Privacy Policy. What is Data Privacy? Privacy Policy. Data Privacy Friend or Foe? Some Positives
|
|
- Nigel Wilcox
- 6 years ago
- Views:
Transcription
1 Privacy Policy Data Privacy Friend or Foe? Some Limitations Need robust language Need enforcement Scope of world / interaction Syntax, not semantics Bradley Malin, malin@cscmuedu Data Privacy Laboratory, School of Computer Science Carnegie Mellon University October 26, 24 What is Data Privacy? WHERE does data come from? WHAT does data reveal? HOW do we prove data does not reveal more than specified? Privacy Policy Some Positives Procedure Specifies how data can (not) be used Logical Cognition Requires active involvement and thought regarding information Standardization equal opportunity Legal Enforcement What is Data Privacy? The study of computational solutions for releasing data such that the data remain practically useful while the aspects of the subjects of the data are not revealed Privacy Protection ( data protectors ): release information such that entity-specific properties (eg identity) are controlled restrict what can be learned Data Linkage ( data detectives ) combining disparate pieces of entity-specific information to learn more about an entity
2 Relationships Between Related Areas INFERENCE CONTROL PUBLIC POLICY DISCLOSURE CONTROL PRIVACY- PRESERVING DATA MINING LAW PRIVACY SPECIFICATION ANONYMITY (De-identification) Diagram courtesy of Michael Shamos HUMAN INTERFACE ORGANIZATIONAL PRACTICES ENFORCEMENT & IMPLEMENTATION AUDIT & ACCOUNTABILITY SECURITY TRUSTED HARDWARE CRYPTO Data Data Data What kind of data? Field Structured Databases Text Documents Genomic Image Video Network (Physical or Social) Communications All kinds! Data Privacy is Interdisciplinary Table courtesy of Latanya Sweeney AI learning theory database language security IS anonymity heavy some heavy rights mgt some heavy database some heavy some ubiquitous heavy heavy heavy some some some AI primarily concerns knowledge representation and semantics Learning focuses on data mining algorithms Theory includes zero-knowledge proofs and multi-party computations Information Explosion 3 Increase in technological capability for collection, storage, 25 transfer Growth in 2 active web 5 Decrease servers in cost Global Disk Storage Per Person (GDSP) Sewrvers (in Millions) GDSP (MB/person) ~(hard drive space) / (world population) Storage (tera) Population ( 9 ) Person-time / page months 6, hour [Sweeney 997] Growth in available disk storage 993 First WWW 57 conference 2 2,8, 6 35 min Year
3 Anonymity & De-identification Anonymous: Data can not be manipulated or linked to identify an individual De-identified: All explicit identifiers, such as name, address, & phone number are removed, generalized, or replaced with made up values Does Anonymous = De-identified? Direct Linkage Uses the combination of attributes to determine the uniqueness of an entity in a dataset Second dataset with identified subjects is used to make the re-identification by drawing inferences between the two datasets on the related attributes The attributes do not have to be equal, but there must exist some ability for inference of between attributes Medical Information Linking to re-identify data Attributes Recommended by NAHDO (outside scope of HIPAA) Patient Zip Code Patient Birth Date Patient Gender Patient Racial Background Patient Number Visit Date Principle Diagnosis Codes (ICD-9) Procedure Codes Physician ID Number Physician Zip Code Total Charges Ethnicity Visit date Diagnosis Procedure Medication Total charge Zip Birthdate Sex Medical Data 3
4 Linking to re-identify data Zip Birthdate Sex Name Address Date registered Party affiliation Date last voted {date of birth, gender, 5-digit ZIP} uniquely identifies 87% of USA [Sweeney 97, 98] Few fields are needed to uniquely identify individuals Voter List Linking to re-identify data Ethnicity Visit date Diagnosis Procedure Medication Total charge Zip Sex Name Address 87% of the United States is Birthdate RE-IDENTIFIABLE Date registered Party affiliation Date last voted [Sweeney 97, 98] {date of birth, gender, 5-digit ZIP} [Sweeney 97, 98] uniquely identifies 87% of USA ZIP 6623, 2,67 people, %, not % insufficient # above the age of 55 living there Medical Data Voter List 4
5 {date of birth, gender, 5-digit ZIP} uniquely identifies 87% of USA pop ZIP 794, 548 people, primarily between 9 and 24 (4666 of 548 or 86%), only 3% [Sweeney 97, 98] Chain of Links Voter List D G Z Medical Data Semantic Learning Chain of Links Mining strategic information from text, and from video Automated profiles (putting disparate pieces together) Resolving ambiguous identities in data (eg Michael Jordan, the basketball player, vs Michael Jordan, the computer scientist) Edoardo Airoldi William Gronim Ralph Gross Kishore Madhava Bradley Malin Algorithms for learning sensitive information from seemingly innocent information Voter List D G Z Medical Data So what do you do? DNA Data Mutation Analysis Prediction and Risk Pharmaco-Genomic Relations Familial Relations ATCGATCGAT 5
