3. w.cellary privacy stockholm_v5

Privacy
 in Light of Future IT Technologies

                                     Wojciech Cellary
                              Department of Information Technology
                                Poznan University of Economics
                                              Mansfelda 4
                                      60-854 Poznań, POLAND
                                       cellary@kti.ue.poznan.pl
                                        www.kti.ue.poznan.pl




(c) W. Cellary 2012 slide 1
Privacy

                     The essence of privacy is secret


                       The biggest threat to privacy is
                                  betrayal
                          not a breach of security

               Security can be protected by technical means
              while
               there are no technical means of protection against
                betrayal
(c)   W. Cellary 2012, slide 2
Sources of private data

 Giving away private data by a
    stakeholder/customer in order to
    settle the matter
 Generating private data of                            Explicit
  stakeholder/customer by service                  data collection
  provider (e.g. doctor)
 Giving away private data for social
  reasons – social networking sites
 Automatic data collection
 Extraction and exploration of                         Implicit
                                                   data collection
  knowledge

  (c)   W. Cellary 2012, slide 3
Most important
                                 IT development trends
                                       Multimedia
                                       Collaboration
                                           Cloud Computing
                                           Service Oriented Architecture
                                           Social Networks
                                           Internet of Things

                                       Semantics
                                   All these trends seek to
                                  improve the quality of life

       Unfortunately, all of them carry an increased
                    threat to privacy
(c)   W. Cellary 2012, slide 4
Threats to privacy

       Possibility of surveillance on a huge scale
       Possibility of identification of people at any given
        point while doing any given task
       Possibility of recording every human activities and
        their parameters
       Possibility of profiling – computers will know us
        better than we know ourselves
       Possibility of influencing on person’s actions via
        his/her environment and context

(c)   W. Cellary 2012, slide 5
Consequences
                                 of privacy violation

       Hurt and betrayal
       Possibility of manipulation
                       by government                         for public interests?
                       by business, including media          for profit
                       by people, including anonymous ones   for fun?
       Therefore, to reduce risk of privacy violation many
              people step back from e-democracy (civil rights)
              and e-economy (consumer rights) that is certainly
              bad

(c)   W. Cellary 2012, slide 6
Data Protection Laws
                                  around the World
                                    (by David Banisar)




(c)   W. Cellary 2012, slide 7
Conclusions

                Internet does not forget anything,
                  and certainly does not forgive


      Everything that you record (let record)
       about yourself in an electronic form,
             may be used against you


(c)   W. Cellary 2012, slide 8
Conclusions


                         There are no technical means
                         of protection against betrayal



The only effective protection of privacy is
     ethics assisted by criminal law


(c)   W. Cellary 2012, slide 9
Thank you

                                         Wojciech Cellary




(c)   W. Cellary 2012, slide 10
1 of 10

Recommended

ICEGOV2009 - Tutorial 5 - part 2 - Strategic Impact of e-Governmenton Economy... by
ICEGOV2009 - Tutorial 5 - part 2 - Strategic Impact of e-Governmenton Economy...ICEGOV2009 - Tutorial 5 - part 2 - Strategic Impact of e-Governmenton Economy...
ICEGOV2009 - Tutorial 5 - part 2 - Strategic Impact of e-Governmenton Economy...ICEGOV
372 views48 slides
ICEGOV2009 - Tutorial 5 - Part 1 - Strategic Impact of e-Governmenton Economy... by
ICEGOV2009 - Tutorial 5 - Part 1 - Strategic Impact of e-Governmenton Economy...ICEGOV2009 - Tutorial 5 - Part 1 - Strategic Impact of e-Governmenton Economy...
ICEGOV2009 - Tutorial 5 - Part 1 - Strategic Impact of e-Governmenton Economy...ICEGOV
384 views45 slides
Content filtering, memory and community isolation by
Content filtering, memory and community isolationContent filtering, memory and community isolation
Content filtering, memory and community isolationArtur Alves
767 views13 slides
Bab I by
Bab IBab I
Bab IMustahal SSi
1.1K views37 slides
Web annika branstrom global forum nov2012long by
Web annika branstrom global forum nov2012longWeb annika branstrom global forum nov2012long
Web annika branstrom global forum nov2012longGlobalForum
1.3K views21 slides
4. florence dupre new usagesprivacy legal framework fd by
4. florence dupre new usagesprivacy legal framework fd4. florence dupre new usagesprivacy legal framework fd
4. florence dupre new usagesprivacy legal framework fdGlobalForum
998 views6 slides

More Related Content

Viewers also liked

Latif ladid gen6 overview by
Latif ladid gen6 overviewLatif ladid gen6 overview
Latif ladid gen6 overviewGlobalForum
823 views9 slides
Web samia mehlem open data and wb main presentation by
Web samia mehlem open data and wb main presentationWeb samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentationGlobalForum
939 views30 slides
5. global forum sg grumbach by
5. global forum sg grumbach5. global forum sg grumbach
5. global forum sg grumbachGlobalForum
862 views7 slides
2 ppt final dan shoemaker dd1 stockholm presentation by
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentationGlobalForum
990 views6 slides
20121112 global forum_ntt_niwano_fin by
20121112 global forum_ntt_niwano_fin20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_finGlobalForum
989 views9 slides
Global forum 2012 pascal poitevin v2 by
Global forum 2012 pascal poitevin v2Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2GlobalForum
914 views12 slides

