1,211 popular mobile apps in a bid to assess the transparency of their privacy practices.
** Quote: The second Global Privacy Enforcement Network (GPEN) Privacy Sweep demonstrates the ongoing commitment of privacy enforcement authorities to work together to promote privacy protection around the world. Some 26 privacy enforcement authorities in 19 countries participated in the 2014 Sweep, which took place May 12-18. Over the course of the week, participants downloaded 1,211 popular mobile apps in a bid to assess the transparency of their privacy practices.
#* Other summaries of this survey: [https://www.privaworks.com/Details/AlertReference.aspx?mode=fr&guid=55026293-89cf-49b5-b427-b62ad1586f3a European Results of the 2014 Global Privacy Enforcement Network Sweep - European Data Protection Authorities], [https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2014/09/global-survey-finds-85-of-mobile-apps-fail-to-provide-basic-privacy-information/ Global survey finds 85% of mobile apps fail to provide basic privacy information], ICO, 2014 (UK), [http://dataprotection.ie/docimages/GPEN_Summary_Global_Results_2014.pdf Data Protection] (IE).
** Other summaries of this survey: [https://www.privaworks.com/Details/AlertReference.aspx?mode=fr&guid=55026293-89cf-49b5-b427-b62ad1586f3a European Results of the 2014 Global Privacy Enforcement Network Sweep - European Data Protection Authorities], [https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2014/09/global-survey-finds-85-of-mobile-apps-fail-to-provide-basic-privacy-information/ Global survey finds 85% of mobile apps fail to provide basic privacy information], ICO, 2014 (UK), [http://dataprotection.ie/docimages/GPEN_Summary_Global_Results_2014.pdf Data Protection] (IE).
#* ''Read all'' (short HTML pages)
** ''Read all'' (short HTML pages)
# H. Almuhimedi, F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti, J. Gluck, L. Cranor and Y. Agrawal, '''''Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging''''', to appear in In Proceedings of the 33rd annual SIGCHI Conference on Human Factors in Computing Systems, CHI2015. April 2015 (also available as Tech Report CMU-ISR-14-116) [http://reports-archive.adm.cs.cmu.edu/anon/isr2014/CMU-ISR-14-116.pdf PDF]
 
#* '''Student''':  
 
#* Summary: [http://www.cmu.edu/news/stories/archives/2015/march/privacy-nudge.html Study Shows People Act To Protect Privacy When Told How Often Phone Apps Share Personal Information], By Byron Spice, March 2015, CMU News.
* H. Almuhimedi, F. Schaub, N. Sadeh, I. Adjerid, A. Acquisti, J. Gluck, L. Cranor and Y. Agrawal, '''''Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging''''', to appear in In Proceedings of the 33rd annual SIGCHI Conference on Human Factors in Computing Systems, CHI2015. April 2015 (also available as Tech Report CMU-ISR-14-116) [http://reports-archive.adm.cs.cmu.edu/anon/isr2014/CMU-ISR-14-116.pdf PDF]
#* ''Read the whole summary'' and skim the article
** '''Student''':  
#* [http://tecfa.unige.ch/guides/privacy/Almuhimedi-et-al-2015.pdf Almuhimedi-et-al-2015.pdf]  (access restricted)
** Summary: [http://www.cmu.edu/news/stories/archives/2015/march/privacy-nudge.html Study Shows People Act To Protect Privacy When Told How Often Phone Apps Share Personal Information], By Byron Spice, March 2015, CMU News.
** ''Read the whole summary'' and skim the article
** [http://tecfa.unige.ch/guides/privacy/Almuhimedi-et-al-2015.pdf Almuhimedi-et-al-2015.pdf]  (access restricted)


==== Privacy in Internet-supported research ====
==== Privacy in Internet-supported research ====