6 Building Up Relations Ethnicity Visit date Zip Diagnosis Birthdate Procedure Sex Medication Total charge Medical Data DNA Data ATCGATCGAT CleanGene Step : gender via genetic locus Step 2: classify disease by known mutations Step 3: hospital ID and other inferences Step 4: linking DNA with the medical profile [Malin & Sweeney 2] 2 3 n HID k m 2 HID k f 3 HID k m n HID k f 2 3 n STEP Full Sequences known STEP 3 STEP n 2 3 n m f m f STEP 2 ESTs / cdnas ZIP i DOB HID k m 2 ZIP j DOB 2 HID k f 3 ZIP i DOB 3 HID k m m ZIP i DOB m HID k f Genotype-Phenotype Relations Can infer genotype-phenotype relationships out of both DNA and medical databases Medical Database DIAGNOSIS Phenotype With Genetic Trait ACTG Genomic DNA Longitudinal Genomic Learning Model Clinical Profiles Diagnoses Clinical Phenotype State Mapping Classify Profile Visits [Malin & Sweeney 22] DIAGNOSIS Disease Phenotype ACTG Disease Sequences DNA Database Constrain Profile State Alignment DNA Predictions 6
7 Experimental Results DNA with Huntington s Disease Example: Huntington s disease Exists strong correlation between age of onset and DNA mutation (# of CAG repeats) Given longitudinal clinical info, accurately infer age of onset in 2 of 22 cases Size of Repeat vs Age of Onset y = -248Ln(x) R 2 = 889 Malin B and Sweeney L Inferring genotype from clinical phenotype through a knowledge-based algorithm Privacy Policy, In Technology, Pacific and Symposium Law on Biocomputing Data Privacy: pp Foe, 4-52, then Jan Friend 22 # CAG repeats Age Age of Onset Age of Onset Prediction individual Individual act ual age min age max age Websites Share Weblogs Yoda Leah Obi 8254 Han Obi Yoda C3PO Jabba C3PO Obi Leah Lando Learning from Trails Identity algorithms to learn where a person has been by the trail left behind eg, IP addresses left behind while visiting websites [Malin & Sweeney, 4], [Malin 2] IP IP IP 2 IP 3 IP Websites Share Consumer Lists Yoda Leah Obi Han Obi Yoda C3PO Jabba C3PO Obi Leah Lando Yoda Leah Obi Han Obi Yoda C3PO Jabba C3PO Obi Leah Lando 7
8 Identity REIDIT-I Example Example of what was learned: (known by name) visited Amazon even though he never bought anything at Amazon IP IP IP 2 IP 3 IP 4 Reidentified IP2 IP IP 4 IP 3 Protection Models Jcd Jwq Jxy Dan Don Dave Ann Abe Al Subjects Population Universe Ann /2/6 239 cardiac Abe 7/4/6 239 cancer Al 3/8/6 238 liver Private Information Jcd Jwq Jxy Null-Map Al 3/8/6 238 cardiac Ann /2/6 239 cancer Abe 7/4/6 239 liver Wrong-Map A* 96 23* cardiac A* 96 23* cancer A* 96 23* liver k-anonymity cardiac cancer liver Overview Idea of k-map and k-anonymity [Sweeney 97, 98] General Idea of Data Privacy Data Analysis in Personal Information Learning Demographic Data Genetic Data Data Protection Formal Models Video Data For every record released, there will be at least k individuals to whom the record indistinctly refers In k-map, the k individuals exist in the world In k-anonymity, the k individuals appear in the release 8
9 Model Examples Distributions of a Population Register k-map: For each tuple t in the release, t must indistinctly refer to at least k entities in the population A* * cardiac A* 96 23* cancer A* * liver Gil Hal Jim There are three colors with frequencies: red, 3 green and 2 blue There are 2 types of figures, with 2 of one type and 4 of the other k-anonymity: k in the release A* 96 23* cardiac A* 96 23* cancer A* 96 23* liver Ken Len Mel Register The combination of color and figure labeled as Hal and Len are each unique k-anonymity, enforce on release Quasi-identifier, profile {Birth, ZIP, Gender} Generalization /27/ Suppression 239 Encryption Re-identification Example Gil Hal Jim Ken Len Mel Register Release There are 3 green figures and 2 figures having the same profile as the release But only Hal is green and has the same figure type as the profile in the release It is a unique match 9
10 Re-identification Example Overview Gil Hal Jim Ken Len Mel Register Release There are two matches for this profile, Jim and Mel There is no unique match General Idea of Data Privacy Data Analysis in Personal Information Learning Demographic Data Genetic Data Data Protection Formal Models Video Data Formal Protection Example Gil Hal Jim Ken Len Mel Register + = Release To achieve k-map where k=2, agents for Gil, Hal and Ken agree to merge their information together Information released about any of them results in the same merged image Video Data Privacy Modify video images so that Privacy: automated attempts to recognize faces fail Utility: knowledge learned from data is useful Solution to problem Enables sharing of data for specified purposes Protects rights as specified in policy eg your identity won t be revealed unless you have done something illegal
11 De-identification of Faces Face Recognition: The Big Idea Example Captured images are below Here is a known image of Bob Which person is Bob? Identification Algorithm* Name of Person Identity Unknown? Face Recognition Software: ~7% % of Samples Where Correct Match Found All Rank Data Privacy: Foe, then Friend 24 Bradley Malin PCA-Based Face Recognition Systems Limiting the success of Module 2 is our goal
