My presentation in eHealth Data Forum in Athens/Greece (9/12/2019) introducing the data flows within the health domain under the MyData architecture. This presentation understands MyData as a fair ecosystem, product of the current techno-economic paradigm shift
Citrix Customer Story: Southcoast Health SystemCitrix
Southcoast Health System employs approximately 7,000 workers, including 300 physicians and 250 visiting nurses, and it provides a wide range of medical services at each campus to
streamline the patient care experience. Discover how they use Citrix to do just that.
Protect your confidential information while improving servicesCloudMask inc.
Over the last few decades, the financial sector has outgrown banks, as financial engineering, digital money and regulatory changes have evolved. Assets managed by financial firms (equity and various types of debt) are larger, as corporate debt has surpassed federal, state and local government’s debt. The US banks’ share of assets under management (AUM) accordingly declined from 58% in 1907 to 27% in 2008, while pension, mutual funds and non-depository firms (e.g., private equity and hedge funds) have grown substantially.
2010 07 BSidesLV Mobilizing The PCI Resistance 1cGene Kim
Properly Mobilizing the PCI Resistance: Lessons Learned From Fighting Prior Wars (SOX-404)"
I have noticed that there is a growing wave of discontent and disenchantment from information security and compliance practitioners around the PCI DSS. Josh Corman has been an effective voice for these concerns, providing an intellectually honest and earnest analysis in his talk “Is PCI The No Child Left Behind Act For Infosec?”
The problem are well-known and significant: too much ambiguity in the PCI DSS, Qualified Security Assessors (QSAs) and consultant using subjective interpretations, existing guidance either too prescriptive or too vague, scope missing critical systems that could risk cardholder data, overly broad scope and excessive testing costs, excessive subjectivity and inconsistency, poor use of scarce resources, no meaningful reduction in risk of data breaches, and so forth.
For years, I have been studying the PCI DSS compliance problem, as well. I have noticed many similarities to the PCI compliance challenges and the “SOX-404 Is The Biggest IT Time Waster” wars in 2005. I was part of the leadership team at the Institute of Internal Auditors (IIA) where we did something about the it. We identified inability to accurately scope the IT portions of SOX-404 as the root cause of the billions of dollars of wasted time and effort, while not reducing the risk of financial misstatements.
I propose to present the two-year success story of the IIA GAIT project and how we changed the state of the IT audit practice in support of SOX-404 financial reporting audits. We defined the four GAIT Principles, which could be used to correctly scope the IT portions of SOX-404. We mobilized over 100K internal auditors, the SEC and PCAOB regulatory and enforcement bodies, as well as the external auditors from the 8 big CPA firms (e.g, Big Four and other firms doing SOX advisory work). In short, we made a difference, in a highly political process that involved many constituencies.
I am attempting to do something similar with the PCI Security Standards Council, through my work as part one of the leaders of the PCI Scoping SIG (Special Interest Group). My personal goal is to find a “third way” to better enable correct scoping of the PCI Cardholder Data Environment, and create a risk-based approach of substantiating the effective controls to ensure that cardholder data breaches can be prevented, and quickly detected and corrected when they do occur.
My desired outcome is to find fellow travelers who also see the pile of dead bodies in PCI compliance efforts, and work with those practitioners to catalyze a similar movement to achieve the spirit and intent of PCI DSS.
Navigating the Complex World of Compliance GuidelinesDATAVERSITY
Regulatory guidelines include many mandates for organizations to interpret and implement to protect their data. You know that you’re supposed to be monitoring and auditing certain data elements to demonstrate compliance, but how can you be sure you’re auditing the right things and translating the requirements correctly? IDERA’s Kim Brushaber will help to simplify and address some of the compliance concerns for complex data environments.
My keynote speech at the ISACA IIA Belgium software watch day in October 2014 in Brussels on the value of big data and data analytics for auditors and other assurance professionals
Citrix Customer Story: Southcoast Health SystemCitrix
Southcoast Health System employs approximately 7,000 workers, including 300 physicians and 250 visiting nurses, and it provides a wide range of medical services at each campus to
streamline the patient care experience. Discover how they use Citrix to do just that.
Protect your confidential information while improving servicesCloudMask inc.
Over the last few decades, the financial sector has outgrown banks, as financial engineering, digital money and regulatory changes have evolved. Assets managed by financial firms (equity and various types of debt) are larger, as corporate debt has surpassed federal, state and local government’s debt. The US banks’ share of assets under management (AUM) accordingly declined from 58% in 1907 to 27% in 2008, while pension, mutual funds and non-depository firms (e.g., private equity and hedge funds) have grown substantially.
2010 07 BSidesLV Mobilizing The PCI Resistance 1cGene Kim
Properly Mobilizing the PCI Resistance: Lessons Learned From Fighting Prior Wars (SOX-404)"
I have noticed that there is a growing wave of discontent and disenchantment from information security and compliance practitioners around the PCI DSS. Josh Corman has been an effective voice for these concerns, providing an intellectually honest and earnest analysis in his talk “Is PCI The No Child Left Behind Act For Infosec?”
The problem are well-known and significant: too much ambiguity in the PCI DSS, Qualified Security Assessors (QSAs) and consultant using subjective interpretations, existing guidance either too prescriptive or too vague, scope missing critical systems that could risk cardholder data, overly broad scope and excessive testing costs, excessive subjectivity and inconsistency, poor use of scarce resources, no meaningful reduction in risk of data breaches, and so forth.
For years, I have been studying the PCI DSS compliance problem, as well. I have noticed many similarities to the PCI compliance challenges and the “SOX-404 Is The Biggest IT Time Waster” wars in 2005. I was part of the leadership team at the Institute of Internal Auditors (IIA) where we did something about the it. We identified inability to accurately scope the IT portions of SOX-404 as the root cause of the billions of dollars of wasted time and effort, while not reducing the risk of financial misstatements.
I propose to present the two-year success story of the IIA GAIT project and how we changed the state of the IT audit practice in support of SOX-404 financial reporting audits. We defined the four GAIT Principles, which could be used to correctly scope the IT portions of SOX-404. We mobilized over 100K internal auditors, the SEC and PCAOB regulatory and enforcement bodies, as well as the external auditors from the 8 big CPA firms (e.g, Big Four and other firms doing SOX advisory work). In short, we made a difference, in a highly political process that involved many constituencies.
I am attempting to do something similar with the PCI Security Standards Council, through my work as part one of the leaders of the PCI Scoping SIG (Special Interest Group). My personal goal is to find a “third way” to better enable correct scoping of the PCI Cardholder Data Environment, and create a risk-based approach of substantiating the effective controls to ensure that cardholder data breaches can be prevented, and quickly detected and corrected when they do occur.
My desired outcome is to find fellow travelers who also see the pile of dead bodies in PCI compliance efforts, and work with those practitioners to catalyze a similar movement to achieve the spirit and intent of PCI DSS.
Navigating the Complex World of Compliance GuidelinesDATAVERSITY
Regulatory guidelines include many mandates for organizations to interpret and implement to protect their data. You know that you’re supposed to be monitoring and auditing certain data elements to demonstrate compliance, but how can you be sure you’re auditing the right things and translating the requirements correctly? IDERA’s Kim Brushaber will help to simplify and address some of the compliance concerns for complex data environments.
My keynote speech at the ISACA IIA Belgium software watch day in October 2014 in Brussels on the value of big data and data analytics for auditors and other assurance professionals
My presentation in Week of Robotics, Helsinki, Finland on November 28th, 2014. My purpose was to initiate discussion about the possibilities and risks of using Big Data in combination with robotics, especially from ethical perspective. My main reference was Davis & Patterson (2012): Ethics of Big Data which I recommend as further reading.
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
Is your current state really threat ready?
Amit Walia, Senior Vice President, General Manager of Data Integration and Security at Informatica, shares how to protect data from the inside and the outside from the 2015 Informatica Government Summit.
Securing sensitive data for the health care industryCloudMask inc.
Both 1) the growing adoption of Electronic Health Records (EHR) and personal health records and 2) technologies that ensure better patient safety, improved care and inputs for clinical decision-making are being made possible by the adoption of cloud technology in health care. It has become critical to ensure that complete medical data is made available to health care providers irrespective of where the patient or clinician is located
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
Check out these webinar slides to learn the latest ways Office 365 is providing the tools to develop and implement a modern records management strategy to take charge of the data explosion.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-explosion-in-your-organization-harness-it-with-a-comprehensive-records-management-strategy
How Do Get Police, Fire, Paramedics and Others to Share Information? Built T...ForgeRock
Presented by Darrell O'Donnell, P.Eng, President, Continuum Loop Inc. at ForgeRock Open Stack Identity Summit, June 2013
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
TITUS Metadata Security for SharePoint - Moray Council Case StudyClever Consulting
The Moray Council, una delle 32 autorità locali scozzesi ad elezione diretta, che distribuisce servizi civici (cultura, istruzione, salute, etc...) ed amministrativi ad una popolazione di 88.000 cittadini, ha scelto di affidarsi a TITUS Metadata Security for SharePoint per ottimizzare la gestione di documenti e permessi all'interno della propria infrastruttura Office proteggendo le informazioni sensibili.
L’azienda canadese TITUS (www.titus.com) è specializzata in Data Loss Prevention (DLP).
In particolare la suite di prodotti software TITUS applica un sistema di CLASSIFICAZIONE con metadati a documenti ed email, evitando che distrazioni ed errori umani causino la perdita involontaria di informazioni riservate o strategiche, salvaguardando gli asset aziendali.
TITUS è rivenduto in Italia da Clever Consulting, che offre la propria consulenza specializzata ed un processo di installazione e supporto totalmente personalizzato secondo le esigenze del cliente.
http://bitly.com/CleverTITUS
IQPC Enterprise IT Security Exchange, March 10, 2013
This presentation looks at the risks and rewards and security and privacy implications of Big Data Analytics.
In this presentation, I tried to succinctly discuss the future technology trends and explain how they can impact the healthcare industry. Also Business Transformation, as a key to tackle, has been discussed.
Planning Information Governance and Litigation ReadinessRich Medina
Presentation on Information Governance, Litigation Readiness, E-Discovery, and Records Management. Given at the AIIM-Wisconsin / Milwaukee Bar Association 6th Annual Electronic Discovery Conference on November 1, 2013.
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
NetIQ was a Platinum sponsor for “Plugging the Leaks: Finding and Fixing the IT Security Holes in Your Enterprise,” a virtual trade show (VTS) produced by Information Week Magazine and Dark Reading.
This was our presentation deck: "Proven Practices to Protect Critical Data" presented by Matt Mosley, Senior Product Manager, and Matt Ulery, Director of Product Management during a live presentation. They explored some of the most significant problems facing security teams tasked with protecting critical data. And, they will reveal some of the most effective approaches and technology that can be used to quickly identify real threats.
Healthcare Analytics Summit Keynote Fall 2017Dale Sanders
The Data Operating System. Changing the Digital Trajectory of Healthcare. Why do we need to change the current digital trajectory? What’s the business case for a Data Operating System? What is a Data Operating System and how did we get here? What difference will DOS make? What should we do with it and what should we expect?
Blockchain & Healthcare | Strategy, Implications and Implementationaurablocks
What role can Blockchain technology have in Healthcare? How big of an impact can it have and how do you get started? A brief perspective is offered. AuraBlocks.com session at Oracle Open World 2018
My Data - A Nordic Model for human-centered personal data management and proc...Joonas Pekkanen
This white paper - written by Open Knowledge Finland and published by the Ministry of Transportation and Communication of Finland - presents a framework, principles, and a model for a human-centric approach to the managing and processing of personal information. The approach – defined as MyData – is based on the right of individuals to access the data collected about them. The core idea is that individuals should be in control of their own data. The MyData approach aims at strengthening digital human rights while opening new opportunities for businesses to develop innovative personal data based services built on mutual trust.
My presentation in Week of Robotics, Helsinki, Finland on November 28th, 2014. My purpose was to initiate discussion about the possibilities and risks of using Big Data in combination with robotics, especially from ethical perspective. My main reference was Davis & Patterson (2012): Ethics of Big Data which I recommend as further reading.
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
Is your current state really threat ready?
Amit Walia, Senior Vice President, General Manager of Data Integration and Security at Informatica, shares how to protect data from the inside and the outside from the 2015 Informatica Government Summit.
Securing sensitive data for the health care industryCloudMask inc.
Both 1) the growing adoption of Electronic Health Records (EHR) and personal health records and 2) technologies that ensure better patient safety, improved care and inputs for clinical decision-making are being made possible by the adoption of cloud technology in health care. It has become critical to ensure that complete medical data is made available to health care providers irrespective of where the patient or clinician is located
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
Check out these webinar slides to learn the latest ways Office 365 is providing the tools to develop and implement a modern records management strategy to take charge of the data explosion.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-explosion-in-your-organization-harness-it-with-a-comprehensive-records-management-strategy
How Do Get Police, Fire, Paramedics and Others to Share Information? Built T...ForgeRock
Presented by Darrell O'Donnell, P.Eng, President, Continuum Loop Inc. at ForgeRock Open Stack Identity Summit, June 2013
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
TITUS Metadata Security for SharePoint - Moray Council Case StudyClever Consulting
The Moray Council, una delle 32 autorità locali scozzesi ad elezione diretta, che distribuisce servizi civici (cultura, istruzione, salute, etc...) ed amministrativi ad una popolazione di 88.000 cittadini, ha scelto di affidarsi a TITUS Metadata Security for SharePoint per ottimizzare la gestione di documenti e permessi all'interno della propria infrastruttura Office proteggendo le informazioni sensibili.
L’azienda canadese TITUS (www.titus.com) è specializzata in Data Loss Prevention (DLP).
In particolare la suite di prodotti software TITUS applica un sistema di CLASSIFICAZIONE con metadati a documenti ed email, evitando che distrazioni ed errori umani causino la perdita involontaria di informazioni riservate o strategiche, salvaguardando gli asset aziendali.
TITUS è rivenduto in Italia da Clever Consulting, che offre la propria consulenza specializzata ed un processo di installazione e supporto totalmente personalizzato secondo le esigenze del cliente.
http://bitly.com/CleverTITUS
IQPC Enterprise IT Security Exchange, March 10, 2013
This presentation looks at the risks and rewards and security and privacy implications of Big Data Analytics.
In this presentation, I tried to succinctly discuss the future technology trends and explain how they can impact the healthcare industry. Also Business Transformation, as a key to tackle, has been discussed.
Planning Information Governance and Litigation ReadinessRich Medina
Presentation on Information Governance, Litigation Readiness, E-Discovery, and Records Management. Given at the AIIM-Wisconsin / Milwaukee Bar Association 6th Annual Electronic Discovery Conference on November 1, 2013.
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
NetIQ was a Platinum sponsor for “Plugging the Leaks: Finding and Fixing the IT Security Holes in Your Enterprise,” a virtual trade show (VTS) produced by Information Week Magazine and Dark Reading.
This was our presentation deck: "Proven Practices to Protect Critical Data" presented by Matt Mosley, Senior Product Manager, and Matt Ulery, Director of Product Management during a live presentation. They explored some of the most significant problems facing security teams tasked with protecting critical data. And, they will reveal some of the most effective approaches and technology that can be used to quickly identify real threats.
Healthcare Analytics Summit Keynote Fall 2017Dale Sanders
The Data Operating System. Changing the Digital Trajectory of Healthcare. Why do we need to change the current digital trajectory? What’s the business case for a Data Operating System? What is a Data Operating System and how did we get here? What difference will DOS make? What should we do with it and what should we expect?
Blockchain & Healthcare | Strategy, Implications and Implementationaurablocks
What role can Blockchain technology have in Healthcare? How big of an impact can it have and how do you get started? A brief perspective is offered. AuraBlocks.com session at Oracle Open World 2018
My Data - A Nordic Model for human-centered personal data management and proc...Joonas Pekkanen
This white paper - written by Open Knowledge Finland and published by the Ministry of Transportation and Communication of Finland - presents a framework, principles, and a model for a human-centric approach to the managing and processing of personal information. The approach – defined as MyData – is based on the right of individuals to access the data collected about them. The core idea is that individuals should be in control of their own data. The MyData approach aims at strengthening digital human rights while opening new opportunities for businesses to develop innovative personal data based services built on mutual trust.
Global Data Management: Governance, Security and Usefulness in a Hybrid WorldNeil Raden
With Global Data Management methodology and tools, all of your data can be accessed and used no matter where it is or where it is from: on-premises, private cloud, public cloud(s), hybrid cloud, open source, third-party data and any combination of the these, with security, privacy and governance applied as if they were a single entity. Ingenious software products and the economics of computing make it economical to do this. Not free, but feasible.
Future of value of data singapore.compressedFuture Agenda
This is an updated view on the future value of data. After events in Bangalore and Madrid we have added extra perspectives and these are all now being taken on to forthcoming workshops across Asia, Africa and South America in April and May.
Further events across Europe and North America in June and July will then complete this major global project
In business, we need to make sure we are ahead of the
curve as this data revolution takes shape. With connected
technology putting our customers firmly in the driving
seat, there are clear challenges which will need to be
overcome.
Modernizing Insurance Data to Drive Intelligent DecisionsCognizant
To thrive during a period of unprecedented volatility, insurers will need to leverage artificial intelligence to make faster and better business decisions - and do so at scale. For many insurers, achieving what we call "intelligent decisioning" will require them to modernize their data foundation to draw actionable insights from a wide variety of both traditional and new sources, such as wearables, auto telematics, building sensors and the evolving third-party data landscape.
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
The objective of this module is to gain an overview of the ethics surrounding big data and the legislation that governs it.
Upon completion of this module you will:
- Gain knowledge on how to recognize the necessity of regulating big data
- Obtain an understanding of the difference between privacy and data protection
- Understand the need to implement data protection actions into your own business
What should organizations be concerned about when using Machine Learning for Predictive Modeling techniques? Divergence Academy and Divergence.AI are leading efforts to bring Algorithmic Accountability awareness to masses.
Future of Digital Healthcare on Cloud .pdfayushiqss
Healthcare has been an integral part of the discussion and a transformative force towards innovation. With increasing advancements and awareness, people are becoming more conscious about their choices, what they eat, and where and how to get the best treatment facilities. This brings the need to provide the best healthcare services, disease detection, and the right treatment, with the best tools and hospital staff. The internet has played a significant role in serving such kinds of top-notch consumer needs. One of these internets of things is Cloud Technology. Let’s look at cloud computing in healthcare, models of cloud computing and how it has transformed the digital healthcare sector.
How financial organizations can use synthetic data to overcome data inertia |...Statice
This presentation details a way for banks and financial institutions to regain their ability to work with data safely and efficiently. It shows how privacy-preserving synthetic data helps enterprises gain agility in data operations while complying with the financial industry's data constraints.
It is shocking to note that about 3.5 billion people saw their
personal data stolen in the top two of the 15 biggest breaches
of this century alone. With the average cost of a data breach
exceeding $8 million, it is no wonder that safeguarding
confidential business and customer information has become
more important than ever. Furthermore, with stricter laws and governance requirements, data security is now everyone’s
responsibility across the entire enterprise.
However, that is easier said than done, and for that reason, an
an increasing number of organizations are relying heavily on data masking to proactively protect their data, avoid the cost of security breaches, and ensure compliance.
White wonder, Work developed by Eva TschoppMansi Shah
White Wonder by Eva Tschopp
A tale about our culture around the use of fertilizers and pesticides visiting small farms around Ahmedabad in Matar and Shilaj.
Transforming Brand Perception and Boosting Profitabilityaaryangarg12
In today's digital era, the dynamics of brand perception, consumer behavior, and profitability have been profoundly reshaped by the synergy of branding, social media, and website design. This research paper investigates the transformative power of these elements in influencing how individuals perceive brands and products and how this transformation can be harnessed to drive sales and profitability for businesses.
Through an exploration of brand psychology and consumer behavior, this study sheds light on the intricate ways in which effective branding strategies, strategic social media engagement, and user-centric website design contribute to altering consumers' perceptions. We delve into the principles that underlie successful brand transformations, examining how visual identity, messaging, and storytelling can captivate and resonate with target audiences.
Methodologically, this research employs a comprehensive approach, combining qualitative and quantitative analyses. Real-world case studies illustrate the impact of branding, social media campaigns, and website redesigns on consumer perception, sales figures, and profitability. We assess the various metrics, including brand awareness, customer engagement, conversion rates, and revenue growth, to measure the effectiveness of these strategies.
The results underscore the pivotal role of cohesive branding, social media influence, and website usability in shaping positive brand perceptions, influencing consumer decisions, and ultimately bolstering sales and profitability. This paper provides actionable insights and strategic recommendations for businesses seeking to leverage branding, social media, and website design as potent tools to enhance their market position and financial success.
Between Filth and Fortune- Urban Cattle Foraging Realities by Devi S Nair, An...Mansi Shah
This study examines cattle rearing in urban and rural settings, focusing on milk production and consumption. By exploring a case in Ahmedabad, it highlights the challenges and processes in dairy farming across different environments, emphasising the need for sustainable practices and the essential role of milk in daily consumption.
7 Alternatives to Bullet Points in PowerPointAlvis Oh
So you tried all the ways to beautify your bullet points on your pitch deck but it just got way uglier. These points are supposed to be memorable and leave a lasting impression on your audience. With these tips, you'll no longer have to spend so much time thinking how you should present your pointers.
Hello everyone! I am thrilled to present my latest portfolio on LinkedIn, marking the culmination of my architectural journey thus far. Over the span of five years, I've been fortunate to acquire a wealth of knowledge under the guidance of esteemed professors and industry mentors. From rigorous academic pursuits to practical engagements, each experience has contributed to my growth and refinement as an architecture student. This portfolio not only showcases my projects but also underscores my attention to detail and to innovative architecture as a profession.
Book Formatting: Quality Control Checks for DesignersConfidence Ago
This presentation was made to help designers who work in publishing houses or format books for printing ensure quality.
Quality control is vital to every industry. This is why every department in a company need create a method they use in ensuring quality. This, perhaps, will not only improve the quality of products and bring errors to the barest minimum, but take it to a near perfect finish.
It is beyond a moot point that a good book will somewhat be judged by its cover, but the content of the book remains king. No matter how beautiful the cover, if the quality of writing or presentation is off, that will be a reason for readers not to come back to the book or recommend it.
So, this presentation points designers to some important things that may be missed by an editor that they could eventually discover and call the attention of the editor.
3. Alexandros Nousias, MyData Greece
Health data analysis
Do we need it?
81% of NHS + private
healthcare sector support the
analysis of anonymized data
Should we analyze?
81%
87% support NHS should
receive a fair share of gains
following medical discoveries
Should benefit NHS?
87%
87% support taxpayers should
also benefit from gains
resulting from any analysis
Should benefit taxpayer?
87%
4. Alexandros Nousias, MyData Greece
Health data analysis
Who should do it, and for whom?
Multinationals?
12% would be
comfortable with a
multinational carrying
out the analysis
Confidentiality?
17% believe that the
data will be processed
in a confidential
manner
73%
36%
73% of doctors/nurses would recommend their
patients use data driven technology
Recommend to patients?
36% said their patients made use of existing health
care digital services
Existing patient use?
5. Alexandros Nousias, MyData Greece
API ecosystem
In the current structureless API economy, if the number of services grow,
then the number of connections between them grow at a faster rate
Government Researchers
Bank
App developers
Grocery/
Retail store
Relatives
Mobility service
Electricity company
Healthcare
Web media
Peer groups
Insurance Employers
No infrastructure
6. Alexandros Nousias, MyData Greece
Aggregator Model
Aggregating data control is easier, but different aggregators do not have a built-in
incentive to develop interoperability between them
Government
Researchers
Bank
Relatives
Grocery/
Retail store
App developers
Mobility service
Electricity company
Healthcare
Web media
Peer groups
Insurance
Employers
7. Alexandros Nousias, MyData Greece
Exclusion
Exclusion is the usual
game humans play
Human exclusion
Today it feels like 99% of
humans are excluded from
their own data
Data exclusion
8. Alexandros Nousias, MyData Greece
Exclusion ---> Inclusion
Exclusion is not inherent. It’s a human invention
Data exclusion creates a
form of apathy against
forces that seem too big to
control
Trust is broken
To rebuild trust we need to
put humans in control of
the data about them
Trust must be rebuilt
9. Alexandros Nousias, MyData Greece
Privacy vs. Innovation
Building dynamically in one another
the right to be free from
secret surveillance and to
determine whether, when,
how, and to whom, one's
personal or organizational
information is to be
revealed
Privacy
The process of translating
an idea or invention into
a good or service that
creates value or for which
customers will pay
Innovation
10. Alexandros Nousias, MyData Greece
Trust by Design
MyData. A Nordic Model for human-centered personal data management and processing
Individuals are empowered actors, not
passive targets, in the management of
their personal lives
1. Human centric control and
privacy
It is essential that personal data is
technically easy to access and use – it is
accessible in machine readable open
formats via secure, standardized APIs
2. Usable data
Shared MyData infrastructure enables
decentralized management of personal
data, improves interoperability, makes it
easier for companies to comply with
tightening data protection regulations, and
allows individuals to change service
providers without proprietary data lock-ins
3. Open business environment
11. Alexandros Nousias, MyData Greece
MyData Model
Compared to the aggregation model, MyData is resilient system
because it is not dependent on a single organization or technical infrastructure
Government
Researchers
Bank
Relatives
Grocery/
Retail store
App developers
Mobility service
Electricity company
Healthcare
Web media
Peer groups
Insurance
Employers
12. Alexandros Nousias, MyData Greece
MyData Roles
MyData Account Model
A data source collects and processes personal
data which the other roles (including Persons)
may wish to access and use
Data source
A data using service can be authorized to fetch
and use personal data from one or more data
sources
Data using service
A Personal Data Operator enables individuals to
securely access, manage and use their personal data,
as well as to control the flow of personal data with,
and between, data sources and data using services
MyData Operator
An individual that manages the use of their own
personal data, for their own purposes, and maintains
relationships with other individuals, services or
organizations
PersonThe architecture: Interoperable &
standardized MyData accounts.
For individuals: The account model provides
individuals with an easy way to control their
personal data from one place even while the
data is created, stored, and processed by
hundreds of different services.
For developers: The account model facilitates
access to data and removes dependencies
on specific data aggregators.
MyData accounts will generally be provided
by organizations that act as MyData
operators. An individual or organization may
fulfill one or more roles in the architecture.
Data Flow
Consent Flow
13. Alexandros Nousias, MyData Greece
MyData Example (health)
MyData and Occupational health
Source A:
Purchase
Data
Occupational
Health
Provider
MyData Operator
Data Flow
Consent Flow
Source B:
Public Health Care
Data
Organization
(employer)
Money Flow
Clinical data usually consist of various test
results and diagnosis. Occupational health
care providers change when individuals
change jobs. There is no convenient way to
organize data logistics between different
occupation health care providers.
Furthermore, getting more data about
individuals would significantly help
personalize and optimize health and
wellbeing services and provide alternative
means for diagnosis. The MyData
infrastructure can provide standardized
methods for managing data logistics between
different professional and public health
organizations and sources of behavioral data
in robust ways across organizations.
14. Alexandros Nousias, MyData Greece
MyData shifts
What needs to change
Formal Rights
In many countries, individuals have enjoyed legal data protection for
decades, yet their rights have remained mostly formal: little known, hard
to enforce, and often obscured by corporate practices.
Actionable Rights
We want true transparency and truly informed consent to become the new
normal for when people and organizations interact . We intend access and
redress, portability, and the right to be forgotten, to become “one-click
rights”: rights that are as simple and efficient to use as today’s and
tomorrow’s best online services.
Data Protection
Data protection regulation and corporate ethics codes are designed to
protect people from abuse and misuse of their personal data by
organizations.
Data Empowerment
We intend to change common practices towards a situation where
individuals are both protected and empowered to use the data that
organizations hold about them. Examples of such uses include simplifying
administrative paperwork, processing data from multiple sources to improve
one’s self-knowledge, personalized AI assistants, decision-making, and data
sharing under the individual’s own terms
Closed Ecosystems
Today’s data economy creates network effects favoring a few platforms
able to collect and process the largest masses of personal data. These
platforms are locking up markets, not just for their competitors, but also
for most businesses who risk losing direct access to their customers.
Open Ecosystems
By letting individuals control what happens to their data, we intend to create
a truly free flow of data – freely decided by individuals, free from global
choke points - and to create balance, fairness, diversity and competition in
the digital economy.
15. Alexandros Nousias, MyData Greece
A glance to the future of design
MyData. A Nordic Model for human-centered personal data management and processing
Less use of
personal data
Old paper times
Weak Data Protection
Lot’s of data
usage
Strong Data Protection
Complying with regulation
Organizations decide
how data is used
People decide
how data is used
16. Alexandros Nousias, MyData Greece
Positioning: Amara's law
We tend to overestimate the effect of a technology in the short run and underestimate the effect in the long run
Visibility
Time
Peak of Inflated Expectations
Technology Trigger
Trough of Disillusionment
Slope of Enlightenment
Plateau of Productivity
17. Alexandros Nousias, MyData Greece
MyData in Amara’s Law
It takes a lot of time to apply knowledge in a productive way, beyond the initial hype
Visibility
Time
Applied Knowledge
Hype
18. Alexandros Nousias, MyData Greece
Deployment PeriodInstallation Period
Maturity
Synergy
Frenzy
Irruption
Turning Point
Peak of Inflated Expectations
Technology Trigger
Trough of Disillusionment
Slope of Enlightenment
Plateau of Productivity
TEP and Amara’s law
Time
Degree
of diffusion
of the
technological
revolution
The recurring pattern of cyclical movement described by TEP and Amara's law, describing how we overestimate the effect of a technology
in the short run and underestimate the effect in the long run.
Visibility
19. Alexandros Nousias, MyData Greece
Big opportunities for business Trust is required!
Final thoughts
From sick care to preventive health care by individual involvement
Data guardians
• People
• Parties
• Operators
Create a “data civilization” to grasp the opportunities and transcend society/individual
disciplines
20. Alexandros Nousias, MyData Greece
Digital Health Ecosystem
open – ethical – trustworthy
IPR
Privacy
GDPR
Public Interest
Innovation
Market
Ethics