SlideShare a Scribd company logo
1 of 10
Privacy
 in Light of Future IT Technologies

                                     Wojciech Cellary
                              Department of Information Technology
                                Poznan University of Economics
                                              Mansfelda 4
                                      60-854 Poznań, POLAND
                                       cellary@kti.ue.poznan.pl
                                        www.kti.ue.poznan.pl




(c) W. Cellary 2012 slide 1
Privacy

                     The essence of privacy is secret


                       The biggest threat to privacy is
                                  betrayal
                          not a breach of security

               Security can be protected by technical means
              while
               there are no technical means of protection against
                betrayal
(c)   W. Cellary 2012, slide 2
Sources of private data

 Giving away private data by a
    stakeholder/customer in order to
    settle the matter
 Generating private data of                            Explicit
  stakeholder/customer by service                  data collection
  provider (e.g. doctor)
 Giving away private data for social
  reasons – social networking sites
 Automatic data collection
 Extraction and exploration of                         Implicit
                                                   data collection
  knowledge

  (c)   W. Cellary 2012, slide 3
Most important
                                 IT development trends
                                       Multimedia
                                       Collaboration
                                           Cloud Computing
                                           Service Oriented Architecture
                                           Social Networks
                                           Internet of Things

                                       Semantics
                                   All these trends seek to
                                  improve the quality of life

       Unfortunately, all of them carry an increased
                    threat to privacy
(c)   W. Cellary 2012, slide 4
Threats to privacy

       Possibility of surveillance on a huge scale
       Possibility of identification of people at any given
        point while doing any given task
       Possibility of recording every human activities and
        their parameters
       Possibility of profiling – computers will know us
        better than we know ourselves
       Possibility of influencing on person’s actions via
        his/her environment and context

(c)   W. Cellary 2012, slide 5
Consequences
                                 of privacy violation

       Hurt and betrayal
       Possibility of manipulation
                       by government                         for public interests?
                       by business, including media          for profit
                       by people, including anonymous ones   for fun?
       Therefore, to reduce risk of privacy violation many
              people step back from e-democracy (civil rights)
              and e-economy (consumer rights) that is certainly
              bad

(c)   W. Cellary 2012, slide 6
Data Protection Laws
                                  around the World
                                    (by David Banisar)




(c)   W. Cellary 2012, slide 7
Conclusions

                Internet does not forget anything,
                  and certainly does not forgive


      Everything that you record (let record)
       about yourself in an electronic form,
             may be used against you


(c)   W. Cellary 2012, slide 8
Conclusions


                         There are no technical means
                         of protection against betrayal



The only effective protection of privacy is
     ethics assisted by criminal law


(c)   W. Cellary 2012, slide 9
Thank you

                                         Wojciech Cellary




(c)   W. Cellary 2012, slide 10

More Related Content

Viewers also liked

Latif ladid gen6 overview
Latif ladid gen6 overviewLatif ladid gen6 overview
Latif ladid gen6 overviewGlobalForum
 
Web samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentationWeb samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentationGlobalForum
 
5. global forum sg grumbach
5. global forum sg grumbach5. global forum sg grumbach
5. global forum sg grumbachGlobalForum
 
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentationGlobalForum
 
20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_fin20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_finGlobalForum
 
Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2GlobalForum
 

Viewers also liked (6)

Latif ladid gen6 overview
Latif ladid gen6 overviewLatif ladid gen6 overview
Latif ladid gen6 overview
 
Web samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentationWeb samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentation
 
5. global forum sg grumbach
5. global forum sg grumbach5. global forum sg grumbach
5. global forum sg grumbach
 
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation
 
20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_fin20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_fin
 
Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2
 

Similar to 3. w.cellary privacy stockholm_v5

Research Agenda in Security Research
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Researchsiswarren
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptxBetaBeta9
 
In defence of the human factor
In defence of the human factorIn defence of the human factor
In defence of the human factorCiarán Mc Mahon
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
 
Data Breaches and the Social Web
Data Breaches and the Social WebData Breaches and the Social Web
Data Breaches and the Social WebBoyd Neil
 
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxbenjaminjames21681
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative mediaAnies Syahieda
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of ThingsDeris Stiawan
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of ThingsDeris Stiawan
 
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxCaroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxannandleola
 
Human Error in Cyber Security
Human Error in Cyber SecurityHuman Error in Cyber Security
Human Error in Cyber SecurityAntti Ollila
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 

Similar to 3. w.cellary privacy stockholm_v5 (20)

Research Agenda in Security Research
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Research
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptx
 
In defence of the human factor
In defence of the human factorIn defence of the human factor
In defence of the human factor
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
Data Breaches and the Social Web
Data Breaches and the Social WebData Breaches and the Social Web
Data Breaches and the Social Web
 
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
issue and trend in integrative media
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxCaroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
 
Sem 003
Sem 003Sem 003
Sem 003
 
Cases
CasesCases
Cases
 
Human Error in Cyber Security
Human Error in Cyber SecurityHuman Error in Cyber Security
Human Error in Cyber Security
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 

More from GlobalForum

7. brigitte d'heygere
7. brigitte d'heygere7. brigitte d'heygere
7. brigitte d'heygereGlobalForum
 
Corporate urban f presentation europe
Corporate urban f presentation  europeCorporate urban f presentation  europe
Corporate urban f presentation europeGlobalForum
 
7 ppt thunus global forum
7 ppt thunus global forum7 ppt thunus global forum
7 ppt thunus global forumGlobalForum
 
