Autonomy, Privacy and the Symbiotic Web Paul Bernal - LSE
The internet is an intrinsic part of modern life Interactions with government, from tax returns and claims to access to health services Discounts, beneficial rates, some shopping services, delivery services only available online Access to information is faster, more extensive You CAN exist without online access, but you will be increasingly disadvantaged Autonomy should mean the freedom to access modern life - so we should be ‘free’ to enjoy the internet...
The internet and personal data More data is being collected, and in more ways and by more organisations than ever before The data that is gathered is being used in more ways than ever before All of these trends are increasing, without any sign of slowing Does this represent a threat to autonomy?
The Symbiotic Web A new model to understand this phenomenon - it helps explain:  Why so much data is gathered  The principle commercial uses to which it is put Some of the ways it might be used in the future Why so much data collection and use is covert The difficulties our legal and regulatory systems have in controlling it The threats to our privacy and autonomy that arise through it
Symbiosis Where two different kinds of organism exist together in a state of mutual dependence Symbiosis can be mutually beneficial - but can also become parasitic, and detrimental to one of the parties
The Symbiotic Web Individuals and commercial enterprises are mutually dependent: Enterprises have built business models reliant on a currency of private data Individuals depend on ‘free’ access to many services - from search engines to price comparison web sites, email to YouTube
The Symbiotic Web Users Web 1.0 Content Providers
The Symbiotic Web User/Contributors Web 2.0 Content Providers
The Symbiotic Web User/Contributors Web 2.5 Content Providers/ Information Gatherers
The Symbiotic Web User/Contributors Web 2.5 Content Providers/ Information Gatherers
A fractured web? Individualised advertising, content - and links For search engines, for example, different search results - or search results in a different order Overall, the effect is more than just on the individual page, but on the navigation and the whole web experience Not in the control of the user, but of the web providers
The origins of the Symbiotic Web Business models of Google and Facebook Other businesses trying to emulate them Not an expected development - many (including the EU in their E-money Directive) were expecting a big need for online micro-payments. These have not really materialised on any scale
Data and the data gatherers Search data - search engines Clickstream data - ISPs and web providers Communications data - email, telephony, chat Social data - social networking sites Commercial data - transactions AND ‘browsing’ data ‘ Habitual’ data - Google maps etc, YouTube etc.
Competitive drives The understanding by businesses that personal information has commercial value  Organisations gather more and more data, not just for specific current or planned uses, but speculatively Once the data has been gathered, there is a drive to find more uses for it, to take advantage of your ‘assets’ New businesses developed for aggregation and profile generation - and to help other businesses use data
Competitive drives As competition develops, so do competitive and anti-competitive practices - alliances, cartels etc Beacon and Phorm are prime examples Drive for more ‘tailored’ services - and potentially price or service discrimination The need for covertness - when customers know what is happening, they often object. Beacon and Phorm are again examples. As competition increases and margins fall, less attention may be paid to ‘ethics’
Consequences A burgeoning market in data - one about which users are being kept deliberately unaware Much more data is being held - and hence is vulnerable New data types are emerging - profiling data in particular - which has more significant vulnerabilities. Better targetted scams are more likely to succeed New kinds of risks are emerging - ‘Back-door Balkanisation’ is just one example
Solutions? Break the dependence - through stronger, better enforced laws? Change the paradigm - effectively give up on privacy. Accept that this is happening, enjoy the positives, penalise excesses. Weaken the dependence - strengthen the rights of individuals, particularly in terms of consent and rights to be informed Do very little - allow norms and markets to redress the balance. This may be happening already - e.g. Google reducing data holding periods
A rights-based approach? Human rights should extend to the internet Appropriate rights need to be developed: A ‘right to roam with privacy’ - i.e. without data being gathered about you Stronger data protection laws - including stronger requirements for informed consent, and rights to have data deleted A new paradigm where privacy is taken seriously - and becomes something that companies gain from
Autonomy, Privacy and the Symbiotic Web Paul Bernal [email_address] CCJHR Postgraduate Conference

