Surveillance and Privacy in the Information Age. Image courtesy of Josh Bancroft on flickr. License CC-BY-NC.

Similar documents
Artificial intelligence and judicial systems: The so-called predictive justice

Urban Big Data and City Dashboards: Praxis and Politics. Rob Kitchin NIRSA, National University of Ireland Maynooth

Research Methods in Crime and Justice Brief Table of Contents

Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics

HSX: ROLE OF BIG DATA

Principles and Rules for Processing Personal Data

Big Data & Ethics some basic considerations

Before the NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION Washington, D.C Docket No. NHTSA

AI Fairness 360. Kush R. Varshney

A Citizen s Guide. to Big Data and Your Privacy Rights in Nova Scotia. Office of the Information and Privacy Commissioner for Nova Scotia

Ethics of Data Science

OECD WORK ON ARTIFICIAL INTELLIGENCE

Gustav Jakob Petersson Swedish Research Council

AI & Law. What is AI?

Scientific Transparency, Integrity, and Reproducibility

The SAFARI Syndrome. Implementing CRIS and Open Science By Joachim Schöpfel, University of Lille 3

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

HUKUM DAN ETIKA PROFESI JURNALISTIK

2/15/2017 3:56 PM KEYNOTE ADDRESS

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Common Core Structure Final Recommendation to the Chancellor City University of New York Pathways Task Force December 1, 2011

SYLLABUS SOCI 221 Sociology of Cyberspace

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017

Transparency and Accountability of Algorithmic Systems vs. GDPR?

Most of us will have heard of Open Data. Many of us are working to implement it.

The Programmable City Smarter Cities. Tuesday, 9 May 2017

PREFACE. Introduction

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: T:Drive. Safeguarding Policy Data Protection Policy

THE USE OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING IN SPEECH RECOGNITION. A CS Approach By Uniphore Software Systems

CCTV Policy. Policy reviewed by Academy Transformation Trust on June This policy links to: Safeguarding Policy Data Protection Policy

Prof. Roberto V. Zicari Frankfurt Big Data Lab The Human Side of AI SIU Frankfurt, November 20, 2017

CS 4001 Possible Term Paper Topics

Collective Intelligence Versus the Expert Paradigm. Image courtesy of Marc Wathieu on flickr. License CC-BY-NC.

General Education Rubrics

Why AI Goes Wrong And How To Avoid It Brandon Purcell

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Spurring Big Data-Driven Innovation and Promoting Responsible Data Governance in a Privacy-Centred Europe

Innovations in Reinsurance. Andre Eisele, Swiss Re Head of Client Management P&C ANZ RDG Presentation 8 March 2017

North Carolina Fire and Rescue Commission. Certified Fire Investigator Board. Course Equivalency Evaluation Document

DIMACS/PORTIA Workshop on Privacy Preserving

MACHINE LEARNING. The Frontiers of. The Raymond and Beverly Sackler U.S.-U.K. Scientific Forum

Re-Considering Bias: What Could Bringing Gender Studies and Computing Together Teach Us About Bias in Information Systems?

AU PAIR REGISTRATION FORM

Big Data and Personal Data Protection Challenges and Opportunities

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota

Towards Trusted AI Impact on Language Technologies

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

COMEST CONCEPT NOTE ON ETHICAL IMPLICATIONS OF THE INTERNET OF THINGS (IoT)

The Onion Router: Understanding a Privacy Enhancing Technology Community

DESIGN IN THE ERA OF THE ALGORITHM. josh bigmedium.com

Ethical, Epistemological, Methodological, Social and Other

REMOTE SENSING AND PRIVACY ISSUES. Lynn Brien Geography 4810G 11/29/07

Course Form for PKU Summer School International 2019

Towards a Modern Approach to Privacy-Aware Government Data Releases

2. CYBERSPACE Relevance to Sustainability? Critical Features Knowledge Aggregation and Facilitation Revolution Four Cases in the Middle East**

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments

The robots are coming, but the humans aren't leaving

University of Southern California Guidelines for Assigning Authorship and for Attributing Contributions to Research Products and Creative Works

