Skip to main content

Permissions and Privacy

  • Chapter
  • First Online:
Security, Privacy and User Interaction
  • 286 Accesses

Abstract

User privacy is, increasingly, a source of contention. This often-tense relationship between data originators (such as end-users) and data consumers (such as advertisers and service providers) flares up with every revelation of abusive data disclosure. While the essence of the problem is one of incentive misalignment, the problem starts with the difficulty with which privacy can be quantified and understood—and therefore compared. This difficulty aggravates the tension by encouraging predatory behavior among data consumers. At the heart of the problem is the way in which data, permissions to the data, and algorithmic objectives are handled. Moreover, with the increased deployment of IoT installations, resulting in a massive growth of data, this problem is bound to get worse—unless addressed in a thoughtful manner. We lay the foundation for a structural change to improve privacy; we argue that our approach constitutes an important alternative to increased regulation as well as an opportunity for big-data companies to improve their image in the eyes of the public.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The detailing of the trust models and the architecture for third-party predicate generation are both beyond the scope of this article.

References

  1. R. Wyden, Wyden releases discussion draft of legislation to provide real protections for Americans’ privacy (2018). https://www.wyden.senate.gov/news/press-releases/wyden-releases-discussion-draft-of-legislation-to-provide-real-protections-for-americans-privacy

  2. M. Rubio, Rubio introduces privacy bill to protect consumers while promoting innovation (2019). https://www.rubio.senate.gov/public/index.cfm/press-releases?ID=1CF1212A-F678-47BF-BBC7-D70C42F7E934

  3. C. Dwork, J. Lei, Differential privacy and robust statistics, in Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing (STOC) (2009)

    Google Scholar 

  4. J. Camenisch, S. Hohenberger, A. Lysyanskaya, Compact e-cash, in Advances in Cryptology—EUROCRYPT, vol. 3494 (2005), pp. 302–321

    Google Scholar 

  5. D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 84–88 (1981)

    Article  Google Scholar 

  6. J. Camenisch, A. Lysyanskaya, An efficient system for non-transferable anonymous credentials with optional anonymity revocation, in Advances in Cryptology—Eurocrypt 2001, ed. by B. Pfitzmann (Springer, Berlin, 2001), pp. 93–118

    Chapter  Google Scholar 

  7. M.K. Reiter, A.D. Rubin, Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1, 66–92 (1997)

    Article  Google Scholar 

  8. I. Clarke, O. Sandberg, B. Wiley, T.W. Hong, Freenet: a distributed anonymous information storage and retrieval system, in International Workshop on Designing Privacy Enhanching Technologies: Design Issues in Anonymity and Unobservability (2001), pp. 46–66

    Google Scholar 

  9. P. Golle, M. Jakobsson, A. Juels, P. Syverson, Universal re-encryption for mixnets, in 2004 RSA Conference, Cryptographers’ Track (2002), pp. 163–178

    Google Scholar 

  10. Y. Lindell, B. Pinkas, Multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive (2008), p. 197

    Google Scholar 

  11. J. Hollan, E. Hutchins, D. Kirsh, Distributed cognition: toward a new foundation for human-computer interaction research. ACM Trans. Comput. Hum. Interact. 7, 174–196 (2000)

    Article  Google Scholar 

  12. A. Adams, M.A. Sasse, Users are not the enemy. Commun. ACM 42(12) (1999)

    Google Scholar 

  13. A. Morton, M.A. Sasse, Privacy is a process, not a pet: a theory for effective privacy practice, in Proceedings of the 2012 New Security Paradigms Workshop (2012), pp. 87–104

    Google Scholar 

  14. G.D. Abowd, E.D. Mynatt, Charting past, present and future research in ubiquitous computing. ACM Trans. Comput. Hum. Interact. 7, 29–58 (2000)

    Article  Google Scholar 

  15. W. Mason, S. Suri, Conducting behavioral research on Amazon’s Mechanical Turk. Behav. Res. Methods 44(1), 1–23 (2012). https://doi.org/10.3758/s13428-011-0124-6

    Article  Google Scholar 

  16. G.M. Gray, D.P. Ropeik, Dealing with the dangers of fear: the role of risk communication. Health Affairs 21(6), 106–116 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jakobsson, M. (2020). Permissions and Privacy. In: Jakobsson, M. (eds) Security, Privacy and User Interaction. Springer, Cham. https://doi.org/10.1007/978-3-030-43754-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43754-1_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43753-4

  • Online ISBN: 978-3-030-43754-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics