SlideShare a Scribd company logo
1 of 17
Download to read offline
Realising the Value of Big Data

Technology Innovation Requirements
Emil	Lupu	
Imperial	College	London	
e.c.lupu@imperial.ac.uk
Future Software Eco-Systems
Data Infrastructures
Sensing	&

Local	Inference
Content	Aggregation	
Distribution
Learning,		
Planning,		
Optimisation
What are the main obstacles?
• Compliance	with	legislation?	
• Data	acquisition,	management	and	exchange	requirements?	In	
particular	w.r.t	Data	Quality?	
• How	to	facilitate	innovation	through	adaptive	data	frameworks?	
• How	to	facilitate	contractual	aspects	for	data	services?	
• How	to	protect	data	consistently	with	its	value,	ownership	and	
usage?	Usage	Control?	Derived	data?	
• Limitations	of	data	analytics	and	machine	learning?	
• How	to	anticipate	possible	uses	and	knowledge	that	can	be	
extracted	from	the	data?
Policy-Based Techniques for Data
Management and Compliance
• Policies	(rules)	can	be	expressed	to	define	data	handling	
procedures,	legal	requirements	(under	a	given	interpretation),	…	
• Over	the	last	10-15	years	significant	advances	have	been	made	
that	enable	to:	
• Verify	data	handling	traces	against	policy	requirements	
• Analyse	complex	policy	sets	
• Specify	policy	at	higher	levels	of	abstraction	and	refine	it.		
• Learn	policies	from	practice.
Policy (Rule) Based Systems
Policy	Refinement
Policy	Learning
Policy		
Specification
Policy	Analysis
Policy	Deployment	
and	Enforcement
Adaptive Data Frameworks
• Data	acquisition	and	management	frameworks	are	governed	by	
the	first	intended	use.		
• Cost/performance	aspects	require	frameworks	that	provide	
sufficient	data	quality	but	not	more.		
• How	can	we	realise	dynamically	adaptive	data	frameworks	
where	the	collection,	management	and	aggregation	can	be	
dynamically	re-programmed	at	low	cost?	
• Is	there	an	appetite	for	investing	in	such	frameworks?
Data Sharing (Usage) Agreements = SLAs
for Data Services
• The	specification,	monitoring	and	(partially)	automated	
enforcement	of	Service	Level	Agreements	has	played	a	
significant	role	in	the	development	of	Internet	and	Web-
Services.		
• There	is	almost	no	equivalent	work	for	Data	Services.		
• Applicable	legislation	
• Access	and	purpose	of	use	
• Data	handling	requirements	
• Data	quality	and	delivery	parameters	
• Trust	relationships	for	automated	enforcement
Data Sharing (Usage) Agreements
Data	Sharing	

Agreement
Refinement
Analysis
• What	are	suitable	case	studies?	
• Would	this	facilitate	data	commerce?	
• Can	Privacy	Aspects	be	treated	as	a	specific	case	of	data	
sharing	(usage)	agreements	between	an	individual	and	an	
organisation?
Data Protection Requirements
• Derived	data	could	be	automatically	protected	based	on	a)	
contract	requirements	b)	knowledge	of	the	transformations	
that	will	be	applied.	
• Which	models	are	likely	to	dominate?	
• To	what	extent	is	data	protection	an	obstacle	to	the	
development	of	data	market	places?		
• Is	data	usage	control	necessary	to	maximise	profit	and	value?
Contractual	

(Legal)	Enforcement	
Only
Access	Control Policy	

with	Client	

Enforcement
Rights		
Management
Rights		
Management

with	TPM	and		
attestation
Anticipating Future Uses
• If	only	we	could	anticipate	what	the	data	could	be	used	for	…		
• We	could	determine	its	privacy	implications.		
• We	could	estimate	its	value	to	somebody	else.		
• We	could	anticipate	the	risk	of	misuse.		
• We	could	identify	new	avenues	of	exploitation.	
• But	we	can’t.					http://pleaserobme.com/	
• (Crowdsourced)	Exploration	of	the	data	space?	
• Hybrid	human/machine	analysis	of	data	to	derive	knowledge.
From Data to Value and back again
Sensing	&

Crowd	sensing	
Usage	control	
Privacy
From	Data	to	Knowledge	
Data	Quality
Data	sharing,	storage	
and	use
Data	Value,	Risk	&	
Economic	Models
What are the main obstacles?
• Compliance	with	legislation?	
• Data	acquisition,	management	and	exchange	requirements?	In	
particular	w.r.t	Data	Quality?	
• How	to	facilitate	innovation	through	adaptive	data	frameworks?	
• How	to	facilitate	contractual	aspects	for	data	services?	
• How	to	protect	data	consistently	with	its	value,	ownership	and	
usage?	Usage	Control?	Derived	data?	
• Limitations	of	data	analytics	and	machine	learning?	
• How	to	anticipate	possible	uses	and	knowledge	that	can	be	
extracted	from	the	data?
Questions

More Related Content

What's hot

Cross-Disciplinary Insights on Big Data Challenges and Solutions
Cross-Disciplinary Insights on Big Data Challenges and SolutionsCross-Disciplinary Insights on Big Data Challenges and Solutions
Cross-Disciplinary Insights on Big Data Challenges and SolutionsBYTE Project
 
Horizontal analysis of societal externalities
Horizontal analysis of societal externalitiesHorizontal analysis of societal externalities
Horizontal analysis of societal externalitiesBYTE Project
 
Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015Philip Bourne
 
Lorenzo Allio, Session 3
Lorenzo Allio, Session 3Lorenzo Allio, Session 3
Lorenzo Allio, Session 3OECD Governance
 
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese..."Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...e-SIDES.eu
 
Analytics Engines - Analytics Engines XDP
Analytics Engines - Analytics Engines XDPAnalytics Engines - Analytics Engines XDP
Analytics Engines - Analytics Engines XDPInvest Northern Ireland
 
Artificial intelligence (ai) multidisciplinary perspectives on emerging chall...
Artificial intelligence (ai) multidisciplinary perspectives on emerging chall...Artificial intelligence (ai) multidisciplinary perspectives on emerging chall...
Artificial intelligence (ai) multidisciplinary perspectives on emerging chall...PanagiotisKeramidis
 
Digital Transformation in Government 3.0
Digital Transformation in Government 3.0Digital Transformation in Government 3.0
Digital Transformation in Government 3.0samossummit
 
Adoption, Acceptability, Acceptance
Adoption, Acceptability, AcceptanceAdoption, Acceptability, Acceptance
Adoption, Acceptability, AcceptanceJoseph Lindley
 
Digitalisation and the future of research environments
Digitalisation and the future of research environmentsDigitalisation and the future of research environments
Digitalisation and the future of research environmentsJisc
 
20190423 PRiSE model to tackle data protection impact assessments and data pr...
20190423 PRiSE model to tackle data protection impact assessments and data pr...20190423 PRiSE model to tackle data protection impact assessments and data pr...
20190423 PRiSE model to tackle data protection impact assessments and data pr...Brussels Legal Hackers
 
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...European Data Forum
 
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...European Data Forum
 
Transparency international board, 9 February 2015
Transparency international board, 9 February 2015Transparency international board, 9 February 2015
Transparency international board, 9 February 2015Open Data NZ
 
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...European Data Forum
 
Web fragmentation - a network analysis approach
Web fragmentation - a network analysis approachWeb fragmentation - a network analysis approach
Web fragmentation - a network analysis approachGašper Koren
 

What's hot (20)

Cross-Disciplinary Insights on Big Data Challenges and Solutions
Cross-Disciplinary Insights on Big Data Challenges and SolutionsCross-Disciplinary Insights on Big Data Challenges and Solutions
Cross-Disciplinary Insights on Big Data Challenges and Solutions
 
Horizontal analysis of societal externalities
Horizontal analysis of societal externalitiesHorizontal analysis of societal externalities
Horizontal analysis of societal externalities
 
NES_brochure
NES_brochureNES_brochure
NES_brochure
 
Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015
 
Data Portability and Interoperability – SWIRE – June 2021 OECD discussion
Data Portability and Interoperability – SWIRE – June 2021 OECD discussionData Portability and Interoperability – SWIRE – June 2021 OECD discussion
Data Portability and Interoperability – SWIRE – June 2021 OECD discussion
 
Lorenzo Allio, Session 3
Lorenzo Allio, Session 3Lorenzo Allio, Session 3
Lorenzo Allio, Session 3
 
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese..."Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
 
Analytics Engines - Analytics Engines XDP
Analytics Engines - Analytics Engines XDPAnalytics Engines - Analytics Engines XDP
Analytics Engines - Analytics Engines XDP
 
Artificial intelligence (ai) multidisciplinary perspectives on emerging chall...
Artificial intelligence (ai) multidisciplinary perspectives on emerging chall...Artificial intelligence (ai) multidisciplinary perspectives on emerging chall...
Artificial intelligence (ai) multidisciplinary perspectives on emerging chall...
 
Digital Transformation in Government 3.0
Digital Transformation in Government 3.0Digital Transformation in Government 3.0
Digital Transformation in Government 3.0
 
Adoption, Acceptability, Acceptance
Adoption, Acceptability, AcceptanceAdoption, Acceptability, Acceptance
Adoption, Acceptability, Acceptance
 
An overview of piv initiatives(papaloi,gouscos)final21.5
An overview of piv initiatives(papaloi,gouscos)final21.5An overview of piv initiatives(papaloi,gouscos)final21.5
An overview of piv initiatives(papaloi,gouscos)final21.5
 
Digitalisation and the future of research environments
Digitalisation and the future of research environmentsDigitalisation and the future of research environments
Digitalisation and the future of research environments
 
20190423 PRiSE model to tackle data protection impact assessments and data pr...
20190423 PRiSE model to tackle data protection impact assessments and data pr...20190423 PRiSE model to tackle data protection impact assessments and data pr...
20190423 PRiSE model to tackle data protection impact assessments and data pr...
 
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
EDF2014: Michele Vescovi, Researcher, Semantic & Knowledge Innovation Lab, It...
 
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
EDF2014: Talk of Ksenia Petrichenko, Building Policy Analyst, Global Building...
 
Transparency international board, 9 February 2015
Transparency international board, 9 February 2015Transparency international board, 9 February 2015
Transparency international board, 9 February 2015
 
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
EDF2014: Kush Wadhwa, Senior Partner, Trilateral Research & Consulting: Addre...
 
Web fragmentation - a network analysis approach
Web fragmentation - a network analysis approachWeb fragmentation - a network analysis approach
Web fragmentation - a network analysis approach
 
Many laws leos_v3
Many laws leos_v3Many laws leos_v3
Many laws leos_v3
 

Similar to Realising the Value of Big Data, Technology Innovation Requirements

Best Practices for Meeting State Data Management Objectives
Best Practices for Meeting State Data Management ObjectivesBest Practices for Meeting State Data Management Objectives
Best Practices for Meeting State Data Management ObjectivesEmbarcadero Technologies
 
London School of Economics, February 2010, Jerry Fishenden
London School of Economics, February 2010, Jerry FishendenLondon School of Economics, February 2010, Jerry Fishenden
London School of Economics, February 2010, Jerry FishendenJerry Fishenden
 
Policy Management: An Overview
Policy Management: An OverviewPolicy Management: An Overview
Policy Management: An OverviewMarco Casassa Mont
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyTheAnfieldGroup
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energystacybre
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Geoffrey Fox
 
Ict mgmt processes_roles_competencies
Ict mgmt processes_roles_competenciesIct mgmt processes_roles_competencies
Ict mgmt processes_roles_competenciesSalegram Padhee
 
Visibility and insight - Understand what is going on with your IT infrastructure
Visibility and insight - Understand what is going on with your IT infrastructureVisibility and insight - Understand what is going on with your IT infrastructure
Visibility and insight - Understand what is going on with your IT infrastructureMarie Wilcox
 
Guiding Principles & Methodology for Cloud Computing Adoption
Guiding Principles & Methodology for Cloud Computing AdoptionGuiding Principles & Methodology for Cloud Computing Adoption
Guiding Principles & Methodology for Cloud Computing AdoptionKumar Arikrishnan
 
