![Page 1: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/1.jpg)
Privacyin online social networks:
Software agents and beyond
Bettina BerendtDept. Computer Science
KU Leuvenhttp://people.cs.kuleuven.be/~bettina.berendt/
![Page 2: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/2.jpg)
Who am I ?
Privacy,Discrimination
![Page 3: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/3.jpg)
You can sell your privacy,
but you can”t buy it back.
![Page 4: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/4.jpg)
?
![Page 5: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/5.jpg)
Meet Kris (1)
• Kris weighs 120 kilos.
• Kris wants to lead a “normal online life”.
![Page 6: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/6.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 7: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/7.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 8: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/8.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 9: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/9.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 10: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/10.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 11: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/11.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 12: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/12.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 13: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/13.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 14: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/14.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 15: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/15.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 16: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/16.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 17: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/17.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 18: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/18.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 19: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/19.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
![Page 20: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/20.jpg)
Meet Kris (2)
Does Kris want others to know about his/her weight?
a)In an online dating site?
1.Kris wants to buy a pair of trousers.
•Does Kris want the salesperson to know about his/her weight?
•(analogously: diet plan / doctor)
2.The shop/doctor wants to sell patients information to health insurance companies.
•Does Kris want this?
a)The insurance company asks a premium for risk factors.
b)The insurance company cannot act on weight information.
Privacy is about ...
Confidentiality.
Context.
Confidentiality? Information – value!
Confidentiality? Purpose specification, notification … control!
Knowledge? Consequences!
…
![Page 21: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/21.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 22: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/22.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 23: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/23.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 24: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/24.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 25: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/25.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 26: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/26.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 27: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/27.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 28: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/28.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 29: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/29.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 30: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/30.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 31: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/31.jpg)
Meet Kris (3)
3. Kris has a traffic accident and is unconscious. Normally, the paramedics come with a stretcher that can carry up to 100 kilos. Time loss could be deadly.
• Would Kris want the doctor to inform the paramedics of his/her weight?
4. Kris wants to join / open a group on the SNS, the HeavyweightDaters.
• Does Kris want others to know about his/her weight?
5. Kris” teenage child Kim is (a) also overweight and (b) on Facebook.
• What advice does Kris give to Kim?
Privacy is about … (contd.)
Control? Trust! (and Consequences)
Hiding? Identity-building, which includes strategic revelations!
…
![Page 32: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/32.jpg)
Kris and metadata
Would Kris be relieved to hear that the <insert your favourite secret service name> saves only metadata?
“They know that you called the suicide help line from the Golden Gate Bridge,
but they don”t know what was said.”
![Page 33: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/33.jpg)
A multi-faceted approach
Lawallow, forbid, require, ...
![Page 34: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/34.jpg)
A multi-faceted approach
Technologyencryption, access control,
...
Lawallow, forbid, require, ...
![Page 35: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/35.jpg)
A multi-faceted approach
Technologyencryption, access control,
...
Lawallow, forbid, require, ...
Awarenessof problems, solutions,„what“s going on“, ...
![Page 36: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/36.jpg)
A multi-faceted approach
Technologyencryption, access control,
...
Lawallow, forbid, require, ...
Awarenessof problems, solutions,„what“s going on“, ...
![Page 37: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/37.jpg)
A multi-faceted approach
Technologyencryption, access control,
...
Lawallow, forbid, require, ...
Awarenessof problems, solutions,„what“s going on“, ...
![Page 38: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/38.jpg)
Meet SPION
![Page 39: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/39.jpg)
Tammy SchellensMartin Valcke
Ellen Vanderhoven
Ero Balsa Seda GürsesClaudia Diaz Bart Preneel
Alessandro AcquistiFred Stutzman
Jos DumortierEva Lievens
Brendan Van Alsenoy
Bettina BerendtBo GaoThomas Peetz
Dave ClarkeFrank Piessens
Rula Sayaf
Bram LievensJo Pierson
Ralf De Wolf
![Page 40: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/40.jpg)
PET approaches (in SPION and elsewhere)
Feedback & awareness
![Page 41: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/41.jpg)
PET approaches (in SPION and elsewhere)
Feedback & awareness
![Page 42: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/42.jpg)
PET approaches (in SPION and elsewhere)
Access control
Feedback & awareness
![Page 43: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/43.jpg)
PET approaches (in SPION and elsewhere)
Access control
Feedback & awareness
![Page 44: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/44.jpg)
PET approaches (in SPION and elsewhere)
Access control
Crypto-graphy
Feedback & awareness
![Page 45: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/45.jpg)
PET approaches (in SPION and elsewhere)
Access control
Crypto-graphy
![Page 46: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/46.jpg)
PET approaches (in SPION and elsewhere)
Access control
Crypto-graphy
Feedback & awareness
![Page 47: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/47.jpg)
SPION PETs
• Access control: Facebook and beyond• Access control and information flow: FlowFox• Cryptography: Scramble• Feedback & awareness: FreeBu
![Page 48: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/48.jpg)
Feedback & awareness:a systems view
Bettina BerendtDept. Computer Science
KU Leuvenhttp://people.cs.kuleuven.be/~bettina.berendt/
![Page 49: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/49.jpg)
Established wisdoms …
![Page 50: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/50.jpg)
“Overdisclosure“ privacy problems
![Page 51: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/51.jpg)
Tools (technological and otherwise) privacy solutions
![Page 52: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/52.jpg)
Evaluation validation of tools
![Page 53: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/53.jpg)
Tool types à la SPION
• Confidentiality
• Control
• Awareness of ...– „I am being tracked.“– „which audiences do I have (whom I could
give access)?“ e.g., FreeBu – „when I am thinking too small about this“
![Page 54: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/54.jpg)
A bigger picture
Environment- technology, society
Mental schema- privacy, p. problems
Behaviour- disclosure, evaluation
![Page 55: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/55.jpg)
A bigger picture
Environment- technology, society
Mental schema- privacy, p. problems
Behaviour- disclosure, evaluation
![Page 56: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/56.jpg)
Society, technology interpersonal boundaries disclosure
E
BS
![Page 57: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/57.jpg)
Disclosure disclosure (over)evaluation
E
B
BUT:Evaluating something/someone along different dimensionscan lead to worse judgementsand less satisfying decisions
S
![Page 58: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/58.jpg)
Evaluation disclosure E
BS
![Page 59: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/59.jpg)
Evaluation privacy definitionsE
BS
[Moreno et al., 2009]
Def. of “appropriate”; Privacy is
social privacyand some chilled overdisclosure(as opposed to
instrumental privacy)
& technology
![Page 60: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/60.jpg)
Evaluation privacy definitionsE
BS
Slashdot article on[Jentzsch, Preibusch & Harasser, 2012]
Privacy is an individually owned and
tradeable good(as opposed to
a fundamental right or a social good)
![Page 61: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/61.jpg)
Please argue with me about
• Let us not divide and conquer ourselves:– The standard (scientific ?!) distribution of work can be
a dangerous self-blinding and continued delegation of responsibility when it comes to problems like privacy.
– (Being forced to) being responsible is not only bad, but also part and parcel of being a human & a citizen.
• We need awareness (tools), but we also need to build– true private spaces– true public spaces
• “Privacy is not only about clicking Facebook.“
![Page 62: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/62.jpg)
This talk was inspired by many …
Intro quote (“I asked the audience not to tweet or blog while I was talking. Not out of respect for me, but out of respect for themselves.“):
• Lanier, J. (2010). You are Not a Gadget. A Manifesto. New York: Knopf. http://www.jaronlanier.com/gadgetwebresources.html
P.9: • Turkle, S. (2010). Alone Together. Why we Expect More from Technology
and Less from Each Other. Basic Books. http://alonetogetherbook.com/ • Altman, I. (1976). Privacy: A conceptual analysis. Environment and
Behaviour, 8(1), 7-29. P. 10: • Illouz, E. (2012). Why Love Hurts. Cambridge: Polity Press. – especially her
reading of • Wilson, T.D. & Schooler, J.W. (1991). Thinking too much: Introspection can
reduce the quality of preferences and decisions. Journal of Personality and Social Psychology, 60(2), 181-192.
• Ofir, C. & Simonson, I (2001). In search of negative customer feedback: The effect of expecting to evaluate on satisfaction and evaluation. Journal of Marketing Research, 38(2), 170-182.
![Page 63: Privacy in online social networks: Software agents and beyond Bettina Berendt Dept. Computer Science KU Leuven bettina.berendt](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649eaa5503460f94bafbb8/html5/thumbnails/63.jpg)
Specific cited sources(these are examples of wider research areas)
P. 12:• Moreno MA, Vanderstoep A, Parks MR, Zimmerman FJ, Kurth A,
and Christakis DA. Reducing at-risk adolescents' display of risk behavior on a social networking web site: a randomized controlled pilot intervention trial. Arch Pediatr Adolesc Med, 163(1): 35-41, 2009.
P. 13:• Nicola Jentzsch, Sören Preibusch, Andreas Harasser. Study on
monetising privacy. An economic model for pricing personal information. European Network and information Security Agency (ENISA). Deliverable, February 2012. http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/monetising-privacy