SlideShare a Scribd company logo
1 of 56
個資(Personal data)與巨資
(Big Data)的Privacy新挑戰
                   who cares?
  - 從手機感測資訊之應用談起

        史馥銘

                            1
Outline
•   From Personal Data to Big Data
•   Demystify Privacy ?
•   Privacy issues around smartphone sensing
•   UX for privacy: data and context
•   Privacy rethink




                                               2
你的資料 ≈你




CACM, May 2010
                 3
Big Data Analysis
的Privacy故事




                    4
What will you buy next?
                          5
What is your risk of getting x?
                              6
Why should we care?
• Healthy ecosystem for mobile apps, personal data
  and third parties




                                                     7
Most personal device with rich data




                                  8
Companies are making inferences
 from that personal information




                                  9
Companies are making inferences
 from that personal information




                                  10
Companies are making inferences
 from that personal information




                                  11
Companies are making inferences
 from that personal information




                                  12
Companies are making inferences
 from that personal information




                                  13
So What Happened in that Scenario?
• Inferences made from both data instances
  and pattern
• Inferences might be incorrect
• Data used for one purpose might also be used
  for another purpose
• Inferences might be harmful



                                             14
Inappropriate Data Use


Less trust
Less useful data
Less monetization
                         15
Challenges
• What if my data in Big Data is incomplete?
• Do I have control to what parts of their data
  get involved in any Big Data analysis?
• What could be the harms?
  – social groups
  – insurance
  – work


                                                  16
Privacy is complicated




                         17
Privacy is not security




                          18
Privacy is not anonymity




                           19
Privacy is not access control list




                                     20
問題一

請問美國政府哪一個單位
管Privacy ?

FTC (Fair Trade Commission)
公平交易委員會
Why?
                              21
Privacy 討論的三大支柱
• Inform and consent
• Self-determination (access control)
• Personal identifiable information
  – regulation
  – de-identification




                                        22
Inform and consent




還記得你哪一次
點過 Cancel嗎?

                 23
該 Inform 使用者什麼?




                  24
First Step to Improve Privacy on
            Smartphone


• Transparency
  – What kinds of data are collected by the apps?
  – Where are they sent to?
  – How will the data be used?




                                                    25
研究議題1: 恢復使用者知的權利
AppWindow



你知道你的APP如何
讀取你的個資嗎?


               26
先聽結論


Users feel that
the apps are intrusive
when the apps
do not respect data
usage contexts
               啥?
Usage Context
• 用我的Data OK, 但是(我以為)只能在…
• User 心中都有一個*我以為Data這樣用*
• Boundary management
 – Google +
 – LinkedIn
 – Facebook




                              28
Big Failure of Google Buzz


通訊錄不等於好友!
因為data context 不同


                             29
Loss & Collapse of Contexts
Loss & Collapse of Context
                              reasoning

                 B             IF (B ^ C) THEN ..
  A
                     school

      drinking
                      C
Story about my Google Map
Google map collects data when the phone is off
 Moving: sampling rate goes up
出乎意料?
• Why apps are reading my location when the
  phone is off?
AppWindow Architecture
Generate Privacy Fingerprint
Privacy Fingerprint (Angrybird)
E.g. Privacy-impacting Behavior




       Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications, Gokhan Bal, 2012
                                                                                               38
研究議題2: UX for Privacy
• 三大支柱之一 :Self-determination (control)
• Do we feel some places are more private then
  others?
• Privacy in public place?
• Not dichotomy but involves various factors
• Depends on situations
Research problems
• How do we design fine-grained control for
  people to disclose their data to applications?




                                                   40
Research problems
• Could we give more fine-grained control for
  people to disclose their data to applications?
• How do people create a policy?
  – what are the factors that affect their decisions?




                                                        41
Research problems
• Could we give more fine-grained control for
  people to disclose their data to applications?
• How do people create a policy?
  – what are the factors that affect their decisions?
• Control of what?
  – what should be the appropriate data abstractions
    for control?
  – e.g. Google circle, a better abstraction for sharing
    in social network?
                                                           42
Study Flow
       • Logs various types of sensors
       • Prompts the user with a notification



        1. annotations (location, situation, timestamp)
        2. sensor data (ambient sound, accelerometer, Bluetooth, GPS, Wi-Fi,
           gyroscope, cellular info..etc )

                   generate
                    survey

Databases



                                                                               43
Survey

3 different types of data consumers (apps)
(academic, local stores, online companies)
 are selected randomly for each question)




