SlideShare a Scribd company logo
1 of 18
Download to read offline
ITS och integritet
                                          - ITS & Privacy -

                                  Ph.D. project S-City
                           – Secure City for All through ITS –
                              at the ITS Research School


                                   Jana Sochor, M.Sc., Ph.D. Candidate
                                Royal Institute of Technology (KTH), Stockholm
                                           Transportation & Logistics
                                             janasoch@infra.kth.se


Jana Sochor, 2009-01-09, Transportforum                                          1
Outline of Presentation

                      • Background: S-City Project

                      • Potential of IT to Enhance Mobility

                      • Privacy

                      • Privacy Concerns

                      • Enhancing Privacy

                      • Conclusion

Jana Sochor, 2009-01-09, Transportforum                       2
Background: S-City Project

                      Goals:
                      • Understand the impact of (perceived) safety on
                        mobility – individual’s needs and behavior
                      • Explore the potential of ITS to impact
                        safety (perceptions)
                      • Address the potential ethical issues and trade-offs of
                        using technology to increase (perceived) safety

                      Current phase:
                      • preparing to gather data on mobility issues and
                        patterns as well as on privacy attitudes
                      • presented preliminary results at the 2008 ITS World
                        Congress, and preparing for 2009 in Stockholm


Jana Sochor, 2009-01-09, Transportforum                                          3
Potential of IT to Enhance Mobility

                      • Information – journey planning, maps, services

                      • Monitoring – sensors, surveillance systems

                      • Localization – navigation & (personal) alarms

                      • Identification – geotagging, virtual maps (RFID)

                      • Authorization – smart cards, RFID tags

                      • Communication – immediate and pervasive



Jana Sochor, 2009-01-09, Transportforum                                    4
IT Applications to Enhance Mobility

                      • Co-modal, directional services & (3D) maps

                      • Real-time parking management

                      • Advanced, dynamic congestion pricing

                      • Integrating PEVs into public transportation systems

                      • Panic alarm for mobile phones

                      • Mobile phone location information

                      • Specialized navigation systems,
                        e.g. for elderly & disabled persons

Jana Sochor, 2009-01-09, Transportforum                                       5
Privacy


                                                  Photo: Ian Britton, http://www.freefoto.com (copyright free)




                      Working definition:
                        controlling the amount of contact with others
                        (over time)

                      Balanced against the need for:
                      • access to goods and services,
                      • accountability,
                      • law enforcement,
                      • public health risks, etc.


Jana Sochor, 2009-01-09, Transportforum                                                                          6
Importance of Privacy

                      For individuals:
                      • Stable interpersonal relationships
                      • Development of individuality
                      • Personal autonomy
                      • Healthy functioning (psychologically & physically)
                      (Margulis, 2003)


                      For society:
                      • A collective value
                      • Support democratic political systems
                      • Build trust, which enables communication and
                         cooperation, economic & social relationships


Jana Sochor, 2009-01-09, Transportforum                                      7
Privacy Concerns & IT

                      Privacy concerns may be framed as matters of:
                      • Injustice
                           – inaccuracy, unjust inferences, repurposing, presumption of guilt

                      • Lack of control of information
                           – e.g. non-consensual data collection or use or disclosure

                      • Loss of dignity & autonomy
                           – e.g. lack of transparency or anonymity, unjustified disclosure

                      • Inconvenience
                           – e.g. difficult to find out what data has been collected, how it
                           has been used, or how to correct it

                      • Risk to life chances (social exclusion)
                           – focusing on certain geographic areas or social groups

Jana Sochor, 2009-01-09, Transportforum                                                         8
Privacy Concerns & IT

                      The U.S. National Research Council (2007) found that:

                      • Individuals’ power is limited

                      • IT has compromised privacy

                      • The loss of privacy often results in harm




                      How concerned should we be?




Jana Sochor, 2009-01-09, Transportforum                                       9
Concerns about Data

                      • Police make 3,000 requests for data from Oyster
                        cards (UK, Evening Standard, 2008-02-21)

                           “concerns about the apparent failure of Transport for London to
                           make clear to passengers that their travel data will be stored for
                           eight weeks at a time … in breach of the Data Protection Act.”