# John Leslie King. 2015. '''''Humans in computing: growing responsibilities for researchers'''''. Commun. ACM 58, 3 (February 2015), 31-33. DOI=10.1145/2723675 http://doi.acm.org/10.1145/2723675
* John Leslie King. 2015. '''''Humans in computing: growing responsibilities for researchers'''''. Commun. ACM 58, 3 (February 2015), 31-33. DOI=10.1145/2723675 http://doi.acm.org/10.1145/2723675
#* '''Student''': JM
** '''Student''':  
#* Quote: Open issues regarding human welfare will not be settled using an authoritarian approach. Computing researchers in universities and companies cannot do whatever they like. Doctoral students and postdoctoral fellows should be aware of science and engineering ethics. Ethical concerns must lead professional practice and regulation, not the other way around.
** Quote: Open issues regarding human welfare will not be settled using an authoritarian approach. Computing researchers in universities and companies cannot do whatever they like. Doctoral students and postdoctoral fellows should be aware of science and engineering ethics. Ethical concerns must lead professional practice and regulation, not the other way around.
#* ''Read all''
** ''Read all''
#* [http://tecfa.unige.ch/guides/privacy/king-2015.pdf king-2015.pdf]  (access restricted)
** [http://tecfa.unige.ch/guides/privacy/king-2015.pdf king-2015.pdf]  (access restricted)


==== Political action, law and opinions ====
==== Political action, law and opinions ====


# '''''[https://www.aclu.org/files/FilesPDFs/global_agenda.pdf Liberty in the age of technology]'''''. ACLU, 2014, (3 pages)
* '''''[https://www.aclu.org/files/FilesPDFs/global_agenda.pdf Liberty in the age of technology]'''''. ACLU, 2014, (3 pages)
#* '''Student''': YC
** '''Student''':
#* Quote: Increasing government surveillance worldwide raises tough questions for democracy and civil liberty. Left unchecked, the deployment of intrusive new technologies poses a profound threat to individual privacy. What we need, says  Barry Steinhardt, is stronger regulation to ensure that such technology is used fairly – by governments and businesses alike.
** Quote: Increasing government surveillance worldwide raises tough questions for democracy and civil liberty. Left unchecked, the deployment of intrusive new technologies poses a profound threat to individual privacy. What we need, says  Barry Steinhardt, is stronger regulation to ensure that such technology is used fairly – by governments and businesses alike.
#* Read the whole article
** Read the whole article
# Jeff Jarvis, '''[http://spectrum.ieee.org/telecom/internet/privacy-publicness-and-the-web-a-manifesto Privacy, Publicness, and the Web: A Manifesto]'''. May 21011,  IEEE Spectrum's special report on the battle for the future of the social Web.
 
#* '''Student''': VV
 
#* Read the whole article (a short opinion piece)
* Jeff Jarvis, '''[http://spectrum.ieee.org/telecom/internet/privacy-publicness-and-the-web-a-manifesto Privacy, Publicness, and the Web: A Manifesto]'''. May 21011,  IEEE Spectrum's special report on the battle for the future of the social Web.
# Bolton, Robert Lee, '''The Right to Be Forgotten: Forced Amnesia in a Technological Age''' (October 15, 2014). 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2015); John Marshall Journal of Computer & Information Law, Forthcoming. Available at SSRN: http://ssrn.com/abstract=2513652
** '''Student''':  
#* Quote: In much of Europe, among the citizenry’s rights is a legal concept referred to as le droit à l’oubli. This “right to be forgotten” is a nebulous term whose exact meaning varies by country, but can generally be defined as the right of an individual to control data pertaining to them and have it destroyed if they so desire
** Read the whole article (a short opinion piece)
#* '''Student''': MK
 
#* Read sections "Introduction", "The Law abroad" and Conclusion
 
#* [http://tecfa.unige.ch/guides/privacy/bolton-2015.pdf bolton-2015.pdf] (access restricted)
* Bolton, Robert Lee, '''The Right to Be Forgotten: Forced Amnesia in a Technological Age''' (October 15, 2014). 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2015); John Marshall Journal of Computer & Information Law, Forthcoming. Available at SSRN: http://ssrn.com/abstract=2513652
** Quote: In much of Europe, among the citizenry’s rights is a legal concept referred to as le droit à l’oubli. This “right to be forgotten” is a nebulous term whose exact meaning varies by country, but can generally be defined as the right of an individual to control data pertaining to them and have it destroyed if they so desire
** '''Student''':  
** Read sections "Introduction", "The Law abroad" and Conclusion
** [http://tecfa.unige.ch/guides/privacy/bolton-2015.pdf bolton-2015.pdf] (access restricted)


