SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Prof.	
  Jean-­‐Henry	
  Morin	
  
University	
  of	
  Geneva	
  –	
  CUI	
  
Ins8tute	
  of	
  Informa8on	
  Service	
  Science	
  
Faculté	
  des	
  Sciences	
  de	
  la	
  Société	
  
	
  
Jean-­‐Henry.Morin@unige.ch	
  
@jhmorin	
  
Reinsta(ng	
  Trust	
  in	
  the	
  Digital	
  Age	
  
PwC 5th Digital Trust Conference
Geneva
March 17, 2015
Who has NEVER « worked around » security
policies to legitimately complete work that systems
Prevented from doing ?
3	
  
	
  
Security	
  is	
  bypassed,	
  
not	
  a2acked	
  
Inspired by Adi Shamir, Turing Award lecture, 2002
	
  
	
  
	
  
	
  
	
  
	
  	
  
	
  
Foreword	
  
Human	
  Factor	
  
Outline
•  A bit of context and technology
•  3 eras of Trust
•  Revisiting technology
•  Co-Compliance Principle and Digital Responsibility
•  Conclusions & Take Away
•  Q & A
Context	
  (I)	
  
Organiza8ons	
  &	
  Corporate	
  sector	
  
53	
  %	
  !!!	
  
6
Organizations & Corporate Sector :
Corporate Security Policies
53% admit circumventing corporate security policies to
get the work done (EMC RSA Security, 2008)
Among the most cited reasons justifying circumventing
corporate security policies (Cisco, 2008)
a)  Doesn’t correspond to the operational reality nor to what is
required to get the work done
b)  Need to access applications not belonging to or authorized by
corporate IT policies to work
Consequences : increase in risks and costs
•  Requires « creativity » to get the job done !
•  Increased stress due to unauthorized actions
•  Inefficiencies
•  Untraceable transgressions / violations
Informa8on	
  Protec8on	
  &	
  Control	
  
Today	
  
Perimeter	
  based	
  and	
  Access	
  Control	
  Lists	
  (ACL).	
  Beyond	
  ?	
  Not	
  much…	
  
?
Mobile Worker
Corporate Network
VPN
Context	
  (II)	
  
Entertainment	
  &	
  Media	
  sector	
  
© & the RIAA Scum Bird
http://bit.ly/akxivr
1	
  Technology	
  
DRM	
  
How did we get here…
… a dystopian scenario ?
http://www.flickr.com/search/?q=DRM
3	
  eras	
  of	
  trust	
  
•  Before	
  –	
  Suspicion	
  
•  Today	
  –	
  Breach	
  of	
  Trust	
  
•  Tomorrow	
  –	
  The	
  rise	
  of	
  «	
  informed	
  Trust	
  »	
  
h_p://eloquentscience.com/wp-­‐content/uploads/2012/05/past-­‐
present-­‐future-­‐sign1.jpg	
  
<	
  Before>	
  
Suspicion	
  &	
  Distrust	
  
	
  
18th	
  century	
  Jeremy	
  Bentham’s	
  Panop8con	
  
A Paradox
We talked about Trust and Trusted Computing
in the digital age…
…but everything relied on a distrust
assumption
http://zatoichi.homeip.net/~brain/TrustedComputing.jpg
<	
  Today	
  >	
  
Massive	
  Breach	
  of	
  Trust	
  
	
  
2013	
  =	
  PRISM	
  &	
  Co.	
  