12 Basic Approach in Eigenfaces Use a training set to identify a set of characteristic faces 2 Given a gallery of known faces and a probe image of an unknown person, compare each face to the characteristic faces to get a distance measure for each Eigenvectors The characteristic function: (A-λI) = 3 The probe s identity is determined by the shortest distance to a gallery image 4 There is one image per person in the gallery and one corresponding picture per person in the probe set where A is the covariance matrix C Module 2: Eigenfaces / PCA Training Set Gallery Probe Face Space of Average Face Projected Gallery Distance Measure Projected Probe De-identification: T-mask Example continued Captured images are deidentified below Here is a known image of Bob Which person is Bob? 2
13 De-identification: T-mask Example continued Captured images are deidentified below Here is a known image of Bob Which person is Bob? De-identification: pixel reduction Example continued Captured images are deidentified below Here is a known image of Bob Which person is Bob? Automated Recognition Fails! % of Samples Where Correct Match Found De-identification: pixel reduction Example continued Captured images are deidentified below Here is a known image of Bob Which person is Bob? All Rank 3
14 Face recognition Works, Humans Don t! % of Samples Where Correct Match Found All Rank Some Experiments Single Bar Mask T-Mask Black Blob Mouth Only Grayscale Black & White Ordinal Data Threshold Pixelation Negative Grayscale Black & White Random Grayscale Black & White Mr Potato Head Pixelation: Automated Recognition Easier! Ad Hoc Methods = Poor Protection % of Samples Where Correct Match Found All Rank % of Samples Where Correct Match Found Percent Identifie All Black Test 4
15 % of Samples Where Correct Match Found Uh Oh, Not Looking Good T = 65 T = 5 Don t be Naïve Again, de-identified anonymous Masks can be removed and trained against Some cases naïve de-identification even harms privacy! pixelation and blur improves performance Time to get logical Threshold Level % of Samples Where Correct Match Found Random Changes to Grayscale Images Percent Correctly Identified Original Gray Scale/Rand Experiment: ID rate v Number of Pixels Changed Identification Rate for Randomly Changed set in Gallery Randomly v Originals changed gallery Identification Rate for Originals v Randomly Changed Randomly changed probe set in Probe Number of Values Changed Number of Pixels Changed (R) R = 3 R = 9 Back to k-protection Models [Newton, Sweeney, Malin 4,5] k-anonymity: For every record, there are at least k individuals to whom it refers (realized upon release) k-same: For every face, there are at least k people to whom that face refers No face actually refers to a single real person 5
16 Ranking of Faces Example How does everyone rank against each other? Who is closest? Who is farthest? Examples of k-same -Pixel -Eigen k = Example of k-same for k=2 Demonstration Time! K-Same Demo 6
17 Performance of k-same Algorithms Thanks! % of Samples Where Correct Match Found Percent Correct, Top Rank Expected[k-Same] k-same-pixel k-same-eigen k Rank Upper-bound on Recognition Performance = k Some slides adapted from: Elaine Newton Michael Shamos Latanya Sweeney More information: Overview General Idea of Data Privacy Data Analysis in Personal Information Learning Demographic Data Genetic Data Data Protection Formal Models Video Data 7
Workshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF
Workshop on anonymization Berlin, March 19, 2015 Basic Knowledge Terms, Definitions and general techniques Murat Sariyar TMF Workshop Anonymisation, March 19, 2015 Outline Background Aims of Anonymization
More informationCurriculum Vitae Bradley A. Malin
Curriculum Vitae Bradley A. Malin Carnegie Mellon University +1 412 268 1097 (tel) School of Computer Science +1 412 268 6708 (fax) 1320 B Wean Hall malin@cs.cmu.edu Pittsburgh, Pennsylvania 15213-3890
More informationEthics of Data Science
Ethics of Data Science Lawrence Hunter, Ph.D. Director, Computational Bioscience Program University of Colorado School of Medicine Larry.Hunter@ucdenver.edu http://compbio.ucdenver.edu/hunter Data Science
More informationData Anonymization Related Laws in the US and the EU. CS and Law Project Presentation Jaspal Singh
Data Anonymization Related Laws in the US and the EU CS and Law Project Presentation Jaspal Singh The Need for Anonymization To share a database packed with sensitive information with third parties or
More informationFoundations of Privacy. Class 1
Foundations of Privacy Class 1 1 The teachers of the course Kostas Chatzikokolakis CNRS & Ecole Polytechnique Catuscia Palamidessi INRIA & Ecole Polytechnique 2 Logistic Information The course will be
More informationBCCDC Informatics Activities
BCCDC Informatics Activities Environmental Health Surveillance Workshop February 26, 2013 Public Health Informatics Application of key disciplines to Public Health information science computer science
More informationPractical Image and Video Processing Using MATLAB
Practical Image and Video Processing Using MATLAB Chapter 1 Introduction and overview What will we learn? What is image processing? What are the main applications of image processing? What is an image?
More informationSystematic Privacy by Design Engineering
Systematic Privacy by Design Engineering Privacy by Design Let's have it! Information and Privacy Commissioner of Ontario Article 25 European General Data Protection Regulation the controller shall [...]
More informationAUTOMATED MALARIA PARASITE DETECTION BASED ON IMAGE PROCESSING PROJECT REFERENCE NO.: 38S1511
AUTOMATED MALARIA PARASITE DETECTION BASED ON IMAGE PROCESSING PROJECT REFERENCE NO.: 38S1511 COLLEGE : BANGALORE INSTITUTE OF TECHNOLOGY, BENGALURU BRANCH : COMPUTER SCIENCE AND ENGINEERING GUIDE : DR.
More informationClinical Natural Language Processing: Unlocking Patient Records for Research
Clinical Natural Language Processing: Unlocking Patient Records for Research Mark Dredze Computer Science Malone Center for Engineering Healthcare Center for Language and Speech Processing Natural Language
More informationPrivacy in a Networked World: Trouble with Anonymization, Aggregates
Privacy in a Networked World: Trouble with Anonymization, Aggregates Historical US Privacy Laws First US Law dates back to: 1890 Protecting privacy of Individuals against government agents 1973 report.
More informationPrivacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product
Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Justin Zhan I-Cheng Wang Abstract In the e-commerce era, recommendation systems were introduced to share customer experience
More informationSocietal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics
Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics June 28, 2017 from 11.00 to 12.45 ICE/ IEEE Conference, Madeira
More informationDiet Networks: Thin Parameters for Fat Genomics
Institut des algorithmes d apprentissage de Montréal Diet Networks: Thin Parameters for Fat Genomics Adriana Romero, Pierre Luc Carrier, Akram Erraqabi, Tristan Sylvain, Alex Auvolat, Etienne Dejoie, Marc-André
More informationINTERACTIVE EVOLUTIONARY GENERATION OF FACIAL COMPOSITES FOR LOCATING SUSPECTS IN CRIMINAL INVESTIGATIONS/
The UK s European university INTERACTIVE EVOLUTIONARY GENERATION OF FACIAL COMPOSITES FOR LOCATING SUSPECTS IN CRIMINAL INVESTIGATIONS/ Dr Stuart Gibson (speaker) & Dr Chris Solomon School of Physical
More informationCapture-recapture studies
Capture-recapture studies Laura Anderson Centre for Infections Health Protection Agency UK Reiterating underlying assumptions 1) No misclassification of records (perfect record linkage) 2) Closed population
More informationPrivacy-Preserving Learning Analytics
October 16-19, 2017 Sheraton Centre, Toronto, Canada Vassilios S. Verykios 3 Professor, School of Sciences and Technology A joint work with Evangelos Sakkopoulos 1, Elias C. Stavropoulos 2, Vasilios Zorkadis
More informatione-science Acknowledgements
e-science Elmer V. Bernstam, MD Professor Biomedical Informatics and Internal Medicine UT-Houston Acknowledgements Todd Johnson (UTH UKy) Jack Smith (Dean at UTH SBMI) CTSA informatics community Luciano
More informationChallenges and opportunities of digital social research: Access and Anonymity
Challenges and opportunities of digital social research: Access and Anonymity Dr. Dan Nunan Henley Business School, University of Reading www.henley.ac.uk Two narratives for social research: Evolution
More informationNorthfleet Technology College Course Outline: Information Technology in a Global Society
Northfleet Technology College Course Outline: Information Technology in a Global Society Equivalent to ½ A level Introduction: What is ITGS Information Technology in a Global Society International refers
More informationSecond Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security
Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS
More informationExtraction and Recognition of Text From Digital English Comic Image Using Median Filter
Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com
More informationThe EFPIA Perspective on the GDPR. Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference , Helsinki
The EFPIA Perspective on the GDPR Brendan Barnes, EFPIA 2 nd Nordic Real World Data Conference 26-27.9.2017, Helsinki 1 Key Benefits of Health Data Improved decision-making Patient self-management CPD
More informationPrivacy preserving data mining multiplicative perturbation techniques
Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data
More informationGuidance on the anonymisation of clinical reports for the purpose of publication in accordance with policy 0070
Guidance on the anonymisation of clinical reports for the purpose of publication in accordance with policy 0070 Stakeholder webinar 24 June 2015, London Presented by Monica Dias Policy Officer An agency
More informationEnabling Trust in e-business: Research in Enterprise Privacy Technologies
Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing
More informationExperiments with An Improved Iris Segmentation Algorithm
Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.
More informationAutomatic Morphological Segmentation and Region Growing Method of Diagnosing Medical Images
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 3 (2012), pp. 173-180 International Research Publications House http://www. irphouse.com Automatic Morphological
More informationHow Machine Learning and AI Are Disrupting the Current Healthcare System. Session #30, March 6, 2018 Cris Ross, CIO Mayo Clinic, Jim Golden, PwC
How Machine Learning and AI Are Disrupting the Current Healthcare System Session #30, March 6, 2018 Cris Ross, CIO Mayo Clinic, Jim Golden, PwC 1 Conflicts of Interest: Christopher Ross, MBA Has no real
More informationVision Defect Identification System (VDIS) using Knowledge Base and Image Processing Framework
Vishal Dahiya* et al. / (IJRCCT) INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER AND COMMUNICATION TECHNOLOGY Vol No. 1, Issue No. 1 Vision Defect Identification System (VDIS) using Knowledge Base and Image
More informationOnline Diagnosis and Monitoring for Power Distribution System
Energy and Power Engineering, 1,, 59-53 http://dx.doi.org/1.3/epe.1. Published Online November 1 (http://www.scirp.org/journal/epe) Online Diagnosis and Monitoring for Power Distribution System Atef Almashaqbeh,
More informationBig Data, privacy and ethics: current trends and future challenges
Sébastien Gambs Big Data, privacy and ethics 1 Big Data, privacy and ethics: current trends and future challenges Sébastien Gambs Université du Québec à Montréal (UQAM) gambs.sebastien@uqam.ca 24 April
More informationIntelligent Agents & Search Problem Formulation. AIMA, Chapters 2,
Intelligent Agents & Search Problem Formulation AIMA, Chapters 2, 3.1-3.2 Outline for today s lecture Intelligent Agents (AIMA 2.1-2) Task Environments Formulating Search Problems CIS 421/521 - Intro to
More informationData Dictionary: HES-ONS linked mortality data
Data Dictionary: HES-ONS linked mortality data HES-ONS linked mortality data dictionary Welcome to the HES-ONS linked mortality data dictionary. If you have any feedback or suggestions about this document
More informationThe General Data Protection Regulation and use of health data: challenges for pharmaceutical regulation
The General Data Protection Regulation and use of health data: challenges for pharmaceutical regulation ENCePP Plenary Meeting- London, 22/11/2016 Alessandro Spina Data Protection Officer, EMA An agency
More informationResponsible Data Use Assessment for Public Realm Sensing Pilot with Numina. Overview of the Pilot:
Responsible Data Use Assessment for Public Realm Sensing Pilot with Numina Overview of the Pilot: Sidewalk Labs vision for people-centred mobility - safer and more efficient public spaces - requires a
More informationRecord Linkage between the 2006 Census of the Population and the Canadian Mortality Database
Proceedings of Statistics Canada Symposium 2016 Growth in Statistical Information: Challenges and Benefits Record Linkage between the 2006 Census of the Population and the Canadian Mortality Database Mohan
More informationPan-Canadian Trust Framework Overview
Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document
More informationNovember 6, Keynote Speaker. Panelists. Heng Xu Penn State. Rebecca Wang Lehigh University. Eric P. S. Baumer Lehigh University
Keynote Speaker Penn State Panelists Rebecca Wang Eric P. S. Baumer November 6, 2017 Haiyan Jia Gaia Bernstein Seton Hall University School of Law Najarian Peters Seton Hall University School of Law OVERVIEW
More informationCOMPUTATONAL INTELLIGENCE
COMPUTATONAL INTELLIGENCE October 2011 November 2011 Siegfried Nijssen partially based on slides by Uzay Kaymak Leiden Institute of Advanced Computer Science e-mail: snijssen@liacs.nl Katholieke Universiteit
More informationTRANSLATION OF GENOMICS FOR PATIENT CARE AND RESEARCH PATIENT S PERSPECTIVE
GENOMICS-ENABLED LEARNING HEALTH CARE SYSTEMS: GATHERING AND USING GENOMIC INFORMATION TO IMPROVE PATIENT CARE AND RESEARCH TRANSLATION OF GENOMICS FOR PATIENT CARE AND RESEARCH PATIENT S PERSPECTIVE DECEMBER
More informationAnalysis of Privacy and Data Protection Laws and Directives Around the World
Analysis of Privacy and Data Protection Laws and Directives Around the World Michael Willett (Seagate) ISTPA Board and Framework Chair Track IIB: Global Privacy Policy The Privacy Symposium: Boston, 23
More informationGood afternoon. Under the title of Trust and Co-creation in the Digital Era, I would like to explain our research and development strategy.
Good afternoon. Under the title of Trust and Co-creation in the Digital Era, I would like to explain our research and development strategy. LABORATORIES LTD. 1 Looking back, it has been 83 years since
More informationMachine Vision for the Life Sciences
Machine Vision for the Life Sciences Presented by: Niels Wartenberg June 12, 2012 Track, Trace & Control Solutions Niels Wartenberg Microscan Sr. Applications Engineer, Clinical Senior Applications Engineer
More informationDependable AI Systems
Dependable AI Systems Homa Alemzadeh University of Virginia In collaboration with: Kush Varshney, IBM Research 2 Artificial Intelligence An intelligent agent or system that perceives its environment and
More informationWANT TO PARTICIPATE IN RESEARCH? THERE S AN APP FOR THAT!
WANT TO PARTICIPATE IN RESEARCH? THERE S AN APP FOR THAT! SECURITY AND PRIVACY ISSUES WITH THE INCREASED USE OF CONNECTED DEVICES, APPS, AND SOCIAL MEDIA IN RESEARCH. PRESENTED BY: DAVID MATA, SENIOR ASSOCIATE,
More informationMEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS. Justin Becker, Hao Chen UC Davis May 2009
MEASURING PRIVACY RISK IN ONLINE SOCIAL NETWORKS Justin Becker, Hao Chen UC Davis May 2009 1 Motivating example College admission Kaplan surveyed 320 admissions offices in 2008 1 in 10 admissions officers
More informationTowards a Modern Approach to Privacy-Aware Government Data Releases
Towards a Modern Approach to Privacy-Aware Government Data Releases Micah Altman David O Brien & Alexandra Wood MIT Libraries Berkman Center for Internet & Society Open Data: Addressing Privacy, Security,
More informationVisual Search using Principal Component Analysis
Visual Search using Principal Component Analysis Project Report Umesh Rajashekar EE381K - Multidimensional Digital Signal Processing FALL 2000 The University of Texas at Austin Abstract The development
More informationThis Privacy Policy describes the types of personal information SF Express Co., Ltd. and
Effective Date: 2017/05/10 Updated date: 2017/05/25 This Privacy Policy describes the types of personal information SF Express Co., Ltd. and its affiliates (collectively as "SF") collect about consumers
More informationPrivacy-Enhanced Linking
Privacy-Enhanced Linking Latanya Sweeney School of Computer Science Carnegie Mellon University Pittsburgh, PA USA latanya@privacy.cs.cmu.edu ABSTRACT While computer scientists are uniquely situated to
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationCONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017
CONSENT IN THE TIME OF BIG DATA Richard Austin February 1, 2017 1 Agenda 1. Introduction 2. The Big Data Lifecycle 3. Privacy Protection The Existing Landscape 4. The Appropriate Response? 22 1. Introduction
More informationIntroduction to Image Analysis with
Introduction to Image Analysis with PLEASE ENSURE FIJI IS INSTALLED CORRECTLY! WHAT DO WE HOPE TO ACHIEVE? Specifically, the workshop will cover the following topics: 1. Opening images with Bioformats
More informationExercise 4 Exploring Population Change without Selection
Exercise 4 Exploring Population Change without Selection This experiment began with nine Avidian ancestors of identical fitness; the mutation rate is zero percent. Since descendants can never differ in
More informationKen Buetow, Ph.D. Director, Computation Science and Informatics, Complex Adaptive ASU Professor, School of Life Science
COMPLEX ADAPTIVE SYSTEMS Ken Buetow, Ph.D Director, Computation Science and Informatics, Complex Adaptive Systems @ ASU Professor, School of Life Science Kenneth.Buetow@ASU.edu 1 4 th Paradigm Science
More informationFebruary 24, [Click for Most Updated Paper] [Click for Most Updated Online Appendices]
ONLINE APPENDICES for How Well Do Automated Linking Methods Perform in Historical Samples? Evidence from New Ground Truth Martha Bailey, 1,2 Connor Cole, 1 Morgan Henderson, 1 Catherine Massey 1 1 University
More informationTechnical Aspects in Digital Pathology
Technical Aspects in Digital Pathology Yukako Yagi, PhD yyagi@mgh.harvard.edu Director of the MGH Pathology Imaging & Communication Technology Center Assistant Professor of Pathology, Harvard Medical School
More informationFujitsu Laboratories Advanced Technology Symposium 2018
Fujitsu Laboratories Advanced Technology Symposium 2018 October 9, 2018 Trust and Co-creation in the Digital Era Shigeru Sasaki Fujitsu Laboratories Ltd. CEO Fujitsu Limited CTO 2 FLATS 2017 Quantum Computing:
More informationConfidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT)
WHITE PAPER Linking Liens and Civil Judgments Data Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) Table of Contents Executive Summary... 3 Collecting
More informationFinding U.S. Census Data with American FactFinder Tutorial
Finding U.S. Census Data with American FactFinder Tutorial Mark E. Pfeifer, PhD Reference Librarian Bell Library Texas A and M University, Corpus Christi mark.pfeifer@tamucc.edu 361-825-3392 Population
More informationGuidance on the anonymisation of clinical reports for the purpose of publication
Guidance on the anonymisation of clinical reports for the purpose of publication Stakeholder meeting 6 July 2015, London Presented by Monica Dias Policy Officer An agency of the European Union Scope and
More informationDisclosure: Within the past 12 months, I have had no financial relationships with proprietary entities that produce health care goods and services.
