Skip to main content

Privacy Beyond Confidentiality, Data Science Beyond Spying: From Movement Data and Data Privacy Towards a Wider Fundamental Rights Discourse

  • Conference paper
  • First Online:
Privacy Technologies and Policy (APF 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11498))

Included in the following conference series:

Abstract

Although privacy and AI/data science are multi-faceted concepts, there is an increasing trend to focus on only a subset of their meaning: privacy as data privacy, with a focus on confidentiality, and AI/data science as a threat to autonomy and privacy, through data collection, unwanted inferences, and profiling. However, confidentiality and “invisibility” are not always constitutive of privacy as “the freedom from unreasonable constraints on the construction of one’s own identity” – in some cases, visibility can be more important, and data collection, presentation, and inferences can help and extend a desired visibility. In this position paper, I will focus on a specific application around these phenomena: the analysis of vehicle/human trajectory data. I will discuss two recent examples of the analysis of such data: the New York City taxi rides dataset, and the use of data from the maritime Automatic Information System (AIS) for mapping refugee movements on the Mediterranean Sea. The goal is to encourage a discussion as to whether and how such wider fundamental-rights questions and their implications for privacy, data protection, and technology can and should be investigated in the scope of APF.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Of course, the GDPR also contains and elaborates on many other principles, including requirements on data processing related to IT security (integrity and availability in addition to confidentiality, Article 32 and Article 5(1)(f)), accountability, weighing of interests, and others.

  2. 2.

    A field situated in the intersection of machine learning (as a part of AI) and substantive expertise [7].

  3. 3.

    This movement started as the encouragement of victims of sexual harassment (especially in, but not limited to, the workplace) to tweet about their experiences and give people a sense of the magnitude of the problem. The Twitter hashtag #metoo simplifies the retrievability of these reports, such that specific incidents as well as patterns of sexual harassment become a public and visible phenomenon, rather than remain “private” singular experiences. As in the case of calling out domestic violence, the hope is that “this ‘mainstreaming’ of feminist activism is laying the foundation for a collective shift towards a more just society” [24, p. 239].

  4. 4.

    https://data.cityofnewyork.us/browse?q=taxi.

  5. 5.

    It is debatable where/when the violation occurs. Opinions differ as to whether the existence of knowledge about individuals per se represents a privacy violation, whether this only occurs when this knowledge is acted upon, or whether the publication of data as an enabler of such consequences already forms a privacy violation [4].

  6. 6.

    This information was given to me under conditions of confidentiality, as was the assessment that university ethics boards tend to be conservative in their interpretation of the GDPR. The publicly available university documents that I have seen on what is and what is not allowed regarding the re-use of public datasets, do not address specific questions such as “is it allowed to re-use public datasets”, rather, they refer to the general principle that GDPR compliance always also depends on the whole context of research – which is of course a correct rendering of a law that requires interpretation in context. Even if I therefore cannot provide a reference for my claim, I consider it worthwhile to mention it, for example to encourage discussion among researchers about their respective institutions’ GDPR handling.

  7. 7.

    http://rescuesignatures.unglobalpulse.net/mediterranean/.

  8. 8.

    The authors enrich the data with broadcast warning data produced by WWNWS, a global service managed by the UN Maritime Organization IMO (data that appear to cover only a small fraction of vessels in distress, p. 37), and other data such as the tweets issued by NGO vessels.

  9. 9.

    How likely they are will depend on the existence of background knowledge and the existence of and incentives for “attackers” (paparazzi, celebrity fans, law enforcement, criminals, ...).

  10. 10.

    I thank Konstantinos Tserpes for mentioning this example and making available a visualization of the trajectory.

References

  1. Agre, P.E., Rotenberg, M.: Technology and Privacy: The New Landscape. MIT Press, Cambridge (2001)

    Google Scholar 

  2. Al Jazeera News: Danish cargo ship carrying refugees allowed to dock in Italy, 26 June 2018. https://www.aljazeera.com/news/2018/06/danish-cargo-ship-carrying-refugees-allowed-dock-italy-180626081632471.html

  3. Atockar: Riding with the Stars: Passenger Privacy in the NYC Taxicab Dataset (2014). https://research.neustar.biz/2014/09/15/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset/

  4. Berendt, B.: More than modelling and hiding: towards a comprehensive view of web mining and privacy. Data Min. Knowl. Disc. 24(3), 697–737 (2012)

    Article  Google Scholar 

  5. Borghese, L., Vandoorne, S., Vonberg, J.: Migrant rescue ship Lifeline to dock in Malta after being stranded for five days in the Mediterranean. CNN News, 26 June 2018. https://edition.cnn.com/2018/06/26/europe/migrant-ships-maersk-lifeline-intl/index.html

