Helbing, Dirk and Balietti, Stefano (2011): Big data, privacy, and trusted web: What needs to be done. Published in: Eur. Phys. J. Special Topics No. 195 (30 May 2011): pp. 3-68.
Preview |
PDF
MPRA_paper_49702.pdf Download (302kB) | Preview |
Abstract
This perspective paper discusses challenges and risks of the information age, and the implications for the information and communication technologies that need to be built and operated. It addresses ethical and policy issues related with Big Data and how procedures for privacy-preserving data analyses can be established. It further proposes a concept for a future, self-organising and trusted Web and discusses recommended legal regulations as well as the infrastructure and institutions needed.
Item Type: | MPRA Paper |
---|---|
Original Title: | Big data, privacy, and trusted web: What needs to be done |
Language: | English |
Keywords: | big data, privacy, ethics, trusted web, future internet, information society |
Subjects: | O - Economic Development, Innovation, Technological Change, and Growth > O3 - Innovation ; Research and Development ; Technological Change ; Intellectual Property Rights > O33 - Technological Change: Choices and Consequences ; Diffusion Processes O - Economic Development, Innovation, Technological Change, and Growth > O3 - Innovation ; Research and Development ; Technological Change ; Intellectual Property Rights > O34 - Intellectual Property and Intellectual Capital Z - Other Special Topics > Z0 - General > Z00 - General Z - Other Special Topics > Z1 - Cultural Economics ; Economic Sociology ; Economic Anthropology > Z18 - Public Policy |
Item ID: | 49702 |
Depositing User: | Stefano Balietti |
Date Deposited: | 10 Sep 2013 11:13 |
Last Modified: | 30 Sep 2019 17:10 |
References: | 1. L. Backstrom, C. Dwork and J. Kleinberg, Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography. Proc. 16th Int. World Wide Web Conference (2007) 2. Apple confirms $1bn data center. http://www.theregister.co.uk/2009/06/04/apple 1bn north carolina data center/ 3. NSA plans massive, 65MW, $2bn data center in Utah. http://www.theregister.co.uk/2009/07/03/new nsa data center/ 4. Microsoft consumes Chicago data center. http://www.theregister.co.uk/2009/05/20/ascent ch2 datacenter/ 5. Google admits Scandinavian data center landing. http://www.theregister.co.uk/2009/03/05/google finland data center/ 6. Google pays $51.7m for newspaper destruction metaphor. http://www.theregister.co.uk/2009/02/12/google buys defunct paper mill/ 7. Intel sees future in Mega Data Center. http://www.theregister.co.uk/2009/02/18/the intel cloud/ 8. D. Helbing and S. Balietti, From social simulation to integrative system design. Visioneer White Paper (2010), see http://www.visioneer.ethz.ch. 9. EU Commission plans more harmonisation of data protection law. http://www.out-law.com/default.aspx?page=11228 10. P. Bajaria and J. Yeo , Auction design and tacit collusion in FCC spectrum auctions. Information Economics and Policy 21:2 90-100 (2009) 11. C. Schultz, Transparency and tacit collusion (2001) 12. B. Kluger and S.B. Wyatt, Preferencing, Internalization of Order Flow, and Tacit Collusion: Evidence from Experiments. Journal of Financial and Quantitative Analysis 37:3 pg:449 (2002) 13. M. Michael, J.E. Moreira, D. Shiloach and R.W. Wisniewski, Scale-up x Scale-out: A Case Study using Nutch/Lucene. Parallel and Distributed Processing Symposium, IEEE International (2007) 14. L. A. Barroso and H ̈lzle, The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines. Morgan & Claypool Publishers (2009) 15. A. Jacobs, The pathologies of big data. ACM Queue, 7:(6) (2009) 16. SSD Myths and Legends - “write endurance”. http://www.storagesearch.com/ssdmyths-endurance.html. 17. A. Mazlouimian, D. Helbing, Y-H. Eom, S. Lozano and S. Fortunato, How citation boosts trigger scientific paradigm shifts. (in preparation) (2010). 18. D. Helbing, M. Treiber, and N. J. Saam, Analytical investigation of innovation dynamics considering stochasticity in the evaluation of fitness. Physical Review E 71, 067101 (2005). 