<	
  Tomorrow	
  >	
  
	
  
The	
  rise	
  of	
  «	
  Informed	
  Trust	
  »	
  
Can IT be fixed ?
•  Acknowledging that :
•  Security is necessary (managed content)
•  Total Security is neither realistic nor desirable
•  Given the right User Experience and Business Models
most users smoothly comply (e.g., iTunes)
•  Most users aren’t criminals
•  We need to take a step back to :
•  Critically re-think Security, DRM, Trust
•  Reconsider the debate outside the either/or extremes of
total vs. no security
•  Factor in, by design, these issues for the development of
systems and services WE all use.
Rethinking & Redesigning
•  Acknowledge the Central role of the User and User
Experience
•  Reinstate Users in their roles & rights and Responsibilities
•  Presumption of innocence & the burden of proof
•  Fundamental guiding principle to Rethink and Redesign
DRM : Feltens’ “Copyright Balance” principle (Felten,
2005)
“Since lawful use, including fair use, of copyrighted works is in the
public interest, a user wishing to make lawful use of copyrighted
material should not be prevented from doing so by any DRM
system.”
•  Claim and Proposition :
•  Put the trust back into the hands of the users
•  Reverse the distrust assumption
Requires a major paradigm shift
From	
  Utopia	
  to	
  Reality	
  …	
  
The	
  Excep8on	
  Management	
  Model	
  
Rethinking & Redesigning DRM
•  Exception Management in DRM environments, mixing
water with fire ? Not necessarily !
•  Reversing the distrust assumption puts the user “in
charge”, facing his responsibilities
•  Allow users to make Exception Claims, granting them
Short Lived Licenses based on some form of logging and
monitoring
•  Use Credentials as tokens for logging to detect and
monitor abuses
•  Credential are Revocable in order to deal with abuse and
misuse situations
•  Mutually acknowledged need for managed content while
allowing all actors a smooth usability experience
(Morin and Pawlak, 2007, 2008); (Morin 2008, 2009)
Excep8on	
  Management	
  in	
  «	
  managed	
  content	
  »	
  
environments	
  
•  Auditable	
  model	
  covering	
  incident	
  and	
  abuse	
  detec;on	
  as	
  
well	
  as	
  revoca;on	
  
•  Burden	
  of	
  proof	
  on	
  the	
  party	
  having	
  a	
  jus8fiable	
  “claim”	
  regarding	
  abuse	
  
or	
  incidents	
  &	
  presump8on	
  of	
  innocence	
  
•  Monitoring	
  in	
  (near)	
  real	
  8me	
  of	
  security	
  policies	
  
Fasoo.com	
  
Technology Transfer
Academic partnership with Fasoo.com
•  June 2011, Integration of the Exception Management
model as « Provisional Licensing »
January	
  2015:	
  
85%	
  of	
  companies	
  using	
  
Fasoo	
  Enterprise	
  DRM	
  
provide	
  Excep8on	
  
Management	
  	
  
Ongoing	
  Work	
  …	
  	
  
•  DRM,	
  Security,	
  Trust	
  &	
  Block	
  Chain	
  
•  Security	
  Policy	
  Design	
  framework	
  
Perspec8ve…	
  
•  Take	
  into	
  account	
  the	
  Human	
  Factor	
  by	
  Design	
  
(People	
  Centric	
  Security,	
  PCS	
  [T.	
  Scholtz,	
  2012])	
  
•  Data	
  Protec8on	
  in	
  a	
  digital	
  economy	
  :	
  	
  
–  Awareness	
  raising	
  and	
  training	
  
–  The	
  EU	
  Data	
  Protec8on	
  reform:	
  re-­‐appropria;on	
  of	
  
data	
  and	
  personal	
  informa;on	
  by	
  the	
  people	
  
	
  
•  Public	
  Policies	
  and	
  Digital	
  Governance	
  :	
  Key	
  
success	
  factors,	
  Emergency!	
  
To Trust or not to be …
http://world.edu/wp-content/uploads/2013/02/climate-change-skeptics.jpg
Digital	
  Responsibility	
  :	
  Informed	
  Trust	
  &	
  Transparency	
  
Co-Compliance
•  Emerging principle relying on
« Informed Trust » and « Transparency »
•  Co-Compliance (short for collaborative compliance):
collaborative, shared responsibility enabled by digital
technologies allowing both joint elaboration of a decision or
action and the shared evaluation of its result.
Cost : Major paradigm shift !
(Morin,	
  2014)	
  
Digital Responsibility
Some Key characteristics (evolving) :
•  User Centered Design
•  Account for all stakeholders
•  Proportionality of the means to engage
•  Integrating the Human Factor
•  Openness and Transparency
•  Sharing and Collaboration
•  Limited and Humble use of the legal instrument
•  Leveraging sustainable public policies
(Morin,	
  2014)	
  
Conclusion
•  Trust assumes leaving to humans the capacity to
make free moral decision (Exception by Design)
•  Trust isn’t blind (managed, informed)
•  We are facing a MAJOR challenge of our
participative digital society
Is a socially responsible and sustainable
approach to trust in the digital era possible ?
References
J.-H. Morin, “Rethinking DRM Using Exception Management”, chapter III in
Handbook of Research on Secure Multimedia Distribution, S. Lian and Y. Zhang (Eds),
Information Science Reference (ISR), ISBN: 978-1-60566-262-6, IGI Global, March
2009, pp 39-54.
http://www.igi-global.com/reference/details.asp?id=33143
J.-H. Morin, “Exception Based Enterprise Rights Management : Towards a
Paradigm Shift in Information Security and Policy Management”, International
Journal On Advances in Systems and Measurements, issn 1942-261x, vol. 1, no. 1,
2008, pp. 40-49.
http://www.iariajournals.org/systems_and_measurements/
J.-H. Morin, “La responsabilité numérique : Restaurer la confiance à l'ère du
numérique“ FYP éditions, Avril 2014.
http://www.fypeditions.com/responsabilite-numerique/
Think(do)Tank on Service
Science and Innovation
http://thinkservices.info/
h_p://thinkdata.ch/	
  	
  
Swiss	
  Digital	
  Agenda	
  
Na8onal	
  debate	
  
h_p://NumeriCH.ch/	
  	
  
 
	
  
	
  
L e t ’ s 	
   b e 	
   D i g i t a l l y 	
   R e s p o n s i b l e 	
   ! 	
  
Q 	
   & 	
   A 	
  
	
  
	
  
Contacts:
Prof.	
  Jean-­‐Henry	
  Morin	
  
University	
  of	
  Geneva	
  –	
  CUI	
  
Ins8tute	
  of	
  Informa8on	
  Service	
  Science	
  
Faculté	
  des	
  Sciences	
  de	
  la	
  Société	
  
h_p://iss.unige.ch/	
  	
  
Jean-­‐Henry.Morin@unige.ch	
  
@jhmorin	
  
h_p://ch.linkedin.com/in/jhmorin	
  
h_p://www.slideshare.net/jhmorin	
  
h_p://jean-­‐henry.com/	
  
&	
  

Contenu connexe

Tendances

An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance frameworkAnne ndolo
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark, CISSP, CISA
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryWilliam Beer
 
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Booz Allen Hamilton
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAgeFriendlyEconomy
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Maurice Dawson
 
User privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingUser privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingLeMeniz Infotech
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2Donald Jennings
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectIOSR Journals
 

Tendances (19)

An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec Summary
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...
 
B018211016
B018211016B018211016
B018211016
 
User privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensingUser privacy and data trustworthiness in mobile crowd sensing
User privacy and data trustworthiness in mobile crowd sensing
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Esecurity e202
Esecurity e202Esecurity e202
Esecurity e202
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 

Similaire à Reinsta(ng Trust in the Digital Age

Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfWritten-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfjiricejka
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chainVanya Vladeva
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Brian Pichman
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profilepatelhiranya
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security PoliciesLaura Martin
 

Similaire à Reinsta(ng Trust in the Digital Age (20)

Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfWritten-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Internal social networks
Internal social networksInternal social networks
Internal social networks
 
Infosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.pptInfosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.ppt
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
Information Security Policies
Information Security PoliciesInformation Security Policies
Information Security Policies
 