6 ppt hoddevik short final
6 ppt hoddevik short final6 ppt hoddevik short final
6 ppt hoddevik short finalGlobalForum
 
5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbg5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbgGlobalForum
 
4 ppt myeongki baek
4 ppt myeongki baek4 ppt myeongki baek
4 ppt myeongki baekGlobalForum
 
3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm es3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm esGlobalForum
 
Wormeli global forum 2012
Wormeli global forum 2012Wormeli global forum 2012
Wormeli global forum 2012GlobalForum
 
12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebook12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebookGlobalForum
 
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebook2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebookGlobalForum
 
Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3GlobalForum
 
Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012GlobalForum
 
1 ppt h lindskog rev
1 ppt h lindskog rev1 ppt h lindskog rev
1 ppt h lindskog revGlobalForum
 
Global Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia MoranGlobal Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia MoranGlobalForum
 
Global forum 2012: Gaetano Santucci
Global forum 2012: Gaetano SantucciGlobal forum 2012: Gaetano Santucci
Global forum 2012: Gaetano SantucciGlobalForum
 
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government AuthorityGlobal Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government AuthorityGlobalForum
 
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation:  Amadou Daffe, Code4Africa on Platforms to Gr...Global Forum 2012 Presentation:  Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...GlobalForum
 
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation:  Luis Rodriguez-Rosello, DG CONNECTGlobal Forum 2012 Presentation:  Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECTGlobalForum
 
Global Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOAGlobal Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOAGlobalForum
 

More from GlobalForum (20)

7. brigitte d'heygere
7. brigitte d'heygere7. brigitte d'heygere
7. brigitte d'heygere
 
Corporate urban f presentation europe
Corporate urban f presentation  europeCorporate urban f presentation  europe
Corporate urban f presentation europe
 
7 ppt thunus global forum
7 ppt thunus global forum7 ppt thunus global forum
7 ppt thunus global forum
 
6 ppt hoddevik short final
6 ppt hoddevik short final6 ppt hoddevik short final
6 ppt hoddevik short final
 
5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbg5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbg
 
4 ppt myeongki baek
4 ppt myeongki baek4 ppt myeongki baek
4 ppt myeongki baek
 
3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm es3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm es
 
Wormeli
WormeliWormeli
Wormeli
 
Wormeli global forum 2012
Wormeli global forum 2012Wormeli global forum 2012
Wormeli global forum 2012
 
12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebook12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebook
 
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebook2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
 
Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3
 
Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012
 
1 ppt h lindskog rev
1 ppt h lindskog rev1 ppt h lindskog rev
1 ppt h lindskog rev
 
Global Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia MoranGlobal Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia Moran
 
Global forum 2012: Gaetano Santucci
Global forum 2012: Gaetano SantucciGlobal forum 2012: Gaetano Santucci
Global forum 2012: Gaetano Santucci
 
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government AuthorityGlobal Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
 
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation:  Amadou Daffe, Code4Africa on Platforms to Gr...Global Forum 2012 Presentation:  Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
 
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation:  Luis Rodriguez-Rosello, DG CONNECTGlobal Forum 2012 Presentation:  Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
 
Global Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOAGlobal Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOA
 

3. w.cellary privacy stockholm_v5

  • 1. Privacy in Light of Future IT Technologies Wojciech Cellary Department of Information Technology Poznan University of Economics Mansfelda 4 60-854 Poznań, POLAND cellary@kti.ue.poznan.pl www.kti.ue.poznan.pl (c) W. Cellary 2012 slide 1
  • 2. Privacy The essence of privacy is secret The biggest threat to privacy is betrayal not a breach of security  Security can be protected by technical means while  there are no technical means of protection against betrayal (c) W. Cellary 2012, slide 2
  • 3. Sources of private data  Giving away private data by a stakeholder/customer in order to settle the matter  Generating private data of Explicit stakeholder/customer by service data collection provider (e.g. doctor)  Giving away private data for social reasons – social networking sites  Automatic data collection  Extraction and exploration of Implicit data collection knowledge (c) W. Cellary 2012, slide 3
  • 4. Most important IT development trends  Multimedia  Collaboration Cloud Computing Service Oriented Architecture Social Networks Internet of Things  Semantics All these trends seek to improve the quality of life Unfortunately, all of them carry an increased threat to privacy (c) W. Cellary 2012, slide 4
  • 5. Threats to privacy  Possibility of surveillance on a huge scale  Possibility of identification of people at any given point while doing any given task  Possibility of recording every human activities and their parameters  Possibility of profiling – computers will know us better than we know ourselves  Possibility of influencing on person’s actions via his/her environment and context (c) W. Cellary 2012, slide 5
  • 6. Consequences of privacy violation  Hurt and betrayal  Possibility of manipulation by government for public interests? by business, including media for profit by people, including anonymous ones for fun?  Therefore, to reduce risk of privacy violation many people step back from e-democracy (civil rights) and e-economy (consumer rights) that is certainly bad (c) W. Cellary 2012, slide 6
  • 7. Data Protection Laws around the World (by David Banisar) (c) W. Cellary 2012, slide 7
  • 8. Conclusions Internet does not forget anything, and certainly does not forgive Everything that you record (let record) about yourself in an electronic form, may be used against you (c) W. Cellary 2012, slide 8
  • 9. Conclusions There are no technical means of protection against betrayal The only effective protection of privacy is ethics assisted by criminal law (c) W. Cellary 2012, slide 9
  • 10. Thank you Wojciech Cellary (c) W. Cellary 2012, slide 10