==== Use of medical e-health data ====
==== Use of medical e-health data ====


* Ali Sunyaev, Tobias Dehling, Patrick L Taylor, Kenneth D Mandl; Availability and quality of mobile health app privacy policies. J Am Med Inform Assoc 2015; 22 (e1): e28-e33. doi: 10.1136/amiajnl-2013-002605 . https://academic.oup.com/jamia/article/22/e1/e28/700676/Availability-and-quality-of-mobile-health-app?g=w_jamia_ahead_tab
* Ali Sunyaev, Tobias Dehling, Patrick L Taylor, Kenneth D Mandl; Availability and quality of mobile health app privacy policies. J Am Med Inform Assoc 2015; 22 (e1): e28-e33. doi: 10.1136/amiajnl-2013-002605 . https://academic.oup.com/jamia/article/22/e1/e28/700676/Availability-and-quality-of-mobile-health-app?g=w_jamia_ahead_tab
** [http://tecfa.unige.ch/guides/privacy/amiajnl-2013-002605.pdf amiajnl-2013-002605.pdf (access restricted)
** [http://tecfa.unige.ch/guides/privacy/amiajnl-2013-002605.pdf amiajnl-2013-002605.pdf] (access restricted)
** '''Student''':
** '''Student''':
** Quote: Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use.
** Quote: Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use.


==== Apple vs FBI ====
==== Apple vs FBI ====
* FBI–Apple encryption dispute (Wikipedia). https://en.wikipedia.org/wiki/FBI%E2%80%93Apple_encryption_dispute
* FBI–Apple encryption dispute (Wikipedia). https://en.wikipedia.org/wiki/FBI%E2%80%93Apple_encryption_dispute
** Student:
** Student:
Line 148: Line 176:
=== Presentations / discussion ===
=== Presentations / discussion ===


* Each student will present the three items (an issue, a guideline, and a question)
* '''Each student will present three items''' (an important issue, a guideline, and a question)
* We will discuss any of these (depending on participant's interests & available time)


List of student presentations:
List of student presentations:


*
*
*
*
*
*
*
*



Revision as of 21:15, 20 March 2017

Introduction

This is part two of a teaching module on privacy.

Lesson 2 preparation - reading list

Instructions

  1. Each student must read one paper from the reading list below (or part of it). Work will be distributed at the end of lesson 1
  2. Please come back with the following items found in your reading:
    1. One or two important idea(s) or fact(s) found in the article (issues)
    2. One guideline for either institutions that collect data or individuals that provide data
    3. One question you would like to discuss

Copies of these papers are available through an Intranet. The instructor will give you a login + password. Otherwise, you may try to obtain them through Webster's library online service.

Defining (Internet) Privacy

  • Privacy, Stanford Encyclopedia of Philosophy, First published Tue May 14, 2002; substantive revision Fri Aug 9, 2013
    • Student:
    • Summary: This article discusses the multiple facets of privacy. Good, but somewhat difficult reading.
    • Read all


  • Daniel J. Solove (2006). Taxonomy Of Privacy, University of Pennsylvania Law Review.

Predictive modeling

  • Honghao Wei, Fuzheng Zhang, Nicholas Jing Yuan, Chuan Cao, Hao Fu, Xing Xie, Yong Rui, and Wei-Ying Ma. 2017. Beyond the Words: Predicting User Personality from Heterogeneous Information. In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining (WSDM '17). ACM, New York, NY, USA, 305-314. DOI: https://doi.org/10.1145/3018661.3018717
    • Read the summary: Beyond the words: predicting user personality from heterogeneous information February 16, 2017
    • Student:
    • Quote: Previous studies have demonstrated that language usage in social media is effective in personality prediction. However, except for single language features, a less researched direction is how to leverage the heterogeneous information on social media to have a better understanding of user personality. In this paper, we propose a Heterogeneous Information Ensemble framework, called HIE, to predict users' personality traits by integrating heterogeneous information including self-language usage, avatar, emoticon, and responsive patterns.