9TH INTERNATIONAL CONFERENCE ON INTERNET, LAW AND POLITICS (IDP 2013) BIG DATA: CHALLENGES AND OPPORTUNITIES REPORT

17.181/ SUSTAINABLE DEVELOPMENT Theory and Policy

The 45 Adopted Recommendations under the WIPO Development Agenda

Science-Policy Review

Leibniz Universität Hannover. Masterarbeit

Neurophysiology. The action potential. Why should we care? AP is the elemental until of nervous system communication

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

TRUSTING THE MIND OF A MACHINE

First hit on Google Image:

Unified Ethical Frame for Big Data Analysis IAF Big Data Ethics Initiative, Part A. Draft March 2015

Before the National Telecommunications & Information Administration Department of Commerce Washington, DC

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara

Data users and data producers interaction: the Web-COSI project experience

Semiotics in Digital Visualisation

The Importance of Scientific Reproducibility in Evidence-based Rulemaking

Last week a long-time friend asked what type of law I practice. I was surprised that he didn t know what I do for a

Ethical and social aspects of management information systems

Office for Nuclear Regulation Strategy

Image: alexaldo. Report The role of digital technology in tackling modern slavery Monday 12 Wednesday 14 June 2017 WP1546. In association with:

Big Data, privacy and ethics: current trends and future challenges

The Quest for the Perfect Search Engine: Values, Technical Design, and the Flow of Personal Information in Spheres of Mobility

Biometric Data, Deidentification. E. Kindt Cost1206 Training school 2017

Ethics Review Data Sharing Bridging Legal Environments

Artificial Intelligence: open questions about gender inclusion

Tuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers

Quantum Technologies Public Dialogue Report Summary

GUIDE TO SPEAKING POINTS:

Frequently Asked Questions

The Quantified Employee Self: Ethical & Legal Issues

FIPPs Fair Information Practice Principles

Human Rights in the era of Information and Communication Technology

Notice of Privacy Practices

Renewing Sociology in the Digital Age

Artificial Intelligence and the Law The Manipulation of Human Behaviour. Stanley Greenstein

Abuse Prevention of Street Camera Network by Browsing-History Disclosure

WIPO Development Agenda

ORDER OF THE PRESIDENT OF THE PEOPLE'S REPUBLIC OF CHINA

How open data can enhance social innovation

Predictive modelling

Research strategy LUND UNIVERSITY

Transcription:

Surveillance and Privacy in the Information Age Image courtesy of Josh Bancroft on flickr. License CC-BY-NC. 1

Basic attributes (Kitchin, 2014) High-volume High-velocity High-variety Exhaustivity (n=all) Fine resolution Relationality Flexibility Ref. Bollier, 2010 and Kitchin, 2014 IBM. All rights reserved. This content is excluded from our Creative Commons license. For more information, see http://ocw.mit.edu/help/faq-fair-use/.

New York City Courtesy of Mayor's Office of Data Analytics. Used with permission. 3

Total Information Awareness program This image is in the public domain. 4

Future Attribute Screening Technology This image is in the public domain. 5

John Wiley & Sons, Inc. All rights reserved. This content is excluded from our Creative Commons license. For more information, see http://ocw.mit.edu/help/faq-fair-use/. Richard Berk s algorithm that predicts if a criminal released from jail will be involved in an homicide. 6

Google. All rights reserved. This content is excluded from our Creative Commons license. For more information, see http://ocw.mit.edu/help/faq-fair-use/. 7

Microsoft. All rights reserved. This content is excluded from our Creative Commons license. For more information, see http://ocw.mit.edu/help/faq-fair-use/. 8

NASA. All rights reserved. This content is excluded from our Creative Commons license. For more information, see http://ocw.mit.edu/help/faq-fair-use/. NASA Center for Climate Simulation 9

Potential consequences of Big data misuses and abuses (Bollier, 2010): imperil consumer freedom imperil civil security imperil personal privacy imperil of civil liberties 10

Definition: systematic monitoring of people or groups, by means of personal data systems, in order to regulate or govern their behavior. (Degli Esposti, 2014) Applications: Recruitment and retention Customer loyalty Supply chain efficiency Security and risk prevention 11

