Contextual Integrity through the lens of computer science

Similar documents
Context Sensitive Interactive Systems Design: A Framework for Representation of contexts

CyPhers Project: Main Results

Methodology for Agent-Oriented Software

Orchestration. Lighton Phiri. Supervisors: A/Prof. Hussein Suleman Prof. Dr. Christoph Meinel HPI-CS4A, University of Cape Town

PREFACE. Introduction

Living Labs: a systematic literature review

It Takes a Village : A Community Based Participatory Framework for Privacy Design

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy

EXECUTIVE BOARD MEETING METHODOLOGY FOR DEVELOPING STRATEGIC NARRATIVES

Object-Mediated User Knowledge Elicitation Method

DiMe4Heritage: Design Research for Museum Digital Media

Issues and Challenges in Coupling Tropos with User-Centred Design

Boundary Work for Collaborative Water Resources Management Conceptual and Empirical Insights from a South African Case Study

GDPR & Teknologiske Trends

With Wisdom We Explore

Towards a multi-view point safety contract Alejandra Ruiz 1, Tim Kelly 2, Huascar Espinoza 1

Guidelines for the Development of Historic Contexts in Wyoming

Distilling Scenarios from Patterns for Software Architecture Evaluation A Position Paper

2. CYBERSPACE Relevance to Sustainability? Critical Features Knowledge Aggregation and Facilitation Revolution Four Cases in the Middle East**

Contextual Design Observations

ARTEMIS The Embedded Systems European Technology Platform

Nuclear Knowledge Innovations Assimilation: The Impact of Organizational Knowledge Frames and Triple Helix Dynamics of Knowledge Base

CILIP Privacy Briefing 2017

PHOTOGRAPHY Course Descriptions and Outcomes

Understanding User s Experiences: Evaluation of Digital Libraries. Ann Blandford University College London

Call for Chapters for RESOLVE Network Edited Volume

Ethical, Epistemological, Methodological, Social and Other

Socio-cognitive Engineering

Six Steps to MDM Success

Playware Research Methodological Considerations

HELPING THE DESIGN OF MIXED SYSTEMS

This is a preview - click here to buy the full publication

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media

Social Analytics and Smart Cities HUSO 2017

Privacy Management in Smart Cities

Space Traffic Management as an International Legal Regime

CHAPTER 1: INTRODUCTION TO SOFTWARE ENGINEERING DESIGN

Part II Citizen Science, Participatory Sensing and Social Computation

Thomas Jefferson High School for Science and Technology INTRODUCTION TO SCIENCE POLICY Program of Studies

Goals of the AP World History Course Historical Periodization Course Themes Course Schedule (Periods) Historical Thinking Skills

Achievement Targets & Achievement Indicators. Envision, propose and decide on ideas for artmaking.

Principled Construction of Software Safety Cases

Abstract. Justification. Scope. RSC/RelationshipWG/1 8 August 2016 Page 1 of 31. RDA Steering Committee

Methodology. Ben Bogart July 28 th, 2011

Basic Ideas and Concepts of Science & Technology Studies

How to specify Non-functional Requirements to support seamless modeling?

November 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments

Leibniz Universität Hannover. Masterarbeit

Design thinking, process and creative techniques

Use of Ontology to Facilitate the Creation of Synthetic Imagery of Industrial Facilities

Scientific communication in the Humanities. Ida Raffaelli Department of linguistics, University of Zagreb

Research and Change Call for abstracts Nr. 2

Knowledge Brokerage for Sustainable Development

Digital Medical Device Innovation: A Prescription for Business and IT Success

Goals Planned Outcomes & Benefits Who Chairs:

Stakeholder and user involvement in backcasting and how this influences follow-up and spin-off

Data Analysis Fundamentals

Architectures On-Demand for Any Domain Using Stable Software Patterns

April Keywords: Imitation; Innovation; R&D-based growth model JEL classification: O32; O40

The Privacy Case. Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns. Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG

PhD course: Current issues in sustainability research (7.5 ECTS)