                                  Local store label
                                  is customized for
                                  each user




                                             44
Recall context then respond
• Without interrupting the user to think about
  *privacy* questions at the moment, we help
  the user to reconstruct his situation context
  later
                   So I was talking to
                   my colleagues this
                      morning in my
                  office, this app asked
                     for my location       Yes
                                           No
                    [*policy*] I don’t
                   want my locations
                  in work be disclosed
                       to any app
                                                  45
結論
• We found that context does affect people’s
  decisions for data disclosure
• People actually made non-reasonable decision
  when they are ignorant of the privacy
  implications
  – “I am willing to give my situation to Google
    because I figure that they might already know
    everything about me”


                                                    46
重新思考 今天的 Data 現況

Networked, inferred
and public by default


                        47
支配Privacy Practice的三大因素
• Norm (information flow + expectation of
  privacy)
• User trust
• Regulation




                                            48
Where are we heading?
• Big Data Analysis + 應用平台
  – 電子發票
  – Smart City
• 如果要把資料效益最大化,應該把 Privacy
  納入系統設計
  – security/anonymity*
  – user experience
  – access control
  – audit logs

                              49
Privacy-Aware Smartphone
• Embedded Privacy into OS level
• Privacy-impacting factors of smartphone
  sensing




                                            50
個資法
• 科技人請加入對話




              51
30 seconds takeaway
• Big Data is not necessary good data
• 隱私 (privacy) 其實不是一個好詞 for issues
  around personal data in Big Data
• Platform designer needs to think about usage
  of data, not applications
• Think context and data together whenever
  design UX for privacy


                                                 52
30 seconds takeaway
• Big Data is not necessary good data
• 隱私 (privacy) 其實不是一個好的形容詞 for
  issues around personal data in Big Data
• Platform designer needs to think about usage
  of data, not applications
• Think context and data together whenever
  design UX for privacy


                                                 53
30 seconds takeaway
• Big Data is not necessary good data
• 隱私 (privacy) 其實不是一個好詞 for issues
  around personal data in Big Data
• Platform designer needs to also think about
  usage of data and its impact on privacy, not
  just application features
• Think context and data together whenever
  design UX for privacy

                                                 54
30 seconds takeaway
• Big Data is not necessary good data
• 隱私 (privacy) 其實不是一個好詞 for issues
  around personal data in Big Data
• Platform designer needs to also think about
  usage of data and its impact on privacy, not
  just application features
• Think context and data together whenever
  design UX for privacy

                                                 55
Appendix




           56

More Related Content

What's hot

Big data and big content
Big data and big contentBig data and big content
Big data and big contentJohn Mancini
 
TDWI Inda BI on Cloud Future State Vision
TDWI Inda BI on Cloud Future State VisionTDWI Inda BI on Cloud Future State Vision
TDWI Inda BI on Cloud Future State Visiontdwiindia
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big dataDez Blanchfield
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Mark Heid
 
Unstructured data to structured meaning for nyu itp camp - 6-22-12 ms
Unstructured data to structured meaning for nyu itp camp - 6-22-12 msUnstructured data to structured meaning for nyu itp camp - 6-22-12 ms
Unstructured data to structured meaning for nyu itp camp - 6-22-12 msMarshall Sponder
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHellmuth Broda
 
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...Cynthia Sharp
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data miningharithavijay94
 
Massive Data Analytics and the Cloud
Massive Data Analytics and the CloudMassive Data Analytics and the Cloud
Massive Data Analytics and the CloudBooz Allen Hamilton
 
Big data tech conclave 2013 brochure (2)
Big data tech conclave 2013 brochure (2)Big data tech conclave 2013 brochure (2)
Big data tech conclave 2013 brochure (2)Mohammed Wasim
 
Iotx futures research_futures_trends_2011
Iotx futures research_futures_trends_2011Iotx futures research_futures_trends_2011
Iotx futures research_futures_trends_2011Andy Hunter
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyClaudiu Popa
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and EthicsHPCC Systems
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 
Quantified Workplace: Redefining Future Workplace Experience
Quantified Workplace: Redefining Future Workplace ExperienceQuantified Workplace: Redefining Future Workplace Experience
Quantified Workplace: Redefining Future Workplace ExperienceFahim Kawsar
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of ThingsW. David Stephenson
 
Osimo crossover md
Osimo crossover mdOsimo crossover md
Osimo crossover mdosimod
 

What's hot (20)

Big data and big content
Big data and big contentBig data and big content
Big data and big content
 
TDWI Inda BI on Cloud Future State Vision
TDWI Inda BI on Cloud Future State VisionTDWI Inda BI on Cloud Future State Vision
TDWI Inda BI on Cloud Future State Vision
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big data
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
 
Unstructured data to structured meaning for nyu itp camp - 6-22-12 ms
Unstructured data to structured meaning for nyu itp camp - 6-22-12 msUnstructured data to structured meaning for nyu itp camp - 6-22-12 ms
Unstructured data to structured meaning for nyu itp camp - 6-22-12 ms
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
 
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
Massive Data Analytics and the Cloud
Massive Data Analytics and the CloudMassive Data Analytics and the Cloud
Massive Data Analytics and the Cloud
 
IBM Stream au Hadoop User Group
IBM Stream au Hadoop User GroupIBM Stream au Hadoop User Group
IBM Stream au Hadoop User Group
 
Big data tech conclave 2013 brochure (2)
Big data tech conclave 2013 brochure (2)Big data tech conclave 2013 brochure (2)
Big data tech conclave 2013 brochure (2)
 
Iotx futures research_futures_trends_2011
Iotx futures research_futures_trends_2011Iotx futures research_futures_trends_2011
Iotx futures research_futures_trends_2011
 
The REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on PrivacyThe REAL Impact of Big Data on Privacy
The REAL Impact of Big Data on Privacy
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 
Quantified Workplace: Redefining Future Workplace Experience
Quantified Workplace: Redefining Future Workplace ExperienceQuantified Workplace: Redefining Future Workplace Experience
Quantified Workplace: Redefining Future Workplace Experience
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
 
Osimo crossover md
Osimo crossover mdOsimo crossover md
Osimo crossover md
 

Similar to Itri icl 0116_distribute

Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Michael Muller
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Data Infused Product Design and Insights at LinkedIn
Data Infused Product Design and Insights at LinkedInData Infused Product Design and Insights at LinkedIn
Data Infused Product Design and Insights at LinkedInYael Garten
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook EraJohn Mancini
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big DataMatti Vesala
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingRebecca Leitch
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 
A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making Ridi Fe
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outtheODI
 
Getting started in data science (4:3)
Getting started in data science (4:3)Getting started in data science (4:3)
Getting started in data science (4:3)Thinkful
 
Getting started in data science (4:3)
Getting started in data science (4:3)Getting started in data science (4:3)
Getting started in data science (4:3)Thinkful
 
How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...Kellyton Brito
 
Streamlining Nonprofit Organizations: It’s All About the Cloud
Streamlining Nonprofit Organizations: It’s All About the CloudStreamlining Nonprofit Organizations: It’s All About the Cloud
Streamlining Nonprofit Organizations: It’s All About the Cloud4Good.org
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...Lilian Edwards
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...Aggregage
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationShauna_Cox
 

Similar to Itri icl 0116_distribute (20)

Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Data Infused Product Design and Insights at LinkedIn
Data Infused Product Design and Insights at LinkedInData Infused Product Design and Insights at LinkedIn
Data Infused Product Design and Insights at LinkedIn
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big Data
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making
 
Business considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught outBusiness considerations for privacy and open data: how not to get caught out
Business considerations for privacy and open data: how not to get caught out
 
Getting started in data science (4:3)
Getting started in data science (4:3)Getting started in data science (4:3)
Getting started in data science (4:3)
 
Getting started in data science (4:3)
Getting started in data science (4:3)Getting started in data science (4:3)
Getting started in data science (4:3)
 
How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...How People Care about their Personal Datatheir Data Released onReleased on So...
How People Care about their Personal Datatheir Data Released onReleased on So...
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Streamlining Nonprofit Organizations: It’s All About the Cloud
Streamlining Nonprofit Organizations: It’s All About the CloudStreamlining Nonprofit Organizations: It’s All About the Cloud
Streamlining Nonprofit Organizations: It’s All About the Cloud
 
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
2004 05 intelligence processing seminar
2004 05 intelligence processing seminar2004 05 intelligence processing seminar
2004 05 intelligence processing seminar
 

