{"id":522,"date":"2023-04-24T07:57:10","date_gmt":"2023-04-24T07:57:10","guid":{"rendered":"https:\/\/tt.utu.fi\/sweng\/?page_id=522"},"modified":"2023-04-24T09:15:57","modified_gmt":"2023-04-24T09:15:57","slug":"ida-intimacy-in-data-driven-culture","status":"publish","type":"page","link":"https:\/\/tt.utu.fi\/sweng\/ida-intimacy-in-data-driven-culture\/","title":{"rendered":"IDA \u2013 Intimacy in Data-Driven Culture"},"content":{"rendered":"\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:66.66%\">\n<p class=\"has-background\" style=\"background-color:#dcddde\">IDA &#8211; Intimacy in Data-Driven Culture<br>1.6.2019 &#8211; 31.8.2025<br>Academy of Finland<br>Budget: 490 104 \u20ac<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still1-1024x1024.png\" alt=\"Tied\u00e4tk\u00f6, mit\u00e4 dataa sinusta ker\u00e4t\u00e4\u00e4n?\" class=\"wp-image-529\" width=\"175\" height=\"175\" srcset=\"https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still1-1024x1024.png 1024w, https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still1-300x300.png 300w, https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still1-150x150.png 150w, https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still1-768x768.png 768w, https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still1.png 1080w\" sizes=\"auto, (max-width: 175px) 100vw, 175px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>With the widespread use of digital devices, we have access to a wealth of information and several online services that largely replace the traditional way of conducting business onsite. However, this development has also brought about privacy concerns. Internet users&#8217; personal information can be collected and used without their knowledge or consent. In today&#8217;s world, data collection has an increasingly important role when tracking and analyzing users&#8217; daily activities. From purchased products to political opinions, data provides insights into every aspect of our lives. While this data can be used to create a convenient digital infrastructure that supports our daily routines, personal data often also ends up to third parties such as large analytics companies.<\/p>\n\n\n\n<p>When third-party entities collect and process data, it can also be used for purposes that the individual did not consent to. This can include using personal data to create targeted advertising, or selling it to other companies. As few powerful companies or organizations gather large amounts of personal data, power imbalances are created.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"align-horizontal-wrap alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still3-1-1024x1024.png\" alt=\"\" class=\"wp-image-531\" width=\"226\" height=\"226\" srcset=\"https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still3-1-1024x1024.png 1024w, https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still3-1-300x300.png 300w, https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still3-1-150x150.png 150w, https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still3-1-768x768.png 768w, https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/ida_some_still3-1.png 1080w\" sizes=\"auto, (max-width: 226px) 100vw, 226px\" \/><\/figure>\n<\/div>\n\n\n<p>The IDA project seeks to improve data privacy and data democracy \u2013 individuals should have the right to decide what personal data is collected about them, how it is used, and who has access to this data. The work packages develop experimental methods for studying data leakages and advance open privacy-preserving solutions for collecting, managing and using data.<\/p>\n\n\n\n<p>From the viewpoint of software engineering, the project studies privacy and third-party data leaks, especially in web and mobile environments. This includes, among other things, network traffic analysis, analyzing transparence of privacy policy documents, assessing properties of third-party analytics services, and finding methods to improve personal data protection in software development. The findings have revealed, for example, highly sensitive and intimate data leaks in Finnish online pharmacies, medical center websites, and voting advice applications.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"921\" height=\"934\" src=\"https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/An-alluvial-diagram-of-the-analytics-providers-used-by-the-studied-public-sector-web-services.png\" alt=\"An alluvial diagram of the analytics providers used by the studied public sector web services\" class=\"wp-image-526\" srcset=\"https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/An-alluvial-diagram-of-the-analytics-providers-used-by-the-studied-public-sector-web-services.png 921w, https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/An-alluvial-diagram-of-the-analytics-providers-used-by-the-studied-public-sector-web-services-296x300.png 296w, https:\/\/tt.utu.fi\/sweng\/wp-content\/uploads\/sites\/19\/2023\/04\/An-alluvial-diagram-of-the-analytics-providers-used-by-the-studied-public-sector-web-services-768x779.png 768w\" sizes=\"auto, (max-width: 921px) 100vw, 921px\" \/><figcaption class=\"wp-element-caption\">An alluvial diagram of the analytics providers used by the studied public sector web services<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Key Partners<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/aalto.fi\">Aalto University<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/tuni.fi\">Tampere University<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.utu.fi\/en\/university\/faculty-of-law\">Faculty of Law, University of Turku<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.utu.fi\/en\/university\/faculty-of-humanities\">Faculty of Humanities, University of Turku<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Additional information<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.dataintimacy.fi\/en\/\">IDA project homepage<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Ask more<\/h2>\n\n\n\n<p>Ville Lepp\u00e4nen<br>Professor<br>ville.leppanen@utu.fi<br>Phone +358 40&nbsp;739 3060<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Selected publications<\/h2>\n\n\n\n<p>Carlsson, R., Rauti, S., Laato, S., T., Heino, Lepp\u00e4nen, V. (2023): Privacy in Popular Children\u2019s Mobile Applications: A Network Traffic Analysis. MIPRO 2023. Accepted, to be published.<\/p>\n\n\n\n<p>Carlsson, R., Rauti, S., Mickelsson, S., M\u00e4kil\u00e4, T., Heino, T., Pirjatanniemi, E., Lepp\u00e4nen, V. (2023): Several online pharmacies leak sensitive health data to third parties. Information Systems and Technologies: WorldCIST 2023. Accepted, to be published.<\/p>\n\n\n\n<p>Ruohonen J., Hjerppe K.: &#8220;The GDPR Enforcement Fines at Glance&#8221;, Information Systems, 106: 101876 (2022), Elsevier. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0306437921001009?via%3Dihub<\/p>\n\n\n\n<p>Heino, T., Carlsson, R., Rauti, S., Lepp\u00e4nen, V. (2022): Assessing discrepancies between network traffic and privacy policies of public sector web services. In Proceedings of the 17th International Conference on Availability, Reliability and Security (ARES &#8217;22). Association for Computing Machinery, New York, NY, USA, Article 11, 1\u20136. <a href=\"https:\/\/doi.org\/10.1145\/3538969.3539003\">https:\/\/doi.org\/10.1145\/3538969.3539003<\/a><\/p>\n\n\n\n<p>Carlsson, R., Heino, T., Koivunen, L., Rauti, S., Lepp\u00e4nen, V. (2022): Where Does Your Data Go? Comparing Network Traffic and Privacy Policies of Public Sector Mobile Applications. In: Rocha, A., Adeli, H., Dzemyda, G., Moreira, F. (eds) Information Systems and Technologies. WorldCIST 2022. Lecture Notes in Networks and Systems, vol 468. Springer, Cham. <a href=\"https:\/\/doi.org\/10.1007\/978-3-031-04826-5_21\">https:\/\/doi.org\/10.1007\/978-3-031-04826-5_21<\/a><\/p>\n\n\n\n<p>Hjerppe, K., Ruohonen, J., Lepp\u00e4nen, V. (2022): Extracting LPL privacy policy purposes from annotated web service source code. Softw Syst Model 22, 331\u2013349. <a href=\"https:\/\/doi.org\/10.1007\/s10270-022-00998-y\">https:\/\/doi.org\/10.1007\/s10270-022-00998-y<\/a><\/p>\n\n\n\n<p>Ruohonen J.: &#8220;The Treachery of Images in the Digital Sovereignty Debate&#8221;, Minds and Machines, 31(3): 439-456 (2021), Springer. <a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11023-021-09566-7\">https:\/\/link.springer.com\/article\/10.1007\/s11023-021-09566-7<\/a><\/p>\n\n\n\n<p>Ruohonen J., Tuikka A-M.: &#8220;Digital Divides and Online Media&#8221;, ICSET 2021: 2021 5th International Conference on E-Society, E-Education and E-Technology, pp. 157 &#8211; 163, 2021, ACM. https:\/\/dl.acm.org\/doi\/10.1145\/3485768.3485815<\/p>\n\n\n\n<p>Hjerppe K., Ruohonen J., Lepp\u00e4nen V (2020): \u201cAnnotation-based static analysis for personal data protection.\u201d I<em>FIP Advances in Information and Communication Technology.&nbsp;<\/em>vol. 576.<br><a href=\"http:\/\/dx.doi.org\/10.1007\/978-3-030-42504-3_22\">http:\/\/dx.doi.org\/10.1007\/978-3-030-42504-3_22<\/a><\/p>\n\n\n\n<p>Ruohonen, J., Hyrynsalmi, S., Lepp\u00e4nen V. (2020): \u201cA Mixed Methods Probe into the Direct Disclosure of Software Vulnerabilities.\u201d&nbsp;<em>Computers in Human Behavior<\/em>&nbsp;vol. 103. 161-173.&nbsp;<a href=\"https:\/\/doi.org\/10.1016\/j.chb.2019.09.028\">https:\/\/doi.org\/10.1016\/j.chb.2019.09.028<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"entry-summary\">\nIDA &#8211; Intimacy in Data-Driven Culture1.6.2019 &#8211; 31.8.2025Academy of FinlandBudget: 490 104 \u20ac With the widespread use of digital devices, we have access to a wealth of information and several online services that largely replace the traditional way of conducting&hellip;\n<\/div>\n<div class=\"link-more\"><a href=\"https:\/\/tt.utu.fi\/sweng\/ida-intimacy-in-data-driven-culture\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &ldquo;IDA \u2013 Intimacy in Data-Driven Culture&rdquo;<\/span>&hellip;<\/a><\/div>\n","protected":false},"author":1872,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-522","page","type-page","status-publish","hentry","entry"],"acf":[],"_links":{"self":[{"href":"https:\/\/tt.utu.fi\/sweng\/wp-json\/wp\/v2\/pages\/522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tt.utu.fi\/sweng\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tt.utu.fi\/sweng\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tt.utu.fi\/sweng\/wp-json\/wp\/v2\/users\/1872"}],"replies":[{"embeddable":true,"href":"https:\/\/tt.utu.fi\/sweng\/wp-json\/wp\/v2\/comments?post=522"}],"version-history":[{"count":9,"href":"https:\/\/tt.utu.fi\/sweng\/wp-json\/wp\/v2\/pages\/522\/revisions"}],"predecessor-version":[{"id":543,"href":"https:\/\/tt.utu.fi\/sweng\/wp-json\/wp\/v2\/pages\/522\/revisions\/543"}],"wp:attachment":[{"href":"https:\/\/tt.utu.fi\/sweng\/wp-json\/wp\/v2\/media?parent=522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}