ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Why Privacy?
Discipline Specificity
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Problem
¡ñ Research across disciplines suffers because
there is no unifed mechanism for measurement
¡ñ Computer science has focussed on policy
enforcement, ontologies and taxonomies
¡ñ Nobody looks at individual privacy preferences
in a given environment, which is the basis for
legislation
¨C And also how requirements must be derived
2 Examples
¡ñ Facebook
¡ñ Twitter
People on Facebook
People on Facebook
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Versus
Kosa - Theory for Privacy Measuring v2
Kosa - Theory for Privacy Measuring v2
Hypothesis
¡ñ Disregarding the value-based approach to
privacy, it's possible to dervie a finite
representation based on discrete factors
¡ñ The representation can be used to understand
privacy betteracross disciplines
¨C Standardization
¨C Measurement
¨C Management
Theoretical Framework
¡ñ Scientific / mathematical determinism
¡ñ Plus.
The States
1)Private: existence is unknown
2)Unidentified: presence is known
3)Anonymous: information known but no identity
4)Masked: identity linkage is concealed
5)De-identified: identity is not directly linked
6)Pseudonymous: identity is falsefied
7)Confidential: identity is known for a specific purpose
8)Identified: capable of being distinguised
9)Public: everything is known and assigned
Kosa - Theory for Privacy Measuring v2
Factors
¡ñ Human: considerations when privacy decisions
are made
¡ñ Technology: services that computers perform
related to information management
¡ñ Data Types: types of identifiable information
¡ñ Recepient: machine v. human
¡ñ Architecture: characteristics of the physical
environment
Human
¡ñ Human privacy rules are specific to the establishment;
they are reflected in the physical structure and
properties of society
¡ñ Each individual has a social contact threshold which
determines how they exercise their privacy rights
¡ñ Examples:
¡ñ Subject matter of the object
¡ñ Control of disclosure, information, audience
¡ñ Social structure and condition
¡ñ Visibility
¡ñ Expectations
Data Types
¡ñ Notion of privacy as information protection is
well represented in legislaiton and regulation
across the world
¡ñ Less widely used is the notion of identifiability:
that data exists that may or may not include the
traditional identifiers, e.g. Name, but may still
uniquely identify a person
¡ñ What is more private: a phone number or a
prescription?
Technology
¡ñ Computers are generally accepted to be an effective tool
for information management; used to acquire, organize,
retrieve, search and maintain information
¡ñ This happens increasingly without human intervention
¡ñ When it comes to managing information about an
identifiable person, there are a discrete number of
functions that computers can provide
¡ñ Examples:
¡ñ Network, hosting, registration, mail, website/portal, software,
backup
Proposed Formalization
1) Sn = w H f (H )+ wD f (D)+ wT f (T )
2) f (Factor) = (w1F1 + w2 F2 +... + wn Fn )
3) The more positive the individual factors, the
higher to total result of the factor set, the more
likely the individual will move to a lower state of
privacy, Sm>Sn
Transitions
¡ñ Forward
¡ñ I disclose about me, my objects
¡ñ You disclose about me, my objects
¡ñ Backward
¡ñ information redaction
¡ñ information protection
Questions For You
¡ñ How do people make decisions?
¡ñ Specifically in social situations?
¡ñ How does space change behaviour?
¡ñ Any suggestions for testing?
¡ñ What are the other disciplines that talk about
space, privacy, representation of self?
¡ñ Suggestions on theoretical frameworks?
An Offer
Ad

