Slides of the paper "A UML Profile for Privacy Enforcement" accepted at the International Workshop on Security for and by
Model-Driven Engineering, and presented on June 25 2018.
Data Analytics and Artificial Intelligence in the era of Digital TransformationJan Wiegelmann
The document discusses how data analytics and artificial intelligence are transforming businesses in the era of digital transformation. It covers the history and evolution of AI from early neural networks to today's deep learning approaches enabled by massive increases in data and computing power. Examples are given of how AI is now exceeding or matching human-level performance in areas like image recognition, medical diagnosis, and speech recognition. The document advocates that businesses leverage AI, data science, and a 360-degree view of customer data to drive personalization, predict customer needs, optimize operations, and gain competitive advantages in their industries.
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...CREST
This presentation reviews privacy concerns for mobile devices and outlines the importance of privacy engineering in ensuring users have safe access to their devices.
Presentation given at the <a href="http://www.law.berkeley.edu/institutes/bclt/events/unblinking/unblink.html">Unblinking Symposium</a>, UC Berkeley, November 4th, 2006.
What are the implications of these "recognition markets" for visual privacy? How should they be regulated? What ethics should govern their use? Should sellers of recognition be made aware of how the images they empower will be used? Who should be held responsible for cases of misrecognition, especially in systems which divide up the task of recognition among multiple parties? How might these systems be exploited or attacked? This presentation discusses the development of recognition markets thus far as well possible developments in the future, and will suggest some guidelines for their ethical design and implementation.
Covers research frontiers in privacy-preserving computation and provides practical strategies for training machine learning & AI models over sensitive data based on the lessons learned from Swoop's work with leading pharmaceutical and automotive companies. Example code in Apache Spark.
Your organization and Big Data: Managing, access, privacy, & security Louise Spiteri
This document summarizes a presentation on big data and how organizations can manage access to, privacy of, and security around big data. It defines big data and discusses the four V's of big data - volume, variety, velocity and veracity. It provides examples of how much data organizations and technology companies generate and collect. It also discusses how organizations can analyze big data through techniques like text analytics, social media analytics, and predictive analytics. Finally, it covers privacy and security considerations for big data, such as compliance with regulations, data governance, access management, anonymization, and potential data breaches.
Your organization and Big Data: Managing access, privacy, and securityLouise Spiteri
This document summarizes a presentation about managing big data in organizations. It defines big data as high-volume, high-velocity, and high-variety information assets that require new processing techniques. The value of big data comes from insights that enable better decision-making. Big data is characterized by the four Vs - volume, velocity, variety, and veracity. The document discusses how organizations can mine and analyze big data through techniques like text analytics, audio analytics, video analytics, social media analytics, and predictive analytics. It also covers privacy and security considerations for big data, noting the need for strong governance to avoid privacy risks with large and diverse datasets.
This paper was presented at the 'Towards a Magna Carta for Data' workshop at the RDS in Dublin, Sept 17th. It discusses how considerations of the ethics of big data consist of much more than the issues of privacy and security that it often gets boiled down to, and argues that the various ethical issues related to big data are multidimensional and contested; vary in nature across domains, and which ethical philosophy is adopted matters to the deliberation over data rights.
This document provides a summary of Jackie Rees' employment history, education, research interests, teaching interests, publications, presentations, student advising, and other professional activities. It shows that Jackie Rees is an Associate Professor of Management and Management Information Systems at Purdue University's Krannert Graduate School of Management, with research interests in information security, machine learning, and data mining. She has numerous publications in top journals and conferences and has advised many PhD students in completing their dissertations.
Data Analytics and Artificial Intelligence in the era of Digital TransformationJan Wiegelmann
The document discusses how data analytics and artificial intelligence are transforming businesses in the era of digital transformation. It covers the history and evolution of AI from early neural networks to today's deep learning approaches enabled by massive increases in data and computing power. Examples are given of how AI is now exceeding or matching human-level performance in areas like image recognition, medical diagnosis, and speech recognition. The document advocates that businesses leverage AI, data science, and a 360-degree view of customer data to drive personalization, predict customer needs, optimize operations, and gain competitive advantages in their industries.
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...CREST
This presentation reviews privacy concerns for mobile devices and outlines the importance of privacy engineering in ensuring users have safe access to their devices.
Presentation given at the <a href="http://www.law.berkeley.edu/institutes/bclt/events/unblinking/unblink.html">Unblinking Symposium</a>, UC Berkeley, November 4th, 2006.
What are the implications of these "recognition markets" for visual privacy? How should they be regulated? What ethics should govern their use? Should sellers of recognition be made aware of how the images they empower will be used? Who should be held responsible for cases of misrecognition, especially in systems which divide up the task of recognition among multiple parties? How might these systems be exploited or attacked? This presentation discusses the development of recognition markets thus far as well possible developments in the future, and will suggest some guidelines for their ethical design and implementation.
Covers research frontiers in privacy-preserving computation and provides practical strategies for training machine learning & AI models over sensitive data based on the lessons learned from Swoop's work with leading pharmaceutical and automotive companies. Example code in Apache Spark.
