Privacy as a Currency: Un-regulated?

We are living in a time where many of the decisions that affect us are made by mathematical models. These models rely on data. Precision and relevance of the decisions made by these models is dependent on quality of the data being fed to them. Therefore, there is a rush to collect personal data. Majority of the organizations that provide online services are at the forefront of collecting user data. Users, either voluntarily or by coercion, divulge information about themselves in return of personalized service, for example. These organizations’ revenue model is based on advertisement where advertisers are paired with user profiles that are built on top of collected data. This data is being used for a variety of purposes apart from delivering targeted advertisements. Mathematical decision models are impartial to the data on which they operate. An error, omission or misrepresentation in data has an irrevocable consequence on our lives, at times, without corrective remedies. This paper touches upon various facets of information gathering; information bias, economics of privacy, information asymmetry – and their implications to our ecosystem if left unaddressed.

[1]  Balachander Krishnamurthy,et al.  For sale : your data: by : you , 2011, HotNets-X.

[2]  Apurv Jain Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy , 2017, Business Economics.

[3]  Saikat Guha,et al.  Privad: Practical Privacy in Online Advertising , 2011, NSDI.

[4]  Ari Juels,et al.  Targeted Advertising ... And Privacy Too , 2001, CT-RSA.

[5]  Landon P. Cox,et al.  SmokeScreen: flexible privacy controls for presence-sharing , 2007, MobiSys '07.

[6]  Andrew Lippman,et al.  MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).

[7]  Balachander Krishnamurthy,et al.  Beyond CPM and CPC: determining the value of users on OSNs , 2014, COSN '14.

[8]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[9]  Frank M. Shipman,et al.  Who owns the social web? , 2017, Commun. ACM.

[10]  Ran Dubin,et al.  I Know What You Saw Last Minute—Encrypted HTTP Adaptive Video Streaming Title Classification , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Krishna P. Gummadi,et al.  Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.

[12]  Hui Ding,et al.  TAO: Facebook's Distributed Data Store for the Social Graph , 2013, USENIX Annual Technical Conference.

[13]  R. K. Shyamasundar,et al.  A Complete Generative Label Model for Lattice-Based Access Control Models , 2017, SEFM.

[14]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[15]  Saikat Guha,et al.  Serving Ads from localhost for Performance, Privacy, and Profit , 2009, HotNets.

[16]  Suman Nath,et al.  Privacy-aware personalization for mobile advertising , 2012, CCS.

[17]  R. K. Shyamasundar,et al.  Undoing of Privacy Policies on Facebook , 2017, DBSec.

[18]  Charles Duhigg,et al.  How Companies Learn Your Secrets , 2012 .

[19]  Vitaly Shmatikov,et al.  2011 IEEE Symposium on Security and Privacy “You Might Also Like:” Privacy Risks of Collaborative Filtering , 2022 .

[20]  A. W. Roscoe,et al.  Security and Usability: Analysis and Evaluation , 2010, 2010 International Conference on Availability, Reliability and Security.

[21]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[22]  Woodrow Hartzog,et al.  The anonymization debate should be about risk, not perfection , 2017, Commun. ACM.

[23]  Vitaly Shmatikov,et al.  πBox: A Platform for Privacy-Preserving Apps , 2013 .

[24]  Ariel Ezrachi,et al.  Virtual Competition: The Promise and Perils of the Algorithm-Driven Economy , 2016 .

[25]  Abed Ali,et al.  Data as the new currency: Government's role in facilitating the exchange , 2013 .

[26]  Markus Jakobsson,et al.  Social phishing , 2007, CACM.

[27]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[28]  Karl N. Levitt,et al.  Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[29]  Aniket Kittur,et al.  Bridging the gap between physical location and online social networks , 2010, UbiComp.

[30]  Jeffrey T. Hancock,et al.  Experimental evidence of massive-scale emotional contagion through social networks , 2014, Proceedings of the National Academy of Sciences.