Developing IT strategy
Developing IT strategyDeveloping IT strategy
Developing IT strategyAnurag Purohit
 
The Paradigm of Fog Computing with Bio-inspired Search Methods and the “5Vs” ...
The Paradigm of Fog Computing with Bio-inspired Search Methods and the “5Vs” ...The Paradigm of Fog Computing with Bio-inspired Search Methods and the “5Vs” ...
The Paradigm of Fog Computing with Bio-inspired Search Methods and the “5Vs” ...israel edem
 
Zen and the Art of Datanauting
Zen and the Art of DatanautingZen and the Art of Datanauting
Zen and the Art of DatanautingOntologySystems
 
CDMP SLIDE TRAINER .pptx
CDMP SLIDE TRAINER .pptxCDMP SLIDE TRAINER .pptx
CDMP SLIDE TRAINER .pptxssuser65981b
 
Oracle policy automation overview v4 july 2010
Oracle policy automation overview v4 july 2010Oracle policy automation overview v4 july 2010
Oracle policy automation overview v4 july 2010Sakis Kostas
 
E business applications
E business applicationsE business applications
E business applicationsazmatmengal
 
Use of Computational Tools to Support Planning & Policy by Johannes M. Bauer
Use of Computational Tools to Support Planning & Policy by Johannes M. BauerUse of Computational Tools to Support Planning & Policy by Johannes M. Bauer
Use of Computational Tools to Support Planning & Policy by Johannes M. BauerLaleah Fernandez
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technologyOnline
 

Similar to Realising the Value of Big Data, Technology Innovation Requirements (20)

Best Practices for Meeting State Data Management Objectives
Best Practices for Meeting State Data Management ObjectivesBest Practices for Meeting State Data Management Objectives
Best Practices for Meeting State Data Management Objectives
 
London School of Economics, February 2010, Jerry Fishenden
London School of Economics, February 2010, Jerry FishendenLondon School of Economics, February 2010, Jerry Fishenden
London School of Economics, February 2010, Jerry Fishenden
 
Policy Management: An Overview
Policy Management: An OverviewPolicy Management: An Overview
Policy Management: An Overview
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
Multi-faceted Classification of Big Data Use Cases and Proposed Architecture ...
 
Ict mgmt processes_roles_competencies
Ict mgmt processes_roles_competenciesIct mgmt processes_roles_competencies
Ict mgmt processes_roles_competencies
 
Visibility and insight - Understand what is going on with your IT infrastructure
Visibility and insight - Understand what is going on with your IT infrastructureVisibility and insight - Understand what is going on with your IT infrastructure
Visibility and insight - Understand what is going on with your IT infrastructure
 
Guiding Principles & Methodology for Cloud Computing Adoption
Guiding Principles & Methodology for Cloud Computing AdoptionGuiding Principles & Methodology for Cloud Computing Adoption
Guiding Principles & Methodology for Cloud Computing Adoption
 
Developing IT strategy
Developing IT strategyDeveloping IT strategy
Developing IT strategy
 
The Paradigm of Fog Computing with Bio-inspired Search Methods and the “5Vs” ...
The Paradigm of Fog Computing with Bio-inspired Search Methods and the “5Vs” ...The Paradigm of Fog Computing with Bio-inspired Search Methods and the “5Vs” ...
The Paradigm of Fog Computing with Bio-inspired Search Methods and the “5Vs” ...
 
Zen and the Art of Datanauting
Zen and the Art of DatanautingZen and the Art of Datanauting
Zen and the Art of Datanauting
 
CDMP SLIDE TRAINER .pptx
CDMP SLIDE TRAINER .pptxCDMP SLIDE TRAINER .pptx
CDMP SLIDE TRAINER .pptx
 
Oracle policy automation overview v4 july 2010
Oracle policy automation overview v4 july 2010Oracle policy automation overview v4 july 2010
Oracle policy automation overview v4 july 2010
 
David Reeve - UKAD 2016 forum
David Reeve - UKAD 2016 forumDavid Reeve - UKAD 2016 forum
David Reeve - UKAD 2016 forum
 
