This briefing document provides information on various public and private funding opportunities for UK creative industries businesses. It summarizes several public funding calls from Innovate UK and other organizations that are open for applications in areas such as building performance, childcare, the circular economy, urban data challenges, and interactions between people and machines. It also lists other public funding resources from organizations like the BFI Film Fund, Creative England, Creative United, Nesta Impact Investment, and the Open Project Funding program in Scotland.
These are slides taken from the Digital Catapult's Integration of Health and Social Care Pit Stop, where innovators, SMEs, entrepreneurs gathered to solve health and social care issues.
Consent Receipts: The Future of Personal Data - Michele Nati - Lead Technolog...MicheleNati
Â
This document summarizes Michele Nati's presentation on consent receipts at the MyData 2016 conference. The presentation discussed the potential for consent receipts to standardize and provide transparency around personal data sharing. It described how consent receipts could document an individual's consent to have their data processed and shared. The presentation also outlined a proposed process for issuing consent receipts and the development of a consent receipt ecosystem involving various stakeholders. It discussed early trials conducted to explore the design and value of consent receipts from consumers' perspectives.
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...MicheleNati
Â
The document discusses opportunities and challenges around using blockchain technology for personal data. It outlines financial benefits of sharing personal data but also barriers around trust, consent, and control. Blockchain could help create a personal data ecosystem by linking data together, granting access and control, and building trust between parties. However, challenges include privacy, identity verification, and dealing with malicious behavior. Governance is also an open issue in decentralized systems like blockchain.
Collaborative Working @ Digital Catapult - Digital Catapult - Michele NatiMicheleNati
Â
The Digital Catapult aims to rapidly advance the UK's best digital ideas through collaboration. It works with partners in areas along the data value chain like internet of things devices and closed organizational data. For personal data sharing, it takes a collaborative approach to build trust by empowering consumers and addressing technical, legal, and commercial friction. Its Data Catalyser project aims to safely mix closed data and let innovators experiment to identify new values. It is also working with Camden Council to co-create internet of things use cases like smart parking and pollution reduction through a collaborative workshop.
This briefing document provides information on various public and private funding opportunities for UK creative industries businesses. It summarizes several public funding calls from Innovate UK and other organizations that are open for applications in areas such as building performance, childcare, the circular economy, urban data challenges, and interactions between people and machines. It also lists other public funding resources from organizations like the BFI Film Fund, Creative England, Creative United, Nesta Impact Investment, and the Open Project Funding program in Scotland.
These are slides taken from the Digital Catapult's Integration of Health and Social Care Pit Stop, where innovators, SMEs, entrepreneurs gathered to solve health and social care issues.
Consent Receipts: The Future of Personal Data - Michele Nati - Lead Technolog...MicheleNati
Â
This document summarizes Michele Nati's presentation on consent receipts at the MyData 2016 conference. The presentation discussed the potential for consent receipts to standardize and provide transparency around personal data sharing. It described how consent receipts could document an individual's consent to have their data processed and shared. The presentation also outlined a proposed process for issuing consent receipts and the development of a consent receipt ecosystem involving various stakeholders. It discussed early trials conducted to explore the design and value of consent receipts from consumers' perspectives.
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...MicheleNati
Â
The document discusses opportunities and challenges around using blockchain technology for personal data. It outlines financial benefits of sharing personal data but also barriers around trust, consent, and control. Blockchain could help create a personal data ecosystem by linking data together, granting access and control, and building trust between parties. However, challenges include privacy, identity verification, and dealing with malicious behavior. Governance is also an open issue in decentralized systems like blockchain.
Collaborative Working @ Digital Catapult - Digital Catapult - Michele NatiMicheleNati
Â
The Digital Catapult aims to rapidly advance the UK's best digital ideas through collaboration. It works with partners in areas along the data value chain like internet of things devices and closed organizational data. For personal data sharing, it takes a collaborative approach to build trust by empowering consumers and addressing technical, legal, and commercial friction. Its Data Catalyser project aims to safely mix closed data and let innovators experiment to identify new values. It is also working with Camden Council to co-create internet of things use cases like smart parking and pollution reduction through a collaborative workshop.
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-decke-SIDES.eu
Â
This document summarizes a workshop session on value-centric big data. The session included presentations on several projects aiming to develop big data technologies and applications in an ethical manner that respects privacy and provides value. Speakers discussed challenges around privacy, profiling, and ensuring equitable and fair treatment when using big data. They also shared proposed solutions and best practices for addressing these challenges developed through their projects. The session concluded with an open discussion on experiences and approaches to overcoming barriers to responsible big data innovation.
Digital Inclusion and Meaningful Broadband Adoption Initiatives Colin Rhinesm...Ed Dodds
Â
This document summarizes a report on digital inclusion and meaningful broadband adoption initiatives. It discusses four key activities of digital inclusion organizations: 1) providing low-cost broadband, 2) connecting digital literacy training to relevant content and services, 3) making low-cost computers available, and 4) operating public access computing centers. It notes the importance of partnerships, citywide initiatives, concerns about sustainability, and the need for outcomes-based evaluation frameworks. The goal is to help policymakers and others understand how to promote meaningful broadband adoption for low-income individuals and families.
Gunnar Hellekson - Open Source: A Platform for Government InnovationAlfresco Software
Â
The document discusses the benefits of open source platforms for government innovation. It argues that opening up technology standards and development allows for greater collaboration, lowers costs through shared development, and engages citizens and outside developers in the process. Examples are given of governments that saved money and time by adopting open source solutions and collaborating with other agencies and states.
The document provides updates from HDI Capital Area and HDI Corporate. It announces upcoming meetings in November and December. It also lists current sponsors and their sponsorship levels. It informs members about free consulting services available from select sponsors and calls for submissions for the HDI Awards and AOY/DST Awards. It advertises special offers on Knowledge-Centered Support Fundamentals certification and opportunities to renew membership or join HDI.
Big Data Public-Private Forum_General PresentationBIG Project
Â
The BIG project aims to establish a public-private forum on big data in Europe. It will bring together stakeholders from industry and research to develop a shared vision for big data in Europe over the next 5-10 years. The project will identify existing big data technologies, understand how big data can be applied across sectors, and develop roadmaps for specific sectors. It seeks to increase European competitiveness and position big data research priorities in the EU framework program Horizon 2020. The project is coordinated across four work packages covering management, strategy and operations, dissemination, and establishing the public-private forum.
The document summarizes REACH, a European incubator program that aims to boost data-driven innovation. Over 3 years, REACH will select and fund over 100 startups and SMEs through 11-month incubation programs. It will connect these companies with large corporations and Digital Innovation Hubs to help develop new Data Value Chains. The incubator seeks to break down data silos and enable multi-stakeholder collaboration across sectors to generate sustainable solutions using data analytics. DIHs play a key role by defining challenges, sharing relevant regional data, and supporting startups throughout the incubation process.
The document summarizes information about the Centre for Business Innovation (CfBI) and its Open Innovation meets Big Data Consortium.
The CfBI manages blue-chip consortia around emerging technology and business areas through annual membership subscriptions. The Open Innovation meets Big Data Consortium focuses on commercial opportunities around trading data between partners. Current members include companies in packaging, communications, media, financial transactions, and universities. Upcoming activities will examine implications of data policy and opportunities in smart supply chains and adding value to location data. Corporate participation in the consortium costs ÂŁ10k per year.
Innovation Accelerators:
Defining Characteristics Among Startup Assistance Organizations by C. Scott Dempwolf, Jennifer Auer, and
Michelle DâIppolito
Optimal Solutions Group, LLC
College Park, MD 20740
contract number SBAHQ -13-M-0197
Release Date: October 2014
This report was developed under a contract with the Small Business Administration, Office of Advocacy, and contains information and analysis that were reviewed by officials of the Office of Advocacy. However, the final conclusions of the report do not necessarily reflect the views of the Office of Advocacy.
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 2 Issue 4, 22 - 28 Jan 2018. A weekly newsletter curating news and events relating to blockchain and healthcare by Sean Manion, CEO of Science Distributed.
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...David Rozas
Â
Presentation at "Validation rules for blockchain research: International workshop on scholarly blockchain research priorities" - Institute for Information Law, University of Amsterdam (Amsterdam, 04/12/2018).
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...MicheleNati
Â
The document summarizes Michele Nati's presentation on open innovation in the UK. Some key points:
- Catapults are government-initiated non-profits that connect business and research to commercialize ideas. They provide expertise, funding, and workspaces to support innovation.
- The Digital Catapult focuses on unlocking value from data through platforms like Data Catalyser that enable secure data sharing between organizations.
- The Personal Data and Trust Network is a community of over 500 members from companies, universities, and other groups that works to advance trust and innovation around personal data use and exchange.
My sCool Server Brochure - Portrait layoutShrenik Bhura
Â
A brief introduction to Recherche Tech and our flagship product, the My sCool Server - Linux powered teaching solution.
Recherche Tech, with its My sCool Server offering aims to usher in a socioeconomic revolution by making computer literacy and therefore digital inclusion affordable and achievable across the social strata.
My sCool Server is a device, primarily for school labs, that makes all computers in the wired network usable and useful instantly.
It is the next generation in computing and learning convenience. It has been custom built and packaged, keeping in mind the challenges faced by schools and students in the ever evolving, fast-paced literary landscape.
It is an optimised combination of hardware and software built upon proven technologies that our core team has command over for more than 20 man years.
Herein are some of the advantages that the MSS presents to its users:
A1 No knowledge of installing, configuring, or updating Linux required. The teaching process can start immediately in conjunction with the textbook content.
A2 Broadcast lessons to each student's desk. Close monitoring, one-to-one communication and attention to every student's progress is possible.
A3 Extends lifespan of existing systems. Save on power and AMC. Channelise funds to infrastructure and training activities.
A4 Now buy many more end user systems for the same budget. Laboratories can be re-laid to accommodate more machines.
A5 Helps create live copies of the Linux OS and applications to practice the lessons at home and explore Linux completely.
A6 Requires no installation of any additional modules or purchasing custom client hardware from a particular vendor.
A7 An integrated platform to host training web-content offline. No internet required to access 5000+ world-class audio-visual resources.