                      • SJ-lagring av kunddata får kritik
                           (Sweden, Svenska Dagbladet, 2008-12-23)

                           “Datainspektionen (DI) kräver att SJ inte lagrar information om
                           kunder och deras resor längre än 90 dagar. Därefter måste
                           uppgifterna avidentifieras.”




Jana Sochor, 2009-01-09, Transportforum                                                         10
Concerns about Tracking

                      • UK Company Reveals Precise Mobile Tracking
                        Method (UK, Red Orbit, 2008-08-04)

                            “…information about the habits of shoppers by tracking their
                           movements using an anonymous identifier that mobile phones
                           transmit. The approach will be useful for research, security and
                           improving services in environments ranging from train stations to
                           refugee camps.”


                      • Study secretly tracks cell phone users: Study
                        tracking 100,000 raises privacy, ethical questions
                           (USA, MSNBC, 2008-06-06)

                            “Researchers secretly tracked the locations of 100,000 people
                           outside the United States through their cell phone use…the study
                           was based on cell phone records from a private company”


Jana Sochor, 2009-01-09, Transportforum                                                        11
Concerns about Technology

                      • Lätt förfalska e-pass (Ny Teknik, 2008-08-28);
                        ‘Fakeproof’ e-passport is cloned in minutes
                           (The Times 2008-08-06 )

                           - “De digitala passen tycks vara lätta att förfalska. En it-forskare
                           i Holland lyckades klona mikrochipp i ett pass och lägga in en
                           bild … Chippen accepterades sedan som äkta i passläsare.”

                           - “The ability to clone chips leaves travelers vulnerable to identity
                           theft when they surrender their passports at hotels or car rental
                           companies.”




Jana Sochor, 2009-01-09, Transportforum                                                            12
Concerns about Technology

                      • Massachusetts Bay Transit Authority, MIT Students
                        Join to Discuss Improvements to Automated Fare
                        Collection System (USA, EFF, 2008-12-23)

                           The MBTA and the MIT students “agreed to work together to identify
                           and help improve security”, e.g. with the Charlie travel card


                      • Doubts raised over using CCTV cameras
                           (Australia, ABC News, 2008-05-07)

                           Criminologist Professor Paul Wilson, Bond University:
                           “the systems do little to prevent crime or catch offenders …
                           [and are] expensive … to set up and maintain”

                           Cameras a complement to, not a replacement for law enforcement
                           (Wells, Allard, & Wilson, 2006, Crime & CCTV in Australia: Understanding the
                           Relationship)

Jana Sochor, 2009-01-09, Transportforum                                                                   13
Privacy Concerns and ITS

                      2002 VINNOVA report on transport informatics &
                        privacy – CCTV in PT, localization, automatic speed controls,
                           cards for payment & access

                      • Concerns over:
                             – potential misuse & unauthorized access
                             – registering data about behavior, location,
                             accompanying persons
                             – data repurposing & integrating databases
                      • Conclusion: certain privacy intrusions may be
                        acceptable if the benefit is greater than the
                        consequences

                      But who decides this?

Jana Sochor, 2009-01-09, Transportforum                                                 14
Enhancing Privacy

                      • Privacy-Enhancing Technology (PET)
                        – encryption
                        – anonymize surveillance & databases

                      • Legislation

                      However:
                        “The law alone cannot protect privacy, as it is not
                        self-executing. Lawyers and technologists should
                        proactively try to solve privacy problems instead of
                        responding to complaints when harm has already
                        been done” – John Borking, “The use and value of privacy-
                           enhancing technologies” in The Glass Consumer: Life in a
                           Surveillance Society


Jana Sochor, 2009-01-09, Transportforum                                               15
Enhancing Privacy

                      • Individuals
                        – withhold information
                        – stay informed
                        – be proactive consumers & citizens

                      • Organizations
                        – least intrusive approach, e.g. data minimization
                        – limited access & abuse prevention
                        – notification & correction
                        – offer choices & means of recourse
                        – transparent policies
                        – Privacy Impact Assessment (PIA)



Jana Sochor, 2009-01-09, Transportforum                                      16
Conclusion

                      • IT has the potential to enhance mobility

                      • Using IT to enhance mobility gives rise to ethical
                        issues

                      • Such ethical issues need to be addressed in order for
                        ITS technologies to reach their full potential

                      • We all, as consumers & producers, researchers &
                        administrators, leaders & legislators, and as citizens,
                        can proactively design for & protect privacy




Jana Sochor, 2009-01-09, Transportforum                                           17
ITS och integritet
                                          - ITS & Privacy -

                               Thank you for listening!

