jimmy lin the ischool university of maryland thursday, april 2, 2009
DESCRIPTION
Cloud Computing and Information Policy: Computing in a Policy Cloud?. Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/1.jpg)
Cloud Computing and Information Policy: Computing in a Policy Cloud?
Jimmy LinThe iSchoolUniversity of Maryland
Thursday, April 2, 2009
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United StatesSee http://creativecommons.org/licenses/by-nc-sa/3.0/us/ for details
Some material in these slides taken from: Jaeger, Lin, and Grimes. Cloud Computing and Information Policy: Computing in a Policy Cloud? Journal of Information Technology & Politics, 5(3):269-283, 2008.
![Page 2: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/2.jpg)
Tech Firms Seek to Get Agencies on Board With Cloud ComputingBy Kim HartWashington Post Staff WriterTuesday, March 31, 2009; A13
…
“The government may be outsourcing functions to contractors now, but this takes it to a whole new level,” said Jimmy Lin, assistant professor of information studies at the University of Maryland, which has received funding from Google and IBM to research cloud computing.
“And what happens if Google gets hacked by a third party?” he said. “The answer is, nobody knows.”
…
![Page 3: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/3.jpg)
What is policy?Why is policy important?
![Page 4: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/4.jpg)
What is information policy?Why is information policy important?
![Page 5: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/5.jpg)
Perception vs. Reality
![Page 6: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/6.jpg)
Cloud Computing: Public Perception “Use of Cloud Computing Applications and Services”
Study conducted by the Pew Research Center April-May, 2008: sample of 1,553 Internet Users
Users may not know the term, but it’s already here…
![Page 7: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/7.jpg)
All 18-29
User webmail services 56% 77%
Store personal photos online 34% 50%
Use online applications 29% 39%
Store personal videos online 7% 14%
Pay to store computer files online 5% 9%
Back up hard drive to an online site 5% 7%
Cloud computing activitiesPercent of Internet users who do the following…
![Page 8: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/8.jpg)
Major Minor Not
Easy and convenient 51% 23% 23%
Ubiquitous access 41% 25% 32%
Easily shared 39% 28% 29%
Won’t lose information 34% 23% 23%
Reasons people use cloud applications
![Page 9: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/9.jpg)
Sold your files to others 90% 5% 2% 3%Used your information in marketing campaigns 80% 10% 3% 6%
Analyzed your information to display custom ads 68% 19% 6% 7%
Kept a copy of your deleted files 63% 20% 8% 8%
Gave law enforcement files when asked 49% 15% 11% 22%
Attitudes about policy of servicesHow concerned would you be if a company…
VerySomewhat
Not tooNot at all
![Page 10: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/10.jpg)
Pew Study: Key Issues Identified Trust Control Reliability Security
![Page 11: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/11.jpg)
Cloud Computing Issues Reliability Security, Privacy, and Anonymity Access and Usage Control and Monopolization
![Page 12: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/12.jpg)
Reliability Accuracy of results? Consequences of failure? Who bears the risks? Liability for losses? Corruption of data?
![Page 13: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/13.jpg)
And you thought it was safe?http://wiki.cloudcommunity.org/wiki/CloudComputing:Incidents_Database
![Page 14: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/14.jpg)
EPIC filed a complaint with the FTC seeking an investigation of Google Docs, in light of the company's data breach reported on March 7, 2009…
The Google Docs Data Breach reported earlier this month highlights the hazards of cloud computing conjoined with inadequate security practices. The compliant seeks that the FTC's provide a remedies for consumers that includes greater transparency, security, and privacy rights for Google Cloud Computing users.
Press ReleaseEPIC (Electronic Privacy Information Center)March 17, 2009
![Page 15: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/15.jpg)
Security, Privacy, Anonymity Need for protection, particularly sensitive information
Personal (SSNs, photos, etc.) Corporate (client accounts, internal memos, etc.) Scientific (experimental data, results, etc.)
Technology isn’t enough!
![Page 16: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/16.jpg)
Security, Privacy, Anonymity Spying by other users of the cloud service Monitoring by the cloud provider
Quality control Data mining
Government surveillance Cross-national issues
![Page 17: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/17.jpg)
Existing Regulations HIPPA for medical records Sarbanes-Oxley for corporations …
![Page 18: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/18.jpg)
Access and Usage Intellectual Property Licenses Export and data sharing prohibitions
![Page 19: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/19.jpg)
Source: http://www.free-pictures-photos.com/
![Page 20: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/20.jpg)
Source: Harper’s (Feb, 2008)
![Page 21: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/21.jpg)
“I think there is a world market for maybe five computers”
Quote often (mistakenly) attributed to Thomas J. Waston, former president of IBM
![Page 22: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/22.jpg)
Standards?
![Page 23: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/23.jpg)
Location, Location, Location
![Page 24: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/24.jpg)
Who’s driving policy today? Telecommunications policy and law
What is a cloud provider (legally speaking)?… closest to a teleco
Contractual law Often unilaterally dictated by the cloud provider
![Page 25: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/25.jpg)
“you acknowledge that you bear sole responsibility for adequate security,
protection and backup of Your Content.”
![Page 26: Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009](https://reader035.vdocuments.site/reader035/viewer/2022070423/56816616550346895dd963a1/html5/thumbnails/26.jpg)
Possible Futures Governmental regulations?
Laws do not keep pace with technology Let the market handle it?
Service differentiation Danger of monopolies
Combination of the two?