SlideShare a Scribd company logo
Building Trust in a Tense
Information Society
MIT Startup Exchange – Cybersecurity Innovation
Daniel J. Weitzner
Director, Cybersecurity and Internet Policy Research
Initiative
Massachusetts Institute of Technology
28 May 2015
1
Tensions in our Information Society
reduce trust
1. Culture: Normalization of radical transparency
vs trust gap
2. User experience: Increased individual control of
personal data vs. opaque use
3. Political process: Major sector of
economy/society poorly understood
2
The Internet Trust Gap
3
Privacy built on trust, not fine print
No App Low Med. High
*
*
*
Participants based their decision on:
• Familiarity (i.e. trust) with the app.
• The type of app, in particular what
kinds of information the app already
has already access to.
Frequency of use had no effect;
No App Low Med. High
No App Low Med. High No App Low Med. High
No App Low Med. High
*
No App Low Med. High
Privacy Tipping Points in
Smartphones Privacy
Preferences
F Shih, I Liccardi, D Weitzner –
Proceedings ACM CHI, 2015
Normalization of Radical Transparency
Assange
Wall Street
Journal
‘What they
Know”
Manning
Snowden
• Snowden is neither the
first nor the last
• The dramatic response
of Silicon Valley
• Trust will require pro-
active transparency
51. Transparency without trust
Trust Challenge
Judge Reggie B. Walton, Chief Judge,
Foreign Intelligence Surveillance Court
“the court lacks the tools to
independently verify how
often the government’s
surveillance breaks the
court’s rules that aim to
protect Americans’ privacy”
• Washington Post, August 15,
2013
61. Transparency without trust
Growing Individual Control
7
• Personal health data tied to
individual
• How will this shape privacy
expectations?
2. Control vs opacity
Opaque decision making with ‘big data’
8
New Privacy Priorities: Prevent
Discrimination and Sustain Trust
Discrimination: “The
increasing use of
algorithms to make
eligibility decisions must
be carefully monitored for
potential discriminatory
outcomes for
disadvantaged groups,
even absent
discriminatory intent.“
10
Importance of Accountable Systems
“Although the state of the art is
still somewhat ad hoc, and
auditing is often not automated,
so‐called accountable systems
are beginning to be deployed.
The ability to detect violations of
privacy policies, particularly if the
auditing is automated and
continuous, can be used both to
deter privacy violations and to
ensure that violators are
punished. (pp. 42-43)
11
A Goal by Analogy: Financial Accounting
12
.
.
.
.
.
General Ledger
Transactions
Assets
…
…
Liabilities
…
…
Net Assets
Owners Equity
Financial
Balance Sheet
Accounting rules
Public
Trust
Personal Information Accountability
13
.
.
.
.
.
Personal Information
Transactions
Compliance
• FCRA #
• DAA #
• FISA #
• ECPA #
Non-compliance
• FCRA #
• DAA #
• FISA #
• ECPA #
Total Transactions
Net Accountability
Personal Information
Balance Sheet
Accountable
Systems Reasoning
Public
Trust
Detailed Explanation
“[Recipient,] Fred Agenti, is a member of a
Criminal Justice Agency…”
“Inquiry is about Robert B. Guy and is based on a
personally identifying characteristic…”
14Accountable Systems
REAL-TIME USAGE CONTROL
Confidential
Real-time usage control
Personal Information Balance Sheet
Stop Online Piracy Act: Grass Roots View
17
Stop Online Piracy Act: Engineer’s View
• “If enacted, either of these bills will create an environment
of tremendous fear and uncertainty for technological
innovation, and seriously harm the credibility of the United
States in its role as a steward of key Internet
infrastructure. Regardless of recent amendments to
SOPA, both bills will risk fragmenting the Internet's global
domain name system (DNS) and have other capricious
technical consequences. In exchange for this, such
legislation would engender censorship that will
simultaneously be circumvented by deliberate infringers
while hampering innocent parties' right and ability to
communicate and express themselves online.”
• https://www.eff.org/deeplinks/2011/12/internet-inventors-warn-
against-sopa-and-pipa
18
MIT Cybersecurity and Internet Policy
Research Initiative
19
Social Science
•Nazli Choucri, Political
Science
•Peter Diamond,
Economics
•Michael Fischer,
Anthropology and
Science , Tecnology &
Society
•Kenneth Oye, Political
Science
•Sherry Turkle, Sociology
and Science ,
Technology & Society
Engineering
• Hal Abelson, EECS
• Tim Berners-Lee, CSAIL
• David Clark, CSAIL
• Munther Dahleh, Institute On
Complex & Socio-Tech.
Systems
• Shafi Goldwasser, EECS
• Frans Kaashoek, EECS
• Nancy Leveson, Aeronautics &
Astronautics
• Silvio Micali, EECS
• Ron Rivest, EECS
• Daniela Rus, CSAIL
• Howie Shrobe, CSAIL
• Gerry Sussman, EECS
• Daniel Weitzner, CSAIL
Management
• Andrew Lo, Sloan
• Stu Madnick, Sloan

More Related Content

What's hot

Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
Risk Crew
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
cfeutlinske
 
Data Breach Visualization
Data Breach VisualizationData Breach Visualization
Data Breach Visualization
Pavitraa Parthasarathy
 
Investigating tips
Investigating tipsInvestigating tips
Investigating tips
Connie Kesler
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
FalconPeregrine1
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
Nasir Bhutta
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
Community Protection Forum
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
Shawn Tuma
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
Sreejith Nair
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Knowledge Group
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
 
Insider threat
Insider threatInsider threat
Insider threat
ARCON TECHSOLUTIONS
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
rmackinnon
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
zaarahary
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerceAbegail Roberts
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
Quarles & Brady
 

What's hot (20)

Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Data Breach Visualization
Data Breach VisualizationData Breach Visualization
Data Breach Visualization
 
Investigating tips
Investigating tipsInvestigating tips
Investigating tips
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Insider threat
Insider threatInsider threat
Insider threat
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 

Similar to Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group.

MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Casey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
bugcrowd
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
mihinpr
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
Robert Craig
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Financial Poise
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
LifeLockBusinessSolutions
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
gloriakt
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Financial Poise
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
Kaufman & Canoles
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15E Andrew Keeney
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
ramsetl
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
gloriakt
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
TechSoup Canada
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
IBM Security
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
Financial Poise
 

Similar to Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group. (20)

MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 

More from MIT Startup Exchange

STEX Workshop: Batteries and Beyond
STEX Workshop: Batteries and BeyondSTEX Workshop: Batteries and Beyond
STEX Workshop: Batteries and Beyond
MIT Startup Exchange
 
Digital Healthcare Innovation Workshop 9.22.15
Digital Healthcare Innovation Workshop 9.22.15Digital Healthcare Innovation Workshop 9.22.15
Digital Healthcare Innovation Workshop 9.22.15
MIT Startup Exchange
 
Nanotech and New Materials Workshop 10.29.15
Nanotech and New Materials Workshop 10.29.15Nanotech and New Materials Workshop 10.29.15
Nanotech and New Materials Workshop 10.29.15
MIT Startup Exchange
 
SHORTLIST
SHORTLISTSHORTLIST
Krystyn J. Van Vliet Advanced Manufacturing
Krystyn J. Van Vliet Advanced Manufacturing Krystyn J. Van Vliet Advanced Manufacturing
Krystyn J. Van Vliet Advanced Manufacturing
MIT Startup Exchange
 
Brian Anthony MIT STEX Automation Workshop June 17, 2015
Brian Anthony MIT STEX Automation Workshop June 17, 2015Brian Anthony MIT STEX Automation Workshop June 17, 2015
Brian Anthony MIT STEX Automation Workshop June 17, 2015
MIT Startup Exchange
 
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspectiveScott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
MIT Startup Exchange
 
Liz Reynolds STEX Automation 6-17-15
Liz Reynolds STEX Automation 6-17-15Liz Reynolds STEX Automation 6-17-15
Liz Reynolds STEX Automation 6-17-15
MIT Startup Exchange
 
Stex intro automation_2015
Stex intro automation_2015Stex intro automation_2015
Stex intro automation_2015
MIT Startup Exchange
 
Automation agenda
Automation agendaAutomation agenda
Automation agenda
MIT Startup Exchange
 
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
MIT Startup Exchange
 
MIT's Cybersecurity startups by Trond A. Undheim
MIT's Cybersecurity startups by Trond A. UndheimMIT's Cybersecurity startups by Trond A. Undheim
MIT's Cybersecurity startups by Trond A. Undheim
MIT Startup Exchange
 
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
MIT Startup Exchange
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT Startup Exchange
 
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,..."MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
MIT Startup Exchange
 
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo.
"The Future of Food,"  Manoj Fenelon, Director of Foresight, PepsiCo. "The Future of Food,"  Manoj Fenelon, Director of Foresight, PepsiCo.
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo.
MIT Startup Exchange
 
Food, Sensors, Startups - The Road Ahead From a MIT perspective
Food, Sensors, Startups - The Road Ahead From a MIT perspectiveFood, Sensors, Startups - The Road Ahead From a MIT perspective
Food, Sensors, Startups - The Road Ahead From a MIT perspective
MIT Startup Exchange
 
