Skip to main content

2019 | OriginalPaper | Buchkapitel

Is Privacy Controllable?

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

One of the major views of privacy associates privacy with the control over information. This gives rise to the question how controllable privacy actually is. In this paper, we adapt certain formal methods of control theory and investigate the implications of a control theoretic analysis of privacy. We look at how control and feedback mechanisms have been studied in the privacy literature. Relying on the control theoretic framework, we develop a simplistic conceptual control model of privacy, formulate privacy controllability issues and suggest directions for possible research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
See [50] for a case of American consumers being resigned to giving up their data in exchange for commercial offers, rather than engaging in cost-benefit analyses.
 
2
In this paper, we are not concerned with formal definitions of privacy used in cryptography and privacy-enhancing technologies (i.e., differential privacy [15], l-diversity and (n,t)-closeness [29], etc.).
 
3
The observed effect could be an artefact of their literature sample (which was not focused on- and, thus, might not be representative of privacy research), and (or) sampling method (picking selected journals in computer and information ethics without attending to the geographical and authorship scope of those journals).
 
4
In reality, “privacy” is directly translated as “privateness”, while the latter corresponds to a “degree of inviolability of private life”, whereas, in fact, “privacy” corresponds to several control-, protection- or jurisprudence-related terms in the Russian language (confidentiality being one).
 
5
Originates in [39].
 
6
From this point on, for the sake of convenience, we may use the term “privacy” as a shorthand for “personal information” and its disclosure.
 
7
Both in dynamic systems (e.g., [4, 14] and [30]) and human factors (e.g., [21] and [42]) block diagrams are used for concise depictions of systems.
 