Plus de University of Geneva

Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...University of Geneva
 
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016University of Geneva
 
Privacy by Design et Privacy by Default : Le point de vue de l'informaticien
Privacy by Design et Privacy by Default : Le point de vue de l'informaticienPrivacy by Design et Privacy by Default : Le point de vue de l'informaticien
Privacy by Design et Privacy by Default : Le point de vue de l'informaticienUniversity of Geneva
 
Swiss digital Agenda debate @Lift15
Swiss digital Agenda debate @Lift15 Swiss digital Agenda debate @Lift15
Swiss digital Agenda debate @Lift15 University of Geneva
 
La confiance à l’ère du numérique
La confiance à l’ère du numériqueLa confiance à l’ère du numérique
La confiance à l’ère du numériqueUniversity of Geneva
 
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...University of Geneva
 
Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society  Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society University of Geneva
 
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...University of Geneva
 
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting DemocracyLift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting DemocracyUniversity of Geneva
 
Keynote 5th Swiss Data Protection day, 2012
Keynote 5th Swiss Data Protection day, 2012Keynote 5th Swiss Data Protection day, 2012
Keynote 5th Swiss Data Protection day, 2012University of Geneva
 
Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?University of Geneva
 
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...University of Geneva
 
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...University of Geneva
 

Plus de University of Geneva (20)

Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
 
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
 
La Transition Numérique
La Transition NumériqueLa Transition Numérique
La Transition Numérique
 
Swiss Data Protection Day 2016
Swiss Data Protection Day 2016Swiss Data Protection Day 2016
Swiss Data Protection Day 2016
 
Privacy by Design et Privacy by Default : Le point de vue de l'informaticien
Privacy by Design et Privacy by Default : Le point de vue de l'informaticienPrivacy by Design et Privacy by Default : Le point de vue de l'informaticien
Privacy by Design et Privacy by Default : Le point de vue de l'informaticien
 
Swiss digital Agenda debate @Lift15
Swiss digital Agenda debate @Lift15 Swiss digital Agenda debate @Lift15
Swiss digital Agenda debate @Lift15
 
La confiance à l’ère du numérique
La confiance à l’ère du numériqueLa confiance à l’ère du numérique
La confiance à l’ère du numérique
 
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
 
Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society  Social Things, Data in a Digitally Responsible Society
Social Things, Data in a Digitally Responsible Society
 
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
 
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting DemocracyLift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
 
Talk Prix 2013 du PPDT Genève
Talk Prix 2013 du PPDT GenèveTalk Prix 2013 du PPDT Genève
Talk Prix 2013 du PPDT Genève
 
ThinkData @ NIA, Korea, 2012
ThinkData @ NIA, Korea, 2012ThinkData @ NIA, Korea, 2012
ThinkData @ NIA, Korea, 2012
 
Iff jam-2012-slides
Iff jam-2012-slidesIff jam-2012-slides
Iff jam-2012-slides
 
Keynote 5th Swiss Data Protection day, 2012
Keynote 5th Swiss Data Protection day, 2012Keynote 5th Swiss Data Protection day, 2012
Keynote 5th Swiss Data Protection day, 2012
 
First20120426jhm
First20120426jhmFirst20120426jhm
First20120426jhm
 
Causerie ThinkData April 2012
Causerie ThinkData April 2012Causerie ThinkData April 2012
Causerie ThinkData April 2012
 
Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?
 