  6. Cancellato, F.: Poche palle, i migranti della Asso 28 li abbiamo respinti noi: e la Libia è solo la foglia di fico della nostra ipocrisia. Linkiesta, 1 August 2018. https://www.linkiesta.it/it/article/2018/08/01/poche-palle-i-migranti-della-asso-28-li-abbiamo-respinti-noi-e-la-libi/39019/

  7. Conway, D.: The Data Science Venn Diagram (n.d.). http://drewconway.com/zia/2013/3/26/the-data-science-venn-diagram

  8. De Hert, P., Gutwirth, S.: Privacy, data protection and law enforcement. Opacity of the individual and transparency and power. In: Claes, E., Duff, A., Gutwirth, S. (eds.), Privacy and the Criminal Law, pp. 61–104. Antwerp/Oxford: Intersentia (2006)

    Google Scholar 

  9. Deibler, D.: EUROSUR - A Sci-fi border zone patrolled by drones? In: Camenisch, J., Fischer-Hübner, S., Hansen, M. (eds.) Privacy and Identity Management for the Future Internet in the Age of Globalisation, pp. 87–109. Springer, Berlin etc. (2015). https://doi.org/10.1007/978-3-319-18621-4

    Chapter  Google Scholar 

  10. Welle, D.: Germany pulls out of Mediterranean migrant mission Sophia, 23 January 2019. https://www.dw.com/en/germany-pulls-out-of-mediterranean-migrant-mission-sophia/a-47189097

  11. Domingo-Ferrer, J.: A three-dimensional conceptual framework for database privacy. In: Jonker, W., Petković, M. (eds.) SDM 2007. LNCS, vol. 4721, pp. 193–202. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-75248-6_14

    Chapter  Google Scholar 

  12. Douriez, M., Doraiswamy, H., Freire, J., Silva, C.T.: Anonymizing NYC taxi data: does it matter? In: Proceedings of 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), Montreal, QC, 2016, pp. 140–148 (2016)

    Google Scholar 

  13. Elliot, M., Mackey, E., O’Hary, K., Tudor, C.: The Anonymisation Decision-Making Framework. UKAN, Manchester (2016). http://ukanon.net/wp-content/uploads/2015/05/The-Anonymisation-Decision-making-Framework.pdf

  14. Friedewald, M., Finn, R., Wright, D.: Seven types of privacy. In: Gutwirth, S., Leens, R., De Hert, P., Poullet, Y. (eds.) European Data Protection: Coming of Age, pp. 3–32. Springer, Heidelberg (2013). https://doi.org/10.1007/978-94-007-5170-5_1

    Chapter  Google Scholar 

  15. Gürses, S.F., Berendt, B.: The social web and privacy. In: Ferrari, E., Bonchi, F. (eds.), Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques. Data Mining and Knowledge Discovery Series. Chapman & Hall/CRC Press, Boca Raton (2010). https://www.esat.kuleuven.be/cosic/publications/article-1304.pdf

  16. Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: Proceedings of 2015 IEEE CS Security and Privacy Workshops (2015). https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7163220

  17. Hildebrandt, M.: Privacy and identity. In: Claes, E., Duff, A., Gutwirth, S. (eds.) Privacy and the Criminal Law, pp. 43–58. Intersentia, Antwerp (2006)

    Google Scholar 

  18. Hoffmann, K., Boy, J., Leon-Dufour, J., Breen, D. Earney, C., Luengo-Oroz, M. Using big data to study rescue patterns in the Mediterranean. In: Fatal Journeys. vol. 3, Part 1: Improving Data on Missing Migrants, pp. 24–46. International Organization for Migration, Geneva (2017). https://publications.iom.int/system/files/pdf/fatal_journeys_volume_3_part_1.pdf

  19. Knapton, J.: General Data Protection Regulation: academic research (n.d.). https://www.information-compliance.admin.cam.ac.uk/files/gdpr_and_academic_research_v1.pdf

  20. La Repubblica: Diciotti, dopo dieci giorni i migranti sbarcano dalla nave, 26 August 2018. https://www.repubblica.it/cronaca/2018/08/26/news/migranti_diciotti_sbarco-204935293

  21. Li, J.P.K., Bhulai, S., van Essen, T.: Optimization of the revenue of the New York City taxi service using Markov decision processes. In: Proceedings of DATA ANALYTICS 2017: The Sixth International Conference on Data Analytics (2017). https://www.thinkmind.org/download.php?articleid=data_analytics_2017_4_10_68005

  22. Maldoff, G. How GDPR changes the rules for research. IAPP News (2016). https://iapp.org/news/a/how-gdpr-changes-the-rules-for-research/