More Related Content

PPT
The Symbiotic Web
PPT
Presentation Yun Li
PPT
Ethical, Social, and Political Issues in E-commerce
PPT
Legal social ethical
PPT
Social Distortion: Privacy, Consent, and Social Networks
PDF
Black wednesday SOPA/PIPA Report
PPTX
Ethics of electronic marketing
PDF
Legal ethical issues E commerce
The Symbiotic Web
Presentation Yun Li
Ethical, Social, and Political Issues in E-commerce
Legal social ethical
Social Distortion: Privacy, Consent, and Social Networks
Black wednesday SOPA/PIPA Report
Ethics of electronic marketing
Legal ethical issues E commerce

What's hot (18)

PPTX
Public policy legal issues to privacy
PPT
Social Media and the Law - by Tom Cowling
PDF
Social Media For Utilities: Law and Practices
PDF
How does the data protection reform strengthen citizens rights?
PPTX
Emerging Privacy Themes That Will Impact Your Company
PDF
Your Big Data Opportunity
PPT
E Marketing Ch5 Ethical Legal
PDF
ILC Cyber Report - June 2018
PDF
WIPO: What are Internet Intermediaries and their various types?
DOCX
Net Neutrality in Education
PPTX
Considering cyber law
PDF
Ecommerce legal exchange beijing
PDF
Tech Group Announces Privacy Standards
PDF
Amazon Tax Wars
PPT
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
PDF
Washington's Privacy Tango
PPT
Can we keep your data please?
PDF
Actiance whitepaper-social-media-legal-issues-canada
Public policy legal issues to privacy
Social Media and the Law - by Tom Cowling
Social Media For Utilities: Law and Practices
How does the data protection reform strengthen citizens rights?
Emerging Privacy Themes That Will Impact Your Company
Your Big Data Opportunity
E Marketing Ch5 Ethical Legal
ILC Cyber Report - June 2018
WIPO: What are Internet Intermediaries and their various types?
Net Neutrality in Education
Considering cyber law
Ecommerce legal exchange beijing
Tech Group Announces Privacy Standards
Amazon Tax Wars
Telcos and ISPs Prepare For New Data Breach Disclosure Rules
Washington's Privacy Tango
Can we keep your data please?
Actiance whitepaper-social-media-legal-issues-canada
Ad

Viewers also liked (7)

PPTX
Media A2 Portfolio
PPT
The internet: a new frontier for human rights
PPT
Rise and Phall
PPTX
The right to delete
PPTX
Taking back control
PPTX
Collaborative Consent
PDF
Study: The Future of VR, AR and Self-Driving Cars
Media A2 Portfolio
The internet: a new frontier for human rights
Rise and Phall
The right to delete
Taking back control
Collaborative Consent
Study: The Future of VR, AR and Self-Driving Cars
Ad

Similar to Autonomy, Privacy, The Symbiotic Web (20)

PDF
Online Privacy, the next Battleground
PPT
Privacy On The Web
PPT
Privacy On The Web
PPT
Privacy On The Web
PPT
Privacy On The Web
PPT
Privacy On The Web
PPTX
Privacy, social networks and EU policy
PDF
Privacy & Social Media
PPTX
Privacy Issues in Networked Economy
PPTX
Data privacy over internet
PPTX
Policy primer net303 study period 3, 2017
PPTX
Presentation networking
PPT
internet privacy presentation cranor.ppt
PPTX
Who ownes the customer? Privacy in the connected age.
PPTX
Chapter 2 The Internet, Digital Media, and Media Convergence
PPTX
ET-ICT in the Context of Global Communication-Q1-M1.pptx
PDF
Privacy, Ethics, and Future Uses of the Social Web
PPTX
Privacy Web 2.0 J Gross 2009
PDF
Why Do You Know So Much About Me
PDF
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Online Privacy, the next Battleground
Privacy On The Web
Privacy On The Web
Privacy On The Web
Privacy On The Web
Privacy On The Web
Privacy, social networks and EU policy
Privacy & Social Media
Privacy Issues in Networked Economy
Data privacy over internet
Policy primer net303 study period 3, 2017
Presentation networking
internet privacy presentation cranor.ppt
Who ownes the customer? Privacy in the connected age.
Chapter 2 The Internet, Digital Media, and Media Convergence
ET-ICT in the Context of Global Communication-Q1-M1.pptx
Privacy, Ethics, and Future Uses of the Social Web
Privacy Web 2.0 J Gross 2009
Why Do You Know So Much About Me
Data:The Fine Balance.We Trade Privacy for Convenience and Security.

