Copyright 2010 1 Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW http://www.rogerclarke.com/II/HCC-1009 {.html, .ppt} HCC Panel on Privacy YGens, iGens and Privacy Geolocation Privacy [ Government Privacy ]
18
Embed
Copyright 2010 1 Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW .
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Copyright2010
1
Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU
GenY & iGens – and PrivacyThe Views of Self-Interested IT-Company
CEOs
• “Privacy's dead. Get over it”
• “If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place”
• 'The Facebook generation aren't interested in privacy. They prefer self-exposure'
• “Generation ‘1990’ (Young Generation) rarely caring for risks, hardly interested in privacy” – Klaus Brunnstein, 21 Sep 2010
Copyright2010
3
The ‘Generations’
Indicative Indicative Generation Birth-Years Age in 2010Silent / Seniors 1910-45 65-99Baby Boomers – Early 1945-55 55-65Baby Boomers – Late 1955-65 45-55Generation X 1965-80 30-45Generation Y 1980-95 15-30The iGeneration 1995-
0-15
Copyright2010
4
GenY & iGens – and Privacy• Youth have always been Risk-Takers• What's changed is that indiscretions
now have much wider reach in space, and in time
Copyright2010
5
GenY & iGens – and Privacy• Youth have always been Risk-Takers• What's changed is that indiscretions
now have much wider reach in space, and in time
• As people mature:• they gain things to hide• they become more risk-averse
Copyright2010
6
GenY & iGens – and Privacy• Youth have always been Risk-Takers• What's changed is that indiscretions now
have much wider reach in space, and in time• As people mature:
• they gain things to hide• they become more risk-averse
• Y-Gens are taking a pounding• iGens have seen all this, and are
circumspect
Copyright2010
7
GenY & iGens – and Privacy• Youth have always been Risk-Takers• What's changed is that indiscretions now
have much wider reach in space, and in time• As people mature:
• they gain things to hide• they become more risk-averse
• Y-Gens are taking a pounding• iGens have seen all this, and are circumspect• Y & i will be much more privacy-conscious
& privacy-demanding than predecessors
http://www.rogerclarke.com/DV/MillGen.html
Copyright2010
8
Location and Tracking of Handsets• Inherent
There is insufficient capacity to broadcast all traffic in all cellsThe network needs to know the cell each mobile is inMobiles transmit registration messages to base-station(s)They do so when nominally switched off or placed on standby
• What’s being tracked:• The SIM-card, through its identifier (IMSI)• The handset, through its entifier (IMEI)• The human user, because
• the SIM-card and/or handset may be registered to a human (id)entity (possibly required by law!)
• the vast majority of handsets are used, for long periods, with a single SIM-card installed, and by a single person
http://www.rogerclarke.com/DV/YAWYB-CWP.html
Copyright2010
9
The Practicability of HandsetLocation and Tracking
• Location is intrinsic to network operation (±e)• Tracking is feasible,
because the handset sends a stream of messages
• Real-Time Tracking is feasible ifthe data-stream is intense (√) & latency is low (√)
• Retrospective Tracking is feasible iflocations are logged (√) & the log is retained (√?)
• Predictive Tracking is feasible ifthe data-stream is intense (√) & latency is low (√)