Abstract
User privacy is, increasingly, a source of contention. This often-tense relationship between data originators (such as end-users) and data consumers (such as advertisers and service providers) flares up with every revelation of abusive data disclosure. While the essence of the problem is one of incentive misalignment, the problem starts with the difficulty with which privacy can be quantified and understood—and therefore compared. This difficulty aggravates the tension by encouraging predatory behavior among data consumers. At the heart of the problem is the way in which data, permissions to the data, and algorithmic objectives are handled. Moreover, with the increased deployment of IoT installations, resulting in a massive growth of data, this problem is bound to get worse—unless addressed in a thoughtful manner. We lay the foundation for a structural change to improve privacy; we argue that our approach constitutes an important alternative to increased regulation as well as an opportunity for big-data companies to improve their image in the eyes of the public.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The detailing of the trust models and the architecture for third-party predicate generation are both beyond the scope of this article.
References
R. Wyden, Wyden releases discussion draft of legislation to provide real protections for Americans’ privacy (2018). https://www.wyden.senate.gov/news/press-releases/wyden-releases-discussion-draft-of-legislation-to-provide-real-protections-for-americans-privacy
M. Rubio, Rubio introduces privacy bill to protect consumers while promoting innovation (2019). https://www.rubio.senate.gov/public/index.cfm/press-releases?ID=1CF1212A-F678-47BF-BBC7-D70C42F7E934
C. Dwork, J. Lei, Differential privacy and robust statistics, in Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing (STOC) (2009)
J. Camenisch, S. Hohenberger, A. Lysyanskaya, Compact e-cash, in Advances in Cryptology—EUROCRYPT, vol. 3494 (2005), pp. 302–321
D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84–88 (1981)
J. Camenisch, A. Lysyanskaya, An efficient system for non-transferable anonymous credentials with optional anonymity revocation, in Advances in Cryptology—Eurocrypt 2001, ed. by B. Pfitzmann (Springer, Berlin, 2001), pp. 93–118
M.K. Reiter, A.D. Rubin, Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1, 66–92 (1997)
I. Clarke, O. Sandberg, B. Wiley, T.W. Hong, Freenet: a distributed anonymous information storage and retrieval system, in International Workshop on Designing Privacy Enhanching Technologies: Design Issues in Anonymity and Unobservability (2001), pp. 46–66
P. Golle, M. Jakobsson, A. Juels, P. Syverson, Universal re-encryption for mixnets, in 2004 RSA Conference, Cryptographers’ Track (2002), pp. 163–178
Y. Lindell, B. Pinkas, Multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive (2008), p. 197
J. Hollan, E. Hutchins, D. Kirsh, Distributed cognition: toward a new foundation for human-computer interaction research. ACM Trans. Comput. Hum. Interact. 7, 174–196 (2000)
A. Adams, M.A. Sasse, Users are not the enemy. Commun. ACM 42(12) (1999)
A. Morton, M.A. Sasse, Privacy is a process, not a pet: a theory for effective privacy practice, in Proceedings of the 2012 New Security Paradigms Workshop (2012), pp. 87–104
G.D. Abowd, E.D. Mynatt, Charting past, present and future research in ubiquitous computing. ACM Trans. Comput. Hum. Interact. 7, 29–58 (2000)
W. Mason, S. Suri, Conducting behavioral research on Amazon’s Mechanical Turk. Behav. Res. Methods 44(1), 1–23 (2012). https://doi.org/10.3758/s13428-011-0124-6
G.M. Gray, D.P. Ropeik, Dealing with the dangers of fear: the role of risk communication. Health Affairs 21(6), 106–116 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jakobsson, M. (2020). Permissions and Privacy. In: Jakobsson, M. (eds) Security, Privacy and User Interaction. Springer, Cham. https://doi.org/10.1007/978-3-030-43754-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-43754-1_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43753-4
Online ISBN: 978-3-030-43754-1
eBook Packages: Computer ScienceComputer Science (R0)