Recently uploaded (20)

PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
Complications of Minimal Access-Surgery.pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
HVAC Specification 2024 according to central public works department
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
advance database management system book.pdf
PPTX
Module on health assessment of CHN. pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
Education and Perspectives of Education.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Empowerment Technology for Senior High School Guide
Paper A Mock Exam 9_ Attempt review.pdf.
Core Concepts of Personalized Learning and Virtual Learning Environments
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
Complications of Minimal Access-Surgery.pdf
Unit 4 Computer Architecture Multicore Processor.pptx
HVAC Specification 2024 according to central public works department
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
advance database management system book.pdf
Module on health assessment of CHN. pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
AI-driven educational solutions for real-life interventions in the Philippine...
Share_Module_2_Power_conflict_and_negotiation.pptx
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Education and Perspectives of Education.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Environmental Education MCQ BD2EE - Share Source.pdf
Empowerment Technology for Senior High School Guide

Autonomy, Privacy, The Symbiotic Web

  • 1. Autonomy, Privacy and the Symbiotic Web Paul Bernal - LSE
  • 2. The internet is an intrinsic part of modern life Interactions with government, from tax returns and claims to access to health services Discounts, beneficial rates, some shopping services, delivery services only available online Access to information is faster, more extensive You CAN exist without online access, but you will be increasingly disadvantaged Autonomy should mean the freedom to access modern life - so we should be ‘free’ to enjoy the internet...
  • 3. The internet and personal data More data is being collected, and in more ways and by more organisations than ever before The data that is gathered is being used in more ways than ever before All of these trends are increasing, without any sign of slowing Does this represent a threat to autonomy?
  • 4. The Symbiotic Web A new model to understand this phenomenon - it helps explain: Why so much data is gathered The principle commercial uses to which it is put Some of the ways it might be used in the future Why so much data collection and use is covert The difficulties our legal and regulatory systems have in controlling it The threats to our privacy and autonomy that arise through it
  • 5. Symbiosis Where two different kinds of organism exist together in a state of mutual dependence Symbiosis can be mutually beneficial - but can also become parasitic, and detrimental to one of the parties
  • 6. The Symbiotic Web Individuals and commercial enterprises are mutually dependent: Enterprises have built business models reliant on a currency of private data Individuals depend on ‘free’ access to many services - from search engines to price comparison web sites, email to YouTube
  • 7. The Symbiotic Web Users Web 1.0 Content Providers
  • 8. The Symbiotic Web User/Contributors Web 2.0 Content Providers
  • 9. The Symbiotic Web User/Contributors Web 2.5 Content Providers/ Information Gatherers
  • 10. The Symbiotic Web User/Contributors Web 2.5 Content Providers/ Information Gatherers
  • 11. A fractured web? Individualised advertising, content - and links For search engines, for example, different search results - or search results in a different order Overall, the effect is more than just on the individual page, but on the navigation and the whole web experience Not in the control of the user, but of the web providers
  • 12. The origins of the Symbiotic Web Business models of Google and Facebook Other businesses trying to emulate them Not an expected development - many (including the EU in their E-money Directive) were expecting a big need for online micro-payments. These have not really materialised on any scale
  • 13. Data and the data gatherers Search data - search engines Clickstream data - ISPs and web providers Communications data - email, telephony, chat Social data - social networking sites Commercial data - transactions AND ‘browsing’ data ‘ Habitual’ data - Google maps etc, YouTube etc.
  • 14. Competitive drives The understanding by businesses that personal information has commercial value Organisations gather more and more data, not just for specific current or planned uses, but speculatively Once the data has been gathered, there is a drive to find more uses for it, to take advantage of your ‘assets’ New businesses developed for aggregation and profile generation - and to help other businesses use data
  • 15. Competitive drives As competition develops, so do competitive and anti-competitive practices - alliances, cartels etc Beacon and Phorm are prime examples Drive for more ‘tailored’ services - and potentially price or service discrimination The need for covertness - when customers know what is happening, they often object. Beacon and Phorm are again examples. As competition increases and margins fall, less attention may be paid to ‘ethics’
  • 16. Consequences A burgeoning market in data - one about which users are being kept deliberately unaware Much more data is being held - and hence is vulnerable New data types are emerging - profiling data in particular - which has more significant vulnerabilities. Better targetted scams are more likely to succeed New kinds of risks are emerging - ‘Back-door Balkanisation’ is just one example
  • 17. Solutions? Break the dependence - through stronger, better enforced laws? Change the paradigm - effectively give up on privacy. Accept that this is happening, enjoy the positives, penalise excesses. Weaken the dependence - strengthen the rights of individuals, particularly in terms of consent and rights to be informed Do very little - allow norms and markets to redress the balance. This may be happening already - e.g. Google reducing data holding periods
  • 18. A rights-based approach? Human rights should extend to the internet Appropriate rights need to be developed: A ‘right to roam with privacy’ - i.e. without data being gathered about you Stronger data protection laws - including stronger requirements for informed consent, and rights to have data deleted A new paradigm where privacy is taken seriously - and becomes something that companies gain from
  • 19. Autonomy, Privacy and the Symbiotic Web Paul Bernal [email_address] CCJHR Postgraduate Conference

