This document provides an overview of key concepts related to privacy, security, and big data. It discusses how easily private information can be leaked, different types of identifiability, how sensitive information can be if reidentified, and core concepts of privacy and security. It also covers security modeling, proposed privacy principles, challenges of big data, emerging approaches for big data, and the importance of lifecycle evaluation of data collection and use. The document aims to provide framing and guidance around privacy and security issues for big data.
Comments to FTC on Mobile Data PrivacyMicah Altman
FTC has been hosting a series of seminars on consumer privacy, on which it has requested comments. The most recent seminar explored privacy issues related to mobile device tracking. As the seminar summary points out ...
In most cases, this tracking is invisible to consumers and occurs with no consumer interaction. As a result, the use of these technologies raises a number of potential privacy concerns and questions.
The presentations raised an interesting and important combination of questions about how to promote business and economic innovation while protecting individual privacy. I have submitted a comment on these changes with some proposed recommendations.
To summarize (quoting from the submitted the comment):
Knowledge of an individual’s location history and associations with others has the potential to be used in a wide variety of harmful ways. ... [Furthermore], since all physical activity has a unique spatial and temporal context, location history provides a linchpin for integrating multiple sources of data that may describe an individual. Moreover, locational traces are difficult or impossible to render non-identifiable using traditional masking methods.
Big Data & Privacy -- Response to White House OSTPMicah Altman
Big data has huge implications for privacy, as summarized in our commentary below:
Both the government and third parties have the potential to collect extensive (sometimes exhaustive), fine grained, continuous, and identifiable records of a person’s location, movement history, associations and interactions with others, behavior, speech, communications, physical and medical conditions, commercial transactions, etc. Such “big data” has the ability to be used in a wide variety of ways, both positive and negative. Examples of potential applications include improving government and organizational transparency and accountability, advancing research and scientific knowledge, enabling businesses to better serve their customers, allowing systematic commercial and non-commercial manipulation, fostering pervasive discrimination, and surveilling public and private spheres.
On January 23, 2014, President Obama asked John Podesta to develop in 90 days, a 'comprehensive review' on big data and privacy.
This lead to a series of workshop on big data and technology at MIT, and on social cultural & ethical dimensions at NYU, with a third planned to discuss legal issues at Berkeley. A number of colleagues from our Privacy Tools for Research project and from the BigData@CSAIL projects have contributed to these workshops and raised many thoughtful issues (and the workshop sessions are online and well worth watching).
My colleagues at the Berkman Center, David O'Brien, Alexandra Woods, Salil Vadhan and I have submitted responses to these questions that outline a broad, comprehensive, and systematic framework for analyzing these types of questions and taxonomize a variety of modern technological, statistical, and cryptographic approaches to simultaneously providing privacy and utility. This comment is made on behalf of the Privacy Tools for Research Project, of which we are a part, and has benefitted from extensive commentary by the other project collaborators.
his talk provides an overview of the changing landscape of information privacy with a focus on the possible consequences of these changes for researchers and research institutions.
Personal information continues to become more available, increasingly easy to link to individuals, and increasingly important for research. New laws, regulations and policies governing information privacy continue to emerge, increasing the complexity of management. Trends in information collection and management — cloud storage, “big” data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Talk for the Cylab Partners Conference on Sept. 23, 2020. (1) Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs.
(2) Social influences can be used to motivate security behaviors.
Public Cloud is Not Always the Answer... but Sometimes it isAxway
IDG Event: The Future of IT | August 6, 2019 | Boston, MA
In today’s digital world, protecting unstructured data where users need on-demand access to files for sharing and collaboration is top of mind for IT and Security executives. Fifty-two percent of IT executives say their organization is concerned about storing their unstructured data in the public cloud. Why is that? Join our session and get answers to that question and get even more insight into what leading IT Leaders are thinking when it comes to balancing the needs of their users and keeping their data safe. We’ll be sharing insights and findings from research we conducted with Vanson Bourne and Ponemon Institute across 2000 IT Leaders. The research focused on security and how to protect unstructured data in a digital world where security breaches continue to happen and where privacy laws and legislation are evolving quickly, including the amendments to the Massachusetts Data Breach Notification law enacted earlier this year. Find out what is top of mind from IT leaders across Healthcare, Financial Services, Manufacturing and Government and we’ll share some insights from our customers on how they’ve handled these challenges.
Ryerson’s Privacy and Big Data Institute's inaugural seminar on Privacy by Design (PbD), the revolutionary privacy framework created by Dr. Ann Cavoukian which was unanimously passed as an international privacy standard in 2010 (translated into 37 languages). Dr. Cavoukian is now the Executive Director of the Privacy and Big Data Institute at Ryerson, and formerly served as the Information and Privacy Commissioner of Ontario for three terms. Dr. Cavoukian gave a presentation on Privacy by Design and its application to big data analytics, followed by a Q&A session.
This presentation was provided by John Wilbanks of Sage Bionetworks, during the NISO Symposium, Privacy Implications of Research Data held on September 11, 2016 in conjunction with International Data Week in Denver, Colorado
State of the Art Informatics for Research Reproducibility, Reliability, and...Micah Altman
In March, I had the pleasure of being the inaugural speaker in a new lecture series (http://library.wustl.edu/research-data-testing/dss_speaker/dss_altman.html) initiated by the Libraries at the Washington University in St. Louis Libraries -- dedicated to the topics of data reproducibility, citation, sharing, privacy, and management.
In the presentation embedded below, I provide an overview of the major categories of new initiatives to promote research reproducibility, reliability, and reuse and related state of the art in informatics methods for managing data.
Comments to FTC on Mobile Data PrivacyMicah Altman
FTC has been hosting a series of seminars on consumer privacy, on which it has requested comments. The most recent seminar explored privacy issues related to mobile device tracking. As the seminar summary points out ...
In most cases, this tracking is invisible to consumers and occurs with no consumer interaction. As a result, the use of these technologies raises a number of potential privacy concerns and questions.
The presentations raised an interesting and important combination of questions about how to promote business and economic innovation while protecting individual privacy. I have submitted a comment on these changes with some proposed recommendations.
To summarize (quoting from the submitted the comment):
Knowledge of an individual’s location history and associations with others has the potential to be used in a wide variety of harmful ways. ... [Furthermore], since all physical activity has a unique spatial and temporal context, location history provides a linchpin for integrating multiple sources of data that may describe an individual. Moreover, locational traces are difficult or impossible to render non-identifiable using traditional masking methods.
Big Data & Privacy -- Response to White House OSTPMicah Altman
Big data has huge implications for privacy, as summarized in our commentary below:
Both the government and third parties have the potential to collect extensive (sometimes exhaustive), fine grained, continuous, and identifiable records of a person’s location, movement history, associations and interactions with others, behavior, speech, communications, physical and medical conditions, commercial transactions, etc. Such “big data” has the ability to be used in a wide variety of ways, both positive and negative. Examples of potential applications include improving government and organizational transparency and accountability, advancing research and scientific knowledge, enabling businesses to better serve their customers, allowing systematic commercial and non-commercial manipulation, fostering pervasive discrimination, and surveilling public and private spheres.
On January 23, 2014, President Obama asked John Podesta to develop in 90 days, a 'comprehensive review' on big data and privacy.
This lead to a series of workshop on big data and technology at MIT, and on social cultural & ethical dimensions at NYU, with a third planned to discuss legal issues at Berkeley. A number of colleagues from our Privacy Tools for Research project and from the BigData@CSAIL projects have contributed to these workshops and raised many thoughtful issues (and the workshop sessions are online and well worth watching).
My colleagues at the Berkman Center, David O'Brien, Alexandra Woods, Salil Vadhan and I have submitted responses to these questions that outline a broad, comprehensive, and systematic framework for analyzing these types of questions and taxonomize a variety of modern technological, statistical, and cryptographic approaches to simultaneously providing privacy and utility. This comment is made on behalf of the Privacy Tools for Research Project, of which we are a part, and has benefitted from extensive commentary by the other project collaborators.
his talk provides an overview of the changing landscape of information privacy with a focus on the possible consequences of these changes for researchers and research institutions.
Personal information continues to become more available, increasingly easy to link to individuals, and increasingly important for research. New laws, regulations and policies governing information privacy continue to emerge, increasing the complexity of management. Trends in information collection and management — cloud storage, “big” data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Talk for the Cylab Partners Conference on Sept. 23, 2020. (1) Unintentional insider threat (UIT) can arise because security tools or infrastructure does not account for social needs.
