ABSTRACT
Human behavior is increasingly sensed and recorded and used to create models that accurately predict the behavior of consumers, employees, and citizens. While behavioral models are important in many domains, the ability to predict individuals' behavior is in the focus of growing privacy concerns. The legal and technological measures for privacy do not adequately recognize and address the ability to infer behavior and traits. In this position paper, we first analyze the shortcoming of existing privacy theories in addressing AI's inferential abilities. We then point to legal and theoretical frameworks that can adequately describe the potential of AI to negatively affect people's privacy. We then present a technical privacy measure that can help bridge the divide between legal and technical thinking with respect to AI and privacy.
- Cohen, J.E., 2012. Configuring the networked self: Law, code, and the play of everyday practice. Yale University Press.Google Scholar
- Cranshaw, J., Toch, E., Hong, J., Kittur, A. and Sadeh, N., 2010, September. Bridging the gap between physical location and online social networks. In Proceedings of the 12th ACM international conference on Ubiquitous computing (pp. 119--128). ACM. Google ScholarDigital Library
- Dwork, C., 2008, April. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation (pp. 1--19). Springer, Berlin, Heidelberg. Google ScholarDigital Library
- Ghosh, A., & Kleinberg, R. (2016). Inferential privacy guarantees for differentially private mechanisms. arXiv preprint arXiv:1603.01508.Google Scholar
- Grover, V., Adderley, R. and Bramer, M., 2007. Review of current crime prediction techniques. In Applications and Innovations in Intelligent Systems XIV (pp. 233--237). Springer, London.Google Scholar
- Hildebrandt, M., 2017. Privacy as Protection of the Incomputable Self: Agonistic Machine Learning. Available at SSRN: https://ssrn.com/abstract=3081776 orGoogle Scholar
- Julia Angwin, Jeff Larson, Surya Mattu, and Lauren Kirchner. Machine bias: There's software used across the country to predict future criminals. And it's biased against blacks. ProPublica, May 23, 2016. https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing.Google Scholar
- Kleinberg, J., Mullainathan, S., & Raghavan, M. (2016). Inherent trade-offs in the fair determination of risk scores. arXiv preprint arXiv:1609.05807.Google Scholar
- Lambert, Diane. "Measures of disclosure risk and harm." Journal of Official Statistics-Stockholm- 9 (1993): 313--313.Google Scholar
- Li, N., Li, T. and Venkatasubramanian, S., 2007, April. t-closeness: Privacy beyond k-anonymity and l-diversity. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on (pp. 106--115). IEEE.Google Scholar
- Michalski, R.S., Carbonell, J.G. and Mitchell, T.M. eds., 2013. Machine learning: An artificial intelligence approach. Springer Science & Business Media. Google ScholarDigital Library
- Toch, E., Cranshaw, J., Drielsma, P.H., Tsai, J.Y., Kelley, P.G., Springfield, J., Cranor, L., Hong, J. and Sadeh, N., 2010, September. Empirical models of privacy in location sharing. In Proceedings of the 12th ACM international conference on Ubiquitous computing (pp. 129--138). ACM. Google ScholarDigital Library
Index Terms
- Towards Behavioral Privacy: How to Understand AI's Privacy Threats in Ubiquitous Computing
Recommendations
Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection
The massive amount of sensitive survey data about individuals that agencies collect and share through the Internet is causing a great deal of privacy concerns. These concerns may discourage individuals from revealing their sensitive information. ...
Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityThis paper presents a privacy-enhancing identity management platform designed to address the challenges associated with online identity verification and privacy protection. INCOGNITO offers a comprehensive solution by leveraging concepts such as ...
On two RFID privacy notions and their relations
Privacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions in the literature: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on ...
Comments