MayaWakamatsuSecondEssay 3 - 14 Jan 2022 - Main.MayaWakamatsu
|
|
META TOPICPARENT | name="SecondEssay" |
| | 2. Possible solutions | |
< < | 2.1 Individuals delegate their personal data to a trustee (the data trust scheme) | > > | 2.1.1 Public-private partnership platform (the personal digital twin scheme) | | | |
< < | The data trust scheme is a framework that manages data on behalf of individuals or organizations. This scheme was proposed in the report “Growing the Artificial Intelligence Industry in the UK” (https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/652097/Growing_the_artificial_intelligence_industry_in_the_UK.pdf). In the data trust scheme, individuals delegate rights necessary for data management to a trustee, which follows the purpose set for the trust. The trustee makes decisions on who can access the personal data based on the purpose set by the settlor, and the trustee bears the trust obligation. | > > | The personal digital twin scheme is a method to utilize the "personal digital twin" that mirrors the virtual existence of physical objects as a twin in the digital environment.
This original idea is the technical concept of the digital twin used for production control and quality control in the manufacturing industry. Mirroring the virtual existence of a physical object as twins in a digital simulation environment, and applying this to humans is called a personal digital twin. The Singapore government introduced a project called Virtual Singapore, in which they use digital twin technology (https://www.nrf.gov.sg/programmes/virtual-singapore). | | | |
< < | By using the data trust scheme, individuals can prevent firms like Facebook from surveilling personal data because trustees manage the data and trustees grant access to the data to the firms based on the purpose of the trust.
However, even though the trustee bears the trust obligation and follows the purpose of the trust, it is unclear whether consumers can completely trust and rely on this scheme. This is because there might be a gap between ranges of personal data that the individuals would allow firms to access and those that the trustee actually would allow. The trustee might grant access to the data to the firms even if consumers do not want to. Therefore, we should think about schemes in which individuals can control information by themselves. | > > | 2.1.2 Analysis
The personal digital twin technology is expected to expand into various fields such as medical care, insurance, and finance. One idea is to utilize this technology in the privacy area as well. The idea is that middleware installed on devices such as smartphones and computers refers to the data of the personal digital twin to check the benefits for the consumer, the benefits of providing the data to firms, and whether it is fine to provide the data to the firms. In this way, consumers can protect privacy.
However, to create the digital twin, our personal data will be collected and surveilled. Even if our data could be useful in a digital twin, if it contains personal information collected from individuals, it might endanger our freedom of thought.
In 2017, Google announced that it would redevelop Toronto, Canada as a smart city, but on May 7, 2020, they announced the cancellation of the project due to unstable economic conditions and worsening profitability caused by the real estate market. The reason behind the cancellation of the project is not only the economic reasons mentioned above but also the lack of understanding of the local residents regarding the acquisition and use of personal information, which led to a lawsuit by the Canadian Civil Liberties Association (https://iottechnews.com/news/2019/apr/18/canada-sued-google-toronto-smart-city-plan/).
If it is practical to control our information in the digital twin scheme without being surveilled, it will be a useful idea in privacy areas as well, otherwise, we need to think about decentralized architectures to protect our privacy. | | | |
< < |
But only for data flows that result from collection in other modes. There's no way in such a scheme to interpose the trustee between the platform and the browser. For that you need another technical fulcrum, which leads directly back to the personal cloud architecture.
| > > | 2.2 Decentralized architecture | | | |
< < | 2.2 Individuals control information by themselves (the personal cloud scheme) | > > | 2.2.1 MesInfos? | | | |
< < | We should think about schemes designed to allow individuals to control their information and decide who they will share their information with.
