Advertisement
data privacy and technology harvard: Technology and Privacy Philip Agre, Marc Rotenberg, 1998 Over the last several years, the realm of technology and privacy has been transformed, creating a landscape that is both dangerous and encouraging. Significant changes include large increases in communications bandwidths; the widespread adoption of computer networking and public-key cryptography; new digital media that support a wide range of social relationships; a massive body of practical experience in the development and application of data-protection laws; and the rapid globalization of manufacturing, culture, and policy making. The essays in this book provide a new conceptual framework for the analysis and debate of privacy policy and for the design and development of information systems. |
data privacy and technology harvard: Customer Data and Privacy: The Insights You Need from Harvard Business Review Harvard Business Review, Timothy Morey, Andrew Burt, Christine Moorman, Thomas C. Redman, 2020-09-22 Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust? Customer Data and Privacy: The Insights You Need from Harvard Business Review brings you today's most essential thinking on customer data and privacy to help you understand the tangled interdependencies and complexities of this evolving issue. The lessons in this book will help you develop strategies that allow your company to be a good steward, collecting, using, and storing customer data responsibly. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues—blockchain, cybersecurity, AI, and more—each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas—and prepare you and your company for the future. |
data privacy and technology harvard: Understanding Privacy Daniel J. Solove, 2010-03-30 Privacy is one of the most important concepts of our time, yet it is also one of the most elusive. As rapidly changing technology makes information increasingly available, scholars, activists, and policymakers have struggled to define privacy, with many conceding that the task is virtually impossible. In this concise and lucid book, Daniel J. Solove offers a comprehensive overview of the difficulties involved in discussions of privacy and ultimately provides a provocative resolution. He argues that no single definition can be workable, but rather that there are multiple forms of privacy, related to one another by family resemblances. His theory bridges cultural differences and addresses historical changes in views on privacy. Drawing on a broad array of interdisciplinary sources, Solove sets forth a framework for understanding privacy that provides clear, practical guidance for engaging with relevant issues. Understanding Privacy will be an essential introduction to long-standing debates and an invaluable resource for crafting laws and policies about surveillance, data mining, identity theft, state involvement in reproductive and marital decisions, and other pressing contemporary matters concerning privacy. |
data privacy and technology harvard: The Age of Surveillance Capitalism Shoshana Zuboff, 2019-01-15 The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called surveillance capitalism, and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new behavioral futures markets, where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new means of behavioral modification. The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a Big Other operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled hive of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it. |
data privacy and technology harvard: PrivacyÕs Blueprint Woodrow Hartzog, 2018-04-09 The case for taking design seriously in privacy law -- Why design is (almost) everything -- Privacy law's design gap -- Privacy values in design -- Setting boundaries for design -- A toolkit for privacy design -- Social media -- Hide and seek technologies -- The internet of things |
data privacy and technology harvard: Exposed Emily Hart, 2020-11-30 The death of Samantha Grey’s mother and imprisonment of her father made her shut everyone out of her life. Including him. Ten years later, the murder of her father brings them back together and now Detective Nate Evans has two mysteries on his hands: a murder to solve and a past of questions that still gnaw at the surface to face. A past he’s tried hard to bury. One that includes her. As Nate and Samantha are forced to work together to bring justice for the dead, it is clear the case is not the only mystery being unearthed between them. They are led down dark, township alleyways, towards drug-dealer territory, and into the box of a decade old cold case… but how long will they take to realize how deep the roots of this case go? Neither of them are prepared for the trials they face as they start digging through Samantha’s twisted family history and exposing the cost of hidden truths. Will the collision of the past and present destroy what little faith they have in finding healing, or will it be the key to solving the decade old mysteries between them and finding redemption in the chaos? Emily Hart is a young South African author. She’s been involved in humanitarian work in the Middle East and half a dozen African countries, meeting people and seeing places that inspire her writing. Emily lives in Stellenbosch with her family and five chickens. |
data privacy and technology harvard: Big Data, Health Law, and Bioethics I. Glenn Cohen, Holly Fernandez Lynch, Effy Vayena, Urs Gasser, 2018-03-08 When data from all aspects of our lives can be relevant to our health - from our habits at the grocery store and our Google searches to our FitBit data and our medical records - can we really differentiate between big data and health big data? Will health big data be used for good, such as to improve drug safety, or ill, as in insurance discrimination? Will it disrupt health care (and the health care system) as we know it? Will it be possible to protect our health privacy? What barriers will there be to collecting and utilizing health big data? What role should law play, and what ethical concerns may arise? This timely, groundbreaking volume explores these questions and more from a variety of perspectives, examining how law promotes or discourages the use of big data in the health care sphere, and also what we can learn from other sectors. |