(2) Social influences can be used to motivate security behaviors.
Public Cloud is Not Always the Answer... but Sometimes it isAxway
IDG Event: The Future of IT | August 6, 2019 | Boston, MA
In today’s digital world, protecting unstructured data where users need on-demand access to files for sharing and collaboration is top of mind for IT and Security executives. Fifty-two percent of IT executives say their organization is concerned about storing their unstructured data in the public cloud. Why is that? Join our session and get answers to that question and get even more insight into what leading IT Leaders are thinking when it comes to balancing the needs of their users and keeping their data safe. We’ll be sharing insights and findings from research we conducted with Vanson Bourne and Ponemon Institute across 2000 IT Leaders. The research focused on security and how to protect unstructured data in a digital world where security breaches continue to happen and where privacy laws and legislation are evolving quickly, including the amendments to the Massachusetts Data Breach Notification law enacted earlier this year. Find out what is top of mind from IT leaders across Healthcare, Financial Services, Manufacturing and Government and we’ll share some insights from our customers on how they’ve handled these challenges.
Ryerson’s Privacy and Big Data Institute's inaugural seminar on Privacy by Design (PbD), the revolutionary privacy framework created by Dr. Ann Cavoukian which was unanimously passed as an international privacy standard in 2010 (translated into 37 languages). Dr. Cavoukian is now the Executive Director of the Privacy and Big Data Institute at Ryerson, and formerly served as the Information and Privacy Commissioner of Ontario for three terms. Dr. Cavoukian gave a presentation on Privacy by Design and its application to big data analytics, followed by a Q&A session.
This presentation was provided by John Wilbanks of Sage Bionetworks, during the NISO Symposium, Privacy Implications of Research Data held on September 11, 2016 in conjunction with International Data Week in Denver, Colorado
State of the Art Informatics for Research Reproducibility, Reliability, and...Micah Altman
In March, I had the pleasure of being the inaugural speaker in a new lecture series (http://library.wustl.edu/research-data-testing/dss_speaker/dss_altman.html) initiated by the Libraries at the Washington University in St. Louis Libraries -- dedicated to the topics of data reproducibility, citation, sharing, privacy, and management.
In the presentation embedded below, I provide an overview of the major categories of new initiatives to promote research reproducibility, reliability, and reuse and related state of the art in informatics methods for managing data.
Resilience as a new Enforcement Model for IT Security based on Usage ControlSven Wohlgemuth
Security and privacy are not only general requirements of a society but also indispensable enablers for innovative IT infrastructure applications aiming at increased, sustainable welfare and safety of a society. A critical activity of these IT applications is spontaneous information exchange. This information exchange, however, creates inevitable, unknown dependencies between the participating IT systems, which, in turn threaten security and privacy. With the current approach to IT security, security and privacy follow changes and incidents rather than anticipating them. By sticking to a given threat model, the current approach fails to consider vulnerabilities which arise during a spontaneous information exchange. With the goal of improving security and privacy, this work proposes adapting an IT security model and its enforcement to current and most probable incidents before they result in an unacceptable risk for the participating parties or failure of IT applications. Usage control is the suitable security policy model, since it allows changes during run-time without conceptually raising additional incidents.
Managing Confidential Information – Trends and ApproachesMicah Altman
Personal information is ubiquitous and it is becoming increasingly easy to link information to individuals. Laws, regulations and policies governing information privacy are complex, but most intervene through either access or anonymization at the time of data publication.
Trends in information collection and management -- cloud storage, "big" data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
This session presented as part of the the Program on Information Science seminar series, examines trends information privacy. And the session will also discuss emerging approaches and research around managing confidential research information throughout its lifecycle.
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
The cybersecurity environment is becoming increasingly aggressive, with Cybercrime as a Service blurring the distinction between Advanced Persistent Threats and minor criminality. Financial institutions need to understand the human factors of the online environments in which both they and their consumers operate. Cybercriminals are growing in sophistication and intelligence, so in order to protect the public, we must understand and appreciate the psychology of the victims of fraud and phishing.
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
Information security is at a critical juncture. How do we solve the weakest link - human psychology? Insight from cyberpsychology into leadership, power and persuasion are essential. These slides are from Dr Ciarán Mc Mahon's keynote at (ISC)² Security Congress EMEA, Sofitel Munich, October 2015
Since Kevin Mitnick coined the phrase in 2002, the cybersecurity industry has been awash with the phrase 'the human factor is the weakest link’. From vendors to researchers, engineers, hackers, and journalists, we are all fond of blaming the ‘dumb users’. In this talk I argue that when we say that the ‘human being is the weakest link in cybersecurity’, not only are we telling a lie, we are inevitably setting ourselves up for a fall.
Thinking about Open Science practices, data sharing and lifetime, and communication from Climate Scientists. Slides based on a presentation given at the Lunchtime talk sessions from the MetOS Section, Department of Geosciences, University of Oslo, November 12th 2015.
Access Control for Home Data Sharing: Attitudes, Needs and PracticesmmazurekCMU
From the "At Home with Computing" session of CHI2010.
Presented by Michelle L. Mazurek.
Work done in collaboration with J.P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion*, Christina Johns, Daniel Jonggyu Lee, Yuan Liang, Jennifer Olsen, Brandon Salmon, Rich Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, and Michael K. Reiter^.
Carnegie Mellon University, *ETH Zurich, ^UNC Chapel Hill
Reproducibility from an infomatics perspectiveMicah Altman
Scientific reproducibility is most viewed through a methodological or statistical lens, and increasingly, through a computational lens. Over the last several years, I've taken part in collaborations to that approach reproducibility from the perspective of informatics: as a flow of information across a lifecycle that spans collection, analysis, publication, and reuse.
These slides sketch of this approach, and were presented at a recent workshop on reproducibility at the National Academy of Sciences, and at one our Program on Information Science brown bag talks. See: informatics.mit.edu
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESMicah Altman
This talk, is part of the MIT Program on Information Science brown bag series (http://informatics.mit.edu)
This talk reviews emerging big data sources for social scientific analysis and explores the challenges these present. Many of these sources pose distinct challenges for acquisition, processing, analysis, inference, sharing, and preservation.
Dr Micah Altman is Director of Research and Head/Scientist, Program on Information Science for the MIT Libraries, at the Massachusetts Institute of Technology. Dr. Altman is also a Non-Resident Senior Fellow at The Brookings Institution. Prior to arriving at MIT, Dr. Altman served at Harvard University for fifteen years as the Associate Director of the Harvard-MIT Data Center, Archival Director of the Henry A. Murray Archive, and Senior Research Scientist in the Institute for Quantitative Social Sciences.
Dr. Altman conducts research in social science, information science and research methods -- focusing on the intersections of information, technology, privacy, and politics; and on the dissemination, preservation, reliability and governance of scientific knowledge.
Resilience as a new Enforcement Model for IT Security based on Usage ControlSven Wohlgemuth
Security and privacy are not only general requirements of a society but also indispensable enablers for innovative IT infrastructure applications aiming at increased, sustainable welfare and safety of a society. A critical activity of these IT applications is spontaneous information exchange. This information exchange, however, creates inevitable, unknown dependencies between the participating IT systems, which, in turn threaten security and privacy. With the current approach to IT security, security and privacy follow changes and incidents rather than anticipating them. By sticking to a given threat model, the current approach fails to consider vulnerabilities which arise during a spontaneous information exchange. With the goal of improving security and privacy, this work proposes adapting an IT security model and its enforcement to current and most probable incidents before they result in an unacceptable risk for the participating parties or failure of IT applications. Usage control is the suitable security policy model, since it allows changes during run-time without conceptually raising additional incidents.
Managing Confidential Information – Trends and ApproachesMicah Altman
Personal information is ubiquitous and it is becoming increasingly easy to link information to individuals. Laws, regulations and policies governing information privacy are complex, but most intervene through either access or anonymization at the time of data publication.
Trends in information collection and management -- cloud storage, "big" data, and debates about the right to limit access to published but personal information complicate data management, and make traditional approaches to managing confidential data decreasingly effective.