Itri icl 0116_distribute

Editor's Notes

  1. Imagine a world where all information about you iscaptured! The places you go, the emails you send, the websites you visit, the people you talk to, the things you do, your tweets, your Facebook updates, your everything. This is the Holy Grail for many people in research. They believe that our lives can be improved by allowing a machine to help us by observing the signals we create. Using these signals, machines can predict the possible actions we will take, and automate the decision making process for us. Machines canmake inferences about you from the data collected about you, and these inferences can be useful in service automation. But these inferences can also be “misleading”. The canonical example is to take someone’s word “out-of-context” which leads to incorrect interpretation of the data. (words you speak).Interpret data in the wrong context raises issues of privacy, and we will talk more about privacy and context in the later slides. The main message of this talk is to ask: Is it possible to preserve the benefits of using personal data for automating decision making, while giving some amount of control to the user?
  2. 兩個小故事很多人對『你』很有興趣. 但是我們要來看這中間出了什麼問題?0. Facebook1. Target
  3. one year proposal. a. specify what will I accomplish (沒看見) b. 必須 convince people 我不是要做 situation detection (people 很 confused, people think I am doing situation awareness) b1. 給一個圖表,說明 situation/context-awareness is the input, and what’s the challenges then? c. research challenges: predictions could still have errors (點出如果, situation detection is perfect, what if there are errors?) c1. Usability problem c2. d. plan 如何解決問題2.
  4. Siri是目前最具代表性的AI程式之一, 一方面說來是AI演算法
  5. Here is an example of how companies (applications) are making inferences from that personal information. Bob drives to work everyday. He has an iPhone and an application called DriveSmart. Bob lets Drivesmart access his location so that the app will give him the best route every morning. So Bob is happy about that and he drives almost the same route everyday. Drivesmart has now updated to version 2.0, it reads Bob’s driving pattern, and provides some location-based service to recommend stores for breakfast while Bob is on his way to the office.Bob chooses fast food restaurant M, and uses an e-coupon to buy a cup of coffee everyday. Later the week, he gets an email from MASS RMV, entitled “Drive safely, do not eat while driving”. Later he gets another email, from “Eat-healthy-america.org”, saying “Be healthy, Don’t eat fast food for breakfast.”
  6. Here is an example of how companies (applications) are making inferences from that personal information. Bob drives to work everyday. He has an iPhone and an application called DriveSmart. Bob lets Drivesmart access his location so that the app will give him the best route every morning. So Bob is happy about that and he drives almost the same route everyday. Drivesmart has now updated to version 2.0, it reads Bob’s driving pattern, and provides some location-based service to recommend stores for breakfast while Bob is on his way to the office.Bob chooses fast food restaurant M, and uses an e-coupon to buy a cup of coffee everyday. Later the week, he gets an email from MASS RMV, entitled “Drive safely, do not eat while driving”. Later he gets another email, from “Eat-healthy-america.org”, saying “Be healthy, Don’t eat fast food for breakfast.”
  7. * We see that Drive smart can calculate a route for Bob giving his current condition and the destination. We also see that the location based service is using Bob’s location pattern to recommend fast food stores on his way to work.** Inferences made about you can be inaccurate, for example, Eat-healthy-america.org made inferences that Bob eats fastfood while drives to work. But in fact, he only gets a cup of coffee from M everyday. ** Data used for one purpose might also be used for another purposeBob’s data is collected by DriveSmart for routing purpose, and later is used for service recommendation and used by RMV****is collected by DriveSmart for routing purpose, and later is used for service recommendation and used by RMV
  8. boundarysecurityhide secrecyhttps://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcT6R_vuW6B90kTmcoOtuF2QpMpTlaKUOap1P2w8sOfDmzgxOpFW
  9. 請問…..那Facebook有 privacy issues 嗎? yes, but why ?
  10. Inform and consentRequire not only the available information to make decision but also having the actual literacy with which to make that decision. What it means about being informed about what’s happening in the algorithm of Big Data? What it means to make about consent: the challenge of agency (knowledge + control Self-determination (access control) Personal Identifiable information
  11. Pew survey: 54% of people uninstalltheir app because of privacy issues
  12. 今天雖然我們可以收集很多的資訊,但是有一些資料還不完整,或沒有收集
  13. 前一項我是外行
  14. 我現在看到的只有商人, 記者, 律師, 這三種人
  15. 第一個item需要去找danahboyd的演講
  16. 第一個item需要去找danahboyd的演講
  17. 第一個item需要去找danahboyd的演講
  18. 第一個item需要去找danahboyd的演講privacy is not a good term for describing issues around personal data in big data, then people will ask what are the good terms?