SlideShare a Scribd company logo
BlogTalk Asia 2009
Jeju, South Korea



                                 Jean-Henry Morin
                       University of Geneva – CUI
                      Dept. of Information Systems

                      Jean-Henry.Morin@unige.ch
                            http://jean-henry.com/
 BlogTalk Asia, Sept 2009
Outline

        •  Introduction and Context

        •  Motivation and Problem Statement

        •  Two Important Problems

        •  Proposition for Managed Personal Information

        •  Design Overview

        •  Conclusion and Discussion
                                                          2
J.-H. Morin
Introduction and Context

        •  Social Networks and Services




                                          3
J.-H. Morin
Introduction and Context

        •  Personal Information

              •  Different from Personally Identifying Information
               (PII)
                 •  Subject to legal frameworks in most countries

              •  Increasingly shared on social networks
                 •  Blurring boundaries between private and public life


      Legitimate concern (i.e., rights) over our
      information in terms of lifetime, usage
      purposes, access, etc.
                                                                          4
J.-H. Morin
Problems and Issues

        •  Publish / share once, publish / share
              forever
              • Indexing and searching

        •  Who “owns” and manages YOUR
              information (SLAs) ? Raging debates.
              • Who’s information is it ?
              • Do you retain control ?

        •  Semantic searching capabilities

                                                     5
J.-H. Morin
The Right to Forget

        •  Right to Forget : fundamental
              human right threatened by the digital
              nature of information (i.e., searchable)

        •  Traditional Media (i.e., non digital)
              “Memory” erodes over time
               • Labor and cost intensive

        •  Digital Media, requires explicit human
              intervention to “make forget” information
              (Rouvroy, 2007)

                                                          6
J.-H. Morin
Anonymity and Privacy

        •  Anonymity and Privacy are fundamental
              to social networking
              • It’s not a “bug”, it’s a feature !
              • It’s not schizophrenia !
                 •  Multiple legitimate personas (e.g., work, family,
                   communities, etc.)
              • How do we deal with it in a socially-
                responsible and ethically sustainable way ?
                 •  Cyber bullying (e.g., Akple in Korea)


        Requires traceability and accountability of
         information (i.e., managed information)
                                                                        7
J.-H. Morin
Key Question

        •  Is Privacy and personal information
              threatened by current social
              networking services ?

        •  We contend there is a need for
              Managed Personal Information
              • Socially-responsible and sustainable

 How can we retain an acceptable (by all) level of
   control over our personal information ?


                                                       8
J.-H. Morin
Proposition

        •  Personal Information should be
              augmented with a layer accounting for
              its management
        •  Alongside other metadata increasingly
              used in addressing the semantic
              dimension of our electronic services




                                                      9
J.-H. Morin
Moving forward:
                                  Design Overview

        •  DRM
              • Highly controversial but a necessary evil
               likely to stay

        •  Exception Management
              • An accountable approach to deal with the
                lack of flexibility of DRM
              • A socially-responsible (yet economically
                viable) alternative to the deceptive
                approaches of current DRM systems


                                                            10
J.-H. Morin
Digital Rights Management
                                             (DRM)
 •    What is DRM ?
        •     Technology allowing to cryptographically associate usage rules
              to digital content
        •     Rules govern the usage of content
        •     Content is persistently protected wherever it resides
 •    Examples :
        •     Recipients of an email cannot FORWARD, PRINT, COPY the
              email
        •     A document EXPIRES on September 16, 2009 and can only be
              accessed, in READ ONLY, by BlogTalk and Lift Asia attendees
        •     CEO delegates to CCO the right to also manage policies
              provided an audit trace is logged, etc.
 •    Where is it used ?
        •     Initially fueled by the Media & Entertainment
        •     Since 2003 : Enterprise sector fueled by corporate scandals
              (Enron, etc.), compliance issues, regulatory frameworks, etc.
        •     Software and gaming industries
                                                                              11
J.-H. Morin
Rethinking & Redesigning DRM:
                       Exception Management
•  Acknowledge the Central role of the User and User
   Experience
    •  Reinstate Users in their roles & rights
    •  Presumption of innocence & the burden of proof


•  Fundamental guiding principle : Feltens’ “Copyright
   Balance” principle (Felten, 2005)
         “Since lawful use, including fair use, of copyrighted works is in the
          public interest, a user wishing to make lawful use of copyrighted
            material should not be prevented from doing so by any DRM
                                                                    system.”




