"],"_oembed_time_785b8a0878a2e7bf047b064c3e031eb7":["1508865060"],"_oembed_6a4cd4d09133f1b4c738ba4372392e77":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_6a4cd4d09133f1b4c738ba4372392e77":["1508865060"],"_oembed_a5da4167e5273cba2c982654bd1a959b":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_a5da4167e5273cba2c982654bd1a959b":["1508865060"],"_oembed_16a8b19c1dac77eb5a81509f516ada0d":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— M Dennedy (@mdennedy) October 7, 2017
"],"_oembed_time_16a8b19c1dac77eb5a81509f516ada0d":["1508865061"],"_oembed_87784d1f6723c3d48cdc8a028de189ad":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_87784d1f6723c3d48cdc8a028de189ad":["1508865061"],"_oembed_9427a27dbf5840d5d61ee445ef1fb985":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@kunstet) October 8, 2017
"],"_oembed_time_9427a27dbf5840d5d61ee445ef1fb985":["1508865061"],"_oembed_955b5074bef16ba521d93612683d5a04":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_time_955b5074bef16ba521d93612683d5a04":["1508865062"],"_oembed_8f51140a556ab596b11ce97bba249be2":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster_Space (@Booster_Space) October 8, 2017
"],"_oembed_time_8f51140a556ab596b11ce97bba249be2":["1508865062"],"_oembed_time_395236c9ec44dd9816f32d1c085d53bc":["1508315517"],"_oembed_55a2474b17bb10d36173243b8e131ae6":[""],"_oembed_time_55a2474b17bb10d36173243b8e131ae6":["1508865059"],"_wp_attachment_metadata":[""],"_oembed_62bacec4b19180e553d2a5b3e9ceb48d":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— ? jillian (@jilliancyork) October 7, 2017
"],"_oembed_time_62bacec4b19180e553d2a5b3e9ceb48d":["1522050391"],"_oembed_aeab31ee95e0e6928aa91c848d03eb1f":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_aeab31ee95e0e6928aa91c848d03eb1f":["1522050391"],"_oembed_aa96b7916eacba76df112a1c507ebc2b":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_aa96b7916eacba76df112a1c507ebc2b":["1522050392"],"_oembed_7ace6158f53c52e424e62011433fa8b3":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— M Dennedy (@mdennedy) October 7, 2017
"],"_oembed_time_7ace6158f53c52e424e62011433fa8b3":["1522050392"],"_oembed_73c12d3a09a9413016e9b769dcadd88c":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_73c12d3a09a9413016e9b769dcadd88c":["1522050392"],"_oembed_86ab31b810976948f4963dd29398bdca":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@kunstet) October 8, 2017
"],"_oembed_time_86ab31b810976948f4963dd29398bdca":["1522050392"],"_oembed_f50918019ebe78bb9bc288d64dc5c2c6":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_time_f50918019ebe78bb9bc288d64dc5c2c6":["1522050393"],"_oembed_8f578625ea3128311b9aba11ce213c6c":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster_Space (@Booster_Space) October 8, 2017
"],"_oembed_time_8f578625ea3128311b9aba11ce213c6c":["1522050393"],"_oembed_6ac0e6d9b4a0f8743315878729697707":[""],"_oembed_time_6ac0e6d9b4a0f8743315878729697707":["1523522861"],"_oembed_1c39d83bbd6a94494997d8a7adca4d8e":[""],"_oembed_time_1c39d83bbd6a94494997d8a7adca4d8e":["1523522861"],"_oembed_b9d01f5a8edf29269fb1e5fc087355f3":[""],"_oembed_time_b9d01f5a8edf29269fb1e5fc087355f3":["1523522862"],"_oembed_95a51a8ebadde63dd929fb8189c1d531":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— jillian (@jilliancyork) October 7, 2017
"],"_oembed_time_95a51a8ebadde63dd929fb8189c1d531":["1524654816"],"_oembed_c9c8f3d29411841a8bad15d2bf46ec48":[""],"_oembed_time_c9c8f3d29411841a8bad15d2bf46ec48":["1524654816"],"_oembed_203fe661ca376e99bb46849695d150f6":[""],"_oembed_time_203fe661ca376e99bb46849695d150f6":["1524654816"],"_oembed_d3fd49be259ea40c3323c31c8deca27b":[""],"_oembed_time_d3fd49be259ea40c3323c31c8deca27b":["1524654817"],"_oembed_3d3b00bdd4080fafb67d8296d4ce490b":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_3d3b00bdd4080fafb67d8296d4ce490b":["1524654817"],"_oembed_93779aae0732f901329f94900df0f33c":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— M Dennedy (@mdennedy) October 7, 2017
"],"_oembed_time_93779aae0732f901329f94900df0f33c":["1524654820"],"_oembed_e4b0d955b34a5bda11450521b75ad0cd":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_e4b0d955b34a5bda11450521b75ad0cd":["1524654821"],"_oembed_e5d643c1f127427a39c3a37fe713b96b":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_e5d643c1f127427a39c3a37fe713b96b":["1524654822"],"_oembed_6bea571792646e3c3b180e7e0c8e94ee":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@kunstet) October 8, 2017
