Privacy Policy. What is Data Privacy? Privacy Policy. Data Privacy Friend or Foe? Some Positives

Size: px
Start display at page:

Download "Privacy Policy. What is Data Privacy? Privacy Policy. Data Privacy Friend or Foe? Some Positives"

Transcription

1 Privacy Policy Data Privacy Friend or Foe? Some Limitations Need robust language Need enforcement Scope of world / interaction Syntax, not semantics Bradley Malin, malin@cscmuedu Data Privacy Laboratory, School of Computer Science Carnegie Mellon University October 26, 24 What is Data Privacy? WHERE does data come from? WHAT does data reveal? HOW do we prove data does not reveal more than specified? Privacy Policy Some Positives Procedure Specifies how data can (not) be used Logical Cognition Requires active involvement and thought regarding information Standardization equal opportunity Legal Enforcement What is Data Privacy? The study of computational solutions for releasing data such that the data remain practically useful while the aspects of the subjects of the data are not revealed Privacy Protection ( data protectors ): release information such that entity-specific properties (eg identity) are controlled restrict what can be learned Data Linkage ( data detectives ) combining disparate pieces of entity-specific information to learn more about an entity

2 Relationships Between Related Areas INFERENCE CONTROL PUBLIC POLICY DISCLOSURE CONTROL PRIVACY- PRESERVING DATA MINING LAW PRIVACY SPECIFICATION ANONYMITY (De-identification) Diagram courtesy of Michael Shamos HUMAN INTERFACE ORGANIZATIONAL PRACTICES ENFORCEMENT & IMPLEMENTATION AUDIT & ACCOUNTABILITY SECURITY TRUSTED HARDWARE CRYPTO Data Data Data What kind of data? Field Structured Databases Text Documents Genomic Image Video Network (Physical or Social) Communications All kinds! Data Privacy is Interdisciplinary Table courtesy of Latanya Sweeney AI learning theory database language security IS anonymity heavy some heavy rights mgt some heavy database some heavy some ubiquitous heavy heavy heavy some some some AI primarily concerns knowledge representation and semantics Learning focuses on data mining algorithms Theory includes zero-knowledge proofs and multi-party computations Information Explosion 3 Increase in technological capability for collection, storage, 25 transfer Growth in 2 active web 5 Decrease servers in cost Global Disk Storage Per Person (GDSP) Sewrvers (in Millions) GDSP (MB/person) ~(hard drive space) / (world population) Storage (tera) Population ( 9 ) Person-time / page months 6, hour [Sweeney 997] Growth in available disk storage 993 First WWW 57 conference 2 2,8, 6 35 min Year

3 Anonymity & De-identification Anonymous: Data can not be manipulated or linked to identify an individual De-identified: All explicit identifiers, such as name, address, & phone number are removed, generalized, or replaced with made up values Does Anonymous = De-identified? Direct Linkage Uses the combination of attributes to determine the uniqueness of an entity in a dataset Second dataset with identified subjects is used to make the re-identification by drawing inferences between the two datasets on the related attributes The attributes do not have to be equal, but there must exist some ability for inference of between attributes Medical Information Linking to re-identify data Attributes Recommended by NAHDO (outside scope of HIPAA) Patient Zip Code Patient Birth Date Patient Gender Patient Racial Background Patient Number Visit Date Principle Diagnosis Codes (ICD-9) Procedure Codes Physician ID Number Physician Zip Code Total Charges Ethnicity Visit date Diagnosis Procedure Medication Total charge Zip Birthdate Sex Medical Data 3

4 Linking to re-identify data Zip Birthdate Sex Name Address Date registered Party affiliation Date last voted {date of birth, gender, 5-digit ZIP} uniquely identifies 87% of USA [Sweeney 97, 98] Few fields are needed to uniquely identify individuals Voter List Linking to re-identify data Ethnicity Visit date Diagnosis Procedure Medication Total charge Zip Sex Name Address 87% of the United States is Birthdate RE-IDENTIFIABLE Date registered Party affiliation Date last voted [Sweeney 97, 98] {date of birth, gender, 5-digit ZIP} [Sweeney 97, 98] uniquely identifies 87% of USA ZIP 6623, 2,67 people, %, not % insufficient # above the age of 55 living there Medical Data Voter List 4

5 {date of birth, gender, 5-digit ZIP} uniquely identifies 87% of USA pop ZIP 794, 548 people, primarily between 9 and 24 (4666 of 548 or 86%), only 3% [Sweeney 97, 98] Chain of Links Voter List D G Z Medical Data Semantic Learning Chain of Links Mining strategic information from text, and from video Automated profiles (putting disparate pieces together) Resolving ambiguous identities in data (eg Michael Jordan, the basketball player, vs Michael Jordan, the computer scientist) Edoardo Airoldi William Gronim Ralph Gross Kishore Madhava Bradley Malin Algorithms for learning sensitive information from seemingly innocent information Voter List D G Z Medical Data So what do you do? DNA Data Mutation Analysis Prediction and Risk Pharmaco-Genomic Relations Familial Relations ATCGATCGAT 5