Your organization and Big Data: Managing, access, privacy, & security Louise Spiteri
This document summarizes a presentation on big data and how organizations can manage access to, privacy of, and security around big data. It defines big data and discusses the four V's of big data - volume, variety, velocity and veracity. It provides examples of how much data organizations and technology companies generate and collect. It also discusses how organizations can analyze big data through techniques like text analytics, social media analytics, and predictive analytics. Finally, it covers privacy and security considerations for big data, such as compliance with regulations, data governance, access management, anonymization, and potential data breaches.
Your organization and Big Data: Managing access, privacy, and securityLouise Spiteri
This document summarizes a presentation about managing big data in organizations. It defines big data as high-volume, high-velocity, and high-variety information assets that require new processing techniques. The value of big data comes from insights that enable better decision-making. Big data is characterized by the four Vs - volume, velocity, variety, and veracity. The document discusses how organizations can mine and analyze big data through techniques like text analytics, audio analytics, video analytics, social media analytics, and predictive analytics. It also covers privacy and security considerations for big data, noting the need for strong governance to avoid privacy risks with large and diverse datasets.
This paper was presented at the 'Towards a Magna Carta for Data' workshop at the RDS in Dublin, Sept 17th. It discusses how considerations of the ethics of big data consist of much more than the issues of privacy and security that it often gets boiled down to, and argues that the various ethical issues related to big data are multidimensional and contested; vary in nature across domains, and which ethical philosophy is adopted matters to the deliberation over data rights.
This document provides a summary of Jackie Rees' employment history, education, research interests, teaching interests, publications, presentations, student advising, and other professional activities. It shows that Jackie Rees is an Associate Professor of Management and Management Information Systems at Purdue University's Krannert Graduate School of Management, with research interests in information security, machine learning, and data mining. She has numerous publications in top journals and conferences and has advised many PhD students in completing their dissertations.
The document discusses reconciling social networking and privacy through location sharing preferences and default settings. It describes how the Locaccino app allows experimenting with privacy preferences and auditing of location sharing. Key findings include people sharing more with friends and advertisers than their strict preferences due to defaults. The document advocates understanding user personas, providing auditing, and suggestions to help users find their comfort level instead of aggressive defaults.
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Krishnaram Kenthapadi
Preserving privacy of users is a key requirement of web-scale data mining applications and systems such as web search, recommender systems, crowdsourced platforms, and analytics applications, and has witnessed a renewed focus in light of recent data breaches and new regulations such as GDPR. In this tutorial, we will first present an overview of privacy breaches over the last two decades and the lessons learned, key regulations and laws, and evolution of privacy techniques leading to differential privacy definition / techniques. Then, we will focus on the application of privacy-preserving data mining techniques in practice, by presenting case studies such as Apple's differential privacy deployment for iOS / macOS, Google's RAPPOR, LinkedIn Salary, and Microsoft's differential privacy deployment for collecting Windows telemetry. We will conclude with open problems and challenges for the data mining / machine learning community, based on our experiences in industry.
Social network analysis was used on a large, political project to better understand information flows. It revealed who the central and influential individuals were, how knowledge spread through formal and informal networks, and differences between core and peripheral members. This informed the development of detailed "ZenAgile personas" capturing user profiles, communication preferences, and social roles to help target communications and ensure all user needs were met. Analyzing the information architecture and social networks in this way helped improve knowledge sharing and minimize unnecessary work.
Ethics and information architecture - The 6th Academics and Practitioners Rou...Sarah Rice
Information architecture is not neutral.
By organizing information for discovery and use, we not only make information accessible but also provide the lens through which people will experience it. Designing information architectures involves making and imposing value choices, which positions the work and study of information architecture in the realm of ethics.
The information architecture community has considered ethics at the micro level, for instance by finding ways to do good in specific interactions. But to what extent have we thought about ethics in the context of our overall profession? When we design IAs do we, as practitioners, surrender our moral authority to someone else? Or do we follow a code?
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanMichael Roytman
This document discusses the need for better security metrics and automation. It argues that attackers currently have better automation capabilities than defenders. The document outlines problems with current vulnerability management practices being too manual. It proposes that better security metrics could help drive more effective automation. The document discusses characteristics of good security metrics and evaluates some existing metrics against those criteria. It emphasizes the need for more objective, automated metrics based on real-world data about breaches and exploits.
Preserving privacy of users is a key requirement of web-scale data mining applications and systems such as web search, recommender systems, crowdsourced platforms, and analytics applications, and has witnessed a renewed focus in light of recent data breaches and new regulations such as GDPR. In this tutorial, we will first present an overview of privacy breaches over the last two decades and the lessons learned, key regulations and laws, and evolution of privacy techniques leading to differential privacy definition / techniques. Then, we will focus on the application of privacy-preserving data mining techniques in practice, by presenting case studies such as Apple's differential privacy deployment for iOS / macOS, Google's RAPPOR, LinkedIn Salary, and Microsoft's differential privacy deployment for collecting Windows telemetry. We will conclude with open problems and challenges for the data mining / machine learning community, based on our experiences in industry.
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...Nele Heise
Keynote talk at the Workshop "Research Ethics for Data and Digital Methods", hosted on November 29, 2016 by the Institute for Cultural Inquiry (ICON) at the University of Utrecht and Data School Utrecht
Managing and publishing sensitive data in the social sciences - Webinar trans...ARDC
Transcript of the 29th March ANDS webinar.
Slides and recording are available from the ANDS website: http://www.ands.org.au/news-and-events/presentations/2017
This document provides an overview of key concepts related to privacy, security, and big data. It discusses how easily private information can be leaked, different types of identifiability, how sensitive information can be if reidentified, and core concepts of privacy and security. It also covers security modeling, proposed privacy principles, challenges of big data, emerging approaches for big data, and the importance of lifecycle evaluation of data collection and use. The document aims to provide framing and guidance around privacy and security issues for big data.
Technology for everyone - AI ethics and BiasMarion Mulder
Slides from my talk at #ToonTechTalks on 27 september 2018
We all see the great potential AI is bringing us. But is it really bringing it to everyone? How are we ensuring under-represented groups are included and vulnerable people are protected? What to do when our technology is unintended biased and discriminating against certain groups. And what if the data and AI is correct, but the by-effect of it is that some groups are put at risk? All questions we need to think about when we are advancing technology for the benefit of humanity.
Sharing what I've learned from my work in diversity, digital and from following great minds in this field such as Joanna Bryson, Virginia Dignum, Rumman Chowdhury, Juriaan van Diggelen, Valerie Frissen, Catelijne Muller, and many more.
This document provides an outline for a lecture on introduction to privacy in computing. It covers definitions of privacy, recognition of the need for privacy protections, threats to privacy, and both technical and legal privacy controls. The technical controls section describes privacy-enhancing technologies for protecting user identities, usee identities, and data confidentiality and integrity. The legal controls section lists topics including different legal perspectives on privacy, international privacy laws, privacy law conflicts between regions, and privacy impact assessments.
This document discusses open-source intelligence (OSINT) and how it can be used for cybersecurity awareness or against individuals. OSINT involves collecting information from public sources and can be used by cybersecurity professionals, but also by threat actors for attacks like identity theft, account takeover, and social engineering. The document provides examples of OSINT tools and techniques that can be used for both ethical purposes like penetration testing or unethical purposes like criminal phishing campaigns.
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
This document provides an overview of data privacy challenges in multi-agent learning systems. It discusses literature on privacy issues in multi-agent systems, including problems related to autonomy, trust, and defining privacy. Key privacy issues for multi-agent systems are identified as information collection, processing, and dissemination by agents. Several proposed abstract architectures aim to address privacy in multi-agent design, but challenges remain regarding trade-offs between privacy and data utility.
Security Concerns With Privacy in Social MediaKenie Moses
This document summarizes research on social media privacy and security concerns. It outlines the purpose of understanding how users can better manage their social media privacy and reduce risks. Research questions ask how users can enable themselves to be better social media users and how to increase awareness of diminishing privacy protections. Results found most users concerned about privacy breaches and security but unaware of privacy settings. The conclusion is that more user-friendly privacy controls and educating users on social media research is recommended.
This document summarizes research on social media privacy and security concerns. It outlines the purpose of understanding how users can better manage their social media privacy and reduce risks. Previous research showed a correlation between increased social media usage and decreased privacy concerns. The current research found that many users are concerned about privacy breaches but unaware of how to change privacy settings. It concludes that more user-friendly privacy controls and educating users on social media risks could help address these issues. It recommends enabling easy to access privacy controls for platforms and researching social media before using it.
Privacy in AI/ML Systems: Practical Challenges and Lessons LearnedKrishnaram Kenthapadi
How do we protect the privacy of users when building large-scale AI based systems? How do we develop machine learning models and systems taking fairness, accuracy, explainability, and transparency into account? Model fairness and explainability and protection of user privacy are considered prerequisites for building trust and adoption of AI systems in high stakes domains. We will first motivate the need for adopting a “fairness, explainability, and privacy by design” approach when developing AI/ML models and systems for different consumer and enterprise applications from the societal, regulatory, customer, end-user, and model developer perspectives. We will then focus on the application of privacy-preserving AI techniques in practice through industry case studies. We will discuss the sociotechnical dimensions and practical challenges, and conclude with the key takeaways and open challenges.
Exploding personal data and a troubled conceptualization of privacy have made informational privacy a recurrent, messy and real problem. Van den Hoven presents a new conceptualization for privacy that is more adequate at addressing these problems.
www.privacyinsocialnetworksites.nl
Your organization and big data: Managing access, privacy, & securityLouise Spiteri
Louise Spiteri gave a presentation on managing big data for organizations. She defined big data as high-volume, high-velocity, and high-variety information that requires new technologies to process and analyze. Spiteri discussed the four V's of big data - volume, variety, velocity, and veracity. She also covered how organizations can analyze big data through techniques like text analytics, audio analytics, video analytics, social media analytics, and predictive analytics. Finally, Spiteri addressed privacy and security considerations for big data, emphasizing the need for information security, data privacy, and principles of choice, consent, collection and use, and retention.
Empathic inclination from digital footprints
Marco Polignano, Pierpaolo Basile, Gaetano Rossiello, Marco de Gemmis and Giovanni Semeraro
University of Bari “Aldo Moro”, Dept. of Computer Science, Italy
On the Analysis of Non-Coding Roles in Open Source DevelopmentJavier Canovas
The document discusses an empirical study of roles in open source software development projects. It finds that while developers contribute code, many open source projects also benefit greatly from non-coding roles like commenters, reviewers, and reactors. The study analyzed over 100 NPM package projects to determine the distribution of roles and how specialized communities are around each role. It was found that commenters have high activity levels and that non-coding roles become more important as projects grow. The diversity of roles in different projects and communities was also analyzed.
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...Javier Canovas
Slides of the presentation for the panel "Applying the principles of knowledge commons governance in practical frameworks for community-driven stewardship of digital resources" at Knowledge Commons Conference 2021
The document discusses reconciling social networking and privacy through location sharing preferences and default settings. It describes how the Locaccino app allows experimenting with privacy preferences and auditing of location sharing. Key findings include people sharing more with friends and advertisers than their strict preferences due to defaults. The document advocates understanding user personas, providing auditing, and suggestions to help users find their comfort level instead of aggressive defaults.
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Krishnaram Kenthapadi
Preserving privacy of users is a key requirement of web-scale data mining applications and systems such as web search, recommender systems, crowdsourced platforms, and analytics applications, and has witnessed a renewed focus in light of recent data breaches and new regulations such as GDPR. In this tutorial, we will first present an overview of privacy breaches over the last two decades and the lessons learned, key regulations and laws, and evolution of privacy techniques leading to differential privacy definition / techniques. Then, we will focus on the application of privacy-preserving data mining techniques in practice, by presenting case studies such as Apple's differential privacy deployment for iOS / macOS, Google's RAPPOR, LinkedIn Salary, and Microsoft's differential privacy deployment for collecting Windows telemetry. We will conclude with open problems and challenges for the data mining / machine learning community, based on our experiences in industry.
Social network analysis was used on a large, political project to better understand information flows. It revealed who the central and influential individuals were, how knowledge spread through formal and informal networks, and differences between core and peripheral members. This informed the development of detailed "ZenAgile personas" capturing user profiles, communication preferences, and social roles to help target communications and ensure all user needs were met. Analyzing the information architecture and social networks in this way helped improve knowledge sharing and minimize unnecessary work.
Ethics and information architecture - The 6th Academics and Practitioners Rou...Sarah Rice
Information architecture is not neutral.
By organizing information for discovery and use, we not only make information accessible but also provide the lens through which people will experience it. Designing information architectures involves making and imposing value choices, which positions the work and study of information architecture in the realm of ethics.
The information architecture community has considered ethics at the micro level, for instance by finding ways to do good in specific interactions. But to what extent have we thought about ethics in the context of our overall profession? When we design IAs do we, as practitioners, surrender our moral authority to someone else? Or do we follow a code?
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanMichael Roytman
This document discusses the need for better security metrics and automation. It argues that attackers currently have better automation capabilities than defenders. The document outlines problems with current vulnerability management practices being too manual. It proposes that better security metrics could help drive more effective automation. The document discusses characteristics of good security metrics and evaluates some existing metrics against those criteria. It emphasizes the need for more objective, automated metrics based on real-world data about breaches and exploits.
Preserving privacy of users is a key requirement of web-scale data mining applications and systems such as web search, recommender systems, crowdsourced platforms, and analytics applications, and has witnessed a renewed focus in light of recent data breaches and new regulations such as GDPR. In this tutorial, we will first present an overview of privacy breaches over the last two decades and the lessons learned, key regulations and laws, and evolution of privacy techniques leading to differential privacy definition / techniques. Then, we will focus on the application of privacy-preserving data mining techniques in practice, by presenting case studies such as Apple's differential privacy deployment for iOS / macOS, Google's RAPPOR, LinkedIn Salary, and Microsoft's differential privacy deployment for collecting Windows telemetry. We will conclude with open problems and challenges for the data mining / machine learning community, based on our experiences in industry.
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...Nele Heise
Keynote talk at the Workshop "Research Ethics for Data and Digital Methods", hosted on November 29, 2016 by the Institute for Cultural Inquiry (ICON) at the University of Utrecht and Data School Utrecht
Managing and publishing sensitive data in the social sciences - Webinar trans...ARDC
Transcript of the 29th March ANDS webinar.
Slides and recording are available from the ANDS website: http://www.ands.org.au/news-and-events/presentations/2017
This document provides an overview of key concepts related to privacy, security, and big data. It discusses how easily private information can be leaked, different types of identifiability, how sensitive information can be if reidentified, and core concepts of privacy and security. It also covers security modeling, proposed privacy principles, challenges of big data, emerging approaches for big data, and the importance of lifecycle evaluation of data collection and use. The document aims to provide framing and guidance around privacy and security issues for big data.
Technology for everyone - AI ethics and BiasMarion Mulder
Slides from my talk at #ToonTechTalks on 27 september 2018
We all see the great potential AI is bringing us. But is it really bringing it to everyone? How are we ensuring under-represented groups are included and vulnerable people are protected? What to do when our technology is unintended biased and discriminating against certain groups. And what if the data and AI is correct, but the by-effect of it is that some groups are put at risk? All questions we need to think about when we are advancing technology for the benefit of humanity.
Sharing what I've learned from my work in diversity, digital and from following great minds in this field such as Joanna Bryson, Virginia Dignum, Rumman Chowdhury, Juriaan van Diggelen, Valerie Frissen, Catelijne Muller, and many more.
This document provides an outline for a lecture on introduction to privacy in computing. It covers definitions of privacy, recognition of the need for privacy protections, threats to privacy, and both technical and legal privacy controls. The technical controls section describes privacy-enhancing technologies for protecting user identities, usee identities, and data confidentiality and integrity. The legal controls section lists topics including different legal perspectives on privacy, international privacy laws, privacy law conflicts between regions, and privacy impact assessments.
This document discusses open-source intelligence (OSINT) and how it can be used for cybersecurity awareness or against individuals. OSINT involves collecting information from public sources and can be used by cybersecurity professionals, but also by threat actors for attacks like identity theft, account takeover, and social engineering. The document provides examples of OSINT tools and techniques that can be used for both ethical purposes like penetration testing or unethical purposes like criminal phishing campaigns.
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
This document provides an overview of data privacy challenges in multi-agent learning systems. It discusses literature on privacy issues in multi-agent systems, including problems related to autonomy, trust, and defining privacy. Key privacy issues for multi-agent systems are identified as information collection, processing, and dissemination by agents. Several proposed abstract architectures aim to address privacy in multi-agent design, but challenges remain regarding trade-offs between privacy and data utility.
Security Concerns With Privacy in Social MediaKenie Moses
This document summarizes research on social media privacy and security concerns. It outlines the purpose of understanding how users can better manage their social media privacy and reduce risks. Research questions ask how users can enable themselves to be better social media users and how to increase awareness of diminishing privacy protections. Results found most users concerned about privacy breaches and security but unaware of privacy settings. The conclusion is that more user-friendly privacy controls and educating users on social media research is recommended.
This document summarizes research on social media privacy and security concerns. It outlines the purpose of understanding how users can better manage their social media privacy and reduce risks. Previous research showed a correlation between increased social media usage and decreased privacy concerns. The current research found that many users are concerned about privacy breaches but unaware of how to change privacy settings. It concludes that more user-friendly privacy controls and educating users on social media risks could help address these issues. It recommends enabling easy to access privacy controls for platforms and researching social media before using it.
Privacy in AI/ML Systems: Practical Challenges and Lessons LearnedKrishnaram Kenthapadi
How do we protect the privacy of users when building large-scale AI based systems? How do we develop machine learning models and systems taking fairness, accuracy, explainability, and transparency into account? Model fairness and explainability and protection of user privacy are considered prerequisites for building trust and adoption of AI systems in high stakes domains. We will first motivate the need for adopting a “fairness, explainability, and privacy by design” approach when developing AI/ML models and systems for different consumer and enterprise applications from the societal, regulatory, customer, end-user, and model developer perspectives. We will then focus on the application of privacy-preserving AI techniques in practice through industry case studies. We will discuss the sociotechnical dimensions and practical challenges, and conclude with the key takeaways and open challenges.
Exploding personal data and a troubled conceptualization of privacy have made informational privacy a recurrent, messy and real problem. Van den Hoven presents a new conceptualization for privacy that is more adequate at addressing these problems.
www.privacyinsocialnetworksites.nl
Your organization and big data: Managing access, privacy, & securityLouise Spiteri
Louise Spiteri gave a presentation on managing big data for organizations. She defined big data as high-volume, high-velocity, and high-variety information that requires new technologies to process and analyze. Spiteri discussed the four V's of big data - volume, variety, velocity, and veracity. She also covered how organizations can analyze big data through techniques like text analytics, audio analytics, video analytics, social media analytics, and predictive analytics. Finally, Spiteri addressed privacy and security considerations for big data, emphasizing the need for information security, data privacy, and principles of choice, consent, collection and use, and retention.
Empathic inclination from digital footprints
Marco Polignano, Pierpaolo Basile, Gaetano Rossiello, Marco de Gemmis and Giovanni Semeraro
University of Bari “Aldo Moro”, Dept. of Computer Science, Italy
Similar to A UML Profile for Privacy Enforcement (20)
On the Analysis of Non-Coding Roles in Open Source DevelopmentJavier Canovas
The document discusses an empirical study of roles in open source software development projects. It finds that while developers contribute code, many open source projects also benefit greatly from non-coding roles like commenters, reviewers, and reactors. The study analyzed over 100 NPM package projects to determine the distribution of roles and how specialized communities are around each role. It was found that commenters have high activity levels and that non-coding roles become more important as projects grow. The diversity of roles in different projects and communities was also analyzed.
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...Javier Canovas
Slides of the presentation for the panel "Applying the principles of knowledge commons governance in practical frameworks for community-driven stewardship of digital resources" at Knowledge Commons Conference 2021
A Model-based Chatbot Generation Approach to Converse with Open Data SourcesJavier Canovas
This document proposes using chatbots as user-friendly interfaces to query open data sources published as web APIs. It describes a model-based approach to automatically generate chatbots for specific open data sources. The chatbots allow both direct queries and guided conversations without needing technical skills. An Eclipse plugin has been implemented to support common open data standards and generate chatbots. The approach aims to make open data more accessible and useful to regular citizens. Future work includes supporting advanced queries, combining multiple data sources, and generating chatbots for open data portals.
Automatic Generation of Test Cases for REST APIs: a Specification-Based ApproachJavier Canovas
This document proposes an approach to automatically generate test cases for REST APIs using the OpenAPI specification. It leverages the OpenAPI metamodel to extract models and define inference rules to generate nominal and faulty test cases. An implementation was validated on real-world APIs, achieving over 75% coverage of operations, parameters, endpoints and definitions. The main failing points identified were incorrect or invalid OpenAPI definitions. The approach aims to increase coverage levels and support the OpenAPI v3.0 specification.
The Role of Foundations in Open Source ProjectsJavier Canovas
Slides of the presentation of the paper titled "The Role of Foundations in Open Source Projects", accepted in the Software Engineering in Society track of the International Conference on Software Engineering (ICSE).
An Empirical Study on the Maturity of the Eclipse Modeling EcosystemJavier Canovas
Slides of my presentation at International Conference on Model Driven Engineering Languages and Systems. To be presented during the session on Friday 11:00-12:30
Example-driven Web API Specification DiscoveryJavier Canovas
Slides of my presentation at European Conference on Modelling Foundations and Applications (ECMFA'17). To be presented during the session on Thursday 16:00-17:30
Software Modernization Revisited:Challenges and ProspectsJavier Canovas
This document discusses challenges and prospects for software modernization and migration. It summarizes four key success factors for software modernization projects: 1) Having one common format or language to represent all models and transformations, 2) Supporting different views of the system tailored for different stakeholders, 3) Treating non-functional properties as first-class concerns, and 4) Viewing migration as a systematic process rather than a one-time task.
Findings from GitHub. Methods, Datasets and LimitationsJavier Canovas
Slides of my presentation at Mining Software Repositories conference (MSR'16) of the paper "Findings from GitHub. Methods, Datasets and Limitations" co-authored with Valerio Cosentino and Jordi Cabot
Exploring the Use of Labels to Categorize Issues in Open-Source Software Pro...Javier Canovas
Slides from our paper titled "Exploring the Use of Labels to Categorize Issues in Open-Source Software Projects" at SANER 2015 conference
You can find the paper here:
https://www.researchgate.net/publication/272794664_Exploring_the_Use_of_Labels_to_Categorize_Issues_in_Open-Source_Software_Projects
This document discusses composing JSON-based web APIs. It introduces JSON as a text-based open standard for representing simple data structures and objects derived from JavaScript. An example application is presented to illustrate how different services can interact. The document then describes an approach for generating glue code to compose web APIs, discussing ideas from database and XML-based composition approaches. It notes the need for process improvement in areas like scalability and provides metrics for evaluating effectiveness and coverage. The document promotes trying out a related GitHub project for discovering JSON schemas.
Retos Actuales en el Desarrollo de Lenguajes Específicos del DominioJavier Canovas
Este documento discute los retos actuales en el desarrollo de Lenguajes Específicos del Dominio (DSLs). Algunos de los principales retos incluyen involucrar al usuario final, soportar la evolución continua del dominio, y garantizar la integración del DSL con los sistemas existentes del cliente. El documento también analiza la importancia de diferentes retos reportados por expertos en el desarrollo de DSLs.
Enabling the Collaborative Definition of DSMLsJavier Canovas
This document discusses enabling collaborative definition of domain-specific modeling languages (DSMLs). It proposes a tool called Collaboro to facilitate this collaboration. Collaboro would provide means for end users to discuss and vote on language elements. It would also foster participation and overcome technical barriers to collaboration. The tool would support traceability throughout the collaborative DSML definition process.
This document discusses model-driven software modernization using Eclipse and MoDisco. It begins with an introduction to model-driven engineering (MDE) and concepts like the 3+1 layer model. It then discusses model-driven software modernization and the MDD-based horseshoe model for modernization. The document outlines Eclipse modeling tools like EMF and the Eclipse Modeling Project. It provides an overview of MoDisco for model discovery and reverse engineering of Java, XML, and JSP. Examples discussed include a JUnit migration from version 3 to 4 using MoDisco. The document concludes with instructions for installing the Eclipse modeling tools and examples.
The document provides an overview of software modernization and related concepts such as reengineering, reverse engineering, restructuring, and forward engineering. It discusses architecture-driven modernization (ADM) and some of the key standards and models in ADM, including the Architecture-Driven Modernization Specification (ADM), the Knowledge Discovery Metamodel (KDM), and the Software Metrics Metamodel (SMM). The document also provides examples of using ADM approaches like MoDisco for tasks such as migrating from JUnit 3 to JUnit 4.
The binding of cosmological structures by massless topological defectsSérgio Sacani
Assuming spherical symmetry and weak field, it is shown that if one solves the Poisson equation or the Einstein field
equations sourced by a topological defect, i.e. a singularity of a very specific form, the result is a localized gravitational
field capable of driving flat rotation (i.e. Keplerian circular orbits at a constant speed for all radii) of test masses on a thin
spherical shell without any underlying mass. Moreover, a large-scale structure which exploits this solution by assembling
concentrically a number of such topological defects can establish a flat stellar or galactic rotation curve, and can also deflect
light in the same manner as an equipotential (isothermal) sphere. Thus, the need for dark matter or modified gravity theory is
mitigated, at least in part.
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...University of Maribor
Slides from:
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Track: Artificial Intelligence
https://www.etran.rs/2024/en/home-english/
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
The use of Nauplii and metanauplii artemia in aquaculture (brine shrimp).pptxMAGOTI ERNEST
Although Artemia has been known to man for centuries, its use as a food for the culture of larval organisms apparently began only in the 1930s, when several investigators found that it made an excellent food for newly hatched fish larvae (Litvinenko et al., 2023). As aquaculture developed in the 1960s and ‘70s, the use of Artemia also became more widespread, due both to its convenience and to its nutritional value for larval organisms (Arenas-Pardo et al., 2024). The fact that Artemia dormant cysts can be stored for long periods in cans, and then used as an off-the-shelf food requiring only 24 h of incubation makes them the most convenient, least labor-intensive, live food available for aquaculture (Sorgeloos & Roubach, 2021). The nutritional value of Artemia, especially for marine organisms, is not constant, but varies both geographically and temporally. During the last decade, however, both the causes of Artemia nutritional variability and methods to improve poorquality Artemia have been identified (Loufi et al., 2024).
Brine shrimp (Artemia spp.) are used in marine aquaculture worldwide. Annually, more than 2,000 metric tons of dry cysts are used for cultivation of fish, crustacean, and shellfish larva. Brine shrimp are important to aquaculture because newly hatched brine shrimp nauplii (larvae) provide a food source for many fish fry (Mozanzadeh et al., 2021). Culture and harvesting of brine shrimp eggs represents another aspect of the aquaculture industry. Nauplii and metanauplii of Artemia, commonly known as brine shrimp, play a crucial role in aquaculture due to their nutritional value and suitability as live feed for many aquatic species, particularly in larval stages (Sorgeloos & Roubach, 2021).
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...University of Maribor
Slides from talk:
Aleš Zamuda: Remote Sensing and Computational, Evolutionary, Supercomputing, and Intelligent Systems.
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Inter-Society Networking Panel GRSS/MTT-S/CIS Panel Session: Promoting Connection and Cooperation
https://www.etran.rs/2024/en/home-english/
ANAMOLOUS SECONDARY GROWTH IN DICOT ROOTS.pptxRASHMI M G
Abnormal or anomalous secondary growth in plants. It defines secondary growth as an increase in plant girth due to vascular cambium or cork cambium. Anomalous secondary growth does not follow the normal pattern of a single vascular cambium producing xylem internally and phloem externally.
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...Wasswaderrick3
In this book, we use conservation of energy techniques on a fluid element to derive the Modified Bernoulli equation of flow with viscous or friction effects. We derive the general equation of flow/ velocity and then from this we derive the Pouiselle flow equation, the transition flow equation and the turbulent flow equation. In the situations where there are no viscous effects , the equation reduces to the Bernoulli equation. From experimental results, we are able to include other terms in the Bernoulli equation. We also look at cases where pressure gradients exist. We use the Modified Bernoulli equation to derive equations of flow rate for pipes of different cross sectional areas connected together. We also extend our techniques of energy conservation to a sphere falling in a viscous medium under the effect of gravity. We demonstrate Stokes equation of terminal velocity and turbulent flow equation. We look at a way of calculating the time taken for a body to fall in a viscous medium. We also look at the general equation of terminal velocity.
hematic appreciation test is a psychological assessment tool used to measure an individual's appreciation and understanding of specific themes or topics. This test helps to evaluate an individual's ability to connect different ideas and concepts within a given theme, as well as their overall comprehension and interpretation skills. The results of the test can provide valuable insights into an individual's cognitive abilities, creativity, and critical thinking skills
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
ESR spectroscopy in liquid food and beverages.pptxPRIYANKA PATEL
With increasing population, people need to rely on packaged food stuffs. Packaging of food materials requires the preservation of food. There are various methods for the treatment of food to preserve them and irradiation treatment of food is one of them. It is the most common and the most harmless method for the food preservation as it does not alter the necessary micronutrients of food materials. Although irradiated food doesn’t cause any harm to the human health but still the quality assessment of food is required to provide consumers with necessary information about the food. ESR spectroscopy is the most sophisticated way to investigate the quality of the food and the free radicals induced during the processing of the food. ESR spin trapping technique is useful for the detection of highly unstable radicals in the food. The antioxidant capability of liquid food and beverages in mainly performed by spin trapping technique.
Phenomics assisted breeding in crop improvementIshaGoswami9
As the population is increasing and will reach about 9 billion upto 2050. Also due to climate change, it is difficult to meet the food requirement of such a large population. Facing the challenges presented by resource shortages, climate
change, and increasing global population, crop yield and quality need to be improved in a sustainable way over the coming decades. Genetic improvement by breeding is the best way to increase crop productivity. With the rapid progression of functional
genomics, an increasing number of crop genomes have been sequenced and dozens of genes influencing key agronomic traits have been identified. However, current genome sequence information has not been adequately exploited for understanding
the complex characteristics of multiple gene, owing to a lack of crop phenotypic data. Efficient, automatic, and accurate technologies and platforms that can capture phenotypic data that can
be linked to genomics information for crop improvement at all growth stages have become as important as genotyping. Thus,
high-throughput phenotyping has become the major bottleneck restricting crop breeding. Plant phenomics has been defined as the high-throughput, accurate acquisition and analysis of multi-dimensional phenotypes
during crop growing stages at the organism level, including the cell, tissue, organ, individual plant, plot, and field levels. With the rapid development of novel sensors, imaging technology,
and analysis methods, numerous infrastructure platforms have been developed for phenotyping.
4. Data is key
User Information Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
5. Data is key
User Information Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Composite information
Route to go to work…
Places to pass the night…
6. Data is key
User Information
Data is the new currency
Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Composite information
Route to go to work…
Places to pass the night…
7. Data is key
User Information
Data is the new currency
Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Composite information
Route to go to work…
Places to pass the night…
8. The Open Data Movement
Data should be freely available to everyone
to use and republish as they wish, without
restrictions from copyright, patents or other
mechanisms of control
9. The Open Data Movement
Data should be freely available to everyone
to use and republish as they wish, without
restrictions from copyright, patents or other
mechanisms of control
•Geographic,
geopolitical
and financial
data
Statistics
Election results Legal acts
Data on crime, health, the
environment, transport
and scientific research
10. The Open Data Movement
Data should be freely available to everyone
to use and republish as they wish, without
restrictions from copyright, patents or other
mechanisms of control
•Geographic,
geopolitical
and financial
data
Statistics
Election results Legal acts
Data on crime, health, the
environment, transport
and scientific research
BUT…
11. Let’s not forget to mention…
…harmonize data privacy laws across Europe, to protect and
empower all EU citizens data privacy and to reshape the way
organizations across the region approach data privacy…
16. How is it treated currently?…in MDE?
Privacy and security at high-level
Methodological approaches
Access control policy solutions
Mont, M.C., Pearson, S., Creese, S., Goldsmith, M., Papanikolaou, N.: A Conceptual Model for Privacy Policies with
Consent and Revocation Requirements
Allison, D.S., Yamany, H.F.E., Capretz, M.A.M.: Metamodel for privacy policies within SOA
Busch, M.: Evaluating & engineering: an approach for the development of secure web applications
Basso, T., Montecchi, L., Moraes, R., Jino, M., Bondavalli, A.: Towards a UML profile for privacy-aware applications
Ahmadian, A.S., Peldszus, S., Ramadan, Q., Jürjens, J.: Model-based privacy and security analysis with carisma
Ahmadian, A.S., Strüber, D., Riediger, V., Jürjens, J.: Model-based privacy analysis in industrial ecosystems
Alshammari, M., Simpson, A.: A UML profile for privacy-aware data lifecycle models
XACML, PRBAC, UMLSec, Ponder
28. Conclusion
• Profile to specify privacy
• Models annotated with the profile
can promote privacy enforcement
What we have shown
What we want to do next
Application to specific fields
Promoting Open Data
30. How to add this information to existing methodologies?
…how we can leverage existing model-based approaches?
…how hard would it be?
#1
#2
How to convince organizations to annotate their data?
…are they actually concerned?
…would they see it as beneficial?
#3
Is it posible to automatically annotate existing models with privacy
information?
…are there some guidelines?
#4
How to mix data with different privacy enforcement definitions?
…how to deal with UML Class associations?
…what happens when dealing with other UML diagrams?
31. Except where otherwise noted, content on this presentation is licensed under a Creative Commons Attribution 4.0 International license.
Thanks!
Javier L. Cánovas Izquierdo
jcanovasi@uoc.edu
@jlcanovas
Julian Salas
jsalapi@uoc.edu