Universität Wien

290094 PS Location Privacy (2022S)

4.00 ECTS (2.00 SWS), SPL 29 - Geographie
Prüfungsimmanente Lehrveranstaltung

An/Abmeldung

Hinweis: Ihr Anmeldezeitpunkt innerhalb der Frist hat keine Auswirkungen auf die Platzvergabe (kein "first come, first served").

Details

max. 24 Teilnehmer*innen
Sprache: Englisch

Lehrende

Termine (iCal) - nächster Termin ist mit N markiert

Dienstag 08.03. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 15.03. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 22.03. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 05.04. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 26.04. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 10.05. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 17.05. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 24.05. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 31.05. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 14.06. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 21.06. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock
Dienstag 28.06. 13:15 - 14:45 Seminarraum 3 Oskar-Morgenstern-Platz 1 1.Stock

Information

Ziele, Inhalte und Methode der Lehrveranstaltung

As information and communication technologies advance and everybody can be connected to everybody else and everything all the time, we must ensure what location privacy implies within information privacy. In this course, we focus on location privacy (geoprivacy), because information about an individual’s location is substantially different from other kinds of personally identifiable information. Privacy can be defined as the positive right of individuals to determine for themselves when, how, and to what extent location information about them is communicated to others. During the course, we examine the process of transforming volunteered and observed information into inferred information, possibilities to control it, and we review examples of privacy-safeguarding strategies. It is important to understand protection as a facilitator to data openness and discuss the spectrum between information closure and disclosure.

Content
Introduction to location privacy, opinion and perception, regulatory frameworks, guidelines, information disclosure, re-identification & inference attacks, data anonymization, location protection methods, geomasking, geo-tracking apps, and geoethics.

Methods
The course follows a student-centred design educational principle. It entails a mixture of lectures and tutorials given by the lecturer as well as group-based active learning approaches; which contribute to the learning as well as the assessment of it. Additionally, students take a leading role by preparing and disseminating knowledge within the class.

Art der Leistungskontrolle und erlaubte Hilfsmittel

There are four testing elements. The first (T1) is an assignment on one examination topic and it is assessed via an oral presentation. The second and the third tests (T2 and T3) are group and game-based activities are that initiated with self-study, activated in class, and finalized through a written group report. The last test (T4) is a review that involves active participation (discussion, feedback, questions) during the oral presentations.

• Any ancillary material can be used in the preparation or presentation of the tests.
• T1 and T4 are individual tests.
• T2 and T3 are group tests.

The weights of each test element are:

- Assignment 65% (T1)
- Group activity & report A 10% (T2)
- Group activity & report B 10% (T3)
- Review 15 % (T4)

Mindestanforderungen und Beurteilungsmaßstab

--> Attendance is compulsory on all test dates and for all.
--> All tests are obligatory to pass the course.

- T1 is assessed via the presentation file and the live presentation in class.
- T2 & T3 are assessed in class and via a written report.
- T4 is assessed in class.
- For T2, T3, and T4 a conditional mark is given for the completion of the test.

Prüfungsstoff

A. Location protection for discrete geodata
B. Location protection for spatiotemporal data
C. Geoinformation disclosure: risk or re-identification
D. Geoinformation disclosure: inference attacks
E. Research guidelines and regulatory frameworks on (Geo)privacy
F. Opinion and perception on Geoprivacy
G. Geotracking apps
H. Geoethics’ spectrum

Literatur

Armstrong, M. P., Rushton, G., & Zimmerman, D. L. (1999). Geographically masking health data to preserve confidentiality. Statistics in Medicine, 18 (5), 497-525.

Blumberg, A. J., & Eckersley, P. (2009). On locational privacy, and how to avoid losing it forever. Electronic Frontier Foundation: White Paper. retrieved at https://www.eff.org/wp/locational-privacy

Curtis, A. J., Mills, J. W., & Leitner, M. (2006). Spatial confidentiality and GIS: re-engineering mortality locations from published maps about Hurricane Katrina. International Journal of Health Geographics.5 (1). 44.

Democracy - Im Rausch der Daten https://www.youtube.com/watch?v=VUjo7mQXz0M&ab_channel=cheammon

Georgiadou, Y., Kounadi, O., & Rolf, A. (2020). Digital Earth Ethics. In Manual of Digital Earth (pp. 785-810). Springer, Singapore.

Hampton, K. H., Fitch, M. K., Allshouse, W. B., Doherty, I. A., Gesink, D. C., Leone, P. A., ... & Miller, W. C. (2010). Mapping health data: improved privacy protection with donut method geomasking. American journal of epidemiology, 172(9), 1062-1069.

Hoofnagle, C.J.; van der Sloot, B.; Zuiderveen Borgesius, F. The European Union General Data Protection Regulation: What It Is And What It Means. SSRN Electron. J. 2018, doi:10.2139/ssrn.3254511

Keßler, Carsten, and Grant McKenzie. "A geoprivacy manifesto." Transactions in GIS 22.1 (2018): 3-19.

Kounadi, O., & Leitner, M. (2016). Adaptive areal elimination (AAE): A transparent way of disclosing protected spatial datasets. Computers, Environment and Urban Systems, 57, 59-67.

Kounadi, O., & Resch, B. (2018). A Geoprivacy by Design Guideline for Research Campaigns That Use Participatory Sensing Data. Journal of Empirical Research on Human Research Ethics, 13(3), 203-222.

Krumm, J. (2007). Inference attacks on location tracks. Pervasive Computing.127-143.
The Guardian (2015)

Democracy: the film that gets behind the scenes of the European privacy debate. https://www.theguardian.com/technology/2015/nov/14/democracy-film-european-data-protection-privacy-debate

Zuordnung im Vorlesungsverzeichnis

(MG-S3-PI.f) (MG-S4-PI.f) (MG-S5-PI.f) (MG-S6-PI.f) (MR3) (MR6) (MK2-c-PI) (MA UF GW 02)

Letzte Änderung: Do 03.03.2022 15:29