understanding the importance and impact of anonymity and authentication in a networked society
navigation menu top border
navigation menu bottom border
left side navigation top border

left side navigation bottom border

left side navigation top border
left side navigation top border

main display area top border
.:presentations:.
.:works in progress:. | .:publications:. | .:presentations:. | .:id trail mix:.



PDF Print
Who's Minding the Kids? Surveillance in Three Online Playgrounds
By: Valerie Steeves


Presented at the Association of Computing Machinery Special Interest Group on Computer Human Interaction, Ottawa, January 2008.

Click here to download the presentation slides.
 
PDF Print
DRM {and/or/vs.} PRIVACY: musical lessons for the electronic health care record
By: Ian Kerr


Keynote address presented at the Pan-Canadian Privacy Forum on EHR Information Governance, Toronto, November 14.

Click here to download the podcast.
 
PDF Print
The internet of things: .... well then, why not people?
By: Ian Kerr


Presented at Privacy Horizons: Terra Incognita, 29th International Conference of Data Protection and Privacy Commissioners, Montreal, September 25-28, 2007.

Click here to download the presentation slides.
 
PDF Print
smells like teen spirit: emanations, snoop dogs & reasonable expectations of privacy
By: Ian Kerr

Presented at the CIPPIC Summer Seminar Series, July 11, 2007.

Click here to download the presentation slides.
 
PDF Print

RFID Networks in Action

By: Jeremy Hessing-Lewis & Prof. Ian Kerr

 

The following jpg images were prepared to accompany Ian Kerr's work on RFID tags.

 

Read more...
 
PDF Print

Privacy, Identity and Equality:  The Case of Child Pornography
By: Jane Bailey


Presented at the Centre for Innovation Law and Policy Consultation on Online Child Exploitation, Toronto,  May 7 2007.

Click here to download the presentation slides.

 
PDF Print
A Reasonable Expectation of Privacy? You Be the Judge!
By: Jane Bailey


Presented at “A Reasonable Expectation of Privacy? You be the Judge!”, Workshop presented at the Computers, Freedom & Privacy Conference, Montréal, May 1, 2007.

Click here to download the presentation slides.
 
PDF Print

Perspectives on Privacy: The Technological View
By: Carlisle Adams


Presented at “A Reasonable Expectation of Privacy? You be the Judge!”, Workshop presented at the Computers, Freedom & Privacy Conference, Montréal, May 1, 2007.

Click here to download the presentation slides.

 
PDF Print

Reasonable Expectations of Privacy: Sociological Perspectives
By: Valerie Steeves


Presented at “A Reasonable Expectation of Privacy? You be the Judge!”, Workshop presented at the Computers, Freedom & Privacy Conference, Montréal, May 1, 2007.

Click here to download the presentation slides.

 
PDF Print

Reasonable Expectations of Privacy: The Psychological Perspective
By: Jacquelyn Burkell


Presented at “A Reasonable Expectation of Privacy? You be the Judge!”, Workshop presented at the Computers, Freedom & Privacy Conference, Montréal, May 1, 2007.

Click here to download the presentation slides.

 
PDF Print
Deeply Personal Information and the Reasonable Expectation of Privacy in Tessling
By: David Matheson


Presented at “A Reasonable Expectation of Privacy? You be the Judge!”, Workshop presented at the Computers, Freedom & Privacy Conference, Montréal, May 1, 2007.

Click here to download the presentation slides.

 
PDF Print
Tessling on my brain: reasonable expectation of privacy, technology, & the future
By: Ian Kerr


Presented at “A Reasonable Expectation of Privacy? You be the Judge!”, Workshop presented at the Computers, Freedom & Privacy Conference, Montréal, May 1, 2007.

Click here to download the presentation slides.
 
PDF Print
New Identifiers for Victims of Abuse
By: Ian Kerr


Presented at the Shirley Greenberg Chair for Women and the Legal Profession Greenberg Lunch-Time Workshop, University of Ottawa, March 14, 2007.

Click here to download the presentation podcast.

 
PDF Print
Consumer Information as Commodity
By: Philippa Lawson


Presented at the Privacy Commissioner of Canada's Lunch Lecture Series, Ottawa, November 29, 2006.

Click here to download the presentation slides.
 
