SlideShare a Scribd company logo
1 of 40
Download to read offline
Partners in Building UAE's Security & Economy




 Privacy in the Age of
 Big Data




                                                                                                                                       © 2013 Emirates Identity Authority. All rights reserved
 Presented by Dr. Ali M. Al-Khouri




                                                                                                                   www.emiratesid.ae
 In: Big Data Systems, Applications and Privacy Conference –
 Organised by New York University, Abu Dhabi, UAE.
 10 – 11 March 2013 | Injazat Data Systems | Abu Dhabi | UAE
 Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬
 Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics
 that guarantees innovative and sophisticated services for the benefit of UAE
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Big Data in Digital World ?




     • The proliferation of modern technologies, smart devices and
                                              Climate Change
       popularity of social networking is generating unprecedented
       amounts of data, both structured and unstructured, whether it be
       text, audio or video.

     • Data has become                                   ubiquitous in this digital world.
     • Sheer amount of bytes that we generate daily is indeed mind
       boggling!

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                       www.emiratesid.ae
                                                                                             © 2012 Emirates Identity Authority. All rights reserved
The Age of Big Data ?

              every day, we create
              2.5 quintillion                                    bytes
              of data ..
                                                                                 This data is
                                                                                  big data
              90%                                   of the data in the
              world today has been created                               Climate Change
              in the last two years.

              IBM Report


                We are truly in a
                digital explosion era!


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                           www.emiratesid.ae
                                                                                 © 2012 Emirates Identity Authority. All rights reserved
Data Growth
                                                               112 Zettabytes


                        all computer hard drives in the
                        world = 160 exabytes in 2006

                        all storage systems didn’t reach
                        one zettabyte of information in
                        2012!
                                                         295




    Global Growth of Digital Storage Capacity 1986-2021
                    By 2020, 112 Zettabytes of data (75% growth rate)
                    One Zettabyte = 1,000,000,000,000,000,000,000 byte, or 1000 exabytes
Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                          www.emiratesid.ae
                                                                                © 2012 Emirates Identity Authority. All rights reserved
Big Data ?

  • is generated from practically
    every where:
             - Social media sites
               (facebook, twitter, linked-in..)
             - digital pictures and videos,
             - e-mails,
             - purchase transaction
               records,                                  Climate Change
             - cell phone, GPS signals,
             - geo-stationary satellites,
             - meteorological sensors
             - to name a few.

  • This continues to grow at an
    exponential rate.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬           www.emiratesid.ae
                                                                 © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Big Data characteristics?



        • Big Data has come
          to be characterized
          by the Volume,
          Velocity and
          Variety of Data that
          is generated.

        • These constitute the
          3Vs of Big Data.




                                                         TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                                 www.emiratesid.ae
                                                                                                       © 2012 Emirates Identity Authority. All rights reserved
3Vs of Big Data ?



                                                                                                      Velocity
              Volume                                                                              provides the
       provides the                                                                              time at which
      amount of data                                                                               the data is
      and the form of                                                                            collected and
           data                                                                                     analyzed




                                       Variety provides the
                                    type of data collected
                                                              TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                         www.emiratesid.ae
                                                                                              © 2012 Emirates Identity Authority. All rights reserved
4th ‘V’ of Big Data ?


     • However, there is the
       fourth dimension - a
       fourth V- Veracity
       which encompasses
       the 3Vs!

     • Veracity provides the
            confidence in
            the truthfulness of
            the data.




                                                         TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                                 www.emiratesid.ae
                                                                                                       © 2012 Emirates Identity Authority. All rights reserved
Personal ID and Big Data ?
    Veracity of Data itself can be depicted using three dimensions:


     1. Veracity of Data is
     established by how the
     data itself is enabled-                                        2. Veracity of Data
     which stands for the                                           is established by the
     source of data.                                                means and
                                                                    methods of
                                                                    analysis- providing
                                                         Identity   discernible
                                                                    information



            3. Veracity of Data is then characterized by Personal
            Identity Management. This is the critical dimension
            of Big Data Veracity.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                   www.emiratesid.ae
                                                                         © 2012 Emirates Identity Authority. All rights reserved
Big Data ?

  • is not a new or unknown phenomenon.

  • Big Data as Volume Data has been used
    in Clinical Trials since long, resulting in many
    a ground breaking medicines.

  • Big Data as Volume Data has been in
    existence in DNA mapping and Genetics
    leading to many life-saving healthcare
    procedures.

  • While the Healthcare industry has been the
    initiator of big data analysis, retailers and
    marketing organizations have now started
    to make use of Big Data to further their
    commercial activities.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Web Analytics
• Numerous web analytics
  companies have now made
  it their business to collect all
  this trail and construct
  meaningful data from this
  huge data.

• Billions of posts in social
  networks, blogs, commerce
  sites, e-mails, text messages,
  utility payments are being
  “piggy-backed” to result in
  patterns of the digital
  interactions and individual
  behavior patterns then
  constructed from here.

• This is brilliant from a
  marketing point of view!

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Privacy ?




                                     But, from a privacy perspective, this could
                                      be construed as a blatant violation of
                                                individual privacy.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                       www.emiratesid.ae
                                                                             © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Personal ID and Digital Behaviour ?
  • as individuals, we Interact, we Transact, we
    Collaborate, we Communicate on a daily basis

  • .. which is sought to be
    analyzed for bringing
    commercial
    entities closer
    to the
    psyche of
    the individual
    (knowing
    customers –
    personalising
    services and
    products).




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and Digital Behaviour ?




               Big Data as in information and
               datasets have started to be
               cultivated based on the                   digital
               data we leave in
               our transactions.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬             www.emiratesid.ae
                                                                   © 2012 Emirates Identity Authority. All rights reserved
Digital Behaviour and Data Sets ?

    • We live in the digital world and are
      ubiquitously connected.

    • The Phone is no longer a calling device.

    • Our laptops, Tablets, Phablets and Phones
      keep us constantly engaged.

    • Every interaction leaves a huge trail of
      data leaving behind bits and pieces
          of us with pointers to our real
          behaviour.

    • This raises then many issues governing
      privacy..

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Digital Behaviour and Data Sets ?

      • It is understood that collection of
        information from digital transactions
        and interactions is something that is
        unstoppable.

      • Whether we like it or not, the
        amount of digital trail we leave
        behind in the e-world is amazingly
        large.

      • This digital trail when analyzed is
        almost like a signature that we
        leave behind, making it very easy
        for analysts to identify us as
        individuals in the purported
        anonymity of the web.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Anonymity ?

    • The West, particularly the USA and the EU have
      made conscious moves to protect individual
      privacy from being abused with legal provisions.

    • Anonymity has been the key consideration on
          which the legal provisions have been made so far.

    • However, it has been proved beyond any
      reasonable doubt that anonymity is not
      guaranteed even when personal identifiers are
      removed from the data sets for analysis.

    • Even IP Addresses that relate to machines have
      been cracked to relate them to personal users.

    • So,    where does this leave an individual
          with respect to his/ her privacy?

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬        www.emiratesid.ae
                                                              © 2012 Emirates Identity Authority. All rights reserved
Big Data and Privacy ?



                    Data can be either useful or
                    perfectly anonymous but
                    never both.
                                                                 PAUL OHM
                                                            Associate Professor of Law
                                                         University of Colorado Law School




                    How True?!
Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬          www.emiratesid.ae
                                                                © 2012 Emirates Identity Authority. All rights reserved
Google Saying ?

               .. while anonymized information will always carry some risk of re-
               identification . . . . many of the most pressing privacy risks . . . exist only if
               there is certainty in re-identification, that is if the information can be
               authenticated. As uncertainty is introduced into the re-identification
               equation, we cannot know that the information truly corresponds to a
               particular individual; it becomes more anonymous as larger amounts of
               uncertainty are introduced.




                     Betsy Masiello                              Alma Whitten
                    Global Public Policy at Google              Privacy for Product and Engineering at Google
                    Betsy Masiello, Alma Whitten: Engineering Privacy in an Age of Information Abundance. AAAI Spring
                    Symposium: Intelligent Information Privacy Management 2010



Federal Authority    | ‫هيئــــــــة اتحــــــــــــادية‬                                                                 www.emiratesid.ae
                                                                                                                        © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
National ID for Big Data Analysis

     • an intense role of
       Government Issued
            Personal Identity as
            a Unique National ID.

     • this will be extremely
       critical in Big Data and
            Big Data Analytics
            providing the required
            privacy in anonymity
            and yet provide
            meaningful data for
            analysis.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
National ID for Big Data Analysis


  • A secure ID would encourage
    users to be engaged more actively
    and more expansively in the digital
    world.

  • It is in this context that the                       Digital
         Identity profile provided and
         packaged in a Secure Smart Card is
         expected to play a pivotal role.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬             www.emiratesid.ae
                                                                   © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                                                         The Digital Identity provides the perfect PROXY
                                                                      for the personal identity.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                    www.emiratesid.ae
                                                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                    The individuals would be known and authenticated as genuine persons
                          by the National Identity Authority providing a THIRD PARTY
                                        authentication for the identity.
Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                   www.emiratesid.ae
                                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                Thus, service providers can identify the potential service seeker securely
                       from the authentication provided by the Emirates ID Authority.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                    www.emiratesid.ae
                                                                          © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                        An individual will then be able to transact and interact freely without
                                       compromising his/her personal identity.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                           www.emiratesid.ae
                                                                                 © 2012 Emirates Identity Authority. All rights reserved
National ID for Big Data Analysis

         • The UAE National ID Card is
           designed to provide multi
           factor authentication.

         • At the core of the Digital ID is
           the Unique Identity Number
           issued by the Emirates ID
           Authority.

         • With this ID is associated with
           the Digital Identity Profile
           consisting of Biometric Data-
           Fingerprints and ICAO
           compliant photograph, and
           Digital Certificates issued for
           Identification and Signatures
           issued as a Secure Smart Card.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID

         • Apart from the classical ID verification
           and authentication methods, projects
           are underway to upgrade the features
           to provide OTP (One-time-password)
           as per OATH Standards.

         • The ID card is a combi-card to work
           with contactless readers.

         • Projects are underway to develop the
           NFC enabled authentication methods
           using the GSM mobile phones and
           other mobile devices.

         • Each of the Digital ID profile
           components provides the ability for the
           user to be verified and further
           authenticated for access.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Protection of Individual Privacy

    • The Emirates ID Authority
      provides the necessary
          credential verification on
          the web.

    • The National ID Card could be
      used only with the Digital
      Credentials on the web
      transactions.

    • Emirates ID Authority does not
      share the personal information
          but provides only credential
          verification




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Protection of Individual Privacy

       • Service Providers are
         accorded with Verification
         and Authentication Services
         enabling secure remote
              transactions.

       • Service Seekers remain
         anonymous on the web
         since only Digital
              Certificates or Biometrics
              would be used to
              establish credential
              verification.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Concluding remarks
         • Big Data should be
           viewed to be about
           building Knowledge to
           support social,
           environmental, and
           economical development.

         • i.e., to improve efficiency,
           speed & accuracy of
           decisions, ability to
           forecast, cut costs, save
           energy, improve services,
           optimise infrastructure,
           enhance citizens quality of
           life, reduce environmental
           footprints, fuel innovation
           and diverse sustainable
           economic growth.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Concluding remarks

                                                         • Complexity will remain an issue!

                                                         • Successfully exploiting the value in
                                                           big data requires experimentation and
                                                           exploration.


         • Private sector will still lead the game, as Big Data will be viewed as a
           source of competition and growth.

         • Public sector will need to take Big Data more seriously, and put in
           place data-strategies to create new waves of productivity growth.

         • Main challenge: shortage of skills            [USA by 2018 will face shortage of around 2
               million managers and analysts with know-how to create and use big data to make
               effective decisions].


         • Need to address policies related to privacy, security, etc.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                 www.emiratesid.ae
                                                                                       © 2012 Emirates Identity Authority. All rights reserved
UAE National ID and Privacy




         • All data should be treated as personally identifiable and
               subjected to the regulatory framework.

         • UAE (Emirates ID Authority) would provide this regulatory framework
           to ensure identity protection.

         • Technical and Technology Solutions are already in place to support the
           regulatory and legal framework.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬             www.emiratesid.ae
                                                                   © 2012 Emirates Identity Authority. All rights reserved
More Information:

     Read our recent research from:
     http://www.emiratesid.gov.ae/ar/media-center/publications.aspx




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬         www.emiratesid.ae
                                                               © 2012 Emirates Identity Authority. All rights reserved
You can use all
  the quantitative
  data you can get,
  but you still
  have to
  distrust it and
  use your own
  intelligence
  and judgment.
  [Alvin Toffler]
  Dr. Ail M. Al-Khouri
  Director General |
  Emirates Identity Authority |
  United Arab Emirates |
  ali.alkhouri@emiratesid.ae |
  www.emiratesid.ae

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved

More Related Content

What's hot

Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationMike Nowakowski
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneTim Rich
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
big data and machine learning ppt.pptx
big data and machine learning ppt.pptxbig data and machine learning ppt.pptx
big data and machine learning ppt.pptxNATASHABANO
 
Big Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must KnowBig Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must KnowBernard Marr
 
Types of Blockchain, AI and its future
Types of Blockchain, AI and its futureTypes of Blockchain, AI and its future
Types of Blockchain, AI and its futureAarthi Srinivasan
 
Blockchain Scalability - Themes, Tools and Techniques
Blockchain Scalability - Themes, Tools and TechniquesBlockchain Scalability - Themes, Tools and Techniques
Blockchain Scalability - Themes, Tools and TechniquesGokul Alex
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)KP Naidu
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdfChunLei(peter) Che
 
Data science | What is Data science
Data science | What is Data scienceData science | What is Data science
Data science | What is Data scienceShilpaKrishna6
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
From Digital Literacy to Digital Fluency
From Digital Literacy to Digital FluencyFrom Digital Literacy to Digital Fluency
From Digital Literacy to Digital FluencyDavid Cain
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 

What's hot (20)

Data Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-IdentificationData Privacy: Anonymization & Re-Identification
Data Privacy: Anonymization & Re-Identification
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs One
 
5 v of big data
5 v of big data5 v of big data
5 v of big data
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
big data and machine learning ppt.pptx
big data and machine learning ppt.pptxbig data and machine learning ppt.pptx
big data and machine learning ppt.pptx
 
Big Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must KnowBig Data - The 5 Vs Everyone Must Know
Big Data - The 5 Vs Everyone Must Know
 
Types of Blockchain, AI and its future
Types of Blockchain, AI and its futureTypes of Blockchain, AI and its future
Types of Blockchain, AI and its future
 
Blockchain Scalability - Themes, Tools and Techniques
Blockchain Scalability - Themes, Tools and TechniquesBlockchain Scalability - Themes, Tools and Techniques
Blockchain Scalability - Themes, Tools and Techniques
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
Data ethics
Data ethicsData ethics
Data ethics
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf1.1 Data Security Presentation.pdf
1.1 Data Security Presentation.pdf
 
Data science | What is Data science
Data science | What is Data scienceData science | What is Data science
Data science | What is Data science
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Big Data & Data Mining
Big Data & Data MiningBig Data & Data Mining
Big Data & Data Mining
 
From Digital Literacy to Digital Fluency
From Digital Literacy to Digital FluencyFrom Digital Literacy to Digital Fluency
From Digital Literacy to Digital Fluency
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 

Similar to Partners in Building UAE's Security & Economy Through Privacy in the Age of Big Data

Konceptuelt overblik over Big Data, Flemming Bagger, IBM
Konceptuelt overblik over Big Data, Flemming Bagger, IBMKonceptuelt overblik over Big Data, Flemming Bagger, IBM
Konceptuelt overblik over Big Data, Flemming Bagger, IBMIBM Danmark
 
Data Science Courses - BigData VS Data Science
Data Science Courses - BigData VS Data ScienceData Science Courses - BigData VS Data Science
Data Science Courses - BigData VS Data ScienceDataMites
 
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012James Mailley
 
Trends and Development in Government Sector: Building e-Government Backbone
Trends and Development in Government Sector: Building e-Government BackboneTrends and Development in Government Sector: Building e-Government Backbone
Trends and Development in Government Sector: Building e-Government BackboneArab Federation for Digital Economy
 
Identity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudIdentity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudCharles Li
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analyticsMike Davis
 
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptxHamidHajaoui1
 
The Development of a National Identity Management System to Support National ...
The Development of a National Identity Management System to Support National ...The Development of a National Identity Management System to Support National ...
The Development of a National Identity Management System to Support National ...Arab Federation for Digital Economy
 
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoSmarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoJyothi Satyanathan
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...eswcsummerschool
 

Similar to Partners in Building UAE's Security & Economy Through Privacy in the Age of Big Data (20)

Developing More Inclusive and Innovative Government
Developing More Inclusive and Innovative GovernmentDeveloping More Inclusive and Innovative Government
Developing More Inclusive and Innovative Government
 
Strategic Vision: Public eID Programs in GCC Countries
Strategic Vision: Public eID Programs in GCC CountriesStrategic Vision: Public eID Programs in GCC Countries
Strategic Vision: Public eID Programs in GCC Countries
 
The Development of Digital Economy
The Development of Digital EconomyThe Development of Digital Economy
The Development of Digital Economy
 
Konceptuelt overblik over Big Data, Flemming Bagger, IBM
Konceptuelt overblik over Big Data, Flemming Bagger, IBMKonceptuelt overblik over Big Data, Flemming Bagger, IBM
Konceptuelt overblik over Big Data, Flemming Bagger, IBM
 
Data Science Courses - BigData VS Data Science
Data Science Courses - BigData VS Data ScienceData Science Courses - BigData VS Data Science
Data Science Courses - BigData VS Data Science
 
KMWorld Presentation
KMWorld PresentationKMWorld Presentation
KMWorld Presentation
 
ٍSmart Government Circle of Attention
ٍSmart Government Circle of AttentionٍSmart Government Circle of Attention
ٍSmart Government Circle of Attention
 
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
 
Trends and Development in Government Sector: Building e-Government Backbone
Trends and Development in Government Sector: Building e-Government BackboneTrends and Development in Government Sector: Building e-Government Backbone
Trends and Development in Government Sector: Building e-Government Backbone
 
The Development of a Federal Digital Identity
The Development of a Federal Digital IdentityThe Development of a Federal Digital Identity
The Development of a Federal Digital Identity
 
Identity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudIdentity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the Cloud
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analytics
 
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
 
The Development of a National Identity Management System to Support National ...
The Development of a National Identity Management System to Support National ...The Development of a National Identity Management System to Support National ...
The Development of a National Identity Management System to Support National ...
 
An Innovative Framework for e Government Transformation
An Innovative Framework for e Government TransformationAn Innovative Framework for e Government Transformation
An Innovative Framework for e Government Transformation
 
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoSmarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
 
OWF12/Java Michael hirt
OWF12/Java Michael hirtOWF12/Java Michael hirt
OWF12/Java Michael hirt
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
 
Smart & Safer Cities by Richard Knight
Smart & Safer Cities by Richard KnightSmart & Safer Cities by Richard Knight
Smart & Safer Cities by Richard Knight
 

More from Arab Federation for Digital Economy

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربيةArab Federation for Digital Economy
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةArab Federation for Digital Economy
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Arab Federation for Digital Economy
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتArab Federation for Digital Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةArab Federation for Digital Economy
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيArab Federation for Digital Economy
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionArab Federation for Digital Economy
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةArab Federation for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟Arab Federation for Digital Economy
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...Arab Federation for Digital Economy
 

More from Arab Federation for Digital Economy (20)

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
 
Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19
 
سلطة العقل
سلطة العقلسلطة العقل
سلطة العقل
 
الحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارساتالحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارسات
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
 
Digital economy and national security
Digital economy and national securityDigital economy and national security
Digital economy and national security
 
New World Economy
New World EconomyNew World Economy
New World Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئة
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
 
Digital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital TransformationDigital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital Transformation
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
 
Conflicts in Organisations
Conflicts in OrganisationsConflicts in Organisations
Conflicts in Organisations
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Partners in Building UAE's Security & Economy Through Privacy in the Age of Big Data

  • 1. Partners in Building UAE's Security & Economy Privacy in the Age of Big Data © 2013 Emirates Identity Authority. All rights reserved Presented by Dr. Ali M. Al-Khouri www.emiratesid.ae In: Big Data Systems, Applications and Privacy Conference – Organised by New York University, Abu Dhabi, UAE. 10 – 11 March 2013 | Injazat Data Systems | Abu Dhabi | UAE Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE
  • 2. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 3. Agenda • Introduction: The Age of Big Data • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 4. Big Data in Digital World ? • The proliferation of modern technologies, smart devices and Climate Change popularity of social networking is generating unprecedented amounts of data, both structured and unstructured, whether it be text, audio or video. • Data has become ubiquitous in this digital world. • Sheer amount of bytes that we generate daily is indeed mind boggling! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 5. The Age of Big Data ? every day, we create 2.5 quintillion bytes of data .. This data is big data 90% of the data in the world today has been created Climate Change in the last two years. IBM Report We are truly in a digital explosion era! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 6. Data Growth 112 Zettabytes all computer hard drives in the world = 160 exabytes in 2006 all storage systems didn’t reach one zettabyte of information in 2012! 295 Global Growth of Digital Storage Capacity 1986-2021 By 2020, 112 Zettabytes of data (75% growth rate) One Zettabyte = 1,000,000,000,000,000,000,000 byte, or 1000 exabytes Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 7. Big Data ? • is generated from practically every where: - Social media sites (facebook, twitter, linked-in..) - digital pictures and videos, - e-mails, - purchase transaction records, Climate Change - cell phone, GPS signals, - geo-stationary satellites, - meteorological sensors - to name a few. • This continues to grow at an exponential rate. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 8. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 9. Big Data characteristics? • Big Data has come to be characterized by the Volume, Velocity and Variety of Data that is generated. • These constitute the 3Vs of Big Data. TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 10. 3Vs of Big Data ? Velocity Volume provides the provides the time at which amount of data the data is and the form of collected and data analyzed Variety provides the type of data collected TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 11. 4th ‘V’ of Big Data ? • However, there is the fourth dimension - a fourth V- Veracity which encompasses the 3Vs! • Veracity provides the confidence in the truthfulness of the data. TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 12. Personal ID and Big Data ? Veracity of Data itself can be depicted using three dimensions: 1. Veracity of Data is established by how the data itself is enabled- 2. Veracity of Data which stands for the is established by the source of data. means and methods of analysis- providing Identity discernible information 3. Veracity of Data is then characterized by Personal Identity Management. This is the critical dimension of Big Data Veracity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 13. Big Data ? • is not a new or unknown phenomenon. • Big Data as Volume Data has been used in Clinical Trials since long, resulting in many a ground breaking medicines. • Big Data as Volume Data has been in existence in DNA mapping and Genetics leading to many life-saving healthcare procedures. • While the Healthcare industry has been the initiator of big data analysis, retailers and marketing organizations have now started to make use of Big Data to further their commercial activities. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 14. Web Analytics • Numerous web analytics companies have now made it their business to collect all this trail and construct meaningful data from this huge data. • Billions of posts in social networks, blogs, commerce sites, e-mails, text messages, utility payments are being “piggy-backed” to result in patterns of the digital interactions and individual behavior patterns then constructed from here. • This is brilliant from a marketing point of view! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 15. Privacy ? But, from a privacy perspective, this could be construed as a blatant violation of individual privacy. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 16. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 17. Personal ID and Digital Behaviour ? • as individuals, we Interact, we Transact, we Collaborate, we Communicate on a daily basis • .. which is sought to be analyzed for bringing commercial entities closer to the psyche of the individual (knowing customers – personalising services and products). Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 18. Personal ID and Digital Behaviour ? Big Data as in information and datasets have started to be cultivated based on the digital data we leave in our transactions. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 19. Digital Behaviour and Data Sets ? • We live in the digital world and are ubiquitously connected. • The Phone is no longer a calling device. • Our laptops, Tablets, Phablets and Phones keep us constantly engaged. • Every interaction leaves a huge trail of data leaving behind bits and pieces of us with pointers to our real behaviour. • This raises then many issues governing privacy.. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 20. Digital Behaviour and Data Sets ? • It is understood that collection of information from digital transactions and interactions is something that is unstoppable. • Whether we like it or not, the amount of digital trail we leave behind in the e-world is amazingly large. • This digital trail when analyzed is almost like a signature that we leave behind, making it very easy for analysts to identify us as individuals in the purported anonymity of the web. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 21. Anonymity ? • The West, particularly the USA and the EU have made conscious moves to protect individual privacy from being abused with legal provisions. • Anonymity has been the key consideration on which the legal provisions have been made so far. • However, it has been proved beyond any reasonable doubt that anonymity is not guaranteed even when personal identifiers are removed from the data sets for analysis. • Even IP Addresses that relate to machines have been cracked to relate them to personal users. • So, where does this leave an individual with respect to his/ her privacy? Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 22. Big Data and Privacy ? Data can be either useful or perfectly anonymous but never both. PAUL OHM Associate Professor of Law University of Colorado Law School How True?! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 23. Google Saying ? .. while anonymized information will always carry some risk of re- identification . . . . many of the most pressing privacy risks . . . exist only if there is certainty in re-identification, that is if the information can be authenticated. As uncertainty is introduced into the re-identification equation, we cannot know that the information truly corresponds to a particular individual; it becomes more anonymous as larger amounts of uncertainty are introduced. Betsy Masiello Alma Whitten Global Public Policy at Google Privacy for Product and Engineering at Google Betsy Masiello, Alma Whitten: Engineering Privacy in an Age of Information Abundance. AAAI Spring Symposium: Intelligent Information Privacy Management 2010 Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 24. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 25. National ID for Big Data Analysis • an intense role of Government Issued Personal Identity as a Unique National ID. • this will be extremely critical in Big Data and Big Data Analytics providing the required privacy in anonymity and yet provide meaningful data for analysis. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 26. National ID for Big Data Analysis • A secure ID would encourage users to be engaged more actively and more expansively in the digital world. • It is in this context that the Digital Identity profile provided and packaged in a Secure Smart Card is expected to play a pivotal role. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 27. Personal ID and UAE National ID The Digital Identity provides the perfect PROXY for the personal identity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 28. Personal ID and UAE National ID The individuals would be known and authenticated as genuine persons by the National Identity Authority providing a THIRD PARTY authentication for the identity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 29. Personal ID and UAE National ID Thus, service providers can identify the potential service seeker securely from the authentication provided by the Emirates ID Authority. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 30. Personal ID and UAE National ID An individual will then be able to transact and interact freely without compromising his/her personal identity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 31. National ID for Big Data Analysis • The UAE National ID Card is designed to provide multi factor authentication. • At the core of the Digital ID is the Unique Identity Number issued by the Emirates ID Authority. • With this ID is associated with the Digital Identity Profile consisting of Biometric Data- Fingerprints and ICAO compliant photograph, and Digital Certificates issued for Identification and Signatures issued as a Secure Smart Card. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 32. Personal ID and UAE National ID • Apart from the classical ID verification and authentication methods, projects are underway to upgrade the features to provide OTP (One-time-password) as per OATH Standards. • The ID card is a combi-card to work with contactless readers. • Projects are underway to develop the NFC enabled authentication methods using the GSM mobile phones and other mobile devices. • Each of the Digital ID profile components provides the ability for the user to be verified and further authenticated for access. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 33. Protection of Individual Privacy • The Emirates ID Authority provides the necessary credential verification on the web. • The National ID Card could be used only with the Digital Credentials on the web transactions. • Emirates ID Authority does not share the personal information but provides only credential verification Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 34. Protection of Individual Privacy • Service Providers are accorded with Verification and Authentication Services enabling secure remote transactions. • Service Seekers remain anonymous on the web since only Digital Certificates or Biometrics would be used to establish credential verification. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 35. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 36. Concluding remarks • Big Data should be viewed to be about building Knowledge to support social, environmental, and economical development. • i.e., to improve efficiency, speed & accuracy of decisions, ability to forecast, cut costs, save energy, improve services, optimise infrastructure, enhance citizens quality of life, reduce environmental footprints, fuel innovation and diverse sustainable economic growth. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 37. Concluding remarks • Complexity will remain an issue! • Successfully exploiting the value in big data requires experimentation and exploration. • Private sector will still lead the game, as Big Data will be viewed as a source of competition and growth. • Public sector will need to take Big Data more seriously, and put in place data-strategies to create new waves of productivity growth. • Main challenge: shortage of skills [USA by 2018 will face shortage of around 2 million managers and analysts with know-how to create and use big data to make effective decisions]. • Need to address policies related to privacy, security, etc. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 38. UAE National ID and Privacy • All data should be treated as personally identifiable and subjected to the regulatory framework. • UAE (Emirates ID Authority) would provide this regulatory framework to ensure identity protection. • Technical and Technology Solutions are already in place to support the regulatory and legal framework. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 39. More Information: Read our recent research from: http://www.emiratesid.gov.ae/ar/media-center/publications.aspx Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 40. You can use all the quantitative data you can get, but you still have to distrust it and use your own intelligence and judgment. [Alvin Toffler] Dr. Ail M. Al-Khouri Director General | Emirates Identity Authority | United Arab Emirates | ali.alkhouri@emiratesid.ae | www.emiratesid.ae Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved