BlogTalk Asia 2009
Jeju, South Korea



                                 Jean-Henry Morin
                       University of Geneva – CUI
                      Dept. of Information Systems

                      Jean-Henry.Morin@unige.ch
                            http://jean-henry.com/
 BlogTalk Asia, Sept 2009
Outline

        •  Introduction and Context

        •  Motivation and Problem Statement

        •  Two Important Problems

        •  Proposition for Managed Personal Information

        •  Design Overview

        •  Conclusion and Discussion
                                                          2
J.-H. Morin
Introduction and Context

        •  Social Networks and Services




                                          3
J.-H. Morin
Introduction and Context

        •  Personal Information

              •  Different from Personally Identifying Information
               (PII)
                 •  Subject to legal frameworks in most countries

              •  Increasingly shared on social networks
                 •  Blurring boundaries between private and public life


      Legitimate concern (i.e., rights) over our
      information in terms of lifetime, usage
      purposes, access, etc.
                                                                          4
J.-H. Morin
Problems and Issues

        •  Publish / share once, publish / share
              forever
              • Indexing and searching

        •  Who “owns” and manages YOUR
              information (SLAs) ? Raging debates.
              • Who’s information is it ?
              • Do you retain control ?

        •  Semantic searching capabilities

                                                     5
J.-H. Morin
The Right to Forget

        •  Right to Forget : fundamental
              human right threatened by the digital
              nature of information (i.e., searchable)

        •  Traditional Media (i.e., non digital)
              “Memory” erodes over time
               • Labor and cost intensive

        •  Digital Media, requires explicit human
              intervention to “make forget” information
              (Rouvroy, 2007)

                                                          6
J.-H. Morin
Anonymity and Privacy

        •  Anonymity and Privacy are fundamental
              to social networking
              • It’s not a “bug”, it’s a feature !
              • It’s not schizophrenia !
                 •  Multiple legitimate personas (e.g., work, family,
                   communities, etc.)
              • How do we deal with it in a socially-
                responsible and ethically sustainable way ?
                 •  Cyber bullying (e.g., Akple in Korea)


        Requires traceability and accountability of
         information (i.e., managed information)
                                                                        7
J.-H. Morin
Key Question

        •  Is Privacy and personal information
              threatened by current social
              networking services ?

        •  We contend there is a need for
              Managed Personal Information
              • Socially-responsible and sustainable

 How can we retain an acceptable (by all) level of
   control over our personal information ?


                                                       8
J.-H. Morin
Proposition

        •  Personal Information should be
              augmented with a layer accounting for
              its management
        •  Alongside other metadata increasingly
              used in addressing the semantic
              dimension of our electronic services




                                                      9
J.-H. Morin
Moving forward:
                                  Design Overview

        •  DRM
              • Highly controversial but a necessary evil
               likely to stay

        •  Exception Management
              • An accountable approach to deal with the
                lack of flexibility of DRM
              • A socially-responsible (yet economically
                viable) alternative to the deceptive
                approaches of current DRM systems


                                                            10
J.-H. Morin
Digital Rights Management
                                             (DRM)
 •    What is DRM ?
        •     Technology allowing to cryptographically associate usage rules
              to digital content
        •     Rules govern the usage of content
        •     Content is persistently protected wherever it resides
 •    Examples :
        •     Recipients of an email cannot FORWARD, PRINT, COPY the
              email
        •     A document EXPIRES on September 16, 2009 and can only be
              accessed, in READ ONLY, by BlogTalk and Lift Asia attendees
        •     CEO delegates to CCO the right to also manage policies
              provided an audit trace is logged, etc.
 •    Where is it used ?
        •     Initially fueled by the Media & Entertainment
        •     Since 2003 : Enterprise sector fueled by corporate scandals
              (Enron, etc.), compliance issues, regulatory frameworks, etc.
        •     Software and gaming industries
                                                                              11
J.-H. Morin
Rethinking & Redesigning DRM:
                       Exception Management
•  Acknowledge the Central role of the User and User
   Experience
    •  Reinstate Users in their roles & rights
    •  Presumption of innocence & the burden of proof


•  Fundamental guiding principle : Feltens’ “Copyright
   Balance” principle (Felten, 2005)
         “Since lawful use, including fair use, of copyrighted works is in the
          public interest, a user wishing to make lawful use of copyrighted
            material should not be prevented from doing so by any DRM
                                                                    system.”