Disclosure: Within the past 12 months, I have had no financial relationships with proprietary entities that produce health care goods and services. Artificial Intelligence (AI): definition John McCarthy,
More informationAuto-tagging The Facebook
Auto-tagging The Facebook Jonathan Michelson and Jorge Ortiz Stanford University 2006 E-mail: JonMich@Stanford.edu, jorge.ortiz@stanford.com Introduction For those not familiar, The Facebook is an extremely
More informationGuidance for Calculating Incidence by Census Tract Poverty Level Using 2010 Census and ACS
Guidance for Calculating Incidence by Census Tract Poverty Level Using 2010 Census and 2006-2010 ACS Prepared for CSTE Disparities Workgroup by Karman Tam, MPH candidate and Kimberly Yousey-Hindes, MPH,
More informationSecurity and Risk Assessment in GDPR: from policy to implementation
Global Data Privacy Security and Risk Assessment in GDPR: from policy to implementation Enisa Workshop Roma - February 8, 2018 Nicola Orlandi Head of Data Privacy Pharma Nicola Orlandi Nicola Orlandi is
More informationA Game Theoretic Framework for Analyzing Re-identification Risk : Supporting Information
1 A Game Theoretic Framework for Analyzing Re-identification Risk : Supporting Information Zhiyu Wan 1, Yevgeniy Vorobeychik 1, Weiyi Xia 1, Ellen Wright Clayton 2, Murat Kantarcioglu 3, Ranjit Ganta 3,
More informationSketching Interface. Larry Rudolph April 24, Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph
Sketching Interface Larry April 24, 2006 1 Motivation Natural Interface touch screens + more Mass-market of h/w devices available Still lack of s/w & applications for it Similar and different from speech
More informationCSC 320 H1S CSC320 Exam Study Guide (Last updated: April 2, 2015) Winter 2015
Question 1. Suppose you have an image I that contains an image of a left eye (the image is detailed enough that it makes a difference that it s the left eye). Write pseudocode to find other left eyes in
More informationPrivacy engineering, privacy by design, and privacy governance
CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://
More informationWISEid Student Person Export/ Import (SRN)
WISEid Student Person Export/ Import (SRN) WISEid Student Person Export (SRN) What is WISEid Export? The purpose of this data collection is to link students to their state assigned WISEid. The WISEid is
More informationSketching Interface. Motivation
Sketching Interface Larry Rudolph April 5, 2007 1 1 Natural Interface Motivation touch screens + more Mass-market of h/w devices available Still lack of s/w & applications for it Similar and different
More informationA COMPUTER VISION AND MACHINE LEARNING SYSTEM FOR BIRD AND BAT DETECTION AND FORECASTING
A COMPUTER VISION AND MACHINE LEARNING SYSTEM FOR BIRD AND BAT DETECTION AND FORECASTING Russell Conard Wind Wildlife Research Meeting X December 2-5, 2014 Broomfield, CO INTRODUCTION Presenting for Engagement
More informationEfficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method
Efficient Car License Plate Detection and Recognition by Using Vertical Edge Based Method M. Veerraju *1, S. Saidarao *2 1 Student, (M.Tech), Department of ECE, NIE, Macherla, Andrapradesh, India. E-Mail:
More informationBest Practices for Automated Linking Using Historical Data: A Progress Report
Best Practices for Automated Linking Using Historical Data: A Progress Report Preliminary; Comments are welcome Ran Abramitzky 1 Leah Boustan 2 Katherine Eriksson 3 James Feigenbaum 4 Santiago Perez 5
More informationPrivacy Implications of New York City's Stop-and- Frisk Data
Wellesley College Wellesley College Digital Scholarship and Archive Honors Thesis Collection 2015 Privacy Implications of New York City's Stop-and- Frisk Data Veronica Manfredi vmanfred@wellesley.edu Follow
More informationIDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE
International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro
More informationGlobal Alliance for Genomics & Health Data Sharing Lexicon
Version 1.0, 15 March 2016 Global Alliance for Genomics & Health Data Sharing Lexicon Preamble The Global Alliance for Genomics and Health ( GA4GH ) is an international, non-profit coalition of individuals
More informationA Case Study on the Use of Unstructured Data in Healthcare Analytics. Analysis of Images for Diabetic Retinopathy
A Case Study on the Use of Unstructured Data in Healthcare Analytics Analysis of Images for Diabetic Retinopathy A Case Study on the Use of Unstructured Data in Healthcare Analytics: Analysis of Images
More informationCOMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES
International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 3, May - June 2018, pp. 177 185, Article ID: IJARET_09_03_023 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=3
More informationSAFETY CASES: ARGUING THE SAFETY OF AUTONOMOUS SYSTEMS SIMON BURTON DAGSTUHL,
SAFETY CASES: ARGUING THE SAFETY OF AUTONOMOUS SYSTEMS SIMON BURTON DAGSTUHL, 17.02.2017 The need for safety cases Interaction and Security is becoming more than what happens when things break functional
More informationHuman Pedigree Genetics Answer Key
Human Pedigree Genetics Answer Key Free PDF ebook Download: Human Pedigree Genetics Answer Key Download or Read Online ebook human pedigree genetics answer key in PDF Format From The Best User Guide Database
More informationInternet Based Artificial Neural Networks for the Interpretation of Medical Images
Internet Based Artificial Neural Networks for the Interpretation of Medical Images Andreas Järund, Lars Edenbrandt Department of Clinical Physiology, Lund University, Lund, Sweden andreas.järund@klinfys.lu.se
More informationDigiMam Conformance Statement for DICOM V3.0
DigiMam Conformance Statement for DICOM V3.0 Copyright 2004 by I.M.S. s.r.l. DOCUMENT VERSIONS Version Date Author Changes 1.00 15-Feb-05 IMS s.r.l. First Version DOCUMENT VERSIONS Page 2 of 29 TABLE OF
More informationThe Automatic Classification Problem. Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification
Perceptrons, SVMs, and Friends: Some Discriminative Models for Classification Parallel to AIMA 8., 8., 8.6.3, 8.9 The Automatic Classification Problem Assign object/event or sequence of objects/events
More informationPrivacy Values and Privacy by Design Annie I. Antón
Privacy Values and Privacy by Design Annie I. Antón Silicon Flatirons The Technology of Privacy University of Colorado School of Law January 11, 2013 Online, how do we assure the public and what is
More informationIntroductions. Characterizing Knowledge Management Tools
Characterizing Knowledge Management Tools Half-day Tutorial Developed by Kurt W. Conrad, Brian (Bo) Newman, and Dr. Art Murray Presented by Kurt W. Conrad conrad@sagebrushgroup.com Based on A ramework
More information8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector
8 Executive summary Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector The hectic demands of modern lifestyles, combined with the growing power of information technology,
More informationIs Privacy Still an Issue for Data Mining? Chris Clifton 11 October, 2007
Is Privacy Still an Issue for Data Mining? Chris Clifton 11 October, 2007 Privacy-Preserving Data Mining: History 2000: First PPDM papers Srikant&Agrawal: Perturbation Lindell&Pinkas: Secure Multiparty
More informationWP6 Genomics Organizing the societal debate on the use of genomic information in healthcare
WP6 Genomics Organizing the societal debate on the use of genomic information in healthcare Wannes Van Hoof, PhD & Chloé Mayeur, MA - Sciensano e-mail: wannes.vanhoof@sciensano.be chloe.mayeur@sciensano.be
More informationAn Automated Record Linkage System - Linking 1871 Canadian census to 1881 Canadian Census
An Automated Record Linkage System - Linking 1871 Canadian census to 1881 Canadian Census Luiza Antonie Peter Baskerville Kris Inwood Andrew Ross Abstract This paper describes a recently developed linkage
More informationLearning to Predict Indoor Illumination from a Single Image. Chih-Hui Ho
Learning to Predict Indoor Illumination from a Single Image Chih-Hui Ho 1 Outline Introduction Method Overview LDR Panorama Light Source Detection Panorama Recentering Warp Learning From LDR Panoramas
More informationPrivacy Preserving Optics for Miniature Vision Sensors
Privacy Preserving Optics for Miniature Vision Sensors Francesco Pittaluga and Sanjeev J. Koppal University of Florida Electrical and Computer Engineering Shoham et al. 07, Wood 08, Enikov et al. 09, Agrihouse
More informationResponsible AI and the Future of Customer Engagement. Peter van der Putten, Director Decisioning Solutions WW,Pegasystems
Responsible AI and the Future of Customer Engagement Peter van der Putten, Director Decisioning Solutions WW,Pegasystems Photo: from movie I Robot, 2004 Accuracy Model Performance Number of analyzed
More informationMulti-PIE. Robotics Institute, Carnegie Mellon University 2. Department of Psychology, University of Pittsburgh 3
Multi-PIE Ralph Gross1, Iain Matthews1, Jeffrey Cohn2, Takeo Kanade1, Simon Baker3 1 Robotics Institute, Carnegie Mellon University 2 Department of Psychology, University of Pittsburgh 3 Microsoft Research,
More informationNumber Plate Recognition Using Segmentation
Number Plate Recognition Using Segmentation Rupali Kate M.Tech. Electronics(VLSI) BVCOE. Pune 411043, Maharashtra, India. Dr. Chitode. J. S BVCOE. Pune 411043 Abstract Automatic Number Plate Recognition
More informationOwning Identity One or many: Do we have a choice?
Uberveillance 29 Oct 2007 Owning Identity One or many: Do we have a choice? Marcus Wigan Oxford Professor Emeritus Napier University Edinburgh Professorial Fellow: Melbourne Visiting Professor: Imperial
More informationPerson De-identification in Activity Videos
Person De-identification in Activity Videos M. Ivasic-Kos Department of Informatics University of Rijeka Rijeka, Croatia marinai@uniri.hr A. Iosifidis, A. Tefas, I. Pitas Department of Informatics Aristotle
More informationIAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER
IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group
More informationWhat is AI? AI is the reproduction of human reasoning and intelligent behavior by computational methods. an attempt of. Intelligent behavior Computer
What is AI? an attempt of AI is the reproduction of human reasoning and intelligent behavior by computational methods Intelligent behavior Computer Humans 1 What is AI? (R&N) Discipline that systematizes
More information