SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
NEW CHALLENGES TO PRIVACY DUE
TO EMERGING TECHNOLOGIES AND
DIFFERENT PRIVACY PERCEPTION OF
YOUNGER GENERATIONS:

THE EU PRACTIS PROJECT
-

NIV_A@MLA/AC/IL
.1
.2

PRACTIS
-

.3

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
–

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
-

-

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
–(Polis

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
!!!
--

YouTube -

Facebook

Talkbacks
Twitter
Whatsup
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
www.youtube.com/watch?v=UrBq5Ble1Oo

Immigrants vs.
Natives
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
P R I VAC Y – AP P R A I S I N G C H AL L E N G E S TO
TECHNOLOGIES AND ETHICS
PROJECT ACRONYM: PRACTIS

PA R T I C I PA N T S : T E L AV I V
U N I V E R S I T Y ( C O O R D I N AT O R ) ,
NEXUS- BERLIN,
N A M O U R U N I V E R S I T Y- B E L G I U M ,
L O D G E U N I V E R S I T Y- P O L A N D ,
T E M P E R E U N I V E R S I T Y- F I N L A N D
ICT

.1

.2
EU-

.3

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
Number of respondents:
1428 respondents•
385 Israel•
177 Finland•
247 Germany•
261 Belgium•
222 Austria•
136 Poland•
Gender of respondents: •
55,7% female•
44,3% male•

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
Students use SNS mostly to communicate and exchange
information with ‚real world„s friends

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
Scenarios show that convenience, discounts, and an increase in security are perceived
as such benefits in everyday life situations.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
1.2. ONLINE ACTIVITIES AS PART OF THE SPHERE OF
PRIVACY

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
1.4. STUDENTS ARE READY TO TRADE OFF PRIVACY
FOR BENEFITS

Scenarios show that convenience, discounts, and an increase in security are perceived
as such benefits in everyday life situations.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
2.2. ADULTS HAVE A DIFFERENT USE OF ONLINE
COMMUNICATION TOOLS
Adults are shorter times online than students.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
2.2. ADULTS HAVE A DIFFERENT USE OF ONLINE
COMMUNICATION TOOLS
Adults use mainly person-to-person type of communication tools: e-mail (students use
mainly SNS)

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
2.3. FEWER ADULTS ARE WILLING TO USE EMERGING
TECHNOLOGIES

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
2. GENERATIONAL DIFFERENCES
1. Adults have a higher awareness for privacy and data
protection

2. Adults have a different use of online communication
tools
3. Fewer adults are willing to use emerging technologies
4. Adults are more willing to trade off privacy for security

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENCES AMONG COUNTRIES:
DIFFERENCES IN PRIVACY AWARENESS
Austria and Germany are more reluctant to use Facebook applications when
personal data is submitted. Israel, Poland, and Finland more willing to use
such applications.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
3.2. DIFFERENCES IN INTERNET USE

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
3.2. DIFFERENCES IN INTERNET USE

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
3.2. DIFFERENCES IN INTERNET USE

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
CROSS COUNTRY ANALYSIS
1. Differences in privacy awareness can be observed:
 Countries with a higher awareness: Germany, Belgium,
Austria
 Countries with a lower awareness: Israel, Poland,
Finland
2. Differences in Internet Use
3. Differences in SNS Use

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES
1. Nanotechnology and New Materials:
Future ultra-sensitive nanosensors are
envisioned, with a dramatic impact on
surveillance and security – and on privacy. It
is expected that such devices will be able,
for example, to detect drugs from saliva
samples of people, or to detect where a
person has been by quickly sampling minute
environmental clues on clothes.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES (CONT’)
2. Medicine, Biology and Biometrics: Such technologies together
with micro sampling devices could be used in the not-distant future to
achieve easy and clandestine approach to personal biological samples
and production of whole genomic sequences data, without permission
of the targeted person. This could result in genetic data being
unwillingly made available to interested bodies such as insurance
companies, and used by them to the detriment of those people, or for
"genetic blackmailing".
With regards to Biometrics, the ubiquitous implementation of new and
emerging surveillance technologies aimed to improve the security, in
face of new threats to the democratic society, is already a fact of life in
many countries.

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES (CONT’)
3. Robotics and cyborgs: Depending on their functions

and the variety of embedded sensors, the increasing
interaction of robots with humans poses privacy
concerns, in particular with regards to surveillance.
Moreover, social interaction with robots can have
"chilling effect": It can impact on our sense of being
alone and able to act freely. The mere presence of a
robot, especially a "humanoid" one, may create the
subjective feeling of being watched.
Example: "cyborg insects

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES (CONT’)
4. Cognition: In the not too distant future researchers will
probably achieve the ability to understand and describe the
biochemical and neuro-electrical processes associated with
human intentions, impulses, feelings, etc. and to transfer that
knowledge in terms of formally well-defined processes.
The recently developed "real-time functional MRI" (rtfMRI)
enables watching one‟s own brain activation „live‟, and
progress is made towards directly reading a person‟s
ongoing mental images. One possible application is highly
reliable lie detection, with potential impact on law
enforcement and security but also a dramatic potential for
misuse, e.g. by inappropriately screening employees or
insurance applicants

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES (CONT’)

5. Information and Communication
Technologies: The "digital universe" is growing at
an enormous pace. A significant part of it includes
personal information (“digital shadow”) created by
people or organizations (in everyday activities, and
in many cases unintentionally). The digital trails
that each of us leaves are getting richer as ICTrelated technologies make deeper inroads into our
life
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
THREATENING TECHNOLOGIES (CONT’)
A particularly notable aspect of ICTs is that of Ambient
Intelligence (AmI). AmI, and the closely related concept
of the "Internet of Things" (IoT) pertain to an idea of
ubiquitous "invisible" computers and sensors embedded
everywhere, and a multitude interconnected objects. AmI
system would be able to react appropriately to changes
in its environment, particularly to human behaviours.
As far as privacy is concerned, one key point of AmI
lies in the link between physiological data (gathered
through sensors) and emotional assessments that
automatically take place thanks to complex
algorithms.
Add to all that the “Big Data” capabilities.
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
PRINCIPLES FOR KEEPING REASONABLE PRIVACY
The right to close the door
Consent is a critical key of privacy protection
Transparency

Proportionality (in balance with other societal needs)
Privacy by design
Data Subject's Control
Reveal purpose of data acquisition
Meeting Points

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
PRIVACY CHALLENGES - DEFINITION

The situation in which an
emerging & future technology
is likely to have a negative
implication on privacy;
and
where this negative implication is
likely to be perceived as such in
the future
DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
PRIVACY CHALLENGES
Loss of Control
Privacy Divides
Distributed Agencies

Privacy Paradox
Notoriously difficult to define privacy
Privacy vs. efficiency; trade-offs (control, distributed
agency, paradox), national security, law enforcement

Globalization
EU harmonization
Enforcement

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
MAJOR RECOMMENDATIONS
Basket of Solutions
Data Subject's Control
Privacy by Design (PbD)
Encourage the development and exploitation of Privacy Enhancing
Technologies (PETs)
Education program towards "safe use of the Internet“
Define the roles and broaden the scope of the duties of Data Protection
Agencies

Consent
Define by law and regulations the right to close the door and to be
forgotten
Legislation targeting individuals the breach privacy
Meeting Points

Define by law and regulations the requirements for transparency and
proportionality
Data categorization
Labelling
Initiation of a 'grey ecology'

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS
MAJOR RECOMMENDATIONS (CONT’)
Reduce privacy divides:
Identify the many causes of privacy divides. Based on the
findings, possible policy responses include:
Raising awareness of privacy issues, so to address
divides that are the result of ignorance.
Providing assistance to those in the need, such as people
with disabilities, the elder, and children.
Simplifying enforcement means so that they are more
accessible to more people; adding legal avenues for
enforcement on behalf of those who do not access the
judicial system.
Regulating data controllers' behaviour, by requiring them
to use simple, easy to understand, ways of conveying
information about their data practices.
Mandatory PETs; regulation of prices of technologies.
The regulation could also require that whenever a
traceless technology alternativePexists, Eit C E P T I O Nbe offered
must O F Y O U N G E R
DIFFERENT
RIVACY P R
GENERATIONS
at the same price as the tracing technology.
–
Niv Ahituv, “The Open Information Society”,
Communications of the ACM, Vol.44, No. 6 (June 2001),
pp 48-52.
www.practis.org

DIFFERENT PRIVACY PERCEPTION OF YOUNGER
GENERATIONS

Contenu connexe

Tendances

Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson
 
Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Simon Fraser University
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingDr. Michael Agbaje
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
 
Question chapter 1
Question chapter 1Question chapter 1
Question chapter 1Aten Kecik
 
digital citizenship
digital citizenshipdigital citizenship
digital citizenshiptooraw
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Mattercaitystew
 
Mind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceMind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceStewart Kowalski
 
Intimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourIntimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourKarlos Svoboda
 
Neural devices will change humankind
Neural devices will change humankindNeural devices will change humankind
Neural devices will change humankindKarlos Svoboda
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paperAkshay Sinha
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
Internet Science
Internet ScienceInternet Science
Internet Sciencei_scienceEU
 

Tendances (19)

Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart Devices
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...Wearing safe: Physical and informational security in the age of the wearable ...
Wearing safe: Physical and informational security in the age of the wearable ...
 
Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital Watermarking
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Question chapter 1
Question chapter 1Question chapter 1
Question chapter 1
 
Djemelle t (1)
Djemelle t (1)Djemelle t (1)
Djemelle t (1)
 
digital citizenship
digital citizenshipdigital citizenship
digital citizenship
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Matter
 
Mind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceMind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber Space
 
Intimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviourIntimate technology - the battle for our body and behaviour
Intimate technology - the battle for our body and behaviour
 
Neural devices will change humankind
Neural devices will change humankindNeural devices will change humankind
Neural devices will change humankind
 
Inria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directionsInria - Cybersecurity: current challenges and Inria’s research directions
Inria - Cybersecurity: current challenges and Inria’s research directions
 
Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
Internet Science
Internet ScienceInternet Science
Internet Science
 

En vedette

Nanophotonics Science Camp (29 08-13)
Nanophotonics Science Camp (29 08-13)Nanophotonics Science Camp (29 08-13)
Nanophotonics Science Camp (29 08-13)durnik
 
Lecturer at Erasmus Mundu Spring School (2013)
Lecturer at Erasmus Mundu Spring School (2013)Lecturer at Erasmus Mundu Spring School (2013)
Lecturer at Erasmus Mundu Spring School (2013)durnik
 
Meta13 (19 03-13)
Meta13  (19 03-13)Meta13  (19 03-13)
Meta13 (19 03-13)durnik
 
ICreaNet workshop
ICreaNet workshopICreaNet workshop
ICreaNet workshopgkurtz
 
Stop Rewarding Loyalty
Stop Rewarding LoyaltyStop Rewarding Loyalty
Stop Rewarding LoyaltyWill Lytle
 
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...Alfred Griffioen
 
Virtual conference 2.0
Virtual conference 2.0Virtual conference 2.0
Virtual conference 2.0gkurtz
 
Kempston solicitors
Kempston solicitorsKempston solicitors
Kempston solicitorsAnne Cole
 
Task 7 questionnaire analysis
Task 7 questionnaire analysisTask 7 questionnaire analysis
Task 7 questionnaire analysisandrew_boardy
 
Raspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreRaspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreBenjamin Moore
 
uriPresentation iain goodyear sound design
uriPresentation iain goodyear sound designuriPresentation iain goodyear sound design
uriPresentation iain goodyear sound designcrisgalliano
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentationburak27000
 
Company presentation short
Company presentation shortCompany presentation short
Company presentation shortlotharsindel
 
Roiloannhancach
RoiloannhancachRoiloannhancach
RoiloannhancachNgoc Quang
 

En vedette (19)

Nanophotonics Science Camp (29 08-13)
Nanophotonics Science Camp (29 08-13)Nanophotonics Science Camp (29 08-13)
Nanophotonics Science Camp (29 08-13)
 
Lecturer at Erasmus Mundu Spring School (2013)
Lecturer at Erasmus Mundu Spring School (2013)Lecturer at Erasmus Mundu Spring School (2013)
Lecturer at Erasmus Mundu Spring School (2013)
 
Meta13 (19 03-13)
Meta13  (19 03-13)Meta13  (19 03-13)
Meta13 (19 03-13)
 
ICreaNet workshop
ICreaNet workshopICreaNet workshop
ICreaNet workshop
 
Stop Rewarding Loyalty
Stop Rewarding LoyaltyStop Rewarding Loyalty
Stop Rewarding Loyalty
 
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...
Whitepaper Samenwerking tussen zzp'ers, freelancers, mkb'ers: cooperatie of c...
 
Virtual conference 2.0
Virtual conference 2.0Virtual conference 2.0
Virtual conference 2.0
 
Kempston solicitors
Kempston solicitorsKempston solicitors
Kempston solicitors
 
Task 7 questionnaire analysis
Task 7 questionnaire analysisTask 7 questionnaire analysis
Task 7 questionnaire analysis
 
Raspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMooreRaspi_TOR_Access_Point_BenMoore
Raspi_TOR_Access_Point_BenMoore
 
uriPresentation iain goodyear sound design
uriPresentation iain goodyear sound designuriPresentation iain goodyear sound design
uriPresentation iain goodyear sound design
 
Unidad13
Unidad13Unidad13
Unidad13
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
мк
мкмк
мк
 
Company presentation short
Company presentation shortCompany presentation short
Company presentation short
 
Unidad2
Unidad2Unidad2
Unidad2
 
Urdu 29
Urdu 29Urdu 29
Urdu 29
 
Unidad10
Unidad10Unidad10
Unidad10
 
Roiloannhancach
RoiloannhancachRoiloannhancach
Roiloannhancach
 

Similaire à מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך

Privacy In Citizenfour
Privacy In CitizenfourPrivacy In Citizenfour
Privacy In CitizenfourCrystal Nelson
 
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldTed Myerson
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionIRJET Journal
 
Mapping And Sharing, The Consumer Genome By Natasha Singer
Mapping And Sharing, The Consumer Genome By Natasha SingerMapping And Sharing, The Consumer Genome By Natasha Singer
Mapping And Sharing, The Consumer Genome By Natasha SingerTia Richardson
 
Outline D
Outline DOutline D
Outline Dbutest
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Ethical Issues Of Information Technology
Ethical Issues Of Information TechnologyEthical Issues Of Information Technology
Ethical Issues Of Information TechnologySandra Arveseth
 
The Impact Of Internet On Information Privacy
The Impact Of Internet On Information PrivacyThe Impact Of Internet On Information Privacy
The Impact Of Internet On Information PrivacyPamela Smith
 
The Privacy Of A Computer System Essay
The Privacy Of A Computer System EssayThe Privacy Of A Computer System Essay
The Privacy Of A Computer System EssaySamantha Randall
 
The Evolution Of Privacy
The Evolution Of PrivacyThe Evolution Of Privacy
The Evolution Of PrivacyTiffany Love
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 
How Is Technology Hindering Society
How Is Technology Hindering SocietyHow Is Technology Hindering Society
How Is Technology Hindering SocietyHeather Beninati
 
