Cognitive Cities, Big Data and Citizen Participation: The Essentials of Privacy and Security

Our message for using humans as sensors to enable a Cognitive City is the same as that for any emerging technology: privacy cannot be sacrificed for other anticipated benefits. Privacy protections will be critical to the adoption of Cognitive City sensor technologies—individuals must feel comfortable that their privacy will not be violated as they move about in public spaces. We do not propose stifling innovation or denying the value of technology. We urge adopting a positive-sum paradigm: allowing both privacy and functionality to co-exist. Adopting privacy early at the design phase will achieve this goal. We advance the view that Privacy by Design is the sine qua non for all advances in technology, data management and application of cognitive technologies, as envisioned by Cognitive Cities. The 7 Foundational Principles of Privacy by Design can pave the way to building the necessary trust and accountability required in the systems involved.

[1]  Michael Friedewald,et al.  Seven Types of Privacy , 2013, European Data Protection.

[2]  Arnold Roosendaal,et al.  Surveillance as a Service? On the Use of Surveillance Data for Administrative Purposes , 2013, European Data Protection.

[3]  Hamed Haddadi,et al.  Human-Data Interaction: The Human Face of the Data-Driven Society , 2014, ArXiv.

[4]  S. Gritzalis,et al.  Privacy Enhancing Technologies: A Review , 2003, EGOV.

[5]  Anind K. Dey,et al.  Context-Awareness and Mobile Devices , 2008 .

[6]  Daniel J. Solove The Digital Person , 2022 .

[7]  Gregory D. Abowd,et al.  A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..

[8]  Inman Harvey SmartData : privacy meets evolutionary robotics , 2013 .

[9]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[10]  B. Schwartz The Social Psychology of Privacy , 1968, American Journal of Sociology.

[11]  George J. Tomko SmartData: The Need, the Goal and the Challenge , 2013 .

[12]  A. Cavoukian Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices , 2012 .

[13]  D. Brin The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? , 1998 .

[14]  T. Grance,et al.  SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) , 2010 .

[15]  Trevor Darrell,et al.  Privacy in Context , 2001, Hum. Comput. Interact..

[16]  Sara D'Onofrio,et al.  Applying the fuzzy analytical hierarchy process in cognitive cities , 2014, ICEGOV.

[17]  Hon C. Kwan,et al.  SmartData: Make the data “think” for itself , 2010 .

[18]  Jonathan L. Zittrain,et al.  The Future of the Internet - And How to Stop It , 2008 .

[19]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[20]  Josep Domingo-Ferrer,et al.  Privacy and Data Protection by Design - from policy to engineering , 2014, ArXiv.

[21]  Serge Gutwirth,et al.  Privacy and the Information Age , 2001 .

[22]  H. Nissenbaum A Contextual Approach to Privacy Online , 2011, Daedalus.

[23]  Judith Hurwitz,et al.  Cognitive Computing and Big Data Analytics , 2015 .

[24]  Danielle Keats Citron,et al.  The Right to Quantitative Privacy , 2013 .