bynum ethical analysis – emailfunder - engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40...
TRANSCRIPT
![Page 1: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/1.jpg)
Bynum ethical analysis –EMAILFUNDER
• E_researcher• E_profiler• E-writer
![Page 2: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/2.jpg)
Analysis
• Participants and their actions:– Joe Biggheart– Recipients of messages– Software engineers– Training leaders– Prosecutors/ suitors
• Agents – E_RESEARCHER, E-PROFILER, E-WRITER
![Page 3: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/3.jpg)
Ethical questions
• Joe created an email who caused harm to people. Who is to blame? Was harm intentional or unintentional?
• If harm unintended, was anyone negligent or irresponsible? Or was this unpreventable accident?
![Page 4: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/4.jpg)
• Precedents and similarities – blackmail?• Objectors?
– Email recipients, Fund workers, children with cancer, JoeCharityBot.com staff members and owners
• Interim conclusions– Joe did not intend to harm anyone, but should have
been more persistent with his worries– CharityBot.com did not take risks of using softbots
seriously. Not enough quality control (“lust”), not enough attention to problems brought up by customers
![Page 5: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/5.jpg)
• Policy gaps – softbot responsibility/ethics• Professional standards analysis • Roles and responsibilities analysis
– Joe Biggheart– Training leaders – non-human agents
• stakeholders analysis: email recipients, children
![Page 6: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/6.jpg)
• Conclusions– Primary cause– Contributing factors– Privacy– Agent ethics– Jurisdiction of ethics?
![Page 7: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/7.jpg)
Another example – Fosbakk $100K case
• Read the article ”losing $100K”• Analyze it using the Bynum methodology
– First the 6 point analysis– Then the extended analysis– Make use of the research described in the
article
![Page 8: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/8.jpg)
Privacy
We will cover:
•General discussion•Technology to protect privacy•Canadian Internet privacy context
![Page 9: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/9.jpg)
Privacy - What We Will Cover
• Privacy and Computer Technology• “Big Brother is Watching You”• Privacy Topics• Protecting Privacy• Communications
![Page 10: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/10.jpg)
Privacy and Computer Technology
Key Aspects of Privacy:• Freedom from intrusion (being left alone)• Control of information about oneself• Freedom from surveillance (being tracked,
followed, watched)
![Page 11: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/11.jpg)
Privacy and Computer Technology (cont.)
New Technology, New Risks:• Government and private databases• Sophisticated tools for surveillance and
data analysis• Vulnerability of data
![Page 12: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/12.jpg)
Privacy and Computer Technology (cont.)
Terminology:• Invisible information gathering - collection
of personal information about someone without the person’s knowledge
• Secondary use - use of personal information for a purpose other than the one it was provided for
![Page 13: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/13.jpg)
Privacy and Computer Technology (cont.)
Terminology (cont.):• Data mining - searching and analyzing
masses of data to find patterns and develop new information or knowledge
• Computer matching - combining and comparing information from different databases (using social security number, for example, to match records)
![Page 14: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/14.jpg)
Privacy and Computer Technology (cont.)
Terminology (cont.):• Computer profiling - analyzing data in
computer files to determine characteristics of people most likely to engage in certain behavior
![Page 15: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/15.jpg)
Privacy and Computer Technology (cont.)
Principles for Data Collection and Use:• Informed consent• Opt-in and opt-out policies• Fair Information Principles (or Practices)• Data retention
![Page 16: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/16.jpg)
Privacy and Computer Technology
Discussion Questions• Have you seen opt-in and opt-out
choices? Where? How were they worded? • Were any of them deceptive?• What are some common elements of
privacy policies you have read?
![Page 17: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/17.jpg)
"Big Brother is Watching You"
Databases:• In Canada, Privacy Commissioners
(federal - Jennifer Stoddard - and provincial – Ann Cavoukian in Ontario) -monitor government's privacy policies and privacy violations
![Page 18: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/18.jpg)
"Big Brother is Watching You" (cont.)