The project called “MesInfos” was introduced in 2012 in France (http://mesinfos.fing.org/english/). The purpose of this project was to return the control right of management, use, or sharing of personal data held by public institutions and firms to individuals. MesInfos? is run by a private consortium led by the non-profit organization Fing. In this scheme, a copy of the data is transferred to the consumer's personal cloud. Consumers download third-party applications on their personal cloud and grant access to their data if it is necessary when they are using the applications. Instead of handing over their data to firms or data users, firms or data users can refer to only the necessary data through the API (Application Programming Interface) on the consumer's private cloud. | > > | We should think about schemes designed to allow individuals to control their information and decide who they will share their information with. The project called “MesInfos” was introduced in 2012 in France (http://mesinfos.fing.org/english/). The purpose of this project was to return the control right of management, use, or sharing of personal data held by public institutions and firms to individuals. MesInfos? is run by a private consortium led by the non-profit organization Fing. In this scheme, a copy of the data is transferred to the consumer's personal cloud. Consumers download third-party applications on their personal cloud and grant access to their data if it is necessary when they are using the applications. Instead of handing over their data to firms or data users, firms or data users can refer to only the necessary data through the API (Application Programming Interface) on the consumer's private cloud. | | | |
< < | We need to create a mechanism in which the individual holds the right to maintain our privacy, and this scheme allows us to control our information. This system promises to protect people's privacy and give individuals ownership of their data. I believe that we can create new technologies in which individuals control what purpose data is used for by using this scheme. | > > | 2.2.2 Amsterdam Digital Register | | | |
< < |
But you don't need the intermediary organization providing the cloud server if the personal server can be real rather than virtual. Hence the point of projects like my FreedomBox. Either way, interposing the personal gateway allows information flow control for secrecy, anonymity and autonomy in rudimentary and sophisticated ways.
| > > | Amsterdam Digital Register is a project to use DECODE to make the process of citizens registering with the city and providing and accessing data secure and easy (https://decodeproject.eu/pilots.html). This project aims to build a system that allows citizens to store their personal data in the DECODE wallet, and to share only the minimum information necessary to protect their privacy when registering. The DECODE technology will allow citizens to remove unnecessary personal information registration, sharing, etc., and will allow the city to check the status of each property without obtaining unnecessary personal information. | | | |
< < | 2.3 Individuals control information by themselves (the personal digital twin scheme) | > > | 2.2.3 Analysis | | | |
< < | The personal digital twin scheme is a method to link the "personal digital twin" created by utilizing the blockchain that mirrors the virtual existence of physical objects as a twin in the digital environment and middleware that acts as the contact point with the application.
This original idea is the technical concept of the digital twin used for production control and quality control in the manufacturing industry. Mirroring the virtual existence of a physical object as twins in a digital simulation environment, and applying this to humans is called a personal digital twin. The Singapore government introduced a project called Virtual Singapore, in which they use digital twin technology (https://www.nrf.gov.sg/programmes/virtual-singapore). | > > | We need to create a mechanism in which the individual holds the right to maintain our privacy, and these schemes allow us to control our information, and we do not need to provide unnecessary personal information to third parties. These systems promise to protect people's privacy and give individuals ownership of their data. I believe that we can create new technologies in which individuals control what purpose data is used for by utilizing these schemes. Whether it is virtual or real, it is important to create our own personal server to achieve goals to protect our personal data. | | | |
< < |
Yes. But beware of taking this at face value. Digital flim-flam from the Singapore government sending resources at this is distorting "AI" and visualization start-ups as far away as Korea. Dig a little deeper before assuming this is more than vapor.
The personal digital twin technology is expected to expand into various fields such as medical care, insurance, and finance. I believe that this technology can be applied to the privacy area as well. Middleware works as the contact point for making decisions by consumers and passing information. The middleware installed on devices such as smartphones and computers manages the connection between consumers and platforms and controls the transmission and reception of information by filtering. The middleware refers to the data of the personal digital twin to check the benefits for the consumer, the benefits of providing the data to firms, and whether it is fine to provide the data to the firms. In this way, I believe that consumers can protect privacy.
All without actually improving the freedom of the user, while displacing the locale of power (yes I know: BUT BLOCKCHAIN. More stuff and nonsense.....)
| |
3. Conclusion | |
< < | I believe that we should restructure the technology scheme to allow individuals to control their personal data and protect privacy, and we can achieve this goal by utilizing the personal cloud scheme and the personal data twin scheme.