                                                                           12
 J.-H. Morin
Rethinking & Redesigning DRM
                                     (cont.)
•  Exception Management in DRM environments, mixing
   water with fire ?
    •  Reversing the distrust assumption puts the user “in
       charge”, facing his responsibilities
    •  Allow users to make Exception Claims, granting them
       Short Lived Licenses based on some form of logging and
       monitoring
    •  Use Credentials as tokens for logging to detect and
       monitor abuses
    •  Credential are Revocable in order to deal with abuse and
       misuse situations
    •  Mutually acknowledged need for managed content while
       allowing all actors a smooth usability experience

                                                              13
J.-H. Morin
Putting the pieces together

        •  Augmenting information with usage
              rights appears to be a promising path
              towards :
              • Socially-Responsible management of
                personal information in social networks
                and services
        •  Enabling Exception Management may
              offer the much needed flexibility
              lacking in traditional rights
              management environments
        •  Much work remains to be done

                                                          14
J.-H. Morin
Conclusion

        •  Call for Action ! We need to innovate

        •  Co-creation of value:
               • Requires a transdisciplinary approach
                 (law, business, sociology, ethics,
                 engineering, design, etc.)
               • Involving all the stakeholders

        •  Engineering is “easy”, getting it “right” in a
              mutual socially responsible way is hard but a
              great societal challenge

                                                              15
J.-H. Morin
Questions - Discussion




                Thank you


                                       Jean-Henry Morin
                             University of Geneva – CUI
                            Dept. of Information Systems

                            Jean-Henry.Morin@unige.ch
                                  http://jean-henry.com/
                                                           16
J.-H. Morin

More Related Content

What's hot

Socializing Big Data: Collaborative Opportunities in Computer Science, the So...
Socializing Big Data: Collaborative Opportunities in Computer Science, the So...Socializing Big Data: Collaborative Opportunities in Computer Science, the So...
Socializing Big Data: Collaborative Opportunities in Computer Science, the So...
Sheryl Grant
 

What's hot (19)

B.Ed class-1
B.Ed class-1B.Ed class-1
B.Ed class-1
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)
 
Social media attack on privacy and peace of an Individual
Social media attack on privacy and peace of an IndividualSocial media attack on privacy and peace of an Individual
Social media attack on privacy and peace of an Individual
 
Convergent Technology - Basics
Convergent Technology - BasicsConvergent Technology - Basics
Convergent Technology - Basics
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
XR Ethics: Invitation to Participate in IEEE's Global Initiative on Ethics of...
XR Ethics: Invitation to Participate in IEEE's Global Initiative on Ethics of...XR Ethics: Invitation to Participate in IEEE's Global Initiative on Ethics of...
XR Ethics: Invitation to Participate in IEEE's Global Initiative on Ethics of...
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Socializing Big Data: Collaborative Opportunities in Computer Science, the So...
Socializing Big Data: Collaborative Opportunities in Computer Science, the So...Socializing Big Data: Collaborative Opportunities in Computer Science, the So...
Socializing Big Data: Collaborative Opportunities in Computer Science, the So...
 
E commerce
E commerce E commerce
E commerce
 
Societal Impact of Information Technology
Societal Impact of Information TechnologySocietal Impact of Information Technology
Societal Impact of Information Technology
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 
Civilization and its disconnects
Civilization and its disconnectsCivilization and its disconnects
Civilization and its disconnects
 
MKT231 Week 4
MKT231 Week 4MKT231 Week 4
MKT231 Week 4
 
Linkedinjune2011
Linkedinjune2011Linkedinjune2011
Linkedinjune2011
 
Strategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital businessStrategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital business
 
A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...
 
Internal social media: risks and added value
Internal social media: risks and added valueInternal social media: risks and added value
Internal social media: risks and added value
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
Defining the IT artefact in social media for eParticipation: An Ensemble view
Defining the IT artefact in social media for eParticipation: An Ensemble viewDefining the IT artefact in social media for eParticipation: An Ensemble view
Defining the IT artefact in social media for eParticipation: An Ensemble view
 

Similar to Towards Socially-Responsible Management of Personal Information in Social Networks

Itri icl 0116_distribute
Itri icl 0116_distributeItri icl 0116_distribute
Itri icl 0116_distribute
Fuming Shih
 
19032013 Jacques Bus user controlled personal data management
19032013 Jacques Bus  user controlled personal data management 19032013 Jacques Bus  user controlled personal data management
19032013 Jacques Bus user controlled personal data management
Stichting ePortfolio Support
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
kmtj1979
 
