CRYPTO AND PRIVACY VILLAGE - Bullies, Sluts, and Best Selves: Fixing digital privacy education

Video thumbnail (Frame 0) Video thumbnail (Frame 1411) Video thumbnail (Frame 2137) Video thumbnail (Frame 2857) Video thumbnail (Frame 3947) Video thumbnail (Frame 5034) Video thumbnail (Frame 6038) Video thumbnail (Frame 7699) Video thumbnail (Frame 8367) Video thumbnail (Frame 8855) Video thumbnail (Frame 9771) Video thumbnail (Frame 10718) Video thumbnail (Frame 11462) Video thumbnail (Frame 11880) Video thumbnail (Frame 12679) Video thumbnail (Frame 13487) Video thumbnail (Frame 14412) Video thumbnail (Frame 18084) Video thumbnail (Frame 18674) Video thumbnail (Frame 20261) Video thumbnail (Frame 21134) Video thumbnail (Frame 21869) Video thumbnail (Frame 23924) Video thumbnail (Frame 24581)
Video in TIB AV-Portal: CRYPTO AND PRIVACY VILLAGE - Bullies, Sluts, and Best Selves: Fixing digital privacy education

Formal Metadata

CRYPTO AND PRIVACY VILLAGE - Bullies, Sluts, and Best Selves: Fixing digital privacy education
Alternative Title
Rethinking Digital Privacy Education
Title of Series
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Release Date