19. J. Lorenz, H. Rauhut, F. Schweitzer, and D. Helbing, How social influence undermines the wisdom of crowds. Submitted (2010). 20. S. E. Asch, Studies of independence and conformity: a minority of one against a unanimous majority. Psychological Monographs, 70:9 (1956). 21. F. Winter, H. Rauhut and D. Helbing, How norms can generate conflict. Jena Economic Research Papers (2009). 22. D. Helbing and A. Johansson, Cooperation, norms, and conflict: A unified approach. SFI Working Paper #09-09-040 (2009). 23. D. Helbing and W. Yu, The outbreak of cooperation among success-driven individuals under noisy conditions. Proceedings of the National Academy of Sciences USA (PNAS) 106(8), 3680- 3685 (2009). 24. D. Helbing, W. Yu and H. Rauhut, Self-organization and emergence in social systems. Modeling the coevolution of social environments and cooperative behavior. SFI Working Paper #09-07-026 (2009). 25. Four million British identities are up for sale on the Internet. http://technology.timesonline.co.uk/tol/news/tech and web/the web/article6718560. 26. E. Diener and R. Crandall, Ethics in social and behavioral research. University of Chicago Press, Chicago (1978). 27. Geambasu R., Kohno T., Levy A. and Levy H. M., Vanish: Increasing Data Privacy with Self- Destructing Data. Proceedings of the USENIX Security Symposium, Montreal, Canada, August (2009) 28.http://ask.slashdot.org/story/09/12/10/2115238/ Best-Way-To-Clear-Your-Name-Online. 29. R. Axelrod, The Evolution of Cooperation, Basic Books, 1984 pp. 169–170. 30. Data, data everywhere, The Economist, Feb 25th 2010 31. L. Lessig, Against Transparency, The New Republic, 9th Oct, 2009. http://www.tnr.com/article/books-and-arts/against-transparency 32. Symantec Internet Security Threat Report. http://www.symantec.com/business/theme.jsp?themeid=threatreport. 33. A. Janc and L. Olejnik , Feasibility and Real-World Implications of Web Browser History Detection 34. G. Wondracek, T. Holz, E. Kirda and C Kruegel, A Practical Attack to De-Anonymize Social Network Users. Technical Report TR-iSecLab-0110-001 35. Google admits it accidentally gathered WiFi data. http://www.ft.com/cms/s/2/8a23b394-5fab-11df-a670-00144feab49a.html 36. Google to hand over intercepted data. http://www.ft.com/cms/s/2/db664044-6f43-11df-9f43-00144feabdc0.html 37. Lawyers Claim Google Wi-Fi Sniffing “Is Not an Accident”. http://gizmodo.com/5554960/lawyers-claim-google-wi+fi-sniffing-is-not-an-accident 38. Wi-Fi Data Captured By Google Street View Cars Included Passwords. http://gizmodo.com/5567460/wi+fi-data-captured-by-google-street-view-cars-included-passwords 39. Ethical Guidelines, Social Research Association”, (2003). http://www.the-sra.org.uk/ethical.htm 40. Dench Sally, Iphofen Ron, Huws Ursula, An EU Code of Ethics for Socio-Economic Research, The Institute of Employment Studies, 2004 41. The British Psychological Society, Report of the Working Party on Conducting Research on the Internet, 2007. http://www.bps.org.uk/the-society/code-of-conduct/ 42. Senator calls on FTC to tackle social-net privacy. http://news.cnet.com/8301-13577 3-20003415-36.html 43. The Electronic Frontier Foundation published a timeline of Facebook’s privacy policy modifica- tions over the years. http://www.eff.org/deeplinks/2010/04/facebook-timeline 44. Watchdog files complaint over Facebook ’privacy’ settings. http://www.theregister.co.uk/2009/12/17/epic facebook privacy complain/ 45. Exclusive: Google, CIA Invest in ’Future’ of Web Monitoring. http://www.wired.com/dangerroom/2010/07/exclusive-google-cia/ 46. X. Su and T. M. Khoshgoftaar, A Survey of Collaborative Filtering Techniques, Advances in Artificial Intelligence (2009). 47. E. J. Candes and T. Tao, The power of convex relaxation: Near-optimal matrix completion. IEEE Trans. Inform. Theory, 56: 2053-2080 (2009). 48. Privacy and identity management for life. Eds. M. Bezzi et al. Springer (2009). 49. G. Ziegler, C. Farkas, and A. L ̈rincz, A framework for anonymous but accountable self-organizing communities, Information and Software Technology, 48: 726-744 (2006). 