6 Building Up Relations Ethnicity Visit date Zip Diagnosis Birthdate Procedure Sex Medication Total charge Medical Data DNA Data ATCGATCGAT CleanGene Step : gender via genetic locus Step 2: classify disease by known mutations Step 3: hospital ID and other inferences Step 4: linking DNA with the medical profile [Malin & Sweeney 2] 2 3 n HID k m 2 HID k f 3 HID k m n HID k f 2 3 n STEP Full Sequences known STEP 3 STEP n 2 3 n m f m f STEP 2 ESTs / cdnas ZIP i DOB HID k m 2 ZIP j DOB 2 HID k f 3 ZIP i DOB 3 HID k m m ZIP i DOB m HID k f Genotype-Phenotype Relations Can infer genotype-phenotype relationships out of both DNA and medical databases Medical Database DIAGNOSIS Phenotype With Genetic Trait ACTG Genomic DNA Longitudinal Genomic Learning Model Clinical Profiles Diagnoses Clinical Phenotype State Mapping Classify Profile Visits [Malin & Sweeney 22] DIAGNOSIS Disease Phenotype ACTG Disease Sequences DNA Database Constrain Profile State Alignment DNA Predictions 6

7 Experimental Results DNA with Huntington s Disease Example: Huntington s disease Exists strong correlation between age of onset and DNA mutation (# of CAG repeats) Given longitudinal clinical info, accurately infer age of onset in 2 of 22 cases Size of Repeat vs Age of Onset y = -248Ln(x) R 2 = 889 Malin B and Sweeney L Inferring genotype from clinical phenotype through a knowledge-based algorithm Privacy Policy, In Technology, Pacific and Symposium Law on Biocomputing Data Privacy: pp Foe, 4-52, then Jan Friend 22 # CAG repeats Age Age of Onset Age of Onset Prediction individual Individual act ual age min age max age Websites Share Weblogs Yoda Leah Obi 8254 Han Obi Yoda C3PO Jabba C3PO Obi Leah Lando Learning from Trails Identity algorithms to learn where a person has been by the trail left behind eg, IP addresses left behind while visiting websites [Malin & Sweeney, 4], [Malin 2] IP IP IP 2 IP 3 IP Websites Share Consumer Lists Yoda Leah Obi Han Obi Yoda C3PO Jabba C3PO Obi Leah Lando Yoda Leah Obi Han Obi Yoda C3PO Jabba C3PO Obi Leah Lando 7

8 Identity REIDIT-I Example Example of what was learned: (known by name) visited Amazon even though he never bought anything at Amazon IP IP IP 2 IP 3 IP 4 Reidentified IP2 IP IP 4 IP 3 Protection Models Jcd Jwq Jxy Dan Don Dave Ann Abe Al Subjects Population Universe Ann /2/6 239 cardiac Abe 7/4/6 239 cancer Al 3/8/6 238 liver Private Information Jcd Jwq Jxy Null-Map Al 3/8/6 238 cardiac Ann /2/6 239 cancer Abe 7/4/6 239 liver Wrong-Map A* 96 23* cardiac A* 96 23* cancer A* 96 23* liver k-anonymity cardiac cancer liver Overview Idea of k-map and k-anonymity [Sweeney 97, 98] General Idea of Data Privacy Data Analysis in Personal Information Learning Demographic Data Genetic Data Data Protection Formal Models Video Data For every record released, there will be at least k individuals to whom the record indistinctly refers In k-map, the k individuals exist in the world In k-anonymity, the k individuals appear in the release 8

9 Model Examples Distributions of a Population Register k-map: For each tuple t in the release, t must indistinctly refer to at least k entities in the population A* * cardiac A* 96 23* cancer A* * liver Gil Hal Jim There are three colors with frequencies: red, 3 green and 2 blue There are 2 types of figures, with 2 of one type and 4 of the other k-anonymity: k in the release A* 96 23* cardiac A* 96 23* cancer A* 96 23* liver Ken Len Mel Register The combination of color and figure labeled as Hal and Len are each unique k-anonymity, enforce on release Quasi-identifier, profile {Birth, ZIP, Gender} Generalization /27/ Suppression 239 Encryption Re-identification Example Gil Hal Jim Ken Len Mel Register Release There are 3 green figures and 2 figures having the same profile as the release But only Hal is green and has the same figure type as the profile in the release It is a unique match 9

10 Re-identification Example Overview Gil Hal Jim Ken Len Mel Register Release There are two matches for this profile, Jim and Mel There is no unique match General Idea of Data Privacy Data Analysis in Personal Information Learning Demographic Data Genetic Data Data Protection Formal Models Video Data Formal Protection Example Gil Hal Jim Ken Len Mel Register + = Release To achieve k-map where k=2, agents for Gil, Hal and Ken agree to merge their information together Information released about any of them results in the same merged image Video Data Privacy Modify video images so that Privacy: automated attempts to recognize faces fail Utility: knowledge learned from data is useful Solution to problem Enables sharing of data for specified purposes Protects rights as specified in policy eg your identity won t be revealed unless you have done something illegal

11 De-identification of Faces Face Recognition: The Big Idea Example Captured images are below Here is a known image of Bob Which person is Bob? Identification Algorithm* Name of Person Identity Unknown? Face Recognition Software: ~7% % of Samples Where Correct Match Found All Rank Data Privacy: Foe, then Friend 24 Bradley Malin PCA-Based Face Recognition Systems Limiting the success of Module 2 is our goal

12 Basic Approach in Eigenfaces Use a training set to identify a set of characteristic faces 2 Given a gallery of known faces and a probe image of an unknown person, compare each face to the characteristic faces to get a distance measure for each Eigenvectors The characteristic function: (A-λI) = 3 The probe s identity is determined by the shortest distance to a gallery image 4 There is one image per person in the gallery and one corresponding picture per person in the probe set where A is the covariance matrix C Module 2: Eigenfaces / PCA Training Set Gallery Probe Face Space of Average Face Projected Gallery Distance Measure Projected Probe De-identification: T-mask Example continued Captured images are deidentified below Here is a known image of Bob Which person is Bob? 2

13 De-identification: T-mask Example continued Captured images are deidentified below Here is a known image of Bob Which person is Bob? De-identification: pixel reduction Example continued Captured images are deidentified below Here is a known image of Bob Which person is Bob? Automated Recognition Fails! % of Samples Where Correct Match Found De-identification: pixel reduction Example continued Captured images are deidentified below Here is a known image of Bob Which person is Bob? All Rank 3

14 Face recognition Works, Humans Don t! % of Samples Where Correct Match Found All Rank Some Experiments Single Bar Mask T-Mask Black Blob Mouth Only Grayscale Black & White Ordinal Data Threshold Pixelation Negative Grayscale Black & White Random Grayscale Black & White Mr Potato Head Pixelation: Automated Recognition Easier! Ad Hoc Methods = Poor Protection % of Samples Where Correct Match Found All Rank % of Samples Where Correct Match Found Percent Identifie All Black Test 4

15 % of Samples Where Correct Match Found Uh Oh, Not Looking Good T = 65 T = 5 Don t be Naïve Again, de-identified anonymous Masks can be removed and trained against Some cases naïve de-identification even harms privacy! pixelation and blur improves performance Time to get logical Threshold Level % of Samples Where Correct Match Found Random Changes to Grayscale Images Percent Correctly Identified Original Gray Scale/Rand Experiment: ID rate v Number of Pixels Changed Identification Rate for Randomly Changed set in Gallery Randomly v Originals changed gallery Identification Rate for Originals v Randomly Changed Randomly changed probe set in Probe Number of Values Changed Number of Pixels Changed (R) R = 3 R = 9 Back to k-protection Models [Newton, Sweeney, Malin 4,5] k-anonymity: For every record, there are at least k individuals to whom it refers (realized upon release) k-same: For every face, there are at least k people to whom that face refers No face actually refers to a single real person 5

16 Ranking of Faces Example How does everyone rank against each other? Who is closest? Who is farthest? Examples of k-same -Pixel -Eigen k = Example of k-same for k=2 Demonstration Time! K-Same Demo 6

17 Performance of k-same Algorithms Thanks! % of Samples Where Correct Match Found Percent Correct, Top Rank Expected[k-Same] k-same-pixel k-same-eigen k Rank Upper-bound on Recognition Performance = k Some slides adapted from: Elaine Newton Michael Shamos Latanya Sweeney More information: Overview General Idea of Data Privacy Data Analysis in Personal Information Learning Demographic Data Genetic Data Data Protection Formal Models Video Data 7

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF

Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF Workshop on anonymization Berlin, March 19, 2015 Basic Knowledge Terms, Definitions and general techniques Murat Sariyar TMF Workshop Anonymisation, March 19, 2015 Outline Background Aims of Anonymization

More information

Curriculum Vitae Bradley A. Malin

Curriculum Vitae Bradley A. Malin Curriculum Vitae Bradley A. Malin Carnegie Mellon University +1 412 268 1097 (tel) School of Computer Science +1 412 268 6708 (fax) 1320 B Wean Hall malin@cs.cmu.edu Pittsburgh, Pennsylvania 15213-3890

More information

Ethics of Data Science

Ethics of Data Science Ethics of Data Science Lawrence Hunter, Ph.D. Director, Computational Bioscience Program University of Colorado School of Medicine Larry.Hunter@ucdenver.edu http://compbio.ucdenver.edu/hunter Data Science

More information

Data Anonymization Related Laws in the US and the EU. CS and Law Project Presentation Jaspal Singh

Data Anonymization Related Laws in the US and the EU. CS and Law Project Presentation Jaspal Singh Data Anonymization Related Laws in the US and the EU CS and Law Project Presentation Jaspal Singh The Need for Anonymization To share a database packed with sensitive information with third parties or

More information

Foundations of Privacy. Class 1

Foundations of Privacy. Class 1 Foundations of Privacy Class 1 1 The teachers of the course Kostas Chatzikokolakis CNRS & Ecole Polytechnique Catuscia Palamidessi INRIA & Ecole Polytechnique 2 Logistic Information The course will be

More information

BCCDC Informatics Activities

BCCDC Informatics Activities BCCDC Informatics Activities Environmental Health Surveillance Workshop February 26, 2013 Public Health Informatics Application of key disciplines to Public Health information science computer science

More information

Practical Image and Video Processing Using MATLAB

Practical Image and Video Processing Using MATLAB Practical Image and Video Processing Using MATLAB Chapter 1 Introduction and overview What will we learn? What is image processing? What are the main applications of image processing? What is an image?

More information

Systematic Privacy by Design Engineering

Systematic Privacy by Design Engineering Systematic Privacy by Design Engineering Privacy by Design Let's have it! Information and Privacy Commissioner of Ontario Article 25 European General Data Protection Regulation the controller shall [...]

More information

AUTOMATED MALARIA PARASITE DETECTION BASED ON IMAGE PROCESSING PROJECT REFERENCE NO.: 38S1511

AUTOMATED MALARIA PARASITE DETECTION BASED ON IMAGE PROCESSING PROJECT REFERENCE NO.: 38S1511 AUTOMATED MALARIA PARASITE DETECTION BASED ON IMAGE PROCESSING PROJECT REFERENCE NO.: 38S1511 COLLEGE : BANGALORE INSTITUTE OF TECHNOLOGY, BENGALURU BRANCH : COMPUTER SCIENCE AND ENGINEERING GUIDE : DR.

