Game Jam – Use Case No.3: Unraveling the anonymity paradox!

image

Unveil the Privacy Threat – that’s how we named the Game Jam (October 7, 2017) we’re going to host together with the Alexander von Humboldt Institute for Internet and Society – will be fun and serious. And we want you to be part of it.

We will present to you three different use cases with a direct connection to data security and privacy by design. We have invited prominent experts to talk about the importance of data privacy, advise and inspire the participants of the Game Jam. What are the use cases, who are the experts? This is use case No 3.

Use case 3: Unraveling the anonymity paradox!

image

What sounds like the title of a 60′s psycho thriller B-Movie for mathematicians is in fact a modern day horror story. Here’s why.

If personal information were anonymized, all our privacy concerns would be gone! But what does “anonymized” mean?

This question is one of the hardest to resolve in the privacy debate. At present, privacy experts are grappling with the paradox that – in the big data era – there is no anonymous data anymore. 

All data can always be related to an individual  by means of data analysis technologies. The reason for this is that data is only considered “anonymized” if it cannot be related to an identified or even to an identifiable individual.

In order to understand this paradox, imagine this:

More than three million Berlin citizens – and another million tourists – are carrying around their personal devices every single day. There’s a Berlin-wide wifi system, which is publicly available for all people who have switched on their devices’ wifi by default. This wifi system collects the movement data of all these devices over a longer period of time.

Guess how useful this data would be for urban traffic management and many other innovations. But wouldn’t it be creepy if this data could also be misused against an individual later on?

This data is thus anonymized in order to mitigate these risks. In the process all personal identifiers (i.e. the MAC address and IMEI) of the devices captured by the wifi system – which could in principle lead to an identification of the owner or even carrier of a device – are “hashed” (i.e. substituted by a specific hash value for each identifier).

This hash value does not per se contain information referring to the owner or carrier of the device. However, it is still possible to capture the device’s movement pattern by referring to this hash. This movement pattern becomes more and more precise over time.

A person who gets access to that movement pattern (e.g. an employee of the provider of the wifi system or another data-driven company) might suddenly discover that this device must be owned by somebody he knows very well. 

The reason for this is that this device “leaves” the building where he lives at the same time every morning and “moves” to an address where only lawyers work: In terms of probability, that person must be his wife!

This risk of re-identification of “anonymized” data exists generally, where it is combined with further information. 

It is hard to say which information will be added and hard to say what the consequences of an identification are. It is hard to say under which conditions this risk is low enough in order to be socially acceptable.

Assignment

The goal of this use case is to develop an engaging game concept that helps people to understand the anonymity paradox. One target group are people working in companies specifically dealing with anonymized data (e.g. such as the provider of the wifi system described).

Want to join the Unveil the Privacy Threat Game Jam on October 7, 2017 in Berlin? Register here for free.

The best game idea will be awarded by an expert jury with an exciting prize – a weekend trip to London for the whole winning team including a visit of The Crystal, the world’s largest museum on the future of (smart) cities – sponsored by Siemens. Furthermore, amongst all participants, we give away two one-year-memberships of Adobe Creative Cloud sponsored by Adobe.*

*without possibility of recourse to legal action

Text by Max von Grafenstein

Game Jam – Use Case No.2: Oops… wrong recipient ?

image

Unveil the Privacy Threat – that’s how we named the Game Jam (October 7, 2017) we’re going to host together with the Alexander von Humboldt Institute for Internet and Society. It will be fun and serious. And we want you to be part of it.

We will present to you three different use cases with a direct connection to data security and privacy by design. We have invited prominent experts to talk about the importance of data privacy, advise and inspire the participants of the Game Jam. What are the use cases, who are the experts? This is use case No 2.

Use Case 2: Oops… wrong recipient ?

The most common privacy threat in companies arises when an employee accidentally sends personal information about somebody else to the wrong recipient.

This may sound like a no-brainer, but in fact, it is one of the biggest challenges in implementing effective privacy protection policies within companies.

There are two typical constellations that give rise to slightly different challenges for companies trying to mitigate this threat:

In the first constellation, an employee uses an email client, and in the second constellation, he/she grants access to a file depository.

In both cases, an employee typically sends an email or grants access to a repository to the wrong recipient – because the email client or repository incorrectly autocompletes the address based on the first few letters.

The employee forgets to double-check the name and… oops, the information is sent to the wrong recipient.

But there are differences between the cases: They refer to how such an employee can react. If the employee has granted access to a file repository, in principle, he or she can still restrict access retrospectively.

image

In contrast, if the employee has sent an email, the information is definitely “gone”, and he or she can only ask the recipient not to read and/or open the content.

However, in both cases employees often do not react at all, or they do not appropriately, because they fear negative consequences if his or her colleagues or superior find out about it.

 

Assignment

The goal of this use case is to develop an engaging game concept that reduces the privacy threat as a result of sending personal information to the wrong recipient, in a playful manner. One target group of such a game are employees in companies dealing with personal data in general.

Want to join the Unveil the Privacy Threat Game Jam on October 7, 2017 in Berlin? Register here for free.

