kosa - theory for privacy measuring v2
TRANSCRIPT
![Page 1: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/1.jpg)
![Page 2: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/2.jpg)
![Page 3: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/3.jpg)
![Page 4: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/4.jpg)
![Page 5: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/5.jpg)
![Page 6: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/6.jpg)
![Page 7: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/7.jpg)
![Page 8: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/8.jpg)
![Page 9: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/9.jpg)
![Page 10: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/10.jpg)
![Page 11: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/11.jpg)
![Page 12: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/12.jpg)
Why Privacy?
![Page 13: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/13.jpg)
Discipline Specificity
![Page 14: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/14.jpg)
![Page 15: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/15.jpg)
![Page 16: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/16.jpg)
![Page 17: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/17.jpg)
Problem
● Research across disciplines suffers because there is no unifed mechanism for measurement
● Computer science has focussed on policy enforcement, ontologies and taxonomies
● Nobody looks at individual privacy preferences in a given environment, which is the basis for legislation
– And also how requirements must be derived
![Page 18: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/18.jpg)
2 Examples
● Facebook● Twitter
![Page 19: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/19.jpg)
People on Facebook
![Page 20: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/20.jpg)
People on Facebook
![Page 21: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/21.jpg)
![Page 22: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/22.jpg)
![Page 23: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/23.jpg)
Versus
![Page 24: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/24.jpg)
![Page 25: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/25.jpg)
![Page 26: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/26.jpg)
Hypothesis
● Disregarding the value-based approach to privacy, it's possible to dervie a finite representation based on discrete factors
● The representation can be used to understand privacy betteracross disciplines
– Standardization– Measurement– Management
![Page 27: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/27.jpg)
Theoretical Framework
● Scientific / mathematical determinism● Plus.
![Page 28: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/28.jpg)
The States
1)Private: existence is unknown
2)Unidentified: presence is known
3)Anonymous: information known but no identity
4)Masked: identity linkage is concealed
5)De-identified: identity is not directly linked
6)Pseudonymous: identity is falsefied
7)Confidential: identity is known for a specific purpose
8)Identified: capable of being distinguised
9)Public: everything is known and assigned
![Page 29: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/29.jpg)
![Page 30: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/30.jpg)
Factors
● Human: considerations when privacy decisions are made
● Technology: services that computers perform related to information management
● Data Types: types of identifiable information
● Recepient: machine v. human● Architecture: characteristics of the physical
environment
![Page 31: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/31.jpg)
Human
● Human privacy rules are specific to the establishment; they are reflected in the physical structure and properties of society
● Each individual has a social contact threshold which determines how they exercise their privacy rights
● Examples:● Subject matter of the object● Control of disclosure, information, audience● Social structure and condition● Visibility● Expectations
![Page 32: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/32.jpg)
Data Types
● Notion of privacy as information protection is well represented in legislaiton and regulation across the world
● Less widely used is the notion of identifiability: that data exists that may or may not include the traditional identifiers, e.g. Name, but may still uniquely identify a person● What is more private: a phone number or a
prescription?
![Page 33: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/33.jpg)
Technology
● Computers are generally accepted to be an effective tool for information management; used to acquire, organize, retrieve, search and maintain information
● This happens increasingly without human intervention
● When it comes to managing information about an identifiable person, there are a discrete number of functions that computers can provide
● Examples:● Network, hosting, registration, mail, website/portal, software,
backup
![Page 34: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/34.jpg)
Proposed Formalization
1) Sn = w H f (H )+ wD f (D)+ wT f (T )
2) f (Factor) = (w1F1 + w2 F2 +... + wn Fn )
3) The more positive the individual factors, the higher to total result of the factor set, the more likely the individual will move to a lower state of privacy, Sm>Sn
![Page 35: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/35.jpg)
Transitions
● Forward● I disclose about me, my objects● You disclose about me, my objects
● Backward● information redaction● information protection
![Page 36: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/36.jpg)
Questions For You
● How do people make decisions?● Specifically in social situations?
● How does space change behaviour?● Any suggestions for testing?● What are the other disciplines that talk about
space, privacy, representation of self?● Suggestions on theoretical frameworks?
![Page 37: Kosa - Theory for Privacy Measuring v2](https://reader031.vdocuments.us/reader031/viewer/2022032222/55c425a0bb61ebc51c8b4661/html5/thumbnails/37.jpg)
An Offer