                                           Happy New Year &
                                          Welcome to Stockholm
                                              in September!

                                   Jana Sochor, M.Sc., Ph.D. Candidate
                                Royal Institute of Technology (KTH), Stockholm
                                           Transportation & Logistics
                                             janasoch@infra.kth.se


Jana Sochor, 2009-01-09, Transportforum                                          18

More Related Content

Viewers also liked

Viewers also liked (9)

Session 69 Göran Erskérs
Session 69 Göran ErskérsSession 69 Göran Erskérs
Session 69 Göran Erskérs
 
Session 69 Marika Jenstav
Session 69 Marika JenstavSession 69 Marika Jenstav
Session 69 Marika Jenstav
 
Session 69 Isak Jarlebring
Session 69 Isak JarlebringSession 69 Isak Jarlebring
Session 69 Isak Jarlebring
 
Session 69 Cees de Wijs
Session 69 Cees de WijsSession 69 Cees de Wijs
Session 69 Cees de Wijs
 
Session 69 Christian Udin
Session 69 Christian UdinSession 69 Christian Udin
Session 69 Christian Udin
 
Session 69 Marie-Louise Lundgren
Session 69 Marie-Louise LundgrenSession 69 Marie-Louise Lundgren
Session 69 Marie-Louise Lundgren
 
Session 69 Björn Dramsvik
Session 69 Björn DramsvikSession 69 Björn Dramsvik
Session 69 Björn Dramsvik
 
Opening session José Viegas
Opening session José ViegasOpening session José Viegas
Opening session José Viegas
 
Crisis management & situational awareness system in smart Cities
Crisis management & situational awareness system in smart CitiesCrisis management & situational awareness system in smart Cities
Crisis management & situational awareness system in smart Cities
 

Similar to Session 69 Jana Sochor

Michael holland ppt
Michael holland pptMichael holland ppt
Michael holland pptLaura Manley
 
The death of data protection
The death of data protection The death of data protection
The death of data protection Lilian Edwards
 
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)IGN Vorstand
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...CREST @ University of Adelaide
 
Corridors of uncertainty submitted
Corridors of uncertainty submittedCorridors of uncertainty submitted
Corridors of uncertainty submittedKate Pangbourne
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behaviorgloriakt
 
Fosca Giannotti - Università di Pisa & ISTI-CNR - Big Data and Social Data Mi...
Fosca Giannotti - Università di Pisa & ISTI-CNR - Big Data and Social Data Mi...Fosca Giannotti - Università di Pisa & ISTI-CNR - Big Data and Social Data Mi...
Fosca Giannotti - Università di Pisa & ISTI-CNR - Big Data and Social Data Mi...AmbasciatadelCanada
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Mediachuckbt
 
Big data and smart cities: Key data issues
Big data and smart cities: Key data issuesBig data and smart cities: Key data issues
Big data and smart cities: Key data issuesrobkitchin
 
Big Data in a Digital City. Key Insights from the Smart City Case Study
Big Data in a Digital City. Key Insights from the Smart City Case StudyBig Data in a Digital City. Key Insights from the Smart City Case Study
Big Data in a Digital City. Key Insights from the Smart City Case StudyBYTE Project
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
Reality Mining and Urban Sensing
Reality Mining and Urban SensingReality Mining and Urban Sensing
Reality Mining and Urban SensingDarshan Santani
 
Internet of Things and Large-scale Data Analytics
Internet of Things and Large-scale Data Analytics Internet of Things and Large-scale Data Analytics
Internet of Things and Large-scale Data Analytics PayamBarnaghi
 

Similar to Session 69 Jana Sochor (20)

Michael holland ppt
Michael holland pptMichael holland ppt
Michael holland ppt
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
GI2010 symposium-longhorn (longhorn keynote-presentation_14_may)
 
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
 
Corridors of uncertainty submitted
Corridors of uncertainty submittedCorridors of uncertainty submitted
Corridors of uncertainty submitted
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behavior
 
