SlideShare une entreprise Scribd logo
1  sur  19
Building Trust in a Tense
Information Society
MIT Startup Exchange – Cybersecurity Innovation
Daniel J. Weitzner
Director, Cybersecurity and Internet Policy Research
Initiative
Massachusetts Institute of Technology
28 May 2015
1
Tensions in our Information Society
reduce trust
1. Culture: Normalization of radical transparency
vs trust gap
2. User experience: Increased individual control of
personal data vs. opaque use
3. Political process: Major sector of
economy/society poorly understood
2
The Internet Trust Gap
3
Privacy built on trust, not fine print
No App Low Med. High
*
*
*
Participants based their decision on:
• Familiarity (i.e. trust) with the app.
• The type of app, in particular what
kinds of information the app already
has already access to.
Frequency of use had no effect;
No App Low Med. High
No App Low Med. High No App Low Med. High
No App Low Med. High
*
No App Low Med. High
Privacy Tipping Points in
Smartphones Privacy
Preferences
F Shih, I Liccardi, D Weitzner –
Proceedings ACM CHI, 2015
Normalization of Radical Transparency
Assange
Wall Street
Journal
‘What they
Know”
Manning
Snowden
• Snowden is neither the
first nor the last
• The dramatic response
of Silicon Valley
• Trust will require pro-
active transparency
51. Transparency without trust
Trust Challenge
Judge Reggie B. Walton, Chief Judge,
Foreign Intelligence Surveillance Court
“the court lacks the tools to
independently verify how
often the government’s
surveillance breaks the
court’s rules that aim to
protect Americans’ privacy”
• Washington Post, August 15,
2013
61. Transparency without trust
Growing Individual Control
7
• Personal health data tied to
individual
• How will this shape privacy
expectations?
2. Control vs opacity
Opaque decision making with ‘big data’
8
New Privacy Priorities: Prevent
Discrimination and Sustain Trust
Discrimination: “The
increasing use of
algorithms to make
eligibility decisions must
be carefully monitored for
potential discriminatory
outcomes for
disadvantaged groups,
even absent
discriminatory intent.“
10
Importance of Accountable Systems
“Although the state of the art is
still somewhat ad hoc, and
auditing is often not automated,
so‐called accountable systems
are beginning to be deployed.
The ability to detect violations of
privacy policies, particularly if the
auditing is automated and
continuous, can be used both to
deter privacy violations and to
ensure that violators are
punished. (pp. 42-43)
11
A Goal by Analogy: Financial Accounting
12
.
.
.
.
.
General Ledger
Transactions
Assets
…
…
Liabilities
…
…
Net Assets
Owners Equity
Financial
Balance Sheet
Accounting rules
Public
Trust
Personal Information Accountability
13
.
.
.
.
.
Personal Information
Transactions
Compliance
• FCRA #
• DAA #
• FISA #
• ECPA #
Non-compliance
• FCRA #
• DAA #
• FISA #
• ECPA #
Total Transactions
Net Accountability
Personal Information
Balance Sheet
Accountable
Systems Reasoning
Public
Trust
Detailed Explanation
“[Recipient,] Fred Agenti, is a member of a
Criminal Justice Agency…”
“Inquiry is about Robert B. Guy and is based on a
personally identifying characteristic…”
14Accountable Systems
REAL-TIME USAGE CONTROL
Confidential
Real-time usage control
Personal Information Balance Sheet
Stop Online Piracy Act: Grass Roots View
17
Stop Online Piracy Act: Engineer’s View
• “If enacted, either of these bills will create an environment
of tremendous fear and uncertainty for technological
innovation, and seriously harm the credibility of the United
States in its role as a steward of key Internet
infrastructure. Regardless of recent amendments to
SOPA, both bills will risk fragmenting the Internet's global
domain name system (DNS) and have other capricious
technical consequences. In exchange for this, such
legislation would engender censorship that will
simultaneously be circumvented by deliberate infringers
while hampering innocent parties' right and ability to
communicate and express themselves online.”
• https://www.eff.org/deeplinks/2011/12/internet-inventors-warn-
against-sopa-and-pipa
18
MIT Cybersecurity and Internet Policy
Research Initiative
19
Social Science
•Nazli Choucri, Political
Science
•Peter Diamond,
Economics
•Michael Fischer,
Anthropology and
Science , Tecnology &
Society
•Kenneth Oye, Political
Science
•Sherry Turkle, Sociology
and Science ,
Technology & Society
Engineering
• Hal Abelson, EECS
• Tim Berners-Lee, CSAIL
• David Clark, CSAIL
• Munther Dahleh, Institute On
Complex & Socio-Tech.
Systems
• Shafi Goldwasser, EECS
• Frans Kaashoek, EECS
• Nancy Leveson, Aeronautics &
Astronautics
• Silvio Micali, EECS
• Ron Rivest, EECS
• Daniela Rus, CSAIL
• Howie Shrobe, CSAIL
• Gerry Sussman, EECS
• Daniel Weitzner, CSAIL
Management
• Andrew Lo, Sloan
• Stu Madnick, Sloan

Contenu connexe

Tendances

CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
Sean Graham
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
Abegail Roberts
 

Tendances (20)

Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Data Breach Visualization
Data Breach VisualizationData Breach Visualization
Data Breach Visualization
 
Investigating tips
Investigating tipsInvestigating tips
Investigating tips
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Insider threat
Insider threatInsider threat
Insider threat
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 

Similaire à Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group.

Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
mihinpr
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
Numaan Huq
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
E Andrew Keeney
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
ramsetl
 

Similaire à Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group. (20)

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Cybersecurity Workshop
Cybersecurity Workshop Cybersecurity Workshop
Cybersecurity Workshop
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 

Plus de MIT Startup Exchange

Plus de MIT Startup Exchange (20)

STEX Workshop: Batteries and Beyond
STEX Workshop: Batteries and BeyondSTEX Workshop: Batteries and Beyond
STEX Workshop: Batteries and Beyond
 
Digital Healthcare Innovation Workshop 9.22.15
Digital Healthcare Innovation Workshop 9.22.15Digital Healthcare Innovation Workshop 9.22.15
Digital Healthcare Innovation Workshop 9.22.15
 
Nanotech and New Materials Workshop 10.29.15
Nanotech and New Materials Workshop 10.29.15Nanotech and New Materials Workshop 10.29.15
Nanotech and New Materials Workshop 10.29.15
 
2015 2016 stex workshop schedule
2015 2016 stex workshop schedule2015 2016 stex workshop schedule
2015 2016 stex workshop schedule
 
SHORTLIST
SHORTLISTSHORTLIST
SHORTLIST
 
Krystyn J. Van Vliet Advanced Manufacturing
Krystyn J. Van Vliet Advanced Manufacturing Krystyn J. Van Vliet Advanced Manufacturing
Krystyn J. Van Vliet Advanced Manufacturing
 
Brian Anthony MIT STEX Automation Workshop June 17, 2015
Brian Anthony MIT STEX Automation Workshop June 17, 2015Brian Anthony MIT STEX Automation Workshop June 17, 2015
Brian Anthony MIT STEX Automation Workshop June 17, 2015
 
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspectiveScott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
Scott Hibbard MIT STEX Factory Automation Challenges - an industry perspective
 
Liz Reynolds STEX Automation 6-17-15
Liz Reynolds STEX Automation 6-17-15Liz Reynolds STEX Automation 6-17-15
Liz Reynolds STEX Automation 6-17-15
 
Stex intro automation_2015
Stex intro automation_2015Stex intro automation_2015
Stex intro automation_2015
 
Automation agenda
Automation agendaAutomation agenda
Automation agenda
 
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures. Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
Cybersecurity investment trends, Chris Lynch, Partner, Atlas Ventures.
 
MIT's Cybersecurity startups by Trond A. Undheim
MIT's Cybersecurity startups by Trond A. UndheimMIT's Cybersecurity startups by Trond A. Undheim
MIT's Cybersecurity startups by Trond A. Undheim
 
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
Healthy Aging - Technology Solutions and Innovation from MIT-Connected Startu...
 
MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15MIT ILP STEX Cybersecurity Workshop 5.28.15
MIT ILP STEX Cybersecurity Workshop 5.28.15
 
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,..."MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
"MIT's Food Tech Startups," Trond Undheim, Ph.D., Lead, MIT Startup Exchange,...
 
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo.
"The Future of Food,"  Manoj Fenelon, Director of Foresight, PepsiCo. "The Future of Food,"  Manoj Fenelon, Director of Foresight, PepsiCo.
"The Future of Food," Manoj Fenelon, Director of Foresight, PepsiCo.
 
Food, Sensors, Startups - The Road Ahead From a MIT perspective
Food, Sensors, Startups - The Road Ahead From a MIT perspectiveFood, Sensors, Startups - The Road Ahead From a MIT perspective
Food, Sensors, Startups - The Road Ahead From a MIT perspective
 
Future opportunities for food tech product innovation from a research perspec...
Future opportunities for food tech product innovation from a research perspec...Future opportunities for food tech product innovation from a research perspec...
Future opportunities for food tech product innovation from a research perspec...
 
Twitter feed - Food Tech Innovation Workshop and Panel Discussion
Twitter feed  - Food Tech Innovation Workshop and Panel DiscussionTwitter feed  - Food Tech Innovation Workshop and Panel Discussion
Twitter feed - Food Tech Innovation Workshop and Panel Discussion
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT CSAIL Decentralized Information Group.

  • 1. Building Trust in a Tense Information Society MIT Startup Exchange – Cybersecurity Innovation Daniel J. Weitzner Director, Cybersecurity and Internet Policy Research Initiative Massachusetts Institute of Technology 28 May 2015 1
  • 2. Tensions in our Information Society reduce trust 1. Culture: Normalization of radical transparency vs trust gap 2. User experience: Increased individual control of personal data vs. opaque use 3. Political process: Major sector of economy/society poorly understood 2
  • 4. Privacy built on trust, not fine print No App Low Med. High * * * Participants based their decision on: • Familiarity (i.e. trust) with the app. • The type of app, in particular what kinds of information the app already has already access to. Frequency of use had no effect; No App Low Med. High No App Low Med. High No App Low Med. High No App Low Med. High * No App Low Med. High Privacy Tipping Points in Smartphones Privacy Preferences F Shih, I Liccardi, D Weitzner – Proceedings ACM CHI, 2015
  • 5. Normalization of Radical Transparency Assange Wall Street Journal ‘What they Know” Manning Snowden • Snowden is neither the first nor the last • The dramatic response of Silicon Valley • Trust will require pro- active transparency 51. Transparency without trust
  • 6. Trust Challenge Judge Reggie B. Walton, Chief Judge, Foreign Intelligence Surveillance Court “the court lacks the tools to independently verify how often the government’s surveillance breaks the court’s rules that aim to protect Americans’ privacy” • Washington Post, August 15, 2013 61. Transparency without trust
  • 7. Growing Individual Control 7 • Personal health data tied to individual • How will this shape privacy expectations? 2. Control vs opacity
  • 8. Opaque decision making with ‘big data’ 8
  • 9.
  • 10. New Privacy Priorities: Prevent Discrimination and Sustain Trust Discrimination: “The increasing use of algorithms to make eligibility decisions must be carefully monitored for potential discriminatory outcomes for disadvantaged groups, even absent discriminatory intent.“ 10
  • 11. Importance of Accountable Systems “Although the state of the art is still somewhat ad hoc, and auditing is often not automated, so‐called accountable systems are beginning to be deployed. The ability to detect violations of privacy policies, particularly if the auditing is automated and continuous, can be used both to deter privacy violations and to ensure that violators are punished. (pp. 42-43) 11
  • 12. A Goal by Analogy: Financial Accounting 12 . . . . . General Ledger Transactions Assets … … Liabilities … … Net Assets Owners Equity Financial Balance Sheet Accounting rules Public Trust
  • 13. Personal Information Accountability 13 . . . . . Personal Information Transactions Compliance • FCRA # • DAA # • FISA # • ECPA # Non-compliance • FCRA # • DAA # • FISA # • ECPA # Total Transactions Net Accountability Personal Information Balance Sheet Accountable Systems Reasoning Public Trust
  • 14. Detailed Explanation “[Recipient,] Fred Agenti, is a member of a Criminal Justice Agency…” “Inquiry is about Robert B. Guy and is based on a personally identifying characteristic…” 14Accountable Systems
  • 17. Stop Online Piracy Act: Grass Roots View 17
  • 18. Stop Online Piracy Act: Engineer’s View • “If enacted, either of these bills will create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. Regardless of recent amendments to SOPA, both bills will risk fragmenting the Internet's global domain name system (DNS) and have other capricious technical consequences. In exchange for this, such legislation would engender censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties' right and ability to communicate and express themselves online.” • https://www.eff.org/deeplinks/2011/12/internet-inventors-warn- against-sopa-and-pipa 18
  • 19. MIT Cybersecurity and Internet Policy Research Initiative 19 Social Science •Nazli Choucri, Political Science •Peter Diamond, Economics •Michael Fischer, Anthropology and Science , Tecnology & Society •Kenneth Oye, Political Science •Sherry Turkle, Sociology and Science , Technology & Society Engineering • Hal Abelson, EECS • Tim Berners-Lee, CSAIL • David Clark, CSAIL • Munther Dahleh, Institute On Complex & Socio-Tech. Systems • Shafi Goldwasser, EECS • Frans Kaashoek, EECS • Nancy Leveson, Aeronautics & Astronautics • Silvio Micali, EECS • Ron Rivest, EECS • Daniela Rus, CSAIL • Howie Shrobe, CSAIL • Gerry Sussman, EECS • Daniel Weitzner, CSAIL Management • Andrew Lo, Sloan • Stu Madnick, Sloan

Notes de l'éditeur

  1. How does trust gap effect commerce?
  2. Discuss tensions in our information society and how it shapes our research agenda
  3. Why does trust matter?
  4. Month long intensive study of smart phone users: How does context change amount of information shared? Major factor - Trusted app/collector: More info shared Use beneficial to individual: more shared But, More detail about purpose: less sharing Therefore – building broad trust in operation of systems is necessary
  5. Second tension – users experience and come to expect more control, ie personal health apps
  6. But large scale analytics tend to undermine trust because of their opacity Consider traditional credit scoring and new alternative ML-driven scoring from companies like Zest
  7. WH Big Data Privacy recognized risk of discrimination and need to build trust
  8. Accountable systems as a trust-building mechanism
  9. This is our ultimate goal: Predictable and reliable application of public rules to privacy data (red) producing a summary representation of any given financial entity (green) This is the basis for trillions of economic activity around the world – we should be aspire to this.
  10. Trust requires understanding of how systems function – just like accountable systems Fear that SOPA would ‘break the Internet’
  11. Very distinguished group of engineers express concern about destabilizing the DNS – but no data no abstract model of the DNS infrastructure from which to predict impact of law Opinion based on intuition – may well have been right, but it felt awkward.