Future opportunities for food tech product innovation from a research perspec...
Future opportunities for food tech product innovation from a research perspec...Future opportunities for food tech product innovation from a research perspec...
Future opportunities for food tech product innovation from a research perspec...
MIT Startup Exchange
 
Twitter feed - Food Tech Innovation Workshop and Panel Discussion
Twitter feed  - Food Tech Innovation Workshop and Panel DiscussionTwitter feed  - Food Tech Innovation Workshop and Panel Discussion
Twitter feed - Food Tech Innovation Workshop and Panel Discussion
MIT Startup Exchange
 

More from MIT Startup Exchange (20)

STEX Workshop: Batteries and Beyond
STEX Workshop: Batteries and BeyondSTEX Workshop: Batteries and Beyond
STEX Workshop: Batteries and Beyond
 
Digital Healthcare Innovation Workshop 9.22.15
Digital Healthcare Innovation Workshop 9.22.15Digital Healthcare Innovation Workshop 9.22.15
Digital Healthcare Innovation Workshop 9.22.15
 
Nanotech and New Materials Workshop 10.29.15
Nanotech and New Materials Workshop 10.29.15Nanotech and New Materials Workshop 10.29.15
Nanotech and New Materials Workshop 10.29.15
 
2015 2016 stex workshop schedule
2015 2016 stex workshop schedule2015 2016 stex workshop schedule
2015 2016 stex workshop schedule
 
SHORTLIST
SHORTLISTSHORTLIST
SHORTLIST
 
Krystyn J. Van Vliet Advanced Manufacturing
Krystyn J. Van Vliet Advanced Manufacturing Krystyn J. Van Vliet Advanced Manufacturing
Krystyn J. Van Vliet Advanced Manufacturing
 
Brian Anthony MIT STEX Automation Workshop June 17, 2015
Brian Anthony MIT STEX Automation Workshop June 17, 2015Brian Anthony MIT STEX Automation Workshop June 17, 2015
Brian Anthony MIT STEX Automation Workshop June 17, 2015
 
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspectiveScott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
 
Liz Reynolds STEX Automation 6-17-15
Liz Reynolds STEX Automation 6-17-15Liz Reynolds STEX Automation 6-17-15
Liz Reynolds STEX Automation 6-17-15
 
Stex intro automation_2015
Stex intro automation_2015Stex intro automation_2015
Stex intro automation_2015
 
Automation agenda
Automation agendaAutomation agenda
Automation agenda
 
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
 
MIT's Cybersecurity startups by Trond A. Undheim
MIT's Cybersecurity startups by Trond A. UndheimMIT's Cybersecurity startups by Trond A. Undheim
MIT's Cybersecurity startups by Trond A. Undheim
 
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,..."MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
 
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo.
"The Future of Food,"  Manoj Fenelon, Director of Foresight, PepsiCo. "The Future of Food,"  Manoj Fenelon, Director of Foresight, PepsiCo.
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo.
 
Food, Sensors, Startups - The Road Ahead From a MIT perspective
Food, Sensors, Startups - The Road Ahead From a MIT perspectiveFood, Sensors, Startups - The Road Ahead From a MIT perspective
Food, Sensors, Startups - The Road Ahead From a MIT perspective
 
Future opportunities for food tech product innovation from a research perspec...
Future opportunities for food tech product innovation from a research perspec...Future opportunities for food tech product innovation from a research perspec...
Future opportunities for food tech product innovation from a research perspec...
 
Twitter feed - Food Tech Innovation Workshop and Panel Discussion
Twitter feed  - Food Tech Innovation Workshop and Panel DiscussionTwitter feed  - Food Tech Innovation Workshop and Panel Discussion
Twitter feed - Food Tech Innovation Workshop and Panel Discussion
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group.

