<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>David Glance &#8211; Australian Privacy Foundation</title>
	<atom:link href="https://privacy.org.au/author/david-glance/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacy.org.au</link>
	<description>Defending your right to be free from intrusion</description>
	<lastBuildDate>Tue, 27 Mar 2018 04:55:41 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://privacy.org.au/wp-content/uploads/2021/04/cropped-logo_horizontal2-32x32.png</url>
	<title>David Glance &#8211; Australian Privacy Foundation</title>
	<link>https://privacy.org.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>It’s impossible for Facebook users to protect themselves from data exploitation</title>
		<link>https://privacy.org.au/2018/03/27/its-impossible-for-facebook-users-to-protect-themselves-from-data-exploitation/</link>
		
		<dc:creator><![CDATA[David Glance]]></dc:creator>
		<pubDate>Tue, 27 Mar 2018 04:55:41 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">https://privacy.org.au/?p=3078</guid>

					<description><![CDATA[David Glance, University of Western Australia The London-based data analytics firm Cambridge Analytica has been accused of using illegally gathered information from more than 50 million Facebook users to support Donald Trump’s US presidential campaign. Facebook has suspended the accounts of the firm along with Cambridge University academic Aleksandr Kogan and consultant-turned-whistle-blower Christopher Wylie, who&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2018/03/27/its-impossible-for-facebook-users-to-protect-themselves-from-data-exploitation/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<span><a href="https://theconversation.com/profiles/david-glance-148">David Glance</a>, <em><a href="http://theconversation.com/institutions/university-of-western-australia-1067">University of Western Australia</a></em></span>

<p>The London-based data analytics firm Cambridge Analytica has been accused of using illegally gathered information from more than 50 million Facebook users to <a href="https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-Facebook-influence-us-election">support Donald Trump’s US presidential campaign</a>. Facebook has suspended the accounts of the firm along with Cambridge University academic Aleksandr Kogan and consultant-turned-whistle-blower Christopher Wylie, who were responsible for harvesting the data from Facebook.</p>

<p>The personal data was gathered using a Facebook application called “thisisyourdigitallife” created by Kogan through his firm Global Science Research (GSR). The data was passed on to Cambridge Analytica, which <a href="https://ca-commercial.com/news/cambridge-analytica-responds-Facebook-announcement">claims to have deleted the data</a> when the company realised that it was collected contrary to Facebook’s terms of service.</p>

<h2>Psychometric profile for targeted advertising</h2>

<p>The original idea was to use the collected data to target political ads at people based on their <a href="https://mumbrella.com.au/did-a-short-research-paper-just-unlock-facebooks-psychometric-blackbox-484800">psychometric profiles</a>. This concept was adapted by Cambridge Analytica and Kogan from work done in part by another Cambridge University psychologist, David Stillwell. <a href="http://www.pnas.org/content/early/2017/11/07/1710966114/tab-article-info">Along with researchers Matz, Kosinski and Nave</a>, Stillwell showed that advertising that was tailored to a person’s level of extraversion or openness was far more effective at getting them to click on an ad and ultimately buy something.</p>

<p>The psychometric personality profile was built up by asking the users to complete an assessment questionnaire and also to allow an application to look at the user’s Facebook posts and likes. The profile is based on five factors:</p>

<ul>
<li><p>Neuroticism (calm or stressed)</p></li>
<li><p>Openness (traditional or liberal)</p></li>
<li><p>Extraversion (introverted or outgoing)</p></li>
<li><p>Agreeableness (cooperative or competitive)</p></li>
<li><p>Conscientiousness (organised or flexible)</p></li>
</ul>

<p>Using information about the posts that someone likes on Facebook has been shown to <a href="http://www.pnas.org/content/112/4/1036?ijkey=1fe7c6436d5ecdbe36f277dda46ffe21920bf7ce&#038;keytype2=tf_ipsecsha">greatly enhance the accuracy of determining a person’s profile</a>.</p>

<p>The process of working out the profile and then targeting the ads is not actually that sophisticated, as the ads designed for low and high extraversion show.</p>

<h2>Facebook is not committed to protecting its users’ data</h2>

<p>Facebook does not make the process of collecting data from its platform particularly difficult. It is essentially an “honour code” with few negative consequences to those that abuse it. Facebook itself uses this type of approach to target ads to users and so refrains from criticising others for doing the same. Facebook has <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3834737/">itself experimented</a> with influencing the voting intentions of its users without getting their informed consent.</p>

<p>The simple fact of the matter is that as long as for-profit companies make their money out of advertising, they will try and make that advertising as effective as possible by gathering ever more detailed personal and behavioural information about their users to target ads and make them more effective. Social media and search companies such as Facebook and Google have little incentive other than the risk of government regulation and fines to limit the amount and types of information collected or the ways in which this information is used to target users with ads.</p>

<p>US and European officials are again <a href="https://www.washingtonpost.com/business/economy/us-and-european-officials-question-facebooks-protection-of-personal-data/2018/03/18/562b5b0e-2ae2-11e8-911f-ca7f68bff0fc_story.html">raising questions</a> about Facebook’s willingness to protect users’ data and to not allow its platform to be abused by governments and private interests to influence political outcomes. Previous attempts to seek answers from Facebook have largely failed, even during <a href="http://www.slate.com/articles/technology/technology/2017/10/congress_is_finally_asking_Facebook_twitter_and_google_the_right_questions.html">official hearings</a>. The threat of fines to change the tech companies’ behaviour is also not completely effective, as company lawyers challenge every action by governments and the fines that companies face are seen as simply a cost of doing business.</p>

<h2>The best way to protect yourself from social networks? Leave them</h2>

<p>Users of social networks are now being <a href="https://www.theguardian.com/technology/2018/mar/19/how-to-protect-your-Facebook-privacy-or-delete-yourself-completely">advised</a> about how to protect their data from apps. In 2014, Facebook <a href="https://stackoverflow.com/questions/23449424/Facebook-not-getting-full-friends-list-with-recent-changes-app-scoped-user-id">changed</a> the way applications could access the list of friends for a particular user. After the change, apps could only get information about the friends of a user if they themselves were using the app.</p>

<p>Facebook CEO Mark Zuckerberg has <a href="https://www.Facebook.com/zuck/posts/10104712037900071">stated</a> that Facebook will reduce the access that applications have to user data even further in the wake of the Cambridge Analytica scandal. However, this will still not stop those determined to harvest user data from doing so. If the list of a user’s Facebook friends is set to public, it is possible to simply use a program to “scrape” the data without using a direct programming interface. A simple search on Google reveals many applications and scripts that will do this.</p>

<p>Even changing Facebook’s privacy settings to keep your list of friends private does not necessarily stop anyone from knowing things about you. Anything that is available publically through the profile of one of your friends may include information about you. Also, making information private does not stop Facebook from using it even though the company claims that you can <a href="https://www.Facebook.com/help/568137493302217">control this</a>. It only applies to information obtained from outside of Facebook, and the firm can still exploit user information to target ads and for any other purpose it chooses.</p>

<p>And while users can block Facebook ads by using extensions such as <a href="https://www.fbpurity.com">F.B. Purity</a>, this simply means giving yet another company access to your personal data.</p>

<p><img decoding="async" src="https://counter.theconversation.com/content/93800/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" width="1" height="1" />In the end, the only way we have to limit the use of our personal data by social media is to avoid joining the platforms in the first place. This means not having an account at all, because setting up a profile and logging in even once leaves the ability to be tracked when visiting other sites. And if you’re already on Facebook, the best way to protect your personal data is to <a href="https://www.wikihow.com/Permanently-Delete-a-Facebook-Account">delete the account completely and permanently</a>. While it may seem like a radical solution, it’s the only truly effective one.</p>

<p><span><a href="https://theconversation.com/profiles/david-glance-148">David Glance</a>, Director of UWA Centre for Software Practice, <em><a href="http://theconversation.com/institutions/university-of-western-australia-1067">University of Western Australia</a></em></span></p>

<p>This article was originally published on <a href="http://theconversation.com">The Conversation</a>. Read the <a href="https://theconversation.com/its-impossible-for-facebook-users-to-protect-themselves-from-data-exploitation-93800">original article</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What should Australian companies be doing right now to protect our privacy</title>
		<link>https://privacy.org.au/2017/10/13/what-should-australian-companies-be-doing-right-now-to-protect-our-privacy/</link>
		
