3. w.cellary privacy stockholm_v5

892
-1

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
892
On Slideshare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

3. w.cellary privacy stockholm_v5

  1. 1. Privacy in Light of Future IT Technologies Wojciech Cellary Department of Information Technology Poznan University of Economics Mansfelda 4 60-854 Poznań, POLAND cellary@kti.ue.poznan.pl www.kti.ue.poznan.pl(c) W. Cellary 2012 slide 1
  2. 2. Privacy The essence of privacy is secret The biggest threat to privacy is betrayal not a breach of security  Security can be protected by technical means while  there are no technical means of protection against betrayal(c) W. Cellary 2012, slide 2
  3. 3. Sources of private data Giving away private data by a stakeholder/customer in order to settle the matter Generating private data of Explicit stakeholder/customer by service data collection provider (e.g. doctor) Giving away private data for social reasons – social networking sites Automatic data collection Extraction and exploration of Implicit data collection knowledge (c) W. Cellary 2012, slide 3
  4. 4. Most important IT development trends  Multimedia  Collaboration Cloud Computing Service Oriented Architecture Social Networks Internet of Things  Semantics All these trends seek to improve the quality of life Unfortunately, all of them carry an increased threat to privacy(c) W. Cellary 2012, slide 4
  5. 5. Threats to privacy  Possibility of surveillance on a huge scale  Possibility of identification of people at any given point while doing any given task  Possibility of recording every human activities and their parameters  Possibility of profiling – computers will know us better than we know ourselves  Possibility of influencing on person’s actions via his/her environment and context(c) W. Cellary 2012, slide 5
  6. 6. Consequences of privacy violation  Hurt and betrayal  Possibility of manipulation by government for public interests? by business, including media for profit by people, including anonymous ones for fun?  Therefore, to reduce risk of privacy violation many people step back from e-democracy (civil rights) and e-economy (consumer rights) that is certainly bad(c) W. Cellary 2012, slide 6
  7. 7. Data Protection Laws around the World (by David Banisar)(c) W. Cellary 2012, slide 7
  8. 8. Conclusions Internet does not forget anything, and certainly does not forgive Everything that you record (let record) about yourself in an electronic form, may be used against you(c) W. Cellary 2012, slide 8
  9. 9. Conclusions There are no technical means of protection against betrayalThe only effective protection of privacy is ethics assisted by criminal law(c) W. Cellary 2012, slide 9
  10. 10. Thank you Wojciech Cellary(c) W. Cellary 2012, slide 10
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×