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
 
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
 

Reinsta(ng Trust in the Digital Age

  • 1. Prof.  Jean-­‐Henry  Morin   University  of  Geneva  –  CUI   Ins8tute  of  Informa8on  Service  Science   Faculté  des  Sciences  de  la  Société     Jean-­‐Henry.Morin@unige.ch   @jhmorin   Reinsta(ng  Trust  in  the  Digital  Age   PwC 5th Digital Trust Conference Geneva March 17, 2015
  • 2. Who has NEVER « worked around » security policies to legitimately complete work that systems Prevented from doing ?
  • 3. 3     Security  is  bypassed,   not  a2acked   Inspired by Adi Shamir, Turing Award lecture, 2002                 Foreword   Human  Factor  
  • 4. Outline •  A bit of context and technology •  3 eras of Trust •  Revisiting technology •  Co-Compliance Principle and Digital Responsibility •  Conclusions & Take Away •  Q & A
  • 5. Context  (I)   Organiza8ons  &  Corporate  sector  
  • 7. Organizations & Corporate Sector : Corporate Security Policies 53% admit circumventing corporate security policies to get the work done (EMC RSA Security, 2008) Among the most cited reasons justifying circumventing corporate security policies (Cisco, 2008) a)  Doesn’t correspond to the operational reality nor to what is required to get the work done b)  Need to access applications not belonging to or authorized by corporate IT policies to work Consequences : increase in risks and costs •  Requires « creativity » to get the job done ! •  Increased stress due to unauthorized actions •  Inefficiencies •  Untraceable transgressions / violations
  • 8. Informa8on  Protec8on  &  Control   Today   Perimeter  based  and  Access  Control  Lists  (ACL).  Beyond  ?  Not  much…   ? Mobile Worker Corporate Network VPN
  • 9. Context  (II)   Entertainment  &  Media  sector  
  • 10. © & the RIAA Scum Bird http://bit.ly/akxivr
  • 12. How did we get here… … a dystopian scenario ? http://www.flickr.com/search/?q=DRM
  • 13. 3  eras  of  trust   •  Before  –  Suspicion   •  Today  –  Breach  of  Trust   •  Tomorrow  –  The  rise  of  «  informed  Trust  »   h_p://eloquentscience.com/wp-­‐content/uploads/2012/05/past-­‐ present-­‐future-­‐sign1.jpg  
  • 14. <  Before>   Suspicion  &  Distrust     18th  century  Jeremy  Bentham’s  Panop8con  
  • 15. A Paradox We talked about Trust and Trusted Computing in the digital age… …but everything relied on a distrust assumption http://zatoichi.homeip.net/~brain/TrustedComputing.jpg
  • 16. <  Today  >   Massive  Breach  of  Trust    
  • 17. 2013  =  PRISM  &  Co.  
  • 18. <  Tomorrow  >     The  rise  of  «  Informed  Trust  »  
  • 19. Can IT be fixed ? •  Acknowledging that : •  Security is necessary (managed content) •  Total Security is neither realistic nor desirable •  Given the right User Experience and Business Models most users smoothly comply (e.g., iTunes) •  Most users aren’t criminals •  We need to take a step back to : •  Critically re-think Security, DRM, Trust •  Reconsider the debate outside the either/or extremes of total vs. no security •  Factor in, by design, these issues for the development of systems and services WE all use.
  • 20. Rethinking & Redesigning •  Acknowledge the Central role of the User and User Experience •  Reinstate Users in their roles & rights and Responsibilities •  Presumption of innocence & the burden of proof •  Fundamental guiding principle to Rethink and Redesign DRM : Feltens’ “Copyright Balance” principle (Felten, 2005) “Since lawful use, including fair use, of copyrighted works is in the public interest, a user wishing to make lawful use of copyrighted material should not be prevented from doing so by any DRM system.” •  Claim and Proposition : •  Put the trust back into the hands of the users •  Reverse the distrust assumption Requires a major paradigm shift
  • 21. From  Utopia  to  Reality  …   The  Excep8on  Management  Model  