Video Surveillance:• Security cameras
– Increased security– Decreased privacy
![Page 19: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/19.jpg)
"Big Brother is Watching You" (cont.)
Discussion Questions
• What data does the government have about you?
• Who has access to the data? • How is your data protected?
![Page 20: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/20.jpg)
Diverse Privacy Topics
Marketing, Personalization and Consumer Dossiers:
• Targeted marketing– Data mining– Paying for consumer information– Data firms and consumer profiles
• Credit records
![Page 21: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/21.jpg)
Diverse Privacy Topics (cont.)
Location Tracking:• Global Positioning Systems (GPS) -
computer or communication services that know exactly where a person is at a particular time
• Cell phones and other devices are used for location tracking
• Pros and cons
![Page 22: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/22.jpg)
Diverse Privacy Topics (cont.)
Stolen and Lost Data:• Hackers• Physical theft (laptops, thumb-drives, etc.)• Requesting information under false
pretenses• Bribery of employees who have access
![Page 23: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/23.jpg)
Diverse Privacy Topics (cont.)What We Do Ourselves:• Personal information in blogs and online profiles• Pictures of ourselves and our families• File sharing and storing• Is privacy old-fashioned?
– Young people put less value on privacy than previous generations
– May not understand the risks
![Page 24: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/24.jpg)
Diverse Privacy Topics (cont.)Public Records: Access vs. Privacy:• Public Records - records available to general
public (bankruptcy, property, and arrest records, salaries of government employees, etc.)
• Identity theft can arise when public records are accessed
• How should we control access to sensitive public records?
![Page 25: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/25.jpg)
Diverse Privacy Topics (cont.)
National ID System:• Social Security Numbers
– Too widely used– Easy to falsify
![Page 26: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/26.jpg)
Diverse Privacy Topics (cont.)
National ID System (Cont.):• A new national ID system - Pros
– would require the card– harder to forge– have to carry only one card
• A new national ID system - Cons– Threat to freedom and privacy– Increased potential for abuse
![Page 27: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/27.jpg)
Diverse Privacy Topics (cont.)Children:• The Internet
– Not able to make decisions on when to provide information
– Vulnerable to online predators• Parental monitoring
– Software to monitor Web usage– Web cams to monitor children while parents are at
work– GPS tracking via cell phones or RFID
![Page 28: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/28.jpg)
Diverse Privacy TopicsDiscussion Questions
• Is there information that you have posted to the Web that you later removed? Why did you remove it? Were there consequences to posting the information?
• Have you seen information that others have posted about themselves that you would not reveal about yourself?
![Page 29: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/29.jpg)
Protecting Privacy
Technology and Markets:• Privacy enhancing-technologies for
consumers• Encryption
– Public-key cryptography• Relationship between privacy and security• Business tools and policies for protecting
data
![Page 30: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/30.jpg)
Symmetric Key Encryption
EncryptionEncryption
““The quick The quick brown fox brown fox jumps over jumps over the lazy the lazy dogdog””
““AxCv;5bmEseTfid3)AxCv;5bmEseTfid3)fGsmWe#4^,sdgfMwifGsmWe#4^,sdgfMwir3:dkJeTsY8Rr3:dkJeTsY8R\\s@!q3s@!q3%%””
““The quick The quick brown fox brown fox jumps over jumps over the lazy the lazy dogdog””
DecryptionDecryption
PlainPlain--text inputtext input PlainPlain--text outputtext outputCipherCipher--texttext
Same keySame key(shared secret)(shared secret)
Following [Kalakota]
![Page 31: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/31.jpg)
Public Key Encryption““The quick The quick brown fox brown fox jumps over jumps over the lazy the lazy dogdog””
““Py75c%bn&*)9|fDe^Py75c%bn&*)9|fDe^bDFaq#xzjFr@g5=&nbDFaq#xzjFr@g5=&nmdFg$5knvMdmdFg$5knvMd’’rkvegrkvegMsMs””
““The quick The quick brown fox brown fox jumps over jumps over the lazy the lazy dogdog””
ClearClear--text inputtext input ClearClear--text outputtext outputCipherCipher--texttext
DifferentDifferent keyskeysRecipientRecipient’’s s public keypublic key
RecipientRecipient’’s s private keyprivate key
privatepublic
EncryptionEncryption DecryptionDecryption
![Page 32: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/32.jpg)
Protecting Privacy (cont.)Rights and laws: Contrasting Viewpoints:• Free Market View
– Freedom of consumers to make voluntary agreements
– Diversity of individual tastes and values– Response of the market to consumer preferences– Usefulness of contracts– Flaws of regulatory solutions
![Page 33: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/33.jpg)
Protecting Privacy (cont.)Rights and laws: Contrasting Viewpoints (cont.):• Consumer Protection View
– Uses of personal information; opt-in vs opt-out– Costly and disruptive results of errors in databases– Ease with which personal information leaks out– Consumers need protection from their own lack of
knowledge, judgment, or interest
![Page 34: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/34.jpg)
Protecting Privacy (cont.)