  • Michal Kosinski, David Stillwell, and Thore Graepel, Private traits and attributes are predictable from digital records of human behavior, PNAS 2013 110 (15) 5802-5805; published ahead of print March 11, 2013, doi:10.1073/pnas.1218772110
    • Student:
    • Quote: We show that easily accessible digital records of behavior, Facebook Likes, can be used to automatically and accurately predict a range of highly sensitive personal attributes including: sexual orientation, ethnicity, religious and political views, personality traits, intelligence, happiness, use of addictive substances, parental separation, age, and gender.
    • See also: MyPersonality Database
    • Read the whole article
    • Kosinski-PNAS-2013.pdf (access restricted)

Young people's behavior

  • Boyd, Danah and Marwick, Alice E., Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies (September 22, 2011). A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, September 2011. Available at SSRN: http://ssrn.com/abstract=1925128
    • Student:
    • This paper represents an ethnographic study on what is teen's privacy and how it is managed
    • Read at least "Privacy in Public" (last section) plus another section on a topic that is of interest.
    • boyd-marwick-2011.pdf (access restricted)
  • Hoofnagle, Chris Jay and King, Jennifer and Li, Su and Turow, Joseph, How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies? (April 14, 2010). Available at SSRN: http://ssrn.com/abstract=1589864 or http://dx.doi.org/10.2139/ssrn.1589864
    • Student:
    • Quote: We conclude then that that young-adult Americans have an aspiration for increased privacy even while they participate in an online reality that is optimized to increase their revelation of personal data.
    • Skim the whole paper
    • hoofnagle-et-al-2010.pdf (access restricted)


  • Marwick, Alice E. and Murgia-Diaz, Diego and Palfrey, John G., Youth, Privacy and Reputation (Literature Review). Berkman Center Research Publication No. 2010-5; Harvard Public Law Working Paper No. 10-29. Available at SSRN: http://ssrn.com/abstract=1588163 (80 pages)
    • Student:
    • Quote: The scope of this literature review is to map out what is currently understood about the intersections of youth, reputation, and privacy online, focusing on youth attitudes and practices. We summarize both key empirical studies from quantitative and qualitative perspectives and the legal issues involved in regulating privacy and reputation. This project includes studies of children, teenagers, and younger college students.
    • Read pages 60-65
    • marwick-et-al-2010.pdf (access restricted)

Privacy on the Internet - practical and technical issues


  • Seda Gürses. 2014. Can you engineer privacy?. Commun. ACM 57, 8 (August 2014), 20-23. DOI=10.1145/2633029 http://doi.acm.org/10.1145/2633029
    • Student:
    • Quote: We cannot engineer society, but neither are our societies independent of the systems we engineer. Hence, as practitioners and researchers we have the responsibility to engineer systems that address privacy concerns.
    • Read the whole article (pages 20-23)
    • gurses-2014.pdf (access restricted)


  • Paul Weiser and Simon Scheider. 2014. A civilized cyberspace for geoprivacy. In Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis (GeoPrivacy '14), Carsten Kessler, Grant D. McKenzie, and Lars Kulik (Eds.). ACM, New York, NY, USA, , Article 5 , 8 pages. DOI=10.1145/2675682.2676396 http://doi.acm.org/10.1145/2675682.2676396


  • Fabian, B., Bender, B., & Weimann, L. (2015). E-Mail Tracking in Online Marketing-Methods, Detection, and Usage, Wirtschaftsinformatik (pp. 1100-1114).
    • Student:
    • Quote: EMail tracking uses personalized links and pictures for gathering in-formation on user behavior, for example, where, when, on what kind of device, and how often an e-mail has been read. This information can be very useful for marketing purposes. On the other hand, privacy and security requirements of customers could be violated by tracking.
    • Read All
    • fabian-2015.pdf (access restricted)