Records and information management presentation 2012
Records and information management presentation 2012Records and information management presentation 2012
Records and information management presentation 2012
LRNcorporation
 

Similar to Towards Socially-Responsible Management of Personal Information in Social Networks (20)

Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)
 
Itri icl 0116_distribute
Itri icl 0116_distributeItri icl 0116_distribute
Itri icl 0116_distribute
 
Social Software in the Enterprise: Key Debates
Social Software in the Enterprise: Key DebatesSocial Software in the Enterprise: Key Debates
Social Software in the Enterprise: Key Debates
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Social Media in Texas Government
Social Media in Texas GovernmentSocial Media in Texas Government
Social Media in Texas Government
 
idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimidigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarim
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
 
Developing Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging TechnologiesDeveloping Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging Technologies
 
19032013 Jacques Bus user controlled personal data management
19032013 Jacques Bus  user controlled personal data management 19032013 Jacques Bus  user controlled personal data management
19032013 Jacques Bus user controlled personal data management
 
Developing Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging TechnologiesDeveloping Staff Competencies in Emerging Technologies
Developing Staff Competencies in Emerging Technologies
 
Selling Accessibility
Selling AccessibilitySelling Accessibility
Selling Accessibility
 
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
Socially-Aware Informal Learning Support:Potential and Challenges of the So...Socially-Aware Informal Learning Support:Potential and Challenges of the So...
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
Records and information management presentation 2012
Records and information management presentation 2012Records and information management presentation 2012
Records and information management presentation 2012
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysis
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Acquiring Talent Through Digital Media
Acquiring Talent Through Digital MediaAcquiring Talent Through Digital Media
Acquiring Talent Through Digital Media
 

More from University of Geneva

DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
University of Geneva
 

More from University of Geneva (20)

Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
 
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
 
La Transition Numérique
La Transition NumériqueLa Transition Numérique
La Transition Numérique
 
Swiss Data Protection Day 2016
Swiss Data Protection Day 2016Swiss Data Protection Day 2016
Swiss Data Protection Day 2016
 
Privacy by Design et Privacy by Default : Le point de vue de l'informaticien
Privacy by Design et Privacy by Default : Le point de vue de l'informaticienPrivacy by Design et Privacy by Default : Le point de vue de l'informaticien
Privacy by Design et Privacy by Default : Le point de vue de l'informaticien
 
Swiss digital Agenda debate @Lift15
Swiss digital Agenda debate @Lift15 Swiss digital Agenda debate @Lift15
Swiss digital Agenda debate @Lift15
 
La confiance à l’ère du numérique
La confiance à l’ère du numériqueLa confiance à l’ère du numérique
La confiance à l’ère du numérique
 
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
 
Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society  Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society
 
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
 
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting DemocracyLift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
 
Talk Prix 2013 du PPDT Genève
Talk Prix 2013 du PPDT GenèveTalk Prix 2013 du PPDT Genève
Talk Prix 2013 du PPDT Genève
 
ThinkData @ NIA, Korea, 2012
ThinkData @ NIA, Korea, 2012ThinkData @ NIA, Korea, 2012
ThinkData @ NIA, Korea, 2012
 
Iff jam-2012-slides
Iff jam-2012-slidesIff jam-2012-slides
Iff jam-2012-slides
 
Keynote 5th Swiss Data Protection day, 2012
Keynote 5th Swiss Data Protection day, 2012Keynote 5th Swiss Data Protection day, 2012
Keynote 5th Swiss Data Protection day, 2012
 
First20120426jhm
First20120426jhmFirst20120426jhm
First20120426jhm
 
Causerie ThinkData April 2012
Causerie ThinkData April 2012Causerie ThinkData April 2012
Causerie ThinkData April 2012
 
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
 
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
 
Ftc Drm Future Morin
Ftc Drm Future MorinFtc Drm Future Morin
Ftc Drm Future Morin
 

Recently uploaded

Monthly Economic Monitoring of Ukraine No. 232, May 2024
Monthly Economic Monitoring of Ukraine No. 232, May 2024Monthly Economic Monitoring of Ukraine No. 232, May 2024
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
Introduction to Economics II Chapter 28 Unemployment (1).pdf
Introduction to Economics II Chapter 28 Unemployment (1).pdfIntroduction to Economics II Chapter 28 Unemployment (1).pdf
Introduction to Economics II Chapter 28 Unemployment (1).pdf
Safa444074
 

Recently uploaded (20)

9th issue of our inhouse magazine Ingenious May 2024.pdf
9th issue of our inhouse magazine Ingenious May 2024.pdf9th issue of our inhouse magazine Ingenious May 2024.pdf
9th issue of our inhouse magazine Ingenious May 2024.pdf
 
How can I sell my pi coins in Indonesia?
How can I  sell my pi coins in Indonesia?How can I  sell my pi coins in Indonesia?
How can I sell my pi coins in Indonesia?
 
how to sell pi coins on Binance exchange
how to sell pi coins on Binance exchangehow to sell pi coins on Binance exchange
how to sell pi coins on Binance exchange
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 
Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1Economics and Economic reasoning Chap. 1
Economics and Economic reasoning Chap. 1
 
what is a pi whale and how to access one.
what is a pi whale and how to access one.what is a pi whale and how to access one.
what is a pi whale and how to access one.
 
Monthly Economic Monitoring of Ukraine No. 232, May 2024
Monthly Economic Monitoring of Ukraine No. 232, May 2024Monthly Economic Monitoring of Ukraine No. 232, May 2024
Monthly Economic Monitoring of Ukraine No. 232, May 2024
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
 
Summary of financial results for 1Q2024
Summary of financial  results for 1Q2024Summary of financial  results for 1Q2024
Summary of financial results for 1Q2024
 
Proposer Builder Separation Problem in Ethereum
Proposer Builder Separation Problem in EthereumProposer Builder Separation Problem in Ethereum
Proposer Builder Separation Problem in Ethereum
 
how can I sell my locked pi coins safety.
how can I sell my locked pi coins safety.how can I sell my locked pi coins safety.
how can I sell my locked pi coins safety.
 
Jio Financial service Multibagger 2024 from India stock Market
Jio Financial service  Multibagger 2024 from India stock MarketJio Financial service  Multibagger 2024 from India stock Market
Jio Financial service Multibagger 2024 from India stock Market
 
Introduction to Indian Financial System ()
Introduction to Indian Financial System ()Introduction to Indian Financial System ()
Introduction to Indian Financial System ()
 
Juspay Case study(Doubling Revenue Juspay's Success).pptx
Juspay Case study(Doubling Revenue Juspay's Success).pptxJuspay Case study(Doubling Revenue Juspay's Success).pptx
Juspay Case study(Doubling Revenue Juspay's Success).pptx
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
how to sell pi coins in Canada, Uk and Australia
how to sell pi coins in Canada, Uk and Australiahow to sell pi coins in Canada, Uk and Australia
how to sell pi coins in Canada, Uk and Australia
 
how can I transfer pi coins to someone in a different country.
how can I transfer pi coins to someone in a different country.how can I transfer pi coins to someone in a different country.
how can I transfer pi coins to someone in a different country.
 
Introduction to Economics II Chapter 28 Unemployment (1).pdf
Introduction to Economics II Chapter 28 Unemployment (1).pdfIntroduction to Economics II Chapter 28 Unemployment (1).pdf
Introduction to Economics II Chapter 28 Unemployment (1).pdf
 

Towards Socially-Responsible Management of Personal Information in Social Networks