                                                                           12
 J.-H. Morin
Rethinking & Redesigning DRM
                                     (cont.)
•  Exception Management in DRM environments, mixing
   water with fire ?
    •  Reversing the distrust assumption puts the user “in
       charge”, facing his responsibilities
    •  Allow users to make Exception Claims, granting them
       Short Lived Licenses based on some form of logging and
       monitoring
    •  Use Credentials as tokens for logging to detect and
       monitor abuses
    •  Credential are Revocable in order to deal with abuse and
       misuse situations
    •  Mutually acknowledged need for managed content while
       allowing all actors a smooth usability experience

                                                              13
J.-H. Morin
Putting the pieces together

        •  Augmenting information with usage
              rights appears to be a promising path
              towards :
              • Socially-Responsible management of
                personal information in social networks
                and services
        •  Enabling Exception Management may
              offer the much needed flexibility
              lacking in traditional rights
              management environments
        •  Much work remains to be done

                                                          14
J.-H. Morin
Conclusion

        •  Call for Action ! We need to innovate

        •  Co-creation of value:
               • Requires a transdisciplinary approach
                 (law, business, sociology, ethics,
                 engineering, design, etc.)
               • Involving all the stakeholders

        •  Engineering is “easy”, getting it “right” in a
              mutual socially responsible way is hard but a
              great societal challenge

                                                              15
J.-H. Morin
Questions - Discussion




                Thank you


                                       Jean-Henry Morin
                             University of Geneva – CUI
                            Dept. of Information Systems

                            Jean-Henry.Morin@unige.ch
                                  http://jean-henry.com/
                                                           16
J.-H. Morin

More Related Content

PDF
Lift Asia09 Morin
PDF
Jean-Henry Morin, University of Geneva
PDF
Digital Responsibility: towards a new world order ?
PDF
Overview of Ethical Issues in Digital Watermarking
PDF
Transformations in interaction
PDF
Everyday surveillance
PDF
Internet Science
PPT
Pratt SILS Knowledge Organization Spring 2010
Lift Asia09 Morin
Jean-Henry Morin, University of Geneva
Digital Responsibility: towards a new world order ?
Overview of Ethical Issues in Digital Watermarking
Transformations in interaction
Everyday surveillance
Internet Science
Pratt SILS Knowledge Organization Spring 2010

What's hot (19)

PPTX
B.Ed class-1
PPTX
Introduction to ICT (Web 1.0 and Web 2.0)
PPS
Social media attack on privacy and peace of an Individual
PPT
Convergent Technology - Basics
PPTX
Societal impacts PART2
PDF
XR Ethics: Invitation to Participate in IEEE's Global Initiative on Ethics of...
PPTX
Privacy and Freedom of Expression
PPT
Socializing Big Data: Collaborative Opportunities in Computer Science, the So...
PPTX
E commerce
PPTX
Societal Impact of Information Technology
PDF
CBSE Open Textbook English
PPT
Civilization and its disconnects
PPT
MKT231 Week 4
PPT
Linkedinjune2011
PPTX
Strategic scenarios in digital content and digital business
PDF
A short introduction to multimedia forensics the science discovering the hist...
PPTX
Internal social media: risks and added value
PDF
Knowledge management for professionals
PPTX
Defining the IT artefact in social media for eParticipation: An Ensemble view
B.Ed class-1
Introduction to ICT (Web 1.0 and Web 2.0)
Social media attack on privacy and peace of an Individual
Convergent Technology - Basics
Societal impacts PART2
XR Ethics: Invitation to Participate in IEEE's Global Initiative on Ethics of...
Privacy and Freedom of Expression
Socializing Big Data: Collaborative Opportunities in Computer Science, the So...
E commerce
Societal Impact of Information Technology
CBSE Open Textbook English
Civilization and its disconnects
MKT231 Week 4
Linkedinjune2011
Strategic scenarios in digital content and digital business
A short introduction to multimedia forensics the science discovering the hist...
Internal social media: risks and added value
Knowledge management for professionals
Defining the IT artefact in social media for eParticipation: An Ensemble view
Ad

Similar to Towards Socially-Responsible Management of Personal Information in Social Networks (20)

PDF
Reinstating Trust in the Digital Age
PDF
Citizen (Online / Social) Media Ethics
PDF
A future history of content management
PDF
Exploring social theory through enterprise social media (muller, ibm research)
PPTX
Itri icl 0116_distribute
PDF
Social Software in the Enterprise: Key Debates
PPTX
Chapter 3
PPTX
Social Media in Texas Government
PDF
idigf - hukum - ui - edmon makarim
PDF
Information governance in the Facebook Era
PDF
Developing Staff Competencies in Emerging Technologies
PDF
19032013 Jacques Bus user controlled personal data management
PDF
Developing Staff Competencies in Emerging Technologies
PPTX
Selling Accessibility
PDF
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
PDF
Ethics and social media
PPTX
Records and information management presentation 2012
PPTX
Ejis Analysis
PPTX
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
PPTX
Acquiring Talent Through Digital Media
Reinstating Trust in the Digital Age
Citizen (Online / Social) Media Ethics
A future history of content management
Exploring social theory through enterprise social media (muller, ibm research)
Itri icl 0116_distribute
Social Software in the Enterprise: Key Debates
Chapter 3
Social Media in Texas Government
idigf - hukum - ui - edmon makarim
Information governance in the Facebook Era
Developing Staff Competencies in Emerging Technologies
19032013 Jacques Bus user controlled personal data management
Developing Staff Competencies in Emerging Technologies
Selling Accessibility
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
Ethics and social media
Records and information management presentation 2012
Ejis Analysis
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Acquiring Talent Through Digital Media
Ad

More from University of Geneva (20)

PDF
Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
PDF
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
PDF
La Transition Numérique
PDF
Swiss Data Protection Day 2016
PDF
Privacy by Design et Privacy by Default : Le point de vue de l'informaticien
PDF
Swiss digital Agenda debate @Lift15
PDF
La confiance à l’ère du numérique
PDF
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
PDF
Social Things, Data in a Digitally Responsible Society
PDF
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
PDF
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
PDF
Talk Prix 2013 du PPDT Genève
PDF
ThinkData @ NIA, Korea, 2012
PDF
Iff jam-2012-slides
PDF
Keynote 5th Swiss Data Protection day, 2012
PDF
First20120426jhm
PDF
Causerie ThinkData April 2012
PDF
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
PDF
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
PPT
Ftc Drm Future Morin
Responsabilité Numérique (Suisse) : Vers une Transition Numérique en Self Ser...
Lift Urban Entrepreneurs Seoul Ideation Workshop, Nov 12, 2016
La Transition Numérique
Swiss Data Protection Day 2016
Privacy by Design et Privacy by Default : Le point de vue de l'informaticien
Swiss digital Agenda debate @Lift15
La confiance à l’ère du numérique
Droit à l’Oubli : Du déni d'innovation au devoir de conception responsable en...
Social Things, Data in a Digitally Responsible Society
Responsabilité numérique. Restaurer la confiance à l’ère du numérique. Confér...
Lift14 Workshop Liquid Democracy as a Service (LDaaS) : Rebooting Democracy
Talk Prix 2013 du PPDT Genève
ThinkData @ NIA, Korea, 2012
Iff jam-2012-slides
Keynote 5th Swiss Data Protection day, 2012
First20120426jhm
Causerie ThinkData April 2012
DLP et DRM: Enjeux, défis et opportunités pour la protection et le contrôle d...
To Trust or not to Trust, telle est la question. Et si nous renversions quelq...
Ftc Drm Future Morin