data privacy and technology harvard: Access to Justice Rebecca L. Sanderfur, 2009-03-23 Around the world, access to justice enjoys an energetic and passionate resurgence as an object both of scholarly inquiry and political contest, as both a social movement and a value commitment motivating study and action. This work evidences a deeper engagement with social theory than past generations of scholarship. |
data privacy and technology harvard: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Bruce Schneier, 2015-03-02 “Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches. Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again. |
data privacy and technology harvard: Cybersecurity Harvard Business Review, Alex Blau, Andrew Burt, Boris Groysberg, Roman V. Yampolskiy, 2019-08-27 No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no longer be left exclusively to IT specialists. Improving and increasing data security practices and identifying suspicious activity is everyone's responsibility, from the boardroom to the break room. Cybersecurity: The Insights You Need from Harvard Business Review brings you today's most essential thinking on cybersecurity, from outlining the challenges to exploring the solutions, and provides you with the critical information you need to prepare your company for the inevitable hack. The lessons in this book will help you get everyone in your organization on the same page when it comes to protecting your most valuable assets. Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future with the Insights You Need from Harvard Business Review series. Featuring HBR's smartest thinking on fast-moving issues--blockchain, cybersecurity, AI, and more--each book provides the foundational introduction and practical case studies your organization needs to compete today and collects the best research, interviews, and analysis to get it ready for tomorrow. You can't afford to ignore how these issues will transform the landscape of business and society. The Insights You Need series will help you grasp these critical ideas--and prepare you and your company for the future. |
data privacy and technology harvard: The Connected Parent John Palfrey, Urs Gasser, 2020-10-06 An essential guide for parents navigating the new frontier of hyper-connected kids. Today's teenagers spend about nine hours per day online. Parents of this ultra-connected generation struggle with decisions completely new to parenting: Should an eight-year-old be allowed to go on social media? How can parents help their children gain the most from the best aspects of the digital age? How can we keep kids safe from digital harm? John Palfrey and Urs Gasser bring together over a decade of research at Harvard to tackle parents' most urgent concerns. The Connected Parent is required reading for anyone trying to help their kids flourish in the fast-changing, uncharted territory of the digital age. |
data privacy and technology harvard: The Race between Education and Technology Claudia Goldin, Lawrence F. Katz, 2009-07-01 This book provides a careful historical analysis of the co-evolution of educational attainment and the wage structure in the United States through the twentieth century. The authors propose that the twentieth century was not only the American Century but also the Human Capital Century. That is, the American educational system is what made America the richest nation in the world. Its educational system had always been less elite than that of most European nations. By 1900 the U.S. had begun to educate its masses at the secondary level, not just in the primary schools that had remarkable success in the nineteenth century. The book argues that technological change, education, and inequality have been involved in a kind of race. During the first eight decades of the twentieth century, the increase of educated workers was higher than the demand for them. This had the effect of boosting income for most people and lowering inequality. However, the reverse has been true since about 1980. This educational slowdown was accompanied by rising inequality. The authors discuss the complex reasons for this, and what might be done to ameliorate it. |
data privacy and technology harvard: The Right of Publicity Jennifer Rothman, 2018-05-07 Who controls how one’s identity is used by others? This legal question, centuries old, demands greater scrutiny in the Internet age. Jennifer Rothman uses the right of publicity—a little-known law, often wielded by celebrities—to answer that question, not just for the famous but for everyone. In challenging the conventional story of the right of publicity’s emergence, development, and justifications, Rothman shows how it transformed people into intellectual property, leading to a bizarre world in which you can lose ownership of your own identity. This shift and the right’s subsequent expansion undermine individual liberty and privacy, restrict free speech, and suppress artistic works. The Right of Publicity traces the right’s origins back to the emergence of the right of privacy in the late 1800s. The central impetus for the adoption of privacy laws was to protect people from “wrongful publicity.” This privacy-based protection was not limited to anonymous private citizens but applied to famous actors, athletes, and politicians. Beginning in the 1950s, the right transformed into a fully transferable intellectual property right, generating a host of legal disputes, from control of dead celebrities like Prince, to the use of student athletes’ images by the NCAA, to lawsuits by users of Facebook and victims of revenge porn. The right of publicity has lost its way. Rothman proposes returning the right to its origins and in the process reclaiming privacy for a public world. |