8
Or \(Output'\), if any disturbance is introduced into the system after a certain Output is achieved.
 
9
We invite our readers to explore independently the world of patents on privacy controls.
 
Literatur
4.
Zurück zum Zitat Aström, K.J., Murray, R.M.: Feedback Systems: An Introduction for Scientists and Engineers. Princeton University Press, Princeton (2010)CrossRef Aström, K.J., Murray, R.M.: Feedback Systems: An Introduction for Scientists and Engineers. Princeton University Press, Princeton (2010)CrossRef
5.
Zurück zum Zitat Bargh, M.S., Meijer, R., Choenni, S., Conradie, P.: Privacy protection in data sharing: towards feedback based solutions. In: Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance ICEGOV 2014, pp. 28–36. ACM, New York (2014). https://doi.org/10.1145/2691195.2691279 Bargh, M.S., Meijer, R., Choenni, S., Conradie, P.: Privacy protection in data sharing: towards feedback based solutions. In: Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance ICEGOV 2014, pp. 28–36. ACM, New York (2014). https://​doi.​org/​10.​1145/​2691195.​2691279
10.
Zurück zum Zitat Colnago, J., Guardia, H.: How to inform privacy agents on preferred level of user control? In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: UbiComp Adjunct 2016, pp. 1542–1547. ACM, New York (2016). https://doi.org/10.1145/2968219.2968546 Colnago, J., Guardia, H.: How to inform privacy agents on preferred level of user control? In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: UbiComp Adjunct 2016, pp. 1542–1547. ACM, New York (2016). https://​doi.​org/​10.​1145/​2968219.​2968546
12.
Zurück zum Zitat DeCew, J.: Privacy. In: Zalta, E.N. (ed.) The Stanford Encyclopedia of Philosophy, Spring 2018 edn. Metaphysics Research Lab, Stanford University (2018) DeCew, J.: Privacy. In: Zalta, E.N. (ed.) The Stanford Encyclopedia of Philosophy, Spring 2018 edn. Metaphysics Research Lab, Stanford University (2018)
14.
Zurück zum Zitat Doyle, J.C., Francis, B.A., Tannenbaum, A.R.: Feedback Control Theory. Courier Corporation (2013) Doyle, J.C., Francis, B.A., Tannenbaum, A.R.: Feedback Control Theory. Courier Corporation (2013)
16.
Zurück zum Zitat Fried, C.: An anatomy of values: problems of personal choice (1970) Fried, C.: An anatomy of values: problems of personal choice (1970)
18.
Zurück zum Zitat Griffin, C., Rajtmajer, S., Squicciarini, A.: Invited paper: a model of paradoxical privacy behavior in online users. In: 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp. 206–211, November 2016. https://doi.org/10.1109/CIC.2016.037 Griffin, C., Rajtmajer, S., Squicciarini, A.: Invited paper: a model of paradoxical privacy behavior in online users. In: 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp. 206–211, November 2016. https://​doi.​org/​10.​1109/​CIC.​2016.​037
20.
Zurück zum Zitat Hoyle, R., Das, S., Kapadia, A., Lee, A.J., Vaniea, K.: Viewing the viewers: publishers’ desires and viewers’ privacy concerns in social networks. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2017, pp. 555–566. ACM, New York (2017). https://doi.org/10.1145/2998181.2998288 Hoyle, R., Das, S., Kapadia, A., Lee, A.J., Vaniea, K.: Viewing the viewers: publishers’ desires and viewers’ privacy concerns in social networks. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, CSCW 2017, pp. 555–566. ACM, New York (2017). https://​doi.​org/​10.​1145/​2998181.​2998288
21.
Zurück zum Zitat Jagacinski, R.J., Flach, J.M.: Control Theory for Humans: Quantitative Approaches To Modeling Performance. CRC Press, Boca Raton (2003) Jagacinski, R.J., Flach, J.M.: Control Theory for Humans: Quantitative Approaches To Modeling Performance. CRC Press, Boca Raton (2003)
23.
Zurück zum Zitat Jones, S., O’Neill, E.: Feasibility of structural network clustering for group-based privacy control in social networks. In: Proceedings of the Sixth Symposium on Usable Privacy and Security SOUPS 2010, pp. 9:1–9:13. ACM, New York (2010). https://doi.org/10.1145/1837110.1837122 Jones, S., O’Neill, E.: Feasibility of structural network clustering for group-based privacy control in social networks. In: Proceedings of the Sixth Symposium on Usable Privacy and Security SOUPS 2010, pp. 9:1–9:13. ACM, New York (2010). https://​doi.​org/​10.​1145/​1837110.​1837122
25.
Zurück zum Zitat Knijnenburg, B.P., Kobsa, A.: Increasing sharing tendency without reducing satisfaction: finding the best privacy-settings user interface for social networks. In: ICIS (2014) Knijnenburg, B.P., Kobsa, A.: Increasing sharing tendency without reducing satisfaction: finding the best privacy-settings user interface for social networks. In: ICIS (2014)
30.
Zurück zum Zitat Luenberger, D.G.: Introduction to Dynamic Systems: Theory, Models, and Applications, vol. 1. Wiley, New York (1979)MATH Luenberger, D.G.: Introduction to Dynamic Systems: Theory, Models, and Applications, vol. 1. Wiley, New York (1979)MATH