More information

Clinical Natural Language Processing: Unlocking Patient Records for Research

Clinical Natural Language Processing: Unlocking Patient Records for Research Clinical Natural Language Processing: Unlocking Patient Records for Research Mark Dredze Computer Science Malone Center for Engineering Healthcare Center for Language and Speech Processing Natural Language

More information

Privacy in a Networked World: Trouble with Anonymization, Aggregates

Privacy in a Networked World: Trouble with Anonymization, Aggregates Privacy in a Networked World: Trouble with Anonymization, Aggregates Historical US Privacy Laws First US Law dates back to: 1890 Protecting privacy of Individuals against government agents 1973 report.

More information

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Justin Zhan I-Cheng Wang Abstract In the e-commerce era, recommendation systems were introduced to share customer experience

More information

Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics

Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics June 28, 2017 from 11.00 to 12.45 ICE/ IEEE Conference, Madeira

More information

Diet Networks: Thin Parameters for Fat Genomics

Diet Networks: Thin Parameters for Fat Genomics Institut des algorithmes d apprentissage de Montréal Diet Networks: Thin Parameters for Fat Genomics Adriana Romero, Pierre Luc Carrier, Akram Erraqabi, Tristan Sylvain, Alex Auvolat, Etienne Dejoie, Marc-André

More information

INTERACTIVE EVOLUTIONARY GENERATION OF FACIAL COMPOSITES FOR LOCATING SUSPECTS IN CRIMINAL INVESTIGATIONS/

INTERACTIVE EVOLUTIONARY GENERATION OF FACIAL COMPOSITES FOR LOCATING SUSPECTS IN CRIMINAL INVESTIGATIONS/ The UK s European university INTERACTIVE EVOLUTIONARY GENERATION OF FACIAL COMPOSITES FOR LOCATING SUSPECTS IN CRIMINAL INVESTIGATIONS/ Dr Stuart Gibson (speaker) & Dr Chris Solomon School of Physical

More information

Capture-recapture studies

Capture-recapture studies Capture-recapture studies Laura Anderson Centre for Infections Health Protection Agency UK Reiterating underlying assumptions 1) No misclassification of records (perfect record linkage) 2) Closed population

More information

Privacy-Preserving Learning Analytics

Privacy-Preserving Learning Analytics October 16-19, 2017 Sheraton Centre, Toronto, Canada Vassilios S. Verykios 3 Professor, School of Sciences and Technology A joint work with Evangelos Sakkopoulos 1, Elias C. Stavropoulos 2, Vasilios Zorkadis

More information

e-science Acknowledgements

e-science Acknowledgements e-science Elmer V. Bernstam, MD Professor Biomedical Informatics and Internal Medicine UT-Houston Acknowledgements Todd Johnson (UTH UKy) Jack Smith (Dean at UTH SBMI) CTSA informatics community Luciano

More information

Challenges and opportunities of digital social research: Access and Anonymity

Challenges and opportunities of digital social research: Access and Anonymity Challenges and opportunities of digital social research: Access and Anonymity Dr. Dan Nunan Henley Business School, University of Reading www.henley.ac.uk Two narratives for social research: Evolution

More information

Northfleet Technology College Course Outline: Information Technology in a Global Society

Northfleet Technology College Course Outline: Information Technology in a Global Society Northfleet Technology College Course Outline: Information Technology in a Global Society Equivalent to ½ A level Introduction: What is ITGS Information Technology in a Global Society International refers

More information

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS

More information

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com

More information

The EFPIA Perspective on the GDPR. Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference , Helsinki

The EFPIA Perspective on the GDPR. Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference , Helsinki The EFPIA Perspective on the GDPR Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference 26-27.9.2017, Helsinki 1 Key Benefits of Health Data Improved decision-making Patient self-management CPD

More information

Privacy preserving data mining multiplicative perturbation techniques

Privacy preserving data mining multiplicative perturbation techniques Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data

More information

Guidance on the anonymisation of clinical reports for the purpose of publication in accordance with policy 0070

Guidance on the anonymisation of clinical reports for the purpose of publication in accordance with policy 0070 Guidance on the anonymisation of clinical reports for the purpose of publication in accordance with policy 0070 Stakeholder webinar 24 June 2015, London Presented by Monica Dias Policy Officer An agency

More information

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

Enabling Trust in e-business: Research in Enterprise Privacy Technologies Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

Automatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images

Automatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 173-180 International Research Publications House http://www. irphouse.com Automatic Morphological

More information

How Machine Learning and AI Are Disrupting the Current Healthcare System. Session #30, March 6, 2018 Cris Ross, CIO Mayo Clinic, Jim Golden, PwC

How Machine Learning and AI Are Disrupting the Current Healthcare System. Session #30, March 6, 2018 Cris Ross, CIO Mayo Clinic, Jim Golden, PwC How Machine Learning and AI Are Disrupting the Current Healthcare System Session #30, March 6, 2018 Cris Ross, CIO Mayo Clinic, Jim Golden, PwC 1 Conflicts of Interest: Christopher Ross, MBA Has no real

More information

Vision Defect Identification System (VDIS) using Knowledge Base and Image Processing Framework

Vision Defect Identification System (VDIS) using Knowledge Base and Image Processing Framework Vishal Dahiya* et al. / (IJRCCT) INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER AND COMMUNICATION TECHNOLOGY Vol No. 1, Issue No. 1 Vision Defect Identification System (VDIS) using Knowledge Base and Image

More information

Online Diagnosis and Monitoring for Power Distribution System

Online Diagnosis and Monitoring for Power Distribution System Energy and Power Engineering, 1,, 59-53 http://dx.doi.org/1.3/epe.1. Published Online November 1 (http://www.scirp.org/journal/epe) Online Diagnosis and Monitoring for Power Distribution System Atef Almashaqbeh,

