SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Privacy
as defense of own
information portfolio
why is worth,
why defense it.

Paolo Pedaletti: Paolo.Pedaletti@OpenLabs.it
Copyright (c) 2011 Paolo Pedaletti
Version 2013­01­09

“I have nothing
to hide”
Anonymous
(ignorant)
Paolo Pedaletti

Privacy as defense of own information portfolio

Index
Gratis..................................................................................................................................3
The Currency “Information”...............................................................................................3
gratis services.....................................................................................................................3
Privacy................................................................................................................................4
Remote control in physical world.......................................................................................4
Privacy violation.................................................................................................................5
All bad?..............................................................................................................................5
Conclusion..........................................................................................................................5
1

1 Creative Commons ­  Attribution­Share Alike 2.5 Generic
You are free:
• to Share — to copy, distribute and transmit the work 
• to Remix — to adapt the work 
Under the following conditions:
• Attribution — You must attribute the work in the manner specified by the author or licensor (but not 
in any way that suggests that they endorse you or your use of the work). 
• Share Alike — If you alter, transform, or build upon this work, you may distribute the resulting work 
only under the same or similar license to this one.

2/5
Paolo Pedaletti

Privacy as defense of own information portfolio

Gratis2
In the physical/material world
•
“gratis” means an unidirectional exchange of
◦ material  (apples gratis, trousers gratis, ...) or
◦ services (cinema gratis, ride gratis, …)
•
“by payment” imply the bidirectional exchange of money versus
◦ material (10€ for 10Kg of apple) or 
◦ services (hairdresser, accountant, …)
In the informative/digital world, services provided “gratis” are no more unidirectional 
services, because implied an exchange, not material neither monetary, but  informative.
In the digital world the economy can be based on the only exchange of information:
my email (history/content) exchanged with electronic mail service management (for 
example)

The Currency “Information”
In the information era, the currency IS our information (in the most of the cases not alone, 
but statistically aggregated).
Our data have different value in function on who knows and handle it.
The information value is not an absolute value, 
but is function of the capacity of using it at own advantage.
E=mc2 can be a nonsense sequence of symbols, or an equation to produce energy  and to 
earn money and power (a lot of energy, money and power).
Our passion for cruises can be no valuable  for our neighbor or our employer, but 
(aggregated) may be a valuable information for a shipowner that have to decide if to build 
a new cruise ship or not (and how big), and for a builder that have to decide where to build 
his next holiday village.

gratis services
These precious informations can be easily gained providing “gratis” reservation services or 
online maps. Final end­user will provide spontaneously (and often unconsciously) to the 
shipowner or to the builder the information necessary to decide what is the better thing to 
do. Or better... they will pay the intermediary that provide these services to the final users.
In this sense our information, the information that belong to us, that represent us (our 
taste, out behavior, our activities) “it's worth”.

2 I use the term “gratis” instead of “free” because in English free may be misunderstanding with “freedom” 
but here I want to mean “without fee”, “for no money”.

3/5
Paolo Pedaletti

Privacy as defense of own information portfolio

Privacy
For these reason

privacy is the care of our information portfolio

Not having care of own information in the digital (informative) world, (“I have nothing to 
hide”), equals  to walk around with an open portfolio that leak money on the street in the 
physical (material) world.
Who think that anyway has nothing to hide, has a very poor self­consideration of own 
importance as human being and thus poor self­regard.
In the digital even­more­connected world we are all rich, of information, because we are 
increasingly digitalizing Our Life:
•
our identity, with login and password
•
our activity, with the activity and history of our digital account or digital devices 
(computer or mobile phone)
All this digital information it's worth, because it represent us and (at least still now) human 
beings are worth.
It worth in aggregate manner together with other our similar (by geographic provenance, 
working activity, culinary taste, …) if “common mortals” or (more rarely) it's worth 
individually in case of VIP (from the political/social/economic/... point of view).

Remote control in physical world
Officially the increasing remote tracking of human being behavior (=network activity, video 
recording or mobile phone tracking) is justified  by a presumed contextual security 
increase. Unlikely this is not  automatically/inevitably true, because the solely 
registration/observation/track from remote of a criminal event or behavior does not avoid 
it neither guarantees the capture and punishment of the authors 3. In any case the victim 
suffer the damage.
It can be said that a wide/generic and public know remote monitoring can do deterrent, 
can prevent crimes, but this is not automatically true because someone could not care to be 
recorded (drunk, suicide, exhibitionist, …)
But overall, trying to resolve the security problem  only from the repression side without 
doing nothing from the prevention side is a tragic error.
I don't want the killer of my son/wife in jail, I want my son/wife alive and healthy.

3 Bruce Schneier: http://www.cnn.com/2010/OPINION/02/25/schneier.security.cameras
 
Sorridete 
 , siete filmati… e così poco sorvegliati
 

4/5
Paolo Pedaletti

Privacy as defense of own information portfolio

Privacy violation
At this point it should be clear that privacy violation in the digital or physical world 
correspond to theft: someone not unauthorized that access to our information (=life) to 
gain personal advantage (maybe without our knowledge).

All bad?
Short answer: no. 
Long answer: it depends. 
It depends on what? 
All Depends on how our information (information that concern to us) is used. 
If it's used for our benefit, it's not bad, otherwise yes.
Our welfare must be the unit of measure that permit to decide if our information is treated 
well or not.
We don't consider “privacy violation” the information that we give to our accountant 
regards our money, if he/she use it for our benefit.
We don't consider “privacy violation” the information that we give to police regards our 
actions, if they use it to find criminals.

Conclusion
It's not bad “per se” to share or permit that someone else can manage our information, but 
it must be clear that this kind of “leaking” of information must be (even, at least) to our 
advantage4.

Paolo Pedaletti 
Paolo.Pedaletti@OpenLabs.IT

4) CNN: In digital world, we trade privacy for convenience
5/5

Mais conteúdo relacionado

Semelhante a Privacy as defence of own information portfolio

Powerful presentations handout
Powerful presentations handoutPowerful presentations handout
Powerful presentations handoutltresalu
 
Refresh the road ahead first 4 chapters
Refresh the road ahead first 4 chaptersRefresh the road ahead first 4 chapters
Refresh the road ahead first 4 chapters- Michiel van Vliet -
 
Plooto - Next Generation Payment Processing Security
Plooto - Next Generation Payment Processing SecurityPlooto - Next Generation Payment Processing Security
Plooto - Next Generation Payment Processing SecurityPlooto
 
Advanced ETL2 Pentaho
Advanced ETL2  Pentaho Advanced ETL2  Pentaho
Advanced ETL2 Pentaho Sunny U Okoro
 
How Prepared is the Third Sector to Secure their Information - Final Year Pro...
How Prepared is the Third Sector to Secure their Information - Final Year Pro...How Prepared is the Third Sector to Secure their Information - Final Year Pro...
How Prepared is the Third Sector to Secure their Information - Final Year Pro...Robert Stones
 
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects InstallationHP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects InstallationProtect724gopi
 
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects InstallationHP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects InstallationProtect724gopi
 
SAP BusinessObjects Installation Guide
SAP BusinessObjects Installation GuideSAP BusinessObjects Installation Guide
SAP BusinessObjects Installation GuideProtect724gopi
 
HP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
HP EnterpriseView v1.5 SAP BusinessObjects Installation GuideHP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
HP EnterpriseView v1.5 SAP BusinessObjects Installation GuideProtect724gopi
 
Informatica installation guide
Informatica installation guideInformatica installation guide
Informatica installation guidecbosepandian
 
Multi-device Multi-Role
Multi-device Multi-RoleMulti-device Multi-Role
Multi-device Multi-RoleAlex Young
 
Whitepaper - The 5 I's of the CIO
Whitepaper - The 5 I's of the CIOWhitepaper - The 5 I's of the CIO
Whitepaper - The 5 I's of the CIOPeter Bricknell
 
Unsh daalgwar
Unsh daalgwarUnsh daalgwar
Unsh daalgwaruka0121
 
TOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO coreTOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO corePascal Flamand
 

Semelhante a Privacy as defence of own information portfolio (20)

Powerful presentations handout
Powerful presentations handoutPowerful presentations handout
Powerful presentations handout
 
SMISproject
SMISprojectSMISproject
SMISproject
 
Refresh the road ahead first 4 chapters
Refresh the road ahead first 4 chaptersRefresh the road ahead first 4 chapters
Refresh the road ahead first 4 chapters
 
Plooto - Next Generation Payment Processing Security
Plooto - Next Generation Payment Processing SecurityPlooto - Next Generation Payment Processing Security
Plooto - Next Generation Payment Processing Security
 
Advanced ETL2 Pentaho
Advanced ETL2  Pentaho Advanced ETL2  Pentaho
Advanced ETL2 Pentaho
 
Hewlp
HewlpHewlp
Hewlp
 
How Prepared is the Third Sector to Secure their Information - Final Year Pro...
How Prepared is the Third Sector to Secure their Information - Final Year Pro...How Prepared is the Third Sector to Secure their Information - Final Year Pro...
How Prepared is the Third Sector to Secure their Information - Final Year Pro...
 
perl_tk_tutorial
perl_tk_tutorialperl_tk_tutorial
perl_tk_tutorial
 
perl_tk_tutorial
perl_tk_tutorialperl_tk_tutorial
perl_tk_tutorial
 
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects InstallationHP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
 
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects InstallationHP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
HP ArcSight EnterpriseView v1.6 SAP BusinessObjects Installation
 
SAP BusinessObjects Installation Guide
SAP BusinessObjects Installation GuideSAP BusinessObjects Installation Guide
SAP BusinessObjects Installation Guide
 
HP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
HP EnterpriseView v1.5 SAP BusinessObjects Installation GuideHP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
HP EnterpriseView v1.5 SAP BusinessObjects Installation Guide
 
Informatica installation guide
Informatica installation guideInformatica installation guide
Informatica installation guide
 
Multi-device Multi-Role
Multi-device Multi-RoleMulti-device Multi-Role
Multi-device Multi-Role
 
PeopleNet Enterprise Network Security Solution
PeopleNet Enterprise Network Security SolutionPeopleNet Enterprise Network Security Solution
PeopleNet Enterprise Network Security Solution
 
Whitepaper - The 5 I's of the CIO
Whitepaper - The 5 I's of the CIOWhitepaper - The 5 I's of the CIO
Whitepaper - The 5 I's of the CIO
 
Unsh daalgwar
Unsh daalgwarUnsh daalgwar
Unsh daalgwar
 
TOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO coreTOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO core
 
Hacking.pdf
Hacking.pdfHacking.pdf
Hacking.pdf
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Privacy as defence of own information portfolio