"],"_oembed_time_6bea571792646e3c3b180e7e0c8e94ee":["1524654822"],"_oembed_540154b563889795e69e874b99445189":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_time_540154b563889795e69e874b99445189":["1524654822"],"_oembed_d3ca05a66e72673ce7fb883e741b8f3d":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster_Space (@Booster_Space) October 8, 2017
"],"_oembed_time_d3ca05a66e72673ce7fb883e741b8f3d":["1524654823"]}},"jobLocation":{"@type":"Place","address":{"@type":"PostalAddress","streetAddress":"Französische Straße 9","addressLocality":"Berlin","addressRegion":"Berlin","PostalCode":"10117","addressCountry":"Germany"}},"baseSalary":{"@type":"MonetaryAmount","value":{"@type":"QuantitativeValue"}},"estimatedSalary":{"@type":"MonetaryAmount","value":{"@type":"QuantitativeValue"}},"title":"Nichts zu verbergen?","description":"In unserer vernetzten und digitalisierten Gesellschaft sind personenbezogene Daten das neue Gold. Immer mehr müssen wir uns mit komplexen Themen wie Privatsphäre und Datenschutz auseinandersetzen – besonders in der Arbeitswelt. Wie lassen sich diese Konzepte am besten erklären? Beim “Game Jam: Unveil the Privacy Threat” kamen EntwicklerInnen, DesignerInnen, Forschende und Kreative zusammen, um diese Sachverhalte durch Serious Games auf intuitive Weise zu vermitteln. Für den ersten Teil unseres Rückblicks hat HIIG-Forscher Maximilian von Grafenstein zusammengefasst, welche Spielideen konkret entwickelt wurden. Im zweiten Teil zeigen wir die besten #PrivacyJam Momente:\r\n\r\n\r\n\r\nhttps://twitter.com/jilliancyork/status/916591963956277248\r\n\r\nBefore getting started with the development of game concepts, three use cases helped all participants to recollect the many facets of privacy.\r\n\r\nhttps://twitter.com/MarcianoLorena/status/916596739381047297\r\nUse case 1: I’ve got nothing to hide!\r\nIn her keynote, Jillian York (Director of International Freedom of Expression at Electronic Frontier Foundation) gave five reasons for why the statement “I’ve nothing to hide!” is wrong:\r\n\r\n\r\nMany people think they have nothing to hide and thus do not need to protect their privacy. The reasoning behind this is that only people who have done something illegal would want to conceal their behavior; but, so the thinking goes, there’s no social need for protection for illegal behavior!\r\n\r\nHowever, this only relates to a tiny part of privacy protection. In fact, privacy laws doesn’t just protect those (allegedly) engaged in “illegal” behavior. Privacy also protects a person against the loss of reputation that can occur when information is disclosed and/or used in the wrong context. As early as the 17th century, the French high priest and statesman Cardinal Richelieu stated: “Give me a letter of six sentences written by the most honorable man, and I will find something sufficient to hang him.” Of course, we don’t hang people anymore. However, what this kind of reasoning indicates is that there can always be somebody who wants to use personal information against someone. It is this misuse of personal information that privacy seeks to protect against. Some people even say that it actually doesn’t matter what you may have to hide; what matters is your ability to decide whether to hide something or not. This ability is guaranteed by privacy. Privacy is hence an essential precondition for the enrollment of an autonomous personality.\r\nUse case 2: Oops… wrong recipient!\r\nThe second speaker, Michelle Dennedy (Cisco), illustrated how challenging it is to sensitise employees to privacy.\r\n\r\n\r\nThe most common privacy threat in companies arises when an employee accidentally sends personal information about somebody else to the wrong recipient. This may sound like a no-brainer, but in fact, it is one of the biggest challenges in implementing effective privacy protection policies within companies.\r\n\r\nThere are two typical constellations that give rise to slightly different challenges for companies trying to mitigate this threat: In the first constellation, an employee uses an email client, and in the second constellation, he/she grants access to a file depository. In both cases, an employee typically sends an email, or grants access to a repository, to the wrong recipient because the email client or repository incorrectly autocompletes the address based on the first few letters. The employee forgets to double-check the name and… oops, the information is sent to the wrong recipient. But there are differences between the cases: The differences between both cases refer to how such an employee can react. If the employee has granted access to a file repository, in principle, he or she can still restrict access retrospectively. In contrast, if the employee has sent an email, the information is definitely “gone”, and he or she can only ask the recipient not to read and/or open the content. However, in both cases employees often do not react at all, or they do not appropriately, because they fear negative consequences if his or her colleagues or superior find out about it.\r\nUse case 3: Unraveling the anonymity paradox!\r\nJonathan Fox (Cisco) demonstrated the challenges of data anonymisation in his keynote “Unravel the anonymization paradox!”.\r\n\r\n\r\nIf personal information were anonymized, all our privacy concerns would be gone! But what does “anonymized” mean? This question is one of the hardest to resolve in the privacy debate. At present, privacy experts are grappling with the paradox that – in the big data era – there is no anonymous data anymore. All data can always be related to an individual by means of data analysis technologies. The reason for this is that data is only considered “anonymized” if it cannot be related to an identified or even to an identifiable individual.\r\n\r\nIn order to understand this paradox, imagine more than three million Berlin citizens – and another million tourists – are carrying around their personal devices every single day. Imagine that there is a Berlin-wide wifi system, which is publically available for all people who have switched on their devices’ wifi by default. This wifi system collects the movement data of all these devices over a longer period of time. Can you imagine how useful this data would be for urban traffic management and many other innovations? But wouldn’t it be creepy if this data could also be misused against an individual later on? Imagine that this data is thus anonymized in order to mitigate these risks. In the process all personal identifiers (i.e. the MAC address and IMEI) of the devices captured by the wifi system – which could in principle lead to an identification of the owner or even carrier of a device – are “hashed” (i.e. substituted by a specific hash value for each identifier). This hash value does not, per se, contain information referring to the owner or carrier of the device. However, it is still possible to capture the device’s movement pattern by referring to this hash. This movement pattern becomes more and more precise over time. Now imagine a person who gets access to that movement pattern (e.g. an employee of the provider of the wifi system or another data-driven company) and suddenly discovers that this device must be owned by somebody he knows very well. The reason for this is that this device “leaves” the building where he lives at the same time every morning and “moves” to an address where only lawyers work: In terms of probability, that person must be his wife!\r\n\r\nThis risk of re-identification of “anonymized” data exists generally, where it is combined with further information. It is hard to say which information will be added and hard to say what the consequences of an identification are. It is hard to say under which conditions this risk is low enough in order to be socially acceptable.\r\nhttps://twitter.com/Booster_Space/status/916626137203314688\r\n\r\nhttps://twitter.com/mdennedy/status/916787900242591744\r\n\r\nhttps://twitter.com/Booster_Space/status/916700100277174272\r\n\r\nhttps://twitter.com/kunstet/status/917091957188546560\r\n\r\nhttps://twitter.com/klaus_lenssen/status/917093279304478720\r\n\r\nhttps://twitter.com/Booster_Space/status/917094486412550144\r\n\r\nAnd the winners are...\r\nTaking the perspective of an activist in a repressive state, the players of “Pieces of Data” learn how data collected by their smartphones can harm them, and even other parties – and how to protect themselves against such threats. \"Because this game was so advanced in its development, it won!\", Maximilian von Grafenstein states.\r\n\r\n\r\n\r\n\r\nThis Game Jam was part of our research project Privacy by Design in Smart Cities.\r\n\r\n\r\nThis post represents the view of the author and does not necessarily represent the view of the institute itself. For more information about the topics of these articles and associated research projects, please contact info@hiig.de.","url":"https://www.hiig.de/nichts-zu-verbergen/","employmentType":{"_edit_lock":["1542895217:127"],"_edit_last":["127"],"ftf_open_type":[""],"page_contacts":["a:2:{s:5:\"title\";s:0:\"\";s:4:\"text\";s:0:\"\";}"],"_thumbnail_id":["36576"],"_oembed_c8671b4e7f1bccb6d62cbcd67c20a958":[""],"_oembed_time_c8671b4e7f1bccb6d62cbcd67c20a958":["1508865059"],"_oembed_4f7e495dfc65a3c5070f13d0845d6711":[""],"_oembed_time_4f7e495dfc65a3c5070f13d0845d6711":["1508865059"],"_oembed_395236c9ec44dd9816f32d1c085d53bc":[""],"_oembed_785b8a0878a2e7bf047b064c3e031eb7":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— Chillian J. Yikes! (@jilliancyork) October 7, 2017
"],"_oembed_time_785b8a0878a2e7bf047b064c3e031eb7":["1508865060"],"_oembed_6a4cd4d09133f1b4c738ba4372392e77":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_6a4cd4d09133f1b4c738ba4372392e77":["1508865060"],"_oembed_a5da4167e5273cba2c982654bd1a959b":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_a5da4167e5273cba2c982654bd1a959b":["1508865060"],"_oembed_16a8b19c1dac77eb5a81509f516ada0d":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— M Dennedy (@mdennedy) October 7, 2017
"],"_oembed_time_16a8b19c1dac77eb5a81509f516ada0d":["1508865061"],"_oembed_87784d1f6723c3d48cdc8a028de189ad":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_87784d1f6723c3d48cdc8a028de189ad":["1508865061"],"_oembed_9427a27dbf5840d5d61ee445ef1fb985":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@kunstet) October 8, 2017
"],"_oembed_time_9427a27dbf5840d5d61ee445ef1fb985":["1508865061"],"_oembed_955b5074bef16ba521d93612683d5a04":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_time_955b5074bef16ba521d93612683d5a04":["1508865062"],"_oembed_8f51140a556ab596b11ce97bba249be2":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster_Space (@Booster_Space) October 8, 2017
"],"_oembed_time_8f51140a556ab596b11ce97bba249be2":["1508865062"],"_oembed_time_395236c9ec44dd9816f32d1c085d53bc":["1508315517"],"_oembed_55a2474b17bb10d36173243b8e131ae6":[""],"_oembed_time_55a2474b17bb10d36173243b8e131ae6":["1508865059"],"_wp_attachment_metadata":[""],"_oembed_62bacec4b19180e553d2a5b3e9ceb48d":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— ? jillian (@jilliancyork) October 7, 2017
"],"_oembed_time_62bacec4b19180e553d2a5b3e9ceb48d":["1522050391"],"_oembed_aeab31ee95e0e6928aa91c848d03eb1f":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_aeab31ee95e0e6928aa91c848d03eb1f":["1522050391"],"_oembed_aa96b7916eacba76df112a1c507ebc2b":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_aa96b7916eacba76df112a1c507ebc2b":["1522050392"],"_oembed_7ace6158f53c52e424e62011433fa8b3":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— M Dennedy (@mdennedy) October 7, 2017
"],"_oembed_time_7ace6158f53c52e424e62011433fa8b3":["1522050392"],"_oembed_73c12d3a09a9413016e9b769dcadd88c":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_73c12d3a09a9413016e9b769dcadd88c":["1522050392"],"_oembed_86ab31b810976948f4963dd29398bdca":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@kunstet) October 8, 2017
"],"_oembed_time_86ab31b810976948f4963dd29398bdca":["1522050392"],"_oembed_f50918019ebe78bb9bc288d64dc5c2c6":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_time_f50918019ebe78bb9bc288d64dc5c2c6":["1522050393"],"_oembed_8f578625ea3128311b9aba11ce213c6c":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster_Space (@Booster_Space) October 8, 2017
"],"_oembed_time_8f578625ea3128311b9aba11ce213c6c":["1522050393"],"_oembed_6ac0e6d9b4a0f8743315878729697707":[""],"_oembed_time_6ac0e6d9b4a0f8743315878729697707":["1523522861"],"_oembed_1c39d83bbd6a94494997d8a7adca4d8e":[""],"_oembed_time_1c39d83bbd6a94494997d8a7adca4d8e":["1523522861"],"_oembed_b9d01f5a8edf29269fb1e5fc087355f3":[""],"_oembed_time_b9d01f5a8edf29269fb1e5fc087355f3":["1523522862"],"_oembed_95a51a8ebadde63dd929fb8189c1d531":["

