1 / 26

DIGITAL PRIVACY AS A CURRENCY IN THE BIG DATA ECOSYSTEM

DIGITAL PRIVACY AS A CURRENCY IN THE BIG DATA ECOSYSTEM. Ast. Prof. Dr. Sonny Zulhuda Faculty of Law International Islamic University Malaysia e: sonny@iium.edu.my url: sonnyzulhuda.com tw: @zulhuda. Concept of privacy: Privacy: Right to be left alone

malloy
Télécharger la présentation

DIGITAL PRIVACY AS A CURRENCY IN THE BIG DATA ECOSYSTEM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DIGITAL PRIVACY AS A CURRENCY IN THE BIG DATA ECOSYSTEM Ast. Prof. Dr. Sonny Zulhuda Faculty of Law International Islamic University Malaysia e: sonny@iium.edu.my url: sonnyzulhuda.com tw: @zulhuda

  2. Concept of privacy: • Privacy: Right to be left alone • Three domains: Anonymity, Solitude & Secrecy • Privacy: Respect and Control • Privacy in the Islamic Perspective • Privacy under threat of technology?

  3. Sky News apologises after presenter is seen looking through MH17 passenger’s luggage The brief footage upset viewers claiming the British news channel violated the privacy of 298 victims who perished aboard the Malaysia Airlines plane.. “After assessing 205 complaints about the broadcast, there are grounds to investigate under our rule on potentially offensive material” (UK Office of Communications – OFCOM) Privacy Matters!

  4. 2012 (c) Sonny Zulhuda What is Privacy Right? • The state of being alone and not watched or disturbed. • The state of freedom from interference or public attention. • Includes three components: • Secrecy: information known about individual, • Anonymity: attention paid to an individual, and • Solitude: physical access to an individual. (See, Raymond Wacks. 1989. Personal information: Privacy and law. 15-16)

  5. "With Street View, we drive by exactly once, so you can just move!“ (Eric Schmidt, CEO, Google, 2010)

  6. Mislocated CCTV can be privacy-intrusive!Lew Cher Phow v Pua Yong Yong & Anor [2011] JOHOR BAHRU: Court held an installation of CCTV directed towards other person’s house entrance as a breach to privacy (2011) Sonny Zulhuda (c) 2014

  7. Sonny Zulhuda (c) 2015

  8. INTENDED EFFECT UNINTENDED EFFECT Sonny Zulhuda (c) 2015

  9. Unintended Effect of the Internet • “The internet has played a major role in undermining public morality. Our children are not safe from the kind of filth that the print and electronic media promote. Today any child can access pornography of the worse kind. Children are no longer safe from sexual assault. So are young girls and boys as the internet arouses the kind of base feelings that we curbed before…. Incest, child sex, sex with animals, sexual parties, sex in public and many other practices which we still feel are wrong will soon be a part of the expression of freedom and equality. All these will be promoted on the internet.” (Tun Dr. Mahathir Mohamad in chedet.cc) Sonny Zulhuda (c) 2015

  10. Privacy in Business and Technology • Data is asset; Privacy is currency • From marketing tools to product materials • Privacy protection leads to consumer trusts • Privacy-enhancing vs Privacy-intrusive • Lessons from the market: Google StreetView, Facebook “suggestions”, TOR browser, BitCoin, GoJek, etc.

  11. Privacy under pressure of technology, commerce, etc! Mobility BYOD Cloud computing The Internet of things BIG data Surveillance Transborder data flow Synchronisation Commercial gains Sonny Zulhuda (c) 2014

  12. Increasing Values of Personal Data Sonny Zulhuda (c) 2014

  13. Threats to Privacy: the three “BIGS”: • Big Brother • Surveillance, Snowden saga, e-KTP? • Big data brokers • Social media, mobile Apps, GPS, IoT, etc. • Big fan: Lovers or haters? • Identity fraud, identity theft, disclosure of data (MAS case)

  14. “I don't want to lie to you anymore. All right? I'm not a doctor. I never went to medical school. I'm not a lawyer, or a Harvard graduate, or a Lutheran. Brenda, I ran away from home a year and a half ago when I was 16.” (Leonardo as Frank Abagnale, Jr.) “Sometimes, it's easier living the lie.” (Tom Hanks as Carl Hanratty)

  15. Meet Qian Zhijun of Shanghai… "I felt awful when I found my picture edited into different images" "I didn't mind that netizens edited my picture as a joke, but I dislike those who change my pictures into low-class ones, like putting my face onto a naked dancing girl,"

  16. Incidents of ID Theft • In the US, nearly 10 million Americans fell victim of ID theft each year; • In 2003, FTC reported that ID theft alone costs nearly US$48 billion as annual costs for the businesses and an additional 5 bil per year for consumers; • In the UK, the ICO has reported over 277 breaches of significant volume since the His Majesty Revenue & Customs (HMRC) breach in November 2007; • MyCert of Malaysia reported in 2008 that Internet-related fraud dominates the security incidents attack.

  17. Top 5 ways youth’s identities are stolen Qwest Communications Teen Council Program • Posting their real name, address, date of birth and school on social networking sites; • Talking with strangers through their social networking page -- and in some cases meeting in person • Divulging social security numbers (like IC No.) on online job applications • Unable to recognize "phishing" emails • Storing personal information like their social security number and passwords in cell phones

  18. Social Engineering Methods • Winning a prize, lottery, gift, year-end bonus, etc.; • Business opportunities, investment, joint capital venture; • Romantic engagement, date, social relationship; • Security alert, password change, non-active online account; • Administrative works, database upgrading, status update; • Emergency nature, lost and found, criminal victims; • Personal problems, health, sex drugs, etc.

  19. Efforts to make • International Governance: Economic Treaties & Communities, Trade barrier, ISO • Domestic Governance: Laws & regulations adopting Fair Information Practices • Technical: towards privacy-enhancing technologies • Industrial: Consumers as stakeolders, trust is critical • Individual awareness: information security culture

  20. Principles of Fair Information Practices

  21. Knowing your digital privacy means…

  22. THANK YOU Dr. Sonny Zulhuda <sonnyzulhuda.com>

More Related