"],"_oembed_time_6ae3138ddc0bb7c227bf8377f90935be":["1631035191"],"_oembed_942e144f093e17f1e644d20d2fb69add":["

Thundering applause, congratulations and salut! Last week, Jörg Pohle's dissertation was awarded "magna cum laude" 🏅🎉 pic.twitter.com/V1X9P331Lh

— HIIG Berlin (@hiig_berlin) November 17, 2017
"],"_oembed_time_942e144f093e17f1e644d20d2fb69add":["1631035191"],"_encloseme":["1"],"_wpml_word_count":["{\"total\":1256,\"to_translate\":{\"de\":1256}}"],"saswp_schema_type_product_pros_enable_cons":["0"]}},"jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","streetAddress":"Französische Straße 9","addressLocality":"Berlin","addressRegion":"Berlin","PostalCode":"10117","addressCountry":"Germany"}},"baseSalary":{"@type":"MonetaryAmount","value":{"@type":"QuantitativeValue"}},"estimatedSalary":{"@type":"MonetaryAmount","value":{"@type":"QuantitativeValue"}},"title":"Data protection and designing technology","description":"In his dissertation Jörg Pohle uncovers the history of ideas and the historical construction of the data protection problem and data protection as an abstract solution - including the architecture of its legal implementation. The aim of his work is to critically evaluate this construction and to draw conclusions for the design of ICT systems. For our dossier on GDPR, we asked him a few questions:\r\n\r\nWhat inspired you to write your dissertation?\r\n\r\nAt the beginning of the work on my dissertation I planned to investigate how legal requirements - for example from the Federal Data Protection Act - could be translated into technical requirements. A one-to-one implementation is of course not possible. During my research, however, I found that For data protection law - but much more generally for all privacy and surveillance theories - it has not been clarified what is actually the (legal) good to be protected. There is no consensus on what assumptions are made about information processing and use, and what exactly should lead to the problem to be solved. Subsequently, I changed my research question and examined how the problem was historically constructed in discourse; which legal, organisational and technical means or measures were proposed for its solution; and whether and to what extent this is still sustainable from an IT and information science point of view.\r\n\r\n...and what answer did you find when you wrote to it?\r\n\r\nThe result of my work is that data protection - as a solution to the problem of data power created by the industrialization of social information processing - must be re-derived. The aim was to explain why and how information processing organisations threaten fundamental rights and freedoms, but also social values such as the rule of law and democracy. To this end, I have presented a data protection attacker model corresponding to the state of the sociological, legal and computer science debate and an analytical grid for a threat analysis based on it. Finally, I have shown how information technology systems can be developed on this basis to avert these threats and secure individual and social freedom.\r\n\r\nFor which target group are the outcomes particularly interesting?\r\n\r\nFirstly, for all those interested in the history of ideas in the fields of privacy, surveillance and data protection; secondly, for lawyers, who thus receive a scientifically sound justification for data protection that is not based on traditional 19th century ideas of privacy; thirdly, for computer scientists who want to examine socio-technical systems for their individual and social effects or design information technology systems that protect existing spaces of freedom and at the same time create new freedoms.\r\n\r\nWhat was your best and worst and worst finding during the research?\r\n\r\nThe most exciting realization was that almost all discussions today about the computerization of society - both in science and in society - were held between the late 1960s and the early 1980s. The \"worst\" is that the work was then by orders of magnitude better than what is now so pinned - from \"digitization\" to \"algorithms\" to \"AI\"...\r\n\r\n \r\n\r\n✨ des Internets: Jörg Pohle präsentiert seine Forschung zur Geschichte und Theorie des Datenschutzes aus informatischer Sicht. Wichtige Lektion: #datenschutzrecht ist nicht #Datenschutz pic.twitter.com/7M3BIX7mAt\r\n— HIIG (@hiig_berlin) 15. Dezember 2017\r\n\r\n\r\n \r\n\r\nHow is your publication related to GDPR?\r\n\r\nThe work shows at which points the GDPR simply passes the problem. For example because it makes assumptions that are not correct: such as the fixation on \"personal data\", which assumes that fundamental rights and civil liberties cannot also be violated with anonymous data. Or because she paints unrealistic or simply incidental dangers on the wall, but at the same time does not even look at essential problems. On the other hand, my work can be used to fill the analysis and implementation processes laid down in the GDPR - from data protection impact assessment to data protection by design to data protection by default - so that in the end individuals, groups and society as a whole can actually be protected from the information power of states and large private organisations.\r\n\r\nWhat new perspectives does this open up for you on the subject of data protection?\r\n\r\nOn the one hand, this can be a continuation of earlier discussions: for example on the objectives of data protection, as formulated by Adalbert Podlech, according to which data protection is the solution to the \"technology-imparted social problem\" of \"determining and enforcing the conditions under which a society's information conduct can be acceptable to the members of society\". On the other hand, I have found various, especially technical approaches in the literature that are worth following up and translating into IT systems - and I am currently working on them.\r\n\r\nIn your opinion, is GDPR an effective tool?\r\n\r\nThe GDPR is not an effective instrument, because there are only two things that the basic regulation has effectively expanded: the documentation requirements and the rights of processors...\r\n\r\nWhat can I do to protect my data effectively?\r\n\r\nEncrypt and don't give it to anyone! The question is wrong: Data protection serves just as little to protect data as sun protection serves to protect the sun or disaster control serves to protect disasters...\r\n\r\n \r\n\r\nThundering applause, congratulations and salut! Last week, Jörg Pohle's dissertation was awarded \"magna cum laude\" ?? pic.twitter.com/V1X9P331Lh\r\n— HIIG (@hiig_berlin) 17. November 2017\r\n\r\n\r\n \r\nJörg Pohle's thesis uncovers the history of ideas and the historical construction of the data protection problem and of data protection as its (abstract) solution, including the architecture of its legal implementation, in order to critically assess this construction and to draw conclusions for the design of ICT systems. The thesis reveals the manifold aspects which underlie the analysis of the data protection problem – from concepts of humankind and society, organisations, information technology, and information processing, to concepts, schools of thought, and theories within informatics, information science, sociology, and law, to scientific and pre-scientific assumptions and premises and how they have influenced the specific solution to this problem.\r\nData protection and consequences for designing ICT systems: read dissertation (PDF)\r\n\r\nHistory and theory of data protection from a computer science perspective and consequences for designing ICT systems\r\nBased on a critical assessment of this historical construction, the thesis concludes that data protection must be rederived as a solution to the information power problem, which has arisen through the industrialisation of social information processing. To this end, the thesis presents an abstract, state-of-the- art data protection attacker model, an analytical framework for a data protection impact assessment, and a procedural operationalisation approach illustrating both the sequence and the substantive issues to be examined and addressed in this process.\r\n\r\nThe thesis then draws conclusions for the design of data-protection-friendly – and not just legally compliant – ICT systems. Further, the thesis clarifies the ways in which many concepts referred to in the privacy, surveillance, and data protection debate are invalid, outdated, or oversimplified. This includes the fixation on personally identifiable information, both in terms of the limitation of the scope of application and as a reference point for lawmaking and ICT design, the patently false but widespread assertion that sensitivity is a property of information, the naive public–private dichotomy, and the so-called privacy paradox.","url":"https://www.hiig.de/en/data-protection-and-designing-technology/","employmentType":{"_edit_lock":["1685700736:347"],"_edit_last":["347"],"_wpml_media_duplicate":["1"],"_wpml_media_featured":["1"],"_wp_page_template":["default"],"page_contacts":["a:2:{s:5:\"title\";s:0:\"\";s:4:\"text\";s:0:\"\";}"],"_yoast_wpseo_content_score":["30"],"post_doi":[""],"_post_doi":["post_doi"],"_yoast_wpseo_primary_category":["226"],"ampforwp_custom_content_editor":[""],"ampforwp_custom_content_editor_checkbox":[null],"ampforwp-amp-on-off":["default"],"ampforwp-redirection-on-off":["enable"],"_yoast_wpseo_focuskw_text_input":["Data protection"],"_yoast_wpseo_focuskw":["Data protection"],"_yoast_wpseo_linkdex":["74"],"_thumbnail_id":["46645"],"_yoast_wpseo_metadesc":["Jörg Pohle's thesis uncovers the history of ideas and the historical construction of the data protection problem and of data protection as its (abstract) solution, including the architecture of its legal implementation."],"_wp_old_date":["2018-04-25"],"_wpml_media_has_media":["1"],"_oembed_6ae3138ddc0bb7c227bf8377f90935be":["