The current progress for. - Science & Technology -

Data Analysis Fundamentals

Information Sociology

Governance of complex systems A multi-level model Johannes Weyer Fabian Adelt Sebastian Hoffmann

Contents Introduction to Design Science Research Design Science Research in Information Systems Design Science Research Frameworks

First steps towards a mereo-operandi theory for a system feature-based architecting of cyber-physical systems

Scientific Transparency, Integrity, and Reproducibility

Second Annual Forum on Science, Technology and Innovation for the Sustainable Development Goals

Social Data Analytics Tool (SODATO)

Why Did HCI Go CSCW? Daniel Fallman, Associate Professor, Umeå University, Sweden 2008 Stanford University CS376

Excess online coming to terms with users and data. Minna Ruckenstein

SYSTEM ANALYSIS & STUDIES (SAS) PANEL CALL FOR PAPERS

The Oulu way of strengthening social impact of SSH sciences: From linear models of impact to productive interactions and beyond

About the Persuasion Context for BCSSs: Analyzing the Contextual Factors

Contribution of civil society to industrial safety and safety culture: lessons from the ECCSSafe European research project

LEADING DIGITAL TRANSFORMATION AND INNOVATION. Program by Hasso Plattner Institute and the Stanford Center for Professional Development

The Importance of Scientific Reproducibility in Evidence-based Rulemaking

Social Innovation and the Right to The City

1 Introduction. of at least two representatives from different cultures.

Can we better support and motivate scientists to deliver impact? Looking at the role of research evaluation and metrics. Áine Regan & Maeve Henchion

TEACHING PARAMETRIC DESIGN IN ARCHITECTURE

Science of Science & Innovation Policy and Understanding Science. Julia Lane

A STUDY ON THE DOCUMENT INFORMATION SERVICE OF THE NATIONAL AGRICULTURAL LIBRARY FOR AGRICULTURAL SCI-TECH INNOVATION IN CHINA

A SYSTEMIC APPROACH TO KNOWLEDGE SOCIETY FORESIGHT. THE ROMANIAN CASE

Privacy Values and Privacy by Design Annie I. Antón

The Research Project Portfolio of the Humanistic Management Center

0x1A Great Papers in Computer Security

SECOND GLOBAL SYMPOSIUM ON HEALTH SYSTEMS RESEARCH SCIENCE TO ACCELERATE UNIVERSAL HEALTH COVERAGE

Dynamics and Coevolution in Multi Level Strategic interaction Games. (CoNGas)

Below is provided a chapter summary of the dissertation that lays out the topics under discussion.

Open Science and Research Initiative Infrastructures and networking for Open Science Seminar on at the University of Helsinki

A differentiated approach to mission-oriented innovation policy: Contextualizing societal challenges in a problem-solution space

Constructivist perspective. Modelling with constructivist computing. How to get to Aizu? A sense-making artefact or construal 25/06/2011

Understanding Evaluating Shaping. Transdisciplinary Knowledge for a Sustainable Society

Information Communication Technology

Urban Big Data and City Dashboards: Praxis and Politics. Rob Kitchin NIRSA, National University of Ireland Maynooth

Argumentative Interactions in Online Asynchronous Communication

Knowledge Management for Command and Control

Transcription:

Contextual Integrity through the lens of computer science Sebastian Benthall Seda Gürses Helen Nissenbaum A presentation of S. Benthall, S. Gürses and H. Nissenbaum. Contextual Integrity through the Lens of Computer Science. Foundations and Trends in Privacy and Security, vol. 2, no. 1, pp. 1 69, 2017

Goals characterize the different ways various efforts have interpreted and applied CI; identify gaps in both contextual integrity and its technical projection that this body of work reveals; distill insights from these applications in order to facilitate future applications of contextual integrity in privacy research and design. Making CI more actionable for computer science and computer scientists.

Background: Context in computing and policy Contextual Integrity: Privacy as appropriate information flow according to contextual norms. Norms emerge within spheres of human activity, balancing societal values, contextual purposes, and participant ends. Uptake in computer science since 2006. Context in ubiquitous computing An earlier computer science research tradition, pioneered by e.g. Dey in 2001 is also concerned with privacy Context refers to a situation: facts about the user, computer, environment. Location, identity, state Context in policy Excitement about privacy as respect for context motivates computer science interest in Contextual Integrity... but within CS, multiple traditions are blended together.