A useful way of thinking about this problem at large scale. But the axis of federated/centralized architecture, not "middleware" and "blockchain," is probably a better orgsanization for the analysis you are trying to present.
| > > | I believe that we should restructure the technology scheme to allow individuals to control their personal data and protect privacy, and we can achieve this goal by creating our own personal server whether it is virtual or real. | |
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. |
|
MayaWakamatsuSecondEssay 2 - 07 Jan 2022 - Main.EbenMoglen
|
|
META TOPICPARENT | name="SecondEssay" |
| |
< < | | | | |
< < | It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted. | | How Individuals Maintain Privacy and Control Personal Data | | By using the data trust scheme, individuals can prevent firms like Facebook from surveilling personal data because trustees manage the data and trustees grant access to the data to the firms based on the purpose of the trust.
However, even though the trustee bears the trust obligation and follows the purpose of the trust, it is unclear whether consumers can completely trust and rely on this scheme. This is because there might be a gap between ranges of personal data that the individuals would allow firms to access and those that the trustee actually would allow. The trustee might grant access to the data to the firms even if consumers do not want to. Therefore, we should think about schemes in which individuals can control information by themselves. | |
> > |
But only for data flows that result from collection in other modes. There's no way in such a scheme to interpose the trustee between the platform and the browser. For that you need another technical fulcrum, which leads directly back to the personal cloud architecture.
| | 2.2 Individuals control information by themselves (the personal cloud scheme)
We should think about schemes designed to allow individuals to control their information and decide who they will share their information with. | | We need to create a mechanism in which the individual holds the right to maintain our privacy, and this scheme allows us to control our information. This system promises to protect people's privacy and give individuals ownership of their data. I believe that we can create new technologies in which individuals control what purpose data is used for by using this scheme. | |
> > |
But you don't need the intermediary organization providing the cloud server if the personal server can be real rather than virtual. Hence the point of projects like my FreedomBox. Either way, interposing the personal gateway allows information flow control for secrecy, anonymity and autonomy in rudimentary and sophisticated ways.
| | 2.3 Individuals control information by themselves (the personal digital twin scheme)
The personal digital twin scheme is a method to link the "personal digital twin" created by utilizing the blockchain that mirrors the virtual existence of physical objects as a twin in the digital environment and middleware that acts as the contact point with the application.
This original idea is the technical concept of the digital twin used for production control and quality control in the manufacturing industry. Mirroring the virtual existence of a physical object as twins in a digital simulation environment, and applying this to humans is called a personal digital twin. The Singapore government introduced a project called Virtual Singapore, in which they use digital twin technology (https://www.nrf.gov.sg/programmes/virtual-singapore). | |
> > |
Yes. But beware of taking this at face value. Digital flim-flam from the Singapore government sending resources at this is distorting "AI" and visualization start-ups as far away as Korea. Dig a little deeper before assuming this is more than vapor.
| | The personal digital twin technology is expected to expand into various fields such as medical care, insurance, and finance. I believe that this technology can be applied to the privacy area as well. Middleware works as the contact point for making decisions by consumers and passing information. The middleware installed on devices such as smartphones and computers manages the connection between consumers and platforms and controls the transmission and reception of information by filtering. The middleware refers to the data of the personal digital twin to check the benefits for the consumer, the benefits of providing the data to firms, and whether it is fine to provide the data to the firms. In this way, I believe that consumers can protect privacy. | |
> > |
All without actually improving the freedom of the user, while displacing the locale of power (yes I know: BUT BLOCKCHAIN. More stuff and nonsense.....)
| | 3. Conclusion
I believe that we should restructure the technology scheme to allow individuals to control their personal data and protect privacy, and we can achieve this goal by utilizing the personal cloud scheme and the personal data twin scheme. | |
> > |
A useful way of thinking about this problem at large scale. But the axis of federated/centralized architecture, not "middleware" and "blockchain," is probably a better orgsanization for the analysis you are trying to present.
| |
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines: |
|
MayaWakamatsuSecondEssay 1 - 08 Dec 2021 - Main.MayaWakamatsu
|
|
> > |
META TOPICPARENT | name="SecondEssay" |
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
How Individuals Maintain Privacy and Control Personal Data
-- By MayaWakamatsu - 08 Dec 2021
1. Introduction
Nowadays, many people use services like email, calendar, and SNS which are provided for free by firms like Google, Apple, or Facebook. However, their personal data is collected and surveilled by the firms, and the personal data is used for commercial purposes. In this essay, I would like to discuss how individuals can protect their personal data from firms.