✨ des Internets: Jörg Pohle präsentiert seine Forschung zur Geschichte und Theorie des Datenschutzes aus informatischer Sicht. Wichtige Lektion: #datenschutzrecht ist nicht #Datenschutz pic.twitter.com/7M3BIX7mAt

— HIIG Berlin (@hiig_berlin) December 15, 2017
"],"_oembed_time_6ae3138ddc0bb7c227bf8377f90935be":["1631035191"],"_oembed_942e144f093e17f1e644d20d2fb69add":["

Thundering applause, congratulations and salut! Last week, Jörg Pohle's dissertation was awarded "magna cum laude" 🏅🎉 pic.twitter.com/V1X9P331Lh

— HIIG Berlin (@hiig_berlin) November 17, 2017
"],"_oembed_time_942e144f093e17f1e644d20d2fb69add":["1631035191"],"_encloseme":["1"],"_wpml_word_count":["{\"total\":1256,\"to_translate\":{\"de\":1256}}"],"saswp_schema_type_product_pros_enable_cons":["0"]},"image":[{"@type":"ImageObject","@id":"https://www.hiig.de/en/data-protection-and-designing-technology/#primaryimage","url":"https://www.hiig.de/wp-content/uploads/2018/04/nick-hillier-339049-unsplash-1200x675.jpg","width":"1200","height":"675"},{"@type":"ImageObject","url":"https://www.hiig.de/wp-content/uploads/2018/04/nick-hillier-339049-unsplash-1200x900.jpg","width":"1200","height":"900"},{"@type":"ImageObject","url":"https://www.hiig.de/wp-content/uploads/2018/04/nick-hillier-339049-unsplash-1200x675.jpg","width":"1200","height":"675"}]}] Skip to content
nick-hillier-339049-unsplash
26 April 2018

Data protection and designing technology

In his dissertation Jörg Pohle uncovers the history of ideas and the historical construction of the data protection problem and data protection as an abstract solution – including the architecture of its legal implementation. The aim of his work is to critically evaluate this construction and to draw conclusions for the design of ICT systems. For our dossier on GDPR, we asked him a few questions:

What inspired you to write your dissertation?

At the beginning of the work on my dissertation I planned to investigate how legal requirements – for example from the Federal Data Protection Act – could be translated into technical requirements. A one-to-one implementation is of course not possible. During my research, however, I found that For data protection law – but much more generally for all privacy and surveillance theories – it has not been clarified what is actually the (legal) good to be protected. There is no consensus on what assumptions are made about information processing and use, and what exactly should lead to the problem to be solved. Subsequently, I changed my research question and examined how the problem was historically constructed in discourse; which legal, organisational and technical means or measures were proposed for its solution; and whether and to what extent this is still sustainable from an IT and information science point of view.

…and what answer did you find when you wrote to it?

The result of my work is that data protection – as a solution to the problem of data power created by the industrialization of social information processing – must be re-derived. The aim was to explain why and how information processing organisations threaten fundamental rights and freedoms, but also social values such as the rule of law and democracy. To this end, I have presented a data protection attacker model corresponding to the state of the sociological, legal and computer science debate and an analytical grid for a threat analysis based on it. Finally, I have shown how information technology systems can be developed on this basis to avert these threats and secure individual and social freedom.

For which target group are the outcomes particularly interesting?

Firstly, for all those interested in the history of ideas in the fields of privacy, surveillance and data protection; secondly, for lawyers, who thus receive a scientifically sound justification for data protection that is not based on traditional 19th century ideas of privacy; thirdly, for computer scientists who want to examine socio-technical systems for their individual and social effects or design information technology systems that protect existing spaces of freedom and at the same time create new freedoms.

What was your best and worst and worst finding during the research?

The most exciting realization was that almost all discussions today about the computerization of society – both in science and in society – were held between the late 1960s and the early 1980s. The “worst” is that the work was then by orders of magnitude better than what is now so pinned – from “digitization” to “algorithms” to “AI”…

 

 

How is your publication related to GDPR?

The work shows at which points the GDPR simply passes the problem. For example because it makes assumptions that are not correct: such as the fixation on “personal data”, which assumes that fundamental rights and civil liberties cannot also be violated with anonymous data. Or because she paints unrealistic or simply incidental dangers on the wall, but at the same time does not even look at essential problems. On the other hand, my work can be used to fill the analysis and implementation processes laid down in the GDPR – from data protection impact assessment to data protection by design to data protection by default – so that in the end individuals, groups and society as a whole can actually be protected from the information power of states and large private organisations.

What new perspectives does this open up for you on the subject of data protection?

On the one hand, this can be a continuation of earlier discussions: for example on the objectives of data protection, as formulated by Adalbert Podlech, according to which data protection is the solution to the “technology-imparted social problem” of “determining and enforcing the conditions under which a society’s information conduct can be acceptable to the members of society”. On the other hand, I have found various, especially technical approaches in the literature that are worth following up and translating into IT systems – and I am currently working on them.

In your opinion, is GDPR an effective tool?

The GDPR is not an effective instrument, because there are only two things that the basic regulation has effectively expanded: the documentation requirements and the rights of processors…

What can I do to protect my data effectively?

Encrypt and don’t give it to anyone! The question is wrong: Data protection serves just as little to protect data as sun protection serves to protect the sun or disaster control serves to protect disasters…

 

 
Jörg Pohle’s thesis uncovers the history of ideas and the historical construction of the data protection problem and of data protection as its (abstract) solution, including the architecture of its legal implementation, in order to critically assess this construction and to draw conclusions for the design of ICT systems. The thesis reveals the manifold aspects which underlie the analysis of the data protection problem – from concepts of humankind and society, organisations, information technology, and information processing, to concepts, schools of thought, and theories within informatics, information science, sociology, and law, to scientific and pre-scientific assumptions and premises and how they have influenced the specific solution to this problem.

Data protection and consequences for designing ICT systems: read dissertation (PDF)

History and theory of data protection from a computer science perspective and consequences for designing ICT systems

Based on a critical assessment of this historical construction, the thesis concludes that data protection must be rederived as a solution to the information power problem, which has arisen through the industrialisation of social information processing. To this end, the thesis presents an abstract, state-of-the- art data protection attacker model, an analytical framework for a data protection impact assessment, and a procedural operationalisation approach illustrating both the sequence and the substantive issues to be examined and addressed in this process.

The thesis then draws conclusions for the design of data-protection-friendly – and not just legally compliant – ICT systems. Further, the thesis clarifies the ways in which many concepts referred to in the privacy, surveillance, and data protection debate are invalid, outdated, or oversimplified. This includes the fixation on personally identifiable information, both in terms of the limitation of the scope of application and as a reference point for lawmaking and ICT design, the patently false but widespread assertion that sensitivity is a property of information, the naive public–private dichotomy, and the so-called privacy paradox.

This post represents the view of the author and does not necessarily represent the view of the institute itself. For more information about the topics of these articles and associated research projects, please contact info@hiig.de.

Jörg Pohle, Dr.

Head of Research Program: Actors, Data and Infrastructures

Explore Research issue in focus

Du siehst eine Tastatur auf der eine Taste rot gefärbt ist und auf der „Control“ steht. Eine bildliche Metapher für die Regulierung von digitalen Plattformen im Internet und Data Governance. You see a keyboard on which one key is coloured red and says "Control". A figurative metaphor for the regulation of digital platforms on the internet and data governance.

Data governance

We develop robust data governance frameworks and models to provide practical solutions for good data governance policies.

Sign up for HIIG's Monthly Digest

and receive our latest blog articles.

Further articles

two Quechuas, sitting on green grass and looking at their smartphones, symbolising What are the indigenous perspectives of digitalisation? Quechuas in Peru show openness, challenges, and requirements to grow their digital economies

Exploring digitalisation: Indigenous perspectives from Puno, Peru

What are the indigenous perspectives of digitalisation? Quechuas in Peru show openness, challenges, and requirements to grow their digital economies.

eine mehrfarbige Baumlandschaft von oben, die eine bunte digitale Publikationslandschaft symbolisiert

Diamond OA: For a colourful digital publishing landscape

The blog post raises awareness of new financial pitfalls in the Open Access transformation and proposes a collaborative funding structure for Diamond OA in Germany.

a pile of crumpled up newspapers symbolising the spread of disinformation online

Disinformation: Are we really overestimating ourselves?

How aware are we of the effects and the reach of disinformation online and does the public discourse provide a balanced picture?