More information

Big Data, privacy and ethics: current trends and future challenges

Big Data, privacy and ethics: current trends and future challenges Sébastien Gambs Big Data, privacy and ethics 1 Big Data, privacy and ethics: current trends and future challenges Sébastien Gambs Université du Québec à Montréal (UQAM) gambs.sebastien@uqam.ca 24 April

More information

Intelligent Agents & Search Problem Formulation. AIMA, Chapters 2,

Intelligent Agents & Search Problem Formulation. AIMA, Chapters 2, Intelligent Agents & Search Problem Formulation AIMA, Chapters 2, 3.1-3.2 Outline for today s lecture Intelligent Agents (AIMA 2.1-2) Task Environments Formulating Search Problems CIS 421/521 - Intro to

More information

Data Dictionary: HES-ONS linked mortality data

Data Dictionary: HES-ONS linked mortality data Data Dictionary: HES-ONS linked mortality data HES-ONS linked mortality data dictionary Welcome to the HES-ONS linked mortality data dictionary. If you have any feedback or suggestions about this document

More information

The General Data Protection Regulation and use of health data: challenges for pharmaceutical regulation

The General Data Protection Regulation and use of health data: challenges for pharmaceutical regulation The General Data Protection Regulation and use of health data: challenges for pharmaceutical regulation ENCePP Plenary Meeting- London, 22/11/2016 Alessandro Spina Data Protection Officer, EMA An agency

More information

Responsible Data Use Assessment for Public Realm Sensing Pilot with Numina. Overview of the Pilot:

Responsible Data Use Assessment for Public Realm Sensing Pilot with Numina. Overview of the Pilot: Responsible Data Use Assessment for Public Realm Sensing Pilot with Numina Overview of the Pilot: Sidewalk Labs vision for people-centred mobility - safer and more efficient public spaces - requires a

More information

Record Linkage between the 2006 Census of the Population and the Canadian Mortality Database

Record Linkage between the 2006 Census of the Population and the Canadian Mortality Database Proceedings of Statistics Canada Symposium 2016 Growth in Statistical Information: Challenges and Benefits Record Linkage between the 2006 Census of the Population and the Canadian Mortality Database Mohan

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

November 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University

November 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University Keynote Speaker Penn State Panelists Rebecca Wang Eric P. S. Baumer November 6, 2017 Haiyan Jia Gaia Bernstein Seton Hall University School of Law Najarian Peters Seton Hall University School of Law OVERVIEW

More information

COMPUTATONAL INTELLIGENCE

COMPUTATONAL INTELLIGENCE COMPUTATONAL INTELLIGENCE October 2011 November 2011 Siegfried Nijssen partially based on slides by Uzay Kaymak Leiden Institute of Advanced Computer Science e-mail: snijssen@liacs.nl Katholieke Universiteit

More information

TRANSLATION OF GENOMICS FOR PATIENT CARE AND RESEARCH PATIENT S PERSPECTIVE

TRANSLATION OF GENOMICS FOR PATIENT CARE AND RESEARCH PATIENT S PERSPECTIVE GENOMICS-ENABLED LEARNING HEALTH CARE SYSTEMS: GATHERING AND USING GENOMIC INFORMATION TO IMPROVE PATIENT CARE AND RESEARCH TRANSLATION OF GENOMICS FOR PATIENT CARE AND RESEARCH PATIENT S PERSPECTIVE DECEMBER

More information

Analysis of Privacy and Data Protection Laws and Directives Around the World

Analysis of Privacy and Data Protection Laws and Directives Around the World Analysis of Privacy and Data Protection Laws and Directives Around the World Michael Willett (Seagate) ISTPA Board and Framework Chair Track IIB: Global Privacy Policy The Privacy Symposium: Boston, 23

More information

Good afternoon. Under the title of Trust and Co-creation in the Digital Era, I would like to explain our research and development strategy.

Good afternoon. Under the title of Trust and Co-creation in the Digital Era, I would like to explain our research and development strategy. Good afternoon. Under the title of Trust and Co-creation in the Digital Era, I would like to explain our research and development strategy. LABORATORIES LTD. 1 Looking back, it has been 83 years since

More information

Machine Vision for the Life Sciences

Machine Vision for the Life Sciences Machine Vision for the Life Sciences Presented by: Niels Wartenberg June 12, 2012 Track, Trace & Control Solutions Niels Wartenberg Microscan Sr. Applications Engineer, Clinical Senior Applications Engineer

More information

Dependable AI Systems

Dependable AI Systems Dependable AI Systems Homa Alemzadeh University of Virginia In collaboration with: Kush Varshney, IBM Research 2 Artificial Intelligence An intelligent agent or system that perceives its environment and

More information

WANT TO PARTICIPATE IN RESEARCH? THERE S AN APP FOR THAT!

WANT TO PARTICIPATE IN RESEARCH? THERE S AN APP FOR THAT! WANT TO PARTICIPATE IN RESEARCH? THERE S AN APP FOR THAT! SECURITY AND PRIVACY ISSUES WITH THE INCREASED USE OF CONNECTED DEVICES, APPS, AND SOCIAL MEDIA IN RESEARCH. PRESENTED BY: DAVID MATA, SENIOR ASSOCIATE,

More information

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009

MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009 MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS Justin Becker, Hao Chen UC Davis May 2009 1 Motivating example College admission Kaplan surveyed 320 admissions offices in 2008 1 in 10 admissions officers

More information

Towards a Modern Approach to Privacy-Aware Government Data Releases

Towards a Modern Approach to Privacy-Aware Government Data Releases Towards a Modern Approach to Privacy-Aware Government Data Releases Micah Altman David O Brien & Alexandra Wood MIT Libraries Berkman Center for Internet & Society Open Data: Addressing Privacy, Security,

More information

Visual Search using Principal Component Analysis

Visual Search using Principal Component Analysis Visual Search using Principal Component Analysis Project Report Umesh Rajashekar EE381K - Multidimensional Digital Signal Processing FALL 2000 The University of Texas at Austin Abstract The development

More information

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and

This Privacy Policy describes the types of personal information SF Express Co., Ltd. and Effective Date: 2017/05/10 Updated date: 2017/05/25 This Privacy Policy describes the types of personal information SF Express Co., Ltd. and its affiliates (collectively as "SF") collect about consumers

More information

Privacy-Enhanced Linking

Privacy-Enhanced Linking Privacy-Enhanced Linking Latanya Sweeney School of Computer Science Carnegie Mellon University Pittsburgh, PA USA latanya@privacy.cs.cmu.edu ABSTRACT While computer scientists are uniquely situated to

More information

Image Extraction using Image Mining Technique

Image Extraction using Image Mining Technique IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,

More information

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017 CONSENT IN THE TIME OF BIG DATA Richard Austin February 1, 2017 1 Agenda 1. Introduction 2. The Big Data Lifecycle 3. Privacy Protection The Existing Landscape 4. The Appropriate Response? 22 1. Introduction

More information

Introduction to Image Analysis with

Introduction to Image Analysis with Introduction to Image Analysis with PLEASE ENSURE FIJI IS INSTALLED CORRECTLY! WHAT DO WE HOPE TO ACHIEVE? Specifically, the workshop will cover the following topics: 1. Opening images with Bioformats

More information

Exercise 4 Exploring Population Change without Selection

Exercise 4 Exploring Population Change without Selection Exercise 4 Exploring Population Change without Selection This experiment began with nine Avidian ancestors of identical fitness; the mutation rate is zero percent. Since descendants can never differ in

More information

Ken Buetow, Ph.D. Director, Computation Science and Informatics, Complex Adaptive ASU Professor, School of Life Science

Ken Buetow, Ph.D. Director, Computation Science and Informatics, Complex Adaptive ASU Professor, School of Life Science COMPLEX ADAPTIVE SYSTEMS Ken Buetow, Ph.D Director, Computation Science and Informatics, Complex Adaptive Systems @ ASU Professor, School of Life Science Kenneth.Buetow@ASU.edu 1 4 th Paradigm Science

More information

February 24, [Click for Most Updated Paper] [Click for Most Updated Online Appendices]

February 24, [Click for Most Updated Paper] [Click for Most Updated Online Appendices] ONLINE APPENDICES for How Well Do Automated Linking Methods Perform in Historical Samples? Evidence from New Ground Truth Martha Bailey, 1,2 Connor Cole, 1 Morgan Henderson, 1 Catherine Massey 1 1 University

More information

Technical Aspects in Digital Pathology

Technical Aspects in Digital Pathology Technical Aspects in Digital Pathology Yukako Yagi, PhD yyagi@mgh.harvard.edu Director of the MGH Pathology Imaging & Communication Technology Center Assistant Professor of Pathology, Harvard Medical School

More information

Fujitsu Laboratories Advanced Technology Symposium 2018

Fujitsu Laboratories Advanced Technology Symposium 2018 Fujitsu Laboratories Advanced Technology Symposium 2018 October 9, 2018 Trust and Co-creation in the Digital Era Shigeru Sasaki Fujitsu Laboratories Ltd. CEO Fujitsu Limited CTO 2 FLATS 2017 Quantum Computing:

More information

Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT)

Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) WHITE PAPER Linking Liens and Civil Judgments Data Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) Table of Contents Executive Summary... 3 Collecting

More information

Finding U.S. Census Data with American FactFinder Tutorial

Finding U.S. Census Data with American FactFinder Tutorial Finding U.S. Census Data with American FactFinder Tutorial Mark E. Pfeifer, PhD Reference Librarian Bell Library Texas A and M University, Corpus Christi mark.pfeifer@tamucc.edu 361-825-3392 Population

More information

Guidance on the anonymisation of clinical reports for the purpose of publication

Guidance on the anonymisation of clinical reports for the purpose of publication Guidance on the anonymisation of clinical reports for the purpose of publication Stakeholder meeting 6 July 2015, London Presented by Monica Dias Policy Officer An agency of the European Union Scope and

More information

Disclosure: Within the past 12 months, I have had no financial relationships with proprietary entities that produce health care goods and services.

Disclosure: Within the past 12 months, I have had no financial relationships with proprietary entities that produce health care goods and services. Disclosure: Within the past 12 months, I have had no financial relationships with proprietary entities that produce health care goods and services. Artificial Intelligence (AI): definition John McCarthy,

More information

Auto-tagging The Facebook

Auto-tagging The Facebook Auto-tagging The Facebook Jonathan Michelson and Jorge Ortiz Stanford University 2006 E-mail: JonMich@Stanford.edu, jorge.ortiz@stanford.com Introduction For those not familiar, The Facebook is an extremely

More information

Guidance for Calculating Incidence by Census Tract Poverty Level Using 2010 Census and ACS

Guidance for Calculating Incidence by Census Tract Poverty Level Using 2010 Census and ACS Guidance for Calculating Incidence by Census Tract Poverty Level Using 2010 Census and 2006-2010 ACS Prepared for CSTE Disparities Workgroup by Karman Tam, MPH candidate and Kimberly Yousey-Hindes, MPH,

More information

Security and Risk Assessment in GDPR: from policy to implementation

Security and Risk Assessment in GDPR: from policy to implementation Global Data Privacy Security and Risk Assessment in GDPR: from policy to implementation Enisa Workshop Roma - February 8, 2018 Nicola Orlandi Head of Data Privacy Pharma Nicola Orlandi Nicola Orlandi is