50. Apple’s Worst Security Breach: 114,000 iPad Owners Exposed. http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed 51. T-Mobile confirms biggest phone customer data breach. http://www.guardian.co.uk/uk/2009/nov/17/t-mobile-phone-data-privacy 52. EU warns on Facebook privacy. http://www.nytimes.com/2009/01/27/technology/27iht-facebook.4-417144.html 53. German minister warns Facebook over privacy rules. http://blog.foreignpolicy.com/posts/2010/04/05/german minister warns facebook over privacy rules 54. Cattuto C., Van den Broeck W., Barrat A., Colizza V., Pinton J.-F. and Vespignani A., Dynamics of person-to-person interactions from distributed RFID sensor networks. PLoS ONE 5(7): e11596 (2010) 55. J. Krumm, A survey of computational location privacy. Personal and Ubiquitous Computing 13 (6), 391–399 (2009). 56. Internet Reputation Management: neutralize negative publicity. http://www.internet-reputation-management.com/ 57. Reputation Management Consultants. http://www.reputationmanagementconsultants.com/ 58. Reputation Defender. http://www.reputationdefender.com/ 59. Squidoo: Internet Reputation Management. http://www.squidoo.com/internet-reputation-management 60. European privacy seals for IT products and IT-based services. https://www.european-privacy-seal.eu/ 61. Ixquick: the world’s most private search engine. http://ixquick.com/ 62. RottenNeighbor.com was a website created to post information about neighbors and find infor- mation about new potential neighbors before moving. Launched in July 2007, it was discontinued in July 2009. 63. Digging into Data. http://www.diggingintodata.org/ 64. Transparency is at the heart of this Government. Data.gov.uk is home to national & local data for free re-use. http://data.gov.uk. 65. Data.Gov Empowering people. http://www.data.gov. 66. Dataverse Project: An Open-Source Application for Publishing, Citing and Discovering Research Data. http://thedata.org/. 67. Apache WSIF: Web Service Invocation Framework. http://ws.apache.org/wsif/. 68. ETH Financial Crisis Observatory. http://www.er.ethz.ch/fco/index. 69. 123 People. http://www.123people.com. 70. Oakland Crimespotting is an interactive map of crimes in Oakland and a tool for understanding crime in cities. http://oakland.crimespotting.org. 71. Government requests directed to Google and YouTube. http://www.google.com/governmentrequests/. 72. Mechanical Turk is a market place for work. https://www.mturk.com/mturk/welcome. 73. Micro Payment: professional payment provider. http://micropayment.de. 74. Vanish: self-destructing digital data. http://vanish.cs.washington.edu. 75. Did you watch porn? http://www.didyouwatchporn.com. 76. What the Internet knows about you. This page checks your browser history and determines which of the 5000 most popular Internet websites you’ve recently visited. http://www.whattheinternetknowsaboutyou.com. 77. Peter Eckersley, How Unique Is Your Web Browser? Electronic Frontier Foundation (2009) 78. Panopticlick: How unique and trackable is your browser? https://panopticlick.eff.org. 79. EFF: Forget cookies, your browser has fingerprints. http://www.computerworld.com/s/ article/9176904/EFF Forget cookies your browser has fingerprints 80. WUALA, Backup. Store. Share. Access Everywhere. http://www.wuala.com/. 81. Tor: anonymity online. http://www.torproject.org/. 82. Freenet, the free network. http://freenetproject.org/. 83. QLectives (Quality Collectives). http://www.qlectives.eu. 84. Datenschutz for iPhone-Apps. http://www.ethlife.ethz.ch/archive articles/ 100930 MBusiness Apps sch/index 85. DIASPORA, The privacy aware, personally controlled, do-it-all, open source social network. http://www.joindiaspora.com/ 86. Security Focus. http://www.securityfocus.com 87. ICKN Galaxy Advisors. http://ickn.org 88. PostRank: Intelligence from the social web. http://www.postrank.com/ 89. Soziale Netzwerke verraten k ̈nftiges K ̈uferverhalten. http://www.tagesanzeiger.ch/ digital/internet/Soziale-Netzwerke-verraten-kuenftiges-Kaeuferverhalten/story/ 19928880 90. M.M. Gaber, A. Zaslavsky and S. Krishnaswamy, Mining data streams: a review. ACM SIGMOD Record archive, 34:2 18–26, (2005). 91. A. Bifet and R.K. August, Data Stream Mining: A Practical Approach. The University of Waikato (2009). 92. J. Leskovec, L. Backstrom and J. Kleinberg, Meme-tracking and the dynamics of the news cycle. Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 497–506, (2009). 93. R. Agrawal and R. Srikant, Privacy-preserving data mining. Proceedings of the 2000 ACM SIG- MOD international conference on Management of data, pp. 439450 (2000). 94. P. Samarati and L. Sweeney, Generalizing Data to Provide Anonymity when Disclosing Informa- tion. Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. ACM Press (1998). 95. C. C. Aggarwal and Philip S. Yu, Privacy-Preserving Data Mining: Models and Algorithms. Springer, pp. 530, (2008). 96. M. Atzori, F. Bonchi, F. Giannotti and D. Pedreschi, Anonymity preserving pattern discovery. VLDB Journal, 17:4, pp. 703–727, (2006). 97. B.C.Chen, D. Kifer, K. LeFevre and A. Machanavajjhala, Privacy-Preserving Data Publishing. Foundations and Trends in Databases Vol. 2, Nos. 12 pp.1167 (2009) 98. B.-C. Chen, D. Kifer, K. LeFevre and A. Machanavajjhala, Privacy-Preserving Data Publishing (Survey).Foundations and Trends in Databases 2, Nos. 12 1167 (2009). 99. A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets. IEEE Symposium on In Security and Privacy SP 2008. IEEE Symposium. pp. 111-125. (2008). 100. R.Jones, R. Kumar, B. Pang, A.Tomkins, Vanity fair: privacy in querylog bundles. CIKM ’08: Proceeding of the 17th ACM conference on Information and knowledge management pp. 853-862 (2008). 101. F. Giannotti and D. Pedreschi, Mobility, Data Mining and Privacy: Geographic Knowledge Dis- covery. Springer pp. 410 (2008). 102. A. Monreale, G. Andrienko, N.Andrienko, F. Giannotti, D. Pedreschi, S. Rinzivillo and S. Wrobel, Movement Data Anonymity through Generalization. Transactions on Data Privacy 3:2 pp. 91–121 (2010). http://www.tdp.cat/issues/abs.a045a10.php 103. Project Gaydar. http://www.boston.com/bostonglobe/ideas/articles/2009/09/20/ project gaydar an mit experiment raises new questions about online privacy/. 104. Privatsphaere als Luxusgut. http://www.nzz.ch/blogs/nzz blogs/betablog/privatsphaere als luxusgut 1.7266824. html 105. D. Helbing et al., Dynamic decision behavior and optimal guidance through information services: Models and experiments. Pages 47-95 in: M. Schreckenberg and R. Selten (eds.) Human Behaviour and Traffic Networks Springer, Berlin (2004). 106. D. Helbing and M. Christen (2010). Mit Rauschen und Reibung gegen finanzielle Blasen, submit- ted to Wirtschaftswoche. 107. M. M ̈s, A. Flache, and D. Helbing (2010) Individualization as driving force of clustering phenomena in humans. PLoS Computational Biology, in print. 108. C. Frankfort-Nachmias and D. Nachmias, “Research Methods in the Social Sciences” (Worth Publishers, New York, 2008), Chap. 4: “Ethics in Social Research”. 109. Statement of Ethical Practice for the British Sociological Association, BSA, the British Sociological Society, 2002. http://www.britsoc.co.uk/equality/Statement+Ethical+Practice.htm 110. Google chief: Only miscreants worry about net privacy. http://www.theregister.co.uk/2009/12/07/schmidt on privacy/ 111. Details of 100m Facebook users collected and published. http://www.bbc.co.uk/news/technology-10796584 112. Recommendations of the Association of Internet Researchers (AoIR) Ethics Working Committee. http://www.aoir.org/reports/ethics.pdf 113. D. Helbing and W. Yu, The future of social experimenting. PNAS 107(12) 5265-5266, (2010). 114. The Future of Social Experimenting: The Full Story. http://www.soms.ethz.ch/research/socialexperimenting 115. K.P. Smith and N.A. Christakis, ‘Social Networks and Health, Annual Review of Sociology 34: 405-429 (2008). 116. D. Helbing, W. Yu, K.-D. Opp and H. Rauhut, The emergence of homogeneous norms in heterogeneous populations. American Journal of Sociology, submitted (2010). |
URI: | https://mpra.ub.uni-muenchen.de/id/eprint/49702 |