PDF Print
Using Implantable RFID to link Patients to Health Records
By: Ian Kerr


Keynote Address, presented at the Electronic Health Information & Privacy Conference, Ottawa, November 13, 2006.

Click here to download the presentation slides.
 
PDF Print
For Better, Not Worse: Data Protection and Health Research
By: Valerie Steeves


Presented at the Electronic Health Information and Privacy Conference, Ottawa, November 13, 2006.

Click here to download the presentation slides.
 
PDF Print

Delegation and Proxy Services in Digital Credential Environments
By: Carlisle Adams

Presented at the 7th Annual Privacy and Security Workshop Your Identity Please: Identity Theft and Identity Management in the 21st Century, Toronto, November 2, 2006.

Click here to download the presentation slides.
 
PDF Print
Consumer Health Information as Commodity
By: Philippa Lawson


Presented at the Electronic Health Information and Privacy Conference, Ottawa, November 13, 2006.

Click here to download the presentation slides.

 
PDF Print

Tackling ID Theft: Legal and Policy Approaches
By: Philippa Lawson

Presented at the 7th Annual Privacy and Security Workshop Your Identity Please: Identity Theft and Identity Management in the 21st Century, Toronto, November 3, 2006.


Click here to download the presentation slides.

 
PDF Print
Identity: Setting the Larger Context, Achieving the Right Outcomes
By: Stefan Brands


Presented at the 7th Annual Privacy and Security Workshop Your Identity Please: Identity Theft and Identity Management in the 21st Century, Toronto, November 3, 2006.
 
Click here to download the presentation slides.
 
PDF Print
Health Privacy, Patient Autonomy and the Coming Merger of Humans and Machines
By: Ian Kerr


Presented at Dalhousie University Health Law Institute Health Law and Policy Seminar Series, Halifax, October 20, 2006.

Click here to download the presentation podcast.

 
PDF Print
What's the Frequency, Kenneth? Radio Frequency Identifications and the Future of Humanism
By: Jacquelyn Burkell, Valerie Steeves and Ian Kerr


Public discussion organized by the Sheldon Chumir Foundation and the Dalhousie University Privacy and Security Lab, Halifax, October 23, 2006.

Click here to download the presentation podcast.
 
PDF Print
Privacy and Openness: Achieving the Right Balance
By Philippa Lawson

Presentation to the Second National Forum on New Directions in Administrative Law and Practice, Toronto, Oct.4-5, 2006.

Click here to download the presentation slides.

 
PDF Print
DRM & The Automation of Virtue
By: Ian Kerr


Presented at “Identity and Identification in a Networked World: A Multidisciplinary Graduate Student Symposium”, New York University, September 29, 2006.
 
 
PDF Print
Today's Identity Crisis, and the Identity Metasystem
By: Stefan Brands


Stefan Brands presented on a panel on identity at Microsoft's MIX06 conference, Las Vegas, March 20-22, 2006.  The panel, titled "Today's Identity Crisis, and the Identity Metasystem", discussed Microsoft's vision for the Identity Metasystem, a framework for a new internet-level identity system proposed by Microsoft and industry partners, which addresses the challenges users face with online security, identity theft, and the complexity of managing multiple identities.  Dr. Brands' presentation, with an introduction from Microsoft's Kim Cameron, is available for download here.  
 
PDF Print
Soft Surveillance, Hard Consent
By: Ian Kerr


Presented at the Ontario Bar Association Year End Meeting, Toronto, June 20th, 2006.

Click here to download the presentation slides.
 
PDF Print
Privacy-Preserving Delegation of Digital Credentials
By: Carlisle Adams


Presented at the On the Identity Trail team meeting, Ottawa, May 13, 2006.

Click here to download the presentation slides.
 
PDF Print

Privacy Negotiation using a Mobile Agent
By: Yogesh Kalyani


Presented at the On the Identity Trail team meeting, Ottawa, May 13, 2006.

Click here to download the presentation slides.

 
PDF Print
Enhancing Consumer Privacy in Identity Federation Architectures
By: Mansour Alsaleh


Presented at the On the Identity Trail team meeting, Ottawa, May 13, 2006.

Click here to download the presentation slides.
 
PDF Print

Internet Geolocation and Evasion
By: James Muir


Presented at the On the Identity Trail team meeting, Ottawa, May 13, 2006.

Click here to download the presentation slides.

