SlideShare a Scribd company logo
Security, privacy and trust: why and
how might we control access to
research data?
Paul Burton, Rebecca Wilson
University of Bristol, D2K Research Program
NISO Symposium, Denver
11th September, 2016
• Perhaps the most important message is in the
title:
• This is a complex challenge involving science,
technology, governance and other fundamental
social issues
• No single solution will be adequate
• True transdisciplinary programs of work are essential
• Even the most complex and sophisticated of
solutions will never offer fully effective exploitation
of available data with zero risk of mistakes in
managing data or of malign interference
Security, privacy and trust
From Preface:
“Our view has always been that
anonymisation is a heavily context-
dependent process and only by
considering the data and its
environment as a total system
(which we call the data situation),
can one come to a well informed
decision about whether and what
anonymisation is needed.”
Controlling access to
research data (security):
why and when?
• Who might share data?
• Distinct generator and user
• Share data across a consortium
• How is ‘sharing’ achieved?
• Physically transfer data to a user
• Provide access to analyse
• Analysis on-site
• Remote analysis
• Federated analysis
• All interpretations valid and important
What does “sharing” research microdata mean?
• Management of intellectual property invested
and held in data – most areas of research
• Legal, ethical and other governance stipulations
to protect the welfare of research participants –
particularly in health/social/biomedical research
• Disclosure of identity
• Disclosure of associated information
• Balance between these and the societal benefits of
streamlined comprehensive data access – which is
evolving rapidly with time and social context
Why control research data at all?
The Research
Data Pipeline
When are
data “at risk”?
The Research
Data Pipeline
When are
data “at risk”?
Dissemination
and evidence
based action
The Research
Data Pipeline
When are
data “at risk”?
Dissemination
and evidence
based action
• Risks associated with: storage; transmission; use
• Accidental v deliberate violations
• Direct v inferential disclosure
• Risks and remedies lie in the nature of the data
themselves and the contextual environment in
which the data are to be used – and potentially
misused
• Mark Elliot, Elaine Mackey, Keith Spicer, Caroline Tudor,
the Anonymisation Decision-Making Framework, 2016
Issues to consider
• Consider the user(s)
• Are he/she/they bona fide researchers?
• Consider the application – for example:
• Does it violate (or potentially violate) any of the
ethical permissions granted to the study or any
of the consent forms signed by the
participants or their guardians?
• Is there a risk it may produce information that
may allow individual cohort members to be
identified?
How to implement control in practice? UK
MetaDAC and ALSPAC as illustrative examples
• Administrative and research data held
separately
• Hard copies of data held in locked storage
• Electronic data held on password protected
systems with access restricted to those who
really need it
• All electronic data held in encrypted form
• Extensive QC (security of quality)
• Multiple back-ups (security of existence)
Managing the data and the data environment
• All data pseudonomised before release
• If pseudonomisation scientifically impossible,
data can be analysed ‘on site’
• All data transfers encrypted using standard
protocols
• All linked data released on study-specific IDs
• Explicit acknowledgment that no system can
guarantee a zero risk of disclosure or misuse of
data
Managing the data and the data environment
• A strong underpinning governance structure
is essential.
• EAGDA (Expert Advisory Group on Data
Access) report 2015 considered, amongst
many other key issues that:
EAGDA report, 2015
• Governance must be proportionate and
context appropriate
• Must be transparent, auditable and
appealable
• Need mutual trust and respect amongst
stakeholders
• Applicants for data through MetaDAC or from
ALSPAC sign up agreeing to governance
documents which include statements such as:
• Applicants are reminded that the Terms and Conditions for the
cohort explicitly forbid any attempt to identify individuals or to
compromise or otherwise infringe the confidentiality of
information on data subjects and their right to privacy.
• Do you understand that you must not pass on any data or
samples awarded, or any derived variables or genotypes
generated by this application to a third party (i.e. to anybody
that is not included in this list of applicants on this project, nor is
a direct employee of one of these applicants)?
How to implement control in practice? UK
MetaDAC and ALSPAC as illustrative examples
Role of encryption and other
technology-based forms of
privacy protection in “open
science”
• When research data are very sensitive or are seen as
having a particular intellectual property value can we
develop technology-based solutions that facilitate
access to microdata by enhancing privacy protection
so that all intellectual property and governance
constraints are met in full while lowering the
governance bar? This can promote open science by
easing and/or speeding up access requests
• Should be seen as an additional component to be
applied on top of a data access and governance
system that is already well founded
• EAGDA report emphasises sustainability
Privacy protection in “open science”
Data
Computer
DC
Analysis
Computer
AC
Single site DataSHIELD
2009: The DataSHIELD
challenge
Given that microdata are scientifically
critical and yet potentially sensitive,
can we ensure that the information
driving analysis of the data at each
centre only ever emerges from the
firewall in non-disclosive form? (i)
encryption (trivial and non-trivial);
(ii) low dimensional (ideally
sufficient) statistics
Multi-site DataSHIELD
horizontally partitioned data
• One step analyses: e.g.
ds.table2D - request
non-disclosive output
from all sources
• Multi-step analyses: e.g.
ds.lexis – set up and then
request
• Iterative analyses: e.g.
ds.glm - parallel
processes linked
together by non-
identifying summary
statistics – e.g. for glm
= score vectors and
information matrices
• Can be used as
equivalent to
full individual
level analysis or
to study level
meta-analysis
The DataSHIELD
solution
DataSHIELD
b.vector<-c(0,0,0,0)
glm(cc~1+BMI+BMI.456+SNP,
family=binomial,
start=b.vector, maxit=1)
Analysis commands (1)
Information Matrix Study 5
Score vector Study 5
Summary Statistics (1)
[36, 487.2951, 487.2951, 149]
Information Matrix Study 5
Score vector Study 5
Summary Statistics (1)
DataSHIELD
Σ Information Matrix Study 5
Score vector Study 5
Summary Statistics (1)
[36, 487.2951, 487.2951, 149]
Information Matrix Study 5
Score vector Study 5
Summary Statistics (1)
DataSHIELD
b.vector<-
c(-0.322, 0.0223, 0.0391, 0.535)
Analysis commands (2)
glm(cc~1+BMI+BMI.456+SNP,
family=binomial,
start=b.vector, maxit=1)
DataSHIELD
and so on .....
Updated parameters (4)
Σ
Coefficient Estimate Std Error
Intercept -0.3296 0.02838
BMI 0.02300 0.00621
BMI.456 0.04126 0.01140
SNP 0.5517 0.03295
Final parameter estimates
DataSHIELD
DataSHIELD analysis
Direct conventional analysis
Parameter Coefficient Standard Error
bintercept
-0.3296 0.02838
bBMI
0.02300 0.00621
bBMI.456
0.04126 0.01140
bSNP
0.5517 0.03295
Coefficients:
Estimate Std. Error
(Intercept) -0.32956 0.02838
BMI 0.02300 0.00621
BMI.456 0.04126 0.01140
SNP 0.55173 0.03295
Does it
work?
Server-side functions
Client-side functions
Individual level data never
transmitted or seen by the
statistician in charge, or by
anybody outside the
original centre in which
they are stored.
R
R
R R
Web services
Web servicesWeb services
Data server
Opal
Finrisk
Opal
Prevend
Opal
1958BC
Data server
Data server
BioSHaRE
web site
Web services
Analysis
client
DataSHIELD: current implementation for
horizontally partitioned data
IM5:
Analysis
Computer
R
R
R R
Web services
Web servicesWeb services
Data computer Opal
NHS
Opal
ALSPAC
Opal
Education
Data computer Data computer
Regression coefficients = XTY/ XTX
XTX: Need to calculate
XAXA XAXB XAXC
XAXB XBXB XBXC
XAXC XBXC XCXC
XA
XB
XAXB
XA1 * XB1
+
XA2 * XB2
+
XA3 * XB3
+
……
DataSHIELD: current implementation for
vertically partitioned (linked) data
IM5:
Analysis
Computer
R
R
R R
Web services
Web servicesWeb services
Data computer Opal
NHS
Opal
ALSPAC
Opal
Education
Data computer Data computer
Regression coefficients = XTY/ XTX
XTX: Need to calculate
XAXA XAXB XAXC
XAXB XBXB XBXC
XAXC XBXC XCXC
MA
MB
MC
XA
XB
XAXB
XA1 * XB1
+
XA2 * XB2
+
XA3 * XB3
+
……
DataSHIELD:current
implementationfor vertically
partitioned(linked) data
plain.text.vector.A plain.text.vector.N
0 1 1 1 0 0 1 1 1 0 1 0 0 1
encryption.matrix
[,1] [,2] [,3]
[1,] -1.444769 2.495677 -5.322736
[2,] -1.355529 -9.369041 2.687347
[3,] 4.603762 -3.622044 -2.817478
occluded.matrix.A
[,1] [,2] [,3]
[1,] -1.4546711 0 4.0722205
[2,] 6.4809785 1 -4.5814726
[3,] 4.4954801 1 -8.7036260
[4,] 0.1995684 1 -8.6872205
[5,] -6.4060220 0 -6.6471777
[6,] -0.5164345 0 -0.2564673
[7,] -5.8981933 1 -8.5032852
IM5:
Analysis
Computer
R
R
R R
Web services
Opal
NHS
Opal
ALSPAC
Opal
Education
Data computer Data computer
Regression coefficients = XTY/ XTX
XTX: Need to calculate
XAXA XAXB XAXC
XAXB XBXB XBXC
XAXC XBXC XCXC
MA XT
A
MAXT
AXBMB
MA
XA
XB
MB
(MA)-1 MAXT
AXBMB (MB)-1 = XAXB
DataSHIELD:current
implementationfor vertically
partitioned(linked) data
plain.text.vector.A plain.text.vector.N
0 1 1 1 0 0 1 1 1 0 1 0 0 1
encryption.matrix
[,1] [,2] [,3]
[1,] -1.444769 2.495677 -5.322736
[2,] -1.355529 -9.369041 2.687347
[3,] 4.603762 -3.622044 -2.817478
occluded.matrix.A
[,1] [,2] [,3]
[1,] -1.4546711 0 4.0722205
[2,] 6.4809785 1 -4.5814726
[3,] 4.4954801 1 -8.7036260
[4,] 0.1995684 1 -8.6872205
[5,] -6.4060220 0 -6.6471777
[6,] -0.5164345 0 -0.2564673
[7,] -5.8981933 1 -8.5032852
The core DataSHIELD
Development Team
Becca Wilson
If people want to know technical details about DataSHIELD or methods for secure data
sharing/analysis: see 12th September 11:30 - 13:00 Secure Multiparty Computation for Statistical
Analysis of Private Data
Demetris Avraam
Poster #12 RDA poster session Wednesday, Thursday, Friday – DataSHIELD: a method for privacy
protected analysis of individual level data
RDA Working Group for Data Security and Trust
RDA 8th Plenary in the same venue as the NISO symposium. Session on 17th September 11:00 -
12:30. We are running a survey to gather information on current data security practices in our
community. The survey is available at www.bit.ly/dash-ing (see below)
Data to Knowledge (D2K) Research Group. Contact details:
@Data2Knowledge there is also a "contact us" page on www.datashield.ac.uk
Setting up a professional community for stakeholders in health data sharing
DASH-ING: DAta Sharing for Health - INnovation Group
The website will initially (and temporarily) be at: www.bit.ly/dash-ing This webpage contains
questions for RDA survey and link to join the professional community
Additional opportunities for interaction
THANK YOU FOR LISTENING
> plain.text.vector.L
[1] 0 1 1 1 0 0 1
> plain.text.vector.N
[1] 1 1 0 1 0 0 1
> sum(plain.text.vector.L*plain.text.matrix.N)
[1] 3
>t(matrix(plain.text.vector.L))%*%matrix(plain.text.vector.N)
[,1]
[1,] 3
How does matrix-based encryption
work?
> occluded.matrix.L > plain.text.vector.L
[,1] [,2] [,3] [1] 0 1 1 1 0 0 1
[1,] -1.4546711 0 4.0722205
[2,] 6.4809785 1 -4.5814726
[3,] 4.4954801 1 -8.7036260
[4,] 0.1995684 1 -8.6872205
[5,] -6.4060220 0 -6.6471777
[6,] -0.5164345 0 -0.2564673
[7,] -5.8981933 1 -8.5032852
> e.mat.L
[,1] [,2] [,3]
[1,] -1.444769 2.495677 -5.322736
[2,] -1.355529 -9.369041 2.687347
[3,] 4.603762 -3.622044 -2.817478
> e.mat.L%*%occluded.matrix.L
[,1] [,2] [,3] [,4] [,5] [,6] [,7]
[1,] -19.57369 17.51813 42.32785 48.44713 44.636397 2.11123627 56.277949
[2,] 12.91532 -30.46620 -38.85246 -32.98514 -9.179719 0.01082581 -24.225142
[3,] -18.17035 39.12303 41.59635 21.77277 -10.763524 -1.65495077 -6.818104
How does matrix-based encryption
work?
> e.mat.L%*%occluded.matrix.L
[,1] [,2] [,3] [,4] [,5] [,6] [,7]
[1,] -19.57369 17.51813 42.32785 48.44713 44.636397 2.11123627 56.277949
[2,] 12.91532 -30.46620 -38.85246 -32.98514 -9.179719 0.01082581 -24.225142
[3,] -18.17035 39.12303 41.59635 21.77277 -10.763524 -1.65495077 -6.818104
> plain.text.vector.N
[1] 1 1 0 1 0 0 1
> e.mat.L%*%occluded.matrix.L%*% plain.text.matrix.N
[,1]
[1,] 102.66952
[2,] -74.76116
[3,] 35.90735
> inv.e.mat.L%*%e.mat.L%*%occluded.matrix.L%*% plain.text.matrix.N
[,1]
[1,] -0.6723174
[2,] 3.0000000
[3,] -17.6997578
> sum(plain.text.vector.L*plain.text.matrix.N)
[1] 3
How does matrix-based encryption
work?
> plain.text.vector.L
[1] 0 1 1 1 0 0 1
> e.mat.1
[,1]
[1,] 7.13763
> e.mat.1%*%t(matrix(plain.text.vector.L))
[,1] [,2] [,3] [,4] [,5] [,6][,7]
[1,] 0 7.13763 7.13763 7.13763 0 0 7.13763
>e.mat.1%*%t(matrix(plain.text.vector.L))%*%plain.text.matrix.N
[,1]
[1,] 21.41289
>(1/e.mat.1)*e.mat.1%*%t(matrix(plain.text.vector.L))%*%plain.tex
t.matrix.N
[,1]
[1,] 3
Why do we need to occlude the
original plain text vector?
• Is there a significant risk of upsetting or
alienating cohort members or of reducing their
willingness to remain as active participants?
• Does it address topics that fall within the
acknowledged scientific remit of the cohort?
• Is access requested to an infinite resource (data
or cell line DNA) or a depletable resource. If
non-depletable NO assessment of the science
underpinning the application
UK MetaDAC and ALSPAC as illustrative examples
• Wish to control access
• Undesirable loss of intellectual property
• Violation of legal, ethical and other governance
stipulations – particularly disclosure of identity
and/or associated information
• Wish to ensure data used widely for scientific
research and that access procedures are
streamlined
• Data and contextual “data environment” both
crucial and control systems are typically
complex and multi-faceted
How should access be controlled?

More Related Content

What's hot

Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...OAbooks
 
Data publication: Discover, Explore, Visualise
Data publication: Discover, Explore, VisualiseData publication: Discover, Explore, Visualise
Data publication: Discover, Explore, Visualise
Alejandra Gonzalez-Beltran
 
RDA FAIR Data Maturity Model
RDA FAIR Data Maturity ModelRDA FAIR Data Maturity Model
RDA FAIR Data Maturity Model
OpenAIRE
 
Research data spring: extending the OPD to cover RDM
Research data spring: extending the OPD to cover RDMResearch data spring: extending the OPD to cover RDM
Research data spring: extending the OPD to cover RDM
Jisc RDM
 
Metadata challenges research and re-usable data - BioSharing, ISA and STATO
Metadata challenges research and re-usable data - BioSharing, ISA and STATOMetadata challenges research and re-usable data - BioSharing, ISA and STATO
Metadata challenges research and re-usable data - BioSharing, ISA and STATO
Alejandra Gonzalez-Beltran
 
Hoffman and Rajan "Metadata: The Importance of Interoperability, and Factors ...
Hoffman and Rajan "Metadata: The Importance of Interoperability, and Factors ...Hoffman and Rajan "Metadata: The Importance of Interoperability, and Factors ...
Hoffman and Rajan "Metadata: The Importance of Interoperability, and Factors ...
National Information Standards Organization (NISO)
 
Stop press: should embargo conditions apply to metadata?
Stop press: should embargo conditions apply to metadata?Stop press: should embargo conditions apply to metadata?
Stop press: should embargo conditions apply to metadata?
Jisc RDM
 
Stephenson - Data Curation for Quantitative Social Science Research
Stephenson - Data Curation for Quantitative Social Science ResearchStephenson - Data Curation for Quantitative Social Science Research
Stephenson - Data Curation for Quantitative Social Science Research
National Information Standards Organization (NISO)
 
Data Management Planning for researchers
Data Management Planning for researchersData Management Planning for researchers
Data Management Planning for researchers
Sarah Jones
 
Research data spring: giving researchers credit for their data
Research data spring: giving researchers credit for their dataResearch data spring: giving researchers credit for their data
Research data spring: giving researchers credit for their data
Jisc RDM
 
FAIR and metadata standards - FAIRsharing and Neuroscience
FAIR and metadata standards - FAIRsharing and NeuroscienceFAIR and metadata standards - FAIRsharing and Neuroscience
FAIR and metadata standards - FAIRsharing and Neuroscience
Susanna-Assunta Sansone
 
Building a collaborative RDM community, research data network
Building a collaborative RDM community, research data networkBuilding a collaborative RDM community, research data network
Building a collaborative RDM community, research data network
Jisc RDM
 
Standardising research data policies, research data network
Standardising research data policies, research data networkStandardising research data policies, research data network
Standardising research data policies, research data network
Jisc RDM
 
NIH BD2K bioCADDIE DataMed: Data Discovery Index
NIH BD2K bioCADDIE DataMed: Data Discovery IndexNIH BD2K bioCADDIE DataMed: Data Discovery Index
NIH BD2K bioCADDIE DataMed: Data Discovery Index
Susanna-Assunta Sansone
 
Towards a frictionless data future
Towards a frictionless data futureTowards a frictionless data future
Towards a frictionless data future
Jisc RDM
 
RDM & ELNs @ Edinburgh
RDM & ELNs @ EdinburghRDM & ELNs @ Edinburgh
RDM & ELNs @ Edinburgh
EDINA, University of Edinburgh
 
Why science needs open data – Jisc and CNI conference 10 July 2014
Why science needs open data – Jisc and CNI conference 10 July 2014Why science needs open data – Jisc and CNI conference 10 July 2014
Why science needs open data – Jisc and CNI conference 10 July 2014
Jisc
 
FAIR data
FAIR dataFAIR data
FAIR data
Sarah Jones
 
ANDS and Data Management
ANDS and Data ManagementANDS and Data Management
ANDS and Data Management
Julia Gross
 
Research Data Management in practice, RIA Data Management Workshop Brisbane 2017
Research Data Management in practice, RIA Data Management Workshop Brisbane 2017Research Data Management in practice, RIA Data Management Workshop Brisbane 2017
Research Data Management in practice, RIA Data Management Workshop Brisbane 2017
ARDC
 

What's hot (20)

Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
Strand 1: Connecting research and researchers: An introduction to ORCID by Ed...
 
Data publication: Discover, Explore, Visualise
Data publication: Discover, Explore, VisualiseData publication: Discover, Explore, Visualise
Data publication: Discover, Explore, Visualise
 
RDA FAIR Data Maturity Model
RDA FAIR Data Maturity ModelRDA FAIR Data Maturity Model
RDA FAIR Data Maturity Model
 
Research data spring: extending the OPD to cover RDM
Research data spring: extending the OPD to cover RDMResearch data spring: extending the OPD to cover RDM
Research data spring: extending the OPD to cover RDM
 
Metadata challenges research and re-usable data - BioSharing, ISA and STATO
Metadata challenges research and re-usable data - BioSharing, ISA and STATOMetadata challenges research and re-usable data - BioSharing, ISA and STATO
Metadata challenges research and re-usable data - BioSharing, ISA and STATO
 
Hoffman and Rajan "Metadata: The Importance of Interoperability, and Factors ...
Hoffman and Rajan "Metadata: The Importance of Interoperability, and Factors ...Hoffman and Rajan "Metadata: The Importance of Interoperability, and Factors ...
Hoffman and Rajan "Metadata: The Importance of Interoperability, and Factors ...
 
Stop press: should embargo conditions apply to metadata?
Stop press: should embargo conditions apply to metadata?Stop press: should embargo conditions apply to metadata?
Stop press: should embargo conditions apply to metadata?
 
Stephenson - Data Curation for Quantitative Social Science Research
Stephenson - Data Curation for Quantitative Social Science ResearchStephenson - Data Curation for Quantitative Social Science Research
Stephenson - Data Curation for Quantitative Social Science Research
 
Data Management Planning for researchers
Data Management Planning for researchersData Management Planning for researchers
Data Management Planning for researchers
 
Research data spring: giving researchers credit for their data
Research data spring: giving researchers credit for their dataResearch data spring: giving researchers credit for their data
Research data spring: giving researchers credit for their data
 
FAIR and metadata standards - FAIRsharing and Neuroscience
FAIR and metadata standards - FAIRsharing and NeuroscienceFAIR and metadata standards - FAIRsharing and Neuroscience
FAIR and metadata standards - FAIRsharing and Neuroscience
 
Building a collaborative RDM community, research data network
Building a collaborative RDM community, research data networkBuilding a collaborative RDM community, research data network
Building a collaborative RDM community, research data network
 
Standardising research data policies, research data network
Standardising research data policies, research data networkStandardising research data policies, research data network
Standardising research data policies, research data network
 
NIH BD2K bioCADDIE DataMed: Data Discovery Index
NIH BD2K bioCADDIE DataMed: Data Discovery IndexNIH BD2K bioCADDIE DataMed: Data Discovery Index
NIH BD2K bioCADDIE DataMed: Data Discovery Index
 
Towards a frictionless data future
Towards a frictionless data futureTowards a frictionless data future
Towards a frictionless data future
 
RDM & ELNs @ Edinburgh
RDM & ELNs @ EdinburghRDM & ELNs @ Edinburgh
RDM & ELNs @ Edinburgh
 
Why science needs open data – Jisc and CNI conference 10 July 2014
Why science needs open data – Jisc and CNI conference 10 July 2014Why science needs open data – Jisc and CNI conference 10 July 2014
Why science needs open data – Jisc and CNI conference 10 July 2014
 
FAIR data
FAIR dataFAIR data
FAIR data
 
ANDS and Data Management
ANDS and Data ManagementANDS and Data Management
ANDS and Data Management
 
Research Data Management in practice, RIA Data Management Workshop Brisbane 2017
Research Data Management in practice, RIA Data Management Workshop Brisbane 2017Research Data Management in practice, RIA Data Management Workshop Brisbane 2017
Research Data Management in practice, RIA Data Management Workshop Brisbane 2017
 

Viewers also liked

Bruch - Security, Solidarity, Science
Bruch - Security, Solidarity, ScienceBruch - Security, Solidarity, Science
Bruch - Security, Solidarity, Science
National Information Standards Organization (NISO)
 
Carpenter - Privacy Implications Research Data - Intro
Carpenter - Privacy Implications Research Data - IntroCarpenter - Privacy Implications Research Data - Intro
Carpenter - Privacy Implications Research Data - Intro
National Information Standards Organization (NISO)
 
Wilbanks Can We Simultaneously Support Both Privacy & Research?
Wilbanks Can We Simultaneously Support Both Privacy & Research?Wilbanks Can We Simultaneously Support Both Privacy & Research?
Wilbanks Can We Simultaneously Support Both Privacy & Research?
National Information Standards Organization (NISO)
 
Altman - Perfectly Anonymous Data is Perfectly Useless Data
Altman - Perfectly Anonymous Data is Perfectly Useless DataAltman - Perfectly Anonymous Data is Perfectly Useless Data
Altman - Perfectly Anonymous Data is Perfectly Useless Data
National Information Standards Organization (NISO)
 
ALA 2016 NISO-BISG Forum - Intro User Experience
ALA 2016 NISO-BISG Forum - Intro User ExperienceALA 2016 NISO-BISG Forum - Intro User Experience
ALA 2016 NISO-BISG Forum - Intro User Experience
National Information Standards Organization (NISO)
 
ALA NISO-BISG Forum - Andrew Albanese
ALA NISO-BISG Forum - Andrew AlbaneseALA NISO-BISG Forum - Andrew Albanese
ALA NISO-BISG Forum - Andrew Albanese
National Information Standards Organization (NISO)
 
ALA NISO-BISG Forum - Patron Privacy
ALA NISO-BISG Forum - Patron PrivacyALA NISO-BISG Forum - Patron Privacy
ALA NISO-BISG Forum - Patron Privacy
National Information Standards Organization (NISO)
 
ALA NISO-BISG Forum - Todd Carpenter
ALA NISO-BISG Forum - Todd CarpenterALA NISO-BISG Forum - Todd Carpenter
ALA NISO-BISG Forum - Todd Carpenter
National Information Standards Organization (NISO)
 
NISO Open Discovery Initiative SC, ALA Update Jan 21, 2017
NISO Open Discovery Initiative SC, ALA Update Jan 21, 2017NISO Open Discovery Initiative SC, ALA Update Jan 21, 2017
NISO Open Discovery Initiative SC, ALA Update Jan 21, 2017
National Information Standards Organization (NISO)
 
NISO Altmetrics Initiative, ALA Update January 21, 2017
NISO Altmetrics Initiative, ALA Update January 21, 2017NISO Altmetrics Initiative, ALA Update January 21, 2017
NISO Altmetrics Initiative, ALA Update January 21, 2017
National Information Standards Organization (NISO)
 

Viewers also liked (10)

Bruch - Security, Solidarity, Science
Bruch - Security, Solidarity, ScienceBruch - Security, Solidarity, Science
Bruch - Security, Solidarity, Science
 
Carpenter - Privacy Implications Research Data - Intro
Carpenter - Privacy Implications Research Data - IntroCarpenter - Privacy Implications Research Data - Intro
Carpenter - Privacy Implications Research Data - Intro
 
Wilbanks Can We Simultaneously Support Both Privacy & Research?
Wilbanks Can We Simultaneously Support Both Privacy & Research?Wilbanks Can We Simultaneously Support Both Privacy & Research?
Wilbanks Can We Simultaneously Support Both Privacy & Research?
 
Altman - Perfectly Anonymous Data is Perfectly Useless Data
Altman - Perfectly Anonymous Data is Perfectly Useless DataAltman - Perfectly Anonymous Data is Perfectly Useless Data
Altman - Perfectly Anonymous Data is Perfectly Useless Data
 
ALA 2016 NISO-BISG Forum - Intro User Experience
ALA 2016 NISO-BISG Forum - Intro User ExperienceALA 2016 NISO-BISG Forum - Intro User Experience
ALA 2016 NISO-BISG Forum - Intro User Experience
 
ALA NISO-BISG Forum - Andrew Albanese
ALA NISO-BISG Forum - Andrew AlbaneseALA NISO-BISG Forum - Andrew Albanese
ALA NISO-BISG Forum - Andrew Albanese
 
ALA NISO-BISG Forum - Patron Privacy
ALA NISO-BISG Forum - Patron PrivacyALA NISO-BISG Forum - Patron Privacy
ALA NISO-BISG Forum - Patron Privacy
 
ALA NISO-BISG Forum - Todd Carpenter
ALA NISO-BISG Forum - Todd CarpenterALA NISO-BISG Forum - Todd Carpenter
ALA NISO-BISG Forum - Todd Carpenter
 
NISO Open Discovery Initiative SC, ALA Update Jan 21, 2017
NISO Open Discovery Initiative SC, ALA Update Jan 21, 2017NISO Open Discovery Initiative SC, ALA Update Jan 21, 2017
NISO Open Discovery Initiative SC, ALA Update Jan 21, 2017
 
NISO Altmetrics Initiative, ALA Update January 21, 2017
NISO Altmetrics Initiative, ALA Update January 21, 2017NISO Altmetrics Initiative, ALA Update January 21, 2017
NISO Altmetrics Initiative, ALA Update January 21, 2017
 

Similar to Burton - Security, Privacy and Trust

Shifting the goal post – from high impact journals to high impact data
 Shifting the goal post – from high impact journals to high impact data Shifting the goal post – from high impact journals to high impact data
Shifting the goal post – from high impact journals to high impact data
CGIAR Research Program on Dryland Systems
 
Research methods group accelarating impact by sharing data
Research methods group  accelarating impact by sharing dataResearch methods group  accelarating impact by sharing data
Research methods group accelarating impact by sharing dataWorld Agroforestry (ICRAF)
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Geoffrey Fox
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and Standards
ARDC
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
Robin Rice
 
Intro to RDM
Intro to RDMIntro to RDM
Intro to RDM
Sarah Jones
 
John Eberhardt NSTAC Testimony
John Eberhardt NSTAC TestimonyJohn Eberhardt NSTAC Testimony
John Eberhardt NSTAC Testimony
John Eberhardt
 
Research Data Management, Challenges and Tools - Per Öster
Research Data Management, Challenges and Tools - Per Öster Research Data Management, Challenges and Tools - Per Öster
Research Data Management, Challenges and Tools - Per Öster
LEARN Project
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
ICPSR
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
Von Welch
 
RWE & Patient Analytics Leveraging Databricks – A Use Case
RWE & Patient Analytics Leveraging Databricks – A Use CaseRWE & Patient Analytics Leveraging Databricks – A Use Case
RWE & Patient Analytics Leveraging Databricks – A Use Case
Databricks
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Srikanth Sharma Boddupalli
 
Preparing Data for Sharing: The FAIR Principles
Preparing Data for Sharing: The FAIR PrinciplesPreparing Data for Sharing: The FAIR Principles
Preparing Data for Sharing: The FAIR Principles
London School of Hygiene and Tropical Medicine
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
Kiran Kumar Chittoori
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
Liming Zhu
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - Keynote
Neo4j
 
tranSMART Community Meeting 5-7 Nov 13 - Session 5: Recent tranSMART Lessons ...
tranSMART Community Meeting 5-7 Nov 13 - Session 5: Recent tranSMART Lessons ...tranSMART Community Meeting 5-7 Nov 13 - Session 5: Recent tranSMART Lessons ...
tranSMART Community Meeting 5-7 Nov 13 - Session 5: Recent tranSMART Lessons ...
David Peyruc
 
Unit 3.pdf
Unit 3.pdfUnit 3.pdf
Unit 3.pdf
Manisha Shinde
 
Driving Business Value Through Agile Data Assets
Driving Business Value Through Agile Data AssetsDriving Business Value Through Agile Data Assets
Driving Business Value Through Agile Data Assets
Embarcadero Technologies
 
Graham Pryor
Graham PryorGraham Pryor
Graham Pryor
Eduserv
 

Similar to Burton - Security, Privacy and Trust (20)

Shifting the goal post – from high impact journals to high impact data
 Shifting the goal post – from high impact journals to high impact data Shifting the goal post – from high impact journals to high impact data
Shifting the goal post – from high impact journals to high impact data
 
Research methods group accelarating impact by sharing data
Research methods group  accelarating impact by sharing dataResearch methods group  accelarating impact by sharing data
Research methods group accelarating impact by sharing data
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and Standards
 
Providing support and services for researchers in good data governance
Providing support and services for researchers in good data governanceProviding support and services for researchers in good data governance
Providing support and services for researchers in good data governance
 
Intro to RDM
Intro to RDMIntro to RDM
Intro to RDM
 
John Eberhardt NSTAC Testimony
John Eberhardt NSTAC TestimonyJohn Eberhardt NSTAC Testimony
John Eberhardt NSTAC Testimony
 
Research Data Management, Challenges and Tools - Per Öster
Research Data Management, Challenges and Tools - Per Öster Research Data Management, Challenges and Tools - Per Öster
Research Data Management, Challenges and Tools - Per Öster
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
 
RWE & Patient Analytics Leveraging Databricks – A Use Case
RWE & Patient Analytics Leveraging Databricks – A Use CaseRWE & Patient Analytics Leveraging Databricks – A Use Case
RWE & Patient Analytics Leveraging Databricks – A Use Case
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
 
Preparing Data for Sharing: The FAIR Principles
Preparing Data for Sharing: The FAIR PrinciplesPreparing Data for Sharing: The FAIR Principles
Preparing Data for Sharing: The FAIR Principles
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - Keynote
 
tranSMART Community Meeting 5-7 Nov 13 - Session 5: Recent tranSMART Lessons ...
tranSMART Community Meeting 5-7 Nov 13 - Session 5: Recent tranSMART Lessons ...tranSMART Community Meeting 5-7 Nov 13 - Session 5: Recent tranSMART Lessons ...
tranSMART Community Meeting 5-7 Nov 13 - Session 5: Recent tranSMART Lessons ...
 
Unit 3.pdf
Unit 3.pdfUnit 3.pdf
Unit 3.pdf
 
Driving Business Value Through Agile Data Assets
Driving Business Value Through Agile Data AssetsDriving Business Value Through Agile Data Assets
Driving Business Value Through Agile Data Assets
 
Graham Pryor
Graham PryorGraham Pryor
Graham Pryor
 

More from National Information Standards Organization (NISO)

Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
National Information Standards Organization (NISO)
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
National Information Standards Organization (NISO)
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
National Information Standards Organization (NISO)
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
National Information Standards Organization (NISO)
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
National Information Standards Organization (NISO)
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
National Information Standards Organization (NISO)
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
National Information Standards Organization (NISO)
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
National Information Standards Organization (NISO)
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
National Information Standards Organization (NISO)
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
National Information Standards Organization (NISO)
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
National Information Standards Organization (NISO)
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
National Information Standards Organization (NISO)
 
Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"
National Information Standards Organization (NISO)
 
Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"
National Information Standards Organization (NISO)
 
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
National Information Standards Organization (NISO)
 

More from National Information Standards Organization (NISO) (20)

Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
 
Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"
 
Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"
 
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...Straza "Global collaboration towards equitable and open science: UNESCO Recom...
Straza "Global collaboration towards equitable and open science: UNESCO Recom...
 

Recently uploaded

Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Burton - Security, Privacy and Trust

  • 1. Security, privacy and trust: why and how might we control access to research data? Paul Burton, Rebecca Wilson University of Bristol, D2K Research Program NISO Symposium, Denver 11th September, 2016
  • 2. • Perhaps the most important message is in the title: • This is a complex challenge involving science, technology, governance and other fundamental social issues • No single solution will be adequate • True transdisciplinary programs of work are essential • Even the most complex and sophisticated of solutions will never offer fully effective exploitation of available data with zero risk of mistakes in managing data or of malign interference Security, privacy and trust
  • 3. From Preface: “Our view has always been that anonymisation is a heavily context- dependent process and only by considering the data and its environment as a total system (which we call the data situation), can one come to a well informed decision about whether and what anonymisation is needed.”
  • 4. Controlling access to research data (security): why and when?
  • 5. • Who might share data? • Distinct generator and user • Share data across a consortium • How is ‘sharing’ achieved? • Physically transfer data to a user • Provide access to analyse • Analysis on-site • Remote analysis • Federated analysis • All interpretations valid and important What does “sharing” research microdata mean?
  • 6. • Management of intellectual property invested and held in data – most areas of research • Legal, ethical and other governance stipulations to protect the welfare of research participants – particularly in health/social/biomedical research • Disclosure of identity • Disclosure of associated information • Balance between these and the societal benefits of streamlined comprehensive data access – which is evolving rapidly with time and social context Why control research data at all?
  • 7. The Research Data Pipeline When are data “at risk”?
  • 8. The Research Data Pipeline When are data “at risk”? Dissemination and evidence based action
  • 9. The Research Data Pipeline When are data “at risk”? Dissemination and evidence based action
  • 10. • Risks associated with: storage; transmission; use • Accidental v deliberate violations • Direct v inferential disclosure • Risks and remedies lie in the nature of the data themselves and the contextual environment in which the data are to be used – and potentially misused • Mark Elliot, Elaine Mackey, Keith Spicer, Caroline Tudor, the Anonymisation Decision-Making Framework, 2016 Issues to consider
  • 11. • Consider the user(s) • Are he/she/they bona fide researchers? • Consider the application – for example: • Does it violate (or potentially violate) any of the ethical permissions granted to the study or any of the consent forms signed by the participants or their guardians? • Is there a risk it may produce information that may allow individual cohort members to be identified? How to implement control in practice? UK MetaDAC and ALSPAC as illustrative examples
  • 12. • Administrative and research data held separately • Hard copies of data held in locked storage • Electronic data held on password protected systems with access restricted to those who really need it • All electronic data held in encrypted form • Extensive QC (security of quality) • Multiple back-ups (security of existence) Managing the data and the data environment
  • 13. • All data pseudonomised before release • If pseudonomisation scientifically impossible, data can be analysed ‘on site’ • All data transfers encrypted using standard protocols • All linked data released on study-specific IDs • Explicit acknowledgment that no system can guarantee a zero risk of disclosure or misuse of data Managing the data and the data environment
  • 14. • A strong underpinning governance structure is essential. • EAGDA (Expert Advisory Group on Data Access) report 2015 considered, amongst many other key issues that: EAGDA report, 2015 • Governance must be proportionate and context appropriate • Must be transparent, auditable and appealable • Need mutual trust and respect amongst stakeholders
  • 15. • Applicants for data through MetaDAC or from ALSPAC sign up agreeing to governance documents which include statements such as: • Applicants are reminded that the Terms and Conditions for the cohort explicitly forbid any attempt to identify individuals or to compromise or otherwise infringe the confidentiality of information on data subjects and their right to privacy. • Do you understand that you must not pass on any data or samples awarded, or any derived variables or genotypes generated by this application to a third party (i.e. to anybody that is not included in this list of applicants on this project, nor is a direct employee of one of these applicants)? How to implement control in practice? UK MetaDAC and ALSPAC as illustrative examples
  • 16. Role of encryption and other technology-based forms of privacy protection in “open science”
  • 17. • When research data are very sensitive or are seen as having a particular intellectual property value can we develop technology-based solutions that facilitate access to microdata by enhancing privacy protection so that all intellectual property and governance constraints are met in full while lowering the governance bar? This can promote open science by easing and/or speeding up access requests • Should be seen as an additional component to be applied on top of a data access and governance system that is already well founded • EAGDA report emphasises sustainability Privacy protection in “open science”
  • 18. Data Computer DC Analysis Computer AC Single site DataSHIELD 2009: The DataSHIELD challenge Given that microdata are scientifically critical and yet potentially sensitive, can we ensure that the information driving analysis of the data at each centre only ever emerges from the firewall in non-disclosive form? (i) encryption (trivial and non-trivial); (ii) low dimensional (ideally sufficient) statistics Multi-site DataSHIELD horizontally partitioned data
  • 19. • One step analyses: e.g. ds.table2D - request non-disclosive output from all sources • Multi-step analyses: e.g. ds.lexis – set up and then request • Iterative analyses: e.g. ds.glm - parallel processes linked together by non- identifying summary statistics – e.g. for glm = score vectors and information matrices • Can be used as equivalent to full individual level analysis or to study level meta-analysis The DataSHIELD solution
  • 21. Information Matrix Study 5 Score vector Study 5 Summary Statistics (1) [36, 487.2951, 487.2951, 149] Information Matrix Study 5 Score vector Study 5 Summary Statistics (1) DataSHIELD
  • 22. Σ Information Matrix Study 5 Score vector Study 5 Summary Statistics (1) [36, 487.2951, 487.2951, 149] Information Matrix Study 5 Score vector Study 5 Summary Statistics (1) DataSHIELD
  • 23. b.vector<- c(-0.322, 0.0223, 0.0391, 0.535) Analysis commands (2) glm(cc~1+BMI+BMI.456+SNP, family=binomial, start=b.vector, maxit=1) DataSHIELD
  • 24. and so on .....
  • 25. Updated parameters (4) Σ Coefficient Estimate Std Error Intercept -0.3296 0.02838 BMI 0.02300 0.00621 BMI.456 0.04126 0.01140 SNP 0.5517 0.03295 Final parameter estimates DataSHIELD
  • 26. DataSHIELD analysis Direct conventional analysis Parameter Coefficient Standard Error bintercept -0.3296 0.02838 bBMI 0.02300 0.00621 bBMI.456 0.04126 0.01140 bSNP 0.5517 0.03295 Coefficients: Estimate Std. Error (Intercept) -0.32956 0.02838 BMI 0.02300 0.00621 BMI.456 0.04126 0.01140 SNP 0.55173 0.03295 Does it work?
  • 27. Server-side functions Client-side functions Individual level data never transmitted or seen by the statistician in charge, or by anybody outside the original centre in which they are stored. R R R R Web services Web servicesWeb services Data server Opal Finrisk Opal Prevend Opal 1958BC Data server Data server BioSHaRE web site Web services Analysis client DataSHIELD: current implementation for horizontally partitioned data
  • 28. IM5: Analysis Computer R R R R Web services Web servicesWeb services Data computer Opal NHS Opal ALSPAC Opal Education Data computer Data computer Regression coefficients = XTY/ XTX XTX: Need to calculate XAXA XAXB XAXC XAXB XBXB XBXC XAXC XBXC XCXC XA XB XAXB XA1 * XB1 + XA2 * XB2 + XA3 * XB3 + …… DataSHIELD: current implementation for vertically partitioned (linked) data
  • 29. IM5: Analysis Computer R R R R Web services Web servicesWeb services Data computer Opal NHS Opal ALSPAC Opal Education Data computer Data computer Regression coefficients = XTY/ XTX XTX: Need to calculate XAXA XAXB XAXC XAXB XBXB XBXC XAXC XBXC XCXC MA MB MC XA XB XAXB XA1 * XB1 + XA2 * XB2 + XA3 * XB3 + …… DataSHIELD:current implementationfor vertically partitioned(linked) data plain.text.vector.A plain.text.vector.N 0 1 1 1 0 0 1 1 1 0 1 0 0 1 encryption.matrix [,1] [,2] [,3] [1,] -1.444769 2.495677 -5.322736 [2,] -1.355529 -9.369041 2.687347 [3,] 4.603762 -3.622044 -2.817478 occluded.matrix.A [,1] [,2] [,3] [1,] -1.4546711 0 4.0722205 [2,] 6.4809785 1 -4.5814726 [3,] 4.4954801 1 -8.7036260 [4,] 0.1995684 1 -8.6872205 [5,] -6.4060220 0 -6.6471777 [6,] -0.5164345 0 -0.2564673 [7,] -5.8981933 1 -8.5032852
  • 30. IM5: Analysis Computer R R R R Web services Opal NHS Opal ALSPAC Opal Education Data computer Data computer Regression coefficients = XTY/ XTX XTX: Need to calculate XAXA XAXB XAXC XAXB XBXB XBXC XAXC XBXC XCXC MA XT A MAXT AXBMB MA XA XB MB (MA)-1 MAXT AXBMB (MB)-1 = XAXB DataSHIELD:current implementationfor vertically partitioned(linked) data plain.text.vector.A plain.text.vector.N 0 1 1 1 0 0 1 1 1 0 1 0 0 1 encryption.matrix [,1] [,2] [,3] [1,] -1.444769 2.495677 -5.322736 [2,] -1.355529 -9.369041 2.687347 [3,] 4.603762 -3.622044 -2.817478 occluded.matrix.A [,1] [,2] [,3] [1,] -1.4546711 0 4.0722205 [2,] 6.4809785 1 -4.5814726 [3,] 4.4954801 1 -8.7036260 [4,] 0.1995684 1 -8.6872205 [5,] -6.4060220 0 -6.6471777 [6,] -0.5164345 0 -0.2564673 [7,] -5.8981933 1 -8.5032852
  • 32. Becca Wilson If people want to know technical details about DataSHIELD or methods for secure data sharing/analysis: see 12th September 11:30 - 13:00 Secure Multiparty Computation for Statistical Analysis of Private Data Demetris Avraam Poster #12 RDA poster session Wednesday, Thursday, Friday – DataSHIELD: a method for privacy protected analysis of individual level data RDA Working Group for Data Security and Trust RDA 8th Plenary in the same venue as the NISO symposium. Session on 17th September 11:00 - 12:30. We are running a survey to gather information on current data security practices in our community. The survey is available at www.bit.ly/dash-ing (see below) Data to Knowledge (D2K) Research Group. Contact details: @Data2Knowledge there is also a "contact us" page on www.datashield.ac.uk Setting up a professional community for stakeholders in health data sharing DASH-ING: DAta Sharing for Health - INnovation Group The website will initially (and temporarily) be at: www.bit.ly/dash-ing This webpage contains questions for RDA survey and link to join the professional community Additional opportunities for interaction
  • 33. THANK YOU FOR LISTENING
  • 34. > plain.text.vector.L [1] 0 1 1 1 0 0 1 > plain.text.vector.N [1] 1 1 0 1 0 0 1 > sum(plain.text.vector.L*plain.text.matrix.N) [1] 3 >t(matrix(plain.text.vector.L))%*%matrix(plain.text.vector.N) [,1] [1,] 3 How does matrix-based encryption work?
  • 35. > occluded.matrix.L > plain.text.vector.L [,1] [,2] [,3] [1] 0 1 1 1 0 0 1 [1,] -1.4546711 0 4.0722205 [2,] 6.4809785 1 -4.5814726 [3,] 4.4954801 1 -8.7036260 [4,] 0.1995684 1 -8.6872205 [5,] -6.4060220 0 -6.6471777 [6,] -0.5164345 0 -0.2564673 [7,] -5.8981933 1 -8.5032852 > e.mat.L [,1] [,2] [,3] [1,] -1.444769 2.495677 -5.322736 [2,] -1.355529 -9.369041 2.687347 [3,] 4.603762 -3.622044 -2.817478 > e.mat.L%*%occluded.matrix.L [,1] [,2] [,3] [,4] [,5] [,6] [,7] [1,] -19.57369 17.51813 42.32785 48.44713 44.636397 2.11123627 56.277949 [2,] 12.91532 -30.46620 -38.85246 -32.98514 -9.179719 0.01082581 -24.225142 [3,] -18.17035 39.12303 41.59635 21.77277 -10.763524 -1.65495077 -6.818104 How does matrix-based encryption work?
  • 36. > e.mat.L%*%occluded.matrix.L [,1] [,2] [,3] [,4] [,5] [,6] [,7] [1,] -19.57369 17.51813 42.32785 48.44713 44.636397 2.11123627 56.277949 [2,] 12.91532 -30.46620 -38.85246 -32.98514 -9.179719 0.01082581 -24.225142 [3,] -18.17035 39.12303 41.59635 21.77277 -10.763524 -1.65495077 -6.818104 > plain.text.vector.N [1] 1 1 0 1 0 0 1 > e.mat.L%*%occluded.matrix.L%*% plain.text.matrix.N [,1] [1,] 102.66952 [2,] -74.76116 [3,] 35.90735 > inv.e.mat.L%*%e.mat.L%*%occluded.matrix.L%*% plain.text.matrix.N [,1] [1,] -0.6723174 [2,] 3.0000000 [3,] -17.6997578 > sum(plain.text.vector.L*plain.text.matrix.N) [1] 3 How does matrix-based encryption work?
  • 37. > plain.text.vector.L [1] 0 1 1 1 0 0 1 > e.mat.1 [,1] [1,] 7.13763 > e.mat.1%*%t(matrix(plain.text.vector.L)) [,1] [,2] [,3] [,4] [,5] [,6][,7] [1,] 0 7.13763 7.13763 7.13763 0 0 7.13763 >e.mat.1%*%t(matrix(plain.text.vector.L))%*%plain.text.matrix.N [,1] [1,] 21.41289 >(1/e.mat.1)*e.mat.1%*%t(matrix(plain.text.vector.L))%*%plain.tex t.matrix.N [,1] [1,] 3 Why do we need to occlude the original plain text vector?
  • 38. • Is there a significant risk of upsetting or alienating cohort members or of reducing their willingness to remain as active participants? • Does it address topics that fall within the acknowledged scientific remit of the cohort? • Is access requested to an infinite resource (data or cell line DNA) or a depletable resource. If non-depletable NO assessment of the science underpinning the application UK MetaDAC and ALSPAC as illustrative examples
  • 39. • Wish to control access • Undesirable loss of intellectual property • Violation of legal, ethical and other governance stipulations – particularly disclosure of identity and/or associated information • Wish to ensure data used widely for scientific research and that access procedures are streamlined • Data and contextual “data environment” both crucial and control systems are typically complex and multi-faceted How should access be controlled?