Viewers also liked(6)

Latif ladid gen6 overview by GlobalForum
Latif ladid gen6 overviewLatif ladid gen6 overview
Latif ladid gen6 overview
GlobalForum823 views
Web samia mehlem open data and wb main presentation by GlobalForum
Web samia mehlem open data and wb main presentationWeb samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentation
GlobalForum939 views
5. global forum sg grumbach by GlobalForum
5. global forum sg grumbach5. global forum sg grumbach
5. global forum sg grumbach
GlobalForum862 views
2 ppt final dan shoemaker dd1 stockholm presentation by GlobalForum
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation
GlobalForum990 views
20121112 global forum_ntt_niwano_fin by GlobalForum
20121112 global forum_ntt_niwano_fin20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_fin
GlobalForum989 views
Global forum 2012 pascal poitevin v2 by GlobalForum
Global forum 2012 pascal poitevin v2Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2
GlobalForum914 views

Similar to 3. w.cellary privacy stockholm_v5

Research Agenda in Security Research by
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Researchsiswarren
216 views7 slides
MIS.pptx by
MIS.pptxMIS.pptx
MIS.pptxVighneshMGopal
14 views17 slides
Final Presentation.pptx by
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptxBetaBeta9
12 views10 slides
In defence of the human factor by
In defence of the human factorIn defence of the human factor
In defence of the human factorCiarán Mc Mahon
2.2K views30 slides
ID-20305090 Fahim Montasir.pptx by
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxFahimMuntasir21
4 views14 slides
Data Breaches and the Social Web by
Data Breaches and the Social WebData Breaches and the Social Web
Data Breaches and the Social WebBoyd Neil
536 views29 slides

Similar to 3. w.cellary privacy stockholm_v5(20)

Research Agenda in Security Research by siswarren
Research Agenda in Security ResearchResearch Agenda in Security Research
Research Agenda in Security Research
siswarren216 views
Final Presentation.pptx by BetaBeta9
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptx
BetaBeta912 views
Data Breaches and the Social Web by Boyd Neil
Data Breaches and the Social WebData Breaches and the Social Web
Data Breaches and the Social Web
Boyd Neil536 views
Government Information Quarterly 34 (2017) 1–7Contents lis.docx by benjaminjames21681
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Ethical Issues Of Information Technology by Sandra Arveseth
Ethical Issues Of Information TechnologyEthical Issues Of Information Technology
Ethical Issues Of Information Technology
Sandra Arveseth2 views
MainPaper_4.0 by varun4110
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110138 views
issue and trend in integrative media by Anies Syahieda
issue and trend in integrative mediaissue and trend in integrative media
issue and trend in integrative media
Anies Syahieda276 views
Malware threat analysis techniques and approaches for IoT applications: a review by journalBEEI
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI83 views
Computer Ethics And Information Systems by Mandy Froemming
Computer Ethics And Information SystemsComputer Ethics And Information Systems
Computer Ethics And Information Systems
Mandy Froemming3 views
Trend & challenges Internet of Things by Deris Stiawan
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
Deris Stiawan546 views
Trend Internet of Things by Deris Stiawan
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
Deris Stiawan200 views
Internet Security And The Internet by Jennifer Jones
Internet Security And The InternetInternet Security And The Internet
Internet Security And The Internet
Jennifer Jones3 views

More from GlobalForum

7. brigitte d'heygere by
7. brigitte d'heygere7. brigitte d'heygere
7. brigitte d'heygereGlobalForum
581 views7 slides
Corporate urban f presentation europe by
Corporate urban f presentation  europeCorporate urban f presentation  europe
Corporate urban f presentation europeGlobalForum
930 views5 slides
7 ppt thunus global forum by
7 ppt thunus global forum7 ppt thunus global forum
7 ppt thunus global forumGlobalForum
941 views6 slides
6 ppt hoddevik short final by
6 ppt hoddevik short final6 ppt hoddevik short final
6 ppt hoddevik short finalGlobalForum
931 views9 slides
5 ppt johannes wimmer global forum session_6_bbg by
5 ppt johannes wimmer global forum session_6_bbg5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbgGlobalForum
1.7K views6 slides
4 ppt myeongki baek by
4 ppt myeongki baek4 ppt myeongki baek
4 ppt myeongki baekGlobalForum
1.3K views7 slides

More from GlobalForum(20)

