Abstract
Although privacy and AI/data science are multi-faceted concepts, there is an increasing trend to focus on only a subset of their meaning: privacy as data privacy, with a focus on confidentiality, and AI/data science as a threat to autonomy and privacy, through data collection, unwanted inferences, and profiling. However, confidentiality and “invisibility” are not always constitutive of privacy as “the freedom from unreasonable constraints on the construction of one’s own identity” – in some cases, visibility can be more important, and data collection, presentation, and inferences can help and extend a desired visibility. In this position paper, I will focus on a specific application around these phenomena: the analysis of vehicle/human trajectory data. I will discuss two recent examples of the analysis of such data: the New York City taxi rides dataset, and the use of data from the maritime Automatic Information System (AIS) for mapping refugee movements on the Mediterranean Sea. The goal is to encourage a discussion as to whether and how such wider fundamental-rights questions and their implications for privacy, data protection, and technology can and should be investigated in the scope of APF.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Of course, the GDPR also contains and elaborates on many other principles, including requirements on data processing related to IT security (integrity and availability in addition to confidentiality, Article 32 and Article 5(1)(f)), accountability, weighing of interests, and others.
- 2.
A field situated in the intersection of machine learning (as a part of AI) and substantive expertise [7].
- 3.
This movement started as the encouragement of victims of sexual harassment (especially in, but not limited to, the workplace) to tweet about their experiences and give people a sense of the magnitude of the problem. The Twitter hashtag #metoo simplifies the retrievability of these reports, such that specific incidents as well as patterns of sexual harassment become a public and visible phenomenon, rather than remain “private” singular experiences. As in the case of calling out domestic violence, the hope is that “this ‘mainstreaming’ of feminist activism is laying the foundation for a collective shift towards a more just society” [24, p. 239].
- 4.
- 5.
It is debatable where/when the violation occurs. Opinions differ as to whether the existence of knowledge about individuals per se represents a privacy violation, whether this only occurs when this knowledge is acted upon, or whether the publication of data as an enabler of such consequences already forms a privacy violation [4].
- 6.
This information was given to me under conditions of confidentiality, as was the assessment that university ethics boards tend to be conservative in their interpretation of the GDPR. The publicly available university documents that I have seen on what is and what is not allowed regarding the re-use of public datasets, do not address specific questions such as “is it allowed to re-use public datasets”, rather, they refer to the general principle that GDPR compliance always also depends on the whole context of research – which is of course a correct rendering of a law that requires interpretation in context. Even if I therefore cannot provide a reference for my claim, I consider it worthwhile to mention it, for example to encourage discussion among researchers about their respective institutions’ GDPR handling.
- 7.
- 8.
The authors enrich the data with broadcast warning data produced by WWNWS, a global service managed by the UN Maritime Organization IMO (data that appear to cover only a small fraction of vessels in distress, p. 37), and other data such as the tweets issued by NGO vessels.
- 9.
How likely they are will depend on the existence of background knowledge and the existence of and incentives for “attackers” (paparazzi, celebrity fans, law enforcement, criminals, ...).
- 10.
I thank Konstantinos Tserpes for mentioning this example and making available a visualization of the trajectory.
References
Agre, P.E., Rotenberg, M.: Technology and Privacy: The New Landscape. MIT Press, Cambridge (2001)
Al Jazeera News: Danish cargo ship carrying refugees allowed to dock in Italy, 26 June 2018. https://www.aljazeera.com/news/2018/06/danish-cargo-ship-carrying-refugees-allowed-dock-italy-180626081632471.html
Atockar: Riding with the Stars: Passenger Privacy in the NYC Taxicab Dataset (2014). https://research.neustar.biz/2014/09/15/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset/
Berendt, B.: More than modelling and hiding: towards a comprehensive view of web mining and privacy. Data Min. Knowl. Disc. 24(3), 697–737 (2012)
Borghese, L., Vandoorne, S., Vonberg, J.: Migrant rescue ship Lifeline to dock in Malta after being stranded for five days in the Mediterranean. CNN News, 26 June 2018. https://edition.cnn.com/2018/06/26/europe/migrant-ships-maersk-lifeline-intl/index.html
Cancellato, F.: Poche palle, i migranti della Asso 28 li abbiamo respinti noi: e la Libia è solo la foglia di fico della nostra ipocrisia. Linkiesta, 1 August 2018. https://www.linkiesta.it/it/article/2018/08/01/poche-palle-i-migranti-della-asso-28-li-abbiamo-respinti-noi-e-la-libi/39019/
Conway, D.: The Data Science Venn Diagram (n.d.). http://drewconway.com/zia/2013/3/26/the-data-science-venn-diagram
De Hert, P., Gutwirth, S.: Privacy, data protection and law enforcement. Opacity of the individual and transparency and power. In: Claes, E., Duff, A., Gutwirth, S. (eds.), Privacy and the Criminal Law, pp. 61–104. Antwerp/Oxford: Intersentia (2006)
Deibler, D.: EUROSUR - A Sci-fi border zone patrolled by drones? In: Camenisch, J., Fischer-Hübner, S., Hansen, M. (eds.) Privacy and Identity Management for the Future Internet in the Age of Globalisation, pp. 87–109. Springer, Berlin etc. (2015). https://doi.org/10.1007/978-3-319-18621-4
Welle, D.: Germany pulls out of Mediterranean migrant mission Sophia, 23 January 2019. https://www.dw.com/en/germany-pulls-out-of-mediterranean-migrant-mission-sophia/a-47189097
Domingo-Ferrer, J.: A three-dimensional conceptual framework for database privacy. In: Jonker, W., Petković, M. (eds.) SDM 2007. LNCS, vol. 4721, pp. 193–202. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-75248-6_14
Douriez, M., Doraiswamy, H., Freire, J., Silva, C.T.: Anonymizing NYC taxi data: does it matter? In: Proceedings of 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), Montreal, QC, 2016, pp. 140–148 (2016)
Elliot, M., Mackey, E., O’Hary, K., Tudor, C.: The Anonymisation Decision-Making Framework. UKAN, Manchester (2016). http://ukanon.net/wp-content/uploads/2015/05/The-Anonymisation-Decision-making-Framework.pdf
Friedewald, M., Finn, R., Wright, D.: Seven types of privacy. In: Gutwirth, S., Leens, R., De Hert, P., Poullet, Y. (eds.) European Data Protection: Coming of Age, pp. 3–32. Springer, Heidelberg (2013). https://doi.org/10.1007/978-94-007-5170-5_1
Gürses, S.F., Berendt, B.: The social web and privacy. In: Ferrari, E., Bonchi, F. (eds.), Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques. Data Mining and Knowledge Discovery Series. Chapman & Hall/CRC Press, Boca Raton (2010). https://www.esat.kuleuven.be/cosic/publications/article-1304.pdf
Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: Proceedings of 2015 IEEE CS Security and Privacy Workshops (2015). https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7163220
Hildebrandt, M.: Privacy and identity. In: Claes, E., Duff, A., Gutwirth, S. (eds.) Privacy and the Criminal Law, pp. 43–58. Intersentia, Antwerp (2006)
Hoffmann, K., Boy, J., Leon-Dufour, J., Breen, D. Earney, C., Luengo-Oroz, M. Using big data to study rescue patterns in the Mediterranean. In: Fatal Journeys. vol. 3, Part 1: Improving Data on Missing Migrants, pp. 24–46. International Organization for Migration, Geneva (2017). https://publications.iom.int/system/files/pdf/fatal_journeys_volume_3_part_1.pdf
Knapton, J.: General Data Protection Regulation: academic research (n.d.). https://www.information-compliance.admin.cam.ac.uk/files/gdpr_and_academic_research_v1.pdf
La Repubblica: Diciotti, dopo dieci giorni i migranti sbarcano dalla nave, 26 August 2018. https://www.repubblica.it/cronaca/2018/08/26/news/migranti_diciotti_sbarco-204935293
Li, J.P.K., Bhulai, S., van Essen, T.: Optimization of the revenue of the New York City taxi service using Markov decision processes. In: Proceedings of DATA ANALYTICS 2017: The Sixth International Conference on Data Analytics (2017). https://www.thinkmind.org/download.php?articleid=data_analytics_2017_4_10_68005
