about-core

The privacy paradoxes

Privacy in the on-line world is an immensely difficult area, not least because of the striking paradoxes that are encountered here. The paradoxes begin with the disconnects between user’s actual behaviors and their values/principles. It extends to include the differences between what some of the key corporate players profess and what they practice. It includes the inconsistencies in national and regional laws, the balance between national security and privacy, and the ambiguity of key attributes such as name in the marketplace. Even having someone from the US discuss international privacy appears as a paradox. How does one engineer a scalable infrastructure for privacy in such a tangled identity landscape? One approach is to create an infrastructure that includes usable tools, intuitive approaches to attribute names, trusted information about each of the actors, adaptive defaults, nudging technologies, and other parts that can be assembled and reused by the many actors in the identity ecosystem. One cannot create a single regime for privacy in all this complexity. Instead the goal is to create a privacy architecture with interoperable inconsistencies, to allow for scalable paradoxes. This session will explore specific approaches to integrating trust elements into a privacy infrastructure that can support our many, and often paradoxical, uses. Topics will include: vetted applications, end-user privacy managers with a variety of informed consent mechanisms, downstream reuse mechanisms, integration of anonymous credential capabilities, management of attribute ambiguities, marketplace issues and policy controls on rubber squeeze toys.

Speakers

Authors

  • Dr. Ken Klingenstein

Part of session

Better safe than private

Related documents