7. brigitte d'heygere by GlobalForum
7. brigitte d'heygere7. brigitte d'heygere
7. brigitte d'heygere
GlobalForum581 views
Corporate urban f presentation europe by GlobalForum
Corporate urban f presentation  europeCorporate urban f presentation  europe
Corporate urban f presentation europe
GlobalForum930 views
7 ppt thunus global forum by GlobalForum
7 ppt thunus global forum7 ppt thunus global forum
7 ppt thunus global forum
GlobalForum941 views
6 ppt hoddevik short final by GlobalForum
6 ppt hoddevik short final6 ppt hoddevik short final
6 ppt hoddevik short final
GlobalForum931 views
5 ppt johannes wimmer global forum session_6_bbg by GlobalForum
5 ppt johannes wimmer global forum session_6_bbg5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbg
GlobalForum1.7K views
4 ppt myeongki baek by GlobalForum
4 ppt myeongki baek4 ppt myeongki baek
4 ppt myeongki baek
GlobalForum1.3K views
3 ppt eleanor stewart global forum stockholm es by GlobalForum
3 ppt eleanor stewart global forum stockholm es3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm es
GlobalForum1.2K views
Wormeli global forum 2012 by GlobalForum
Wormeli global forum 2012Wormeli global forum 2012
Wormeli global forum 2012
GlobalForum323 views
12 11-11 global forum sto thomas myrup kristensen facebook by GlobalForum
12 11-11 global forum sto thomas myrup kristensen facebook12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebook
GlobalForum905 views
2. 2012 11-11 global forum sto thomas myrup kristensen facebook by GlobalForum
2. 2012 11-11 global forum sto thomas myrup kristensen facebook2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
GlobalForum548 views
Ppt samia mehlem global forum samia m session 3 by GlobalForum
Ppt samia mehlem global forum samia m session 3Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3
GlobalForum286 views
Annika branstrom short global forum nov.2012 by GlobalForum
Annika branstrom short global forum nov.2012Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012
GlobalForum396 views
1 ppt h lindskog rev by GlobalForum
1 ppt h lindskog rev1 ppt h lindskog rev
1 ppt h lindskog rev
GlobalForum876 views
Global Forum 2012: Francisco Garcia Moran by GlobalForum
Global Forum 2012: Francisco Garcia MoranGlobal Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia Moran
GlobalForum2.9K views
Global forum 2012: Gaetano Santucci by GlobalForum
Global forum 2012: Gaetano SantucciGlobal forum 2012: Gaetano Santucci
Global forum 2012: Gaetano Santucci
GlobalForum399 views
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority by GlobalForum
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government AuthorityGlobal Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
GlobalForum2K views
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr... by GlobalForum
Global Forum 2012 Presentation:  Amadou Daffe, Code4Africa on Platforms to Gr...Global Forum 2012 Presentation:  Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
GlobalForum438 views
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT by GlobalForum
Global Forum 2012 Presentation:  Luis Rodriguez-Rosello, DG CONNECTGlobal Forum 2012 Presentation:  Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
GlobalForum408 views
Global Forum 2012: Christine Leurquin, ESOA by GlobalForum
Global Forum 2012: Christine Leurquin, ESOAGlobal Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOA
GlobalForum483 views

3. w.cellary privacy stockholm_v5

  • 1. Privacy in Light of Future IT Technologies Wojciech Cellary Department of Information Technology Poznan University of Economics Mansfelda 4 60-854 Poznań, POLAND cellary@kti.ue.poznan.pl www.kti.ue.poznan.pl (c) W. Cellary 2012 slide 1
  • 2. Privacy The essence of privacy is secret The biggest threat to privacy is betrayal not a breach of security  Security can be protected by technical means while  there are no technical means of protection against betrayal (c) W. Cellary 2012, slide 2
  • 3. Sources of private data  Giving away private data by a stakeholder/customer in order to settle the matter  Generating private data of Explicit stakeholder/customer by service data collection provider (e.g. doctor)  Giving away private data for social reasons – social networking sites  Automatic data collection  Extraction and exploration of Implicit data collection knowledge (c) W. Cellary 2012, slide 3
  • 4. Most important IT development trends  Multimedia  Collaboration Cloud Computing Service Oriented Architecture Social Networks Internet of Things  Semantics All these trends seek to improve the quality of life Unfortunately, all of them carry an increased threat to privacy (c) W. Cellary 2012, slide 4
  • 5. Threats to privacy  Possibility of surveillance on a huge scale  Possibility of identification of people at any given point while doing any given task  Possibility of recording every human activities and their parameters  Possibility of profiling – computers will know us better than we know ourselves  Possibility of influencing on person’s actions via his/her environment and context (c) W. Cellary 2012, slide 5
  • 6. Consequences of privacy violation  Hurt and betrayal  Possibility of manipulation by government for public interests? by business, including media for profit by people, including anonymous ones for fun?  Therefore, to reduce risk of privacy violation many people step back from e-democracy (civil rights) and e-economy (consumer rights) that is certainly bad (c) W. Cellary 2012, slide 6
  • 7. Data Protection Laws around the World (by David Banisar) (c) W. Cellary 2012, slide 7
  • 8. Conclusions Internet does not forget anything, and certainly does not forgive Everything that you record (let record) about yourself in an electronic form, may be used against you (c) W. Cellary 2012, slide 8
  • 9. Conclusions There are no technical means of protection against betrayal The only effective protection of privacy is ethics assisted by criminal law (c) W. Cellary 2012, slide 9
  • 10. Thank you Wojciech Cellary (c) W. Cellary 2012, slide 10