Privacy Policy, Law and Technology History and Philosophy of Privacy

advertisement
Privacy Policy, Law and Technology
History and Philosophy of Privacy
August 31 and September 2, 2010
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
1
Avoiding Plagiarism
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
2
CMU Policy on Cheating and Plagiarism
CMU Policy*:
Plagiarism includes, but is not limited to, failure to
indicate the source with quotation marks or footnotes
where appropriate if any of the following are
reproduced in the work submitted by a student:
1.
2.
3.
4.
5.
A phrase, written or musical.
A graphic element.
A proof.
Specific language.
An idea derived from the work, published or unpublished, of
another person.
*http://www.cmu.edu/policies/documents/Cheating.html
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
3
This is serious
 Consequences of plagiarism in this class range from
zero credit for entire assignment to failing the course
to recommendation of university disciplinary action
 Publishers and professional societies have plagiarism
policies too
 The Internet makes it easy to plagiarize
– Students are frequently cutting and pasting off the
Internet without proper quotation and/or citations
– Students are buying papers off the Internet
 The Internet also makes it easy to catch plagiarism
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
4
Avoiding plagiarism
 If you use someone’s specific words, put them in
quotes and cite the source
 If you use someone’s ideas expressed in your own
words, cite the source
 If you paraphrase, summarize in your own words, but
still cite source
– Don’t use same sentence structure with a few word
substitutions
– If you use some of the source’s words, put them in quotes
 When in doubt, put it in quotes and cite the source!
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
5
Good resources on avoiding plagiarism
 See list on course website
athttp://cups.cs.cmu.edu/courses/privpolawt
ech-fa10/skills.html
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
6
Creating a Bibliography and Citing
Sources
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
7
Creating a bibliography and citing
sources
 Do you know how to create a properly
formatted bibliography?
 Why is a list of URLs not a proper
bibliography?
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
8
Citing sources
 Whenever you take words, images, or ideas from another source you need
to cite that source
– Direct quotes and paraphrases
– Images, photographs, tables, graphs
– Ideas, measurements, computations
 Also use citations as evidence to back up assertions
 If you use somebody else’s words, you must quote them
– Short excerpts appear in quotes
– Long excerpts (3 or more lines) are introduced and then appear as indented
text, often in a smaller font, single spaced
– If you leave out words in the middle use …
– If you leave out words at the end use ….
– If you substitute or add words, put them in square brackets []
– If you add italics say [emphasis added]
 Failure to cite sources = plagiarism
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
9
Paraphrasing
 Usually paraphrasing ideas is preferable to quoting unless
–
–
–
–
Exact wording is important
You are quoting famous words
You are critiquing or comparing specific words rather than ideas
The original words say what you want to say very well and
succinctly
 Usually paraphrasing lets you convey an idea more
succinctly because you can focus on the part of the idea
most relevant to your paper
 If you end up using some of the original words in your
paraphrase, use quotes around those words
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
10
Forms of citation
 Full bibliographic citation inline
– Typically used on a slide
 Footnote or endnote
– Used in legal writing, many books, some
conferences and journals
 Inline short citation with bibliography,
references cited section, or reference list
– Used by most technical conferences and journals,
some books, most dissertations
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
11
Citations in text
 Format depends on style you are using
– Usually a number or author and date, sometimes a page number
reference too
 Citation usually goes at the end of the sentence
– Privacy is not “absolute” (Westin 1967).
– Privacy is not “absolute” [3].
 If Author is mentioned, in sentence, name does not appear in
citation
– Westin (1967, p. 7) claims that individuals must balance a desire for
privacy with a desire to participate in society.
 Multiple citations can appear together
– [3, 4, 5]
– (Westin 1967; Cranor 2002)
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
12
Footnotes




Used heavily in legal writing
Usually used sparingly in technical writing
Each footnote appears only once
If you reference the same source multiple
times you must repeat the reference
information, however you can abbreviate it on
second and subsequent references and use
ibid to indicate same as previous reference
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
13
Creating a bibliography
 Similar rules apply to other forms of citation (footnotes, etc.)
 Pick an appropriate style and use it consistently throughout
your paper
– Most conferences and journals have style requirements
– Popular styles: Chicago/Turabian, MLA, APA, APSA, ACM, IEEE
 Complete bibliographic entry includes author, title, date,
publisher, place of publication, pages, volume number, etc.
 Bibliographic entries should be ordered - usually either
alphabetically or in order referenced in the text
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
14
Word processing tools
 Microsoft Word
– Word has built in support for footnotes and endnotes
– Use cross reference feature for numbered reference
lists
– Third party bibliographic add-ons may be useful
– Latest version of Word has built-in bibliography
support
 LaTeX
– Built in support for footnotes and endnotes
– Use Bibtex!
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
15
Conceptualizing privacy
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
16
Concept versus right
 Privacy as concept
– What is it
– How and why it is valued
 Privacy as right
– How it is (or should be) protected
• By law
• By policy
• By technology
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
17
Hard to define
“Privacy is a value so complex, so entangled in
competing and contradictory dimensions, so
engorged with various and distinct meanings,
that I sometimes despair whether it can be
usefully addressed at all.”
Robert C. Post, Three Concepts of Privacy,
89 Geo. L.J. 2087 (2001).
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
18
Some definitions from the literature