Editor's Notes

  • #3: This is why human rights should extend to what happens on the internet
  • #4: The question is WHY is this happening? Is there something underlying all of this.
  • #6: The question is WHY is this happening? Is there something underlying all of this.
  • #7: Even many services which are not ‘free’ are moving towards this kind of symbiotic state, gathering personal data and offering discounts, bonuses or ‘personalised services’ in effective exchange. Why do I call it an ‘uneasy’ symbiosis? Because it isn’t stable, and because one side (the individuals) are essentially unaware of what’s going on - and when they are, they often object.
  • #8: How did this come about? One way to look at is to consider the functional evolution of the web from the very beginning. At first, an information bank. Content providers put information up on the web, users accessed that information.
  • #9: The change to ‘Web 2.0’ is characterised largely by a transformation in the users - rather than just accessing information, they begin to provide information themselves. Blogs, wikis, social networking sites, YouTube etc, expansions in old-fashioned message boards.
  • #10: The change to web 2.5 - the symbiotic web - is characterised by a converse transformation in the erstwhile content providers. Now, not only do they provide information, but they gather information from people who visit their sites.
  • #11: This information is then used, amongst other things, to ‘tailor’ their websites to the individual users - starting with targetted advertising and specifically chosen links, moving on to individualised content. This effectively fractures the web.
  • #12: Nightmare visions like ‘whites-only websites’ become possible. Very different from Sunstein’s vision in that it’s not determined by people’s choices, but by the way things are chosen for people - a difference which has a significant effect on possible solutions
  • #14: The role of each of the data gatherers in the Symbiotic Web is slightly different. Profiling, advertising etc.
  • #15: Commerce is behind much of what is happening here
  • #16: Commercially driven
  • #17: Talk about Back-door Balkanisation here - Cas Sunstein’s Republic 2.0
  • #19: There are signs - but the public needs to understand that privacy is not just about the obvious stuff: photos, email addresses, bank account details, but about all data. We can’t just protect the sensitive stuff, but anything that the sensitive stuff can be derived from. Diabetes is an example...