  23. Medina, J.: U.N. says migrants’ return to Libya by Italian boat could be illegal. Reuters, 31 July 2018. https://www.reuters.com/article/us-europe-migrants-libya/migrants-return-to-libya-by-italian-boat-could-breach-international-law-u-n-idUSKBN1KL1K4

  24. Mendes, K., Ringrose, J., Keller, J.: #MeToo and the promise and pitfalls of challenging rape culture through digital feminist activism. Eur. J. Women’s Stud. 25(2), 236–246 (2018). https://doi.org/10.1177/1350506818765318

    Article  Google Scholar 

  25. Monroy, M.: Durch die Hintertür: Anschluss Libyens an europäische Überwachungssysteme. CILIP Blog, 19 January 2018. https://www.cilip.de/2018/01/19/durch-die-hintertuer-anschluss-libyens-an-europaeische-ueberwachungssysteme/

  26. Pandurangan, V.: On Taxis and Rainbows: Lessons from NYC’s improperly anonymized taxi logs (2014). https://tech.vijayp.ca/of-taxis-and-rainbows-f6bc289679a1

  27. Phillips, D.: Privacy policy and PETs: the influence of policy regimes on the development and social implications of privacy enhancing technologies. New Media Soc. 6(6), 691–706 (2004)

    Article  Google Scholar 

  28. Patroumpas, K., Alevizos, E., Artikis, A., Vodas, M., Pelekis, N., Theodoridis, Y.: Online event recognition from moving vessel trajectories. GeoInformatica 21(2), 389–427 (2017). https://doi.org/10.1007/s10707-016-0266-x

    Article  Google Scholar 

  29. Pratesi, F., Monreale, A., Trasarti, R., Giannotti, R., Pedreschi, D., Yanagihara, T.: PRUDEnce: a system for assessing privacy risk vs utility in data sharing ecosystems. Trans. Data Priv. 11(2), 139–167 (2018)

    Google Scholar 

  30. Solove, D.J.: Understanding Privacy. Harvard University Press, Cambridge (2008)

    Google Scholar 

  31. Taylor, L.: Safety in numbers? Group privacy and big data analytics in the developing world. In: Taylor, L., Floridi, L., van der Sloot, B. (eds.) Group Privacy. PSS, vol. 126, pp. 13–36. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46608-8_2

    Chapter  Google Scholar 

  32. Taylor, L., Floridi, L., van der Sloot, B. (eds.): Group Privacy. PSS, vol. 126. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46608-8

    Book  Google Scholar 

  33. Tazzioli, M.: Eurosur, humanitarian visibility, and (nearly) real-time mapping in the Mediterranean. ACME 15(3), 561–579 (2016). https://acme-journal.org/index.php/acme/article/view/1223/1201

    Google Scholar 

  34. The Guardian: EU declares migration crisis over as it hits out at ’fake news’, 6 March 2019. https://www.theguardian.com/world/2019/mar/06/eu-declares-migration-crisis-over-hits-out-fake-news-european-commission

  35. uluman: Identifying Muslim cabbies from trip data and prayer times (2015). https://www.reddit.com/r/dataisbeautiful/comments/2t201h/identifying_muslim_cabbies_from_trip_data_and/

  36. Varlamis, I., Tserpes, K., Sardianos, C.: Detecting search and rescue missions from AIS data. In: 2018 IEEE 34th International Conference on Data Engineering Workshops (ICDEW), Paris, 2018, pp. 60–65 (2018). http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8402020&isnumber=8402003

  37. Ziniti, A.: Migranti, inchiesta sul comportamento del rimorchiatore italiano Asso 28. La Repubblica, 8 August 2018. http://www.repubblica.it/cronaca/2018/08/08/news/migranti_presentato_un_esposto_sul_comportamento_del_rimorchiatore_italiano_asso_28-203654671/

  38. Ziniti, A.: Migranti Sea Watch anche in Italia, accordo europeo raggiunto con Malta. La Repubblica, 9 January 2019. https://www.repubblica.it/cronaca/2019/01/09/news/migranti_accordo-216163365/

Download references

Acknowledgements

I thank the members of the EU H2020 Marie-Skłodowska-Curie programme project MASTER for the inspiration to deal with the privacy aspects of AIS data and migrants, and for many valuable discussions of previous versions of this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bettina Berendt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Berendt, B. (2019). Privacy Beyond Confidentiality, Data Science Beyond Spying: From Movement Data and Data Privacy Towards a Wider Fundamental Rights Discourse. In: Naldi, M., Italiano, G., Rannenberg, K., Medina, M., Bourka, A. (eds) Privacy Technologies and Policy. APF 2019. Lecture Notes in Computer Science(), vol 11498. Springer, Cham. https://doi.org/10.1007/978-3-030-21752-5_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21752-5_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21751-8

  • Online ISBN: 978-3-030-21752-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics