SlideShare a Scribd company logo
1 of 16
Semantic Monitoring of Personal Web Activity to Support the Management of Trust and Privacy Mathieu d'Aquin, SalmanElahi, Enrico Motta Knowledge Media Institute, The Open University, UK
Stating the obvious Personal information exchange on the Web is  Big Heterogeneous Distributed Fragmented Sometimes implicit
Challenges to individuals Lack of control over personal information In sum, we don’t know the most important things about our personal data What are all the websites that know my e-mail address? What does amazon.co.uk or the website of my favorite airline know about me?
Why this is important Because these things are useful to know in general Because these things can tell us a lot about our own behavior, our attitudes towards information sharing and exchange Because this behavior has strong implications in terms of privacy and defines our trust relationships with website online
So, what do we do? Unrestricted monitoring of information exchange on the Web by an individual user Building a semantically represented and processable datasets of what was shared and with who Analyze these datasets in terms of building models of the user’s behavior related to privacy,  levels of trust given to websites  levels criticality associated to different pieces of data
Local Logging Proxy HTTP Requests HTTP Requests Local Web Agents  (e.g., browser) External Web Sites HTTP Responses HTTP Responses Web Exchange  RDF Logs Interaction Patterns Personal Information  HTTP Ontology
<Request rdf:about="#request-1257949232709-1257949233757">    <startedAt>1257949232709</startedAt>    <endedAt>1257949233757</endedAt>    <origin rdf:resource="127.0.0.1" />    <onPort>80</onPort>    <toHostrdf:resource="api.facebook.com" />    <method rdf:resource="POST"/>    <toURLrdf:resource="http://api.facebook.com/restserver.php" />    <HTTPVersionrdf:resource="HTTP-1.1" />    <Host rdf:resource="api.facebook.com" />    <Content-Type rdf:resource="application--x-www-form-urlencoded" />    <User-Agent rdf:resource="Mozilla--5.0_(Macintosh;_U;_Intel_Mac_OS_X;_en)_App leWebKit--526.9+_(KHTML._like_Gecko)_AdobeAIR--1.5.2" />    <Refererrdf:resource="app:--TweetDeck.swf" />    <X-Flash-Version rdf:resource="10.0.32.18" />    <Accept rdf:resource="*--*" />    <Accept-Language rdf:resource="en-us" />    <Accept-Encoding rdf:resource="gzip._deflate" />    <Cookie rdf:resource= "__qca=1239783354-42963995-12118014;___utma=87286159.357 565716.1239892196.1252686326.1257582307.16;___utmz=87286159.1257582307.16.16.utm ccn= (referral)|utmcsr=facebook.com|utmcct=--tos.php|utmcmd=referral;_c_user=6055 59235;_cur_max_lag=2;_datr=1239398136-0711bf1215821a9c58848bf0ffd0020ec8450cfa71 54b9e228c29;_lsd=P3Zpn;_lxe=metm.daquin%40virgin.net;_lxs=3;_s_vsn_facebookpoc_1 =9874874320812" />    <Content-Length rdf:resource="984" />    <Connection rdf:resource="keep-alive" />    <Proxy-Connection rdf:resource="keep-alive" />    <data rdf:resource="data_c22b691f691dabd5ae893b9cb2f8add7" />    <response>       <Response rdf:about="#response-1257949232709--1257949233757">       <HTTPVersionrdf:resource="HTTP--1.0" />       <responseCoderdf:resource="200_OK" />       <Cache-Control rdf:resource="private._no-store._no-cache._must-revalidate. _post-check=0._pre-check=0" />       <Content-Type rdf:resource="application--json" />       <Expires rdf:resource="Mon._26_Jul_1997_05:00:00_GMT" />      <Pragmardf:resource="no-cache" />       <Content-Encoding rdf:resource="gzip" />       <Content-Length rdf:resource="5943" />       <X-Cache rdf:resource="MISS_from_roeburn.open.ac.uk" />       <Proxy-Connection rdf:resource="keep-alive" />       <data rdf:resource="data_5ccf6054fd0fba3ee7eb444e178eaf19" />    </Response></response> </Request> Ran over a period of 2.5 months yielded around 100 Million triples, representing about 3 Million HTTP requests.  Encodes all the info related to HTTP requests and responses. Data sent and received stored separately.
Basic analytics
Focusing on personal data exchange Extract information sent through parameters of HTTP Requests http://uk.search.yahoo.com/beacon/module?p=idiocracy&url=http%3A%2F%2Fwww.imdb.com%2Ftitle%2Ftt0387808%2F format=JSON&method=fql%2Emultiquery&api%5Fkey=51d350e8d92da1f5623512a9e801da2b&v =1%2E0&queries=%7B%22query2%22%3A%22SELECT%20app%5Fid%2C%20display%5Fname%20FROM %20application%20WHERE%20app%5Fid%20IN%20%28SELECT%20app%5Fid%20FROM%20%23query1 %29%22%2C%22query1%22%3A%22SELECT%20post%5Fid%2C%20source%5Fid%2C%20created%5Fti me%2C%20updated%5Ftime%2C%20actor%5Fid%2C%20target%5Fid%2C%20app%5Fid%2C%20messa ge%2C%20attachment%2C%20comments%2C%20likes%2C%20permalink%2C%20attribution%2C%2 0type%20FROM%20stream%20WHERE%20filter%5Fkey%20IN%20%28SELECT%20filter%5Fkey%20F ROM%20stream%5Ffilter%20WHERE%20uid%20%3D%20605559235%20AND%20type%20%3D%20%27ne wsfeed%27%29%20AND%20%28created%5Ftime%20%3E%3D%201257443596%29%20AND%20%28%28cr eated%5Ftime%20%3E%201257945423%29%20OR%20%28updated%5Ftime%20%21%3D%20created%5 Ftime%29%29%20ORDER%20BY%20created%5Ftime%20DESC%20LIMIT%20200%22%7D&call%5Fid=1 2565739074246102&sig=01a13a72825ed83ed6d23bdf2791ad1a&session%5Fkey=be312ffdf9b9 e1a5ec6c5768%2D605559235 Map this data onto a representation of a user profile (set of attributes of personal data)
Tool used to create mappings between data sent to websites (from logs on the right) with the user profile (left). Effectively reconstructing the profile  from the data
What this tells us about Trust and Criticality of data 36 attributes, 1,080 values, to 123 domains A model of what piece of personal information was sent where (can answer the questions)  Taking the point of view of an external observer, we can derive an observed model of trust and criticality of data If this piece of data is critical to you and you give it to bob, you must trust bob If you give this piece of data to many untrusted people, you probably don’t consider it critical The goal being to help the user to better understand his own behavior
The model formally Trust in a domain =  max of criticality of data it received Criticality of a piece of data=  1 / 1 + Σ (1- trust in websites  that received the data) Obviously, these 2 formulas are interdependent. Treating them as a sequence, with initial values at 0.5
Interacting with the model Expose the user to his own observed behavior has observed, so that he can try to align it to his intended behavior
What we can do with this Help a user understand his own data exchange Compare websites and data in terms of the observed trust and criticality “Correct” the model by re-aligning it with the intended behavior Detect fundamental conflicts between the observed behavior and the intended behavior Observe correlations in the data
Where that leads us 1 first tools exploiting logs of personal Web activity  Demonstrate the need for better ways to personal information management as personal Web data exchange  Need to exploit and integrate local and external sources of data together to create new mechanisms supporting individuals in interpreting, understating and managing their information online
Thank you m.daquin@open.ac.uk @mdaquin