  • 1. Building Trust in a Tense Information Society MIT Startup Exchange – Cybersecurity Innovation Daniel J. Weitzner Director, Cybersecurity and Internet Policy Research Initiative Massachusetts Institute of Technology 28 May 2015 1
  • 2. Tensions in our Information Society reduce trust 1. Culture: Normalization of radical transparency vs trust gap 2. User experience: Increased individual control of personal data vs. opaque use 3. Political process: Major sector of economy/society poorly understood 2
  • 4. Privacy built on trust, not fine print No App Low Med. High * * * Participants based their decision on: • Familiarity (i.e. trust) with the app. • The type of app, in particular what kinds of information the app already has already access to. Frequency of use had no effect; No App Low Med. High No App Low Med. High No App Low Med. High No App Low Med. High * No App Low Med. High Privacy Tipping Points in Smartphones Privacy Preferences F Shih, I Liccardi, D Weitzner – Proceedings ACM CHI, 2015
  • 5. Normalization of Radical Transparency Assange Wall Street Journal ‘What they Know” Manning Snowden • Snowden is neither the first nor the last • The dramatic response of Silicon Valley • Trust will require pro- active transparency 51. Transparency without trust
  • 6. Trust Challenge Judge Reggie B. Walton, Chief Judge, Foreign Intelligence Surveillance Court “the court lacks the tools to independently verify how often the government’s surveillance breaks the court’s rules that aim to protect Americans’ privacy” • Washington Post, August 15, 2013 61. Transparency without trust
  • 7. Growing Individual Control 7 • Personal health data tied to individual • How will this shape privacy expectations? 2. Control vs opacity
  • 8. Opaque decision making with ‘big data’ 8
  • 9.
  • 10. New Privacy Priorities: Prevent Discrimination and Sustain Trust Discrimination: “The increasing use of algorithms to make eligibility decisions must be carefully monitored for potential discriminatory outcomes for disadvantaged groups, even absent discriminatory intent.“ 10
  • 11. Importance of Accountable Systems “Although the state of the art is still somewhat ad hoc, and auditing is often not automated, so‐called accountable systems are beginning to be deployed. The ability to detect violations of privacy policies, particularly if the auditing is automated and continuous, can be used both to deter privacy violations and to ensure that violators are punished. (pp. 42-43) 11
  • 12. A Goal by Analogy: Financial Accounting 12 . . . . . General Ledger Transactions Assets … … Liabilities … … Net Assets Owners Equity Financial Balance Sheet Accounting rules Public Trust
  • 13. Personal Information Accountability 13 . . . . . Personal Information Transactions Compliance • FCRA # • DAA # • FISA # • ECPA # Non-compliance • FCRA # • DAA # • FISA # • ECPA # Total Transactions Net Accountability Personal Information Balance Sheet Accountable Systems Reasoning Public Trust
  • 14. Detailed Explanation “[Recipient,] Fred Agenti, is a member of a Criminal Justice Agency…” “Inquiry is about Robert B. Guy and is based on a personally identifying characteristic…” 14Accountable Systems
  • 17. Stop Online Piracy Act: Grass Roots View 17
  • 18. Stop Online Piracy Act: Engineer’s View • “If enacted, either of these bills will create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. Regardless of recent amendments to SOPA, both bills will risk fragmenting the Internet's global domain name system (DNS) and have other capricious technical consequences. In exchange for this, such legislation would engender censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties' right and ability to communicate and express themselves online.” • https://www.eff.org/deeplinks/2011/12/internet-inventors-warn- against-sopa-and-pipa 18
  • 19. MIT Cybersecurity and Internet Policy Research Initiative 19 Social Science •Nazli Choucri, Political Science •Peter Diamond, Economics •Michael Fischer, Anthropology and Science , Tecnology & Society •Kenneth Oye, Political Science •Sherry Turkle, Sociology and Science , Technology & Society Engineering • Hal Abelson, EECS • Tim Berners-Lee, CSAIL • David Clark, CSAIL • Munther Dahleh, Institute On Complex & Socio-Tech. Systems • Shafi Goldwasser, EECS • Frans Kaashoek, EECS • Nancy Leveson, Aeronautics & Astronautics • Silvio Micali, EECS • Ron Rivest, EECS • Daniela Rus, CSAIL • Howie Shrobe, CSAIL • Gerry Sussman, EECS • Daniel Weitzner, CSAIL Management • Andrew Lo, Sloan • Stu Madnick, Sloan

Editor's Notes

  1. How does trust gap effect commerce?
  2. Discuss tensions in our information society and how it shapes our research agenda
  3. Why does trust matter?
  4. Month long intensive study of smart phone users: How does context change amount of information shared? Major factor - Trusted app/collector: More info shared Use beneficial to individual: more shared But, More detail about purpose: less sharing Therefore – building broad trust in operation of systems is necessary
  5. Second tension – users experience and come to expect more control, ie personal health apps
  6. But large scale analytics tend to undermine trust because of their opacity Consider traditional credit scoring and new alternative ML-driven scoring from companies like Zest
  7. WH Big Data Privacy recognized risk of discrimination and need to build trust
  8. Accountable systems as a trust-building mechanism
  9. This is our ultimate goal: Predictable and reliable application of public rules to privacy data (red) producing a summary representation of any given financial entity (green) This is the basis for trillions of economic activity around the world – we should be aspire to this.
  10. Trust requires understanding of how systems function – just like accountable systems Fear that SOPA would ‘break the Internet’
  11. Very distinguished group of engineers express concern about destabilizing the DNS – but no data no abstract model of the DNS infrastructure from which to predict impact of law Opinion based on intuition – may well have been right, but it felt awkward.