Chap001
Chap001Chap001
Chap001
 
E business applications
E business applicationsE business applications
E business applications
 
Chapter01.ppt
Chapter01.pptChapter01.ppt
Chapter01.ppt
 
Use of Computational Tools to Support Planning & Policy by Johannes M. Bauer
Use of Computational Tools to Support Planning & Policy by Johannes M. BauerUse of Computational Tools to Support Planning & Policy by Johannes M. Bauer
Use of Computational Tools to Support Planning & Policy by Johannes M. Bauer
 
Managers & global information technology
Managers & global information technologyManagers & global information technology
Managers & global information technology
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Realising the Value of Big Data, Technology Innovation Requirements

  • 1. Realising the Value of Big Data
 Technology Innovation Requirements Emil Lupu Imperial College London e.c.lupu@imperial.ac.uk
  • 4. What are the main obstacles? • Compliance with legislation? • Data acquisition, management and exchange requirements? In particular w.r.t Data Quality? • How to facilitate innovation through adaptive data frameworks? • How to facilitate contractual aspects for data services? • How to protect data consistently with its value, ownership and usage? Usage Control? Derived data? • Limitations of data analytics and machine learning? • How to anticipate possible uses and knowledge that can be extracted from the data?
  • 5. Policy-Based Techniques for Data Management and Compliance • Policies (rules) can be expressed to define data handling procedures, legal requirements (under a given interpretation), … • Over the last 10-15 years significant advances have been made that enable to: • Verify data handling traces against policy requirements • Analyse complex policy sets • Specify policy at higher levels of abstraction and refine it. • Learn policies from practice.
  • 6. Policy (Rule) Based Systems Policy Refinement Policy Learning Policy Specification Policy Analysis Policy Deployment and Enforcement
  • 7. Adaptive Data Frameworks • Data acquisition and management frameworks are governed by the first intended use. • Cost/performance aspects require frameworks that provide sufficient data quality but not more. • How can we realise dynamically adaptive data frameworks where the collection, management and aggregation can be dynamically re-programmed at low cost? • Is there an appetite for investing in such frameworks?
  • 8. Data Sharing (Usage) Agreements = SLAs for Data Services • The specification, monitoring and (partially) automated enforcement of Service Level Agreements has played a significant role in the development of Internet and Web- Services. • There is almost no equivalent work for Data Services. • Applicable legislation • Access and purpose of use • Data handling requirements • Data quality and delivery parameters • Trust relationships for automated enforcement
  • 9. Data Sharing (Usage) Agreements Data Sharing 
 Agreement Refinement Analysis
  • 10. • What are suitable case studies? • Would this facilitate data commerce? • Can Privacy Aspects be treated as a specific case of data sharing (usage) agreements between an individual and an organisation?
  • 11. Data Protection Requirements • Derived data could be automatically protected based on a) contract requirements b) knowledge of the transformations that will be applied. • Which models are likely to dominate? • To what extent is data protection an obstacle to the development of data market places? • Is data usage control necessary to maximise profit and value? Contractual 
 (Legal) Enforcement Only Access Control Policy 
 with Client 
 Enforcement Rights Management Rights Management
 with TPM and attestation
  • 12. Anticipating Future Uses • If only we could anticipate what the data could be used for … • We could determine its privacy implications. • We could estimate its value to somebody else. • We could anticipate the risk of misuse. • We could identify new avenues of exploitation. • But we can’t. http://pleaserobme.com/ • (Crowdsourced) Exploration of the data space? • Hybrid human/machine analysis of data to derive knowledge.
  • 13.
  • 14.
  • 15. From Data to Value and back again Sensing &
 Crowd sensing Usage control Privacy From Data to Knowledge Data Quality Data sharing, storage and use Data Value, Risk & Economic Models
  • 16. What are the main obstacles? • Compliance with legislation? • Data acquisition, management and exchange requirements? In particular w.r.t Data Quality? • How to facilitate innovation through adaptive data frameworks? • How to facilitate contractual aspects for data services? • How to protect data consistently with its value, ownership and usage? Usage Control? Derived data? • Limitations of data analytics and machine learning? • How to anticipate possible uses and knowledge that can be extracted from the data?