The Privacy Case. Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns. Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG
|
|
- Kerrie Miller
- 6 years ago
- Views:
Transcription
1 The Privacy Case Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG
2 Agenda Introduction Defining the privacy case Privacy-relevant Aspern smart grid use cases Example artifacts from the Aspern privacy case Conclusion and future work
3 Introduction Processing smart grid data privacy-related issues Example: Aspern smart grid data Informed consent from ~50% of inhabitants Data collected in a centralized data warehouse Data are used for analytics purposes Stakeholders Concerned about unintended uses of measurement and personal data Stakeholders: grid and building operators, smart citizens, application ecosystem operator (Siemens)
4 Data warehouse (DWH) Software ecosystem (Third party) App developers Figure credits: Wiener Netze (power grid operator)
5 Aspern Stakeholders Privacy Concerns Privacy concerns Smart citizen Building operator Smart grid operator Ecosystem operator Personal data including names, addresses, consumption and home presence-absence patterns could end up in the wrong hands. Full compliance with regulatory guidelines. Data provided by the building operator may be used by third parties in uncontrollable ways. Providing suitable and effective data protection mechanisms. Compromising privacy may also compromise trust relations with data providers and data subjects. Device types (heat pumps, solar devices, batteries, etc.) can be identified by the energy consumption and generation patterns. Providing data which are not yet well understood (especially in the low voltage grid, which has not yet been monitored in that detail). Providing data in the context of current and potentially changing law.
6 Challenges How can we differentiate between privacy concerns and reasonable privacy risks? How can we address reasonable privacy risks through privacy goals and strategies? How can we design and implement solutions that fulfill the identified privacy goals? How can we represent and document privacy arguments in a comprehensive way?
7 The Privacy Case A PC provides a systematic and comprehensive documented account of: (1) Business goals of different smart grid stakeholders wrt. a specific data source (2) Privacy concerns of smart grid stakeholders wrt. business goals (3) Privacy goals and strategies derived from the concerns of the involved stakeholders (4) Technical solutions for achieving privacy goals and implementing strategies (5) The point-by-point argumentation and evaluation of the technical solutions proposed to fulfill the privacy goals Business goals Privacy concerns Privacy goals and strategies Technical solutions Argumentation and evaluation
8 Safety Case vs. Privacy Case Safety cases required by standards such as ISO26262 (automotive) Also used in the railway, aerospace, medical, and industrial domains Criticisms of the safety case Positively oriented goals peripheral blindness for risk Inoculation of a certain mindset biased safety arguments Bureaucratic approach obscure language Safety Case Argumentation for safety Hazardous events driven by safety risks Safety goals Privacy Case Argumentation for privacy Privacy concerns driven by privacy risks Privacy goals Strategies and technical solutions Evidence safety of (sub)systems Safety claims verified by certification authorities Evidence privacy preserving data services Privacy claims presented to all concerned stakeholders Privacy case: (1) More transparent, (2) use nonexpert language, (3) consider the perspectives of different stakeholders independently, (4) including that of a hypothetical adversary.
9 Goal Structuring Notation (GSN) Graphical notation for presenting the structure of assurance arguments Used within the nuclear, defense, aerospace and railway industries Represents the elements of an argument and the relationships between them
10 Example: The Aspern Smart Grid
11 UC1: Low Voltage Grid Anomaly Detection Fine-grained grid measurements are analyzed to detect outliers or unusual patterns Data are retrieved from the grid operator in aggregated form The building operators (as legal entities) need to agree on the usage of the data UC2: Smart Grid Simulation Grid simulation is required whenever an anomaly is detected within a grid segment The processed data includes grid measurements and individual load profiles derived from personal data. Personal data can only be used with the written consent of the concerned smart citizens
12 Matching Privacy Concerns to Privacy Goals
13 Kruchten, P., Capilla, R., & Dueas, J. C. (2009). The decision view's role in software architecture practice. Software, IEEE, 26(2), M5: Privacy protection Rules for designing and documenting technical solutions Provide traceability information Provide alternative solutions Provide a rationale for the choice of one solution over another
14 M6: Flexible privacy policies Advantages of using GSN diagrams and solution decision sheets Comprehensive shareable and reusable privacy arguments Clear and practical traceability of privacy goals from solutions Alternatives may represent innovative solutions which might have not been taken into consideration
15 Conclusion and Future Work The Privacy Case an adaptation of the safety case approach to data privacy assurance PCs help to differentiate between reasonable privacy risks and stakeholder-specific concerns, while addressing both of them The Aspern PC revealed alternative solutions not previously considered (e.g., data microservices) Future work Develop a complete PC for the Aspern Smart ICT Ecosystem Develop web-based tool support for collaboratively authoring, sharing, and reviewing privacy cases
16 Questions? For more information, please also visit the Aspern Smart City Week 2016!
SAFETY CASE PATTERNS REUSING SUCCESSFUL ARGUMENTS. Tim Kelly, John McDermid
SAFETY CASE PATTERNS REUSING SUCCESSFUL ARGUMENTS Tim Kelly, John McDermid Rolls-Royce Systems and Software Engineering University Technology Centre Department of Computer Science University of York Heslington
More informationStandards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments
Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering
More informationPrivacy Management in Smart Cities
Privacy Management in Smart Cities Antonio Kung 26/04/2017 Data management and citizens privacy in smart cities open governance 1 Introduction Speaker Antonio Kung, Trialog (www.trialog.com,fr) Engineering
More informationSAFETY CASES: ARGUING THE SAFETY OF AUTONOMOUS SYSTEMS SIMON BURTON DAGSTUHL,
SAFETY CASES: ARGUING THE SAFETY OF AUTONOMOUS SYSTEMS SIMON BURTON DAGSTUHL, 17.02.2017 The need for safety cases Interaction and Security is becoming more than what happens when things break functional
More informationThe AMADEOS SysML Profile for Cyber-physical Systems-of-Systems
AMADEOS Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems FP7-ICT-2013.3.4 - Grant Agreement n 610535 The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems
More informationOur position. ICDPPC declaration on ethics and data protection in artificial intelligence
ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure
More informationPan-Canadian Trust Framework Overview
Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document
More informationTowards a multi-view point safety contract Alejandra Ruiz 1, Tim Kelly 2, Huascar Espinoza 1
Author manuscript, published in "SAFECOMP 2013 - Workshop SASSUR (Next Generation of System Assurance Approaches for Safety-Critical Systems) of the 32nd International Conference on Computer Safety, Reliability
More informationModel Based Systems Engineering with MagicGrid
November 2, 2016 Model Based Systems Engineering with MagicGrid No Magic, Inc. System Model as an Integration Framework Need for Ecosystem 2 2012-2014 by Sanford Friedenthal 19 The modeling language is
More informationTowards Trusted AI Impact on Language Technologies
Towards Trusted AI Impact on Language Technologies Nozha Boujemaa Director at DATAIA Institute Research Director at Inria Member of The BoD of BDVA nozha.boujemaa@inria.fr November 2018-1 Data & Algorithms
More informationnext generation internet Fabrizio Sestini, DG CONNECT
next generation internet Fabrizio Sestini, DG CONNECT Vision for a "Next Generation Internet" IT-driven Business driven Right 2 disconnect Artificial Intelligence Immersive Interfaces Monopolies Centralization
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework
INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number
More informationEffective Data Protection Governance An Approach to Information Governance in an Information Age. OECD Expert Consultation Boston October 2016
Effective Protection Governance An Approach to Information Governance in an Information Age OECD Expert Consultation Boston October 2016 Today s Objectives Are the Same, But the Challenges Are Different
More informationA FRAMEWORK FOR PERFORMING V&V WITHIN REUSE-BASED SOFTWARE ENGINEERING
A FRAMEWORK FOR PERFORMING V&V WITHIN REUSE-BASED SOFTWARE ENGINEERING Edward A. Addy eaddy@wvu.edu NASA/WVU Software Research Laboratory ABSTRACT Verification and validation (V&V) is performed during
More informationTransparency and Accountability of Algorithmic Systems vs. GDPR?