Privacy Regulations in the European Union (EU):
• Data Protection Directive– More strict than U.S. regulations– Abuses still occur– Puts requirements on businesses outside the
EU
![Page 35: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/35.jpg)
Protecting PrivacyDiscussion Question
• How would the free-market view and the consumer protection view differ on errors in Credit Bureau databases?
• Who is the consumer in this situation?
![Page 36: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/36.jpg)
CommunicationDiscussion Questions
• What types of communication exist today that did not exist in 1968 when wiretapping was finally approved for law-enforcement agencies?
• What type of electronic communications do you use on a regular basis?
![Page 37: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/37.jpg)
Moor’s privacy paper• “greased” data – pizza examplehttp://www.youtube.com/watch?v=-zh9fibMaEk
• Privacy justification – instrumental, intrinsic, core values– Life, happiness, freedom, knowledge, ability,
resources, security– Privacy as an expression of security (peeping Tom
example)• Moor’s “control/restricted access” definition of
privacy: a person can decide who knows what and when about that person
![Page 38: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/38.jpg)
• Database definition of privacy– We are a database of facts about oursevkles,
we own that databse– Privacy is the ability to define views of that
database for different recipients• Privacy is necessary to enter into
meaningful social relationships with people and organizations
![Page 39: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/39.jpg)
39
…more precisely
• Privacy preservation: what does that mean?
• Given a table of instances (rows), we cannot associate any instance with a given person
• Naive anonymization…• …is not sufficient, due to pseudo-
identifiers
![Page 40: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/40.jpg)
40
Sensitive Data Public Data
LinkingAttributes
• L. Sweeney published this « attack » in 2001:• anoymized (de-linked) health records of all 135,000
employees+families of the state of Massachussetts was placed on-line
• Electoral list of Cambridge, MA – bought for $20 (54 805 people)
• 69% records are unique wrt birthdate, ZIP; 87% are unique wrt to bday, ZIP, sex…
• Governor’s health records were identified• …naive anonymization is not sufficient
![Page 41: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/41.jpg)
41
Other privacy fiascos• AOL search engine queries
published2006
• Netflix publicly released a data set containing movie ratings of 500,000 Netflix subscribers between December 1999 and December 2005.
• By matching no more than 8 movie ratings and approximate dates, 96% of subscribers can be uniquely identified.
41
![Page 42: Bynum ethical analysis – EMAILFUNDER - Engineeringstan/csi2911/class3.pdf · 2011. 1. 19. · 40 Sensitive Data Public Data Linking Attributes • L. Sweeney published this « attack](https://reader033.vdocuments.us/reader033/viewer/2022061001/60b02347215e966819537aaa/html5/thumbnails/42.jpg)
PET-PPDM
• Privacy-enhancing technologies (PET)• Privacy-preserving Data Mining (PPDM)
camouflage hiding in the crowd
k-anonymization
Data modification/ perturbation