Recommended

Resume harris 19
Resume harris 19
NickHarris84
?
Resume harris 19
Resume harris 19
NickHarris84
?
Cybertech
Cybertech
Chuck Brooks
?
Galway
Galway
Colleen Krupski
?
Galway ESC CH
Galway ESC CH
Colleen Krupski
?
Red Light Jam
Red Light Jam
Aditya Arnoldi
?
trololo
trololo
trollollo
?
Ppt
Ppt
tomo14
?
§å§é§Ö§Ò§ß§í§Ö §Ü§å§â§ã§í §á§à Microsoft?
§å§é§Ö§Ò§ß§í§Ö §Ü§å§â§ã§í §á§à Microsoft?
§°§Ý§î§Ô§Ñ §©§Ñ§Ó§î§ñ§Ý§à§Ó§Ñ
?
§Þ§à§Õ§å§Ý§î 3§Ñ
§Þ§à§Õ§å§Ý§î 3§Ñ
§°§Ý§î§Ô§Ñ §©§Ñ§Ó§î§ñ§Ý§à§Ó§Ñ
?
BP presentation by Shih-Kai ou
BP presentation by Shih-Kai ou
ÊË„P ÖÜ
?
mozzarella stuffed meatball
mozzarella stuffed meatball
yakslope25
?
Love chloe 16013434_assignment2
Love chloe 16013434_assignment2
chloelove1992
?
Normas ovos e derivados
Thiago Portes
?
Jobs plan - Bob Filner
Jobs plan - Bob Filner
BobFilnerforMayor
?
Be cse
Be cse
imamruta
?
§Ü§Ñ§ä§Ñ§Ý§à§Ô Autumn winter
§Ü§Ñ§ä§Ñ§Ý§à§Ô Autumn winter
zoloyedov
?
Privacy and Surveillance
Privacy and Surveillance
Irem Gokce Aydin
?
Chapter 3
Chapter 3
Jennifer Polack
?
Secure Software Design for Data Privacy
Secure Software Design for Data Privacy
Narudom Roongsiriwong, CISSP
?
The role and value of making data inventories
The role and value of making data inventories
Open Knowledge Belgium
?
Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...
Micah Altman
?
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cybera Inc.
?
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
Hector Dominguez
?
417_AI_Handbook_Class9-74-106 .pdf
417_AI_Handbook_Class9-74-106 .pdf
pescbse9it1
?
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
MuhammadAbdullah201796
?
UN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
Micah Altman
?
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
ssuser264cc11
?

More Related Content

Viewers also liked (11)

§å§é§Ö§Ò§ß§í§Ö §Ü§å§â§ã§í §á§à Microsoft?
§å§é§Ö§Ò§ß§í§Ö §Ü§å§â§ã§í §á§à Microsoft?
§°§Ý§î§Ô§Ñ §©§Ñ§Ó§î§ñ§Ý§à§Ó§Ñ
?
§Þ§à§Õ§å§Ý§î 3§Ñ
§Þ§à§Õ§å§Ý§î 3§Ñ
§°§Ý§î§Ô§Ñ §©§Ñ§Ó§î§ñ§Ý§à§Ó§Ñ
?
BP presentation by Shih-Kai ou
BP presentation by Shih-Kai ou
ÊË„P ÖÜ
?
mozzarella stuffed meatball
mozzarella stuffed meatball
yakslope25
?
Love chloe 16013434_assignment2
Love chloe 16013434_assignment2
chloelove1992
?
Normas ovos e derivados
Thiago Portes
?
Jobs plan - Bob Filner
Jobs plan - Bob Filner
BobFilnerforMayor
?
Be cse
Be cse
imamruta
?
§Ü§Ñ§ä§Ñ§Ý§à§Ô Autumn winter
§Ü§Ñ§ä§Ñ§Ý§à§Ô Autumn winter
zoloyedov
?

Similar to Kosa - Theory for Privacy Measuring v2 (20)

Privacy and Surveillance
Privacy and Surveillance
Irem Gokce Aydin
?
Chapter 3
Chapter 3
Jennifer Polack
?
Secure Software Design for Data Privacy
Secure Software Design for Data Privacy
Narudom Roongsiriwong, CISSP
?
The role and value of making data inventories
The role and value of making data inventories
Open Knowledge Belgium
?
Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...
Micah Altman
?
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cybera Inc.
?
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
Hector Dominguez
?
417_AI_Handbook_Class9-74-106 .pdf
417_AI_Handbook_Class9-74-106 .pdf
pescbse9it1
?
PP Lec9n10 Sp2020.pptx
PP Lec9n10 Sp2020.pptx
MuhammadAbdullah201796
?
UN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
Micah Altman
?
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
ssuser264cc11
?
Geographic data uncertainty
Geographic data uncertainty
JayanthaSamarasinghe1
?
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
CREST
?
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020
Joanne Luciano
?
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Security Innovation
?
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Rebecca Leitch
?
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
?
Data Science at Intersection of Security and Privacy
Data Science at Intersection of Security and Privacy
Tarun Chopra
?
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Alchemist095
?
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Burton Lee
?
The role and value of making data inventories
The role and value of making data inventories
Open Knowledge Belgium
?
Matching Uses and Protections for Government Data Releases: Presentation at t...
Matching Uses and Protections for Government Data Releases: Presentation at t...
Micah Altman
?
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cybera Inc.
?
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
Hector Dominguez
?
417_AI_Handbook_Class9-74-106 .pdf
417_AI_Handbook_Class9-74-106 .pdf
pescbse9it1
?
UN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
Micah Altman
?
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
ssuser264cc11
?
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
CREST
?
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020
Joanne Luciano
?
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Security Innovation
?
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Rebecca Leitch
?
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
?
Data Science at Intersection of Security and Privacy
Data Science at Intersection of Security and Privacy
Tarun Chopra
?
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Alchemist095
?
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Burton Lee
?
Ad