2. Possible solutions
2.1 Individuals delegate their personal data to a trustee (the data trust scheme)
The data trust scheme is a framework that manages data on behalf of individuals or organizations. This scheme was proposed in the report “Growing the Artificial Intelligence Industry in the UK” (https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/652097/Growing_the_artificial_intelligence_industry_in_the_UK.pdf). In the data trust scheme, individuals delegate rights necessary for data management to a trustee, which follows the purpose set for the trust. The trustee makes decisions on who can access the personal data based on the purpose set by the settlor, and the trustee bears the trust obligation.
By using the data trust scheme, individuals can prevent firms like Facebook from surveilling personal data because trustees manage the data and trustees grant access to the data to the firms based on the purpose of the trust.
However, even though the trustee bears the trust obligation and follows the purpose of the trust, it is unclear whether consumers can completely trust and rely on this scheme. This is because there might be a gap between ranges of personal data that the individuals would allow firms to access and those that the trustee actually would allow. The trustee might grant access to the data to the firms even if consumers do not want to. Therefore, we should think about schemes in which individuals can control information by themselves.
2.2 Individuals control information by themselves (the personal cloud scheme)
We should think about schemes designed to allow individuals to control their information and decide who they will share their information with.
The project called “MesInfos” was introduced in 2012 in France (http://mesinfos.fing.org/english/). The purpose of this project was to return the control right of management, use, or sharing of personal data held by public institutions and firms to individuals. MesInfos? is run by a private consortium led by the non-profit organization Fing. In this scheme, a copy of the data is transferred to the consumer's personal cloud. Consumers download third-party applications on their personal cloud and grant access to their data if it is necessary when they are using the applications. Instead of handing over their data to firms or data users, firms or data users can refer to only the necessary data through the API (Application Programming Interface) on the consumer's private cloud.
We need to create a mechanism in which the individual holds the right to maintain our privacy, and this scheme allows us to control our information. This system promises to protect people's privacy and give individuals ownership of their data. I believe that we can create new technologies in which individuals control what purpose data is used for by using this scheme.
2.3 Individuals control information by themselves (the personal digital twin scheme)
The personal digital twin scheme is a method to link the "personal digital twin" created by utilizing the blockchain that mirrors the virtual existence of physical objects as a twin in the digital environment and middleware that acts as the contact point with the application.
This original idea is the technical concept of the digital twin used for production control and quality control in the manufacturing industry. Mirroring the virtual existence of a physical object as twins in a digital simulation environment, and applying this to humans is called a personal digital twin. The Singapore government introduced a project called Virtual Singapore, in which they use digital twin technology (https://www.nrf.gov.sg/programmes/virtual-singapore).
The personal digital twin technology is expected to expand into various fields such as medical care, insurance, and finance. I believe that this technology can be applied to the privacy area as well. Middleware works as the contact point for making decisions by consumers and passing information. The middleware installed on devices such as smartphones and computers manages the connection between consumers and platforms and controls the transmission and reception of information by filtering. The middleware refers to the data of the personal digital twin to check the benefits for the consumer, the benefits of providing the data to firms, and whether it is fine to provide the data to the firms. In this way, I believe that consumers can protect privacy.
3. Conclusion
I believe that we should restructure the technology scheme to allow individuals to control their personal data and protect privacy, and we can achieve this goal by utilizing the personal cloud scheme and the personal data twin scheme.
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines:
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. |
|
|
|
This site is powered by the TWiki collaboration platform. All material on this collaboration platform is the property of the contributing authors. All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
|
|