data privacy and technology harvard: Remote Work Revolution Tsedal Neeley, 2021-03-30 LONGLISTED FOR THE FINANCIAL TIMES & MCKINSEY BUSINESS BOOK OF THE YEAR “I often talk about the importance of trust when it comes to work: the trust of your employees and building trust with your customers. This book provides a blueprint for how to build and maintain that trust and connection in a digital environment.” —Eric S. Yuan, founder and CEO of Zoom A Harvard Business School professor and leading expert in virtual and global work provides remote workers and leaders with the best practices necessary to perform at the highest levels in their organizations. The rapid and unprecedented changes brought on by Covid-19 have accelerated the transition to remote working, requiring the wholesale migration of nearly entire companies to virtual work in just weeks, leaving managers and employees scrambling to adjust. This massive transition has forced companies to rapidly advance their digital footprint, using cloud, storage, cybersecurity, and device tools to accommodate their new remote workforce. Experiencing the benefits of remote working—including nonexistent commute times, lower operational costs, and a larger pool of global job applicants—many companies, including Twitter and Google, plan to permanently incorporate remote days or give employees the option to work from home full-time. But virtual work has it challenges. Employees feel lost, isolated, out of sync, and out of sight. They want to know how to build trust, maintain connections without in-person interactions, and a proper work/life balance. Managers want to know how to lead virtually, how to keep their teams motivated, what digital tools they’ll need, and how to keep employees productive. Providing compelling, evidence-based answers to these and other pressing issues, Remote Work Revolution is essential for navigating the enduring challenges teams and managers face. Filled with specific actionable steps and interactive tools, this timely book will help team members deliver results previously out of reach. Following Neeley’s advice, employees will be able to break through routine norms to successfully use remote work to benefit themselves, their groups, and ultimately their organizations. |
data privacy and technology harvard: Code Director Edmond J Safra Center for Ethics and Roy L Furman Professorship of Law Lawrence Lessig, Lawrence Lessig, 2016-08-31 There's a common belief that cyberspace cannot be regulated-that it is, in its very essence, immune from the government's (or anyone else's) control.Code argues that this belief is wrong. It is not in the nature of cyberspace to be unregulable; cyberspace has no nature. It only has code-the software and hardware that make cyberspace what it is. That code can create a place of freedom-as the original architecture of the Net did-or a place of exquisitely oppressive control.If we miss this point, then we will miss how cyberspace is changing. Under the influence of commerce, cyberpsace is becoming a highly regulable space, where our behavior is much more tightly controlled than in real space.But that's not inevitable either. We can-we must-choose what kind of cyberspace we want and what freedoms we will guarantee. These choices are all about architecture: about what kind of code will govern cyberspace, and who will control it. In this realm, code is the most significant form of law, and it is up to lawyers, policymakers, and especially citizens to decide what values that code embodies. |
data privacy and technology harvard: The Black Box Society Frank Pasquale, 2015-01-05 Every day, corporations are connecting the dots about our personal behavior—silently scrutinizing clues left behind by our work habits and Internet use. The data compiled and portraits created are incredibly detailed, to the point of being invasive. But who connects the dots about what firms are doing with this information? The Black Box Society argues that we all need to be able to do so—and to set limits on how big data affects our lives. Hidden algorithms can make (or ruin) reputations, decide the destiny of entrepreneurs, or even devastate an entire economy. Shrouded in secrecy and complexity, decisions at major Silicon Valley and Wall Street firms were long assumed to be neutral and technical. But leaks, whistleblowers, and legal disputes have shed new light on automated judgment. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only scratched the surface of this troubling behavior. Frank Pasquale exposes how powerful interests abuse secrecy for profit and explains ways to rein them in. Demanding transparency is only the first step. An intelligible society would assure that key decisions of its most important firms are fair, nondiscriminatory, and open to criticism. Silicon Valley and Wall Street need to accept as much accountability as they impose on others. |
data privacy and technology harvard: The Hacker and the State Ben Buchanan, 2020-02-25 “A must-read...It reveals important truths.” —Vint Cerf, Internet pioneer “One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.” —Thomas Rid, author of Active Measures Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists. Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph. “A helpful reminder...of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission.” —Jonathan Freedland, New York Review of Books “The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age.” —General David Petraeus, former Director of the CIA “Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war—what Buchanan refers to as ‘real geopolitical competition.’” —Richard Harknett, former Scholar-in-Residence at United States Cyber Command |
data privacy and technology harvard: Regenesis George M Church, Edward Regis, 2014-04-08 A Harvard biologist and master inventor explores how new biotechnologies will enable us to bring species back from the dead, unlock vast supplies of renewable energy, and extend human life. In Regenesis, George Church and science writer Ed Regis explore the possibilities of the emerging field of synthetic biology. Synthetic biology, in which living organisms are selectively altered by modifying substantial portions of their genomes, allows for the creation of entirely new species of organisms. These technologies-far from the out-of-control nightmare depicted in science fiction-have the power to improve human and animal health, increase our intelligence, enhance our memory, and even extend our life span. A breathtaking look at the potential of this world-changing technology, Regenesis is nothing less than a guide to the future of life. |
data privacy and technology harvard: Harvard Business Review on Aligning Technology with Strategy Harvard Business Review, 2011-02-24 Most companies waste billions of dollars on technology. Don't be one of them. If you need the best practices and ideas for unleashing technology's strategic potential--but don't have time to find them--this book is for you. Here are eight inspiring and useful perspectives, all in one place. This collection of HBR articles will help you: - Clarify corporate strategy with your IT department - Fund only IT projects that support your strategy - Transform IT investments into profits - Build one technology platform for your entire organization - Adopt new technologies only when their best practices are established - Use analytics to make smart decisions at all levels of your company - Integrate social media into your business |
data privacy and technology harvard: The Digital Person Daniel J Solove, 2004 Daniel Solove presents a startling revelation of how digital dossiers are created, usually without the knowledge of the subject, & argues that we must rethink our understanding of what privacy is & what it means in the digital age before addressing the need to reform the laws that regulate it. |
data privacy and technology harvard: The Next Billion Users Payal Arora, 2019-02-25 A digital anthropologist examines the online lives of millions of people in China, India, Brazil, and across the Middle East—home to most of the world’s internet users—and discovers that what they are doing is not what we imagine. New-media pundits obsess over online privacy and security, cyberbullying, and revenge porn, but do these things really matter in most of the world? The Next Billion Users reveals that many assumptions about internet use in developing countries are wrong. After immersing herself in factory towns, slums, townships, and favelas, Payal Arora assesses real patterns of internet usage in India, China, South Africa, Brazil, and the Middle East. She finds Himalayan teens growing closer by sharing a single computer with common passwords and profiles. In China’s gaming factories, the line between work and leisure disappears. In Riyadh, a group of young women organizes a YouTube fashion show. Why do citizens of states with strict surveillance policies appear to care so little about their digital privacy? Why do Brazilians eschew geo-tagging on social media? What drives young Indians to friend “foreign” strangers on Facebook and give “missed calls” to people? The Next Billion Users answers these questions and many more. Through extensive fieldwork, Arora demonstrates that the global poor are far from virtuous utilitarians who mainly go online to study, find jobs, and obtain health information. She reveals habits of use bound to intrigue everyone from casual internet users to developers of global digital platforms to organizations seeking to reach the next billion internet users. |
data privacy and technology harvard: The Algorithmic Foundations of Differential Privacy Cynthia Dwork, Aaron Roth, 2014 The problem of privacy-preserving data analysis has a long history spanning multiple disciplines. As electronic data about individuals becomes increasingly detailed, and as technology enables ever more powerful collection and curation of these data, the need increases for a robust, meaningful, and mathematically rigorous definition of privacy, together with a computationally rich class of algorithms that satisfy this definition. Differential Privacy is such a definition. The Algorithmic Foundations of Differential Privacy starts out by motivating and discussing the meaning of differential privacy, and proceeds to explore the fundamental techniques for achieving differential privacy, and the application of these techniques in creative combinations, using the query-release problem as an ongoing example. A key point is that, by rethinking the computational goal, one can often obtain far better results than would be achieved by methodically replacing each step of a non-private computation with a differentially private implementation. Despite some powerful computational results, there are still fundamental limitations. Virtually all the algorithms discussed herein maintain differential privacy against adversaries of arbitrary computational power -- certain algorithms are computationally intensive, others are efficient. Computational complexity for the adversary and the algorithm are both discussed. The monograph then turns from fundamentals to applications other than query-release, discussing differentially private methods for mechanism design and machine learning. The vast majority of the literature on differentially private algorithms considers a single, static, database that is subject to many analyses. Differential privacy in other models, including distributed databases and computations on data streams, is discussed. The Algorithmic Foundations of Differential Privacy is meant as a thorough introduction to the problems and techniques of differential privacy, and is an invaluable reference for anyone with an interest in the topic. |
data privacy and technology harvard: None of Your Business Peter P. Swire, Robert E. Litan, 2010-12-01 The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack “adequate” protection of privacy. If enforced as written, the Directive could create enormous obstacles to commerce between Europe and other countries, such as the United States, that do not have comprehensive privacy statutes. In this book, Peter Swire and Robert Litan provide the first detailed analysis of the sector-by-sector effects of the Directive. They examine such topics as the text of the Directive, the tension between privacy laws and modern information technologies, issues affecting a wide range of businesses and other organizations, effects on the financial services sector, and effects on other prominent sectors with large transborder data flows. In light of the many and significant effects of the Directive as written, the book concludes with detailed policy recommendations on how to avoid a coming trade war with Europe. The book will be of interest to the wide range of individuals and organizations affected by the important new European privacy laws. More generally, the privacy clash discussed in the book will prove a major precedent for how electronic commerce and world data flows will be governed in the Internet Age. |
data privacy and technology harvard: Interop John Palfrey, Urs Gasser, 2012-06-05 In Interop, technology experts John Palfrey and Urs Gasser explore the immense importance of interoperability -- the standardization and integration of technology -- and show how this simple principle will hold the key to our success in the coming decades and beyond. The practice of standardization has been facilitating innovation and economic growth for centuries. The standardization of the railroad gauge revolutionized the flow of commodities, the standardization of money revolutionized debt markets and simplified trade, and the standardization of credit networks has allowed for the purchase of goods using money deposited in a bank half a world away. These advancements did not eradicate the different systems they affected; instead, each system has been transformed so that it can interoperate with systems all over the world, while still preserving local diversity. As Palfrey and Gasser show, interoperability is a critical aspect of any successful system -- and now it is more important than ever. Today we are confronted with challenges that affect us on a global scale: the financial crisis, the quest for sustainable energy, and the need to reform health care systems and improve global disaster response systems. The successful flow of information across systems is crucial if we are to solve these problems, but we must also learn to manage the vast degree of interconnection inherent in each system involved. Interoperability offers a number of solutions to these global challenges, but Palfrey and Gasser also consider its potential negative effects, especially with respect to privacy, security, and co-dependence of states; indeed, interoperability has already sparked debates about document data formats, digital music, and how to create successful yet safe cloud computing. Interop demonstrates that, in order to get the most out of interoperability while minimizing its risks, we will need to fundamentally revisit our understanding of how it works, and how it can allow for improvements in each of its constituent parts. In Interop, Palfrey and Gasser argue that there needs to be a nuanced, stable theory of interoperability -- one that still generates efficiencies, but which also ensures a sustainable mode of interconnection. Pointing the way forward for the new information economy, Interop provides valuable insights into how technological integration and innovation can flourish in the twenty-first century. |
data privacy and technology harvard: Asian Data Privacy Laws Graham Greenleaf, 2014-10-16 The first work to examine data privacy laws across Asia, covering all 26 countries and separate jurisdictions, and with in-depth analysis of the 14 which have specialised data privacy laws. Professor Greenleaf demonstrates the increasing world-wide significance of data privacy and the international context of the development of national data privacy laws as well as assessing the laws, their powers and their enforcement against international standards. The book also contains a web link to an update to mid-2017. |
data privacy and technology harvard: Artificial Intelligence Harvard Business Review, 2019 Companies that don't use AI to their advantage will soon be left behind. Artificial intelligence and machine learning will drive a massive reshaping of the economy and society. What should you and your company be doing right now to ensure that your business is poised for success? These articles by AI experts and consultants will help you understand today's essential thinking on what AI is capable of now, how to adopt it in your organization, and how the technology is likely to evolve in the near future. Artificial Intelligence: The Insights You Need from Harvard Business Review will help you spearhead important conversations, get going on the right AI initiatives for your company, and capitalize on the opportunity of the machine intelligence revolution. Catch up on current topics and deepen your understanding of them with the Insights You Need series from Harvard Business Review. Featuring some of HBR's best and most recent thinking, Insights You Need titles are both a primer on today's most pressing issues and an extension of the conversation, with interesting research, interviews, case studies, and practical ideas to help you explore how a particular issue will impact your company and what it will mean for you and your business. |
data privacy and technology harvard: Sharenthood Leah A. Plunkett, 2020-12-08 From baby pictures in the cloud to a high school's digital surveillance system: how adults unwittingly compromise children's privacy online. Our children's first digital footprints are made before they can walk—even before they are born—as parents use fertility apps to aid conception, post ultrasound images, and share their baby's hospital mug shot. Then, in rapid succession come terabytes of baby pictures stored in the cloud, digital baby monitors with built-in artificial intelligence, and real-time updates from daycare. When school starts, there are cafeteria cards that catalog food purchases, bus passes that track when kids are on and off the bus, electronic health records in the nurse's office, and a school surveillance system that has eyes everywhere. Unwittingly, parents, teachers, and other trusted adults are compiling digital dossiers for children that could be available to everyone—friends, employers, law enforcement—forever. In this incisive book, Leah Plunkett examines the implications of “sharenthood”—adults' excessive digital sharing of children's data. She outlines the mistakes adults make with kids' private information, the risks that result, and the legal system that enables “sharenting.” Plunkett describes various modes of sharenting—including “commercial sharenting,” efforts by parents to use their families' private experiences to make money—and unpacks the faulty assumptions made by our legal system about children, parents, and privacy. She proposes a “thought compass” to guide adults in their decision making about children's digital data: play, forget, connect, and respect. Enshrining every false step and bad choice, Plunkett argues, can rob children of their chance to explore and learn lessons. The Internet needs to forget. We need to remember. |
data privacy and technology harvard: The Tech That Comes Next Amy Sample Ward, Afua Bruce, 2022-03-15 Changing the way we use, develop, and fund technology for social change is possible, and it starts with you. The Tech That Comes Next: How Changemakers, Philanthropists, and Technologists Can Build an Equitable World outlines a vision of a more equitable and just world along with practical steps to creating it, appropriately leveraging technology along the way. In the book, you'll find: Strategies for changing culture and investments inside social impact organizations Ways to change technology development so it incorporates more of society Examples of data, security, and privacy laws and policies that need to change to protect vulnerable populations and advance positive change Ideal for nonprofit leaders, social activists, policymakers, technologists, entrepreneurs, founders, managers, and other business leaders, The Tech That Comes Next belongs in the libraries of anyone who envisions a world in which technology helps advance, rather than hinders, positive social change. |
data privacy and technology harvard: Privacy in the Modern Age Marc Rotenberg, Jeramie Scott, Julia Horwitz, 2015-05-12 The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies. The contributors to this anthology don't simply describe these problems or warn about the loss of privacy—they propose solutions. They look closely at business practices, public policy, and technology design, and ask, “Should this continue? Is there a better approach?” They take seriously the dictum of Thomas Edison: “What one creates with his hand, he should control with his head.” It's a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there's a problem—let's find a solution. |
data privacy and technology harvard: Life 3.0 Max Tegmark, 2017-08-29 New York Times Best Seller How will Artificial Intelligence affect crime, war, justice, jobs, society and our very sense of being human? The rise of AI has the potential to transform our future more than any other technology—and there’s nobody better qualified or situated to explore that future than Max Tegmark, an MIT professor who’s helped mainstream research on how to keep AI beneficial. How can we grow our prosperity through automation without leaving people lacking income or purpose? What career advice should we give today’s kids? How can we make future AI systems more robust, so that they do what we want without crashing, malfunctioning or getting hacked? Should we fear an arms race in lethal autonomous weapons? Will machines eventually outsmart us at all tasks, replacing humans on the job market and perhaps altogether? Will AI help life flourish like never before or give us more power than we can handle? What sort of future do you want? This book empowers you to join what may be the most important conversation of our time. It doesn’t shy away from the full range of viewpoints or from the most controversial issues—from superintelligence to meaning, consciousness and the ultimate physical limits on life in the cosmos. |
data privacy and technology harvard: The Social Machine Judith Donath, 2014-05-23 New ways to design spaces for online interaction—and how they will change society. Computers were first conceived as “thinking machines,” but in the twenty-first century they have become social machines, online places where people meet friends, play games, and collaborate on projects. In this book, Judith Donath argues persuasively that for social media to become truly sociable media, we must design interfaces that reflect how we understand and respond to the social world. People and their actions are still harder to perceive online than face to face: interfaces are clunky, and we have less sense of other people's character and intentions, where they congregate, and what they do. Donath presents new approaches to creating interfaces for social interaction. She addresses such topics as visualizing social landscapes, conversations, and networks; depicting identity with knowledge markers and interaction history; delineating public and private space; and bringing the online world's open sociability into the physical world. Donath asks fundamental questions about how we want to live online and offers thought-provoking designs that explore radically new ways of interacting and communicating. |
data privacy and technology harvard: Driving Digital Strategy Sunil Gupta, 2018-07-24 Digital transformation is no longer news--it's a necessity. Despite the widespread threat of disruption, many large companies in traditional industries have succeeded at digitizing their businesses in truly transformative ways. The New York Times, formerly a bastion of traditional media, has created a thriving digital product behind a carefully designed paywall. Best Buy has transformed its business in the face of Amazon's threat. John Deere has formed a data-analysis arm to complement its farm-equipment business. And Goldman Sachs and many others are using digital technologies to reimagine their businesses. In Driving Digital Strategy, Harvard Business School professor Sunil Gupta provides an actionable framework for following their lead. For over a decade, Gupta has studied digital transformation at Fortune 500 companies. He knows what works and what doesn't. Merely dabbling in digital or launching a small independent unit, which many companies do, will not bring success. Instead you need to fundamentally change the core of your business and ensure that your digital strategy touches all aspects of your organization: your business model, value chain, customer relationships, and company culture. Gupta covers each aspect in vivid detail while providing navigation tips and best practices along the way. Filled with rich and illuminating case studies of companies at the forefront of digital transformation, Driving Digital Strategy is the comprehensive guide you need to take full advantage of the limitless opportunities the digital age provides. |
data privacy and technology harvard: A Leader's Guide to Cybersecurity Thomas J. Parenty, Jack J. Domet, 2019-12-03 Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe. Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide. Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable net that covers everything an organization does--from its business operations, models, and strategies to its products and intellectual property. And boards are in the best position to oversee the needed changes to strategy and hold their companies accountable. Not surprisingly, many boards aren't prepared to assume this responsibility. In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who have spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. This includes: Understanding cyber risks and how best to control them Planning and preparing for a crisis--and leading in its aftermath Making cybersecurity a companywide initiative and responsibility Drawing attention to the nontechnical dynamics that influence the effectiveness of cybersecurity measures Aligning the board, executive leadership, and cybersecurity teams on priorities Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition. |
data privacy and technology harvard: The Fourth Industrial Revolution Klaus Schwab, 2017-01-03 World-renowned economist Klaus Schwab, Founder and Executive Chairman of the World Economic Forum, explains that we have an opportunity to shape the fourth industrial revolution, which will fundamentally alter how we live and work. Schwab argues that this revolution is different in scale, scope and complexity from any that have come before. Characterized by a range of new technologies that are fusing the physical, digital and biological worlds, the developments are affecting all disciplines, economies, industries and governments, and even challenging ideas about what it means to be human. Artificial intelligence is already all around us, from supercomputers, drones and virtual assistants to 3D printing, DNA sequencing, smart thermostats, wearable sensors and microchips smaller than a grain of sand. But this is just the beginning: nanomaterials 200 times stronger than steel and a million times thinner than a strand of hair and the first transplant of a 3D printed liver are already in development. Imagine “smart factories” in which global systems of manufacturing are coordinated virtually, or implantable mobile phones made of biosynthetic materials. The fourth industrial revolution, says Schwab, is more significant, and its ramifications more profound, than in any prior period of human history. He outlines the key technologies driving this revolution and discusses the major impacts expected on government, business, civil society and individuals. Schwab also offers bold ideas on how to harness these changes and shape a better future—one in which technology empowers people rather than replaces them; progress serves society rather than disrupts it; and in which innovators respect moral and ethical boundaries rather than cross them. We all have the opportunity to contribute to developing new frameworks that advance progress. |
data privacy and technology harvard: Privacy in Context Helen Nissenbaum, 2009-11-24 Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life. |
data privacy and technology harvard: Breached! Daniel J. Solove, Woodrow Hartzog, 2022 Web-based connections permeate our lives - and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how many problems there are with cybersecurity. Despite the passage of many data security laws, data breaches are increasingat a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world's leading experts on cybersecurity and privacy issues, argue that the law fails because, ironically, it focuses too much on the breach itself.Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented through inexpensive, non-cumbersome means. They also reveal why the current law is counterproductive. It pummels organizations that have suffered a breach, butdoesn't recognize other contributors to the breach. These outside actors include software companies that create vulnerable software, device companies that make insecure devices, government policymakers who write regulations that increase security risks, organizations that train people to engage inrisky behaviors, and more.The law's also ignores the role that good privacy practices can play. Although humans are the weakest link for data security, the law remains oblivious to the fact that policies and technologies are often designed with a poor understanding of human behavior. Breached! corrects this course byfocusing on the human side of security. This book sets out a holistic vision for data security law - one that holds all actors accountable, understands security broadly and in relationship to privacy, looks to prevention rather than reaction, and is designed with people in mind. The book closes witha roadmap for how we can reboot law and policy surrounding cybersecurity so that breaches become much rarer events. |
data privacy and technology harvard: We, the Data Wendy H. Wong, 2023-10-10 A rallying call for extending human rights beyond our physical selves—and why we need to reboot rights in our data-intensive world. Our data-intensive world is here to stay, but does that come at the cost of our humanity in terms of autonomy, community, dignity, and equality? In We, the Data, Wendy H. Wong argues that we cannot allow that to happen. Exploring the pervasiveness of data collection and tracking, Wong reminds us that we are all stakeholders in this digital world, who are currently being left out of the most pressing conversations around technology, ethics, and policy. This book clarifies the nature of datafication and calls for an extension of human rights to recognize how data complicate what it means to safeguard and encourage human potential. As we go about our lives, we are co-creating data through what we do. We must embrace that these data are a part of who we are, Wong explains, even as current policies do not yet reflect the extent to which human experiences have changed. This means we are more than mere “subjects” or “sources” of data “by-products” that can be harvested and used by technology companies and governments. By exploring data rights, facial recognition technology, our posthumous rights, and our need for a right to data literacy, Wong has crafted a compelling case for engaging as stakeholders to hold data collectors accountable. Just as the Universal Declaration of Human Rights laid the global groundwork for human rights, We, the Data gives us a foundation upon which we claim human rights in the age of data. |
data privacy and technology harvard: Schneier on Security Bruce Schneier, 2009-03-16 Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level -- business, technical, or personal. |
data privacy and technology harvard: Born Digital John Palfrey, Urs Gasser, 2011 The first generation of Digital Natives children who were born into and raised in the digital world are coming of age, and soon our world will be reshaped in their image. Our economy, our politics, our culture, and even the shape of our family life will be forever transformed. But who are these Digital Natives? And what is the world theyre creating going to look like? In Born Digital, leading Internet and technology experts John Palfrey and Urs Gasser offer a sociological portrait of these young people, who can seem, even to those merely a generation older, both extraordinarily sophisticated and strangely narrow. Exploring a broad range of issues, from the highly philosophical to the purely practical, Born Digital will be essential reading for parents, teachers, and the myriad of confused adults who want to understand the digital present and shape the digital future. |