A8 Restore the MSS to its fully functional state with a few button presses without complicated re-installation or re-configuration steps.
A9 No limitations of users who can use the MSS. Delivering high productivity and promoting creativity is the only mission.
A10 Teacher can work in Windows OS and yet simultaneously monitor the students over the Linux environment.
A11 The technologies comprising the product are proven the world across. Recherche team has 20+ man years of open source solutioning expertise.
A12 Internet is rapidly reaching to each corner of the country. MSS is designed to meet the future needs of secure internet access and sharing.
To know more, visit http://www.myscoolserver.com .
Trust and identity in the GĂŠant project - Networkshop44Jisc
Â
The document discusses trust and identity in the GĂANT project. It provides an overview of how identity federations currently work through interoperability via eduGAIN [1]. It then discusses how research environments are becoming more complex, requiring identity solutions that can support more flexible collaboration beyond local campuses [2]. Finally, it outlines some developments underway through the GĂANT project to develop tools and services that can help balance risk while enabling attribute sharing to better support modern research needs like those of the LIGO collaboration [3].
Big data roadmap and cross-disciplinary community for addressing societal externalities
BYTE Community Overview
Edward Curry
Insight @ NUI Galway
BYTE Work Package 8 Leader
2nd webinar dedicated to the 2nd open call of the DAPSI project.
Agenda:
-What is DAPSI
-Data Portability challenges
-How to apply
-Incubation Programme
-Infrastructure and Tools
-Q&A
Presentation 2 of 2 by Ermo Taks, senior consultant in E-governance architectures and interoperability, Estonia, at seminar 2, held on 18 March 2021, which addresses digital government principles and building blocks. This 2nd event takes place in the framework of a series of three webinars organised by the SIGMA Programme, a joint initiative of the OECD and EU, principally financed by the EU, on the role of life events in end-to-end public service delivery.
Open Innovation in the UK - Digital Catapult - Michele NatiMicheleNati
Â
The Digital Catapult is a UK organization that aims to advance digital innovation through open innovation. It operates several platforms to connect businesses, researchers, and developers. The Copyright Hub is one platform that aims to simplify copyright licensing for digital content. It allows users to search for images and license them for use. The Data Catalyser is another platform that helps unlock value from closed organizational and personal data through data mixing and analytics, while maintaining privacy and trust.
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-decke-SIDES.eu
Â
This document summarizes a workshop session on value-centric big data. The session included presentations on several projects aiming to develop big data technologies and applications in an ethical manner that respects privacy and provides value. Speakers discussed challenges around privacy, profiling, and ensuring equitable and fair treatment when using big data. They also shared proposed solutions and best practices for addressing these challenges developed through their projects. The session concluded with an open discussion on experiences and approaches to overcoming barriers to responsible big data innovation.
Digital Inclusion and Meaningful Broadband Adoption Initiatives Colin Rhinesm...Ed Dodds
Â
This document summarizes a report on digital inclusion and meaningful broadband adoption initiatives. It discusses four key activities of digital inclusion organizations: 1) providing low-cost broadband, 2) connecting digital literacy training to relevant content and services, 3) making low-cost computers available, and 4) operating public access computing centers. It notes the importance of partnerships, citywide initiatives, concerns about sustainability, and the need for outcomes-based evaluation frameworks. The goal is to help policymakers and others understand how to promote meaningful broadband adoption for low-income individuals and families.
Gunnar Hellekson - Open Source: A Platform for Government InnovationAlfresco Software
Â
The document discusses the benefits of open source platforms for government innovation. It argues that opening up technology standards and development allows for greater collaboration, lowers costs through shared development, and engages citizens and outside developers in the process. Examples are given of governments that saved money and time by adopting open source solutions and collaborating with other agencies and states.
The document provides updates from HDI Capital Area and HDI Corporate. It announces upcoming meetings in November and December. It also lists current sponsors and their sponsorship levels. It informs members about free consulting services available from select sponsors and calls for submissions for the HDI Awards and AOY/DST Awards. It advertises special offers on Knowledge-Centered Support Fundamentals certification and opportunities to renew membership or join HDI.
Big Data Public-Private Forum_General PresentationBIG Project
Â
The BIG project aims to establish a public-private forum on big data in Europe. It will bring together stakeholders from industry and research to develop a shared vision for big data in Europe over the next 5-10 years. The project will identify existing big data technologies, understand how big data can be applied across sectors, and develop roadmaps for specific sectors. It seeks to increase European competitiveness and position big data research priorities in the EU framework program Horizon 2020. The project is coordinated across four work packages covering management, strategy and operations, dissemination, and establishing the public-private forum.
The document summarizes REACH, a European incubator program that aims to boost data-driven innovation. Over 3 years, REACH will select and fund over 100 startups and SMEs through 11-month incubation programs. It will connect these companies with large corporations and Digital Innovation Hubs to help develop new Data Value Chains. The incubator seeks to break down data silos and enable multi-stakeholder collaboration across sectors to generate sustainable solutions using data analytics. DIHs play a key role by defining challenges, sharing relevant regional data, and supporting startups throughout the incubation process.
The document summarizes information about the Centre for Business Innovation (CfBI) and its Open Innovation meets Big Data Consortium.
The CfBI manages blue-chip consortia around emerging technology and business areas through annual membership subscriptions. The Open Innovation meets Big Data Consortium focuses on commercial opportunities around trading data between partners. Current members include companies in packaging, communications, media, financial transactions, and universities. Upcoming activities will examine implications of data policy and opportunities in smart supply chains and adding value to location data. Corporate participation in the consortium costs ÂŁ10k per year.
Innovation Accelerators:
Defining Characteristics Among Startup Assistance Organizations by C. Scott Dempwolf, Jennifer Auer, and
Michelle DâIppolito
Optimal Solutions Group, LLC
College Park, MD 20740
contract number SBAHQ -13-M-0197
Release Date: October 2014
This report was developed under a contract with the Small Business Administration, Office of Advocacy, and contains information and analysis that were reviewed by officials of the Office of Advocacy. However, the final conclusions of the report do not necessarily reflect the views of the Office of Advocacy.
Blockchain Healthcare Situation Report (BC/HC SITREP) Volume 2 Issue 4, 22 - 28 Jan 2018. A weekly newsletter curating news and events relating to blockchain and healthcare by Sean Manion, CEO of Science Distributed.
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...David Rozas
Â
Presentation at "Validation rules for blockchain research: International workshop on scholarly blockchain research priorities" - Institute for Information Law, University of Amsterdam (Amsterdam, 04/12/2018).
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...MicheleNati
Â
The document summarizes Michele Nati's presentation on open innovation in the UK. Some key points:
- Catapults are government-initiated non-profits that connect business and research to commercialize ideas. They provide expertise, funding, and workspaces to support innovation.
- The Digital Catapult focuses on unlocking value from data through platforms like Data Catalyser that enable secure data sharing between organizations.
- The Personal Data and Trust Network is a community of over 500 members from companies, universities, and other groups that works to advance trust and innovation around personal data use and exchange.
My sCool Server Brochure - Portrait layoutShrenik Bhura
Â
A brief introduction to Recherche Tech and our flagship product, the My sCool Server - Linux powered teaching solution.
Recherche Tech, with its My sCool Server offering aims to usher in a socioeconomic revolution by making computer literacy and therefore digital inclusion affordable and achievable across the social strata.
My sCool Server is a device, primarily for school labs, that makes all computers in the wired network usable and useful instantly.
It is the next generation in computing and learning convenience. It has been custom built and packaged, keeping in mind the challenges faced by schools and students in the ever evolving, fast-paced literary landscape.
It is an optimised combination of hardware and software built upon proven technologies that our core team has command over for more than 20 man years.
Herein are some of the advantages that the MSS presents to its users:
A1 No knowledge of installing, configuring, or updating Linux required. The teaching process can start immediately in conjunction with the textbook content.
A2 Broadcast lessons to each student's desk. Close monitoring, one-to-one communication and attention to every student's progress is possible.
A3 Extends lifespan of existing systems. Save on power and AMC. Channelise funds to infrastructure and training activities.
A4 Now buy many more end user systems for the same budget. Laboratories can be re-laid to accommodate more machines.
A5 Helps create live copies of the Linux OS and applications to practice the lessons at home and explore Linux completely.
A6 Requires no installation of any additional modules or purchasing custom client hardware from a particular vendor.
A7 An integrated platform to host training web-content offline. No internet required to access 5000+ world-class audio-visual resources.
A8 Restore the MSS to its fully functional state with a few button presses without complicated re-installation or re-configuration steps.
A9 No limitations of users who can use the MSS. Delivering high productivity and promoting creativity is the only mission.
A10 Teacher can work in Windows OS and yet simultaneously monitor the students over the Linux environment.
A11 The technologies comprising the product are proven the world across. Recherche team has 20+ man years of open source solutioning expertise.
A12 Internet is rapidly reaching to each corner of the country. MSS is designed to meet the future needs of secure internet access and sharing.
To know more, visit http://www.myscoolserver.com .
Trust and identity in the GĂŠant project - Networkshop44Jisc
Â
The document discusses trust and identity in the GĂANT project. It provides an overview of how identity federations currently work through interoperability via eduGAIN [1]. It then discusses how research environments are becoming more complex, requiring identity solutions that can support more flexible collaboration beyond local campuses [2]. Finally, it outlines some developments underway through the GĂANT project to develop tools and services that can help balance risk while enabling attribute sharing to better support modern research needs like those of the LIGO collaboration [3].
Big data roadmap and cross-disciplinary community for addressing societal externalities
BYTE Community Overview
Edward Curry
Insight @ NUI Galway
BYTE Work Package 8 Leader
2nd webinar dedicated to the 2nd open call of the DAPSI project.
Agenda:
-What is DAPSI
-Data Portability challenges
-How to apply
-Incubation Programme
-Infrastructure and Tools
-Q&A
Presentation 2 of 2 by Ermo Taks, senior consultant in E-governance architectures and interoperability, Estonia, at seminar 2, held on 18 March 2021, which addresses digital government principles and building blocks. This 2nd event takes place in the framework of a series of three webinars organised by the SIGMA Programme, a joint initiative of the OECD and EU, principally financed by the EU, on the role of life events in end-to-end public service delivery.
Open Innovation in the UK - Digital Catapult - Michele NatiMicheleNati
Â
The Digital Catapult is a UK organization that aims to advance digital innovation through open innovation. It operates several platforms to connect businesses, researchers, and developers. The Copyright Hub is one platform that aims to simplify copyright licensing for digital content. It allows users to search for images and license them for use. The Data Catalyser is another platform that helps unlock value from closed organizational and personal data through data mixing and analytics, while maintaining privacy and trust.
IoTMeetupGuildford#6: Machine Intelligence For the IoT - Laure Andrieux - Ais...MicheleNati
Â
This document discusses using machine learning and artificial intelligence to help manage and analyze data from internet of things (IoT) devices to assist with tasks like assisted living. Machine learning can help harness IoT data by learning individual specifics over time, adapting to changing contexts, and delivering personalized recommendations without needing to explicitly program every interaction. The AISEEDO Machine Intelligence cloud service applies predictive modeling, online learning, and real-time data fusion to IoT data streams to build context-aware solutions and insights that can adapt to evolving environments.
For more details on contextual apps visit: http://emberify.com/blog
Using the sensors in the mobile phone, developers can build enriched apps. The simple lifecycle of Sense, Understand and Adapt can be implemented in an app using simple APIs. What sets contextual apps apart from other mobile apps is their ability to figure out your needs and anticipate your interests. . Apps like Google Now, Tempo, Sherpa, Sunrise and Cortana use a contextual lifecycle to predict habits and interests. Using APIs to access the GPS, accelerometer, social networks, Gyroscope and other information from the device developers can easily create context aware.
Tizen apps with Context Awareness and Machine LearningShashwat Pradhan
Â
Using mobile sensor data tuned with Machine Learning models, developers can build advance context aware apps. The simple contextual lifecycle of Sense, Understand and Adapt can be implemented using simple APIs. The presentation focuses on User Experience and future applications with context. Machine Learning models on top of the sensor data will give developers better understanding about the user.
This document discusses connecting IoT devices and systems to the FIWARE Lab ecosystem. It provides an overview of the FIWARE IoT proposal and community. It then describes the most common scenarios for connecting IoT providers and consumers to the FIWARE Context Broker using the IDAS/SBC Ultralight 2.0 protocol. Step-by-step instructions are provided for registering models and devices and sending measurements and commands. Additional options for connecting IoT systems like MQTT and LWM2M are also mentioned.
This document discusses trends in mobile, IoT, and the web. It begins by outlining the evolution from analog to digital phones to smartphones and virtual devices. It then covers the rise of connected things through IoT. It proposes that half of connected devices will be small IoT devices. The document considers bringing small devices into the web ecosystem and the characteristics of small connected things, proposing a simple WoT architecture without presentation layers. It also discusses the evolution of web UI/UX from keyboards to touch and NUI, and new APIs that enable hardware and sensor access. Finally, it envisions future speech applications and moving from multi-screen to non-screen multi-device contexts through rule-based and context-based invisible webs
Slides from my session for the marketing students at Windesheim College. About why performance matters to your end user, how to measure performance and what to look for when optimizing performance of your website...
Karol Kalisz, Vitaliy Rudnytskiy: Mobile in IoT Context ? Mobile Applications...Mobile Trends
Â
9.45 â 10.15 Karol Kalisz, Vitaliy Rudnytskiy - Mobile in IoT Context ? Mobile Applications in "Industry 4.0".
How mobile helps in implementations of business requirements in IoT. A view on use cases and infrastructure for IoT.
The document summarizes a session on context aware services from an IBBT Brokerage Event. The session chair was Piet Demeester and objectives included identifying research topics and interested parties. Topics discussed included the concept of context aware services, market potential, challenges, and requirements. Major challenges identified were accurate indoor positioning, different sensor types, communication between devices, and representing context information standardized. The session identified several interested parties and concluded that context detection infrastructure, context aware devices, service architectures, and addressing security, user requirements, and business models were important areas.
Taming Context in the Internet of ThingsWebVisions
Â
As we continue to stitch our physical world together with digital information, context is becoming harder to manage and understand. Everything we do or buy is potentially connected to everything else, complicating the meaning of our everyday actions. How do we insure that the networked "things" we put into the world make sense as part a human environment? The answers have less to do with the devices we make than with the way people perceive and comprehend their surroundings.
Using everyday examples and practical models, this talk shows how we can figure out the contextual angles underlying the experiences of your product's or service's users and customers.
Context refers to information that can characterize an entity's situation, such as a user's location, identity, activity, time, nearby objects and people. Context-aware computing uses sensors to automatically collect context and adapt applications and services to the user's context. There is a need for context-aware computing because computers lack the implicit contextual cues that humans use in communication. Context-aware applications can make interactions between humans and computers more natural by tailoring information and services to the user's changing context.
The document discusses context and contextual design. It provides an overview of the ICT&S Center at the University of Salzburg and defines context as any information that can be used to characterize the situation of an entity. The document reviews several models of context, including those proposed by Schmidt, Abowd and Mynatt, Tarasevich, Bradley and Dunlop, and Grill and Tscheligi.
This document outlines Netflix's culture of freedom and responsibility. It discusses that Netflix values high performance over loyalty or effort. The document emphasizes that Netflix aims to attract and retain "stunning colleagues" who embody nine key values: judgment, communication, impact, curiosity, innovation, courage, passion, honesty, and selflessness. It explains Netflix gives employees freedom but expects responsibility in return. Those who do not meet performance standards are let go, to make way for higher performers. The goal is to sustain success over many generations by maintaining a culture of excellence.
London data and digital masterclass for councillors slides 14-Feb-20LG Inform Plus
Â
On 14th February 2020, the Local Government association ran a masterclass discussion day for councillors and elected members on data and digital transformation in local government. It took place in London. This is the slide set that was used to steer discussions
Delivering value through data future agenda 2019Future Agenda
Â
Delivering value through data - final report. Throughout 2018, Future Agenda canvassed the views of a wide range of 900 experts with different backgrounds and perspectives from around the world, to provide their insights on the future value of data. Supported by Facebook and many other organisations, we held 30 workshops across 24 countries in Africa, Asia, the Americas, and Europe. In them, we reviewed the data landscape across the globe, as it is now, and how experts think it will evolve over the next five to ten years.
The aim? To gain a better understanding of how perspectives and priorities differ across the world, and to use the diverse voices and viewpoints to help governments, organisations, and individuals to better understand what they need to do to realise dataâs full potential.
We are not aware of any other exercise of this scale or scope. No other project we know of has carefully and methodically canvassed the views of such a wide range of experts from such a diverse range of backgrounds and geographical locations. The result, we hope, delivers a more comprehensive picture of the sheer variety of issues and views thrown up by a fast-evolving âdata economyâ than can be found elsewhere. And, by providing this rich set of perspectives, we aim to help businesses and governments - to develop the policies, strategies, and innovations that realise the full potential of data (personal, social, economic, commercial), while addressing potential harms, both locally and globally.
For more details see the dedicated website www.deliveringvaluethroughdata.org
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
Â
The following presentation was given at the workshop "Technology solutions for privacy issues: what is the best way forward?" organized by e-SIDES at the BDVe Meet-up in Sofia on May 14, 2018. The workshop, chaired by Gabriella Cattaneo from IDC, involved stakeholders from ICT-18 projects.
Citizen Innovation Co Creating Social Resources, Smart Government Conf 2011Laura Sommer
Â
This document discusses approaches to public participation and co-creation between government and citizens. It outlines different levels of participation from information sharing to consultation to co-creation. New technologies have expanded opportunities for participation from basic websites and forms to social media, crowdsourcing and collaborative platforms. The document advocates starting public engagement at the beginning of the design process and involving citizens in co-creating services and policies. It provides examples of initiatives from New Zealand and other countries. Building trust, transparency, asking the right questions and demonstrating results are identified as important factors for successful public participation.
The top trends changing the landscape of Information ManagementVelrada
Â
The role of information and data in the private sector, and how employees and users interact with that information, is changing rapidly.
With endless buzzwords and hot topics, and a ream of new technologies and upgrades, it can be difficult for organisations to know where to begin or how it translates into actionable insight.
Towards data responsibility - how to put ideals into actionMindtrek
Â
Track | Sustainable and Future-proof Tech
Mikko Eloholma Accelerator of Digital skills, TIEKE
Mindtrek Conference
3rd of October 2023.
Tampere, Finland
www.mindtrek.org
This document summarizes key discussions from a World Economic Forum dialogue on personal data. The summary includes:
- The world has changed significantly with more data being collected, analyzed, and shared across networks in new ways. This creates opportunities for innovation but also risks regarding privacy, security, and other issues.
- A new approach is needed to balance these opportunities and risks, such as shifting the focus from controlling data to controlling data usage, and recognizing that context is important for flexible solutions.
- Dialogue participants discussed issues like protection and security, accountability, and evolving individual rights and responsibilities regarding personal data usage. Potential ways forward include establishing updated principles, using technology to ensure accountability and enable choices, and demonstrating how contextual
Sogeti on big data creating clarity - Report 1-4 on Big Data - Sogeti ViNTRick Bouter
Â
Since 2005, when the term âBig Dataâ was launched, Big Data has become an increasingly topical theme. In terms of technological development and business adoption, the domain of Big Data has made powerful advances; and that is putting it mildly.
In this initial report on Big Data, the first of four, we give answers to questions concerning what exactly Big Data is, where it differs from existing data classification, how the transformative potential of Big Data can be estimated, and what the current situation (2012) is with regard to adoption and planning.
VINT attempts to create clarity in these developments by presenting experiences and visions in perspective: objectively and laced with examples. But not all answers, not by a long way, are readily available. Indeed, more questions will arise â about the roadmap, for example, that you wish to use for Big Data. Or about governance. Or about the way you may have to revamp your organization. About the privacy issues that Big Data raises, such as those involving social analytics. And about the structures that new algorithms and systems will probably bring us.
http://www.ict-books.com/books/inspiration-trends
This document discusses various applications of big data across different domains. It begins by defining big data and its key characteristics of volume, variety and velocity. It then discusses how big data is being used in social media for recommendation systems, marketing, electioneering and influence analysis. Applications in healthcare discussed include personalized medicine, clinical trials, electronic health records, and genomics. Uses of big data in smart cities are also summarized, such as for smart transport, traffic management, smart energy, and smart governance. Specific examples and case studies are provided to illustrate the benefits and savings achieved from leveraging big data across these various sectors.
The Collaboration Project: Building Open, Participatory and Collaborative Gov...Franciel
Â
This document discusses how government can build a more open, participatory and collaborative model using Web 2.0 technologies. It argues that government should engage citizens and stakeholders by pulling them into the process rather than just pushing information out. Examples are given of how tools like wikis, blogs and social networks can foster more transparency, collaboration and civic participation. The document concludes by recommending that government build an open infrastructure, treat data as a national asset, and create a culture of collaboration.
Big data 1 4 vint-sogeti-on-big-data-1-of-4-creating clarity with big dataRick Bouter
Â
This document discusses the rise of Big Data and its importance for organizations. It notes that digital data is fueling a new industrial revolution. Big Data represents the combination of transactions, interactions, and observations. The growth of digital data from various sources is expanding exponentially. To gain competitive advantages, organizations must implement total data management and analyze all available data, not just samples. This will allow them to better understand customer behavior, detect fraud, and make improved business decisions. The document outlines several Big Data challenges that organizations face and questions for the reader regarding their Big Data profile and management.
Since 2005, when the term âBig Dataâ was launched, Big Data has become an increasingly topical theme. In terms of technological development and business adoption, the domain of Big Data has made powerful advances; and that is putting it mildly.
In this initial report on Big Data, the first of four, we give answers to questions concerning what exactly Big Data is, where it differs from existing data classification, how the transformative potential of Big Data can be estimated, and what the current situation (2012) is with regard to adoption and planning.
VINT attempts to create clarity in these developments by presenting experiences and visions in perspective: objectively and laced with examples. But not all answers, not by a long way, are readily available. Indeed, more questions will arise â about the roadmap, for example, that you wish to use for Big Data. Or about governance. Or about the way you may have to revamp your organization. About the privacy issues that Big Data raises, such as those involving social analytics. And about the structures that new algorithms and systems will probably bring us.
http://www.ict-books.com/books/inspiration-trends
The document discusses leveraging technology for community consultation and engagement. It provides an example of how the City of Kingston used technology throughout their LivingKingston2035 consultation process to create broader awareness, increase participation, and manage and derive value from the large amount of data collected. Over 6,000 community members participated, providing over 13,500 ideas. Technology allowed effective sorting and analysis of this data to inform decision making. Lessons from this case study emphasize planning technology use, making data central, and preparing for open data initiatives.
Einstein published his ideas and became a pivotal element in shifting the way we think about physics - from the Newtonian model to the Quantum - in turn this changed the way we think about the world and allowed us to develop new ways of engaging with the world.
We are at a similar juncture. The development of computational technologies allows us to think about astronomical volumes of data and to make meaning of that data.
The mindshift that occurs is that âthe machine is our friendâ. The computer, like all machines, extends our capabilities. As a consequence the types of thinking now required in industry are those that get away from thinking like a computer and shift towards creative engagement with possibilities. Logical thinking is still necessary but it starts to be driven by imagination.
Computational thinking and data science change the way we think about defining and solving problems.
The age of creativity - which increasingly extends its impact from arts applications to business, scientific, technological, entrepreneurship, political, and other contexts.
Government 2.0: architecting for collaborationTara Hunt
Â
Unfortunately, the video won't embed this way. :( And it makes it soooo awesome. So, here is where to find them:
1. The Day of the Longtail By Michael Markman, Peter Hirshberg, Bob Kalsey; Produced for The Computer History Museum
http://www.youtube.com/watch?v=7xAA71Ssids
2. What the Heck is BarCamp? by Ryanne Hodson & Jay Dedman
http://ryanedit.blogspot.com/2006/06/barcampsf.html
3. Transit Camp on CityTV
http://www.youtube.com/watch?v=PDkEPvIwarI
The panel discussion at Future Perfect 2012 focused on digital preservation by design. The panelists represented several national archives and discussed the need for (1) common standards and frameworks to guide digital preservation efforts, (2) improved tools and cost models, and (3) greater collaboration across organizations through information sharing and an international preservation body. The discussion emphasized taking a purposeful, long-term approach to digital preservation planning and ensuring access to preserved materials.
Knowledge-Centric Paradigm: A New World of IT SolutionsEd Dodds
Â
The document discusses the potential of a knowledge-centric paradigm for government IT solutions. It outlines 10 realities of a knowledge-based world, and describes three approaches to knowledge-centric services: citizen-centric systems that know, advanced analytics systems that learn, and smart operations systems that reason. It also summarizes an agenda for a leadership symposium focusing on clarifying goals, mobilizing support and taking action for networked government.
- The Internet and IT have disrupted many companies, forcing some out of business and others to change and innovate to survive. The New York Times is one of these companies.
- To survive, The New York Times chose to deploy their innovation support group as a shared service across business units, partnering with Netflix. IT will help them deploy this shared service solution.
- Boston Scientific chose to tear down barriers preventing product developers from accessing past research, to create new products faster. However, they had to balance openness with security and restricting access to sensitive information.
Big data 2 4 - big-social-predicting-behavior-with-big-dataRick Bouter
Â
This document provides an overview of big social data and predicting consumer behavior with large data sets. It contains 11 observations on the current state of big data, including that:
1) Best practices for big data are still emerging as the field changes rapidly.
2) Technological breakthroughs like new data analysis software are enabling new types of analysis.
3) Proponents believe big social data from social media can enable highly targeted predictions of consumer behavior.
4) However, others warn that big data projects risk becoming uncontrolled if not properly focused on real needs and privacy issues.
Similar to Personal Data and Trust Network inaugural Event 11 march 2015 - record (20)
Yury Birchenko, CTO at NWave, shared successful examples of LPWAN technologies and explained how to choose the right LPWAN at Digital Catapult's LPWAN London Meetup.
Richard Marshall, IoTSF Plenary Chair and CEO at Xitex Ltd, explains how you can secure your IoT products in these slides, presented recently at Digital Catapult's LPWAN London meetup.
Check out slides presented by Mo Haghighi, Research Scientist at Intel Labs Europe, which explore how to solve urban challenges at the Olympic Park. These slides were presented at Digital Catapult's LPWAN London meetup.
Thinking about applying for Future Cities Catapult's Things Connected Open Call? These slides, presented at Digital Catapult's LPWAN meetup, provide more information on how to get involved.
The document summarizes an LPWAN meetup event in London on September 8, 2016. It discusses the opportunity for LPWAN technologies in IoT, notes several countries that have begun national LPWAN networks, and examines which LPWAN technologies like NB-IoT, CAT-M, and UNB may be ready to support IoT applications and which may fail. It also lists several speakers for the event and poses the question of whether LPWANs are ready for UK businesses.
Presentation of Digital Catapult's personal data activities in relation to Industry 4.0, digital transformation and advanced manufacturing actions, as presented by Digital Catapult's Michele Nati, Lead Technologist of Personal Data and Trust.
The document summarizes an F-Interop meetup in London about improving IoT interoperability. It discusses the challenges of interoperability testing, including the barriers faced by SMEs. It then describes the F-Interop project, which is developing online remote testing tools to help address these challenges. The meetup covered the F-Interop platform roles and capabilities, supported protocols, and an upcoming open call for new testing tools and interoperability tests.
The document provides tips for startups on hiring and firing employees. It discusses when startups should hire and the key considerations in the hiring process such as determining skills needs. The document outlines the differences between independent contractors and employees. It provides advice on interviewing, onboarding new hires, and setting expectations. The document also discusses procedures for dismissing employees or contractors, including redundancy and disciplinary processes. Throughout, it emphasizes the importance of being fair, respectful and documenting all processes when hiring and firing.
3. www.pdtn.org
#PDT
Executive summary
Around 100 experts in the field of personal
data, privacy and trust met at the Digital
Catapult Centre to
⢠Learn about the purpose and aims of the
network
⢠Hear perspectives from industry on the key
issues
⢠Hear examples of the world-leading research in
this topic that has been conducted in the UK
over the last few years
⢠Identify the most important priorities for the
network âŚ
⢠⌠and make a start on determining how the
network would address them
Priorities identified were:
⢠How can we share best practice?
⢠What are the implications of digital social
innovation?
⢠How should we deal with (EU) regulation?
⢠How can consent in pervasive environments
best be managed?
⢠Who owns the rights to use personal data?
Groups worked to begin to answer these questions:
their work is presented in this document
There was great energy in the room from
participants representing many different types of
organisation, and a clear commitment to work
together
3
5. www.pdtn.org
#PDT
Andy and Matt welcomed delegates
Andy Green briefly explained the role of the Catapult and the
centres around the UK (Sunderland, Bradford and Brighton),
and stressed the significance of the personal data and trust
issue
He said there was an opportunity for network members to
gain insight from each other and contribute to greater
understanding
Matt Stroud explained the genesis of the network, and its role
in helping to unlock value for multiple parties from personal
data
He explained how the network drew together members with
multiple perspectives on the issues
5
What we need is for the
innovators in the room to
come together and
contribute new ways to
think about the issues
There are practical
issues here â but
also ethical issues
See slides 31-37 for more detail
6. www.pdtn.org
#PDT
Jon introduced Alex Craven who presented professional
and personal perspectives on personal data and trust
Jon Kingsbury ran through the agenda, and pointed out that the
room contained representative of a world-class research base,
businesses (innovative, data-focused SMEs and larger companies
for whom the issue was becoming more important, and professional
services companies working in this area), policy makers, public-
sector organisations and trade associations in multiple sectors
Alex Craven spoke about how ad agencies increasingly make use of
personal data in their work, and about the potential for measurable
public good in its use.
He spoke about how he believed that there could be a way to give
individuals proper control over the use of their data. His idea is
called âOur Data Mutualâ
6
Privacy is dead âŚ
we must move on
See slides 38-53 for more detail
7. www.pdtn.org
#PDT
Rav spoke about his work with banks, and the
approach taken by corporations to data and trust âŚ
Rav spoke about âconduct riskâ and compliance
with regulations â including the impact this is
having on systems and processes
He said the issues faced were similar in other
big companies with huge volumes of data, and
said they are pretty good at managing data
He said that big financial services companies
and their consultants donât have all the bright
ideas, and that he hoped the network would help
build consensus and also a critical mass of
thinking
7
Iâm not sure how the market is
turning â itâs like a kidsâ football
match ⌠we are all chasing
the ball wherever it goes
See slides 54-55 for more detail
8. www.pdtn.org
#PDT
⌠and Jon led a discussion of the main issues arising
from these presentations
Questions and discussion points range
across many topics:
⢠Personalised online advertising and mashups
of multiple data sets
⢠Trust frameworks
⢠Making sense of âbig dataâ
⢠Examples of the use of personal data for good
⢠Language used within the network
⢠Privacy and EU regulations
⢠Who owns âpersonalâ data?
⢠The special case of health data in specific
contexts
8
See slides 15-21 for more detail
9. www.pdtn.org
#PDT
After a networking lunch, delegates heard about funding
opportunities from Innovate UK competitions âŚ
Jon explained that much public funding was based
around collaboration; he promoted the KTNâs Digital
Business Briefing, and three colleagues spoke briefly
about their competition-based funding programmes:
⢠Jonny Voon â Protecting data in industry looking at
digital disruption (cyber attacks) â opening 31
March (GBP4 million)
⢠Tom Fiddian â Enhancing user experience using
personal data opens 16 March; a feasibility design
study (GBP2M)
⢠Agata Samojlowicz â Enhancing user experience in
retail (up to GBP4M two-stage collaborative R&D)
opens 16 March
9
10. www.pdtn.org
#PDT
⌠and heard three presentations on personal
data research
Jerome Ma explained the purpose of the
Research Councilâs Digital Economy theme, and
introduced thee speakers from the digital
economy research hubs:
⢠Derek McAuley (Horizon Digital Economy
Research Institute)
⢠Paul Watson (SiDE Hub)
⢠Pete Edwards (dot.rural Digital Economy
Hub)
They gave thought-provoking details of some of
the personal data and trust issues of their
research work
10
See slides 56-113 for more detail
I can tell if you
didnât have a
shower this
morning
Sometimes giving people more
control over the use of their data
might increase their personal risk
Rural bus service
planning might result in
individuals being traced
11. www.pdtn.org
#PDT
Groups then thought about how they might work together
on specific priority issues âŚ
The initial five priority areas identified were:
1. Sharing best practice
2. Digital social innovation
3. Dealing with (EU) regulation
4. Consent in pervasive environments
5. Who owns the rights to use the data
Groups note down key points from their
discussions
11
See slides 22-29 for more detail
12. www.pdtn.org
#PDT
⌠and briefly fed back their discussions to
all delegates
Sharing best practice
⢠Objective models of risk; voluntary certification
Digital social innovation
⢠There is a âpyramid of trustâ
Dealing with (EU) regulation
⢠Letâs make use of it â there are good bits
Consent in pervasive environments
⢠Itâs not informed, and itâs not consent
Who owns the rights to use the data
⢠Itâs complicated!
12
See slides 22-29 for more detail
13. www.pdtn.org
#PDT
Matt explained possible next steps for the network
and thanked participants for their work
Jon said he felt the day had generated some very
interesting debate. He said there were two ways to
take this conversation forward:
⢠The website
⢠Sharing personal contact details (delegates would be
emailed to ask if they were happy to share their details)
Jon said he had realised there was a very large
cohort of people that really understand the issues
and the technicalities of the issues
Matt closed by saying where the network might go
from here. He said there were several things that
might happen:
⢠Future regular meetings â quarterly? And thematic
meetings â around the country; may use the National
Virtual Incubator (teleconferencing facility); he asked if
anyone might like to host a meeting
⢠Digital presence (website, a quarterly digital journal)
⢠Community interest groups â vertical or horizontal, e.g.,
a privacy working group (or security or psychology) â
who might want to lead or get involved?, and a PIMS
provider forum
⢠Grow the membership base â writing papers and
working with the media, as well as spreading the word
within relevant organisations
⢠Other? Suggestions please
13
See slides 114-122 for more detail
15. www.pdtn.org
#PDT
Notes from the morning plenary Q&A session [1]
Q: Advertising and big data â where is the cutting edge of personal data use?
A: [Alex] Itâs personalised advertising online (e.g., mashing online activity data with datasets from Experian for instance).
This sort of thing is diverting advertising revenue from traditional channels
Q: What about IoT? We are all becoming generators of our own data â is this a service provider data gold rush? And what
are the killer apps?
A: It should be a gold rush â but the trust framework needs to be in place first
Q: Fintech Innovation Lab â how many innovations are coming here that are geared around mining personal data?
A: [Rav] I havenât seen many ⌠but ⌠personal data has always been there â whatâs changed is the way the data can be
captured, and quantified. But thereâs too much, itâs fractured and siloed. This creates opportunities for arbitrage between
data silos, for the consumer and for organisations. The big game-changer is when companies work out how to use this
data in different ways to create and sell products. One of the biggest issues we have is the capture of social media data;
social media is highly qualitative and you need to interpret it to use it. We need to have a discussion about trust that looks
at this. The next killer apps will be those that make sense of qualitative data (literally âmaking sense of itâ, and making use
of the data â e.g., predictive analytics, statistics)
15
16. www.pdtn.org
#PDT
Notes from the morning plenary Q&A session [2]
Q: We run digital service for academics; Alexâs examples are a good example of why consent doesnât work (installing
cookies ⌠mortgage applications â of course stop sending me information on mortgages when I already have one!) â so
there are some things that should be ânever doâ; some that are âof course do itâ; and some that are in the middle. I have
no problem with finding this in proposed or current European legislation â so what we need to do is identify what things fit
into which category â I like the idea of a âmutualâ doing this
Response: Do you think there are organisations or services that get it right?
A: Learning analytics (e.g., can a university improve its education to students by identifying students it could help in a
different way?; or providing federated access management â a service provider doesnât need to know all the details of a
student to grant access to specific applications in specific ways
Q: I campaign in this area. An appeal: be precise about language. The EU legislation is data protection not privacy
legislation. I am concerned about the way we are talking about privacy â it is a fundamental human right and needs to be
respected. In trying to frame how people can come to trust institutions and companies, a balance of consensual, safe and
transparent things must be arrived at â this varies by context. But all three must be addressed â for control and
understanding what that control actually is. Many of us here are tackling very difficult but not intractable problems. To find
mutual benefit we must recognised that this is inherently wrapped up with âprivacyâ â though definitions of privacy are
subjective and canât be easily predicted
16
17. www.pdtn.org
#PDT
Notes from the morning plenary Q&A session [3]
Q: You say EU frameworks wonât work â what does this mean? I think it will (EU Directive 95 etc).
A [Alex]: Doing this top down is fundamentally wrong â we need data protection and you canât have trust if itâs mandated
from the top down; if itâs my data, then I want to say how itâs used. The EU should not say how it can be used. The
principle is wrong and there should be no one-size-fits-all European decision. But there is no alternative being put up
against the EU way
Comment: There is a publication âThe Lord of The Thingsâ â when data is âoursâ, are we just âstakeholdersâ in our data?
Q [âPatients Like Meâ]: We should think about things at a community level â you can see some really interesting things on
sharing personal data in the health sector. Patients Like Me is one of many similar groups / communities online doing the
âquantified selfâ â sleep patterns, blood pressure etc âŚincreasingly YouTube channels are created as well âlike
embarrassing bodiesâ! Very useful and informative
A: Lowering the cost and inertia of signing up to things like this is important
17
18. www.pdtn.org
#PDT
Notes from the morning plenary Q&A session [4]
Q: Thinking about the Tesco diabetes thing â what is the appetite from banks etc for sharing of data for social good?
A [Rav]: They know about life events. Typically, if you are going to divorce, the party you are divorcing changes spending
patterns a year before it happens. Financial services organisations, if they choose to, can know more about you than
Tesco because they can match more types of data â and they can link family bank accounts etc; Tesco doesnât do this.
Banks also have many yearsâ of data (they have to keep it for legal reasons). They can profile customers to a frightening
degree. Most financial services organisations choose not to do this because their customers donât want them to. There are
strict guidelines about this ⌠but they could do an awful lot more than they do. For the social good of mining this data â
leveraging a small amount of my data â I donât think it would be a problem, but it must be driven by the customer, banks
canât do I themselves
Q: I donât believe thereâs no need for regulation â itâs essential. In Europe we have two fundamental rights â privacy and
data protection â you canât get away from this. But we are thinking only of personal data here. I live in a multi connected
world: there are types of data all over the place that might impact on my privacy â itâs not enough to think about personal
data alone. So how do we deal with privacy in a context-based way? We need to find a way to help people protect their
privacy. There has been work on âmeaningful consentâ at Southampton University and elsewhere â how do we get the
work out of the lab into peoplesâ hands?
18
19. www.pdtn.org
#PDT
Notes from the morning plenary Q&A session [5]
Point: I have an app that can track my emotional state using my phone. I canât see a way beyond individuals being
responsible for their own data and privacy â I donât trust any privacy network â people click to give consent, but they donât
know where the data goes â they must know this
Point [Patient Opinion]: The language at todayâs meeting has been all consumerist. We are treating trust as a black box,
but it varies a lot (thereâs a difference between what trust means as a patient and as a consumer) â having a Mercedes is
different to having a heart attack. When you want something for yourself, thatâs one thing; wanting something for the public
good is different â can the network address this aspect, and keep the distinction clear? Thereâs a danger of skewing
everything to the consumer angle.
A: Yes â itâs your network â we can do this if we want to â there is a whole range of interests represented in the room
included medical
Point: I manage Warwick Universityâs Hub of All Things â we address some of the issues that have emerged: our project
recognises the need for people to own their own personal data and manage its availability in different contexts, where the
value can be understood (e.g., retailers, healthcare, wholesale etc â to get different types of value). We are creating a tool
â we recognise the opportunities and challenges and we are looking to have 1000s of people collecting their data into a
repository
19
20. www.pdtn.org
#PDT
Notes from the morning plenary Q&A session [6]
Q: Loughborough University â speaking as consumer: do we need to be careful in assuming that trust is always good?
Alexâs point about mortgages hit home â anything that improves the process is good. I had to go online, search products,
do some sums, sit with an advisor, and I came out with different, better product. There are benefits of engaging fully like
this â if we trust automated solutions, we might cut out benefits of traditional personal interactions. Do we need a series of
nuanced approaches to trust / scepticism?
A [Alex]: What you describe is horrible â I donât have time to do what you did. I want to do it quicker online. In my work I
want to do it my way; you can do it your way. There is an opportunity to do something in between too â and turn your trust
up or down
A [Rav]: We are on a journey here â itâs not going to change overnight â and itâs a generational thing
Q: Letâs get the data owner back in the picture. There are billions of data creators facing a handful of big brands. Normally
when you own something, you can sell it for money. How can the individual get a share of the value of their data?
A: Yes â the Data Mutual can only be funded that way â like a Tesco Clubcard
20
21. www.pdtn.org
#PDT
Notes from the morning plenary Q&A session [7]
A [Rav]: But what is the currency? Not everything is monetisable. Data is everything to do with you: itâs not just you, itâs the
wider context â so where does the value get created? Itâs not just because of your data, itâs because of the context of that
data (that you donât own)
Point [Governor Technology (Richard Beaumont)]: We have learned how nuanced the decisions are that websites make
when using personal data. Consent and control plays a lot in trust (as does accountability) â it all needs being lined up to
give strong trust and a strong economy, especially if you want it to be fair
A [Rav]: One of the networkâs fundamental challenge is about data literacy: generations are coming through that arenât
aware of what is data, privacy and trust. So letâs go to the grass roots â e.g., cookie caches â there is a whole subset of
society that is completely data-unaware. If we can address this, that would be a big step forward, I suggest
21
22. www.pdtn.org
#PDT
Group 1: Sharing best practice
⢠Best practice must be user-centric â user control; instead of
common standards, it can involve certification and
verification
⢠Best practice looks at objective models of risk; risk is very
hard to quantify for individuals, and for people doing risk
assessment, but there are commonalities across
organisations
⢠Common risk models could be identified, with common
mitigations â this can be a good way of sharing best
practice
⢠Along with this we propose voluntary certification
22
23. www.pdtn.org
#PDT
Group 2: Digital social innovation [1]
⢠What are the principles you need to operate by to
generate trust? Hereâs out trust pyramid: we are
trying to get to being trustworthy (not trusted)
⢠The building blocks are user empowerment in the
process: transparency, and accountability or
power to remove data â this is a remedy
⢠There are operational principles that companies
must adhere to: âsecurity by designâ, âprivacy by
defaultâ, and other things: open business model
(be clear about how money is going to be made)
and data minimisation (important in the big data
era) âŚ
23
24. www.pdtn.org
#PDT
Group 2: Digital social innovation [2]
⢠⌠we know we canât keep data secure, so we must work to minimise the data that we keep; and be
clear that there is no covert tracking or profiling going on
⢠The most interesting discussions we had on our trust pyramid were those to do with âremedyâ â is
removal of data really empowering? And ultimately how âvalidatableâ is all this?
24
25. www.pdtn.org
#PDT
Group 3: Dealing with (EU) regulation
⢠The bad stuff in the regulations will hit us anyway, so
how do we make the best of the good stuff?
⢠Two things are âprivacy by designâ and âprivacy
impact assessmentsâ â they could be positive tools to
encourage people to trust us. We could present these
in citizen-friendly ways
⢠Also, if you think that consent doesnât fit your
application, there are five other things allowed
25
26. www.pdtn.org
#PDT
Group 4: Consent in pervasive environments [1]
⢠Informed consent problems: itâs not informed; and itâs not consent
⢠The consumer doesnât know whatâs going on or understand risk,
costs or benefits of giving consent
⢠What we should do is âsurprise minimizationâ â nothing that
happens should surprise the consumer
⢠You canât consent if you donât understand, so you must âempowerâ
users. Itâs a dynamic process. People are willing to be fluid in data
exchange if feedback exists â something needs to support this
dynamic process, such as trust agents
⢠The main thing is to enable a âsupported userâ â with
visualisations
26
28. www.pdtn.org
#PDT
Group 5: Who owns the rights to use the data [1]
⢠You own the rights to your data (enshrined by Magna Carta). The
individual is a creator of data, so the individual should own it
⢠But data must be interpreted in some cases â e.g., by a doctor.
Sometimes you might not trust your GP, and you want access to your
own data not mediated by the GP
⢠Data is linked to community groups â data is collected within a
context. Using the data is not like consuming it; you need to protect
the access rights â and enforce this
⢠You must work out how enforcement can be managed â itâs complex.
Content protection? Authorities need rules, and the issues extends to
secondary and tertiary use of data â itâs easy to lose control. How can
you constrain the inheritance of the data and access rights across
multiple users? This could be controlled and enforced through
technology and enshrined in law
28
29. www.pdtn.org
#PDT
Group 5: Who owns the rights to use the data [2]
⢠You might want âauthorised witnessâ â a notary â
certifying the data as yours. In the medical domain itâs
often a committee that certifies who can do what.
⢠There are differences of opinion about this, though â the
goals of research are evolving
⢠There is some more complexity â co-ownership of some
data. For example, consider a delivery driver who might
have stayed for hours at a pub. His car belongs to a fleet.
It might be a Ford (Ford might have rights). The payload
owner has rights / interests in whatâs happening to the car
too
⢠We talked about taxonomy and ontology and instantiation
(because we are computer scientists)
29
31. www.pdtn.org
#PDT
Notes from Andy Greenâs opening talk
Andy Green stressed the significance of the personal data and trust issue â along with security, he said these were the two most
important issues facing the development of the digital economy
He said there was a spectrum of opinion on the issue of personal data and privacy â but the consensus is that only one or two bad
events would change the balance
He said the biggest brands understand the significance of dealing properly with private data â they are extraordinarily careful with this
data â itâs not a legal issue, itâs a consumer moral boundary issue. Itâs complex issue, and there has been work on codes of practice â
but what we need is for the innovators in the room to come together and contribute new ideas and new ways to think about the issue.
The other side of the issue is about value - I get great value from people knowing about me; but I can see the importance of
protection too
Andy added that for the long term, the issue will lead to a big evolution of the Internet â we will have to rethink rights management. Itâs
not easy â but we need to think about it⌠and work out some policies for it all
He concluded by saying that this network is a collaborative venture â and the area is important to lots of us here. He hoped that
people would find other to talk to, find customers and so on, and gain insight from each other by talking about, and understanding the
issues
31
32. www.pdtn.org
#PDT
Notes from Matt Stroudâs talk
Matt explained why the network had been set up, by drawing a parallel with the development of the railways in Victorian times â the
real value generated then arose because of its enablement of other services; the Internet was very similar â and the data carried by
the Internet had already generated huge economic benefits
Private data was harder to unlock value from, though, because of the complexity around the different aspects of that data â personal
trust and legal and political, for instance
It was important for people with an interest in this area to get together and work out how we could look at the central challenges
around trust in the use of personal data. There are practical issues here â but also ethical issues (the data affects people)
The network created today draws together the academic community, SMEs and corporate enterprises: all have different, valuable
perspectives. The network is a physical and virtual environment for these groups to work together
Some issues are open innovation and collaboration (useful for corporates); SMEs can meet potential customers and research the
thought leadership from universities; academia can learn what the commercial worldâs challenges are and find opportunities to
commercialise their work
He encouraged people to register as a member of the network
32
34. www.pdtn.org
#PDT
Personal Data and Trust Innovators Network:
The rationale
⢠The next growth of the Internet is likely to rely on the successful generation
and management of personal data. High levels of trust and confidence in
these data are a pre-requisite for successful new services, which have both
huge economic and social potential.
⢠The Personal Data and Trust Network, building on world-class research and
business insight, will help organisations to develop the next-generation of
personal data management, giving the UK clear advantages for consumers
and citizens.
36. www.pdtn.org
#PDT
Benefits of membershipâŚ.
Corporate benefits:
⢠Access to potential innovation partners
⢠Supports corporate open innovation programmes
⢠Gain insight to evolving market trends, capabilities and opportunities
⢠Visibility of academic research & innovation
SME benefits:
⢠Opportunity to meet and work with potential customers
⢠Opportunities to meet other innovation partners to further differentiate your product
⢠Visibility of and contribution to, cutting edge thinking
⢠Identification of commercially important problems
Academic benefits:
⢠Problem definition of commercially important problems
⢠Build research roadmap
⢠Partners to commercialise capabilities
36
37. www.pdtn.org
#PDT
Membership of the network is free.
So that we can best organize events, could you register @:
http://www.PDTN.org or
http://www.digitalcatapultcentre.org.uk (in the âGet involvedâ section)
Personal Data and Trust Innovators Network:
Registering
38. www.pdtn.org
#PDT
Notes from Alex Cravenâs presentation [1]
Alex runs an advertising agency and has trust issues â he spoke about his professional and personal issues
His agency uses individualsâ Twitter and other data, from advertisers and elsewhere as part of its work for ITV â there was a huge
amount of data. Twitter was a very large source of useful data â e.g., about the conversation that happens when the X Factor is
broadcast. There is real value and his clients and he makes money from it
Alex is a member of the Open Data Institute, and is thinking about how data can be used for good; for instance, analysis of Tesco
Clubcard data can identify potential diabetes sufferers two years before they present themselves â saving treatment costs worth a
huge mount of health service money; McKinsey reckons big data can save an enormous amount of healthcare money
But as a consumer he is less interested in the technology, and more interested in the trust issue
He sees lots of technology innovation, but where is the trust? He is trying to launch âOur Data Mutualâ â and he presented briefly
about it. He made the point that banks protecting you from identity theft is for their own benefit, not yours
Ipsos Mori reported last year on public attitudes to trust (seen this) â Bloom has won a contract to do some research in this area; he
picked out some highlights from the Ipsos Mori report â including where trust was low (large companies) and that people could not
see the benefit of the use of much personal data by companies (or the state, or academiaâŚ)
38
39. www.pdtn.org
#PDT
Notes from Alex Cravenâs presentation [2]
So how do we get trust into private organisations?