  • Solon Barocas and Helen Nissenbaum. 2014. Big data's end run around procedural privacy protections. Commun. ACM 57, 11 (October 2014), 31-33. DOI=10.1145/2668897 http://doi.acm.org/10.1145/2668897
    • Student:
    • Quote: When consent is given (or not withheld) or the data is anonymized, virtually any information practice becomes permissible.
    • Read all
    • barocas-et-al-2014.pdf (access restricted)


  • Tanmay Sinha, Vrns Srikanth, Mangal Sain, and Hoon Jae Lee. 2013. Trends and research directions for privacy preserving approaches on the cloud. In Proceedings of the 6th ACM India Computing Convention (Compute '13). ACM, New York, NY, USA, , Article 21 , 12 pages. DOI=10.1145/2522548.2523138 http://doi.acm.org/10.1145/2522548.2523138



  • Robert Faris and David R. O’Brien, Data and Privacy, in Gasser et al. in Gasser, Urs and Zittrain, Jonathan and Faris, Robert and Heacock Jones, Rebekah, Internet Monitor 2014: Reflections on the Digital World: Platforms, Policy, Privacy, and Public Discourse (December 15, 2014). Berkman Center Research Publication No. 2014-17. Available at SSRN: http://ssrn.com/abstract=2538813.
    • Student:
    • Quote: The mismatch between traditional mechanisms for preserving privacy and the realities of digital networks are more apparent each day. The Internet, “the world’s biggest copy machine,”1 has eliminated the principal mechanism for preserving privacy; it used to be expensive to record and maintain information on the everyday comings and goings of citizens.
    • Read the introduction (p. 63-65) plus 2-3 following ultra-short articles
    • gasser-et-al-2014.pdf

Mobile apps and other data from your mobile


Privacy in Internet-supported research

  • John Leslie King. 2015. Humans in computing: growing responsibilities for researchers. Commun. ACM 58, 3 (February 2015), 31-33. DOI=10.1145/2723675 http://doi.acm.org/10.1145/2723675
    • Student:
    • Quote: Open issues regarding human welfare will not be settled using an authoritarian approach. Computing researchers in universities and companies cannot do whatever they like. Doctoral students and postdoctoral fellows should be aware of science and engineering ethics. Ethical concerns must lead professional practice and regulation, not the other way around.
    • Read all
    • king-2015.pdf (access restricted)

Political action, law and opinions

  • Liberty in the age of technology. ACLU, 2014, (3 pages)
    • Student:
    • Quote: Increasing government surveillance worldwide raises tough questions for democracy and civil liberty. Left unchecked, the deployment of intrusive new technologies poses a profound threat to individual privacy. What we need, says Barry Steinhardt, is stronger regulation to ensure that such technology is used fairly – by governments and businesses alike.
    • Read the whole article



  • Bolton, Robert Lee, The Right to Be Forgotten: Forced Amnesia in a Technological Age (October 15, 2014). 31 J. Marshall J. Info. Tech. & Privacy L. 133 (2015); John Marshall Journal of Computer & Information Law, Forthcoming. Available at SSRN: http://ssrn.com/abstract=2513652
    • Quote: In much of Europe, among the citizenry’s rights is a legal concept referred to as le droit à l’oubli. This “right to be forgotten” is a nebulous term whose exact meaning varies by country, but can generally be defined as the right of an individual to control data pertaining to them and have it destroyed if they so desire
    • Student:
    • Read sections "Introduction", "The Law abroad" and Conclusion
    • bolton-2015.pdf (access restricted)

Use of medical e-health data

Apple vs FBI

  • FBI–Apple encryption dispute (Wikipedia). https://en.wikipedia.org/wiki/FBI%E2%80%93Apple_encryption_dispute
    • Student:
    • Quote: The FBI–Apple encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose data are cryptographically protected.[1] There is much debate over public access to strong encryption.[2]
    • Read the whole article

Day two

Presentations / discussion

  • Each student will present three items (an important issue, a guideline, and a question)

List of student presentations:

Presentation and discussion on digital privacy

Summary of issues

Ideas for guidelines

See also:

Additional resources

Classes
Classes (recent past)

To add in new edition