Fosca Giannotti - Università di Pisa & ISTI-CNR - Big Data and Social Data Mi...
Fosca Giannotti - Università di Pisa & ISTI-CNR - Big Data and Social Data Mi...Fosca Giannotti - Università di Pisa & ISTI-CNR - Big Data and Social Data Mi...
Fosca Giannotti - Università di Pisa & ISTI-CNR - Big Data and Social Data Mi...
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Media
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
Martin ferguson
Martin fergusonMartin ferguson
Martin ferguson
 
Gérald Santucci
Gérald SantucciGérald Santucci
Gérald Santucci
 
Big data and smart cities: Key data issues
Big data and smart cities: Key data issuesBig data and smart cities: Key data issues
Big data and smart cities: Key data issues
 
Big Data in a Digital City. Key Insights from the Smart City Case Study
Big Data in a Digital City. Key Insights from the Smart City Case StudyBig Data in a Digital City. Key Insights from the Smart City Case Study
Big Data in a Digital City. Key Insights from the Smart City Case Study
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Smart phone and mobile phone risks
Smart phone and mobile phone risksSmart phone and mobile phone risks
Smart phone and mobile phone risks
 
Reality Mining and Urban Sensing
Reality Mining and Urban SensingReality Mining and Urban Sensing
Reality Mining and Urban Sensing
 
Mobile Data Analytics
Mobile Data AnalyticsMobile Data Analytics
Mobile Data Analytics
 
Internet of Things and Large-scale Data Analytics
Internet of Things and Large-scale Data Analytics Internet of Things and Large-scale Data Analytics
Internet of Things and Large-scale Data Analytics
 
MMRA QRCA NYC Mobile Qualitative Presentation
MMRA QRCA NYC Mobile Qualitative PresentationMMRA QRCA NYC Mobile Qualitative Presentation
MMRA QRCA NYC Mobile Qualitative Presentation
 

More from Transportforum (VTI)

Abstract session 64 Per Olof Bylund
Abstract session 64 Per Olof BylundAbstract session 64 Per Olof Bylund
Abstract session 64 Per Olof BylundTransportforum (VTI)
 

More from Transportforum (VTI) (20)

Session 26 2010 johan granlund
Session 26 2010 johan granlundSession 26 2010 johan granlund
Session 26 2010 johan granlund
 
Session 37 Bo Olofsson
Session 37 Bo OlofssonSession 37 Bo Olofsson
Session 37 Bo Olofsson
 
Session 28 Irene Isaksson-Hellman
Session 28 Irene Isaksson-HellmanSession 28 Irene Isaksson-Hellman
Session 28 Irene Isaksson-Hellman
 
Session 40 simon gripner
Session 40 simon gripnerSession 40 simon gripner
Session 40 simon gripner
 
Abstract session 64 Per Olof Bylund
Abstract session 64 Per Olof BylundAbstract session 64 Per Olof Bylund
Abstract session 64 Per Olof Bylund
 
Session 64 Per Olof Bylund
Session 64 Per Olof BylundSession 64 Per Olof Bylund
Session 64 Per Olof Bylund
 
Session 7 Leif Blomqvist
Session 7 Leif BlomqvistSession 7 Leif Blomqvist
Session 7 Leif Blomqvist
 
Session 7 Leif Blomqvist.ppt
Session 7 Leif Blomqvist.pptSession 7 Leif Blomqvist.ppt
Session 7 Leif Blomqvist.ppt
 
Session 28 Per Tyllgren
Session 28 Per TyllgrenSession 28 Per Tyllgren
Session 28 Per Tyllgren
 
Session 69 Tor Skoglund
Session 69 Tor SkoglundSession 69 Tor Skoglund
Session 69 Tor Skoglund
 
Session 69 Peter von Heidenstam
Session 69 Peter von HeidenstamSession 69 Peter von Heidenstam
Session 69 Peter von Heidenstam
 
Session 69 Bengt Andersson
Session 69 Bengt AnderssonSession 69 Bengt Andersson
Session 69 Bengt Andersson
 
Session 68 Sigurdur Erlingsson
Session 68 Sigurdur ErlingssonSession 68 Sigurdur Erlingsson
Session 68 Sigurdur Erlingsson
 
Session 68 Klas Hansson
Session 68 Klas HanssonSession 68 Klas Hansson
Session 68 Klas Hansson
 
Session 68 Jonas Ekblad
Session 68 Jonas EkbladSession 68 Jonas Ekblad
Session 68 Jonas Ekblad
 