 
PDF Print

Anonymization: Determining when PHIPA applies
By: Carole Lucock

Presented at Reducing Legal Risk & Overcoming the Obstacles in Implementing the Personal Health Information Protection Act: Concrete Tools & Proven Strategies for Avoiding Serious Error, Toronto, May 8, 2006.

Click here to download the presentation slides.
Click here to download the presentation handout.

 

 
PDF Print
Consumer Information as Commodity: A Glimpse into the Canadian Data Brokerage Industry and an Assessment of Retailer Compliance with Data Protection Laws
By: Philippa Lawson


Presented to the Surveillance Project in Kingston on April 27, 2006.

Click here to download the presentation slides.
 
PDF Print
Surfing the Waves:  What Cyberfeminism is Teaching Me
By: Jane Bailey


Presented at Shirley Greenberg Lecture Series, University of Ottawa, March 15, 2006.

Click here to download the presentation slides.
 
PDF Print
The Medium is A Message:  Reaffirming Public Obligations in the Battle Against Internet Hate
By: Jane Bailey


Presented at National Holocaust Memorial, Law Society of Upper Canada and The League for Human Rights Bnai B’rith Canada, Toronto, April 26, 2006.

Click here to download the presentation slides.
 
PDF Print
Data Protection, Privacy & Anonymization: Definitions, Standards & Rights
By: Carole Lucock


Presented to the World Health Organization Ethics Council in Geneva, Switzerland, on April 5, 2006.

Click here to download the presentation slides.
 
PDF Print

add this to your cart? digital locks and autopia/myopia/distopia
By: Ian Kerr


Presented at "Who Can You Trust? Privacy and Security is Everyone's Responsibility," the 7th Annual Privacy and Security Conference in Victoria, BC, February 10, 2006.  

Click here to download the slides...

 
PDF Print
Outsourcing Privacy: Protecting personal information when outsourcing and offshoring
By: Alex Cameron


Presentation to the Ottawa Center for Research and Innovation, November 2005
 
Click here to download presentation slides...

 
PDF Print

International Intellectual Property Update: Canada
By: Alex Cameron


Presentation to Computers, Freedom & Privacy conference, Seattle, April 2005

Click here to download the presentation slides...

 
PDF Print
P2P Litigation Summit: Canadian and Global Developments
By: Alex Cameron


Presentation to the First Annual P2P Litigation Summit (November 3, 2005), Northwestern University School of Law, Chicago, USA.

Click here to download the presentation slides...
 
PDF Print

anonymity, smart networks and the internet for dummies
By: Ian Kerr


Presented at IP3: Intellectual Property, Innovation Policies and International Perspectives Conference, on December 9– 10, 2005.

Click here to download the presentation slides...

 
PDF Print

stuck in the middle with you: isps, p2p & cybercrime
By: Ian Kerr


Presented at Bell Canada Enterprises Innovations Breakfast Series in Toronto on December 2, 2005.

Click here to download the presentation slides...

 
PDF Print

digital copyright reform & the piracy of personal information
By: Ian Kerr

Presented at the Third International Conference on the Intellectual Property Protection of High Technology: Intellectual Property Protection of Computer Software at Tsinghua University, Beijing, China, on December 9, 2005. 

Click here to download the presentation slides...

 
PDF Print

Finding the Balance between Privacy and Security
By: Philippa Lawson


Notes for an address to the Annual Conference of the Canadian Access and Privacy Association, November 22, 2005.

Click here to download the presentation notes...

 

 
PDF Print
Identity Management and Privacy
By: Stefan Brands


Presented at the 6th Annual Privacy and Security Workshop, Privacy and Security: Disclosure, University of Toronto, November 3, 2005.

ABSTRACT:
Identity management is increasingly recognized as a cornerstone of electronic communication and transaction systems. Broad application areas such as enterprise access management, electronic health record management, e-government, e-commerce, and social networking all critically rely on the ability to manage, provision, and authenticate the "identities" of people,devices, processes, and other entities. Three basic approaches to identity management can be distinguished: silo identity management, federated identity management, and user-centric identity management. Each of these has unique characteristics with regards to security, privacy, scalability, and usability. As a result, each basic approach to identity management is suitable for certain types of applications but not for others. In this presentation I will discuss the pros and cons of each approach and discuss the implications for various types of applications. Interested listeners are encouraged to visit www.idcorner.org to learn more about the topic.
 
PDF Print
Empirical Aspirations:  The Substance of Procedure in Online Music Sharing Litigation
By: Jane Bailey


Jane Bailey presented "Empirical Aspirations:  The Substance of Procedure in Online Music Sharing Litigation" in spring 2005 at the Canadian Law and Society Association Conference in Harrison Hot Springs, British Columbia.  The presentation focuses on the impact of civil procedure rules compelling disclosure of user identities on online privacy, as well as on the public interest in resolution of the substantive legal issues surrounding online music sharing.  Her paper, "The Substance of Procedure:  Non-Party Disclosure in the Canadian and U.S. Online Music Sharing Litigation" will be published in winter 2006 in a special issue of the Alberta Law Review devoted to the subject of privacy.

Click here to download the presentation slides...
 
PDF Print
Bibendum, Bird and the Beatles:  The Role of Free Expression in the Canadian Copyright Reform Process
By: Jane Bailey


Presented at Third International Conference on the Intellectual Property Protection of High Technology, Tsinghua University, Beijing, 9 December 2005.
 
 
PDF Print
On the Identity Trail: Anonymity and Authentication in a Networked Society
By: Ian Kerr


Presented at the PRIME Meeting of the Social Scientific Research Working Group at the Tilburg Institute for Law, Technology, and Society, Tilburg University, The Netherlands, on November 25, 2005.

Click here to download the presentation slides...
 
PDF Print

Anonymization of Electric Health Information Data
By: Carole Lucock


Presented at the Electronic Health Information & Privacy Conference Guidelines Workshop, Ottawa, December 1, 2005.

Click here to download the workshop handout...

 
PDF Print
Add This to Your Cart: DRM and Autopia/Myopia/Distopia
By: Ian Kerr 

Presented at 6th Annual Privacy and Security Workshop, Privacy and Security: Disclosure, University of Toronto on November 3, 2005.

Click here to download the presentation slides...

 
PDF Print

Privacy Policies on Kids’ Favourite Web Sites
By: Jacquelyn Burkell and Valerie Steeves

Presented at the 6th Annual Privacy and Security Workshop, Privacy and Security: Disclosure, University of Toronto on November 3, 2005.

Click here to download the presentation slides...

 
PDF Print

Comparative Approaches in IT Regulation: Communications Surveillance
By: Marc Rotenberg

Presented on September 29, 2005, at the Canadian Institute for the Administration of Justice, Toronto.

Click here to download his presentation...

 
PDF Print

TPMS, DRMS, COPYRIGHT REFORM & PRIVACY
By: Ian Kerr


Presented to the Federal Court and Federal Court of Appeal Education Seminar: Intellectual Property, April 22, 2005

Ian Kerr presented this talk at the lucheon keynote his talk focues on DRM, Copyright Reform & Privacy. This seminar was designed to introduce and highlight some recent significant developments relating to legislation and case law in Canada in the areas of patents, copyright and trademarks.

Click here to download this presentation...

 
PDF Print
Privacy Advocacy In An Age Of Surveillance: The CIPPIC Approach
By: Pippa Lawson


Presented at The Concealed I: Anonymity, Identity and the Prospect of Privacy, University of Ottawa, March 5, 2005.

Click here to download the presentation slides...
 
PDF Print

SEEKING EQUALITY ANONYMOUSLY: Naming Names in Section 15 Litigation
By: Daphne Gilbert


Presented at The Concealed I: Anonymity, Identity and the Prospect of Privacy, University of Ottawa, March 5, 2005.

Click here to download the presentation slides...
 
PDF Print

dognymity
By: Ian Kerr

On October 15, 2004, Ian Kerr made a presentation on anonymity and authentication titled "dognymity", at the DePaul College of Law Center for Property Law & Information Technology Symposium, "Privacy and Identity: The Promise and Perils of a Technological Age", in Chicago.

Click here to download his presentation...

 
PDF Print
Continuous Lifelong Capture of Personal Experience with Eyetap
By: Steve Mann

Opening Keynote Address, ACM Multimedia 2004 1st Workshop on Continuous Archival and Retrieval of Personal Experiences, October 15, 2004, Columbia University, New York

ABSTRACT:
I begin with the argument that continuous archival of personal experience requires certain criteria to be met. In particular, for continuous usage, it is essential that each ray of light entering the eye be collinear with a corresponding ray of light entering the device, in at least one mode of operation. This is called the EyeTap criterion, and devices meeting this criterion are called EyeTap devices. Secondly, I outline Mediated Reality as a necessary framework for continuous archival and retrieval of personal experience. Thirdly, I show some examples of personalized experience capture (i.e. visual art). Finally, I outline the social issues of such devices, in particular, the accidentally discovered inverse to surveillance that I call "sosuveillance". It is argued that an equilibrium between surveillance and sousveillance is implicit in the archival of personal experiences.

Click here to download his presentation...

 
PDF Print
Open problems in applying PETs to EU Data
By: Casper Bowden,
Senior privacy strategist at Microsoft Europe Middle East & Africa

This presentation was given to the University of Ottawa's Faculty of Law Tory Technology Tuesdays speaker series, on October 26, 2004.

Abstract:

The European Union’s framework for privacy protection was established by the Data Protection Directive of 1995, and the term ‘Privacy Enhancing Technologies’ (PETs) was coined around that time also. Many believe that PETs have tremendous potential to simplify compliance and promote adherence to Data Protection principles, but a number of legal issues arising from the interpretation of the Directive and its transposition into national law remain unresolved. This talk will summarise the main elements of the Directive and it’s grounding in European human rights law, and explore some of the technical and legal issues which may require further harmonisation in order for the benefits of PETs to be realised.

Click here to download his presentation...

 
PDF Print
Cross-Domain Digital Identity Management
By: Dr. Stephan Brands

Presented to Proceedings of the 3rd Annual PKI R&D Workshop in Gaithersburg, April 2004

Click here to download his presentation...

 
PDF Print
Secret-Ballot Receipts: True Voter-Verifiable Elections
By: David Chaum

Presented on May 19, 2004, at the ITL Seminar Series - Secret-Ballot Receipts: True Voter-Verifiable Elections, National Institute of Standards and Technology, Gaithersburg, MD.
Presented on May 26, 2004, at the DIMACS Workshop on Electronic Voting, Rutgers University, NJ.
Presented on October 1, 2004 at the Caltech-MIT/Voting Technology Project Symposium 2004, MIT, Cambridge, MA.

Click here to download his presentation slides...

 
PDF Print
A Brief History of Privacy: Privacy Risks on the Horizon
By: Stephanie Perrin

Stephanie gave this talk at CIPPIC's Summer Speaker Series.  The speaker series was a series of seminars for the general tech law community - profs, students, volunteers and some other interested community members.

Click her to download her presentation...

 
PDF Print

Privacy Enhancing Technologies
By: Mohamed Layouni


Presented at the On the Identity Trail Student Salon, Ottawa, June 11, 2004.

Click here to download his presentation...

 
PDF Print
Automation & Ecommerce: How Turing's Fast Friends are Under-Mining Consumer Privacy
By: Ian Kerr

On June 25 2004, Ian Kerr presented a paper on "Automation & Ecommerce: How Turing's Fast Friends are Under-Mining Consumer Privacy" at the Instituut voor Informatierecht at the Universiteit Van Amsterdam.

Click here to download his presentation...

 
PDF Print

Anonymity, Identity and the Role of Libraries and other Info-Mediaries
By: Ian Kerr

On May 22, 2004, Ian Kerr co-presented a workshop on "Anonymity, Identity and the Role of Libraries and other Info-Mediaries" at Freedom 2.0: Distributed Democracy in Washington D.C.

Click here to download his presentation slides...

 
PDF Print

Chief Treasures of the World: what happens when law is used to protect the technologies that protect copyright
By: Ian Kerr & Jane Bailey

On April 16, 2004, 2004, Ian Kerr co-presented with Jane Bailey a presentation on the implications of digital rights management on privacy and freedom of expression at The Seventh ETHICOMP International Conference on the Social and Ethical Impacts of Information and Communication Technologies in Syros Greece.

Click here to download their presentation slides...

 
main display area bottom border

.:privacy:. | .:contact:. | .:1rxdrugs.net:.


This is a SSHRC funded project:
Social Sciences and Humanities Research Council of Canada

© 2014 On the Identity Trail
Joomla! is Free Software released under the GNU/GPL License.