Despite my sleepiness, very happy to be at #privacyjam this fine Saturday morning! Good luck gamers, see you tomorrow!

— jillian (@jilliancyork) October 7, 2017
"],"_oembed_time_95a51a8ebadde63dd929fb8189c1d531":["1524654816"],"_oembed_c9c8f3d29411841a8bad15d2bf46ec48":[""],"_oembed_time_c9c8f3d29411841a8bad15d2bf46ec48":["1524654816"],"_oembed_203fe661ca376e99bb46849695d150f6":[""],"_oembed_time_203fe661ca376e99bb46849695d150f6":["1524654816"],"_oembed_d3fd49be259ea40c3323c31c8deca27b":[""],"_oembed_time_d3fd49be259ea40c3323c31c8deca27b":["1524654817"],"_oembed_3d3b00bdd4080fafb67d8296d4ce490b":["

@jilliancyork #PrivacyJam #Berlin @hiig_berlin “I’ve got nothing to hide” think again on the #4points + bonus! pic.twitter.com/GkAsTPEGhQ

— Lorena Marciano (@MarcianoLorena) October 7, 2017
"],"_oembed_time_3d3b00bdd4080fafb67d8296d4ce490b":["1524654817"],"_oembed_93779aae0732f901329f94900df0f33c":["

#PrivacyJam #GameJam It takes a village, and beer, to build a data centric game. pic.twitter.com/CNJ1J65x1J

— M Dennedy (@mdennedy) October 7, 2017
"],"_oembed_time_93779aae0732f901329f94900df0f33c":["1524654820"],"_oembed_e4b0d955b34a5bda11450521b75ad0cd":["

Brainstorming time! The teams are set up and already working on their ideas for the @hiig_berlin #privacyjam #GameJam pic.twitter.com/a5FDh03vkV

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_e4b0d955b34a5bda11450521b75ad0cd":["1524654821"],"_oembed_e5d643c1f127427a39c3a37fe713b96b":["

It's getting dark, but there's no time to waste and our Jamers are eager to go on! #privacyjam #gamejam @hiig_berlin pic.twitter.com/Yw2wetlkHy

— Booster_Space (@Booster_Space) October 7, 2017
"],"_oembed_time_e5d643c1f127427a39c3a37fe713b96b":["1524654822"],"_oembed_6bea571792646e3c3b180e7e0c8e94ee":["

Full house #privacyjam with @mdennedy en vogue for a 48h ride. #gamejam #privacy #nothingtohide #gaming #love #sweatergoals pic.twitter.com/EIIvXQjiAz

— Katharina Beitz (@kunstet) October 8, 2017
"],"_oembed_time_6bea571792646e3c3b180e7e0c8e94ee":["1524654822"],"_oembed_540154b563889795e69e874b99445189":["

The winners are … ‘the activists’ @hiig_berlin @Cisco_Germany #privacyjam pic.twitter.com/Hg323bYZ4R

— Klaus Lenssen (@klaus_lenssen) October 8, 2017
"],"_oembed_time_540154b563889795e69e874b99445189":["1524654822"],"_oembed_d3ca05a66e72673ce7fb883e741b8f3d":["

The #end of #privacyjam thanks to @hiig pic.twitter.com/62aqIWSNxH

— Booster_Space (@Booster_Space) October 8, 2017
"],"_oembed_time_d3ca05a66e72673ce7fb883e741b8f3d":["1524654823"]},"image":[{"@type":"ImageObject","@id":"https://www.hiig.de/nichts-zu-verbergen/#primaryimage","url":"https://www.hiig.de/wp-content/uploads/2017/10/GameJam_16-9-Skater.png","width":"1600","height":"901"},{"@type":"ImageObject","url":"https://www.hiig.de/wp-content/uploads/2017/10/GameJam_16-9-Skater-1200x900.png","width":"1200","height":"900"},{"@type":"ImageObject","url":"https://www.hiig.de/wp-content/uploads/2017/10/GameJam_16-9-Skater-1200x675.png","width":"1200","height":"675"}]}] Zum Inhalt springen
GameJam_16-9 Skater

Nichts zu verbergen?

