Abstract
Governments around the world are opening their data vaults to public (and corporate) access and scrutiny. Notable examples including New York City’s NYC Datamine, Philadelphia’s OpenData Philly, Europe’s Open Data Challenge, and Canada’s Open Data Framework, which now spans several cities including Toronto, Vancouver, Edmonton, and Ottawa. Anyone can read government plans, budgets, contractor lists, and in many cases, documents relating to individual citizens. The intention behind these data transparency projects is laudable, but it behooves those interested in privacy to take a careful look at just what information our governments are sharing with the world. There have already been “Open Data Hackathons” which have discovered interesting and unforeseen vulnerabilities, often by combining multiple data sources. There are also commercial ventures using government released data in combination with other sources in ways that were never anticipated, such as genealogical research. We are breaking new ground here and we need to generate new principles to protect privacy in the face of data that is going from “public” to “super-public”.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
http://techpresident.com/blog-entry/and-then-there-were-102-nycs-datamine-glitch (accessed August 26, 2011)
http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf p. 7 (accessed August 26, 2011)
http://data.edmonton.ca/City-Administration/2010-Municipal-Election-Results-Raw-Data-View/gw7p-ee8r (accessed December 30, 2011)
Zijlstra, T.: A court has ordered Slovak NGO Fair-Play Alliance to take down data from their award winning Open Data application, http://www.epsiplatform.eu/news/news/open_data_challenge_winner_ordered_to_remove_certain_data (accessed August 26, 2011)
http://www.squidoo.com/gov-food-stamps#module63313422 (accessed August 26, 2011)
http://we.ideascale.com/a/dtd/Stable-Renters--Public-Scoring-for-Apartments-and-Landlords/106829-12001 (accessed August 26, 2011)
http://www.scmagazineus.com/hurricane-katrina-evacuees-victims-of-data-breach/article/155121/ (accessed August 26, 2011)
http://techpresident.com/blog-entry/open-data-makes-good-advertising-mta (accessed August 26, 2011)
http://ir.ancestry.com/releasedetail.cfm?ReleaseID=552742 (accessed August 26, 2011)
Gormley, M.V.: Oxymoron: Privacy and the Internet, http://www.rootsweb.ancestry.com/~mistclai/privacy.html (accessed August 26, 2011)
US National Academy of Sciences, The Value of Genetic and Genomic Technologies, Washington, DC (2010), http://www.ncbi.nlm.nih.gov/books/NBK52756/pdf/TOC.pdf , with Spiegel’s comments in the online discussion http://www.ncbi.nlm.nih.gov/books/NBK52749/
http://www.lossofprivacy.com/index.php/2007/06/ancestrycom-adding-dna-test-results-to-their-site/ (accessed August 26, 2011)
Privacy International, PI files complaint about online DNA genealogical testing firm, https://www.privacyinternational.org/article/pi-files-complaint-about-online-dna-genealogical-testing-firm (accessed August 26)
Ohm, P.: Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review 57, 1701 (2010)
Abbott, T.G., Lai, K.J., Lieberman, M.R., Price, E.C.: Browser-Based Attacks on Tor. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 184–199. Springer, Heidelberg (2007)
Narayanan, A., Shmatikov, V.: Robust De-Anonymization of Large Sparse Datasets. In: IEEE Symposium on Security and Privacy, Oakland, CA, pp. 111–125 (2008)
Albanescius, C.: Netflix Prize Scrapped Over Privacy Concerns, http://www.pcmag.com/article2/0,2817,2361349,00.asp (accessed December 30, 2011)
O’Hara, K., et al.: Avoiding the Jigsaw Effect: Experiences with Ministry of Justice Reoffending Data, research paper, http://eprints.ecs.soton.ac.uk/23072/8/AVOIDINGTHEJIGSAWEFFECT.pdf (accessed December 30, 2011)
quoted on home page, opendatachallenge.org (accessed August 26, 2011)
Eaves, D.: blog posting, http://eaves.ca/2010/10/06/how-governments-misunderstand-the-risks-of-open-data/ (accessed December 28, 2011)
Fertik, M., Thompson, D.: Wild West 2.0: How To Protect and Restore Your Online Reputation on the Untamed Social Frontier. In: AMACOM, New York, pp. 50–53 (2010)
http://www.ftc.gov/opa/2006/01/choicepoint.shtm (accessed August 26, 2011)
http://wiki.civiccommons.org/Open_Data_Policy#Privacy_.26_Security (accessed August 26, 2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Keenan, T.P. (2012). Are They Making Our Privates Public? – Emerging Risks of Governmental Open Data Initiatives. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds) Privacy and Identity Management for Life. Privacy and Identity 2011. IFIP Advances in Information and Communication Technology, vol 375. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31668-5_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-31668-5_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31667-8
Online ISBN: 978-3-642-31668-5
eBook Packages: Computer ScienceComputer Science (R0)