More information

A Game Theoretic Framework for Analyzing Re-identification Risk : Supporting Information

A Game Theoretic Framework for Analyzing Re-identification Risk : Supporting Information 1 A Game Theoretic Framework for Analyzing Re-identification Risk : Supporting Information Zhiyu Wan 1, Yevgeniy Vorobeychik 1, Weiyi Xia 1, Ellen Wright Clayton 2, Murat Kantarcioglu 3, Ranjit Ganta 3,

More information

Sketching Interface. Larry Rudolph April 24, Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph

Sketching Interface. Larry Rudolph April 24, Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Sketching Interface Larry April 24, 2006 1 Motivation Natural Interface touch screens + more Mass-market of h/w devices available Still lack of s/w & applications for it Similar and different from speech

More information

CSC 320 H1S CSC320 Exam Study Guide (Last updated: April 2, 2015) Winter 2015

CSC 320 H1S CSC320 Exam Study Guide (Last updated: April 2, 2015) Winter 2015 Question 1. Suppose you have an image I that contains an image of a left eye (the image is detailed enough that it makes a difference that it s the left eye). Write pseudocode to find other left eyes in

More information

Privacy engineering, privacy by design, and privacy governance

Privacy engineering, privacy by design, and privacy governance CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://

More information

WISEid Student Person Export/ Import (SRN)

WISEid Student Person Export/ Import (SRN) WISEid Student Person Export/ Import (SRN) WISEid Student Person Export (SRN) What is WISEid Export? The purpose of this data collection is to link students to their state assigned WISEid. The WISEid is

More information

Sketching Interface. Motivation

Sketching Interface. Motivation Sketching Interface Larry Rudolph April 5, 2007 1 1 Natural Interface Motivation touch screens + more Mass-market of h/w devices available Still lack of s/w & applications for it Similar and different

More information

A COMPUTER VISION AND MACHINE LEARNING SYSTEM FOR BIRD AND BAT DETECTION AND FORECASTING

A COMPUTER VISION AND MACHINE LEARNING SYSTEM FOR BIRD AND BAT DETECTION AND FORECASTING A COMPUTER VISION AND MACHINE LEARNING SYSTEM FOR BIRD AND BAT DETECTION AND FORECASTING Russell Conard Wind Wildlife Research Meeting X December 2-5, 2014 Broomfield, CO INTRODUCTION Presenting for Engagement

More information

Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method

Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method M. Veerraju *1, S. Saidarao *2 1 Student, (M.Tech), Department of ECE, NIE, Macherla, Andrapradesh, India. E-Mail:

More information

Best Practices for Automated Linking Using Historical Data: A Progress Report

Best Practices for Automated Linking Using Historical Data: A Progress Report Best Practices for Automated Linking Using Historical Data: A Progress Report Preliminary; Comments are welcome Ran Abramitzky 1 Leah Boustan 2 Katherine Eriksson 3 James Feigenbaum 4 Santiago Perez 5

More information

Privacy Implications of New York City's Stop-and- Frisk Data

Privacy Implications of New York City's Stop-and- Frisk Data Wellesley College Wellesley College Digital Scholarship and Archive Honors Thesis Collection 2015 Privacy Implications of New York City's Stop-and- Frisk Data Veronica Manfredi vmanfred@wellesley.edu Follow

More information

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro

More information

Global Alliance for Genomics & Health Data Sharing Lexicon

Global Alliance for Genomics & Health Data Sharing Lexicon Version 1.0, 15 March 2016 Global Alliance for Genomics & Health Data Sharing Lexicon Preamble The Global Alliance for Genomics and Health ( GA4GH ) is an international, non-profit coalition of individuals

More information

A Case Study on the Use of Unstructured Data in Healthcare Analytics. Analysis of Images for Diabetic Retinopathy

A Case Study on the Use of Unstructured Data in Healthcare Analytics. Analysis of Images for Diabetic Retinopathy A Case Study on the Use of Unstructured Data in Healthcare Analytics Analysis of Images for Diabetic Retinopathy A Case Study on the Use of Unstructured Data in Healthcare Analytics: Analysis of Images

More information

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES

COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 3, May - June 2018, pp. 177 185, Article ID: IJARET_09_03_023 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=3

More information

SAFETY CASES: ARGUING THE SAFETY OF AUTONOMOUS SYSTEMS SIMON BURTON DAGSTUHL,

SAFETY CASES: ARGUING THE SAFETY OF AUTONOMOUS SYSTEMS SIMON BURTON DAGSTUHL, SAFETY CASES: ARGUING THE SAFETY OF AUTONOMOUS SYSTEMS SIMON BURTON DAGSTUHL, 17.02.2017 The need for safety cases Interaction and Security is becoming more than what happens when things break functional

More information

Human Pedigree Genetics Answer Key

Human Pedigree Genetics Answer Key Human Pedigree Genetics Answer Key Free PDF ebook Download: Human Pedigree Genetics Answer Key Download or Read Online ebook human pedigree genetics answer key in PDF Format From The Best User Guide Database

More information

Internet Based Artificial Neural Networks for the Interpretation of Medical Images

Internet Based Artificial Neural Networks for the Interpretation of Medical Images Internet Based Artificial Neural Networks for the Interpretation of Medical Images Andreas Järund, Lars Edenbrandt Department of Clinical Physiology, Lund University, Lund, Sweden andreas.järund@klinfys.lu.se