18 Oktober 2017

In unserer vernetzten und digitalisierten Gesellschaft sind personenbezogene Daten das neue Gold. Immer mehr müssen wir uns mit komplexen Themen wie Privatsphäre und Datenschutz auseinandersetzen – besonders in der Arbeitswelt. Wie lassen sich diese Konzepte am besten erklären? Beim “Game Jam: Unveil the Privacy Threat” kamen EntwicklerInnen, DesignerInnen, Forschende und Kreative zusammen, um diese Sachverhalte durch Serious Games auf intuitive Weise zu vermitteln. Für den ersten Teil unseres Rückblicks hat HIIG-Forscher Maximilian von Grafenstein zusammengefasst, welche Spielideen konkret entwickelt wurden. Im zweiten Teil zeigen wir die besten #PrivacyJam Momente:

Before getting started with the development of game concepts, three use cases helped all participants to recollect the many facets of privacy.

Use case 1: I’ve got nothing to hide!

In her keynote, Jillian York (Director of International Freedom of Expression at Electronic Frontier Foundation) gave five reasons for why the statement “I’ve nothing to hide!” is wrong:

Many people think they have nothing to hide and thus do not need to protect their privacy. The reasoning behind this is that only people who have done something illegal would want to conceal their behavior; but, so the thinking goes, there’s no social need for protection for illegal behavior!

However, this only relates to a tiny part of privacy protection. In fact, privacy laws doesn’t just protect those (allegedly) engaged in “illegal” behavior. Privacy also protects a person against the loss of reputation that can occur when information is disclosed and/or used in the wrong context. As early as the 17th century, the French high priest and statesman Cardinal Richelieu stated: “Give me a letter of six sentences written by the most honorable man, and I will find something sufficient to hang him.” Of course, we don’t hang people anymore. However, what this kind of reasoning indicates is that there can always be somebody who wants to use personal information against someone. It is this misuse of personal information that privacy seeks to protect against. Some people even say that it actually doesn’t matter what you may have to hide; what matters is your ability to decide whether to hide something or not. This ability is guaranteed by privacy. Privacy is hence an essential precondition for the enrollment of an autonomous personality.

Use case 2: Oops… wrong recipient!

The second speaker, Michelle Dennedy (Cisco), illustrated how challenging it is to sensitise employees to privacy.

The most common privacy threat in companies arises when an employee accidentally sends personal information about somebody else to the wrong recipient. This may sound like a no-brainer, but in fact, it is one of the biggest challenges in implementing effective privacy protection policies within companies.

There are two typical constellations that give rise to slightly different challenges for companies trying to mitigate this threat: In the first constellation, an employee uses an email client, and in the second constellation, he/she grants access to a file depository. In both cases, an employee typically sends an email, or grants access to a repository, to the wrong recipient because the email client or repository incorrectly autocompletes the address based on the first few letters. The employee forgets to double-check the name and… oops, the information is sent to the wrong recipient. But there are differences between the cases: The differences between both cases refer to how such an employee can react. If the employee has granted access to a file repository, in principle, he or she can still restrict access retrospectively. In contrast, if the employee has sent an email, the information is definitely “gone”, and he or she can only ask the recipient not to read and/or open the content. However, in both cases employees often do not react at all, or they do not appropriately, because they fear negative consequences if his or her colleagues or superior find out about it.

Use case 3: Unraveling the anonymity paradox!

Jonathan Fox (Cisco) demonstrated the challenges of data anonymisation in his keynote “Unravel the anonymization paradox!”.

If personal information were anonymized, all our privacy concerns would be gone! But what does “anonymized” mean? This question is one of the hardest to resolve in the privacy debate. At present, privacy experts are grappling with the paradox that – in the big data era – there is no anonymous data anymore. All data can always be related to an individual by means of data analysis technologies. The reason for this is that data is only considered “anonymized” if it cannot be related to an identified or even to an identifiable individual.

In order to understand this paradox, imagine more than three million Berlin citizens – and another million tourists – are carrying around their personal devices every single day. Imagine that there is a Berlin-wide wifi system, which is publically available for all people who have switched on their devices’ wifi by default. This wifi system collects the movement data of all these devices over a longer period of time. Can you imagine how useful this data would be for urban traffic management and many other innovations? But wouldn’t it be creepy if this data could also be misused against an individual later on? Imagine that this data is thus anonymized in order to mitigate these risks. In the process all personal identifiers (i.e. the MAC address and IMEI) of the devices captured by the wifi system – which could in principle lead to an identification of the owner or even carrier of a device – are “hashed” (i.e. substituted by a specific hash value for each identifier). This hash value does not, per se, contain information referring to the owner or carrier of the device. However, it is still possible to capture the device’s movement pattern by referring to this hash. This movement pattern becomes more and more precise over time. Now imagine a person who gets access to that movement pattern (e.g. an employee of the provider of the wifi system or another data-driven company) and suddenly discovers that this device must be owned by somebody he knows very well. The reason for this is that this device “leaves” the building where he lives at the same time every morning and “moves” to an address where only lawyers work: In terms of probability, that person must be his wife!

This risk of re-identification of “anonymized” data exists generally, where it is combined with further information. It is hard to say which information will be added and hard to say what the consequences of an identification are. It is hard to say under which conditions this risk is low enough in order to be socially acceptable.

And the winners are…

Taking the perspective of an activist in a repressive state, the players of “Pieces of Data” learn how data collected by their smartphones can harm them, and even other parties – and how to protect themselves against such threats. “Because this game was so advanced in its development, it won!”, Maximilian von Grafenstein states.

This Game Jam was part of our research project Privacy by Design in Smart Cities.
This post represents the view of the author and does not necessarily represent the view of the institute itself. For more information about the topics of these articles and associated research projects, please contact info@hiig.de.

Dieser Beitrag spiegelt die Meinung der Autorinnen und Autoren und weder notwendigerweise noch ausschließlich die Meinung des Institutes wider. Für mehr Informationen zu den Inhalten dieser Beiträge und den assoziierten Forschungsprojekten kontaktieren Sie bitte info@hiig.de

Katrin Werner

Ehem. Koordinatorin für Wissenschaftskommunikation und Fundraising

HIIG Monthly Digest

Jetzt anmelden und  die neuesten Blogartikel gesammelt per Newsletter erhalten.

Man sieht in Leuchtschrift das Wort "Ethical"

Digitale Ethik

Ob Zivilgesellschaft, Politik oder Wissenschaft – alle scheinen sich einig, dass die Neuen Zwanziger im Zeichen der Digitalisierung stehen werden. Doch wo stehen wir aktuell beim Thema digitale Ethik? Wie schaffen wir eine digitale Transformation unter Einbindung der Gesamtgesellschaft, also auch der Menschen, die entweder nicht die finanziellen Mittel oder aber auch das nötige Know-How besitzen, um von der Digitalisierung zu profitieren?  Und was bedeuten diese umfassenden Änderungen unseres Agierens für die Demokratie? In diesem Dossier wollen wir diese Fragen behandeln und Denkanstöße bieten.

Discover all 12 articles

Weitere Artikel

Presseräte

Plattformräte: Können sie digitale Plattformen zur Verantwortung drängen?

Können Handlungen digitaler Plattformen gegenüber ihren Nutzer*innen durch Plattformräte rechenschaftspflichtig gemacht werden?

Accepting cookies

Datenschutz ja, aber mit Cookies? Was steckt hinter dem “Privacy Paradox”?

Warum stimmen wir Datenschutzvereinbarungen wie Cookies auf einer Website viel schneller zu und beachten sie online weniger als offline? Über das Privacy-Paradox-Phänomen

Algorithmische Inhaltemoderation – Was kann bleiben, was muss weg?

Automatisiertes Löschen in den sozialen Netzwerken gefährdet die Meinungsfreiheit. Wie könnten Regeln für die Moderation von Online-Inhalten aussehen? Autorin A. Borchardt beleuchtet einige Vorschläge.