32.
Zurück zum Zitat Mansell, W., Marken, R.S.: The origins and future of control theory in psychology. Rev. Gen. Psychol. 19(4), 425–430 (2015)CrossRef Mansell, W., Marken, R.S.: The origins and future of control theory in psychology. Rev. Gen. Psychol. 19(4), 425–430 (2015)CrossRef
33.
Zurück zum Zitat Mehta, V., Bandara, A.K., Price, B.A., Nuseibeh, B.: Privacy itch and scratch: on body privacy warnings and controls. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems CHI EA 2016, pp. 2417–2424. ACM, New York (2016). https://doi.org/10.1145/2851581.2892475 Mehta, V., Bandara, A.K., Price, B.A., Nuseibeh, B.: Privacy itch and scratch: on body privacy warnings and controls. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems CHI EA 2016, pp. 2417–2424. ACM, New York (2016). https://​doi.​org/​10.​1145/​2851581.​2892475
34.
37.
Zurück zum Zitat Patil, S., Hoyle, R., Schlegel, R., Kapadia, A., Lee, A.J.: Interrupt now or inform later?: Comparing immediate and delayed privacy feedback. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems CHI 2015, pp. 1415–1418. ACM (2015). https://doi.org/10.1145/2702123.2702165 Patil, S., Hoyle, R., Schlegel, R., Kapadia, A., Lee, A.J.: Interrupt now or inform later?: Comparing immediate and delayed privacy feedback. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems CHI 2015, pp. 1415–1418. ACM (2015). https://​doi.​org/​10.​1145/​2702123.​2702165
38.
Zurück zum Zitat Patil, S., Schlegel, R., Kapadia, A., Lee, A.J.: Reflection or action?: How feedback and control affect location sharing decisions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems CHI 2014, pp. 101–110. ACM, New York (2014). https://doi.org/10.1145/2556288.2557121 Patil, S., Schlegel, R., Kapadia, A., Lee, A.J.: Reflection or action?: How feedback and control affect location sharing decisions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems CHI 2014, pp. 101–110. ACM, New York (2014). https://​doi.​org/​10.​1145/​2556288.​2557121
41.
Zurück zum Zitat Schlegel, R., Kapadia, A., Lee, A.J.: Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS 2011, pp. 14:1–14:14. ACM, New York (2011). https://doi.org/10.1145/2078827.2078846 Schlegel, R., Kapadia, A., Lee, A.J.: Eyeing your exposure: quantifying and controlling information sharing for improved privacy. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS 2011, pp. 14:1–14:14. ACM, New York (2011). https://​doi.​org/​10.​1145/​2078827.​2078846
42.
Zurück zum Zitat Sheridan, T.B., Ferrell, W.R.: Man-Machine Systems; Information, Control, and Decision Models of Human Performance. The MIT Press (1974) Sheridan, T.B., Ferrell, W.R.: Man-Machine Systems; Information, Control, and Decision Models of Human Performance. The MIT Press (1974)
44.
Zurück zum Zitat Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 163–167, October 2015. https://doi.org/10.1109/WiMOB.2015.7347956 Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 163–167, October 2015. https://​doi.​org/​10.​1109/​WiMOB.​2015.​7347956
46.
Zurück zum Zitat Solove, D.J.: A taxonomy of privacy. Univ. PA Law Rev. 154(3), 477–560 (2006)CrossRef Solove, D.J.: A taxonomy of privacy. Univ. PA Law Rev. 154(3), 477–560 (2006)CrossRef
47.
Zurück zum Zitat Toch, E., et al.: Locaccino: a privacy-centric location sharing application. In: Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing - Adjunct, UbiComp 2010 Adjunct, pp. 381–382. ACM, New York, (2010). https://doi.org/10.1145/1864431.1864446 Toch, E., et al.: Locaccino: a privacy-centric location sharing application. In: Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing - Adjunct, UbiComp 2010 Adjunct, pp. 381–382. ACM, New York, (2010). https://​doi.​org/​10.​1145/​1864431.​1864446
48.
Zurück zum Zitat Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N.: Who’s viewed you?: The impact of feedback in a mobile location-sharing application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI 2009, pp. 2003–2012. ACM, New York (2009). https://doi.org/10.1145/1518701.1519005 Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N.: Who’s viewed you?: The impact of feedback in a mobile location-sharing application. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI 2009, pp. 2003–2012. ACM, New York (2009). https://​doi.​org/​10.​1145/​1518701.​1519005
52.
Zurück zum Zitat Warren, S.D., Brandeis, L.D.: The right to privacy, pp. 193–220. Harvard law review (1890)CrossRef Warren, S.D., Brandeis, L.D.: The right to privacy, pp. 193–220. Harvard law review (1890)CrossRef
53.
Zurück zum Zitat Westin, A.: Privacy and Freedom. Atheneum, New York (1967) Westin, A.: Privacy and Freedom. Atheneum, New York (1967)
Metadaten
Titel
Is Privacy Controllable?
verfasst von
Yefim Shulman
Joachim Meyer
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-16744-8_15