Canadian municipalities and anti-science

teethHere is a disturbing article from the National Post on how some municipalities are practicing anti-science under pressure from fringe groups.

Attacks on science: Canadian municipalities often more likely to listen to activists than scientific facts | National Post.

In the past few years, towns, villages and cities throughout Canada have passed a wave of laws that could well be described as “anti-science.” Water fluoridation bans. Anti-WiFi resolutions. GE free zones. The decisions often fly in the face of scientific consensus, ignore the advice of experts and lend legitimacy to groups once considered fringe.

But, as activists are starting to discover, science does not matter when a city hall meeting is facing a room full of angry townsfolk.

Canadian municipalities and anti-science Read More »

Elizabeth Loftus on embedding false memories in U.S. soldiers

Loftus’ work on memory continues to be one of the most important areas of Psychology. Here is an article describing a study of soldier’s memory after they were subjected to simulated capture and interrogation.

Elizabeth Loftus on embedding false memories in U.S. soldiers | TED Blog.

These findings show that even when an event is stressful, people can be led to make memory mistakes when fed misinformation. Moreover, this happened to a high degree even though the soldiers were highly trained individuals.

Elizabeth Loftus on embedding false memories in U.S. soldiers Read More »

6 Reasons We Share Too Much Online

An interesting article from Mother Jones on how we value, or don’t value, our privacy.

The conventional wisdom in Silicon Valley is that nobody cares about online privacy, except maybe creeps, wingnuts, and old people. Sure, a lot of us might say that we don’t like being tracked and targeted, but few of us actually bother to check the “do not track” option in on our web browsers. Millions of people have never adjusted their Facebook privacy settings. According to a recent Pew survey, only small fractions of internet users have taken steps to avoid being observed by hackers (33 percent), advertisers (28 percent), friends (19 percent), employers (11 percent), or the government (5 percent).

What’s going on here? The short answer is a lot of pretty twisted psychological stuff, which behavioral scientists are only now starting to understand.

Our uneasy relationship with the internet begins with the fact we don’t really know who can see our data and how they might exploit it. “Not even the experts have a full understanding of how personal data is used in an increasingly complicated market,” points out Carnegie Mellon University public policy professor Alessandro Acquisti, who researches the psychology behind online privacy perceptions. Behavioral economists often refer to this problem as information asymmetry: One party in a transaction (Facebook, Twitter, advertisers, the NSA) has better information than the other party (the rest of us).

The six reasons are:

  1. we are more willing to sell our privacy than pay for it
  2. we accept default settings
  3. offering some privacy controls may induce people to be reckless
  4. we fall for misdirection
  5. we are addicts
  6. ignorance is bliss

Read more at:

6 Reasons We Share Too Much Online, According to Behavioral Scientists | Mother Jones.

6 Reasons We Share Too Much Online Read More »

Fingerprints are Usernames, not Passwords

From Dustin Kirkland, an interesting way to think about fingerprints:

I could see some value, perhaps, in a tablet that I share with my wife, where each of us have our own accounts, with independent configurations, apps, and settings.  We could each conveniently identify ourselves by our fingerprint.  But biometrics cannot, and absolutely must not, be used to authenticate an identity.  For authentication, you need a password or passphrase.  Something that can be independently chosen, changed, and rotated.  I will continue to advocate this within the Ubuntu development community, as I have since 2009.

From the Canyon Edge: Fingerprints are Usernames, not Passwords.

Fingerprints are Usernames, not Passwords Read More »

I’m sorry. How do you like me now?

I’m sorry that Canadians are so apologetic.

Across four experiments with 730 people, superfluous apologies — that is, saying sorry for things for which you’re ultimately blameless — were proven to improve strangers’ opinions of the people expressing regret. The unwarranted contrition was interpreted by recipients as a sign of empathy, boosting the apologizer’s likability, perceived compassion and trustworthiness.

via One easy secret to make people like and trust you more.

I’m sorry. How do you like me now? Read More »

Trends in Biometrics Research: Notes from BTAS 13

I am currently at the BTAS conference in Washington DC getting up to speed on the latest research on biometrics. Here are a few trends I have observed so far:

  • an obvious lack of research on what I would call traditional biometric problems, including fingerprint matching, iris matching, and face recognition for high quality, passport style photos. These appear to be mostly solved problems.
  • recognition of spoofing as a challenging problem, as is evident in the quick attacks against the iPhone 5S fingerprint sensor,
  • a continuing trend to focus on challenging acquisition environments, included face photos taken at an angle (faces in the wild) and matching from video.
  • more interest in different kinds of sensors, including cell phone cameras, touch pads, and the Kinect.

Here is some more information about the conference:

BTAS 2013 … is the premier research conference focused on all aspects of biometrics. It is intended to have a broad scope, including advances in fundamental signal processing, image processing, pattern recognition and statistical and mathematical techniques relevant to biometrics, new algorithms and/or technologies for biometrics, analysis of specific applications, and analysis of the social impact of biometrics technology.

BTAS 2013 | Biometrics: Theory, Applications and Systems.

Trends in Biometrics Research: Notes from BTAS 13 Read More »

Anonymity, Encryption, and Free Expression

 Photo Credit: Bindaas Madhavi
Photo Credit: Bindaas Madhavi

Here is an interesting EFF article about the recent report from the Human Rights Council on anonymity, encryption, and free speech.

Today, governments all around the world are seeking to ban, block, or redesign personal communications technologies based on a misguided notion that these technologies are too secure.

Anonymity, Encryption, and Free Expression: What Nations Need to Do | Electronic Frontier Foundation.

Anonymity, Encryption, and Free Expression Read More »

New book chapter: Harm mitigation from the release of personal identity information

A new book chapter by Jean Camp and myself is now available. It appears in a new collection edited by George Yee titled Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. Here is the abstract, citation information, and link to the book.

In August 2007 approximately 445,000 letters were sent to retirees who belonged to the California Public Employees’ Retirement System (CalPERS). This was a routine mailing, but all or a portion of each pensioner’s Social Security Number (SSN) was printed on the address panel of the envelopes, making this event all but ordinary. This massive breach of sensitive SSNs, along with names and addresses, exposed these people to potential identity theft and fraud. What are the harms associated with a data breach of this nature? How can those harms be mitigated? What are, or should be, the costs and consequences to the organization releasing the data? While it is very difficult to predict the specific consequences of a data breach of this nature, a statistical model can be used to estimate the likely financial repercussions for individuals and organizations, and the recent settlement in the TJX case provides a good model of harm mitigation that could be applied in this case and similar cases.

Patrick, A. S., & Camp, L. J. (2012). Harm mitigation from the release of personal identity information. In Yee, G. O. (Ed.), Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. (pp. 309-330).

New book chapter: Harm mitigation from the release of personal identity information Read More »