Session 68 Johan Ullberg
Session 68 Johan UllbergSession 68 Johan Ullberg
Session 68 Johan Ullberg
 
Session 68 Björn Birgisson
Session 68 Björn BirgissonSession 68 Björn Birgisson
Session 68 Björn Birgisson
 
Session 67_2 Bengt-Åke Hultqvist
Session 67_2 Bengt-Åke HultqvistSession 67_2 Bengt-Åke Hultqvist
Session 67_2 Bengt-Åke Hultqvist
 
Session 67_1 Bengt-Åke Hultqvist
Session 67_1 Bengt-Åke HultqvistSession 67_1 Bengt-Åke Hultqvist
Session 67_1 Bengt-Åke Hultqvist
 
Session 67 Ylva Edwards
Session 67 Ylva EdwardsSession 67 Ylva Edwards
Session 67 Ylva Edwards
 

Recently uploaded

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Session 69 Jana Sochor

  • 1. ITS och integritet - ITS & Privacy - Ph.D. project S-City – Secure City for All through ITS – at the ITS Research School Jana Sochor, M.Sc., Ph.D. Candidate Royal Institute of Technology (KTH), Stockholm Transportation & Logistics janasoch@infra.kth.se Jana Sochor, 2009-01-09, Transportforum 1
  • 2. Outline of Presentation • Background: S-City Project • Potential of IT to Enhance Mobility • Privacy • Privacy Concerns • Enhancing Privacy • Conclusion Jana Sochor, 2009-01-09, Transportforum 2
  • 3. Background: S-City Project Goals: • Understand the impact of (perceived) safety on mobility – individual’s needs and behavior • Explore the potential of ITS to impact safety (perceptions) • Address the potential ethical issues and trade-offs of using technology to increase (perceived) safety Current phase: • preparing to gather data on mobility issues and patterns as well as on privacy attitudes • presented preliminary results at the 2008 ITS World Congress, and preparing for 2009 in Stockholm Jana Sochor, 2009-01-09, Transportforum 3
  • 4. Potential of IT to Enhance Mobility • Information – journey planning, maps, services • Monitoring – sensors, surveillance systems • Localization – navigation & (personal) alarms • Identification – geotagging, virtual maps (RFID) • Authorization – smart cards, RFID tags • Communication – immediate and pervasive Jana Sochor, 2009-01-09, Transportforum 4
  • 5. IT Applications to Enhance Mobility • Co-modal, directional services & (3D) maps • Real-time parking management • Advanced, dynamic congestion pricing • Integrating PEVs into public transportation systems • Panic alarm for mobile phones • Mobile phone location information • Specialized navigation systems, e.g. for elderly & disabled persons Jana Sochor, 2009-01-09, Transportforum 5
  • 6. Privacy Photo: Ian Britton, http://www.freefoto.com (copyright free) Working definition: controlling the amount of contact with others (over time) Balanced against the need for: • access to goods and services, • accountability, • law enforcement, • public health risks, etc. Jana Sochor, 2009-01-09, Transportforum 6
  • 7. Importance of Privacy For individuals: • Stable interpersonal relationships • Development of individuality • Personal autonomy • Healthy functioning (psychologically & physically) (Margulis, 2003) For society: • A collective value • Support democratic political systems • Build trust, which enables communication and cooperation, economic & social relationships Jana Sochor, 2009-01-09, Transportforum 7
  • 8. Privacy Concerns & IT Privacy concerns may be framed as matters of: • Injustice – inaccuracy, unjust inferences, repurposing, presumption of guilt • Lack of control of information – e.g. non-consensual data collection or use or disclosure • Loss of dignity & autonomy – e.g. lack of transparency or anonymity, unjustified disclosure • Inconvenience – e.g. difficult to find out what data has been collected, how it has been used, or how to correct it • Risk to life chances (social exclusion) – focusing on certain geographic areas or social groups Jana Sochor, 2009-01-09, Transportforum 8
  • 9. Privacy Concerns & IT The U.S. National Research Council (2007) found that: • Individuals’ power is limited • IT has compromised privacy • The loss of privacy often results in harm How concerned should we be? Jana Sochor, 2009-01-09, Transportforum 9
  • 10. Concerns about Data • Police make 3,000 requests for data from Oyster cards (UK, Evening Standard, 2008-02-21) “concerns about the apparent failure of Transport for London to make clear to passengers that their travel data will be stored for eight weeks at a time … in breach of the Data Protection Act.” • SJ-lagring av kunddata får kritik (Sweden, Svenska Dagbladet, 2008-12-23) “Datainspektionen (DI) kräver att SJ inte lagrar information om kunder och deras resor längre än 90 dagar. Därefter måste uppgifterna avidentifieras.” Jana Sochor, 2009-01-09, Transportforum 10
  • 11. Concerns about Tracking • UK Company Reveals Precise Mobile Tracking Method (UK, Red Orbit, 2008-08-04) “…information about the habits of shoppers by tracking their movements using an anonymous identifier that mobile phones transmit. The approach will be useful for research, security and improving services in environments ranging from train stations to refugee camps.” • Study secretly tracks cell phone users: Study tracking 100,000 raises privacy, ethical questions (USA, MSNBC, 2008-06-06) “Researchers secretly tracked the locations of 100,000 people outside the United States through their cell phone use…the study was based on cell phone records from a private company” Jana Sochor, 2009-01-09, Transportforum 11
  • 12. Concerns about Technology • Lätt förfalska e-pass (Ny Teknik, 2008-08-28); ‘Fakeproof’ e-passport is cloned in minutes (The Times 2008-08-06 ) - “De digitala passen tycks vara lätta att förfalska. En it-forskare i Holland lyckades klona mikrochipp i ett pass och lägga in en bild … Chippen accepterades sedan som äkta i passläsare.” - “The ability to clone chips leaves travelers vulnerable to identity theft when they surrender their passports at hotels or car rental companies.” Jana Sochor, 2009-01-09, Transportforum 12
  • 13. Concerns about Technology • Massachusetts Bay Transit Authority, MIT Students Join to Discuss Improvements to Automated Fare Collection System (USA, EFF, 2008-12-23) The MBTA and the MIT students “agreed to work together to identify and help improve security”, e.g. with the Charlie travel card • Doubts raised over using CCTV cameras (Australia, ABC News, 2008-05-07) Criminologist Professor Paul Wilson, Bond University: “the systems do little to prevent crime or catch offenders … [and are] expensive … to set up and maintain” Cameras a complement to, not a replacement for law enforcement (Wells, Allard, & Wilson, 2006, Crime & CCTV in Australia: Understanding the Relationship) Jana Sochor, 2009-01-09, Transportforum 13
  • 14. Privacy Concerns and ITS 2002 VINNOVA report on transport informatics & privacy – CCTV in PT, localization, automatic speed controls, cards for payment & access • Concerns over: – potential misuse & unauthorized access – registering data about behavior, location, accompanying persons – data repurposing & integrating databases • Conclusion: certain privacy intrusions may be acceptable if the benefit is greater than the consequences But who decides this? Jana Sochor, 2009-01-09, Transportforum 14
  • 15. Enhancing Privacy • Privacy-Enhancing Technology (PET) – encryption – anonymize surveillance & databases • Legislation However: “The law alone cannot protect privacy, as it is not self-executing. Lawyers and technologists should proactively try to solve privacy problems instead of responding to complaints when harm has already been done” – John Borking, “The use and value of privacy- enhancing technologies” in The Glass Consumer: Life in a Surveillance Society Jana Sochor, 2009-01-09, Transportforum 15
  • 16. Enhancing Privacy • Individuals – withhold information – stay informed – be proactive consumers & citizens • Organizations – least intrusive approach, e.g. data minimization – limited access & abuse prevention – notification & correction – offer choices & means of recourse – transparent policies – Privacy Impact Assessment (PIA) Jana Sochor, 2009-01-09, Transportforum 16
  • 17. Conclusion • IT has the potential to enhance mobility • Using IT to enhance mobility gives rise to ethical issues • Such ethical issues need to be addressed in order for ITS technologies to reach their full potential • We all, as consumers & producers, researchers & administrators, leaders & legislators, and as citizens, can proactively design for & protect privacy Jana Sochor, 2009-01-09, Transportforum 17
  • 18. ITS och integritet - ITS & Privacy - Thank you for listening! Happy New Year & Welcome to Stockholm in September! Jana Sochor, M.Sc., Ph.D. Candidate Royal Institute of Technology (KTH), Stockholm Transportation & Logistics janasoch@infra.kth.se Jana Sochor, 2009-01-09, Transportforum 18