Recently uploaded (20)

PDF
Financial discipline for educational purpose
PPTX
General-Characteristics-of-Microorganisms.pptx
PDF
Principal of magaement is good fundamentals in economics
PDF
Pension Trustee Training (1).pdf From Salih Shah
PPTX
Lesson Environment and Economic Growth.pptx
PDF
5-principles-of-PD-design.pdfvvvhvjvvcjcxhhcjb ggfvjhvjjhbvbbbvccxhgcxzzghjbv...
PPTX
lesson in englishhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
PDF
Buy Verified Payoneer Accounts for Sale - Secure and.pdf
PDF
Lundin Gold Corporate Presentation August 2025
PPT
features and equilibrium under MONOPOLY 17.11.20.ppt
PDF
Pitch Deck.pdf .pdf all about finance in
PPTX
Very useful ppt for your banking assignments Banking.pptx
PDF
Best Accounting Outsourcing Companies in The USA
PPTX
Q1 PE AND HEALTH 5 WEEK 5 DAY 1 powerpoint template
PDF
The Right Social Media Strategy Can Transform Your Business
PDF
Fintech Regulatory Sandbox: Lessons Learned and Future Prospects
PPTX
28 - relative valuation lecture economicsnotes
PDF
Truxton Capital: Middle Market Quarterly Review - August 2025
PPTX
PROFITS AND GAINS OF BUSINESS OR PROFESSION 2024.pptx
Financial discipline for educational purpose
General-Characteristics-of-Microorganisms.pptx
Principal of magaement is good fundamentals in economics
Pension Trustee Training (1).pdf From Salih Shah
Lesson Environment and Economic Growth.pptx
5-principles-of-PD-design.pdfvvvhvjvvcjcxhhcjb ggfvjhvjjhbvbbbvccxhgcxzzghjbv...
lesson in englishhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh
Buy Verified Payoneer Accounts for Sale - Secure and.pdf
Lundin Gold Corporate Presentation August 2025
features and equilibrium under MONOPOLY 17.11.20.ppt
Pitch Deck.pdf .pdf all about finance in
Very useful ppt for your banking assignments Banking.pptx
Best Accounting Outsourcing Companies in The USA
Q1 PE AND HEALTH 5 WEEK 5 DAY 1 powerpoint template
The Right Social Media Strategy Can Transform Your Business
Fintech Regulatory Sandbox: Lessons Learned and Future Prospects
28 - relative valuation lecture economicsnotes
Truxton Capital: Middle Market Quarterly Review - August 2025
PROFITS AND GAINS OF BUSINESS OR PROFESSION 2024.pptx

Towards Socially-Responsible Management of Personal Information in Social Networks

  • 1. BlogTalk Asia 2009 Jeju, South Korea Jean-Henry Morin University of Geneva – CUI Dept. of Information Systems Jean-Henry.Morin@unige.ch http://jean-henry.com/ BlogTalk Asia, Sept 2009
  • 2. Outline •  Introduction and Context •  Motivation and Problem Statement •  Two Important Problems •  Proposition for Managed Personal Information •  Design Overview •  Conclusion and Discussion 2 J.-H. Morin
  • 3. Introduction and Context •  Social Networks and Services 3 J.-H. Morin
  • 4. Introduction and Context •  Personal Information •  Different from Personally Identifying Information (PII) •  Subject to legal frameworks in most countries •  Increasingly shared on social networks •  Blurring boundaries between private and public life Legitimate concern (i.e., rights) over our information in terms of lifetime, usage purposes, access, etc. 4 J.-H. Morin
  • 5. Problems and Issues •  Publish / share once, publish / share forever • Indexing and searching •  Who “owns” and manages YOUR information (SLAs) ? Raging debates. • Who’s information is it ? • Do you retain control ? •  Semantic searching capabilities 5 J.-H. Morin
  • 6. The Right to Forget •  Right to Forget : fundamental human right threatened by the digital nature of information (i.e., searchable) •  Traditional Media (i.e., non digital) “Memory” erodes over time • Labor and cost intensive •  Digital Media, requires explicit human intervention to “make forget” information (Rouvroy, 2007) 6 J.-H. Morin
  • 7. Anonymity and Privacy •  Anonymity and Privacy are fundamental to social networking • It’s not a “bug”, it’s a feature ! • It’s not schizophrenia ! •  Multiple legitimate personas (e.g., work, family, communities, etc.) • How do we deal with it in a socially- responsible and ethically sustainable way ? •  Cyber bullying (e.g., Akple in Korea) Requires traceability and accountability of information (i.e., managed information) 7 J.-H. Morin
  • 8. Key Question •  Is Privacy and personal information threatened by current social networking services ? •  We contend there is a need for Managed Personal Information • Socially-responsible and sustainable How can we retain an acceptable (by all) level of control over our personal information ? 8 J.-H. Morin
  • 9. Proposition •  Personal Information should be augmented with a layer accounting for its management •  Alongside other metadata increasingly used in addressing the semantic dimension of our electronic services 9 J.-H. Morin
  • 10. Moving forward: Design Overview •  DRM • Highly controversial but a necessary evil likely to stay •  Exception Management • An accountable approach to deal with the lack of flexibility of DRM • A socially-responsible (yet economically viable) alternative to the deceptive approaches of current DRM systems 10 J.-H. Morin
  • 11. Digital Rights Management (DRM) •  What is DRM ? •  Technology allowing to cryptographically associate usage rules to digital content •  Rules govern the usage of content •  Content is persistently protected wherever it resides •  Examples : •  Recipients of an email cannot FORWARD, PRINT, COPY the email •  A document EXPIRES on September 16, 2009 and can only be accessed, in READ ONLY, by BlogTalk and Lift Asia attendees •  CEO delegates to CCO the right to also manage policies provided an audit trace is logged, etc. •  Where is it used ? •  Initially fueled by the Media & Entertainment •  Since 2003 : Enterprise sector fueled by corporate scandals (Enron, etc.), compliance issues, regulatory frameworks, etc. •  Software and gaming industries 11 J.-H. Morin
  • 12. Rethinking & Redesigning DRM: Exception Management •  Acknowledge the Central role of the User and User Experience •  Reinstate Users in their roles & rights •  Presumption of innocence & the burden of proof •  Fundamental guiding principle : Feltens’ “Copyright Balance” principle (Felten, 2005) “Since lawful use, including fair use, of copyrighted works is in the public interest, a user wishing to make lawful use of copyrighted material should not be prevented from doing so by any DRM system.” 12 J.-H. Morin
  • 13. Rethinking & Redesigning DRM (cont.) •  Exception Management in DRM environments, mixing water with fire ? •  Reversing the distrust assumption puts the user “in charge”, facing his responsibilities •  Allow users to make Exception Claims, granting them Short Lived Licenses based on some form of logging and monitoring •  Use Credentials as tokens for logging to detect and monitor abuses •  Credential are Revocable in order to deal with abuse and misuse situations •  Mutually acknowledged need for managed content while allowing all actors a smooth usability experience 13 J.-H. Morin
  • 14. Putting the pieces together •  Augmenting information with usage rights appears to be a promising path towards : • Socially-Responsible management of personal information in social networks and services •  Enabling Exception Management may offer the much needed flexibility lacking in traditional rights management environments •  Much work remains to be done 14 J.-H. Morin
  • 15. Conclusion •  Call for Action ! We need to innovate •  Co-creation of value: • Requires a transdisciplinary approach (law, business, sociology, ethics, engineering, design, etc.) • Involving all the stakeholders •  Engineering is “easy”, getting it “right” in a mutual socially responsible way is hard but a great societal challenge 15 J.-H. Morin
  • 16. Questions - Discussion Thank you Jean-Henry Morin University of Geneva – CUI Dept. of Information Systems Jean-Henry.Morin@unige.ch http://jean-henry.com/ 16 J.-H. Morin

Editor's Notes