skip to main content
10.1145/3267305.3274155acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Towards Behavioral Privacy: How to Understand AI's Privacy Threats in Ubiquitous Computing

Published:08 October 2018Publication History

ABSTRACT

Human behavior is increasingly sensed and recorded and used to create models that accurately predict the behavior of consumers, employees, and citizens. While behavioral models are important in many domains, the ability to predict individuals' behavior is in the focus of growing privacy concerns. The legal and technological measures for privacy do not adequately recognize and address the ability to infer behavior and traits. In this position paper, we first analyze the shortcoming of existing privacy theories in addressing AI's inferential abilities. We then point to legal and theoretical frameworks that can adequately describe the potential of AI to negatively affect people's privacy. We then present a technical privacy measure that can help bridge the divide between legal and technical thinking with respect to AI and privacy.

References

  1. Cohen, J.E., 2012. Configuring the networked self: Law, code, and the play of everyday practice. Yale University Press.Google ScholarGoogle Scholar
  2. Cranshaw, J., Toch, E., Hong, J., Kittur, A. and Sadeh, N., 2010, September. Bridging the gap between physical location and online social networks. In Proceedings of the 12th ACM international conference on Ubiquitous computing (pp. 119--128). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dwork, C., 2008, April. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation (pp. 1--19). Springer, Berlin, Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ghosh, A., & Kleinberg, R. (2016). Inferential privacy guarantees for differentially private mechanisms. arXiv preprint arXiv:1603.01508.Google ScholarGoogle Scholar
  5. Grover, V., Adderley, R. and Bramer, M., 2007. Review of current crime prediction techniques. In Applications and Innovations in Intelligent Systems XIV (pp. 233--237). Springer, London.Google ScholarGoogle Scholar
  6. Hildebrandt, M., 2017. Privacy as Protection of the Incomputable Self: Agonistic Machine Learning. Available at SSRN: https://ssrn.com/abstract=3081776 orGoogle ScholarGoogle Scholar
  7. Julia Angwin, Jeff Larson, Surya Mattu, and Lauren Kirchner. Machine bias: There's software used across the country to predict future criminals. And it's biased against blacks. ProPublica, May 23, 2016. https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing.Google ScholarGoogle Scholar
  8. Kleinberg, J., Mullainathan, S., & Raghavan, M. (2016). Inherent trade-offs in the fair determination of risk scores. arXiv preprint arXiv:1609.05807.Google ScholarGoogle Scholar
  9. Lambert, Diane. "Measures of disclosure risk and harm." Journal of Official Statistics-Stockholm- 9 (1993): 313--313.Google ScholarGoogle Scholar
  10. Li, N., Li, T. and Venkatasubramanian, S., 2007, April. t-closeness: Privacy beyond k-anonymity and l-diversity. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on (pp. 106--115). IEEE.Google ScholarGoogle Scholar
  11. Michalski, R.S., Carbonell, J.G. and Mitchell, T.M. eds., 2013. Machine learning: An artificial intelligence approach. Springer Science & Business Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Toch, E., Cranshaw, J., Drielsma, P.H., Tsai, J.Y., Kelley, P.G., Springfield, J., Cranor, L., Hong, J. and Sadeh, N., 2010, September. Empirical models of privacy in location sharing. In Proceedings of the 12th ACM international conference on Ubiquitous computing (pp. 129--138). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards Behavioral Privacy: How to Understand AI's Privacy Threats in Ubiquitous Computing

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        UbiComp '18: Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers
        October 2018
        1881 pages
        ISBN:9781450359665
        DOI:10.1145/3267305

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 October 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate764of2,912submissions,26%

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader