Personal data are the lifeblood of today's economy
But our privacy regulations date from when they weren't Structured data Scattered grains of information Collected by visib...
We should probably be worried stiff…
…  But we don't really seem to be
It's called the "Privacy Paradox" Google Trends: "Privacy" …  But a paradox in whose eyes?
In fact, people seem to know what they're doing… Differentiation Shared "decency"
…  It's just that they're motivated by several things "Me" Reaching out , connecting, showing off, marketing mys...
Privacy as seclusion isn't  that  valuable…
…  But privacy as autonomy is
Because  protection  and  projection  are inseparable, we need a new set of tools Empower Protect Educate information tool...
Some tools already exist, some need research
Let's think of how the Net could forget…
…  (Forgetting is what memory does all the time)… Transience:  the fading or loss of details over time Absent-mindedness: ...
…  Turn uncertainty into a feature, not a bug?
Let's take heteronyms for serious
Let's use personal data for personal motives…
…  And invent the Right to Data Return
Finally, let's turn digital identity into a skill
 
Let's use personal data for personal motives Paul Downey
Upcoming SlideShare
Loading in …5
×

Digital Privacy Revisited

3,356 views

Published on

"The value of privacy, is that it enables us to go public!"

Never before in our networked societies has the subject of personal privacy protection been so hotly debated. And never have so many methods been employed to capture and use personal data. And never have so many that published so much about themselves online...

Paradox? Lack of awareness? Hypocrisy? Or emergence of a new way to defend and exercise our freedom, which we protect only in order to better project ourselves towards others, to the world?

This book offers new keys to understanding the relationship between computer science, freedom, privacy and identity. It proposes to replace a defensive approach to identity and privacy with a strategic approach. The aim is to share powerful technology, and equip individuals to the same degree as the services and organizations that want to learn more about them.

The book explores new avenues, new tools, sometimes new rights, to grant privacy its true value: the ability to choose and control one’s public life.

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
3,356
On SlideShare
0
From Embeds
0
Number of Embeds
1,630
Actions
Shares
0
Downloads
52
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Digital Privacy Revisited

  1. 2. Personal data are the lifeblood of today's economy
  2. 3. But our privacy regulations date from when they weren't Structured data Scattered grains of information Collected by visible, identified sources Ubiquitous sources (icl. things; others; ourselves…) Produced in an organized and conscious manner Byproducts of almost all human activities Stored in well-known locations Distributed and replicated Yesterday Today
  3. 4. We should probably be worried stiff…
  4. 5. … But we don't really seem to be
  5. 6. It's called the "Privacy Paradox" Google Trends: "Privacy" … But a paradox in whose eyes?
  6. 7. In fact, people seem to know what they're doing… Differentiation Shared "decency"
  7. 8. … It's just that they're motivated by several things "Me" Reaching out , connecting, showing off, marketing myself Control over my visibility, presence, reputation… Convenience , simplicity, savings, personalization… Self-identity building * individuals, vendors, institutions, communities… Analysis, evaluation Others *
  8. 9. Privacy as seclusion isn't that valuable…
  9. 10. … But privacy as autonomy is
  10. 11. Because protection and projection are inseparable, we need a new set of tools Empower Protect Educate information tools skills
  11. 12. Some tools already exist, some need research
  12. 13. Let's think of how the Net could forget…
  13. 14. … (Forgetting is what memory does all the time)… Transience: the fading or loss of details over time Absent-mindedness: distractedness built into the sensing technologies Blocking: the random impossibility to answer specific queries Misattribution: the specific misrecording of part of an event, but not the whole event Suggestibility: the plausible rescripting certain events after a particular time Bias: re-writing all events based on pattern recognition to create a record that is consistent and plausible but subtly different ‘ Outlines of a world coming into existence’: Pervasive computing and the ethics of forgetting Martin Dodge, Rob Kitchin "Rather than focus on the prescriptive needs for privacy protections, we envisage necessary processes of forgetting (…) that should be in-built into the system ensuring a sufficient degree of imperfection, loss and error" Loss-Based Error-Based
  14. 15. … Turn uncertainty into a feature, not a bug?
  15. 16. Let's take heteronyms for serious
  16. 17. Let's use personal data for personal motives…
  17. 18. … And invent the Right to Data Return
  18. 19. Finally, let's turn digital identity into a skill
  19. 21. Let's use personal data for personal motives Paul Downey

×