Study: research questions RQ1. For what kind of problems and solutions do computer scientists use CI? Particular subfields of CS. RQ2. How have the authors dealt with the conceptual aspects of CI? Social contexts, norms with specific parameters... RQ3. How have the authors dealt with the normative aspects of CI? Norms are derived from social contexts, which are adaptations of a differentiated society. RQ4. Do the researchers expand on CI? Where do CS researchers need to fill gaps or add to CI to make concrete systems work?

Study: research method Developed analytic template based on research questions. Searched for CS papers that claim to be using CI. (We found 20) Applied analytic template systematically to each paper. Used results to derive answers to each research question. A systematic review of computer science literature using Contextual Integrity.

Results: RQ1 Architecture CS researchers used CI across a few classes of technical architecture. User interfaces and experiences. These focus on an individual user s activity and preferences, rather than social norms. Infrastructure. Catering to a large set of users and diverse applications. Social platforms. Technology that spans multiple social contexts. Technical platforms. Technology that mediates many different other technologies. What about the operators of these platforms? Formal models. Frameworks to be used in design, but without implementation details. Decentralization. Decentralized architectures mirror complexity of society itself. An interesting area for future research.

Results: RQ2 What did they mean by context? CS researchers had widely varying understandings of context ; e.g. sphere vs. situation. Substantiality: Abstract: Hospitals in general. Concrete: Mount Sinai Beth Israel hospital. Domain: Social: A classroom with a teacher and students is a social context. Technical: A language education mobile app. Stability: Representational: The Oval Office in the White House. Interactional: A flash mob is an interactional context. Valence: Normative: A conference Code of Conduct is an account of norms inherent in a context. Descriptive: A list of attendees, keynote speakers, and program committee members is a description of the context. Epistemology: Model-based: A parameterized definition of a context, e.g., context is location, time, and activity. Empirical: applying traffic and topic analysis to communications in order to surface contexts.

Results: RQ3 Source of Normativity CI is specific about where norms come from: social adaptation within differentiated spheres of society. Few CS papers used this as a source of normativity. Instead, they used others. Compliance and Policy. Goal of the system is to comply with existing laws and policies. Threats. System is designed with a Threat Model, typical of security research. User preferences and expectations. Individual user preferences and. expectations solicited. Engagement. Users interact with system to determine norms dynamically

Results: RQ4 Expanding CI Technological adaptation to changing social conditions. Technology operating in multiple contexts at once, or addressing context clash, where activity in different contexts interact. Addressing the temporality and duration of information, and its effect on privacy User decision making with respect to privacy and information flow controls.

Findings: RQ1 Architecture Theoretical Gaps: - Modular Contextual Integrity, faceting CI and giving guidelines for design and research at specific levels of the technical stack - Specific guidance for infrastructure design Calls to Action: - Be explicit about how system is situated among other actors (operators, moderators, etc.) - Develop formal models that connect user preferences with contextual norms

Findings: RQ2 Contexts Theoretical Gaps: - CI needs an account of how social spheres connect to sociotechnical situations - What about interactional contexts? Calls to Action: - Specifically address how context is used, and when technology bridges two or more meanings of the term - Detail flows of information to third parties; what context is that?

Findings: RQ3 Normativity Theoretical Gaps: - Connect CI s metaethical theory with concrete sources of normativity familiar to CS - Spheres to threats? - Spheres to user expectations? - Spheres to the law? Calls to Action: - Measuring norms, not expectations - Supporting user engagement around identifying norms - Technical solutions for handling conflicts over norms

Findings: RQ4 Expanding CI Theoretical Gaps: - Develop account of normative change and adaptation - Address the questions around multiple interacting contexts - Address privacy and time: duration of information, forgetting, etc. - What about user choice? Calls to Action: - More modeling CI from information theory, information flow security - CI and differential privacy?

Thanks! Contact: spb413@nyu.edu