There are contradictions here: He made the point about peopleâs stated attitudes to trust and privacy, and their practice (e.g., with
how they use social media)
Alex said he felt we are at a crossroads â and this forum today is critical and must arrive at a consensus. Prohibition will not work. We
canât go back. We canât do nothing (itâs the wild west, and the only people benefiting are a few corporates) â society can benefit, and
we can do better
Privacy is dead â it never existed. We must move on, and we must do something. We need a trust framework that enables a market
to exist while giving individuals some control over the use of their data
39
42. Tesco clubcard can identify type 2 diabetes 2 years before you present
yourself to your doctors with symptoms â the rise of diabetes could bankrupt
the NHS within a generation
50% of global advertising spend is wasted - $250bn
Data can save 8% on US health care - $300bn *McKinsey
Our data opportunity
46. 46
Version 1 | PublicŠ Ipsos MORI
Version 1 | PUBLIC
Public attitudes to the use and sharing of their
data
Research for the Royal Statistical Society by Ipsos MORI
July 2014
23/07/14
47. Royal Statistical Society Ipsos MORI report finds âdata trust deficitâ
http://www.statslife.org.uk/news/1672-new-rss-research-finds-data-
trust-deficit-with-lessons-for-policymakers
âIn particular, there may be big benefits to be had from data
sharing within government, but to get a public mandate
policymakers must be clear about the benefits and show how they
will safeguard individual privacyâ
The Problem
48. 48
Version 1 | PublicŠ Ipsos MORI
University researchers
Government-funded â 50%
Company-funded â 45%
Charities
Who provide public services â
42%
For themselves â 36%
Companies
Who provide public services â
36%
For themselves
Mentioning controls â 27%
No mention of controls â
26%
A hierarchy of support for data sharing?
By whom For whom
But at this level
controls make no
difference?
49. If we are asked whether we are worried about privacy we are, yet we repeatedly
ignore this in our every day lives.
We want to receive the benefit of our data but we cant really be bothered to do
anything about it.
We assume we are being protected from abuse of our data but actually we are not.
We contradict ourselves
51. There is no going back â privacy is dead, in fact it never existed, move on..
EU regulation wont work
Wild west abuses the citizen and will eventually âeat itself wholeâ fuelling the privacy
hawks
There is a huge opportunity but we wont realise it until we can establish trust
There is clear evidence for a requirement for new institutions to establish a trusted
environment
Whoâs data is it anyway?
52. Where is the trust?
Any questions? Please
contact:
Alex Craven
alex.craven@bloomagency.co.uk
@alexcraven
@bloomagency
53.
54. www.pdtn.org
#PDT
Notes from Rav Bainâs talk [1]
Rav advises banks on âconduct riskâ â helping them conduct themselves better, and to reduce operational risks. Banks must comply
with lots of new regulation â an eyewatering amount. They spend billions on compliance, and there is a lot of data involved. Senior
executives will be held personally responsible for breaches of trust â so they must rely on their companiesâ strong policies and
frameworks and systems; they have to trust their colleagues to do the right thing â and measure those colleagues!
There must be microscopic tracking and surveillance of trading-floor activity and branch activity. Rav mentioned MIFID and MIFID 2
regulations (governing the certain types of financial products) and having transparency of a trade before and after it happens. He said
to achieve this you need to rearchitect systems. It is a multi-dimensional prolem for banks
Organisations like the Personal Data and Trust Network will create a body of work that can be used by corporates â and not just
banks; telcos and other corporates that manage personal data or large amounts of data all have similar issues
Rav said that if you are made to do something about this you need to work out what you are going to do? We all agree that there
should be an appropriate level of regulation (and compliance with it)
He gave an example: think about data entering the banking system with a transaction (e.g., applying for a loan). Do you want this
data held forever? So how do you decide how to get rid of data at the right time? He said he was not sure how the market is turning â
it feels like kidsâ football â weâre all chasing the ball wherever it goes
54
55. www.pdtn.org
#PDT
Notes from Rav Bainâs talk [2]
In defence of big corporates, Rav said they are pretty good at managing your data (though there are exceptions). A typical UK high
street bank has 8-15m customers â and they look after a lot of data. But we need to crack down on the exceptions. And we should
think in fresh ways about the issues
Big banks and other financial services companies and consultancies donât have all the bright ideas â there are many ideas âout
thereâ. A network like this will not just build consensus but will build a critical mass of thinking. If we find Europe is more heavily
regulated on privacy, and we are quicker and more agile, then can we make this work for the UK?
55
56. www.rcuk.ac.uk/digitaleconomy
Personal data and trust research
Personal Data and Trust Network Inaugural Event
Digital Catapult, London, Wednesday 11 March 2015
Jerome Ma
RCUK Digital Economy Theme
jerome.ma@epsrc.ac.uk
www.rcuk.ac.uk/digitaleconomy
@RCUK_DE #PDT
57. www.rcuk.ac.uk/digitaleconomy
RCUK Digital Economy Theme
⢠>£150M since 2008; 400 user partners
⢠Co-creation approach (users, society, business and/or
government)
⢠Interdisciplinarity is key
Rapidly realise the transformational impact
of digital technologies on the UK
59. www.rcuk.ac.uk/digitaleconomy
University Expertise
Aberdeen computational models of norms & trust
Birmingham applied criminology
Buckinghamshire
information security management; cybercrime;
compliance
Cambridge systems for privacy preservation
Cardiff
politics and social issues of the creative & digital
economies
City cloud security and trust; identity management
Edinburgh design informatics; big data ethics
Imperial
defence and security; language-based computer
security and data analytics.
KCL computational models of trust & reputation
Lancaster
privacy; identity management, access control
models; reputation
Leeds digital identity
Leicester
online trust, privacy, security & surveillance
issues; cyber-ethics.
Loughborough empathy and trust in online communication
Newcastle
user experience; cybersecurity, defence, critical
infrastructure protection
Nottingham personal data in media, services & products
Northumbria identity, trust & security in new social media
Oxford big data ethics; cyber security centre
Queens Belfast
trust, e-commerce; online buying behaviour
Southampton AI; autonomous systems; meaningful consent
Strathclyde internet law
UCL mobile systems; cybersecurity
Warwick
novel service business models; attitudes
towards data security, trust & privacy
Wolverhampton online behaviour
Edinburgh
Aberdeen
Newcastle &
Northumbria
Southampton
Oxford
Nottingha
m
UCL
Imperial
Birmingham
Cardiff
Strathclyde
Lancaster
CambridgeWarwick
Wolverhampton Loughborough
Leicester
Belfast
Leeds
KCL
City
UK PD&T research:
expertise & location
61. www.pdtn.org
#PDT
Notes from Derek McAuleyâs presentation [1]
Mac spoke about the work of Horizon, and the lifelong contextual footprint of a person â the digital traces created explicitly and
implicitly. He said there were opportunities and challenges in personal data and Horizon was exploring these through lots of projects
(of 9-12 months each). Topics are refined, but work is done in short bursts. He gave the example of âsmart metersââ the data
collected and the privacy implications of knowing, per second, peopleâs energy usage and the implied knowledge that is created from
this (e.g., âI know you didnât have a shower this morning âŚâ)
Condition monitoring of domestic appliances would be good (and enabled by smart meters), but the privacy issue raises its head.
What will actually get deployed in the UK? Only once a day reading (or opt out to a minimum frequency of once a month, or opt into
once every half hour). But has the privacy issue been solved? No. And weâve lost the ability to do some great applications.
In my view this is simple to resolve: itâs small data and it should be processed in isolation. The reason we have lost this great
opportunity is because of the privacy and the lack of value recognition. We need distributed computing to do this properly. Distribute
the code and the computation instead of doing âbig dataâ. There is academic work that proves you can do distributed processing to
extract value without sending personal data to a single point
We also did work to evaluate the simplicity or otherwise of terms and conditions of usage, to examine what counts as âconsentâ. We
published work in 2013; bettingexpert.com analysed all the betting sitesâ T&Cs and found you have to be 23 years old to understand
the English, let alone the legal position. This work was widely cited
61
62. www.pdtn.org
#PDT
Notes from Derek McAuleyâs presentation [2]
Should we come up with T&C templates? Possibly. Government responded positively with the British Standards Institute.
Letâs see where that goes from here.
Final example â we have to teach people how to design these privacy and trust conditions into the products and services
they are designing. Ideation Cards (not a new idea) can be used here. In most design processes, data protection and
privacy isnât high on the list of priorities â it is usually retrofitted at the end of the process. So we use ideation cards â a
location-based truancy tracker was an example design we thought about. There are lots of murky issues around that
service concept. Using the cards really helps people to think about them
What is âLegitimate Interestâ â is it good enough that itâs âitâs legalâ? Possibly not. Thereâs a Catch 22 about having to track
people to check that they donât want to be tracked, for instance
62
64. ⢠What is/has Horizon been doing
⢠Three examples
â Technology
â Policy
â Design
⢠Topic de jour
The talk
64
65. The lifelong contextual footprint
⢠The footprint â the digital traces we create explicitly and implicitly as we go about
our everyday lives at home, at work and at leisure.
⢠The contextual â these digital traces enable personal technologies to infer our
activities and provide appropriate services.
⢠The lifelong â an inclusive digital society must consider how these digital
footprints are handled throughout our lives, literally from cradle to grave.
The opportunity
65
66. Broad range of applications, core topic:
âLifelong Contextual Footprintâ
Eye test - the current projects
66
67. Rollout across
UK by 2020
..butâŚ
Readings once a
day, or opt in to
30 mins or opt
out to 1 month.
Privacy and smart meters
68. The way of small data: analyze at edge and then aggregate
⢠Privacy & performance & scalability
Data on the edge
68
Cloud
Edge
Analyze
Aggregate
Mainstream thinking: aggregate into cloud then analyze
71. Policy impact
71
May 2013
Luger, E., Moran, S., and Rodden, T. Consent for all: Revealing the
hidden complexity of terms and conditions. Proceedings of ACM
CHI2013: Human Factors in Computing Systems (pp. 2687-2696).
ACM.
78. ⢠Define/constrain design problems within broader problem space (Golembewski &
Selby, 2010)
⢠To surface human values (Friedman & Hendry, 2012)
⢠Support intra/inter-familial communication (Mackay, 2004)
⢠Encourage thought around security threats (Security Cards, Washington)
⢠Support use of creative methods within design process (IDEO)
⢠Support exploration of issues around online privacy (Privacy Game)
Ideation Cards in Use
79. Tracking Truancy
Truancy is a key problem in
urban deprived areas and is
costly to the state. The
commissioning body (govt
department) wants a
location-based social
'tracking' system that will
allow parents and teachers to'
track' truants. This system
makes use of location data.
82. Explicit Consent
Data should only be collected where a user
has been given information about the
nature of collection, and then specifically
and explicitly agreed to it.
The form of that information or how it is to
be delivered is not defined. Highlighting
risks to users and enabling
negotiation/withdrawal with the system
over data collection is a challenge.
Consent is also not a static concept either
(e.g. given once, does not mean forever).
85. www.pdtn.org
#PDT
Notes from Paul Watsonâs presentation [1]
We focus in our hub on those who are socially excluded â it could be up to 20% of the population, including the old, those
with disability, those without skills or jobsâŚ
We felt that there was potential for digital technology to make a difference to the socially excluded. We have run many
projects over five years â and many of them have had a security or trust issue. I will pick three examples to show you that
illustrate things I have found:
Digital technologies can give insights as well as solutions: you get a view into peopleâs lives that you can use to solve
their problems. Trust of older people in technology is lower than it is for younger people, and this is an issue for
government as it moves services online. We explored, using clickstream analysis, how people navigate around websites; it
varies by age. We researched the nature of trust and how it relates to the Web. Older peopleâs trust is often based on
brand â we were able to test this through research. Eye-tracking technology was used to better design web pages that you
want people to trust. âCertificationâ of the brand on the web page is really difficult to do; web page design aesthetics were
more important than brand
Target socially excluded people: example of victims of domestic violence are often subject to abusers seeing what they
do online. Deleting search history etc is only partially successful because it arouses suspicion. You need to be much more
subtle than that â routines that selectively clear search history or weblogs etc.
85
86. www.pdtn.org
#PDT
Notes from Paul Watsonâs presentation [2]
Design for scalability: this generates security issues. Example of healthcare and wearables; IT systems choice (the
cloud for no risk; internal IT for anything with risk â this inhibits cheap, fast, scalable service development). So partition
applications to make use of cloud resources â e.g., only send anonymous data to the cloud; keep attributed data internally
Create multidisciplinary teams â security, domain and systems experts, coproducing
86
88. The result of related factors
that prevent individuals or groups
from participating fully in the
economic, social & political life
of society
Social Exclusion
101. Lessons weâve learnt
L1: Digital technologies can give insights, as well as solutions
L2: Target socially excluded people & communities
L3: Design for scalability
L4: Create multidisciplinary teams:
⢠security, domain & systems experts ⌠and users
www.side.ac.u
102. www.pdtn.org
#PDT
Notes from Pete Edwardâs presentation [1]
We are focused on rural challenges â not just rural broadband coverage, but much wider. In almost all our projects, there
have been issues that emerged relating to personal data and trust
I will talk about the themes that emerged across our projects that are relevant to this debate. Others were also looking at
specific relevant things (Facebook data, CareData fiasco, selling of personal data by individuals to the highest bidderâŚ)
⢠Keep it user-centric â attitudes vary by demography, the kind of data, the context of the data usage ⌠so we look at the
issues through an attitudinal lens â trust, risk, transparency and control (I think risk is sometimes forgotten)
⢠Example of work using smartphone data for rural bus planning â this raises anonymity issues because in rural areas,
individuals could be traced
⢠Mobile devices and wearables to support people with chronic disease in rural areas â attitudes to personal health data
sharing. We looked at different categories of personal health data (e.g., exercise regime, diet, mood). There is a
massive variation based on age, health etcâŚ. Exercise data is not considered private; mood data is considered very
sensitive. Also looked at who people would be happy to share with â e.g., people donât trust government, universities,
companies; they do trust their GP
102
103. www.pdtn.org
#PDT
Notes from Pete Edwardâs presentation [2]
⢠âConducting privacy impact assessments code of practiceâ (ICOâs office); identifying privacy-related risk â individuals
donât understand risk, and especially risk in the digital world. This is a huge problem we all face. âTrusted Zoneâ idea for
personal health data â what about leaking the data outside the zone â even if itâs good and valid to do so; how can we
build a model that is flexible enough to cope with this and what controls need to be in place to mitigate perceived risk?
⢠Managing inferential risk â people generally donât think about this. Social networks have data flying around â way
beyond where people expect it to go; also, sharing can result in unexpected risk â e.g., releasing two or three pieces of
data to different people that can be put together
⢠Control â how to allow users a measure of control over their data. How do you represent controls? Make them simple
and effective and understandable (like informed consent issue). Too much control can introduce new risks â in the event
of an accident, say, do you want your health data shared in a way thatâs outside your normal âpolicyâ?
103
106. Personal Data Landscape
Trust Transparency
Control
Risk
Influenced by the
foundational principles
of Privacy by Design.
âKeep it User-Centricâ
Attitudes
107. Attitudes to Data Sharing
Your primary mental health
Your adherence and compliance
Your alcohol intake
Your contact information
Your criminal record
Your exercise level
Your medical history
Your medication
Your mood
Your personal characteristics
Your reproductive health
Your specialist mental health
Your substance abuse
Your test results
0 25 50 75 100
% respondents
Card
Sensitivity
Not sensitive
Quite sensitive
Highly sensitive
335 NHS users surveyed
Recruited though market
research (Research Now)
Online card-sort exercise to
identify sensitivity attitudes and
sharing preferences of health-
related information
Opinions about sensitivity of
personal data items vary
dramatically
109. Risk
Trusted Zone
A
B C
owner
requester recipient
data
How to protect information
when sharing is desirable,
but policies are incomplete?
Trusted individuals may need
to share our data with
unknown third parties
Whatâs the perceived risk for A, in allowing B to share with C?
How does Aâs trust in B, and the sensitivity of the data, influence this risk
factor?
How can controls (such as payments, monitoring or reputation) mitigate
some of this perceived risk?
Identifying privacy related
risks key part of PIA process
Considerable body of
evidence that individuals do
not understand / appreciate
personal data risk
110. Managing Inferential Risk
What is the probability that users'
data become available to others in a
networked context?
How may data owners manage
unsafe inferences that others may
draw whilst sharing data?
How to assess the benefits of
sharing (utility) vs possible
risks?
111. Controls
⢠Allowing users a degree of control over their data
â helping users specify their wishes
â monitoring behaviour of data accessors
⢠Controls can mitigate perceived risk of sharing data
â Simple and effective controls? Must be clear to data owners and accessors
â Right level of controls? Too much control may introduce new risk of data being unavailable in
critical situations.
112. Transparency
Who controls a device and has
access to the data generated?
For what purpose are the data
collected?
Assurance of behaviour?
Making IoT device capabilities and
behaviours (data provenance)
transparent to users.
115. www.pdtn.org
#PDT
Where next? 115
⢠Future regular meetings
⢠Build digital presence
⢠Form community interest groups
⢠Create research roadmap
⢠Grow membership base
116. www.pdtn.org
#PDT
Future regular meetings 116
⢠We intend to hold regular (quarterly?) meetings, physically bring together
practitioners and researchers in Personal Data & Trust
⢠In addition there will be thematic meetings around the country
⢠We may use the âNational Virtual Incubatorâ teleconferencing system to
make the London accessible from around the country
⢠Would your institution like to host a physical or virtual gathering?
117. www.pdtn.org
#PDT
Build digital presence 117
⢠Our new website:
PDTN.org
⢠Will be complimented by a quarterly PDTN Review journal
⢠Covering the Networks activities
⢠Features on members activities
⢠Expert articles
118. www.pdtn.org
#PDT
Form community interest groups 118
Some will be sector specific âverticalsâ such as banking and others will be
âhorizontalâ such as security or psychology. By way of illustration, two early
groups are:
⢠Privacy Working Group
Working to define a âbest practiceâ privacy standard that companies can be certified against
⢠PIMS provider forum
Collective challenges and opportunities faced by providers of personal information management services
These are the first of many. If thereâs a personal data and trust related topic which
you feel would benefit from an open working group and would like to establish,
please let us know.
119. www.pdtn.org
#PDT
Create research roadmap 119
⢠Bring together Industry and the Research Councils to create a
research roadmap which drives economic and social growth
⢠Spearheaded by a number of events run by the KTN and the Digital
Economy Hubs around the country
⢠SMEâs and Corporates will be invited to contribute views and work to
identify key challenges
⢠Output will be fed into the Research Councils and IUK to guide future
research and calls.
120. www.pdtn.org
#PDT
Grow membership base 120
⢠We will grow the network by reaching out to our networks & social media and
working with media brands:
⢠We are writing white papers and working with the media to drive interest
⢠We are informing the organisations who have worked with us, IUK, Catapult,
KTN, Research Councils and Digital Economy Hubs
⢠We are Posting, Blogging & Tweeting
⢠Your colleagues, customers and collaborators will derive value too...
âŚlet them know!
121. www.pdtn.org
#PDT
Your community, be part of it! 121
⢠Want to do a blog for the web site
⢠Want to write an article for the PDTN review journal
⢠Got an idea for a âcommunity interest groupâ
⢠Want to join or lead a group
⢠Want to host an event
⢠Got an idea for the research roadmap
Then e-mail us: Matt.Stroud@cde.catapult.org.uk
jon.kingsbury@ktn-uk.org