  • 1. BlogTalk Asia 2009 Jeju, South Korea Jean-Henry Morin University of Geneva – CUI Dept. of Information Systems Jean-Henry.Morin@unige.ch http://jean-henry.com/ BlogTalk Asia, Sept 2009
  • 2. Outline •  Introduction and Context •  Motivation and Problem Statement •  Two Important Problems •  Proposition for Managed Personal Information •  Design Overview •  Conclusion and Discussion 2 J.-H. Morin
  • 3. Introduction and Context •  Social Networks and Services 3 J.-H. Morin
  • 4. Introduction and Context •  Personal Information •  Different from Personally Identifying Information (PII) •  Subject to legal frameworks in most countries •  Increasingly shared on social networks •  Blurring boundaries between private and public life Legitimate concern (i.e., rights) over our information in terms of lifetime, usage purposes, access, etc. 4 J.-H. Morin
  • 5. Problems and Issues •  Publish / share once, publish / share forever • Indexing and searching •  Who “owns” and manages YOUR information (SLAs) ? Raging debates. • Who’s information is it ? • Do you retain control ? •  Semantic searching capabilities 5 J.-H. Morin
  • 6. The Right to Forget •  Right to Forget : fundamental human right threatened by the digital nature of information (i.e., searchable) •  Traditional Media (i.e., non digital) “Memory” erodes over time • Labor and cost intensive •  Digital Media, requires explicit human intervention to “make forget” information (Rouvroy, 2007) 6 J.-H. Morin
  • 7. Anonymity and Privacy •  Anonymity and Privacy are fundamental to social networking • It’s not a “bug”, it’s a feature ! • It’s not schizophrenia ! •  Multiple legitimate personas (e.g., work, family, communities, etc.) • How do we deal with it in a socially- responsible and ethically sustainable way ? •  Cyber bullying (e.g., Akple in Korea) Requires traceability and accountability of information (i.e., managed information) 7 J.-H. Morin
  • 8. Key Question •  Is Privacy and personal information threatened by current social networking services ? •  We contend there is a need for Managed Personal Information • Socially-responsible and sustainable How can we retain an acceptable (by all) level of control over our personal information ? 8 J.-H. Morin
  • 9. Proposition •  Personal Information should be augmented with a layer accounting for its management •  Alongside other metadata increasingly used in addressing the semantic dimension of our electronic services 9 J.-H. Morin
  • 10. Moving forward: Design Overview •  DRM • Highly controversial but a necessary evil likely to stay •  Exception Management • An accountable approach to deal with the lack of flexibility of DRM • A socially-responsible (yet economically viable) alternative to the deceptive approaches of current DRM systems 10 J.-H. Morin
  • 11. Digital Rights Management (DRM) •  What is DRM ? •  Technology allowing to cryptographically associate usage rules to digital content •  Rules govern the usage of content •  Content is persistently protected wherever it resides •  Examples : •  Recipients of an email cannot FORWARD, PRINT, COPY the email •  A document EXPIRES on September 16, 2009 and can only be accessed, in READ ONLY, by BlogTalk and Lift Asia attendees •  CEO delegates to CCO the right to also manage policies provided an audit trace is logged, etc. •  Where is it used ? •  Initially fueled by the Media & Entertainment •  Since 2003 : Enterprise sector fueled by corporate scandals (Enron, etc.), compliance issues, regulatory frameworks, etc. •  Software and gaming industries 11 J.-H. Morin
  • 12. Rethinking & Redesigning DRM: Exception Management •  Acknowledge the Central role of the User and User Experience •  Reinstate Users in their roles & rights •  Presumption of innocence & the burden of proof •  Fundamental guiding principle : Feltens’ “Copyright Balance” principle (Felten, 2005) “Since lawful use, including fair use, of copyrighted works is in the public interest, a user wishing to make lawful use of copyrighted material should not be prevented from doing so by any DRM system.” 12 J.-H. Morin
  • 13. Rethinking & Redesigning DRM (cont.) •  Exception Management in DRM environments, mixing water with fire ? •  Reversing the distrust assumption puts the user “in charge”, facing his responsibilities •  Allow users to make Exception Claims, granting them Short Lived Licenses based on some form of logging and monitoring •  Use Credentials as tokens for logging to detect and monitor abuses •  Credential are Revocable in order to deal with abuse and misuse situations •  Mutually acknowledged need for managed content while allowing all actors a smooth usability experience 13 J.-H. Morin
  • 14. Putting the pieces together •  Augmenting information with usage rights appears to be a promising path towards : • Socially-Responsible management of personal information in social networks and services •  Enabling Exception Management may offer the much needed flexibility lacking in traditional rights management environments •  Much work remains to be done 14 J.-H. Morin
  • 15. Conclusion •  Call for Action ! We need to innovate •  Co-creation of value: • Requires a transdisciplinary approach (law, business, sociology, ethics, engineering, design, etc.) • Involving all the stakeholders •  Engineering is “easy”, getting it “right” in a mutual socially responsible way is hard but a great societal challenge 15 J.-H. Morin
  • 16. Questions - Discussion Thank you Jean-Henry Morin University of Geneva – CUI Dept. of Information Systems Jean-Henry.Morin@unige.ch http://jean-henry.com/ 16 J.-H. Morin

Editor's Notes

  1. 09/23/09
  2. 09/23/09
  3. 09/23/09
  4. 09/23/09
  5. 09/23/09
  6. 09/23/09
  7. 09/23/09
  8. 09/23/09
  9. 09/23/09
  10. 09/23/09
  11. 09/23/09
  12. 09/23/09