 

The best game idea will be awarded by an expert jury with an exciting prize – a weekend trip to London for the whole winning team including a visit of The Crystal, the world’s largest museum on the future of (smart) cities – sponsored by Siemens. Furthermore, amongst all participants, we give away two one-year-memberships of Adobe Creative Cloud sponsored by Adobe.*

*without possibility of recourse to legal action

Text by Max von Grafenstein

Register to win a 1-year-membership of Adobe’s Creative Cloud

image

Maybe you’ve heard about it: We’re hosting a Game Jam with a dedicated topic. Unveil the Privacy Threat covers data privacy and privacy by design. We’re still looking for participants. And we’re giving away a 1-year-membership for Adobe’s Creative Cloud. The whole package, including stock photos and all the useful tools for digital creatives. How?

We will draw the winner of the Adobe Creative Cloud membership among every sincere registration for the Game Jam Unveil the Privacy Threat.*

What you have to do? Simply follow THIS LINK and fill out the registration form on the website of the Alexander von Humboldt Institute for Internet and Society (HIIG).

The institute is our partner and came up with the idea of hosting this Game Jam in the first place.

image

Find out more about the details of the package worth more than 1000 Euros HERE.

Again we would like to thank Adobe for the uncomplicated provision of this generous price.

*without possibility of recourse to legal action

Game Jam – Use Case No.1: I’ve got nothing to hide!

image

Unveil the Privacy Threat – that’s how we named the Game Jam (October 7, 2017) we’re going to host together with the Alexander von Humboldt Institute for Internet and Society – will be fun and serious. And we want you to be part of it. 

We will present to you three different use cases with a direct connection to data security and privacy by design. We have invited prominent experts to talk about the importance of data privacy, advise and inspire the participants of the Game Jam. What are the use cases, who are the experts? This is use case No 1.

Use Case 1: I’ve got nothing to hide!

Many people think they’ve got nothing to hide and thus do not need to protect their privacy. The reasoning behind this is that only people who have done something illegal would want to conceal their behavior. But, so the thinking goes, there’s no social need for protection for illegal behavior! Or is there?

This only relates to a tiny part of privacy protection. In fact, privacy laws doesn’t just protect those (allegedly) engaged in “illegal” behavior. Privacy also protects a person against the loss of reputation that can occur when information is disclosed and/or used in the wrong context.

As early as the 17th century, the French high priest and statesman Cardinal Richelieu stated:

“Give me a letter of six sentences written by the most honorable man, and I will find something sufficient to hang him.”

image

Henri Motte’s depiction of Cardinal Richelieu at the Siege of La Rochelle.

At least in Germany we don’t hang people anymore. However, what this kind of reasoning indicates is that there can always be somebody who wants to use personal information against someone. It’s this misuse of personal information that privacy seeks to protect against.

Some people even say that it actually doesn’t matter what you may have to hide; what matters is your ability to decide whether to hide something or not. This ability is guaranteed by privacy.

Privacy is hence an essential precondition for the enrollment of an autonomous personality.

Assignment

The goal of this use case is to develop an engaging game concept that challenges the “nothing-to-hide” argument in a playful manner. Ideally, such a game could be played anywhere, at any time, in a very limited period of time. Just like a quick-fire schoolyard debate.

A Wikipedia article for basic information about the Nothing to Hide argument.

An EFF guide to how to respond to the Nothing to Hide argument.

One of many useful YouTube videos about this topic.

Want to join the Unveil the Privacy Threat Game Jam on October 7, 2017 in Berlin? Register here for free.The best game idea will be awarded by an expert jury with an exciting prize – a weekend trip to London for the whole winning team including a visit of The Crystal, the world’s largest museum on the future of (smart) cities – sponsored by Siemens. 

Furthermore, amongst all participants, we give away two one-year-memberships of Adobe Creative Cloud sponsored by Adobe.*

*without possibility of recourse to legal action

Text by Max von Grafenstein

Everybody is a goldmine –A Game Jam to implement privacy and security by design

image

If we want tech to be more human, we’ll need to create awareness about privacy in the age of smart cities and IoT. That’s why we’re going to host a Game Jam about this subject, together with the Humboldt Institute for Internet and Society and INNOVATION & LAW. And you can apply.  

Private data is the number one resource of our time. It’s what gold and oil have been in the past centuries. Our user behavior – including the tiniest subconscious decisions we make when we use smart devices and browser interfaces – is a fine but steady load that’s been mined for many years now.

To stick with this simple analogy: right now heavy machinery is invented to drill deeper. Thanks to the IoT the monitored behavior isn’t reduced to hardware we use deliberately.

The whole city will become a computer. Sensors are going to be everywhere in the smart cities of the near future. And with great data comes great responsibility.

We have to ask ourselves how we want to handle data protection and privacy in a society that seems to be dependent on progress by information.

How can we establish awareness, not only among political activists and digital rights experts but people who engineer software, plan parking lots or open networks for the public benefit?

For our partners Alexander von Humboldt Institute for Internet and Society and INNOVATION AND LAW, we’re going to host a Game Jam.

The outcome we’re hoping for? Interactive and fun approaches on why data privacy and security is something we have to think of while developing a service or product.

This awareness will have two effects: Privacy by design or privacy by default will become a standard for on the one side – and more trust in tech and progress on the other side.

GAME JAM – UNVEIL THE PRIVACY THREAD Implementing privacy and security through games 

will take place on the weekend of 7-8 October at the premises of the Alexander von Humboldt Institute for Internet and Society in Berlin. There’ll be impulse talks by experts for inspiration and knowledge extension.

Right now you can apply by simply writing an email to hi@booster-space.com. Please explain in two, three sentences why you apply / how you want to contribute.



© 2023 – Booster Space Events & Consulting GmbH