Privacy And The Right Of Privacy Essay
Privacy And The Right Of Privacy EssayPrivacy And The Right Of Privacy Essay
Privacy And The Right Of Privacy EssayJen Cloud
 
Types Of Security Breaches And Issues
Types Of Security Breaches And IssuesTypes Of Security Breaches And Issues
Types Of Security Breaches And IssuesLaura Arrigo
 
Eyewitness Memory For A Simulated Misdemeanor Crime
Eyewitness Memory For A Simulated Misdemeanor CrimeEyewitness Memory For A Simulated Misdemeanor Crime
Eyewitness Memory For A Simulated Misdemeanor CrimeLisa Martinez
 

Similaire à מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך (20)

Privacy In Citizenfour
Privacy In CitizenfourPrivacy In Citizenfour
Privacy In Citizenfour
 
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected WorldAnonos Dynamic Data Obscurity - Privacy For The Interconnected World
Anonos Dynamic Data Obscurity - Privacy For The Interconnected World
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
 
Mapping And Sharing, The Consumer Genome By Natasha Singer
Mapping And Sharing, The Consumer Genome By Natasha SingerMapping And Sharing, The Consumer Genome By Natasha Singer
Mapping And Sharing, The Consumer Genome By Natasha Singer
 
Privacy Undertood
Privacy UndertoodPrivacy Undertood
Privacy Undertood
 
Outline D
Outline DOutline D
Outline D
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Ethical Issues Of Information Technology
Ethical Issues Of Information TechnologyEthical Issues Of Information Technology
Ethical Issues Of Information Technology
 
Essays On Privacy
Essays On PrivacyEssays On Privacy
Essays On Privacy
 
Essay On Invasion Of Privacy
Essay On Invasion Of PrivacyEssay On Invasion Of Privacy
Essay On Invasion Of Privacy
 
The Impact Of Internet On Information Privacy
The Impact Of Internet On Information PrivacyThe Impact Of Internet On Information Privacy
The Impact Of Internet On Information Privacy
 
The Privacy Of A Computer System Essay
The Privacy Of A Computer System EssayThe Privacy Of A Computer System Essay
The Privacy Of A Computer System Essay
 
The Evolution Of Privacy
The Evolution Of PrivacyThe Evolution Of Privacy
The Evolution Of Privacy
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
How Is Technology Hindering Society
How Is Technology Hindering SocietyHow Is Technology Hindering Society
How Is Technology Hindering Society
 
Privacy And The Right Of Privacy Essay
Privacy And The Right Of Privacy EssayPrivacy And The Right Of Privacy Essay
Privacy And The Right Of Privacy Essay
 
Types Of Security Breaches And Issues
Types Of Security Breaches And IssuesTypes Of Security Breaches And Issues
Types Of Security Breaches And Issues
 
Privacy And HIPAA
Privacy And HIPAAPrivacy And HIPAA
Privacy And HIPAA
 
Eyewitness Memory For A Simulated Misdemeanor Crime
Eyewitness Memory For A Simulated Misdemeanor CrimeEyewitness Memory For A Simulated Misdemeanor Crime
Eyewitness Memory For A Simulated Misdemeanor Crime
 

Dernier

CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...Nguyen Thanh Tu Collection
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptxraviapr7
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE
 

Dernier (20)

CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptxClinical Pharmacy  Introduction to Clinical Pharmacy, Concept of clinical pptx
Clinical Pharmacy Introduction to Clinical Pharmacy, Concept of clinical pptx
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024
 

מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך

  • 1. NEW CHALLENGES TO PRIVACY DUE TO EMERGING TECHNOLOGIES AND DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS: THE EU PRACTIS PROJECT - NIV_A@MLA/AC/IL
  • 3. – DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 4. - - DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 5. –(Polis DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 6. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 10. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 11. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 12. P R I VAC Y – AP P R A I S I N G C H AL L E N G E S TO TECHNOLOGIES AND ETHICS PROJECT ACRONYM: PRACTIS PA R T I C I PA N T S : T E L AV I V U N I V E R S I T Y ( C O O R D I N AT O R ) , NEXUS- BERLIN, N A M O U R U N I V E R S I T Y- B E L G I U M , L O D G E U N I V E R S I T Y- P O L A N D , T E M P E R E U N I V E R S I T Y- F I N L A N D
  • 14. Number of respondents: 1428 respondents• 385 Israel• 177 Finland• 247 Germany• 261 Belgium• 222 Austria• 136 Poland• Gender of respondents: • 55,7% female• 44,3% male• DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 15. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 16. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 17. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 18. Students use SNS mostly to communicate and exchange information with ‚real world„s friends DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 19. Scenarios show that convenience, discounts, and an increase in security are perceived as such benefits in everyday life situations. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 20. 1.2. ONLINE ACTIVITIES AS PART OF THE SPHERE OF PRIVACY DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 21. 1.4. STUDENTS ARE READY TO TRADE OFF PRIVACY FOR BENEFITS Scenarios show that convenience, discounts, and an increase in security are perceived as such benefits in everyday life situations. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 22. 2.2. ADULTS HAVE A DIFFERENT USE OF ONLINE COMMUNICATION TOOLS Adults are shorter times online than students. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 23. 2.2. ADULTS HAVE A DIFFERENT USE OF ONLINE COMMUNICATION TOOLS Adults use mainly person-to-person type of communication tools: e-mail (students use mainly SNS) DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 24. 2.3. FEWER ADULTS ARE WILLING TO USE EMERGING TECHNOLOGIES DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 25. 2. GENERATIONAL DIFFERENCES 1. Adults have a higher awareness for privacy and data protection 2. Adults have a different use of online communication tools 3. Fewer adults are willing to use emerging technologies 4. Adults are more willing to trade off privacy for security DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 26. DIFFERENCES AMONG COUNTRIES: DIFFERENCES IN PRIVACY AWARENESS Austria and Germany are more reluctant to use Facebook applications when personal data is submitted. Israel, Poland, and Finland more willing to use such applications. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 27. 3.2. DIFFERENCES IN INTERNET USE DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 28. 3.2. DIFFERENCES IN INTERNET USE DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 29. 3.2. DIFFERENCES IN INTERNET USE DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 30. CROSS COUNTRY ANALYSIS 1. Differences in privacy awareness can be observed:  Countries with a higher awareness: Germany, Belgium, Austria  Countries with a lower awareness: Israel, Poland, Finland 2. Differences in Internet Use 3. Differences in SNS Use DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 31. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 32. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 33. THREATENING TECHNOLOGIES 1. Nanotechnology and New Materials: Future ultra-sensitive nanosensors are envisioned, with a dramatic impact on surveillance and security – and on privacy. It is expected that such devices will be able, for example, to detect drugs from saliva samples of people, or to detect where a person has been by quickly sampling minute environmental clues on clothes. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 34. THREATENING TECHNOLOGIES (CONT’) 2. Medicine, Biology and Biometrics: Such technologies together with micro sampling devices could be used in the not-distant future to achieve easy and clandestine approach to personal biological samples and production of whole genomic sequences data, without permission of the targeted person. This could result in genetic data being unwillingly made available to interested bodies such as insurance companies, and used by them to the detriment of those people, or for "genetic blackmailing". With regards to Biometrics, the ubiquitous implementation of new and emerging surveillance technologies aimed to improve the security, in face of new threats to the democratic society, is already a fact of life in many countries. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 35. THREATENING TECHNOLOGIES (CONT’) 3. Robotics and cyborgs: Depending on their functions and the variety of embedded sensors, the increasing interaction of robots with humans poses privacy concerns, in particular with regards to surveillance. Moreover, social interaction with robots can have "chilling effect": It can impact on our sense of being alone and able to act freely. The mere presence of a robot, especially a "humanoid" one, may create the subjective feeling of being watched. Example: "cyborg insects DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 36. THREATENING TECHNOLOGIES (CONT’) 4. Cognition: In the not too distant future researchers will probably achieve the ability to understand and describe the biochemical and neuro-electrical processes associated with human intentions, impulses, feelings, etc. and to transfer that knowledge in terms of formally well-defined processes. The recently developed "real-time functional MRI" (rtfMRI) enables watching one‟s own brain activation „live‟, and progress is made towards directly reading a person‟s ongoing mental images. One possible application is highly reliable lie detection, with potential impact on law enforcement and security but also a dramatic potential for misuse, e.g. by inappropriately screening employees or insurance applicants DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 37. THREATENING TECHNOLOGIES (CONT’) 5. Information and Communication Technologies: The "digital universe" is growing at an enormous pace. A significant part of it includes personal information (“digital shadow”) created by people or organizations (in everyday activities, and in many cases unintentionally). The digital trails that each of us leaves are getting richer as ICTrelated technologies make deeper inroads into our life DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 38. THREATENING TECHNOLOGIES (CONT’) A particularly notable aspect of ICTs is that of Ambient Intelligence (AmI). AmI, and the closely related concept of the "Internet of Things" (IoT) pertain to an idea of ubiquitous "invisible" computers and sensors embedded everywhere, and a multitude interconnected objects. AmI system would be able to react appropriately to changes in its environment, particularly to human behaviours. As far as privacy is concerned, one key point of AmI lies in the link between physiological data (gathered through sensors) and emotional assessments that automatically take place thanks to complex algorithms. Add to all that the “Big Data” capabilities. DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 39. PRINCIPLES FOR KEEPING REASONABLE PRIVACY The right to close the door Consent is a critical key of privacy protection Transparency Proportionality (in balance with other societal needs) Privacy by design Data Subject's Control Reveal purpose of data acquisition Meeting Points DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 40. PRIVACY CHALLENGES - DEFINITION The situation in which an emerging & future technology is likely to have a negative implication on privacy; and where this negative implication is likely to be perceived as such in the future DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 41. PRIVACY CHALLENGES Loss of Control Privacy Divides Distributed Agencies Privacy Paradox Notoriously difficult to define privacy Privacy vs. efficiency; trade-offs (control, distributed agency, paradox), national security, law enforcement Globalization EU harmonization Enforcement DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 42. MAJOR RECOMMENDATIONS Basket of Solutions Data Subject's Control Privacy by Design (PbD) Encourage the development and exploitation of Privacy Enhancing Technologies (PETs) Education program towards "safe use of the Internet“ Define the roles and broaden the scope of the duties of Data Protection Agencies Consent Define by law and regulations the right to close the door and to be forgotten Legislation targeting individuals the breach privacy Meeting Points Define by law and regulations the requirements for transparency and proportionality Data categorization Labelling Initiation of a 'grey ecology' DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS
  • 43. MAJOR RECOMMENDATIONS (CONT’) Reduce privacy divides: Identify the many causes of privacy divides. Based on the findings, possible policy responses include: Raising awareness of privacy issues, so to address divides that are the result of ignorance. Providing assistance to those in the need, such as people with disabilities, the elder, and children. Simplifying enforcement means so that they are more accessible to more people; adding legal avenues for enforcement on behalf of those who do not access the judicial system. Regulating data controllers' behaviour, by requiring them to use simple, easy to understand, ways of conveying information about their data practices. Mandatory PETs; regulation of prices of technologies. The regulation could also require that whenever a traceless technology alternativePexists, Eit C E P T I O Nbe offered must O F Y O U N G E R DIFFERENT RIVACY P R GENERATIONS at the same price as the tracing technology.
  • 44. – Niv Ahituv, “The Open Information Society”, Communications of the ACM, Vol.44, No. 6 (June 2001), pp 48-52. www.practis.org DIFFERENT PRIVACY PERCEPTION OF YOUNGER GENERATIONS