data privacy and technology harvard: The Smart Enough City Ben Green, 2019-04-09 Why technology is not an end in itself, and how cities can be “smart enough,” using technology to promote democracy and equity. Smart cities, where technology is used to solve every problem, are hailed as futuristic urban utopias. We are promised that apps, algorithms, and artificial intelligence will relieve congestion, restore democracy, prevent crime, and improve public services. In The Smart Enough City, Ben Green warns against seeing the city only through the lens of technology; taking an exclusively technical view of urban life will lead to cities that appear smart but under the surface are rife with injustice and inequality. He proposes instead that cities strive to be “smart enough”: to embrace technology as a powerful tool when used in conjunction with other forms of social change—but not to value technology as an end in itself. In a technology-centric smart city, self-driving cars have the run of downtown and force out pedestrians, civic engagement is limited to requesting services through an app, police use algorithms to justify and perpetuate racist practices, and governments and private companies surveil public space to control behavior. Green describes smart city efforts gone wrong but also smart enough alternatives, attainable with the help of technology but not reducible to technology: a livable city, a democratic city, a just city, a responsible city, and an innovative city. By recognizing the complexity of urban life rather than merely seeing the city as something to optimize, these Smart Enough Cities successfully incorporate technology into a holistic vision of justice and equity. |
Data and Digital Outputs Management Plan (DDOMP)
Data and Digital Outputs Management Plan (DDOMP)
Building New Tools for Data Sharing and Reuse through a …
Jan 10, 2019 · The SEI CRA will closely link research thinking and technological innovation toward accelerating the full path of discovery-driven data use and open science. This will …
Open Data Policy and Principles - Belmont Forum
The data policy includes the following principles: Data should be: Discoverable through catalogues and search engines; Accessible as open data by default, and made available with …
Belmont Forum Adopts Open Data Principles for Environmental …
Jan 27, 2016 · Adoption of the open data policy and principles is one of five recommendations in A Place to Stand: e-Infrastructures and Data Management for Global Change Research, …
Belmont Forum Data Accessibility Statement and Policy
The DAS encourages researchers to plan for the longevity, reusability, and stability of the data attached to their research publications and results. Access to data promotes reproducibility, …
Climate-Induced Migration in Africa and Beyond: Big Data and …
CLIMB will also leverage earth observation and social media data, and combine them with survey and official statistical data. This holistic approach will allow us to analyze migration process …
Advancing Resilience in Low Income Housing Using Climate …
Jun 4, 2020 · Environmental sustainability and public health considerations will be included. Machine Learning and Big Data Analytics will be used to identify optimal disaster resilient …
Belmont Forum
What is the Belmont Forum? The Belmont Forum is an international partnership that mobilizes funding of environmental change research and accelerates its delivery to remove critical …
Waterproofing Data: Engaging Stakeholders in Sustainable Flood …
Apr 26, 2018 · Waterproofing Data investigates the governance of water-related risks, with a focus on social and cultural aspects of data practices. Typically, data flows up from local levels …
Data Management Annex (Version 1.4) - Belmont Forum
A full Data Management Plan (DMP) for an awarded Belmont Forum CRA project is a living, actively updated document that describes the data management life cycle for the data to be …
Data and Digital Outputs Management Plan (DDOMP)
Data and Digital Outputs Management Plan (DDOMP)
Building New Tools for Data Sharing and Reuse through a …
Jan 10, 2019 · The SEI CRA will closely link research thinking and technological innovation toward accelerating the full path of discovery-driven data use and open science. This will …
Open Data Policy and Principles - Belmont Forum
The data policy includes the following principles: Data should be: Discoverable through catalogues and search engines; Accessible as open data by default, and made available with …
Belmont Forum Adopts Open Data Principles for Environmental …
Jan 27, 2016 · Adoption of the open data policy and principles is one of five recommendations in A Place to Stand: e-Infrastructures and Data Management for Global Change Research, …
Belmont Forum Data Accessibility Statement and Policy
The DAS encourages researchers to plan for the longevity, reusability, and stability of the data attached to their research publications and results. Access to data promotes reproducibility, …
Climate-Induced Migration in Africa and Beyond: Big Data and …
CLIMB will also leverage earth observation and social media data, and combine them with survey and official statistical data. This holistic approach will allow us to analyze migration process …
Advancing Resilience in Low Income Housing Using Climate …
Jun 4, 2020 · Environmental sustainability and public health considerations will be included. Machine Learning and Big Data Analytics will be used to identify optimal disaster resilient …
Belmont Forum
What is the Belmont Forum? The Belmont Forum is an international partnership that mobilizes funding of environmental change research and accelerates its delivery to remove critical …
Waterproofing Data: Engaging Stakeholders in Sustainable Flood …
Apr 26, 2018 · Waterproofing Data investigates the governance of water-related risks, with a focus on social and cultural aspects of data practices. Typically, data flows up from local levels …
Data Management Annex (Version 1.4) - Belmont Forum
A full Data Management Plan (DMP) for an awarded Belmont Forum CRA project is a living, actively updated document that describes the data management life cycle for the data to be …