More Related Content

Viewers also liked

Linux常用命令与工具简介
Linux常用命令与工具简介Linux常用命令与工具简介
Linux常用命令与工具简介weihe
 
Putting Intelligence in Open Data - With examples in education
Putting Intelligence in Open Data - With examples in educationPutting Intelligence in Open Data - With examples in education
Putting Intelligence in Open Data - With examples in educationMathieu d'Aquin
 
Issues in Learning an Ontology from Text
Issues in Learning an Ontology from Text Issues in Learning an Ontology from Text
Issues in Learning an Ontology from Text robertstevens65
 
Lessons from teaching non-computer scientists OWL and ontologies
Lessons from teaching non-computer scientists OWL and ontologiesLessons from teaching non-computer scientists OWL and ontologies
Lessons from teaching non-computer scientists OWL and ontologiesrobertstevens65
 
Visualizing Consensus with Online Ontologies to Support Quality in Ontology D...
Visualizing Consensus with Online Ontologies to Support Quality in Ontology D...Visualizing Consensus with Online Ontologies to Support Quality in Ontology D...
Visualizing Consensus with Online Ontologies to Support Quality in Ontology D...Mathieu d'Aquin
 

Viewers also liked (6)

Linux常用命令与工具简介
Linux常用命令与工具简介Linux常用命令与工具简介
Linux常用命令与工具简介
 
Putting Intelligence in Open Data - With examples in education
Putting Intelligence in Open Data - With examples in educationPutting Intelligence in Open Data - With examples in education
Putting Intelligence in Open Data - With examples in education
 
Issues in Learning an Ontology from Text
Issues in Learning an Ontology from Text Issues in Learning an Ontology from Text
Issues in Learning an Ontology from Text
 
Lessons from teaching non-computer scientists OWL and ontologies
Lessons from teaching non-computer scientists OWL and ontologiesLessons from teaching non-computer scientists OWL and ontologies
Lessons from teaching non-computer scientists OWL and ontologies
 
Visualizing Consensus with Online Ontologies to Support Quality in Ontology D...
Visualizing Consensus with Online Ontologies to Support Quality in Ontology D...Visualizing Consensus with Online Ontologies to Support Quality in Ontology D...
Visualizing Consensus with Online Ontologies to Support Quality in Ontology D...
 
Using The Semantic Web
Using The Semantic WebUsing The Semantic Web
Using The Semantic Web
 

Similar to Semantic Monitoring of Personal Web Activity to Support the Management of Trust and Privacy

Mla Format For Essays Telegraph. Online assignment writing service.
Mla Format For Essays  Telegraph. Online assignment writing service.Mla Format For Essays  Telegraph. Online assignment writing service.
Mla Format For Essays Telegraph. Online assignment writing service.Ashley Smith
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Jesus Rances
 
Graph Data Science Training - Alicia Frame Presentation
Graph Data Science Training - Alicia Frame PresentationGraph Data Science Training - Alicia Frame Presentation
Graph Data Science Training - Alicia Frame PresentationNeo4j
 
Enhancing the Privacy Protection of the User Personalized Web Search Using RDF
Enhancing the Privacy Protection of the User Personalized Web Search Using RDFEnhancing the Privacy Protection of the User Personalized Web Search Using RDF
Enhancing the Privacy Protection of the User Personalized Web Search Using RDFIJTET Journal
 
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYTRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYaciijournal
 
Trust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A SurveyTrust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A Surveyaciijournal
 
What IA, UX and SEO Can Learn from Each Other
What IA, UX and SEO Can Learn from Each OtherWhat IA, UX and SEO Can Learn from Each Other
What IA, UX and SEO Can Learn from Each OtherIan Lurie
 
Forum Oxford April 2009
Forum Oxford April 2009Forum Oxford April 2009
Forum Oxford April 2009Tony Fish
 
Research Report on Document Indexing-Nithish Kumar
Research Report on Document Indexing-Nithish KumarResearch Report on Document Indexing-Nithish Kumar
Research Report on Document Indexing-Nithish KumarNithish Kumar
 
Research report nithish
Research report nithishResearch report nithish
Research report nithishNithish Kumar
 
How To Write The Conclusion Of A. Online assignment writing service.
How To Write The Conclusion Of A. Online assignment writing service.How To Write The Conclusion Of A. Online assignment writing service.
How To Write The Conclusion Of A. Online assignment writing service.Peggy Johnson
 
Amazon Kindle Paperwhite 4G Vs 2017 3G Model A Look At WhatS New
Amazon Kindle Paperwhite 4G Vs 2017 3G Model A Look At WhatS NewAmazon Kindle Paperwhite 4G Vs 2017 3G Model A Look At WhatS New
Amazon Kindle Paperwhite 4G Vs 2017 3G Model A Look At WhatS NewCatherine Aguirre
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival GuideDruva
 
True Single Customer View
True Single Customer View True Single Customer View
True Single Customer View Veer Endra
 
Big data introduction
Big data introductionBig data introduction
Big data introductionvikas samant
 
Team of Rivals: UX, SEO, Content & Dev UXDC 2015
Team of Rivals: UX, SEO, Content & Dev  UXDC 2015Team of Rivals: UX, SEO, Content & Dev  UXDC 2015
Team of Rivals: UX, SEO, Content & Dev UXDC 2015Marianne Sweeny
 
apidays LIVE Paris 2021 - Make data portability a reality by François-Xavier ...
apidays LIVE Paris 2021 - Make data portability a reality by François-Xavier ...apidays LIVE Paris 2021 - Make data portability a reality by François-Xavier ...
apidays LIVE Paris 2021 - Make data portability a reality by François-Xavier ...apidays
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 

Similar to Semantic Monitoring of Personal Web Activity to Support the Management of Trust and Privacy (20)

Mla Format For Essays Telegraph. Online assignment writing service.
Mla Format For Essays  Telegraph. Online assignment writing service.Mla Format For Essays  Telegraph. Online assignment writing service.
Mla Format For Essays Telegraph. Online assignment writing service.
 
Empowerment Technologies - Module 3
Empowerment Technologies - Module 3Empowerment Technologies - Module 3
Empowerment Technologies - Module 3
 
Graph Data Science Training - Alicia Frame Presentation
Graph Data Science Training - Alicia Frame PresentationGraph Data Science Training - Alicia Frame Presentation
Graph Data Science Training - Alicia Frame Presentation
 
Enhancing the Privacy Protection of the User Personalized Web Search Using RDF
Enhancing the Privacy Protection of the User Personalized Web Search Using RDFEnhancing the Privacy Protection of the User Personalized Web Search Using RDF
Enhancing the Privacy Protection of the User Personalized Web Search Using RDF
 
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYTRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
 
Trust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A SurveyTrust Metrics In Recommender System : A Survey
Trust Metrics In Recommender System : A Survey
 
What IA, UX and SEO Can Learn from Each Other
What IA, UX and SEO Can Learn from Each OtherWhat IA, UX and SEO Can Learn from Each Other
What IA, UX and SEO Can Learn from Each Other
 
Forum Oxford April 2009
Forum Oxford April 2009Forum Oxford April 2009
Forum Oxford April 2009
 
Research Report on Document Indexing-Nithish Kumar
Research Report on Document Indexing-Nithish KumarResearch Report on Document Indexing-Nithish Kumar
Research Report on Document Indexing-Nithish Kumar
 
Research report nithish
Research report nithishResearch report nithish
Research report nithish
 
How To Write The Conclusion Of A. Online assignment writing service.
How To Write The Conclusion Of A. Online assignment writing service.How To Write The Conclusion Of A. Online assignment writing service.
How To Write The Conclusion Of A. Online assignment writing service.
 
open data for enterprises
open data for enterprisesopen data for enterprises
open data for enterprises
 
Amazon Kindle Paperwhite 4G Vs 2017 3G Model A Look At WhatS New
Amazon Kindle Paperwhite 4G Vs 2017 3G Model A Look At WhatS NewAmazon Kindle Paperwhite 4G Vs 2017 3G Model A Look At WhatS New
Amazon Kindle Paperwhite 4G Vs 2017 3G Model A Look At WhatS New
 
Data in the Wild: Survival Guide
Data in the Wild: Survival GuideData in the Wild: Survival Guide
Data in the Wild: Survival Guide
 
True Single Customer View
True Single Customer View True Single Customer View
True Single Customer View
 
Big data introduction
Big data introductionBig data introduction
Big data introduction
 
Introduction abstract
Introduction abstractIntroduction abstract
Introduction abstract
 
Team of Rivals: UX, SEO, Content & Dev UXDC 2015
Team of Rivals: UX, SEO, Content & Dev  UXDC 2015Team of Rivals: UX, SEO, Content & Dev  UXDC 2015
Team of Rivals: UX, SEO, Content & Dev UXDC 2015
 
apidays LIVE Paris 2021 - Make data portability a reality by François-Xavier ...
apidays LIVE Paris 2021 - Make data portability a reality by François-Xavier ...apidays LIVE Paris 2021 - Make data portability a reality by François-Xavier ...
apidays LIVE Paris 2021 - Make data portability a reality by François-Xavier ...
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 

More from Mathieu d'Aquin

A factorial study of neural network learning from differences for regression
A factorial study of neural network learning from  differences for regressionA factorial study of neural network learning from  differences for regression
A factorial study of neural network learning from differences for regressionMathieu d'Aquin
 
Recentrer l'intelligence artificielle sur les connaissances
Recentrer l'intelligence artificielle sur les connaissancesRecentrer l'intelligence artificielle sur les connaissances
Recentrer l'intelligence artificielle sur les connaissancesMathieu d'Aquin
 
Data and Knowledge as Commodities
Data and Knowledge as CommoditiesData and Knowledge as Commodities
Data and Knowledge as CommoditiesMathieu d'Aquin
 
Unsupervised learning approach for identifying sub-genres in music scores
Unsupervised learning approach for identifying sub-genres in music scoresUnsupervised learning approach for identifying sub-genres in music scores
Unsupervised learning approach for identifying sub-genres in music scoresMathieu d'Aquin
 
Is knowledge engineering still relevant?
Is knowledge engineering still relevant?Is knowledge engineering still relevant?
Is knowledge engineering still relevant?Mathieu d'Aquin
 
A data view of the data science process
A data view of the data science processA data view of the data science process
A data view of the data science processMathieu d'Aquin
 
Dealing with Open Domain Data
Dealing with Open Domain DataDealing with Open Domain Data
Dealing with Open Domain DataMathieu d'Aquin
 
Web Analytics for Everyday Learning
Web Analytics for  Everyday LearningWeb Analytics for  Everyday Learning
Web Analytics for Everyday LearningMathieu d'Aquin
 
Presentation a in ovive montpellier - 26%2 f06%2f2018 (1)
Presentation a in ovive   montpellier - 26%2 f06%2f2018 (1)Presentation a in ovive   montpellier - 26%2 f06%2f2018 (1)
Presentation a in ovive montpellier - 26%2 f06%2f2018 (1)Mathieu d'Aquin
 
Learning Analytics: understand learning and support the learner
Learning Analytics: understand learning and support the learnerLearning Analytics: understand learning and support the learner
Learning Analytics: understand learning and support the learnerMathieu d'Aquin
 
Assessing the Readability of Policy Documents: The Case of Terms of Use of On...
Assessing the Readability of Policy Documents: The Case of Terms of Use of On...Assessing the Readability of Policy Documents: The Case of Terms of Use of On...
Assessing the Readability of Policy Documents: The Case of Terms of Use of On...Mathieu d'Aquin
 
Data for Learning and Learning with Data
Data for Learning and Learning with DataData for Learning and Learning with Data
Data for Learning and Learning with DataMathieu d'Aquin
 
Towards an “Ethics in Design” methodology for AI research projects
Towards an “Ethics in Design” methodology  for AI research projects Towards an “Ethics in Design” methodology  for AI research projects
Towards an “Ethics in Design” methodology for AI research projects Mathieu d'Aquin
 
AFEL: Towards Measuring Online Activities Contributions to Self-Directed Lear...
AFEL: Towards Measuring Online Activities Contributions to Self-Directed Lear...AFEL: Towards Measuring Online Activities Contributions to Self-Directed Lear...
AFEL: Towards Measuring Online Activities Contributions to Self-Directed Lear...Mathieu d'Aquin
 
Profiling information sources and services for discovery
Profiling information sources and services for discoveryProfiling information sources and services for discovery
Profiling information sources and services for discoveryMathieu d'Aquin
 
Analyse de données et de réseaux sociaux pour l’aide à l’apprentissage infor...
Analyse de données et de réseaux sociaux pour  l’aide à l’apprentissage infor...Analyse de données et de réseaux sociaux pour  l’aide à l’apprentissage infor...
Analyse de données et de réseaux sociaux pour l’aide à l’apprentissage infor...Mathieu d'Aquin
 
From Knowledge Bases to Knowledge Infrastructures for Intelligent Systems
From Knowledge Bases to Knowledge Infrastructures for Intelligent SystemsFrom Knowledge Bases to Knowledge Infrastructures for Intelligent Systems
From Knowledge Bases to Knowledge Infrastructures for Intelligent SystemsMathieu d'Aquin
 
Data analytics beyond data processing and how it affects Industry 4.0
Data analytics beyond data processing and how it affects Industry 4.0Data analytics beyond data processing and how it affects Industry 4.0
Data analytics beyond data processing and how it affects Industry 4.0Mathieu d'Aquin
 

More from Mathieu d'Aquin (20)

A factorial study of neural network learning from differences for regression
A factorial study of neural network learning from  differences for regressionA factorial study of neural network learning from  differences for regression
A factorial study of neural network learning from differences for regression
 
Recentrer l'intelligence artificielle sur les connaissances
Recentrer l'intelligence artificielle sur les connaissancesRecentrer l'intelligence artificielle sur les connaissances
Recentrer l'intelligence artificielle sur les connaissances
 
Data and Knowledge as Commodities
Data and Knowledge as CommoditiesData and Knowledge as Commodities
Data and Knowledge as Commodities
 
Unsupervised learning approach for identifying sub-genres in music scores
Unsupervised learning approach for identifying sub-genres in music scoresUnsupervised learning approach for identifying sub-genres in music scores
Unsupervised learning approach for identifying sub-genres in music scores
 
Is knowledge engineering still relevant?
Is knowledge engineering still relevant?Is knowledge engineering still relevant?
Is knowledge engineering still relevant?
 
A data view of the data science process
A data view of the data science processA data view of the data science process
A data view of the data science process
 
Dealing with Open Domain Data
Dealing with Open Domain DataDealing with Open Domain Data
Dealing with Open Domain Data
 
Web Analytics for Everyday Learning
Web Analytics for  Everyday LearningWeb Analytics for  Everyday Learning
Web Analytics for Everyday Learning
 
Presentation a in ovive montpellier - 26%2 f06%2f2018 (1)
Presentation a in ovive   montpellier - 26%2 f06%2f2018 (1)Presentation a in ovive   montpellier - 26%2 f06%2f2018 (1)
Presentation a in ovive montpellier - 26%2 f06%2f2018 (1)
 
Learning Analytics: understand learning and support the learner
Learning Analytics: understand learning and support the learnerLearning Analytics: understand learning and support the learner
Learning Analytics: understand learning and support the learner
 
The AFEL Project
The AFEL ProjectThe AFEL Project
The AFEL Project
 
Assessing the Readability of Policy Documents: The Case of Terms of Use of On...
Assessing the Readability of Policy Documents: The Case of Terms of Use of On...Assessing the Readability of Policy Documents: The Case of Terms of Use of On...
Assessing the Readability of Policy Documents: The Case of Terms of Use of On...
 
Data ethics
Data ethicsData ethics
Data ethics
 
Data for Learning and Learning with Data
Data for Learning and Learning with DataData for Learning and Learning with Data
Data for Learning and Learning with Data
 
Towards an “Ethics in Design” methodology for AI research projects
Towards an “Ethics in Design” methodology  for AI research projects Towards an “Ethics in Design” methodology  for AI research projects
Towards an “Ethics in Design” methodology for AI research projects
 
AFEL: Towards Measuring Online Activities Contributions to Self-Directed Lear...
AFEL: Towards Measuring Online Activities Contributions to Self-Directed Lear...AFEL: Towards Measuring Online Activities Contributions to Self-Directed Lear...
AFEL: Towards Measuring Online Activities Contributions to Self-Directed Lear...
 
Profiling information sources and services for discovery
Profiling information sources and services for discoveryProfiling information sources and services for discovery
Profiling information sources and services for discovery
 
Analyse de données et de réseaux sociaux pour l’aide à l’apprentissage infor...
Analyse de données et de réseaux sociaux pour  l’aide à l’apprentissage infor...Analyse de données et de réseaux sociaux pour  l’aide à l’apprentissage infor...
Analyse de données et de réseaux sociaux pour l’aide à l’apprentissage infor...
 
From Knowledge Bases to Knowledge Infrastructures for Intelligent Systems
From Knowledge Bases to Knowledge Infrastructures for Intelligent SystemsFrom Knowledge Bases to Knowledge Infrastructures for Intelligent Systems
From Knowledge Bases to Knowledge Infrastructures for Intelligent Systems
 
Data analytics beyond data processing and how it affects Industry 4.0
Data analytics beyond data processing and how it affects Industry 4.0Data analytics beyond data processing and how it affects Industry 4.0
Data analytics beyond data processing and how it affects Industry 4.0
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Semantic Monitoring of Personal Web Activity to Support the Management of Trust and Privacy

  • 1. Semantic Monitoring of Personal Web Activity to Support the Management of Trust and Privacy Mathieu d'Aquin, SalmanElahi, Enrico Motta Knowledge Media Institute, The Open University, UK
  • 2. Stating the obvious Personal information exchange on the Web is Big Heterogeneous Distributed Fragmented Sometimes implicit
  • 3. Challenges to individuals Lack of control over personal information In sum, we don’t know the most important things about our personal data What are all the websites that know my e-mail address? What does amazon.co.uk or the website of my favorite airline know about me?
  • 4. Why this is important Because these things are useful to know in general Because these things can tell us a lot about our own behavior, our attitudes towards information sharing and exchange Because this behavior has strong implications in terms of privacy and defines our trust relationships with website online
  • 5. So, what do we do? Unrestricted monitoring of information exchange on the Web by an individual user Building a semantically represented and processable datasets of what was shared and with who Analyze these datasets in terms of building models of the user’s behavior related to privacy, levels of trust given to websites levels criticality associated to different pieces of data
  • 6. Local Logging Proxy HTTP Requests HTTP Requests Local Web Agents (e.g., browser) External Web Sites HTTP Responses HTTP Responses Web Exchange RDF Logs Interaction Patterns Personal Information HTTP Ontology
  • 7. <Request rdf:about="#request-1257949232709-1257949233757"> <startedAt>1257949232709</startedAt> <endedAt>1257949233757</endedAt> <origin rdf:resource="127.0.0.1" /> <onPort>80</onPort> <toHostrdf:resource="api.facebook.com" /> <method rdf:resource="POST"/> <toURLrdf:resource="http://api.facebook.com/restserver.php" /> <HTTPVersionrdf:resource="HTTP-1.1" /> <Host rdf:resource="api.facebook.com" /> <Content-Type rdf:resource="application--x-www-form-urlencoded" /> <User-Agent rdf:resource="Mozilla--5.0_(Macintosh;_U;_Intel_Mac_OS_X;_en)_App leWebKit--526.9+_(KHTML._like_Gecko)_AdobeAIR--1.5.2" /> <Refererrdf:resource="app:--TweetDeck.swf" /> <X-Flash-Version rdf:resource="10.0.32.18" /> <Accept rdf:resource="*--*" /> <Accept-Language rdf:resource="en-us" /> <Accept-Encoding rdf:resource="gzip._deflate" /> <Cookie rdf:resource= "__qca=1239783354-42963995-12118014;___utma=87286159.357 565716.1239892196.1252686326.1257582307.16;___utmz=87286159.1257582307.16.16.utm ccn= (referral)|utmcsr=facebook.com|utmcct=--tos.php|utmcmd=referral;_c_user=6055 59235;_cur_max_lag=2;_datr=1239398136-0711bf1215821a9c58848bf0ffd0020ec8450cfa71 54b9e228c29;_lsd=P3Zpn;_lxe=metm.daquin%40virgin.net;_lxs=3;_s_vsn_facebookpoc_1 =9874874320812" /> <Content-Length rdf:resource="984" /> <Connection rdf:resource="keep-alive" /> <Proxy-Connection rdf:resource="keep-alive" /> <data rdf:resource="data_c22b691f691dabd5ae893b9cb2f8add7" /> <response> <Response rdf:about="#response-1257949232709--1257949233757"> <HTTPVersionrdf:resource="HTTP--1.0" /> <responseCoderdf:resource="200_OK" /> <Cache-Control rdf:resource="private._no-store._no-cache._must-revalidate. _post-check=0._pre-check=0" /> <Content-Type rdf:resource="application--json" /> <Expires rdf:resource="Mon._26_Jul_1997_05:00:00_GMT" /> <Pragmardf:resource="no-cache" /> <Content-Encoding rdf:resource="gzip" /> <Content-Length rdf:resource="5943" /> <X-Cache rdf:resource="MISS_from_roeburn.open.ac.uk" /> <Proxy-Connection rdf:resource="keep-alive" /> <data rdf:resource="data_5ccf6054fd0fba3ee7eb444e178eaf19" /> </Response></response> </Request> Ran over a period of 2.5 months yielded around 100 Million triples, representing about 3 Million HTTP requests. Encodes all the info related to HTTP requests and responses. Data sent and received stored separately.
  • 9. Focusing on personal data exchange Extract information sent through parameters of HTTP Requests http://uk.search.yahoo.com/beacon/module?p=idiocracy&url=http%3A%2F%2Fwww.imdb.com%2Ftitle%2Ftt0387808%2F format=JSON&method=fql%2Emultiquery&api%5Fkey=51d350e8d92da1f5623512a9e801da2b&v =1%2E0&queries=%7B%22query2%22%3A%22SELECT%20app%5Fid%2C%20display%5Fname%20FROM %20application%20WHERE%20app%5Fid%20IN%20%28SELECT%20app%5Fid%20FROM%20%23query1 %29%22%2C%22query1%22%3A%22SELECT%20post%5Fid%2C%20source%5Fid%2C%20created%5Fti me%2C%20updated%5Ftime%2C%20actor%5Fid%2C%20target%5Fid%2C%20app%5Fid%2C%20messa ge%2C%20attachment%2C%20comments%2C%20likes%2C%20permalink%2C%20attribution%2C%2 0type%20FROM%20stream%20WHERE%20filter%5Fkey%20IN%20%28SELECT%20filter%5Fkey%20F ROM%20stream%5Ffilter%20WHERE%20uid%20%3D%20605559235%20AND%20type%20%3D%20%27ne wsfeed%27%29%20AND%20%28created%5Ftime%20%3E%3D%201257443596%29%20AND%20%28%28cr eated%5Ftime%20%3E%201257945423%29%20OR%20%28updated%5Ftime%20%21%3D%20created%5 Ftime%29%29%20ORDER%20BY%20created%5Ftime%20DESC%20LIMIT%20200%22%7D&call%5Fid=1 2565739074246102&sig=01a13a72825ed83ed6d23bdf2791ad1a&session%5Fkey=be312ffdf9b9 e1a5ec6c5768%2D605559235 Map this data onto a representation of a user profile (set of attributes of personal data)
  • 10. Tool used to create mappings between data sent to websites (from logs on the right) with the user profile (left). Effectively reconstructing the profile from the data
  • 11. What this tells us about Trust and Criticality of data 36 attributes, 1,080 values, to 123 domains A model of what piece of personal information was sent where (can answer the questions) Taking the point of view of an external observer, we can derive an observed model of trust and criticality of data If this piece of data is critical to you and you give it to bob, you must trust bob If you give this piece of data to many untrusted people, you probably don’t consider it critical The goal being to help the user to better understand his own behavior
  • 12. The model formally Trust in a domain = max of criticality of data it received Criticality of a piece of data= 1 / 1 + Σ (1- trust in websites that received the data) Obviously, these 2 formulas are interdependent. Treating them as a sequence, with initial values at 0.5
  • 13. Interacting with the model Expose the user to his own observed behavior has observed, so that he can try to align it to his intended behavior
  • 14. What we can do with this Help a user understand his own data exchange Compare websites and data in terms of the observed trust and criticality “Correct” the model by re-aligning it with the intended behavior Detect fundamental conflicts between the observed behavior and the intended behavior Observe correlations in the data
  • 15. Where that leads us 1 first tools exploiting logs of personal Web activity Demonstrate the need for better ways to personal information management as personal Web data exchange Need to exploit and integrate local and external sources of data together to create new mechanisms supporting individuals in interpreting, understating and managing their information online