Personhood
Intimacy
Secrecy
Contextual integrity
Limited access to the self
Control over information
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
19
Limited access to self
“the right to be let alone”
- Samuel D. Warren and Louis D. Brandeis,
The Right to Privacy,
4 Harv. L. Rev. 193 (1890)
“Being alone.”
- Shane (age 4)
“our concern over
our accessibility to others: the
extent to which we are known
to others, the extent to which
others have physical access to
us, and the extent to which we
are the subject of others
attention.
- Ruth Gavison, “Privacy and the Limits of the
Law,” Yale Law Journal 89 (1980)
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
20
Control over information
“Privacy is the claim of individuals, groups or
institutions to determine for themselves when, how,
and to what extent information about them is
communicated to others.”
“…each individual is continually engaged in a
personal adjustment process in which he balances
the desire for privacy with the desire for disclosure
and communication….”
Alan Westin, Privacy and Freedom, 1967
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
21
Realizing limited access and control
 Limited access
– Laws to prohibit or limit collection, disclosure,
contact
– Technology to facilitate anonymous transactions,
minimize disclosure
 Control
– Laws to mandate choice (opt-in/opt-out)
– Technology to facilitate informed consent, keep
track of and enforce privacy preferences
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
22
Westin’s four states of privacy
Solitude
– individual separated form the group and freed
form the observation of other persons
Intimacy
– individual is part of a small unit
Anonymity
– individual in public but still seeks and finds
freedom from identification and surveillance
Reserve
– the creation of a psychological barrier against
unwanted intrusion - holding back
communication
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
23
Westin’s four functions of privacy
 Personal autonomy
– control when you go public about info
 Emotional release
– be yourself
– permissible deviations to social or institutional
norms
 Self-evaluation
 Limited and protected communication
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
24
Solove’s privacy taxonomy
 Information Collection
– Surveillance
– Interrogation
 Information Processing
–
–
–
–
–
Aggregation
Identification
Insecurity
Secondary Use
Exclusion
 Information Dissemination
–
–
–
–
–
–
–
Breach of Confidentiality
Disclosure
Exposure
Increased Accessibility
Blackmail
Appropriation
Distortion
 Invasion
– Intrusion
– Decisional Interference
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
25
Information vs. decisional privacy
 Information privacy concerns the collection,
use, and disclosure of personal information
 Decisional privacy concerns the freedom to
make decisions about one's body and family
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
26
Multiple facets of privacy
 How can posting personal information about
myself on my web site result in a reduction of
my privacy? How can it result in an increase in
my privacy?
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
27
Privacy as animal instinct?
 Is privacy necessary for species survival?
Eagles eating a deer carcass http://www.learner.org/jnorth/tm/eagle/CaptureE63.html
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
28
History
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
29
Information privacy
 In 17th century America, colonists began to
collect information about each other
– Census, birth and death records, school records,
tax records
 Informants reported people who behaved
badly
– Disorderly children, nightwalkers, Sabbath
breakers, atheists, drunks
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
30
Privacy of personal space
 Historically, depended a lot on the type and
proximity of available housing
 In 18th century Europe, most people lived in
cities where houses were close together, but
small number of people lived in each house
 In 18th century America, people lived far away
from each other but many people lived in
each house and even shared beds
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
31
Communication privacy
 When all communication was oral, communication
privacy depended on
– Communicating without someone overhearing
– Communicating with people who wouldn’t tell others
 Written communications brought new opportunities for
privacy violations
 In 18th century America, postal mail was not necessarily
private
– Sealing wax, basic encryption used to increase privacy
How were
regulation
law
used
– 1782 - Congress
made
it illegal toand
open
other
peoples’ mail
– Later the invention
of the
adhesive
to increase
postal
mailenvelope
privacy?increased
communications privacy
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
32
Telegraph
 In the late nineteenth century the telegraph
became a popular means of long distance
communication
 Messages could be coded, but you could not
recover damages due to transmission errors if
the message was coded
 Telegraph operators were supposed to keep
messages confidential
 Occasional subpoenas for telegraph messages
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
33
Cameras
 Cameras, especially portable “snap” cameras
(1888), raised new privacy concerns
 Telephoto lenses
 Video cameras
 Hidden cameras
 Web cams
 Satellite images
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
34
Privacy History References
 Robert Ellis Smith. 2000. Ben Franklin’s Web
Site: Privacy and Curiosity from Plymouth Rock
to the Internet. Providence: Privacy Journal.
 Alan Westin. 1967. Privacy and Freedom. New
York: Atheneum.
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
35
Homework 1 discussion
 Comments on reading assignments?
 http://cups.cs.cmu.edu/courses/privpolawtec
h-fa10/hw/hw1.html
CyLab Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
36
Download