Maldoff, G. How GDPR changes the rules for research. IAPP News (2016). https://iapp.org/news/a/how-gdpr-changes-the-rules-for-research/
Medina, J.: U.N. says migrants’ return to Libya by Italian boat could be illegal. Reuters, 31 July 2018. https://www.reuters.com/article/us-europe-migrants-libya/migrants-return-to-libya-by-italian-boat-could-breach-international-law-u-n-idUSKBN1KL1K4
Mendes, K., Ringrose, J., Keller, J.: #MeToo and the promise and pitfalls of challenging rape culture through digital feminist activism. Eur. J. Women’s Stud. 25(2), 236–246 (2018). https://doi.org/10.1177/1350506818765318
Monroy, M.: Durch die Hintertür: Anschluss Libyens an europäische Überwachungssysteme. CILIP Blog, 19 January 2018. https://www.cilip.de/2018/01/19/durch-die-hintertuer-anschluss-libyens-an-europaeische-ueberwachungssysteme/
Pandurangan, V.: On Taxis and Rainbows: Lessons from NYC’s improperly anonymized taxi logs (2014). https://tech.vijayp.ca/of-taxis-and-rainbows-f6bc289679a1
Phillips, D.: Privacy policy and PETs: the influence of policy regimes on the development and social implications of privacy enhancing technologies. New Media Soc. 6(6), 691–706 (2004)
Patroumpas, K., Alevizos, E., Artikis, A., Vodas, M., Pelekis, N., Theodoridis, Y.: Online event recognition from moving vessel trajectories. GeoInformatica 21(2), 389–427 (2017). https://doi.org/10.1007/s10707-016-0266-x
Pratesi, F., Monreale, A., Trasarti, R., Giannotti, R., Pedreschi, D., Yanagihara, T.: PRUDEnce: a system for assessing privacy risk vs utility in data sharing ecosystems. Trans. Data Priv. 11(2), 139–167 (2018)
Solove, D.J.: Understanding Privacy. Harvard University Press, Cambridge (2008)
Taylor, L.: Safety in numbers? Group privacy and big data analytics in the developing world. In: Taylor, L., Floridi, L., van der Sloot, B. (eds.) Group Privacy. PSS, vol. 126, pp. 13–36. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46608-8_2
Taylor, L., Floridi, L., van der Sloot, B. (eds.): Group Privacy. PSS, vol. 126. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46608-8
Tazzioli, M.: Eurosur, humanitarian visibility, and (nearly) real-time mapping in the Mediterranean. ACME 15(3), 561–579 (2016). https://acme-journal.org/index.php/acme/article/view/1223/1201
The Guardian: EU declares migration crisis over as it hits out at ’fake news’, 6 March 2019. https://www.theguardian.com/world/2019/mar/06/eu-declares-migration-crisis-over-hits-out-fake-news-european-commission
uluman: Identifying Muslim cabbies from trip data and prayer times (2015). https://www.reddit.com/r/dataisbeautiful/comments/2t201h/identifying_muslim_cabbies_from_trip_data_and/
Varlamis, I., Tserpes, K., Sardianos, C.: Detecting search and rescue missions from AIS data. In: 2018 IEEE 34th International Conference on Data Engineering Workshops (ICDEW), Paris, 2018, pp. 60–65 (2018). http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8402020&isnumber=8402003
Ziniti, A.: Migranti, inchiesta sul comportamento del rimorchiatore italiano Asso 28. La Repubblica, 8 August 2018. http://www.repubblica.it/cronaca/2018/08/08/news/migranti_presentato_un_esposto_sul_comportamento_del_rimorchiatore_italiano_asso_28-203654671/
Ziniti, A.: Migranti Sea Watch anche in Italia, accordo europeo raggiunto con Malta. La Repubblica, 9 January 2019. https://www.repubblica.it/cronaca/2019/01/09/news/migranti_accordo-216163365/
Acknowledgements
I thank the members of the EU H2020 Marie-Skłodowska-Curie programme project MASTER for the inspiration to deal with the privacy aspects of AIS data and migrants, and for many valuable discussions of previous versions of this article.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Berendt, B. (2019). Privacy Beyond Confidentiality, Data Science Beyond Spying: From Movement Data and Data Privacy Towards a Wider Fundamental Rights Discourse. In: Naldi, M., Italiano, G., Rannenberg, K., Medina, M., Bourka, A. (eds) Privacy Technologies and Policy. APF 2019. Lecture Notes in Computer Science(), vol 11498. Springer, Cham. https://doi.org/10.1007/978-3-030-21752-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-21752-5_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21751-8
Online ISBN: 978-3-030-21752-5
eBook Packages: Computer ScienceComputer Science (R0)