Content Metadata

Subject Area
Cybersex Information Digitizing Coroutine Water vapor Digital signal Mereology Information privacy Digital photography Message passing Universe (mathematics) Videoconferencing Computer science Video game Musical ensemble
Context awareness Presentation of a group Group action Game controller Information Digitizing Magneto-optical drive Shared memory Set (mathematics) Control flow Inequality (mathematics) Information privacy Measurement Information privacy Power (physics) Hacker (term) Touch typing Flag Hacker (term)
Information Inheritance (object-oriented programming) Multiplication sign Digitizing Execution unit Archaeological field survey Sampling (statistics) Information privacy Information privacy Digital photography Hacker (term) Computer science Information Data conversion Information security
Discrete group Suite (music) HD DVD Set (mathematics) Information privacy Theory Twitter Facebook Hacker (term) Different (Kate Ryan album) Encryption Information security Social class Overlay-Netz Addition Dependent and independent variables Information HD DVD Augmented reality Digitizing Shared memory Digital signal Group action Flow separation Information privacy Category of being Digital photography Personal digital assistant Interpreter (computing) Boundary value problem Family Window
Process (computing) Digitizing Physical law Representation (politics) Information privacy Information privacy
Purchasing Presentation of a group Focus (optics) Digital electronics Mapping Digitizing Information privacy Information privacy Message passing Telecommunication Core dump Videoconferencing Gamma function Form (programming)
Discrete group Permanent Internetworking Hypermedia Permanent Multiplication sign Digitizing Video game Information privacy Vector potential
Word Internetworking Internetworking Digitizing Multiplication sign Mathematical singularity Cellular automaton Computer Digital signal Family Power (physics) Neuroinformatik
Insertion loss Information privacy Frame problem Information privacy
Discrete group Group action Context awareness Multiplication sign Orientation (vector space) Decision theory Design by contract Set (mathematics) Insertion loss Open set Student's t-test Information privacy Robotics Single-precision floating-point format Ideal (ethics) Lie group Identity management Vulnerability (computing) Boss Corporation Electric generator Inheritance (object-oriented programming) Digitizing Gender Digital signal Information privacy Word Digital photography Message passing Event horizon Personal digital assistant Order (biology) Pressure Table (information) Marginal distribution Identity management
Group action Dependent and independent variables Information Digitizing Gender Materialization (paranormal) Electronic mailing list Insertion loss Information privacy Limit (category theory) Disk read-and-write head Information privacy Event horizon Internetworking Personal digital assistant Game theory Identity management Identity management Spacetime
Process (computing) Electronic program guide Plastikkarte Information privacy Information privacy
Multiplication sign Data recovery Workstation <Musikinstrument> Set (mathematics) Online help Information privacy Shift operator Twitter Revision control Root Term (mathematics) Boundary value problem Software framework Information Data recovery Digitizing Feedback Interactive television Planning Digital signal Information privacy Digital photography Normed vector space Normal (geometry) Game theory
Complex (psychology) Variety (linguistics) Term (mathematics) Single-precision floating-point format Content (media) Set (mathematics) Flag Information Musical ensemble Term (mathematics) Information privacy Information privacy
our next talk will be by Caroline Hardin and Jenn Dalton they're going to be talking to us today about bullies and best selves rethinking digital privacy education so taking away Caroline and Jenn [Applause] [Music] [Applause] we live in a technological world or should we say a cyber world we're uploading photos sharing videos or sending messages it's just part of our daily routine and when our personal information is everywhere digital privacy can literally become a life or death issue but how are schools and teachers helping our kids navigate this waters of digital privacy I'm Caroline Hardin I'm a PhD candidate at university of wisconsin-madison where I'm studying computer science education and I'm Jen Dawson also with the University of Wisconsin where academics are trying to work on it so bear with us so in this
presentation we'll be looking at a couple of things first what is privacy second what is hat what hackers think we should be teaching about digital privacy where our teachers actually teaching our kids at school and then the concerning implications about what they're being taught aka this is some and we need to fix it so unequal burdens home row groups and most impacted by that and what can we do about this so according
to stevia called in what we do what we really demand in some measure of control over our reputations who should have the power to collect cross-reference publicize or share information about us how this plays out at a practical example depends on culture on individuals within these cultures and on circumstances particularly to these individuals it's not a simple public or private flag privacy settings are much harder than ACL digital privacy varies
from meets based privacy only and how easy it is for information to flow beyond what we intend while we do spend a lot of time teaching our kids about physical space such as close the bathroom door or wear pants when you go outside the education we give kids about digital privacy is not enough the need we need we need to have more than a one-off conversation or a unit at school that happens once a year what kid is going to give a about what a one-time lesson gives us nobody and we have to tell people I think my parents are gonna do about this my parent is not about to sit down and have a long recession about a kid with the stuff I mean who can blame them talking about nude photos with your kid is super awkward
so to understand how digital privacy is being taught in school we wanted to start with seeing what hackers and InfoSec professionals and other people that technical background think about digital privacy and how it should be taught so we did a survey with the question what advice would you give others about protecting digital privacy for this survey we use what is called a convenient sample which meant we asked our friends which are mostly computer science and InfoSec people to take the survey and then because it became obvious that just asking our friend turned out to not be very many people we know what to tell is snowball to be asked our friends to ask their friends I in the end we surveyed 47 people 27 women and 20 men and we analyzed the
responses and found that there were two main categories in what hacker is an InfoSec professional said about what should be taught about de jure privacy 81% of participants said technical advice VPN full disk encryption setting Facebook privacy settings and so on in addition 65% of people offered avoidance or discretion philosophies don't post photos of yourself and that's from suit don't tweet that you like Windows Vista in only one case did someone recommend negotiating social negotiating privacy with your social groups and with your family and talking about how you want your information to be shared these
findings reflect a lot about how digital privacy curricula is structured but something about this always struck me as really incomplete as we know webcam sticker can only go so far when you have a neighbor or aunt who consistently over shares things on your behalf I took a class in socio-cultural theory where I learned about a somewhat up two theory called figured world's so figured worlds are the socially and constructed and culturally constructed realm of interpretation in which particular characters and actors are recognized Eli five people are messy and we live in this world where it's easy to understand when you think about all the different roles people have the figured world is kind of like an augmented reality overlay that says this matters to me when I'm in this role and this matters to me when I'm in this other role so privacy lets us live these rich social lives because we have somewhat contradictory figured worlds in which we need to keep information separate from one of our roles from the other role that we have
so consider the off-color joke it means something different when told to a friend drinking beer in your kitchen as it does when said as a representative of your company at a professional conference failure to understand this and failure to understand when you should and should not tweet the overheard joke has serious implication on people's lives and jobs so we kind of need to figure out this digital privacy education thing so based on our research
we decide and investigate what digital privacy looks like in education what are kids being told we looked at a major curriculum to figure out how kids are being taught about privacy how they're told to manage these figured world and how people should respond to privacy laws so we looked at appropriate popular
curriculum that focus on digital privacy I rock the Institute for Responsible online and cellphone communication so I rock this core message is quote anything that you do with digital technology kid instantly become public impermanent trademark this curriculum is available for purchase in book video form or you can schedule a school presentation the map shows the presentations are currently scheduled through 2018 so yay webinar for kids about digital privacy what fun
so the advice found in I rock and other similar curricula we looked at answered the first question who is responsible for privacy with privacy can be assured
through individual discretion what is meant by individual discretion it means everyone is responsible for making sure they control what is shared about themselves on the internet in every circumstance all time in the curriculum we looked at we found the emphasized things such as not posting pictures not taking pictures not being in the background of pictures that other people take that might get posted a typical example of this comes from
Iraq in this quote an emphasis is my own true if you apply digital consciousness trademark a mindset a public and permanent trademark when using the internet cell phones apps social media interactive gaming and any other digital tools and technologies you eliminate any potential for self-inflicted challenges and reduce your risk of facing devastating and life-altering consequences that often accompany the abuse of digital tools how do you manage
different figured worlds was answered by these curricula and what can be summarized as only post up which reflects a singular best self but best self to who another quote
explains each time you power up any digital tool camera computer internet cell phone picture a family member friend child enemy criminal deceased loved one whoever means are meant the most to you in this world standing right over your shoulder in other words you must consider a single best self for every possible audience with everything used digital tools for finally the third
question is how should people in community respond to situations where there is a loss of privacy these
curricula emphasize that consequences are inevitable and must be born individually they offer many examples in lurid detail of the negative consequences which can occur from a loss of privacy these warning stories included those of a person's misjudgment an honest mistake and malicious attacks but all our frame does this is the way the world is this is what happens you can see an example
of this in in the quote comes from digital consciousness trademark contract the IRA Gilliam suggests parents have their kids sign I am aware that by poor digital judgment betrays my ancestors my parents my community and my future generations in other words the consequence is shame and it is a betrayal of others and this betrayal is individual so these findings
reveal some concerning implications of these common themes and digital privacy curriculum even if you did are discreet on what you post on what you say complete discretion is unrealistic unless you and everyone around you doesn't do anything with the digital tools so to say privacy is entirely responsible have an individual ignores how a loss of privacy requires at least two people we are taught not to open someone else's diary for example and if we if it's left on the table all alone but if we have someone who to say put the wrong settings in their live journal and yes we're dating ourselves by saying live journal we're not teaching kids our teaching kids not to read that post or are we ignoring that completely to let the poster know that perhaps the needs to change the settings again or do we just read through it so in what about malicious privacy violations situations such as non-consensual photos and a largely not discussed in this curricula so who is talking to the kids about these issues I mean we're not robots and yet we are being told that we need to be in order to be successful in discretion so but nobody has a single best self to it so when they getting to a single public and permit trademark figured world in this case an idealized student or worker who only says a thing that there would not upset anyone else and who can only talk about the successes is completely impossible we're not robots we might say something to a co-worker and passing in the adult hallway and then maybe the boss should not be knowing about that but it spreads like where does the discretion lie and for teenagers who are still figuring out their identity how horrible is it to put pressure this added pressure them for what they must be perfect perfect online at all times furthermore what message should be sent to Walmart vulnerable and marginalized groups for example the LGBT people who are often focused to make newer nuanced decisions but how out there are in different contexts less they risk discrimination harassment in some countries imprisonment and literally death and we're telling them that their gender and sexual orientation isn't their best self this best self has created culture of slut-shaming anyone who has an intimate photo or text released this is has literally cost the lives of young women and men and it needs to stop this is an
example of how the burden of digital privacy privacy aren't equal this advice creates equity issues as it recommends erasure for those who identities are frequent targets of cyberbullying such as women LGBT groups and some online spaces such as gaming this often means women feel they can't use voice chat less their gender is revealed and they become a large target of harassment a final implication is
that we suggest a bullying is an expecting an appropriate response misjudgments about what to share little to nothing offered to help teens learn to recover from privacy miscalculations or violations to support their friends when it does occur or to renegotiate how their information shared in cases of misunderstanding and said these materials are rife with the almost gleeful recounting of tragedies from loss of privacy with limited discussion of the culpability of those who instigated or otherwise participated in for privacy violations blaming the ex who shares news is important but those there is also culpability with every person who also forwarded that elsewhere and more disturbingly it suggested an appropriate consequence to visit on those who violate though others in privacy is death and I quote IROC quote her full remarks made us move bullies to the head of a kill list and quote it's not that hard to find anyone through the internet I'll pause here remind you that
this curriculum is being taught as many children across the United States we did find to recommend two
resources which we can recommend the human sexuality curriculum our whole lives does a good job of discussing how to create a pure culture of respecting privacy especially in intimate relationships and the smart girls guide to privacy by violet Lu does an excellent job covering how to respond to incidents and in taking a firm anti slut-shaming stance so what are our next
steps we want to see digital privacy which not only covers the technical aspects of how to protect privacy and having reasonable discussion but also includes material on how to help people identify where the conflicts between their figured worlds might exist makes negotiating privacy's with others norm and covers more resources to help recover privacy recover from privacy whether it's accidental or malicious so
we thought it was a little weak sauce to say there should be better digital privacy education without offering any examples so we made one we created digital privacy detectives an interactive narrative mystery game it's design was based on the socio-cultural framework presented here it looks at discussion philosophies of keeping and maintaining social relationships and figured world setting and communicating boundaries with others regarding privacy and you and using technology solutions this workstation was piloted for the first time at roots yesterday so now that your kids have had their way with what we thought would be a great lesson plan a game we're gonna redesign it a little and with their feedback in mind and later this fall we'll release it for anyone to use which watch our Twitter feed for details on that we also have a draft of a Creative Commons like license for private information tentatively called sexting the license to help people easily negotiate how information is shared so under what terms are you sharing this photo with whom how long did they get a key but who are they going to show it to things like that if you're interested in collaborating on sexting the license please come talk to us what can you do
for the tech you design design it in ways which represents people as complex social creatures with a variety of roles creat sharing settings allow users to easily paths specify who is shared with each piece of shared content not a single public private flag kind of like Google+ I know you didn't expect to hear anyone defend Google+ here at Def Con but so I'd like to conclude with this
quote from Jesse Erwin privacy isn't about hiding it's about sharing on your terms thank you [Applause] [Music] [Applause]