		<dc:creator><![CDATA[David Glance]]></dc:creator>
		<pubDate>Fri, 13 Oct 2017 02:54:46 +0000</pubDate>
				<category><![CDATA[Commentary]]></category>
		<guid isPermaLink="false">http://privacy.org.au/?p=1366</guid>

					<description><![CDATA[David Glance, University of Western Australia Australians are increasingly concerned about how companies handle their personal data, especially online. Faced with the increasing likelihood that this data will be compromised, either through cyber attacks or mishandling, companies are now being forced into a more comprehensive approach to collecting and protecting customers’ personal data. The question&#8230; <span class="excerpt-more"><a href="https://privacy.org.au/2017/10/13/what-should-australian-companies-be-doing-right-now-to-protect-our-privacy/">Read More</a></span>]]></description>
										<content:encoded><![CDATA[<span><a href="https://theconversation.com/profiles/david-glance-148">David Glance</a>, <em><a href="http://theconversation.com/institutions/university-of-western-australia-1067">University of Western Australia</a></em></span>

<p>Australians are increasingly concerned about how companies handle their <a href="https://www.oaic.gov.au/engage-with-us/community-attitudes/australian-community-attitudes-to-privacy-survey-2017#s1-0-summary-of-results">personal data</a>, especially online.</p>

<p>Faced with the increasing likelihood that this data will be compromised, either through cyber attacks or mishandling, companies are now being forced into a more comprehensive approach to collecting and protecting customers’ personal data. The question remains &#8211; what is the best approach to achieving this goal?</p>

<p>The Organisation for Economic Co-operation and Development (OECD) has proposed that instead of talking about cybersecurity &#8211; companies, organisations and nations should be viewing the problem from a <a href="http://www.oecd.org/publications/digital-security-risk-management-for-economic-and-social-prosperity-9789264245471-en.htm">digital security risk management</a> perspective.</p>

<p>Cybersecurity often overlooks risks to data that have nothing to do with a “cyber” element, even if people could agree on a definition of that term. In the case of Edward Snowden for example, he <a href="https://www.darkreading.com/attacks-breaches/how-did-snowden-do-it/d/d-id/1140877">used</a> a colleague’s credentials to access the system and copied files to a <a href="https://www.wired.com/2013/06/snowden-thumb-drive/">USB drive</a>.</p>

<p>Digital security risk management involves getting everyone in an organisation to see digital risk as part of the overall risks that the organisation faces. The extent of risk any organisation is willing to take in any particular activity depends on the activities value. The aim is to manage the risk to a level that is acceptable to all parties.</p>

<h2>What do you do about the weak link: humans?</h2>

<p>It is worth remembering that in the case of the <a href="https://www.nytimes.com/2017/10/02/business/equifax-breach.html">Equifax breach</a> in which the personal details of up to 143 million customers in the US were leaked, it was largely human errors that were to blame.</p>

<p>Put simply, the <a href="https://www.theverge.com/2017/10/3/16410806/equifax-ceo-blame-breach-patch-congress-testimony">person</a> who was responsible for applying the patch (a piece of software designed to update a computer program or its supporting data, to fix or improve it) simply didn’t do their job. The software that was supposed to check whether the patch had been applied also failed to pick this up.</p>

<p>Until humans can be taken out of the equation entirely, it is almost impossible to remain entirely secure, or to avoid the inadvertent disclosure of personal and private information. <a href="http://www.cert.org/insider-threat/">Insider threat</a> (as this type of risk is known) is difficult to combat and companies have tried various <a href="http://www.cert.org/insider-threat/best-practices/">approaches</a> to managing this risk including predictions based on psychological profiling of staff.</p>

<p>Automation and artificial intelligence may be a way of achieving this in the future. This works by minimising the amount of sensitive information staff have direct access to and surfacing only the analysis or interpretation of that data.</p>

<h2>A litany of recent breaches</h2>

<p>If you needed convincing about the vulnerability of personal data on the Internet, you only need look at Gemalto’s data breach <a href="http://breachlevelindex.com/data-breach-database.php?range=2016">website</a> or <a href="https://www.databreaches.net/millions-of-australians-caught-in-health-records-breach/">DataBreaches.net</a>.</p>

<p>The breaches of private and personal information don’t recognise national boundaries with hacks of companies like Yahoo <a href="https://www.wsj.com/articles/yahoo-triples-estimate-of-breached-accounts-to-3-billion-1507062804">having affected</a> 3 billion users, including millions of Australians.</p>

<p>Of course, Australian companies and organisations have also been involved with spectacular data breaches. Last year saw the Australian Red Cross <a href="https://theconversation.com/questions-still-need-answering-in-australias-largest-health-data-breach-67916">expose</a> 555,000 customer records online.</p>

<p>Of more concern was the Australian Department of Health had <a href="https://www.thesaturdaypaper.com.au/news/politics/2016/10/08/millions-australians-caught-health-records-breach/14758452003833">published</a> online what they believed were de-identified records of Medicare and pharmaceutical claims of more than 3 million patients. Researchers at the University of Melbourne discovered that the “encrypted” doctor provider numbers could be decrypted.</p>

<h2>Are we looking at it in the wrong way?</h2>

<p>Whilst there are practical steps companies can take to protect digital systems and data, there are more fundamental questions companies should be asking from a risk perspective. In order to navigate these questions, companies need to understand the data they collect and perhaps surprisingly, this is something <a href="https://www.forbes.com/sites/baininsights/2016/04/18/most-cios-dont-think-their-companies-can-handle-big-data/#1a447f50556e">most companies struggle to do</a>.</p>

<p>The 13 <a href="https://www.oaic.gov.au/privacy-law/privacy-act/australian-privacy-principles">Australian Privacy Principles</a> from the Office of the Australian Information Commissioner outline the basics of how organisations and agencies should handle personal information. The practical <a href="https://www.oaic.gov.au/agencies-and-organisations/guides/guide-for-mobile-app-developers">application</a> of these principles involves an approach called Privacy By Design for all applications and services companies offer.</p>

<h2>Enter confidential computing</h2>

<p>For CSIRO’s Data61, the <a href="http://www.abc.net.au/radionational/programs/breakfast/csiros-data61-looks-to-confidential-computing/9009960">answer</a> to breaches of this sort is “confidential computing”. <a href="https://data61.csiro.au/en/Who-we-are">Data61</a> is tasked with data innovation and commercialisation of its research ideas. Confidential computing is the remit of Data61’s latest spin-off, <a href="http://www.n1analytics.com/">N1 Analytics</a>.</p>

<p>The main aspect of confidential computing involves keeping data encrypted at all times and using special techniques to be able to query data that is still encrypted and only decrypting the answer.</p>

<p>This can even allow others outside an organisation to query internal data directly or link to it with their own data without revealing the actual underlying data to either party.</p>

<p>Aside from the case of allowing the use of sensitive data in research, this approach would allow a company with financial information say, to share this data with an insurance company without handing over sensitive information but theoretically letting the insurance company carry out extensive data analytics.</p>

<h2>What companies should do now to protect your data</h2>

<p>As a starting point, Australian companies should only collect the minimum of personal information that the business actually needs. This means not collecting extra information simply for marketing purposes at some later date for example.</p>

<p>Companies then need to explain in simple, clear, terms why information is being collected, what it is being used for and get users to consent to giving that information.</p>

<p>Companies then need to secure the data that is collected. Security involves dedicated staff understanding the data that is kept by a company and taking responsibility for its physical security and for controlling who has access, when they have access and what form they can access the data.</p>

<p><img decoding="async" src="https://counter.theconversation.com/content/85247/count.gif?distributor=republish-lightbox-basic" alt="The Conversation" style="display: none ! important;" hidden="" height="1" width="1" />Lastly, they need to understand and enact a risk management approach to all digital data. This means that this is part of the overall culture of the company for every employee.</p>

<p>This article was originally published on <a href="http://theconversation.com">The Conversation</a>. Read the <a href="https://theconversation.com/what-should-australian-companies-be-doing-right-now-to-protect-our-privacy-85247">original article</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