Surveillance & Society (Sara Degli Esposti). All rights reserved. This content is excluded from our Creative Commons license. For more information, see http://ocw.mit.edu/help/faq-fair-use/. (Ref. Degli Esposti, 2014) 12

Main problems: unequal relationship between cie & customers happens without our knowledge (panopticon) (Ref. Degli Esposti, 2014) 13

People could eventually: pay more for health insurance be excluded from health coverage be denied a loan be subjected to profiling or extra scrutiny be kept in jail be arrested before committing a crime be found guilty by association (Ref. Mayer-Schönberger and Cukier, 2014) 14

Accusing a person of a possible behavior would: negate the very foundation of our justice (presumption of innocence and responsibility of people) deny human volition and free will exonerate us from any responsibility (Ref. Mayer-Schönberger and Cukier, 2014) 15

Should we accept to limit our individual freedom and rely on big data analytics for the common good? Can big data analytics help us to avoid gender discrimination and racial profiling? (Ref. Mayer-Schönberger and Cukier, 2014) 16

Strategies currently in place: notice and individual consent opting-out anonymization hacking privacy violators (Ref. Mayer-Schönberger and Cukier, 2014) 17

Potential solutions: shifting from privacy by consent to privacy by accountability defining new regulations (government or market?) redefining the notion of justice to preserve human agency opening the access to datasets and algorithms (transparency) mandating impartial experts to certify the algorithms and the interpretations blurring datasets (differential privacy) specifying how people can disprove a prediction about them (Ref. Mayer-Schönberger and Cukier, 2014) 18

Potential solutions (Bollier, 2010): erasing data after a given period of time giving to people the right to take possession of their data limiting data collection to what is needed favouring self-discipline by introducing new social norms gaming the system by voluntarily altering our behavior (Nissenbaum) being proactive 19

Paradigm shift Big data requires researchers to: deal with the abundance and embrace messiness conduct research with no precise question in mind gain insights from data (induction) instead of testing theories by analyzing data (deduction) use hundreds of algorithms instead of selecting one stop obsessing with causality and be satisfied with correlations (Ref. Kitchin, 2014) 20

Advantages of big data compared to traditional scientific methods: reduces the risk of error and bias associated with sampling (but can also face problems) provides the opportunity to create more dynamic and sophisticated models (but does not offer certainties) helps finding correlations that no theory can identify (but can lead to serious fallacies) allows to consider data once perceived as noise (Ref. Kitchin, 2014) 21

TWO SCHOOLS OF THOUGHT Empiricist (business): Big data can speak for themselves without the need of theories, models or hypothesis (fallacious) Big data analytics are free of human bias. They can be interpreted by anyone and their meanings transcend contexts (fallacious) Data-driven science (academia) Use of existing theories and concepts to analyze the datasets Use of big data to identify good questions and formulate hypothesis Use of datasets for answering questions that these datasets were not designed to answer (problem) (Ref. Kitchin, 2014) 22

Alternative path suggested by Kitchin (2014): Drawing on critical theory to frame how the research is conducted and how the results are interpreted. Admitting that research is never ideologically neutral and objective. Complementing big data studies with small data studies. 23

Bollier, David. 2010. The Promise and Peril of Big Data. Queenstown: The Aspen Institute. Degli Esposti, Sara. 2014. When Big Data Meets Dataveillance: The Hidden Side of Analytics. Surveillance & Society, vol. 12, no 2, pp. 209-225. Kitchin, Rob. 2014. Big Data, New Epistemologies and Paradigms Shifts. Big Data & Society, April-June, pp.1-12. Mayer-Schönberger, Viktor and Kenneth Cukier. 2014. Big Data. New York: Mariner Books. 24

Additional Resources Examples of Big Data: Public Health Flu trends from around the world Patients Like Me CareCloud Mini-Sentinel 23 and me RateMDs Security Centrifuge Systems TransHeat Application Censors in car seats Finance & Business I Know First - Daily Market Forecast FarmVille 2 The Numbers - Where Data and Movie Business Meet 25

Additional Resources cont. Services Inrix TripAdvisor CitySense Research Marine Explore 26

MIT OpenCourseWare http://ocw.mit.edu CMS.701 / CMS.901 Current Debates in Media Spring 2015 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.