SlideShare a Scribd company logo
1 of 16
Download to read offline
Dr Ian Brown
a personal view
@1br0wn
Data science and privacy regulation
Overview
1. What is regulation?
⬜ Definitions
⬜ Science as a regulator
2. Privacy and consent - problems for the laissez-faire
conception of privacy regulation with “big data”
3. Designing for privacy - will the “data exhaust” be shut
off?
Lessig’s (1996) “Pathetic Dot”
modalities of Internet regulation
Brown and Marsden (2013) “Iceberg”
model of Internet regulation
Regulation is “The sustained and focused attempt to alter the behaviour of others
according to defined standards and purposes with the intention of producing a
broadly identified outcome or outcomes, which may involve mechanisms of
standard-setting, information-gathering and behaviour modification” (Black, 2002)
Do politics have (scientific) artefacts (or irreproducible results)?
“highly persuasive similes are at work: pious stories, seemingly reaped from research,
suggesting certain general theoretical insights. Variously adapted, they are handed
down: in the process, they acquire almost doctrinal unassailability.” (Joerges 1999)
Scientists, and scientific communities, have norms, values,
processes too - paradigms and prejudices (Kuhn and followers -
see Chalmers (2013))
Hence, the need for responsible research and innovation
Science as a regulator
Overview
1. What is regulation?
2. Privacy and consent - problems for the laissez-faire
conception of privacy regulation with “big data”
⬜ Market failures
⬜ Insider threats
⬜ The Digital Panopticon
3. Designing for privacy - will the “data exhaust” be shut
off?
Market failures
Information asymmetry – data gathered ubiquitously and invisibly
in a way few understand
Privacy policies unreadable and difficult to verify/enforce
Most individuals bad at immediate benefit v deferred, uncertain
cost decisions
Privacy risks are highly probabilistic, cumulative, and difficult to calculate
Information industries highly concentrated (DG Competition and
FTC investigations)
Brown (2014)
Insider threats
Information required Price paid to ‘blagger’ Price charged
Occupant search not known £17.50
Telephone reverse trace £40 £75
Friends and Family £60 – £80 not known
Vehicle check at DVLA £70 £150 – £200
Criminal records check not known £500
Locating a named person not known £60
Ex-directory search £40 £65 – £75
Mobile phone account not known £750
Licence check not known £250
“What price privacy?”, Information Commissioner’s Office (2006)
Overview
1. What is regulation?
2. Privacy and consent - problems for the
laissez-faire/”buyer beware” conception of privacy
regulation with “big data”
3. Designing for privacy - will the “data exhaust” be shut
off?
Designing for privacy
Data minimisation key: is your personal data
really necessary? Limit & decentralise personal
data collection, storage, access and usage –
enforced using cryptography
Protects against hackers, corrupt insiders, and
function creep
Users should also be notified and consent to
the processing of data – easy-to-use interfaces
are critical. What are defaults? Jedrzejczyk et al. (2010)
EU data ‘exhaust’ concerns
Source: European Commission (2016) Flash Eurobarometer #443 Data Protection in the EU, p.30
Euro constitutional protections
ECHR, 1950
Reaffirming their profound belief in those
fundamental freedoms which are the foundation
of justice and peace in the world…
§8 Everyone has the right to respect for his private
and family life, his home and his correspondence
§9 Everyone has the right to freedom of thought,
conscience and religion
§10 Everyone has the right to freedom of
expression
§11 Everyone has the right to freedom of peaceful
assembly and to freedom of association with
others
EU Charter of Fundamental Rights, 2012
The peoples of Europe, in creating an ever closer
union among them, are resolved to share a
peaceful future based on common values…
§7 Everyone has the right to respect for his or her
private and family life, home and
communications.
§8 1. Everyone has the right to the protection of
personal data concerning him or her.
2. Such data must be processed fairly for
specified purposes and on the basis of the consent
of the person concerned or some other legitimate
basis laid down by law. Everyone has the right of
access to data which has been collected
concerning him or her, and the right to have it
rectified...
Bulk vs. targeted surveillance
President Obama’s NSA Review Panel :
"Although we might be safer if the government had ready access to a massive storehouse of
information about every detail of our lives, the impact of such a program on the quality of life and
on individual freedom would simply be too great… We recommend that the US Government should
examine the feasibility of creating software that would allow the National Security Agency and other
intelligence agencies more easily to conduct targeted information acquisition rather than bulk-data
collection.”
Deputy Prime Minister, 4 Mar 2014 :
“[O]ur current framework assumes that the collection of bulk data is uncontroversial as long as
arrangements for accessing it are suitably stringent. I don’t accept that... [S]trong access controls
are vital to prevent employees from going on ‘fishing expeditions’ once a store of data exists. But the
case for collection itself has to be made, not assumed.”
GDPR Art. 23 DP by design & default
1. …the controller… shall…implement appropriate and proportionate technical and organisational
measures and procedures in such a way that the processing will meet the requirements of this
Regulation and ensure the protection of the rights of the data subject… data protection by
design shall be a prerequisite for public procurement tenders… [and] procurement by entities
operating in the water, energy, transport and postal services sector
2. The controller shall ensure that, by default, only those personal data are processed which are
necessary for each specific purpose of the processing and are especially not collected,
retained or disseminated beyond the minimum necessary for those purposes, both in terms of
the amount of the data and the time of their storage. In particular, those mechanisms shall
ensure that by default personal data are not made accessible to an indefinite number of
individuals and that data subjects are able to control the distribution of their personal data.
See Korff & Brown (2010)
Conclusion
Technology developments can have a significant social impact – societies
can shape/regulate the values Internet technologies embed if they wish
(Brown, Clark & Trossen 2010) - data science equivalents?
There are very significant legal regulatory constraints in Europe on
collection, retention, and use of personal data - can’t be wished away
These are questions not just for computer scientists, but also lawyers,
economists, sociologists – and citizens and their representatives
References
J. Black (2002) Critical Reflections on Regulation.
Australian Journal of Legal Philosophy 27, p.26.
I. Brown (2014) The economics of privacy, data
protection and surveillance. In J.M. Bauer and M.
Latzer (eds.) Research Handbook on the
Economics of the Internet. Cheltenham: Edward
Elgar.
I. Brown, D. Clark and D. Trossen (2010) Should
Specific Values Be Embedded In The Internet
Architecture? Re-Architecting the Internet:
Proceedings of CO-NEXT 2010, New York, NY: ACM
Press.
I. Brown and C. Marsden (2013) Regulating Code:
Good Governance and Better Regulation in the
Information Age. Cambridge, MA: MIT Press.
A. Chalmers (2013) What is this thing called
science? 4th edition. McGraw-Hill Education.
L. Lessig (1996) The New Chicago School. The
Journal of Legal Studies 27(S2) pp.661–691.
L. Jedrzejczyk, B. A. Price, A. K. Bandara and B.
Nuseibeh (2010) On The Impact of Real-Time
Feedback on Users’ Behaviour in Mobile
Location-Sharing Applications, Symposium on
Usable Privacy and Security, Redmond.
D. Korff and I. Brown (2010) New Challenges to
Data Protection. European Commission DG
Freedom, Security and Justice.
A. McDonald and L.F. Cranor (2008) The Cost of
Reading Privacy Policies. I/S 4 p.543.
B. Joerges (1999) Do politics have artefacts? Social
Studies of Science 29(3) pp.411-431.

More Related Content

What's hot

The Roots: Linked data and the foundations of successful Agriculture Data
The Roots: Linked data and the foundations of successful Agriculture DataThe Roots: Linked data and the foundations of successful Agriculture Data
The Roots: Linked data and the foundations of successful Agriculture DataPaul Groth
 
Data Citation in The Dataverse Network
Data Citation in The Dataverse NetworkData Citation in The Dataverse Network
Data Citation in The Dataverse NetworkMicah Altman
 
Knowledge Graph Maintenance
Knowledge Graph MaintenanceKnowledge Graph Maintenance
Knowledge Graph MaintenancePaul Groth
 
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...William Gunn
 
The Research Object Initiative: Frameworks and Use Cases
The Research Object Initiative:Frameworks and Use CasesThe Research Object Initiative:Frameworks and Use Cases
The Research Object Initiative: Frameworks and Use CasesCarole Goble
 
A Data Biosphere for Biomedical Research
A Data Biosphere for Biomedical ResearchA Data Biosphere for Biomedical Research
A Data Biosphere for Biomedical ResearchRobert Grossman
 
Search, Discovery and Analysis of Sensory Data Streams
Search, Discovery and Analysis of Sensory Data StreamsSearch, Discovery and Analysis of Sensory Data Streams
Search, Discovery and Analysis of Sensory Data StreamsPayamBarnaghi
 
Internet Search: the past, present and the future
Internet Search: the past, present and the futureInternet Search: the past, present and the future
Internet Search: the past, present and the futurePayamBarnaghi
 
Crossing the Analytics Chasm and Getting the Models You Developed Deployed
Crossing the Analytics Chasm and Getting the Models You Developed DeployedCrossing the Analytics Chasm and Getting the Models You Developed Deployed
Crossing the Analytics Chasm and Getting the Models You Developed DeployedRobert Grossman
 
Some Frameworks for Improving Analytic Operations at Your Company
Some Frameworks for Improving Analytic Operations at Your CompanySome Frameworks for Improving Analytic Operations at Your Company
Some Frameworks for Improving Analytic Operations at Your CompanyRobert Grossman
 
Aaas Data Intensive Science And Grid
Aaas Data Intensive Science And GridAaas Data Intensive Science And Grid
Aaas Data Intensive Science And GridIan Foster
 
Citrination-MRS Fall Meeting 2015
Citrination-MRS Fall Meeting 2015Citrination-MRS Fall Meeting 2015
Citrination-MRS Fall Meeting 2015bmeredig
 
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...Amit Sheth
 
Evolution of e-Research
Evolution of e-ResearchEvolution of e-Research
Evolution of e-ResearchDavid De Roure
 
BIOMAG2018 - Denis Engemann - MNE-HCP
BIOMAG2018 - Denis Engemann - MNE-HCPBIOMAG2018 - Denis Engemann - MNE-HCP
BIOMAG2018 - Denis Engemann - MNE-HCPRobert Oostenveld
 
Open interoperability standards, tools and services at EMBL-EBI
Open interoperability standards, tools and services at EMBL-EBIOpen interoperability standards, tools and services at EMBL-EBI
Open interoperability standards, tools and services at EMBL-EBIPistoia Alliance
 
Knowledge Graph Semantics/Interoperability
Knowledge Graph Semantics/InteroperabilityKnowledge Graph Semantics/Interoperability
Knowledge Graph Semantics/InteroperabilityJames Hendler
 
SEEKing our way to better presentation of data and models from scientific inv...
SEEKing our way to better presentation of data and models from scientific inv...SEEKing our way to better presentation of data and models from scientific inv...
SEEKing our way to better presentation of data and models from scientific inv...Natalie Stanford
 
Tragedy of the (Data) Commons
Tragedy of the (Data) CommonsTragedy of the (Data) Commons
Tragedy of the (Data) CommonsJames Hendler
 
Towards open and reproducible neuroscience in the age of big data
Towards open and reproducible neuroscience in the age of big dataTowards open and reproducible neuroscience in the age of big data
Towards open and reproducible neuroscience in the age of big dataKrzysztof Gorgolewski
 

What's hot (20)

The Roots: Linked data and the foundations of successful Agriculture Data
The Roots: Linked data and the foundations of successful Agriculture DataThe Roots: Linked data and the foundations of successful Agriculture Data
The Roots: Linked data and the foundations of successful Agriculture Data
 
Data Citation in The Dataverse Network
Data Citation in The Dataverse NetworkData Citation in The Dataverse Network
Data Citation in The Dataverse Network
 
Knowledge Graph Maintenance
Knowledge Graph MaintenanceKnowledge Graph Maintenance
Knowledge Graph Maintenance
 
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
Sci Know Mine 2013: What can we learn from topic modeling on 350M academic do...
 
The Research Object Initiative: Frameworks and Use Cases
The Research Object Initiative:Frameworks and Use CasesThe Research Object Initiative:Frameworks and Use Cases
The Research Object Initiative: Frameworks and Use Cases
 
A Data Biosphere for Biomedical Research
A Data Biosphere for Biomedical ResearchA Data Biosphere for Biomedical Research
A Data Biosphere for Biomedical Research
 
Search, Discovery and Analysis of Sensory Data Streams
Search, Discovery and Analysis of Sensory Data StreamsSearch, Discovery and Analysis of Sensory Data Streams
Search, Discovery and Analysis of Sensory Data Streams
 
Internet Search: the past, present and the future
Internet Search: the past, present and the futureInternet Search: the past, present and the future
Internet Search: the past, present and the future
 
Crossing the Analytics Chasm and Getting the Models You Developed Deployed
Crossing the Analytics Chasm and Getting the Models You Developed DeployedCrossing the Analytics Chasm and Getting the Models You Developed Deployed
Crossing the Analytics Chasm and Getting the Models You Developed Deployed
 
Some Frameworks for Improving Analytic Operations at Your Company
Some Frameworks for Improving Analytic Operations at Your CompanySome Frameworks for Improving Analytic Operations at Your Company
Some Frameworks for Improving Analytic Operations at Your Company
 
Aaas Data Intensive Science And Grid
Aaas Data Intensive Science And GridAaas Data Intensive Science And Grid
Aaas Data Intensive Science And Grid
 
Citrination-MRS Fall Meeting 2015
Citrination-MRS Fall Meeting 2015Citrination-MRS Fall Meeting 2015
Citrination-MRS Fall Meeting 2015
 
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
Semantics for Bioinformatics: What, Why and How of Search, Integration and An...
 
Evolution of e-Research
Evolution of e-ResearchEvolution of e-Research
Evolution of e-Research
 
BIOMAG2018 - Denis Engemann - MNE-HCP
BIOMAG2018 - Denis Engemann - MNE-HCPBIOMAG2018 - Denis Engemann - MNE-HCP
BIOMAG2018 - Denis Engemann - MNE-HCP
 
Open interoperability standards, tools and services at EMBL-EBI
Open interoperability standards, tools and services at EMBL-EBIOpen interoperability standards, tools and services at EMBL-EBI
Open interoperability standards, tools and services at EMBL-EBI
 
Knowledge Graph Semantics/Interoperability
Knowledge Graph Semantics/InteroperabilityKnowledge Graph Semantics/Interoperability
Knowledge Graph Semantics/Interoperability
 
SEEKing our way to better presentation of data and models from scientific inv...
SEEKing our way to better presentation of data and models from scientific inv...SEEKing our way to better presentation of data and models from scientific inv...
SEEKing our way to better presentation of data and models from scientific inv...
 
Tragedy of the (Data) Commons
Tragedy of the (Data) CommonsTragedy of the (Data) Commons
Tragedy of the (Data) Commons
 
Towards open and reproducible neuroscience in the age of big data
Towards open and reproducible neuroscience in the age of big dataTowards open and reproducible neuroscience in the age of big data
Towards open and reproducible neuroscience in the age of big data
 

Similar to Data Science, Privacy Regulation, and Designing for Privacy

Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard
 
Reconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data ProtectionReconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data ProtectionDavid Erdos
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchMarlon Domingus
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obamaLilian Edwards
 
Ethics and data protection .docx
Ethics and data protection          .docxEthics and data protection          .docx
Ethics and data protection .docxelbanglis
 
Sovereignty: the state of data
Sovereignty: the state of dataSovereignty: the state of data
Sovereignty: the state of datadan hyde
 
Third Principle Of The Data Protection Act, 1998 (Uk)
Third Principle Of The Data Protection Act, 1998 (Uk)Third Principle Of The Data Protection Act, 1998 (Uk)
Third Principle Of The Data Protection Act, 1998 (Uk)Vishnu Kesarwani
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015ICT Watch
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataH. T. Besik
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)schermerbw
 
Updating the EU Data Protection Directive
Updating the EU Data Protection DirectiveUpdating the EU Data Protection Directive
Updating the EU Data Protection Directiveblogzilla
 
Right to be forgotten final paper
Right to be forgotten final paperRight to be forgotten final paper
Right to be forgotten final paperreporter1120
 
Legal and ethical considerations for sharing research data
Legal and ethical considerations for sharing research dataLegal and ethical considerations for sharing research data
Legal and ethical considerations for sharing research dataOpenAIRE
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalSofie van der Meulen
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Axon Lawyers
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxurvashipundir04
 

Similar to Data Science, Privacy Regulation, and Designing for Privacy (20)

Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
 
Reconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data ProtectionReconciling Humanities and Social Science Research With Data Protection
Reconciling Humanities and Social Science Research With Data Protection
 
An itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and researchAn itinerary for FAIR and privacy respecting data-driven innovation and research
An itinerary for FAIR and privacy respecting data-driven innovation and research
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
Ethics and data protection .docx
Ethics and data protection          .docxEthics and data protection          .docx
Ethics and data protection .docx
 
Sovereignty: the state of data
Sovereignty: the state of dataSovereignty: the state of data
Sovereignty: the state of data
 
Third Principle Of The Data Protection Act, 1998 (Uk)
Third Principle Of The Data Protection Act, 1998 (Uk)Third Principle Of The Data Protection Act, 1998 (Uk)
Third Principle Of The Data Protection Act, 1998 (Uk)
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
 
Privacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal DataPrivacy Impact Assessment Methodologies for Protection of Personal Data
Privacy Impact Assessment Methodologies for Protection of Personal Data
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)Introduction privacy and drones130902.pptx (alleen lezen)
Introduction privacy and drones130902.pptx (alleen lezen)
 
Updating the EU Data Protection Directive
Updating the EU Data Protection DirectiveUpdating the EU Data Protection Directive
Updating the EU Data Protection Directive
 
Right to be forgotten final paper
Right to be forgotten final paperRight to be forgotten final paper
Right to be forgotten final paper
 
Legal and ethical considerations for sharing research data
Legal and ethical considerations for sharing research dataLegal and ethical considerations for sharing research data
Legal and ethical considerations for sharing research data
 
PLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics finalPLA Legal aspects of Big Data analytics final
PLA Legal aspects of Big Data analytics final
 
Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics' Paperless Lab Academy 'legal aspects of big data analytics'
Paperless Lab Academy 'legal aspects of big data analytics'
 
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptxETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
ETHICAL ISSUES RELATED TO DATA COLLECTION.pptx
 

More from blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloudblogzilla
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 

More from blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 

Recently uploaded

STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayupadhyaymani499
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsHajira Mahmood
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationColumbia Weather Systems
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxBerniceCayabyab1
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)riyaescorts54
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 

Recently uploaded (20)

STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyay
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutions
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather Station
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 

Data Science, Privacy Regulation, and Designing for Privacy

  • 1. Dr Ian Brown a personal view @1br0wn Data science and privacy regulation
  • 2. Overview 1. What is regulation? ⬜ Definitions ⬜ Science as a regulator 2. Privacy and consent - problems for the laissez-faire conception of privacy regulation with “big data” 3. Designing for privacy - will the “data exhaust” be shut off?
  • 3. Lessig’s (1996) “Pathetic Dot” modalities of Internet regulation Brown and Marsden (2013) “Iceberg” model of Internet regulation Regulation is “The sustained and focused attempt to alter the behaviour of others according to defined standards and purposes with the intention of producing a broadly identified outcome or outcomes, which may involve mechanisms of standard-setting, information-gathering and behaviour modification” (Black, 2002)
  • 4. Do politics have (scientific) artefacts (or irreproducible results)? “highly persuasive similes are at work: pious stories, seemingly reaped from research, suggesting certain general theoretical insights. Variously adapted, they are handed down: in the process, they acquire almost doctrinal unassailability.” (Joerges 1999) Scientists, and scientific communities, have norms, values, processes too - paradigms and prejudices (Kuhn and followers - see Chalmers (2013)) Hence, the need for responsible research and innovation Science as a regulator
  • 5. Overview 1. What is regulation? 2. Privacy and consent - problems for the laissez-faire conception of privacy regulation with “big data” ⬜ Market failures ⬜ Insider threats ⬜ The Digital Panopticon 3. Designing for privacy - will the “data exhaust” be shut off?
  • 6. Market failures Information asymmetry – data gathered ubiquitously and invisibly in a way few understand Privacy policies unreadable and difficult to verify/enforce Most individuals bad at immediate benefit v deferred, uncertain cost decisions Privacy risks are highly probabilistic, cumulative, and difficult to calculate Information industries highly concentrated (DG Competition and FTC investigations) Brown (2014)
  • 7. Insider threats Information required Price paid to ‘blagger’ Price charged Occupant search not known £17.50 Telephone reverse trace £40 £75 Friends and Family £60 – £80 not known Vehicle check at DVLA £70 £150 – £200 Criminal records check not known £500 Locating a named person not known £60 Ex-directory search £40 £65 – £75 Mobile phone account not known £750 Licence check not known £250 “What price privacy?”, Information Commissioner’s Office (2006)
  • 8.
  • 9. Overview 1. What is regulation? 2. Privacy and consent - problems for the laissez-faire/”buyer beware” conception of privacy regulation with “big data” 3. Designing for privacy - will the “data exhaust” be shut off?
  • 10. Designing for privacy Data minimisation key: is your personal data really necessary? Limit & decentralise personal data collection, storage, access and usage – enforced using cryptography Protects against hackers, corrupt insiders, and function creep Users should also be notified and consent to the processing of data – easy-to-use interfaces are critical. What are defaults? Jedrzejczyk et al. (2010)
  • 11. EU data ‘exhaust’ concerns Source: European Commission (2016) Flash Eurobarometer #443 Data Protection in the EU, p.30
  • 12. Euro constitutional protections ECHR, 1950 Reaffirming their profound belief in those fundamental freedoms which are the foundation of justice and peace in the world… §8 Everyone has the right to respect for his private and family life, his home and his correspondence §9 Everyone has the right to freedom of thought, conscience and religion §10 Everyone has the right to freedom of expression §11 Everyone has the right to freedom of peaceful assembly and to freedom of association with others EU Charter of Fundamental Rights, 2012 The peoples of Europe, in creating an ever closer union among them, are resolved to share a peaceful future based on common values… §7 Everyone has the right to respect for his or her private and family life, home and communications. §8 1. Everyone has the right to the protection of personal data concerning him or her. 2. Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified...
  • 13. Bulk vs. targeted surveillance President Obama’s NSA Review Panel : "Although we might be safer if the government had ready access to a massive storehouse of information about every detail of our lives, the impact of such a program on the quality of life and on individual freedom would simply be too great… We recommend that the US Government should examine the feasibility of creating software that would allow the National Security Agency and other intelligence agencies more easily to conduct targeted information acquisition rather than bulk-data collection.” Deputy Prime Minister, 4 Mar 2014 : “[O]ur current framework assumes that the collection of bulk data is uncontroversial as long as arrangements for accessing it are suitably stringent. I don’t accept that... [S]trong access controls are vital to prevent employees from going on ‘fishing expeditions’ once a store of data exists. But the case for collection itself has to be made, not assumed.”
  • 14. GDPR Art. 23 DP by design & default 1. …the controller… shall…implement appropriate and proportionate technical and organisational measures and procedures in such a way that the processing will meet the requirements of this Regulation and ensure the protection of the rights of the data subject… data protection by design shall be a prerequisite for public procurement tenders… [and] procurement by entities operating in the water, energy, transport and postal services sector 2. The controller shall ensure that, by default, only those personal data are processed which are necessary for each specific purpose of the processing and are especially not collected, retained or disseminated beyond the minimum necessary for those purposes, both in terms of the amount of the data and the time of their storage. In particular, those mechanisms shall ensure that by default personal data are not made accessible to an indefinite number of individuals and that data subjects are able to control the distribution of their personal data. See Korff & Brown (2010)
  • 15. Conclusion Technology developments can have a significant social impact – societies can shape/regulate the values Internet technologies embed if they wish (Brown, Clark & Trossen 2010) - data science equivalents? There are very significant legal regulatory constraints in Europe on collection, retention, and use of personal data - can’t be wished away These are questions not just for computer scientists, but also lawyers, economists, sociologists – and citizens and their representatives
  • 16. References J. Black (2002) Critical Reflections on Regulation. Australian Journal of Legal Philosophy 27, p.26. I. Brown (2014) The economics of privacy, data protection and surveillance. In J.M. Bauer and M. Latzer (eds.) Research Handbook on the Economics of the Internet. Cheltenham: Edward Elgar. I. Brown, D. Clark and D. Trossen (2010) Should Specific Values Be Embedded In The Internet Architecture? Re-Architecting the Internet: Proceedings of CO-NEXT 2010, New York, NY: ACM Press. I. Brown and C. Marsden (2013) Regulating Code: Good Governance and Better Regulation in the Information Age. Cambridge, MA: MIT Press. A. Chalmers (2013) What is this thing called science? 4th edition. McGraw-Hill Education. L. Lessig (1996) The New Chicago School. The Journal of Legal Studies 27(S2) pp.661–691. L. Jedrzejczyk, B. A. Price, A. K. Bandara and B. Nuseibeh (2010) On The Impact of Real-Time Feedback on Users’ Behaviour in Mobile Location-Sharing Applications, Symposium on Usable Privacy and Security, Redmond. D. Korff and I. Brown (2010) New Challenges to Data Protection. European Commission DG Freedom, Security and Justice. A. McDonald and L.F. Cranor (2008) The Cost of Reading Privacy Policies. I/S 4 p.543. B. Joerges (1999) Do politics have artefacts? Social Studies of Science 29(3) pp.411-431.