This session presented as part of the the Program on Information Science seminar series, examines trends information privacy. And the session will also discuss emerging approaches and research around managing confidential research information throughout its lifecycle.
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
The cybersecurity environment is becoming increasingly aggressive, with Cybercrime as a Service blurring the distinction between Advanced Persistent Threats and minor criminality. Financial institutions need to understand the human factors of the online environments in which both they and their consumers operate. Cybercriminals are growing in sophistication and intelligence, so in order to protect the public, we must understand and appreciate the psychology of the victims of fraud and phishing.
Appreciating Contradications: The Cyberpsychology of Information SecurityCiarán Mc Mahon
Information security is at a critical juncture. How do we solve the weakest link - human psychology? Insight from cyberpsychology into leadership, power and persuasion are essential. These slides are from Dr Ciarán Mc Mahon's keynote at (ISC)² Security Congress EMEA, Sofitel Munich, October 2015
Since Kevin Mitnick coined the phrase in 2002, the cybersecurity industry has been awash with the phrase 'the human factor is the weakest link’. From vendors to researchers, engineers, hackers, and journalists, we are all fond of blaming the ‘dumb users’. In this talk I argue that when we say that the ‘human being is the weakest link in cybersecurity’, not only are we telling a lie, we are inevitably setting ourselves up for a fall.
Thinking about Open Science practices, data sharing and lifetime, and communication from Climate Scientists. Slides based on a presentation given at the Lunchtime talk sessions from the MetOS Section, Department of Geosciences, University of Oslo, November 12th 2015.
Access Control for Home Data Sharing: Attitudes, Needs and PracticesmmazurekCMU
From the "At Home with Computing" session of CHI2010.
Presented by Michelle L. Mazurek.
Work done in collaboration with J.P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion*, Christina Johns, Daniel Jonggyu Lee, Yuan Liang, Jennifer Olsen, Brandon Salmon, Rich Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, and Michael K. Reiter^.
Carnegie Mellon University, *ETH Zurich, ^UNC Chapel Hill
Reproducibility from an infomatics perspectiveMicah Altman
Scientific reproducibility is most viewed through a methodological or statistical lens, and increasingly, through a computational lens. Over the last several years, I've taken part in collaborations to that approach reproducibility from the perspective of informatics: as a flow of information across a lifecycle that spans collection, analysis, publication, and reuse.
These slides sketch of this approach, and were presented at a recent workshop on reproducibility at the National Academy of Sciences, and at one our Program on Information Science brown bag talks. See: informatics.mit.edu
BROWN BAG TALK WITH MICAH ALTMAN, SOURCES OF BIG DATA FOR SOCIAL SCIENCESMicah Altman
This talk, is part of the MIT Program on Information Science brown bag series (http://informatics.mit.edu)
This talk reviews emerging big data sources for social scientific analysis and explores the challenges these present. Many of these sources pose distinct challenges for acquisition, processing, analysis, inference, sharing, and preservation.
Dr Micah Altman is Director of Research and Head/Scientist, Program on Information Science for the MIT Libraries, at the Massachusetts Institute of Technology. Dr. Altman is also a Non-Resident Senior Fellow at The Brookings Institution. Prior to arriving at MIT, Dr. Altman served at Harvard University for fifteen years as the Associate Director of the Harvard-MIT Data Center, Archival Director of the Henry A. Murray Archive, and Senior Research Scientist in the Institute for Quantitative Social Sciences.
Dr. Altman conducts research in social science, information science and research methods -- focusing on the intersections of information, technology, privacy, and politics; and on the dissemination, preservation, reliability and governance of scientific knowledge.
BROWN BAG TALK WITH MICAH ALTMAN INTEGRATING OPEN DATA INTO OPEN ACCESS JOURNALSMicah Altman
This talk, is part of the MIT Program on Information Science brown bag series (http://informatics.mit.edu)
This talk discusses findings from an analysis of data sharing and citation policies in Open Access journals and describes a set of novel tools for open data publication in open access journal workflows. Bring your lunch and enjoy a discussion fit for scholars, Open Access fans, and students alike.
Dr Micah Altman is Director of Research and Head/Scientist, Program on Information Science for the MIT Libraries, at the Massachusetts Institute of Technology.
Software Repositories for Research -- An Environmental ScanMicah Altman
Presented at the Software Preservation Network Forum:
"We discuss the results of an environmental scan characterizing the current landscape of software repositories, hubs, and publication venues that are used in research and scholarships. The study aims to characterize the research and scholarship use cases supported by exemplar repositories, their models for sustainability, and the related key affordances, significant properties which the repository offers/maintains. We supplement this with a scan of funder and publisher policies toward software curation and citation; and a summary of key policy resources and guidelines. Using this environmental scan, we discuss a preliminary gap analysis. It hoped that by addressing these key questions, new insights will be provided into the types of decisions research Libraries can expect to make when designing future pilot software curation services."
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...Micah Altman
This class focuses on the tools and good practices for storing confidential data, sharing data for collaboration, and publishing data or derivative results for broad use. Topics covered in this class include: an overview of information security standards and frameworks; information security core practices (credentials, authentication, authorization, and auditing); information partitioning and secure linking; file, disk, and network encryption tools and practices; cloud storage practices for confidential information; data “de-identification” tools and practices; statistical disclosure limitation approaches and tools; and data use agreements.
Scientific Reproducibility from an Informatics PerspectiveMicah Altman
This talk, prepared for the MIT Program on Information Science, and updating a talk at the National Academies workshop on reproducibility, frames reproducibility from an informatics perspective
Program on Information Science Brown Bag:David Weinberger on Libraries as Pla...Micah Altman
David Weinberger, who is a Shorenstein Fellow at Harvard University, and former co-director of the Harvard Library labs, presented a talk on Libraries as Platforms: Enabling Libraries to Become Community Centers of Meaning part of the Program on Information Science Brown Bag Series.
Dr Micah Altman presented this at the Society for American Archivists 2016 Research Forum.
In this presentation I discuss some key potential topics for preservation research in the next five years.
Brown Bag: DMCA §1201 and Video Game Preservation Institutions: A Case Study ...Micah Altman
Kendra Albert, who has served as research associate at the Harvard Law School; as an intern at the Electronic Frontiers Foundation; as a fellow at the Berkman Center for Internet & Society; and is now completing her J.D. at Harvard Law, presented this talk as part of the Program on Information Science Brown Bag Series.
Kendra brings a fresh perspective developed through collaborating with librarians and archivists on projects such as as perma.cc, EFF's response to DMCA 1201, and our PrivacyTools project.
In her talk, Kendra discusses the intersection of law, librarianship and advocacy, focuses on the following question:
Archival institutions and libraries are often on the front lines of battles over ownership of digital content and the legality of ensuring copies are preserved. How can institutions devoted to preservation use their expertise to advocate for users?
Digital Document Preservation Simulation - Boston Python User's GroupMicah Altman
Mr. Rick Landau, Research Affiliate, will present a briefing at the Boston Python Users Group meeting on the topic of simulating document loss .
Durable access to information requires insuring against multiple risks such as media failures, format obsolescence, fires, floods, earthquakes,
institutional failures, mergers, funding cuts, and malicious insiders. Real libraries need empirical guidance on storage strategies and costs -- and vendor claims of reliability are often uninformative, or suspect. The talk describes how event-based simulations, coded in python, are used to simulate document loss under a variety of risks profiles, and to provide practical guidance.
This meeting will be held at the Microsoft NERD building, 1 Memorial Drive, and is open to the public. More information is available through the meeting web page:
Reputation Management for Early Career ResearchersMicah Altman
In the rapidly changing world of research and scholarly communications, researchers are faced with a fast growing range of options to publicly disseminate, review, and discuss research—options which will affect their long-term reputation. Early career scholars must be especially thoughtful in choosing how much effort to invest in dissemination and communication, and what strategies to use.
Dr. Micah Altman briefly reviews a number of bibliometric and scientometric studies of quantitative research impact, a sampling of influential qualitative writings advising this area, and an environmental scan of emerging researcher profile systems. Based on this review, and on professional experience on dozens of review panels, Dr. Altman suggests some steps early career researchers may consider when disseminating their research and participating in public reviews and discussion.
MIT Program on Information Science Talk -- Ophir Frieder on Searching in Hars...Micah Altman
Ophir Frieder, who holds the Robert L. McDevitt, K.S.G., K.C.H.S. and Catherine H. McDevitt L.C.H.S. Chair in Computer Science and Information Processing at Georgetown University, gave this talk on Searching in Harsh Environments as part of the Program on Information Science Brown Bag Series.
In the talk, illustrated by the slides below, Ophir rebuts the myth that "google has solved search", and discusses the challenges of searching for complex object, through hidden collections, and in harsh environments For more see: http://informatics.mit.edu/blg
BROWN BAG TALK WITH CHAOQUN NI- TRANSFORMATIVE INTERACTIONS IN THE SCIENTIFIC...Micah Altman
This talk, is part of the MIT Program on Information Science brown bag series (http://informatics.mit.edu)
A competitive scientific workforce is essential for the health and well-being of a society. However, U.S. dominance in the global knowledge economy has been challenged in recent years: the U.S. is outspent by China (in terms of R&D funding) and out-produced by the EU (in terms of doctoral graduates and scientific publications). Furthermore, gender inequalities persist, with men producing more scientific articles than women in every state.
From Dr. Ni, "I argue that, for a country to be scientifically competitive, it must maximize its human intellectual capital-base and support this workforce equitably and efficiently. I propose here a large-scale and heterogeneous analysis of the sociality, equality, and dynamicity of the scientific workforce through novel computational models for understanding and predicting the career trajectory of scientists based on their transformative interactions, gender, and levels of funding. This analysis will be able to isolate factors that contribute to the health and well-being of the scientific workforce. The computational models will quantify the impact of those transformative events and interactions and provide models to predict the career trajectory of scientists based on their gender, the size and position of the social network, and other demographic factors."
Chaoqun Ni got her Bachelor’s and Master’s degree in E-Commerce and Information System from Wuhan University, and Doctoral Degree in Information Science from Indiana University in Bloomington.
Chaoqun Ni's research has appeared in a variety of computer science, informatics, library, and scientific publications, including Nature, Scientometrics, Journal of Association for Information Science and Technology, and Simmons SLIS' Library and Information Science Research. In addition to receiving a Dean's Fellowship from the Department of Information & Library Science at Indiana University Bloomington, Ni received the Association for Information Science and Technology's New Leader Award in 2011, and the Association for Library and Information Science Education Doctoral Student Award in 2014.
Brown Bag: New Models of Scholarly Communication for Digital Scholarship, by ...Micah Altman
In his talk for the MIT Libraries Program on Information Science, Steve Griffin discusses how how research libraries can play a key and expanded role in enabling digital scholarship and creating the supporting activities that sustain it.
Can computers be feminist? Program on Information Science Talk by Gillian SmithMicah Altman
For more on this talk see: informatic.mit.edu
Gillian Smith who an Assistant Professor in Art+Design and Computer Science at Northeastern University, gave this talk entitled Can Computers be Feminist? Procedural Politics and Computational Creativity, as part of the Program on Information Science Brown Bag Series.
In the talk, illustrated through the slides below, Gillian presented a perspective on computing viewed as a co-creation of developer, algorithm, data, and user. And the talk argued that developers embed, through the selection of algorithm and data, specific ethical and epistemic commitments within the software they produce.
BROWN BAG: THE VISUAL COMPONENT: MORE THAN PRETTY PICTURES - WITH FELICE FRANKELMicah Altman
Visual representation of all kinds are becoming more important in our ever growing image-based society, especially in science and technology. Yet there has been little emphasis on developing standards in creating or critiquing those representations. We must begin to consider images as more than tangential components of information and find ways to seamlessly search for accurate and honest depictions of complex scientific phenomena. I will discuss a few ideas to that end and show my own process of making visual representations in sciences and engineering. I will also make the case that representations are just as "intellectual" as text.
About the discussant:
Science photographer Felice Frankel is a research scientist in the Center for Materials Science and Engineering at the Massachusetts Institute of Technology with additional support from Chemical Engineering, Materials Science and Engineering, and Mechanical Engineering.
She is a fellow of the American Association for the Advancement of Science, a Guggenheim Fellow, and was a Senior Research Fellow in Harvard University’s Faculty of Arts and Sciences and a Visiting Scholar at Harvard Medical School’s Department of Systems Biology.
She most recently developed and instructed the first online MOOC addressing science and engineering photography. Click the following link to access 31 tutorials and supplemental material: “Making Science and Engineering Pictures, A Practical Guide to Presenting Your Work.” (course 0.111x)
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social, and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Leveraging Apps, Social Media, and Your Digital Reputation for Professional S...Paul Brown
Originally presented as a webinar to the membership of OSA-The Optical Society in November of 2015. This presentation provides an overview of how to leverage social media and online tools to enhance networking and one's own visibility and brand.
MIT Program on Information Science Talk -- Julia Flanders on Jobs, Roles, Ski...Micah Altman
Julia Flanders, who is the Director of the Digital Scholarship Group in the Northeastern University Library, and a Professor of Practice in Northeastern's English Department gave a talk on Jobs, Roles, Skills, Tools: Working in the Digital Academy as part of the Program on Information Science Brown Bag Series.
In the talk, illustrated by the slides below, Julia discusses the evolving landscape of digital humanities (and digital scholarship more broadly) and considers the relationship between technology, tool development, and professional roles.
For more see: http://informatics.mit.edu/event/brown-bag-jobs-roles-skills-tools-working-digital-academy-julia-flanders
data mining privacy concerns ppt presentationiWriteEssays
Data Mining and privacy Presentation
This is a sample presentation on data mining. The presetation looks at the critical Issues In Data Mining: Privacy, National Security And Personal Liberty Implications Of Data Mining
Running Head: DATA BREACH 1
DATA BREACH 9
Data Breach Research Proposal
Introduction
In the present world, there has been a series of technological advancements especially in this era of digital migration where everybody is using technology. However, a lot of people do not realize that there are problems that arise as technological changes continue happening. One of the biggest challenge faced in the technological environment is data breaching. This refers to incidences where an individual’s private and confidential information is accessed by unauthorized individuals. Due to diverse lack of technological knowhow, a lot of people and organizations have become victims as occurrences of these data breaches rise each day. In the last two years at least 258,000 organizations has fallen as an estimate of about 3.9 million individuals from different parts of the world has been robbed as a result of data breaches (Ayyagari, 2012).
Clearly, the victim figure above emphasizes the need to come up with a solution to the data breaches more than ever before. The motivation behind carrying out the author’s my proposed research is the rapid changes in the world of technology thatwhich does not match the rate at which a big population adjusts along with the technological changes. This makes them vulnerable to more and more data breaches every day if something is not done. I believe that creating awareness concerning how to be data secure will greatly impact the world positively through reducing the data breaches occurrences.
In my research, I look forward to investigating a number of issues as far as data breaches are concerned. The issues include:
· Causes of data breaches.
· How the data breaches are done.
·
Solution
s to data breaches.
Importance of the proposed research.
With the continual technological advancements, I believe that if a large population of people as well as organizations that make use of technology to store their confidential data get to know all about these issues as well as how to combat data breaches, then the world would be a peaceful place to live in. it will also give room for further technological advancements as the more data secure people will be more willing to embrace the changes.
Literature review
“Meyer, C. H., & Matyas, S. M. (1982). CRYPTOGRAPHY: A new dimension in computer data security: A guide for the design and implementation of secure systems. Wiley.”Comment by Herbert Kemp: I assume the final lit review will be longer….
My theoretical framework
Causes of data breaches
One of the causes of data breaches is cyber-attacks. This has been the leading data security threat over the last two years. This refers to a situation whereby an individual- cybercriminal- accesses an organization’s data and uses it for malicious gains whether for fun, for financial gains or even for undercover activities such as spying.
Another cause of data br.
Privacy Engineering: Enabling Mobility of Mental Health Services with Data Pr...CREST
This presentation describes privacy engineering for mobile health apps. it revealed that top-ranked apps lack fundamental data protection mechanisms, and that explicit and understandable consent in apps is needed for data access/sharing within or across organisations
This tutorial provides a framework for identifying and managing confidential information in research. It is most appropriate for mid-late career graduate students, faculty, and professional research staff who actively engage in the design/planning of research. The course will provide an overview of the major legal requirements governing confidential research data; and the core technological measures used to safeguard data. And it will provide an introduction to the statistical methods and software tools used to analyze and limit disclosure risks.
This presentation was provided by Dr. Micah Altman of MIT during the NISO Symposium, Privacy Implications of Research Data, held on September 11, 2016 in conjunction with the International Data Week events in Denver, Colorado.
In August 2013, a multidisciplinary group gathered at the Rockefeller Foundation’s Bellagio Center to address the theme of “Community Resilience Through big data and Technology.” Creative and critical thinkers were selected from the technology sector, academia, the arts, humanitarian and ecological spheres. Over ten days, we explored how data could be used to help build community resilience in the face of a range of stresses — environmental, political, social and economic. Large data collection and analysis may support communities by providing them with timely feedback loops on their immediate environment. However, the collection and use of data can also create new vulnerabilities and risks, by enabling discriminating against individuals, skewing evidence, and creating dependencies on centralized infrastructure that may increase a system’s vulnerability. After analyzing these risks and opportunities, we developed a framework to help guide the effective use of data for building community-driven resilience. In this framework, we propose six domains: ethics, governance, science, technology, place and sociocultural context. We believe that by considering all six domains together, organizations can safeguard against predictable failures by exposing project weaknesses from the outset rather than in hindsight.
De-anonymizing, Preserving and Democratizing Data Privacy and OwnershipIIIT Hyderabad
The fourth industrial revolution warrants a rapid change to technology, industries, and societal patterns and processes in the 21st century due to increasing interconnectivity and intelligent automation. It brings a dire necessity for data collection at a large scale. The organizations responsible for shepherding the technology to the next level rely on data-hungry algorithms developed due to the advancements in machine learning and deep learning in the last decade. Often, the collected data include personally identifiable information (PII) and pseudo identifiers like age, gender, zip codes, and non-PII attributes. Due to the inclusion of PII attributes, data protection and clearly defining its ownership has become paramount. Despite having several compliances in place like the Health Insurance Portability and Accountability Act (HIPAA) and the National Data Health Mission (NDHM) for healthcare, or the more comprehensive General Data Protection Regulation (GDPR), we witness wrongful disclosure, theft and misuse of data by the organizations that are supposed to be the torchbearers into the new era of technology. Apart from external attacks and breaches, many organizations tend to find workarounds and not follow the data privacy standards governed by laws across the globe. The malpractices like selling data to third parties, using weaker anonymizations, and claiming ownership of data often lead to the loss of sensitive information that directly impacts the people whose data is collected and mishandled in the name of providing services.
Researchers who tried to find a solution to the data misuse problem developed anonymization techniques. However, these techniques like k-anonymity, l-diversity, t-closeness, etc., are proven to be weak and vulnerable by privacy researchers. They have applied cross-linking techniques to de-anonymize i) patients using electronic health records and other public records, ii) American query logs to conclude that 87% of the American population can be uniquely identified by knowing pseudo identifiers like age, gender, and zip codes. As part of our research, we present a cross-linking attack to identify personal identifiable information (PII), including address, family details, voter ID information with just the Twitter username, and publicly available electoral rolls. We further show how academic institutions employ weaker anonymizations to release students’ information, making them vulnerable to cross-linking attacks.
Several anonymized data releases failed due to cross-linking vulnerabilities it carries. We will now discuss differential privacy and how it curbs the limitations of anonymization algorithms. Differential privacy (DP) is a system for publicly sharing information about a dataset by describing the patterns of groups within the dataset while withholding information about individuals. Unlike anonymization, where we reveal the actual individual samples, DP adds noise in a manner such that individual data samples
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
Although there is no well-established definition of big data, its main characteristic is its sheer volume. Large volumes of data are generated by people (e.g., via social media) and by technology, including sensors (e.g., cameras, microphones), trackers (e.g., RFID tags, web surfing behavior) and other devices (e.g., mobile phones, wearables for self-surveillance/quantified self), whether or not they are connected to the Internet of Things. However, the large volumes of data needed to capitalize on the benefits of big data can to some extent also be established by the reuse of existing data, a source that is sometimes overlooked.
Data can be reused for purposes similar to that for which it was initially collected, but also beyond these purposes. Similarly, data can be reused in its original context, but also beyond this context. However, such repurposing and recontextualizing of data may lead to privacy issues. For instance, data reuse may lead to issues regarding informed consent and informational self-determination. When the data is used for profiling and other types of predictive analytics, also issues regarding stigmatization and discrimination may arise. This presentation by Bart Custers, Head of Research, eLaw – Center for Law and Digital Technologies at Leiden University, The Netherlands, focuses on the privacy issues of big data sharing and reuse and how these issues could be addressed.
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
Seventh lecture of the course CSS01: Introduction to Computational Social Science at the University of Helsinki, Spring 2015.(http://blogs.helsinki.fi/computationalsocialscience/).
Lecturer: Lauri Eloranta
Questions & Comments: https://twitter.com/laurieloranta
Selecting efficient and reliable preservation strategiesMicah Altman
This article addresses the problem of formulating efficient and reliable operational preservation policies that ensure bit-level information integrity over long periods, and in the presence of a diverse range of real-world technical, legal, organizational, and economic threats. We develop a systematic, quantitative prediction framework that combines formal modeling, discrete-event-based simulation, hierarchical modeling, and then use empirically calibrated sensitivity analysis to identify effective strategies.
This discussion, covened by the Dubai Future Foundation, focusses on identifying the significance of the concept of well-being for social-science and policy; and the opportunities to measure it at scale.
Matching Uses and Protections for Government Data Releases: Presentation at t...Micah Altman
In the work included below, and presented at the Simons Institute, we describe work-in progress that aims to align emerging methods of data protections with research uses.
Privacy Gaps in Mediated Library Services: Presentation at NERCOMP2019Micah Altman
Libraries enable patrons to access a wide range of information, but much of the access to this information is now directly managedy publishers. This has lead to a significant gap across library values, patrons perception of privacy, and effective privacy protection for access to digital resources.
In the work included below, and presented at NERCOMP 2019, we review privacy principles based on ALA, IFLA, and NISO policies. We then organizing and comparing high level privacy protections required by ALA checklist, NISO, and GDPR. This framework of principles and controls is then used to score the privacy policies and practices of major vendors of research library content. We evaluate each element of the vendors privacy policy, and use instrumented browsers to identify the types of tracking mechanisms used by different vendors. We use this set of privacy scores to support analyses of change over time, and of potential gaps between patron expectations and privacy policies and practices.
Presentation by Philip Cohen on collaborative work with Micah Altman as part of the MIT CREOS research talk series. Presented in fall 2018, in Cambridge, MA.
Contemporary journal peer review is beset by a range of problems. These include (a) long delay times to publication, during which time research is inaccessible; (b) weak incentives to conduct reviews, resulting in high refusal rates as the pace of journal publication increases; (c) quality control problems that produce both errors of commission (accepting erroneous work) and omission (passing over important work, especially null findings); (d) unknown levels of bias, affecting both who is asked to perform peer review and how reviewers treat authors, and; (e) opacity in the process that impedes error correction and more systematic learning, and enables conflicts of interest to pass undetected. Proposed alternative practices attempt to address these concerns -- especially open peer review, and post-publication peer review. However, systemic solutions will require revisiting the functions of peer review in its institutional context.
Presentation by Philip Cohen and Micah Altman on developing an exchange system for peer review in support for open science. Prepared for presentation at the ACRL-SSRC meeting on Open scholarship in the social sciences. Washington DC, Dec 2018
Redistricting in the US -- An OverviewMicah Altman
This presentation was prepared for the International Seminar on Electoral Districting, National Electoral Institute El Colegio de México. http://www.ine.mx/seminario-internacional-distritacion-electoral/
This presentation was prepared for the International Seminar on Electoral Districting, National Electoral Institute El Colegio de México. http://www.ine.mx/seminario-internacional-distritacion-electoral/
A History of the Internet :Scott Bradner’s Program on Information Science Talk Micah Altman
Scott Bradner is a Berkman Center affiliate who worked for 50 at Harvard in the areas of computer programming, system management, networking, IT security, and identity management. Scott Bradner was involved in the design, operation and use of data networks at Harvard University since the early days of the ARPANET and served in many leadership roles in the IETF. He presented the talk recorded below, entitled, A History of the Internet -- as part of Program on Information Science Brown Bag Series:
Bradner abstracted his talk as follows:
In a way the Russians caused the Internet. This talk will describe how that happened (hint it was not actually the Bomb) and follow the path that has led to the current Internet of (unpatchable) Things (the IoT) and the Surveillance Economy.
SAFETY NETS: RESCUE AND REVIVAL FOR ENDANGERED BORN-DIGITAL RECORDS- Program ...Micah Altman
The web is now firmly established as the primary communication and publication platform for sharing and accessing social and cultural materials. This networked world has created both opportunities and pitfalls for libraries and archives in their mission to preserve and provide ongoing access to knowledge. How can the affordances of the web be leveraged to drastically extend the plurality of representation in the archive? What challenges are imposed by the intrinsic ephemerality and mutability of online information? What methodological reorientations are demanded by the scale and dynamism of machine-generated cultural artifacts? This talk will explore the interplay of the web, contemporary historical records, and the programs, technologies, and approaches by which libraries and archives are working to extend their mission to preserve and provide access to the evidence of human activity in a world distinguished by the ubiquity of born-digital materials.
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Labor And Reward In Science: Commentary on Cassidy Sugimoto’s Program on Info...Micah Altman
Cassidy Sugimoto is Associate Professor in the School of Informatics and Computing, Indiana University Bloomington, who researches within the domain of scholarly communication and scientometrics, examining the formal and informal ways in which knowledge producers consume and disseminate scholarship. She presented this talk, entitled Labor And Reward In Science: Do Women Have An Equal Voice In Scholarly Communication? A Brown Bag With Cassidy Sugimoto, as part of the Program on Information Science Brown Bag Series.
Despite progress, gender disparities in science persist. Women remain underrepresented in the scientific workforce and under rewarded for their contributions. This talk will examine multiple layers of gender disparities in science, triangulating data from scientometrics, surveys, and social media to provide a broader perspective on the gendered nature of scientific communication. The extent of gender disparities and the ways in which new media are changing these patterns will be discussed. The talk will end with a discussion of interventions, with a particular focus on the roles of libraries, publishers, and other actors in the scholarly ecosystem..
Utilizing VR and AR in the Library Space:Micah Altman
Matt Bernhardt is a web developer in the MIT libraries and a collaborator in our program. He presented this talk, entitled Reality Bytes - Utilizing VR and AR in The Library Space, as part of Program on Information Science Brown Bag Series.
Terms like "virtual reality" and "augmented reality" have existed for a long time. In recent years, thanks to products like Google Cardboard and games like Pokemon Go, an increasing number of people have gained first-hand experience with these once-exotic technologies. The MIT Libraries are no exception to this trend. The Program on Information Science has conducted enough experimentation that we would like to share what we have learned, and solicit ideas for further investigation.
For slides and comments see: http://informatics.mit.edu/blog
Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-NotsMicah Altman
Catherine D'Ignazio is an Assistant Professor of Civic Media and Data Visualization at Emerson College, a principal investigator at the Engagement Lab, and a research affiliate at the MIT Media Lab/Center for Civic Media. She presented this talk, entitled, Creative Data Literacy: Bridging the Gap Between Data-Haves and Have-Nots as part of Program on Information Science Brown Bag Series.
Communities, governments, libraries and organizations are swimming in data—demographic data, participation data, government data, social media data—but very few understand what to do with it. Though governments and foundations are creating open data portals and corporations are creating APIs, these rarely focus on use, usability, building community or creating impact. So although there is an explosion of data, there is a significant lag in data literacy at the scale of communities and citizens. This creates a situation of data-haves and have-nots which is troubling for an open data movement that seeks to empower people with data. But there are emerging technocultural practices that combine participation, creativity, and context to connect data to everyday life. These include data journalism, citizen science, emerging forms for documenting and publishing metadata, novel public engagement in government processes, and participatory data art. This talk surveys these practices both lovingly and critically, including their aspirations and the challenges they face in creating citizens that are truly empowered with data.
SOLARSPELL: THE SOLAR POWERED EDUCATIONAL LEARNING LIBRARY - EXPERIENTIAL LEA...Micah Altman
Access to high-quality, relevant information is absolutely foundational for a quality education. Yet, so many schools across the developing world lack fundamental resources, like textbooks, libraries, electricity and Internet connectivity. The SolarSPELL (Solar Powered Educational Learning Library) is designed specifically to address these infrastructural challenges, by bringing relevant, digital educational content to offline, off-grid locations. SolarSPELL is a portable, ruggedized, solar-powered digital library that broadcasts a webpage with open-access educational content over an offline WiFi hotspot, content that is curated for a particular audience in a specified locality—in this case, for schoolchildren and teachers in remote locations. It is a hands-on, iteratively developed project that has involved undergraduate students in all facets and at every stage of development. This talk will examine the design, development, and deployment of a for-the-field technology that looks simple but has a quite complex background.
Laura Hosman is Assistant Professor at Arizona State University, holding a joint appointment in the School for the Future of Innovation in Society and in The Polytechnic School. Her work is action-oriented and focuses on the role for information and communications technology (ICT) in developing countries. Presently, she focuses on ICT-in-education projects, and brings her passion for experiential learning to the classroom by leading real-world-focused, project-based courses that have seen student-built technology deployed in schools in Haiti, Vanuatu, Micronesia, Samoa, and Tonga.
Information Science Brown Bag talks, hosted by the Program on Information Science, consists of regular discussions and brainstorming sessions on all aspects of information science and uses of information science and technology to assess and solve institutional, social and research problems. These are informal talks. Discussions are often inspired by real-world problems being faced by the lead discussant.
Making Decisions in a World Awash in Data: We’re going to need a different bo...Micah Altman
In his abstract, Scriffignano summarizes as follows:
l explore some of the ways in which the massive availability of data is changing and the types of questions we must ask in the context of making business decisions. Truth be told, nearly all organizations struggle to make sense out of the mounting data already within the enterprise. At the same time, businesses, individuals, and governments continue to try to outpace one another, often in ways that are informed by newly-available data and technology, but just as often using that data and technology in alarmingly inappropriate or incomplete ways. Multiple “solutions” exist to take data that is poorly understood, promising to derive meaning that is often transient at best. A tremendous amount of “dark” innovation continues in the space of fraud and other bad behavior (e.g. cyber crime, cyber terrorism), highlighting that there are very real risks to taking a fast-follower strategy in making sense out of the ever-increasing amount of data available. Tools and technologies can be very helpful or, as Scriffignano puts it, “they can accelerate the speed with which we hit the wall.” Drawing on unstructured, highly dynamic sources of data, fascinating inference can be derived if we ask the right questions (and maybe use a bit of different math!). This session will cover three main themes: The new normal (how the data around us continues to change), how are we reacting (bringing data science into the room), and the path ahead (creating a mindset in the organization that evolves). Ultimately, what we learn is governed as much by the data available as by the questions we ask. This talk, both relevant and occasionally irreverent, will explore some of the new ways data is being used to expose risk and opportunity and the skills we need to take advantage of a world awash in data.
The Open Access Network: Rebecca Kennison’s Talk for the MIT Prorgam on Infor...Micah Altman
Rebecca Kennison, who is the Principal of K|N Consultants, the co-founder of the Open Access Network; and was was the founding director of the Center for Digital Research and Scholarship, gave this talk on Come Together Right Now: An Introduction To The Open Access Network as part of the Program on Information Science Brown Bag Series.
Gary Price, MIT Program on Information ScienceMicah Altman
Gary Price, who is chief editor of InfoDocket, contributing editor of Search Engine Land, co-founder of Full Text Reports and who has worked with internet search firms and library systems developers alike, gave this talk on Issues in Curating the Open Web at Scale as part of the Program on Information Science Brown Bag Series.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
UN Global Pulse Privacy Framing
1. Framing Privacy and Security
Core Concepts & Principles
Micah Altman
Director of Research
MIT Libraries
Prepared for
United Nations Global Pulse Workshop ICT4D Principle 8:
Privacy and Security
New York
May 2015
2. DISCLAIMER
These opinions are my own, they are not the
opinions of MIT, Brookings, any of the project
funders, nor (with the exception of co-authored
previously published work) my collaborators
Secondary disclaimer:
“It’s tough to make predictions, especially about
the future!”
-- Attributed to Woody Allen, Yogi Berra, Niels Bohr, Vint Cerf, Winston
Churchill, Confucius, Disreali [sic], Freeman Dyson, Cecil B. Demille, Albert
Einstein, Enrico Fermi, Edgar R. Fiedler, Bob Fourer, Sam Goldwyn, Allan
Lamport, Groucho Marx, Dan Quayle, George Bernard Shaw, Casey Stengel,
Will Rogers, M. Taub, Mark Twain, Kerr L. White, etc.
Framing Privacy and Security Core Concepts &
Principles
2
3. Collaborators & Co-Conspirators
Privacy Tools for Sharing Research Data Team
(Salil Vadhan, P.I.)
http://privacytools.seas.harvard.edu/people
Research Support
Supported in part by NSF grant CNS-123723
Supported in part by the Sloan Foundation
Framing Privacy and Security Core Concepts &
Principles
3
4. Related Work
Main Project:
Privacy Tools for Sharing Research Data
http://privacytools.seas.harvard.edu/
Related publications:
Novak, K., Altman, M., Broch, E., Carroll, J. M., Clemins, P. J., Fournier, D., Laevart,
C., et al. (2011). Communicating Science and Engineering Data in the Information
Age. Computer Science and Telecommunications. National Academies Press
Vadhan, S., et al. 2011. “Re: Advance Notice of Proposed Rulemaking: Human
Subjects Research Protections.”
Altman, M., D. O’Brien, S. Vadhan, A. Wood. 2014. “Big Data Study: Request for
Information.”
O'Brien, et al. 2015. “When Is Information Purely Public?” (Mar. 27, 2015) Berkman
Center Research Publication No. 2015-7.
Wood, et al. 2014. “Long-Term Longitudinal Studies” (July 22, 2014). Berkman Center
Research Publication No. 2014-12.
Slides and reprints available from:
informatics.mit.edu
Framing Privacy and Security Core Concepts &
Principles
4
5. It’s easy to leak private information…
Birth date + zipcode +
gender uniquely identify
~87% of people in the U.S.
Can predict social security
number using
birthdate/place
Tables, graphs and maps
can reveal identifiable
information
People have been identified
through movie rankings,
search strings, movement
patterns, shopping habits,
writing style…
Brownstein, et al., 2006 , NEJM 355(16),
5 Framing Privacy and Security Core Concepts &
Principles
6. Different types of identifiability
Framing Privacy and Security Core Concepts &
Principles
6
Record-linkage
“where’s waldo”
•Match a real person to precise
record in a database
•Examples: direct identifiers.
•Caveats: Satisfies compliance for
specific laws, but not generally;
substantial potential for harm
remains
Indistinguishability
“hiding in the crowd”
•Individuals can be linked only to a
cluster of records (of known size)
•Examples: K-anonymity, attribute
disclosure
•Caveats: Potential for substantial
harms may remain, must specify
what external information is
observable, & need diversity for
sensitive attributes
Limited Adversarial Learning
“confidentiality guaranteed”
•Formally bounds the total learning
about any individual that occurs
from a data release
•Examples: differential privacy, zero-
knowledge proofs
•Caveats: Challenging to implement,
requires interactive system
Less Protection More Protection
7. How sensitive is information, if reidentified?
Framing Privacy and Security Core Concepts &
Principles
7
… creates minimal risk of harm –
even if linked to an individual
… creates a non-minimal risk of minor harm
Examples: information that would reasonably be
expected to cause embarrassment to some
individuals.
… creates significant risk of moderate harm
Examples: civil liability, moderate psychological
harm, or material social harm to individuals or
groups, economic discrimination, moderate
economic direct costs, substantial loss to
reputation
… creates substantial risk of serious harm
Examples: serious psychological harm; loss of
insurability, loss of employability; substantial
social harm to a vulnerable group
… creates high risk of grave harm
Examples: death; significant injury; persecution
Data Subjects Vulnerable Groups
Institutions Society
Who is harmed?How much harm & how likely?
8. Privacy Core Concepts
Privacy
Control over extent and
circumstances of sharing
Confidentiality
Control over disclosure of
information
Identifiability
Potential for learning
about individuals based
on their inclusion in a data
Sensitivity
Potential for harm
if information disclosed and
identified
8
9. Information Security Core Concepts
Confidentiality
• control over disclosure
Integrity
• control over modification
Availability
• authorized users can access as needed
Authenticity
• authorized users can validate information
source
9 Framing Privacy and Security Core Concepts & Principles
10. Security Modeling
Framing Privacy and Security Core Concepts &
Principles
10
Analysis:
threats
(natural, unintentional,
intentional)
vulnerabilities
(logical, physical, social)
Systems
(computers, storage,
networks)
System
Analysis
Threat Modeling
Vulnerability
Identification
Analysis
- likelihood
- impact
- mitigating controls
Institute
Selected
Controls
Testing and
Auditing
NIST: Information Security Control Selection
Controls:
process
(policies, procedures, training,…)
technical
(identification, access,
transmission, auditing …)
external
(law, norms, economic, …)
11. Some Proposed Privacy Principles
Framing Privacy and Security Core Concepts &
Principles
11
Fair Information
Practice:
Notice/awareness
Choice/consent
Access/participatio
n
(verification,
accuracy,
correction)
Integrity/security
Enforcement/redre
ss
Self-regulation,
private remedies;
government
enforcements
Privacy by design:
Proactive not reactive;
Preventative not
remedial
Privacy as the default
setting
Privacy embedded into
design
Full Functionality –
Positive-Sum, not
Zero-Sum
End-to-End Security –
Full Lifecycle
Protection
Visibility and
Transparency – Keep it
Open
Respect for User
Privacy – Keep it User-
Centric
OECD
Principles
Collection
limitation
Data quality
Purpose
specification
Use limitation
Security
Safeguards
Openness
Individual
participation
Accountability
12. How is Big Data Different?
Anonymization can completely destroy utility
The “Netflix Problem”: large, sparse datasets that overlap can be
probabilistically linked [Narayan and Shmatikov 2008]
Observable Behavior Leaves Unique “Fingerprints”
The “GIS”: fine geo-spatial-temporal data impossible mask, when
correlated with external data [Zimmerman 2008; ]
Big Data can be Rich, Messy & Surprising
The “Facebook Problem”: Possible to identify masked network data, if
only a few nodes controlled. [Backstrom, et. al 2007]
The “Blog problem” : Pseudononymous communication can be linked
through textual analysis [Novak wet. al 2004]
Little Data in a Big World
The “Favorite Ice Cream” problem
-- public information that is not risky can help us learn
information that is risky
The “Doesn’t Stay in Vegas” problem
-- information shared locally can be found anywhere
The “Unintended Discrimination” problem
-- algorithms are often not transparent, and can amplify human
biases
Source: [Calberese 2008; Real
Time Rome Project 2007]
12 Framing Privacy and Security Core Concepts &
Principles
13. Emerging Approaches for Big Data
Controlled remote access
Varies from remote access to all data and output to human vetting of
output
Restrictions on use, easier to enforce
Advantages: auditable, potential to impose human review, potential to limit
analysis
Disadvantages: complex to implement, slow
Model servers
Mediated remote access – analysis limited to designated models
Differential privacy methods can be used to formally guarantee
confidentiality of some models
Advantages: faster, no human in loop
Disadvantage: limited set of models currently supported; complex to
implement
Experimental approaches
Personal Data Stores
Automatic Data Auditing and Accountability
Multi-party computing
Functional encryption
13 Lightning Overview: Identification & “Anonymization”
14. Lifecycle Evaluation
Framing Privacy and Security Core Concepts &
Principles
14
What is collected?
Scope of information collected
Intended uses
Potential benefits from data
availability
Re-identification (learning) risks
Information sensitivity (harm out of
context)
Controls on retention
Possible information
transformations
(aggregation, redaction)
Post-disclosure control and
evaluation:
use limits, review , reporting, and
information accountability
15. Observations
Framing Privacy and Security Core Concepts &
Principles
15
Confidentiality requires limiting what an adversary
can learn about an individual as a result of their
being measured
Common overarching principles do not provide
sufficient guidance to select effective controls and
approaches
Generic/naïve use of extant data sharing or
redaction controls and technologies are unlikely to
provide adequate protection in a big data world.
Evaluate the privacy and security risks, controls, and
accountability mechanisms, over the entire
information lifecycle – including collection, consent,
use, dissemination, and post-disclosure
16. Additional References
v. 24 (January IAP
Session 1)
A Aquesti, L John, G Lowestein, 2009, "What is Privacy Worth", 21rst Rowkshop in Information Systems and Economics.
A. Blum, K. Ligett, A Roth, 2008. “A Learning Theory Approach to Non-Interactive Database Privacy”, STOC’08
L. Backstrom, C. Dwork, J. Kleinberg. 2007, Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns,
and Structural Steganography. Proc. 16th Intl. World Wide Web Conference., KDD 008
J. Brickell, and V. Shmatikov, 2008. The Cost of Privacy: Destruction of Data-Mining Utility in Annoymized Data Publishing
P. Buneman, A. Chapman an.d J. Cheney, 2006,
‘Provenance Management in Curated Databases’, in Proceedings of the 2006 ACM SIGMOD International Conference on Ma
nagement of Data, (Chicago, IL: 2006), 539‐550. http://portal.acm.org/citation.cfm?doid=1142473.1142534;
Calabrese F., Colonna M., Lovisolo P., Parata D., Ratti C., 2007, "Real-Time Urban Monitoring Using Cellular Phones: a
Case-Study in Rome", Working paper # 1, SENSEable City Laboratory, MIT, Boston http://senseable.mit.edu/papers/,
[also see the Real Time Rome Project [http://senseable.mit.edu/realtimerome/]
Campbell,. D. 2009, reported in D, Goodin 2009, Amazon's EC2 brings new might to password cracking, The Register, Nov 2,
2009, http://www.theregister.co.uk/2009/11/02/amazon_cloud_password_cracking/
Dinur and K. Nissim. Revealing information while preserving privacy. Proceedings of the twenty-second ACM SIGMOD-
SIGACT-SIGART Symposium on Principles of Database Systems, pages 202–210, 2003.
C. Dwork, M Naor, O Reingold, G Rothblum, S Vadhan, 2009. When and How Can Data be Efficiently Released with Privacy,
STOC 2009.
C Dwork, A. Smith, 2009. Differential Privacy for Statistics: What we know and what we want to learn, Journal of Privacy and
Confdentiality 1(2)135-54
C Dwork 2008, Differential Privacy, A Survey of Results. TAMC 2008, LCNS 4978, Springer Verlag. 1-19
C. Dwork. Differential privacy. Proc. ICALP, 2006.
C. Dwork, F. McSherry, and K. Talwar. The price of privacy and the limits of LP decoding. Proceedings of the thirty-ninth
annual ACM Symposium on Theory of Computing, pages 85–94, 2007.
C. Dwork, F. McSherry, K. Nissim, and A. Smith, Calibrating Noise to Sensitivity in Private Data Analysis, Proceedings of the
3rd IACR Theory of Cryptography Conference, 2006
A. Desrosieres. 1998. The Politics of Large Numbers, Harvard U. Press.
S.E. Fienberg, M.E. Martin, and M.L. Straf (eds.), 1985. Sharing Research Data, Washington, D.C.: National Academies
Press.
S. Fienberg, 2010. Towards a Bayesian Characterization of Privacy Protection & the Risk-Utility Tradeoff, IPAM--Data 2010
B. C.M. Fung, K. Wang, R. Chen, P.S. Yu, 2010, Privacy Preserving Data Publishing: A Survey of Recent Developments,
ACM CSUR 42(4)
Greenwald, A. G. McGhee, D. E. Schwartz, J. L. K., 1998, "Measuring Individual Differences In Implicit Cognition: The Implicit
Association Test", Journal of Personality and Social Psychology 74(6):1464-1480
C. Herley, 2009, So Long and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users; NSPW 09
A. F. Karr, 2009 Statistical Analysis of Distributed Databases, journal of Privacy and Confidentiality (1)2:
Vadhan, S. , et al. 2010. “Re: Advance Notice of Proposed Rulemaking: Human Subjects Research Protections”. Available
from: http://dataprivacylab.org/projects/irb/Vadhan.pdf
Popa, Raluca Ada, et al. "CryptDB: protecting confidentiality with encrypted query processing." Proceedings of the Twenty-
Third ACM Symposium on Operating Systems Principles. ACM, 2011.
16 Managing Confidential Data
17. Additional References
v. 24 (January IAP
Session 1)
International Council For Science (ICSU) 2004. ICSU Report of the CSPR Assessment Panel on Scientific
Data and Information. Report.
J. Klump, et. al, 2006. “Data publication in the open access initiative”, Data Science Journal Vol. 5 pp. 79-
83.
E.A. Kolek, D. Saunders, 2008. Online Disclosure: An Empirical Examination of Undergraduate Facebook
Profiles, NASPA Journal 45 (1): 1-25
N. Li, T. Li, and S. Venkatasubramanian. T-closeness: privacy beyond k-anonymity and l-diversity. In Pro-
ceedings of the IEEE ICDE 2007, 2007.
A. MachanavaJJhala, D Kifer, J Gehrke, M. Venkitasubramaniam, 2007,"l-Diversity: Privacy Beyond k-
Anonymity" ACM Transactions on Knowledge Discovery from Data, 1(1): 1-52
A. Meyerson, R. Williams, 2004. “On the complexity of Optimal K-Anonymity”, ACM Symposium on the
Principles of Database Systems
Nature 461, 145 (10 September 2009) | doi:10.1038/461145a
A. Narayanan and V. Shmatikov, 2008, “Robust De-anonymization of Large Sparse Datasets” , Proc. of
29th IEEE Symposium on Security and Privacy (Forthcoming)
I Neamatullah, et. al, 2008, Automated de-identification of free-text medical records, BMC Medical
Informatics and Decision Making 8:32
J. Novak, P. Raghavan, A. Tomkins, 2004. Anti-aliasing on the Web, Proceedings of the 13th international
conference on World Wide Web
National Science Board (NSB), 2005, Long-Lived Digital Data Collections: Enabling Research and
Education in the 21rst Century, NSF. (NSB-05-40).
A Qcquisti, R. Gross 2009, “Predicting Social Security Numbers from Public Data”, PNAS 27(106): 10975–
10980
Sweeney, L., (2002) k-Anonymity: A Model for Protecting Privacy, International Journal on Uncertainty,
Fuzziness, and Knowledge-based Systems, Vol. 10, No. 5, pp. 557 – 570.
Truta T.M., Vinay B. (2006), Privacy Protection: p-Sensitive k-Anonymity Property, International Workshop
of Privacy Data Management (PDM2006), In Conjunction with 22th International Conference of Data
Engineering (ICDE), Atlanta, Georgia.
O. Uzuner, et al, 2007, “Evaluating the State-of-the-Art in Automatic De-identification”, Journal of the
American Medical Informatics Association 14(5):550
W. Wagner & R. Steinzor, 2006. Rescuing Science from Politics, Cambridge U. Press.
Warner, S. 1965. Randomized response: A survey technique for eliminating evasive answer bias. Journal
of the American Statistical Association 60(309):63–9.
D.L. Zimmerman, C. Pavlik , 2008. "Quantifying the Effects of Mask Metadata, Disclosure and Multiple
Releases on the Confidentiality of Geographically Masked Health Data", Geographical Analysis 40: 52-76
17 Managing Confidential Data
19. Creative Commons License
This work. Managing Confidential
information in research, by Micah Altman
(http://redistricting.info) is licensed under
the Creative Commons Attribution-Share
Alike 3.0 United States License. To view a
copy of this license, visit
http://creativecommons.org/licenses/by-
sa/3.0/us/ or send a letter to Creative
Commons, 171 Second Street, Suite 300,
San Francisco, California, 94105, USA.
19 Framing Privacy and Security Core Concepts &
Principles
Editor's Notes
This work. Managing Confidential information in research, by Micah Altman (http://redistricting.info) is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.
The structure and design of digital storage systems is a cornerstone of digital preservation. To better understand ongoing storage practices of organizations committed to digital preservation, the National Digital Stewardship Alliance conducted a survey of member organizations. This talk discusses findings from this survey, common gaps, and trends in this area.
(I also have a little fun highlighting the hidden assumptions underlying Amazon Glacier's reliability claims. For more on that see this earlier post: http://drmaltman.wordpress.com/2012/11/15/amazons-creeping-glacier-and-digital-preservation )