More information

DigiMam Conformance Statement for DICOM V3.0

DigiMam Conformance Statement for DICOM V3.0 DigiMam Conformance Statement for DICOM V3.0 Copyright 2004 by I.M.S. s.r.l. DOCUMENT VERSIONS Version Date Author Changes 1.00 15-Feb-05 IMS s.r.l. First Version DOCUMENT VERSIONS Page 2 of 29 TABLE OF

More information

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification

The Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Parallel to AIMA 8., 8., 8.6.3, 8.9 The Automatic Classification Problem Assign object/event or sequence of objects/events

More information

Privacy Values and Privacy by Design Annie I. Antón

Privacy Values and Privacy by Design Annie I. Antón Privacy Values and Privacy by Design Annie I. Antón Silicon Flatirons The Technology of Privacy University of Colorado School of Law January 11, 2013 Online, how do we assure the public and what is

More information

Introductions. Characterizing Knowledge Management Tools

Introductions. Characterizing Knowledge Management Tools Characterizing Knowledge Management Tools Half-day Tutorial Developed by Kurt W. Conrad, Brian (Bo) Newman, and Dr. Art Murray Presented by Kurt W. Conrad conrad@sagebrushgroup.com Based on A ramework

More information

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector

8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector 8 Executive summary Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector The hectic demands of modern lifestyles, combined with the growing power of information technology,

More information

Is Privacy Still an Issue for Data Mining? Chris Clifton 11 October, 2007

Is Privacy Still an Issue for Data Mining? Chris Clifton 11 October, 2007 Is Privacy Still an Issue for Data Mining? Chris Clifton 11 October, 2007 Privacy-Preserving Data Mining: History 2000: First PPDM papers Srikant&Agrawal: Perturbation Lindell&Pinkas: Secure Multiparty

More information

WP6 Genomics Organizing the societal debate on the use of genomic information in healthcare

WP6 Genomics Organizing the societal debate on the use of genomic information in healthcare WP6 Genomics Organizing the societal debate on the use of genomic information in healthcare Wannes Van Hoof, PhD & Chloé Mayeur, MA - Sciensano e-mail: wannes.vanhoof@sciensano.be chloe.mayeur@sciensano.be

More information

An Automated Record Linkage System - Linking 1871 Canadian census to 1881 Canadian Census

An Automated Record Linkage System - Linking 1871 Canadian census to 1881 Canadian Census An Automated Record Linkage System - Linking 1871 Canadian census to 1881 Canadian Census Luiza Antonie Peter Baskerville Kris Inwood Andrew Ross Abstract This paper describes a recently developed linkage

More information

Learning to Predict Indoor Illumination from a Single Image. Chih-Hui Ho

Learning to Predict Indoor Illumination from a Single Image. Chih-Hui Ho Learning to Predict Indoor Illumination from a Single Image Chih-Hui Ho 1 Outline Introduction Method Overview LDR Panorama Light Source Detection Panorama Recentering Warp Learning From LDR Panoramas

More information

Privacy Preserving Optics for Miniature Vision Sensors

Privacy Preserving Optics for Miniature Vision Sensors Privacy Preserving Optics for Miniature Vision Sensors Francesco Pittaluga and Sanjeev J. Koppal University of Florida Electrical and Computer Engineering Shoham et al. 07, Wood 08, Enikov et al. 09, Agrihouse

More information

Responsible AI and the Future of Customer Engagement. Peter van der Putten, Director Decisioning Solutions WW,Pegasystems

Responsible AI and the Future of Customer Engagement. Peter van der Putten, Director Decisioning Solutions WW,Pegasystems Responsible AI and the Future of Customer Engagement Peter van der Putten, Director Decisioning Solutions WW,Pegasystems Photo: from movie I Robot, 2004 Accuracy Model Performance Number of analyzed

More information

Multi-PIE. Robotics Institute, Carnegie Mellon University 2. Department of Psychology, University of Pittsburgh 3

Multi-PIE. Robotics Institute, Carnegie Mellon University 2. Department of Psychology, University of Pittsburgh 3 Multi-PIE Ralph Gross1, Iain Matthews1, Jeffrey Cohn2, Takeo Kanade1, Simon Baker3 1 Robotics Institute, Carnegie Mellon University 2 Department of Psychology, University of Pittsburgh 3 Microsoft Research,

More information

Number Plate Recognition Using Segmentation

Number Plate Recognition Using Segmentation Number Plate Recognition Using Segmentation Rupali Kate M.Tech. Electronics(VLSI) BVCOE. Pune 411043, Maharashtra, India. Dr. Chitode. J. S BVCOE. Pune 411043 Abstract Automatic Number Plate Recognition

More information

Owning Identity One or many: Do we have a choice?

Owning Identity One or many: Do we have a choice? Uberveillance 29 Oct 2007 Owning Identity One or many: Do we have a choice? Marcus Wigan Oxford Professor Emeritus Napier University Edinburgh Professorial Fellow: Melbourne Visiting Professor: Imperial

More information

Person De-identification in Activity Videos

Person De-identification in Activity Videos Person De-identification in Activity Videos M. Ivasic-Kos Department of Informatics University of Rijeka Rijeka, Croatia marinai@uniri.hr A. Iosifidis, A. Tefas, I. Pitas Department of Informatics Aristotle

More information

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group

More information

What is AI? AI is the reproduction of human reasoning and intelligent behavior by computational methods. an attempt of. Intelligent behavior Computer

What is AI? AI is the reproduction of human reasoning and intelligent behavior by computational methods. an attempt of. Intelligent behavior Computer What is AI? an attempt of AI is the reproduction of human reasoning and intelligent behavior by computational methods Intelligent behavior Computer Humans 1 What is AI? (R&N) Discipline that systematizes

More information