Recently uploaded (20)

Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
?
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
?
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
?
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
?
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
?
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
?
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
?
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
?
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
?
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
?
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
?
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
?
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
?
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) ºÝºÝߣs
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) ºÝºÝߣs
Ravi Tamada
?
The Growing Value and Application of FME & GenAI
The Growing Value and Application of FME & GenAI
Safe Software
?
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
?
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
?
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
?
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
?
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
?
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
?
Techniques for Automatic Device Identification and Network Assignment.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Priyanka Aash
?
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
?
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
?
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
?
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
?
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
?
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
?
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik - Passionate Tech Enthusiast
Raman Bhaumik
?
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
?
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
?
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
?
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) ºÝºÝߣs
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) ºÝºÝߣs
Ravi Tamada
?
The Growing Value and Application of FME & GenAI
The Growing Value and Application of FME & GenAI
Safe Software
?
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
?
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
?
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
?
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
?
Ad

Kosa - Theory for Privacy Measuring v2

  • 17. Problem ¡ñ Research across disciplines suffers because there is no unifed mechanism for measurement ¡ñ Computer science has focussed on policy enforcement, ontologies and taxonomies ¡ñ Nobody looks at individual privacy preferences in a given environment, which is the basis for legislation ¨C And also how requirements must be derived
  • 26. Hypothesis ¡ñ Disregarding the value-based approach to privacy, it's possible to dervie a finite representation based on discrete factors ¡ñ The representation can be used to understand privacy betteracross disciplines ¨C Standardization ¨C Measurement ¨C Management
  • 27. Theoretical Framework ¡ñ Scientific / mathematical determinism ¡ñ Plus.
  • 28. The States 1)Private: existence is unknown 2)Unidentified: presence is known 3)Anonymous: information known but no identity 4)Masked: identity linkage is concealed 5)De-identified: identity is not directly linked 6)Pseudonymous: identity is falsefied 7)Confidential: identity is known for a specific purpose 8)Identified: capable of being distinguised 9)Public: everything is known and assigned
  • 30. Factors ¡ñ Human: considerations when privacy decisions are made ¡ñ Technology: services that computers perform related to information management ¡ñ Data Types: types of identifiable information ¡ñ Recepient: machine v. human ¡ñ Architecture: characteristics of the physical environment
  • 31. Human ¡ñ Human privacy rules are specific to the establishment; they are reflected in the physical structure and properties of society ¡ñ Each individual has a social contact threshold which determines how they exercise their privacy rights ¡ñ Examples: ¡ñ Subject matter of the object ¡ñ Control of disclosure, information, audience ¡ñ Social structure and condition ¡ñ Visibility ¡ñ Expectations
  • 32. Data Types ¡ñ Notion of privacy as information protection is well represented in legislaiton and regulation across the world ¡ñ Less widely used is the notion of identifiability: that data exists that may or may not include the traditional identifiers, e.g. Name, but may still uniquely identify a person ¡ñ What is more private: a phone number or a prescription?
  • 33. Technology ¡ñ Computers are generally accepted to be an effective tool for information management; used to acquire, organize, retrieve, search and maintain information ¡ñ This happens increasingly without human intervention ¡ñ When it comes to managing information about an identifiable person, there are a discrete number of functions that computers can provide ¡ñ Examples: ¡ñ Network, hosting, registration, mail, website/portal, software, backup
  • 34. Proposed Formalization 1) Sn = w H f (H )+ wD f (D)+ wT f (T ) 2) f (Factor) = (w1F1 + w2 F2 +... + wn Fn ) 3) The more positive the individual factors, the higher to total result of the factor set, the more likely the individual will move to a lower state of privacy, Sm>Sn
  • 35. Transitions ¡ñ Forward ¡ñ I disclose about me, my objects ¡ñ You disclose about me, my objects ¡ñ Backward ¡ñ information redaction ¡ñ information protection
  • 36. Questions For You ¡ñ How do people make decisions? ¡ñ Specifically in social situations? ¡ñ How does space change behaviour? ¡ñ Any suggestions for testing? ¡ñ What are the other disciplines that talk about space, privacy, representation of self? ¡ñ Suggestions on theoretical frameworks?