  • 22. Rethinking & Redesigning DRM •  Exception Management in DRM environments, mixing water with fire ? Not necessarily ! •  Reversing the distrust assumption puts the user “in charge”, facing his responsibilities •  Allow users to make Exception Claims, granting them Short Lived Licenses based on some form of logging and monitoring •  Use Credentials as tokens for logging to detect and monitor abuses •  Credential are Revocable in order to deal with abuse and misuse situations •  Mutually acknowledged need for managed content while allowing all actors a smooth usability experience (Morin and Pawlak, 2007, 2008); (Morin 2008, 2009)
  • 23. Excep8on  Management  in  «  managed  content  »   environments   •  Auditable  model  covering  incident  and  abuse  detec;on  as   well  as  revoca;on   •  Burden  of  proof  on  the  party  having  a  jus8fiable  “claim”  regarding  abuse   or  incidents  &  presump8on  of  innocence   •  Monitoring  in  (near)  real  8me  of  security  policies   Fasoo.com  
  • 24. Technology Transfer Academic partnership with Fasoo.com •  June 2011, Integration of the Exception Management model as « Provisional Licensing » January  2015:   85%  of  companies  using   Fasoo  Enterprise  DRM   provide  Excep8on   Management    
  • 25. Ongoing  Work  …     •  DRM,  Security,  Trust  &  Block  Chain   •  Security  Policy  Design  framework  
  • 26. Perspec8ve…   •  Take  into  account  the  Human  Factor  by  Design   (People  Centric  Security,  PCS  [T.  Scholtz,  2012])   •  Data  Protec8on  in  a  digital  economy  :     –  Awareness  raising  and  training   –  The  EU  Data  Protec8on  reform:  re-­‐appropria;on  of   data  and  personal  informa;on  by  the  people     •  Public  Policies  and  Digital  Governance  :  Key   success  factors,  Emergency!  
  • 27. To Trust or not to be … http://world.edu/wp-content/uploads/2013/02/climate-change-skeptics.jpg Digital  Responsibility  :  Informed  Trust  &  Transparency  
  • 28. Co-Compliance •  Emerging principle relying on « Informed Trust » and « Transparency » •  Co-Compliance (short for collaborative compliance): collaborative, shared responsibility enabled by digital technologies allowing both joint elaboration of a decision or action and the shared evaluation of its result. Cost : Major paradigm shift ! (Morin,  2014)  
  • 29. Digital Responsibility Some Key characteristics (evolving) : •  User Centered Design •  Account for all stakeholders •  Proportionality of the means to engage •  Integrating the Human Factor •  Openness and Transparency •  Sharing and Collaboration •  Limited and Humble use of the legal instrument •  Leveraging sustainable public policies (Morin,  2014)  
  • 30. Conclusion •  Trust assumes leaving to humans the capacity to make free moral decision (Exception by Design) •  Trust isn’t blind (managed, informed) •  We are facing a MAJOR challenge of our participative digital society Is a socially responsible and sustainable approach to trust in the digital era possible ?
  • 31. References J.-H. Morin, “Rethinking DRM Using Exception Management”, chapter III in Handbook of Research on Secure Multimedia Distribution, S. Lian and Y. Zhang (Eds), Information Science Reference (ISR), ISBN: 978-1-60566-262-6, IGI Global, March 2009, pp 39-54. http://www.igi-global.com/reference/details.asp?id=33143 J.-H. Morin, “Exception Based Enterprise Rights Management : Towards a Paradigm Shift in Information Security and Policy Management”, International Journal On Advances in Systems and Measurements, issn 1942-261x, vol. 1, no. 1, 2008, pp. 40-49. http://www.iariajournals.org/systems_and_measurements/ J.-H. Morin, “La responsabilité numérique : Restaurer la confiance à l'ère du numérique“ FYP éditions, Avril 2014. http://www.fypeditions.com/responsabilite-numerique/ Think(do)Tank on Service Science and Innovation http://thinkservices.info/ h_p://thinkdata.ch/     Swiss  Digital  Agenda   Na8onal  debate   h_p://NumeriCH.ch/    
  • 32.       L e t ’ s   b e   D i g i t a l l y   R e s p o n s i b l e   !   Q   &   A       Contacts: Prof.  Jean-­‐Henry  Morin   University  of  Geneva  –  CUI   Ins8tute  of  Informa8on  Service  Science   Faculté  des  Sciences  de  la  Société   h_p://iss.unige.ch/     Jean-­‐Henry.Morin@unige.ch   @jhmorin   h_p://ch.linkedin.com/in/jhmorin   h_p://www.slideshare.net/jhmorin   h_p://jean-­‐henry.com/   &