Search this site
Embedded Files

blog
Concerning Privacy
  • Privacy Persuasion Personhood
  • HAL Knows
  • Cowboys and Carnivals
  • PRIVACY
    • UNDERSTANDING
      • Brandise
        • Let Alone
      • Regulation
        • GDPR
          • GDPR Overview
          • GDPR DETAILS
        • Verticals
        • FTC & antitrust
        • FTC Notice and Consent
        • 230
        • W3C
        • PIPL Intro
        • Regulation
      • LAW MEDIA
      • US Resources
        • STATE LAW
        • FederalMedia
        • Congress
        • U.S. Government
      • Resources
      • Legal Resources
    • ISSUES
      • AI - Algorithm
      • Big Tech
        • SOCIAL
        • facebook
      • IIOT
      • Quantum
      • Surveillance
      • CYBER WARFARE
        • TRADECRAFT
    • NEWS
      • Blogs
      • Topical
      • Archives
    • Topics
  • PERSUASION
    • INFLUENCE
      • OPINION
        • CONSPIRACY
      • PROPAGANDA
        • DISINFORMATION
          • Disinformation News
        • Thomas Paine
        • Thomas Jefferson
        • Polarized Thought
          • Anti Dualist Art
          • The Open Mind
      • DEMOCRACY
        • INEVITABLE
        • Digital Authoritarianism
        • Must See TV
        • US Stasi
        • Make It Stop (local)
    • PRESS
      • Enemies of Press
      • Interview With Angwin
      • LITERACY
        • Bias Aware News
      • SATIRE
      • FACTS
      • Fact Satire Conspiracy
    • SOLUTIONS
      • Cognitive Bias
        • Confirmation Bias
        • Cognitive Bias Lists
        • Bias Notes
      • Logical Fallacies
        • Wallace Shawn
      • Rhetoric
      • Door Riddle
  • PERSONHOOD
    • MANIPULATION
      • ADVERTISING
        • Surveilance Capitalism
        • The Century Of Self
        • The Cookie Conspiracy
      • INTERNET INFLUENCE
      • Dark Patterns
      • COERCION
        • CON MEN
        • CULTS
    • DYSTOPIA
      • Brazil
      • Brave New World
    • SOLUTIONS
      • The Human Condition
      • Documentaries
        • The Century of Self
      • TV - SERIES
      • Film
      • Music
        • Soundtrack of the Self
        • Music to Shop By
        • A western
    • example
  • ACTION
    • Business Resources
      • WIP
      • CIPP
        • Introduction
        • Limits
        • Access
        • Workplace
        • State
          • StateMedia
          • StateLaws
        • IAPP
      • CIPT
        • Foundational Principles
          • FIPPs
          • Frameworks
          • International
        • The Role of IT
        • Privacy By Design
          • Values Design
        • Modules
        • ITIP-Breaux
          • ITIP-Chpt2
        • Glossary
      • Privacy Policies
        • Airbnb
    • Activist Resources
      • Topics
      • Center For Media Democracy
      • EFF
      • ACLU
      • EPIC
    • Personal Resources
      • Home Privacy
      • Children
    • TECH
      • The Browser
  • NOTES
    • Privacy NOTES
    • persuasion NOTES
    • personhood NOTES
    • action NOTES
    • unsorted NOTES
    • DUMP
Concerning Privacy

OECD

  1. Collection Limitation Principle

  2. Data Quality Principle

  3. Purpose Specification Principle

  4. Use Limitation Principle

  5. Security Safeguards Principle

  6. Openness Principle

  7. Individual Participation Principle

  8. Accountability Principle




14 Value Methodologies

1 Direct and Indirect Stakeholder Analysis
2 Value Source Analysis
3 Co-evolution of Technology and Social Structure
.4 Value Scenario
5 Value Sketch
6 Value-oriented Semi-structured Interview
7 Scalable Information Dimensions
8 Value-oriented Coding Manual
9 Value-oriented Mock-up, Prototype, or Field Deployment
10 Ethnographically Informed Inquiry
11 Model for Informed Consent Online
12 Value Dams and Flows
13 Value Sensitive Action-Reflection Model
14 Envisioning Cards

FTC FIPPs

1. Notice/Awareness[12]

2. Choice/Consent[13]

3. Access/Participation[14]

4. Integrity/Security[15]

5. Enforcement/Redress[16]


SOLOVE


Information collection

Surveillance

Interrogation

Information processing

Aggregation

Identification

Insecurity

Secondary use

Exclusion


Information dissemination

Breach of confidentiality

Disclosure

Exposure

Increased accessibility

Appropriation

Distortion


Invasion

Intrusion

Decisional interference

  1. FAIR defines six kind of loss:[3]

        1. Productivity

        2. Response

        3. Replacement

        4. Fines and judgments (F/J)

        5. Competitive advantage (CA)t

        6. Reputation

  2. value/liability as:[3]

        1. Critical

        2. Cost

        3. Sensitivity

              1. Embarrassment

              2. Competitive advantage

              3. Legal/regulatory

              4. General

  3. Threat[edit]

      1. Access

      2. Misuse

      3. Disclose

      4. Modify

      5. Deny access


Begin with CH6: Interference and work "backwards." from har

https://iapp.org/resources/glossary/group/cipt/

substitute for law, reg, or policyFTC DHS

I had no questions on Nissenbaum, FAIR, encryption, controls (architect, secure…), high/low-level design, testing, or ongoing vigilance.

Questions related to harm were mixed with other topics; never direct. Several questions on FIPPS, anonymity techniques, automated decisions, and IAM.

Couple on Carlo and Value Sensitive Design (glad I studied that one…), and design patterns.

A. Privacy Risk Models and Frameworks
a.Nissenbaum’s Contextual Integrity b.Calo’s Harms Dimensions c.Legal Compliance d.FIPPs e.NIST/NICE frameworks f. FAIR (Factors Analysis in Information Risk)























































































Peace is not merely the absence of war
but the presence of justice, of law, of order, in short of government

Albert Einstein


Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse