1 / 43

Tension Between Privacy and the Social Benefits of Government Databases

Tension Between Privacy and the Social Benefits of Government Databases. George T. Duncan 2004 January 14. Security, Technology, and Privacy: Shaping a 21st Century Public Information Policy, 2003 April 24-25, Georgetown University Law Center, Washington, DC. Manchester Computing

jaafar
Télécharger la présentation

Tension Between Privacy and the Social Benefits of Government Databases

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Tension Between Privacy and the Social Benefits of Government Databases George T. Duncan 2004 January 14 Security, Technology, and Privacy: Shaping a 21st Century Public Information Policy, 2003 April 24-25, Georgetown University Law Center, Washington, DC

  2. Manchester Computing UK Joint Information Systems Committee ESRC Research Methods Programme Angela Dale Mike Daw UK Access Grid

  3. Themes • Technology driving costs of information process down, increasing tensions between privacy and data access • Analysis through the CSID framework • Private Lives and Public Policies vs. Public Lives and Private Policies • R-U Confidentiality Map • Information Ethics

  4. DATA CAPTURE DISSEMINTION Respondent Policy Analyst Data Snooper Information Organization Decision Maker Respondent Researcher Media Brokering Role of the Information Organization

  5. Technology Driving Costs Down • Data Capture • Data Storage • Data Integration • Data Dissemination

  6. Data Capture Widens • Radio frequency identification (RFID) • Bar code • Card technologies (magnetic stripe, smart card, contactless card, optical card) • Biometrics • Electronic article surveillance (EAS).

  7. Costs of Data Storage Plummet Source: Scientific American In 2003, Plasmon Juke Boxes priced at less than $4/gigabyte

  8. Data Integration Broadens

  9. Data Dissemination via Web Access Census Tract 1001, Salt Lake County, Utah U.S. Census Bureau, American FactFinder PCT3. SEX BY AGE [209] - Universe: Total populationRace or Ethnic Group: Total populationData Set:  Census 2000 Summary File 2 (SF 2) 100-Percent Data

  10. Low Cost of Information Raises… • Expectations about access to quality data • Fears about privacy invasions and confidentiality breeches

  11. Europe votes to end data privacyLaw will allow police to spy on phone and net traffic Stuart MillarFriday May 31, 2002The Guardian

  12. FIGHTING CRIME AND PROTECTING PRIVACY - PLANS UNVEILED TO REGULATE DATA ACCESS • Reference: 248/2003 - Date: 12 Sep 2003 10:10 • New measures announced today will ensure tight regulation of phone and internet records used to fight crime, striking the right balance between protecting privacy and protecting the public, said Home Office minister Caroline Flint.

  13. “Balance” is a value tradeoff, which begs… • An analytical framework for the information process • An information ethics

  14. Analytic Framework: the CSID Data Process • Capture • Storage • Integration • Dissemination

  15. The Beginning of the CSID Data Process Data Capture

  16. Data Storage

  17. Data Integration

  18. Data Dissemination

  19. Get Information to the Good Guys

  20. Keep Information from the Bad Guys

  21. Private Lives and Public Policies • Private Lives—Requisite for a free society • Public Policies—Data are the factual base need for informed public discussion

  22. Or is it now … Public Lives and Private Policies?

  23. Easy Slide to the Quagmire of Public Lives and Private Policies • Public Lives—Surveillance, required registration, divulgence of information • Private Policies—Secret, screened, restricted input

  24. Today’s Databases—Not just a System of Records • System of records • Flat file • Autonomous collection • Durable collection • Controlled collection • Today’s databases • Heterogeneous • Complex structure • Difficulties in semantic interoperability • Managed by multiple sites

  25. Governmental Databases • Survey • National Longitudinal Surveys of Young Women • Administrative Transactions • FAA Commercial Pilot Certificate • Required Private-Sector Data • SSA earnings records • Birth certificate information • ISP provision of subscriber information under the USA Patriot Act

  26. Why Confidentiality Matters • Ethical: Keeping promises; basic value tied to privacy concerns of solitude, autonomy and individuality • Pragmatic: Without confidentiality, respondent may not provide data; worse, may provide inaccurate data • Legal: Required under law

  27. Confidentiality Audit • Sensitive objects • Numeric values • Instances of relationships • Susceptible data • Geographical detail • Longitudinal or panel structure • Outliers • Many attribute variables • Census versus survey/sample • Existence of linkable external databases

  28. Restricted Access Restricted Data

  29. RESTRICTED ACCESS • U.S. Census Research Data Centers • National Center for Health Statistics Research Data Center • National Archive of Criminal Justice Data • Netherlands Center for Research of Economic Microdata (CEREM) • Luxembourg Integrated Research Infrastructurein the Socio-Economic Sciences(IRISS)

  30. RESTRICTED DATA • Transform data using disclosure limitation procedures • Lower disclosure risk • Maintain data utility

  31. Masked Data Model Estimation Virtual Data STATISTICAL DISCLOSURE LIMITATION Original Data

  32. Matrix Masking Y=AXB + C Disclosure Limitation: Transforming the original data (X)to the disseminated data (Y) • Local suppression • Adding noise • Sampling • Data swapping • Global recoding (coarsening) • Micro-aggregation

  33. Original Data Maximum Tolerable Risk Released Data No Data Data Utility U R-U Confidentiality Map Disclosure Risk R

  34. Democratic Accountability Constitutional Empowerment Information Ethics Information Justice Individual Autonomy

  35. Democratic Accountability • Organizations empowered by the people are accountable to the people • Access to information promotes accountability

  36. Constitutional Empowerment • Knowledge is power” • Capability of citizens to make informed decisions about political, economic and social questions • Constitutional practice emphasizes broad access to the political process

  37. Individual Autonomy • Capacity to function as individuals, uncoerced and cloaked with privacy • Compromised by • excessive surveillance to build data bases • irresponsible dissemination of personally identifiable data

  38. Information Justice • “My” group getting what they want • Fairness • Equal treatment for all • Social justice?

  39. Responsive to Changes in Societal Reality • Terrorist attacks of 9/11 prompts • USA Patriot Act • UK Anti-terrorism, Crime and Security Act • Overreaction?

  40. Whoever fights monsters should see to it that in the process he does not become a monster. And when you look long into an abyss, the abyss also looks into you. --Friedrich Nietzsche, Beyond Good and Evil

  41. Responsive to Changes in Technology • Information Management • XML • Data mining and search • Human-Computer Interaction • Accessible to broad range of public • “Every-citizen” usability • Network infrastructure • Encryption methods • E-commerce

  42. Our Path … • Seek Private Lives and Public Policies • Avoid Public Lives and Private Policies

More Related