Transparency and Accountability of Algorithmic Systems vs. GDPR? Nozha Boujemaa Directrice de L Institut DATAIA Directrice de Recherche Inria nozha.boujemaa@inria.fr March 2018 Data & Algorithms «2 sides
More informationprogressive assurance using Evidence-based Development
progressive assurance using Evidence-based Development JeremyDick@integratebiz Summer Software Symposium 2008 University of Minnisota Assuring Confidence in Predictable Quality of Complex Medical Devices
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework
INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number
More informationСonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union
Сonceptual framework and toolbox for digital transformation of industry of the Eurasian Economic Union Dmitry Krupsky Head of Department of Economy of Innovation Activity, Ministry of Economy of the Republic
More informationCyPhers Project: Main Results
CyPhers Project: Main Results Saddek Bensalem / shortened Presentation by Sebastian Engell (CPSoS) SoS Open Workshop, Florence May 28, 2015 fortiss (Munich) KTH (Stockholm) U. Joseph Fourier (Grenoble)
More informationHealthTech: What does it mean for compliance?
HealthTech: What does it mean for compliance? May 2018 Agenda 11:15 AM 11:30 AM Introduction Kathleen Meriwether, Americas Leader - Life Sciences Fraud Investigation & Dispute Services, EY 11:30 AM 12:15
More informationAnalysis of Privacy and Data Protection Laws and Directives Around the World
Analysis of Privacy and Data Protection Laws and Directives Around the World Michael Willett (Seagate) ISTPA Board and Framework Chair Track IIB: Global Privacy Policy The Privacy Symposium: Boston, 23
More informationDistributed Artificial Intelligence Laboratory. Future in touch. at CeBIT 2014 on March, 10th to 14th, Hall 9, Booth A 44
EN Distributed Artificial Intelligence Laboratory Future in touch at CeBIT 2014 on March, 10th to 14th, Hall 9, Booth A 44 Distributed Artificial Intelligence Laboratory The DAI-Labor and the associated
More informationARGUING THE SAFETY OF MACHINE LEARNING FOR HIGHLY AUTOMATED DRIVING USING ASSURANCE CASES LYDIA GAUERHOF BOSCH CORPORATE RESEARCH
ARGUING THE SAFETY OF MACHINE LEARNING FOR HIGHLY AUTOMATED DRIVING USING ASSURANCE CASES 14.12.2017 LYDIA GAUERHOF BOSCH CORPORATE RESEARCH Arguing Safety of Machine Learning for Highly Automated Driving
More informationMORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI.
MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI www.infosys.com/aimaturity The current utility business model is under pressure from multiple fronts customers, prices, competitors, regulators,
More informationPrincipled Construction of Software Safety Cases
Principled Construction of Software Safety Cases Richard Hawkins, Ibrahim Habli, Tim Kelly Department of Computer Science, University of York, UK Abstract. A small, manageable number of common software
More informationA Computing Research Perspective on a Learning Healthcare System. Kevin Sullivan Computer Science University of Virginia 4/11/2013
A Computing Research Perspective on a Learning Healthcare System Kevin Sullivan Computer Science University of Virginia 4/11/2013 Outline Motivation unmet potential, pressing need Goal use driven, fundamental
More informationRegional cooperation: building SDI for better governance
From Knowledge Generation To Science based Innovation Regional cooperation: building SDI for better governance Artur Rocha (artur.rocha@inesctec.pt) Senior Researcher Centre for Information Systems and
More informationExecutive Summary Industry s Responsibility in Promoting Responsible Development and Use:
Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the
More informationIMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE
IMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE Smart Card Alliance 2005 Fall Annual Conference Presented by Mike Butler Director of Smart Card Programs and Operations Defense Manpower Data Center
More informationToward Objective Global Privacy Standards. Ari Schwartz Senior Internet Policy Advisor
Toward Objective Global Privacy Standards Ari Schwartz Senior Internet Policy Advisor Summary Technical standards offer a new ability to support the important public policy goal of better protecting privacy.
More informationIssues and Challenges in Ecosystems of Federated Embedded Systems
Issues and Challenges in Ecosystems of Federated Embedded Systems Efi Papatheocharous (SICS Swedish ICT, Postdoctoral Research Fellow) Jakob Axelsson (SICS Swedish ICT & Mälardalen University) Jesper Andersson
More informationA Roadmap for Ethics-Aware Software Engineering
A Roadmap for Ethics-Aware Software Engineering Fatma Başak Aydemir and Fabiano Dalpiaz FairWare 2018 Requirements Engineering Lab Department of Computing and Information Sciences Utrecht University Table
More informationCombination Products Verification, Validation & Human Factors Sept. 12, 2017
Combination Products Verification, Validation & Human Factors Sept. 12, 2017 Speaker Scott Thiel Director, Navigant Consulting Regulatory consulting in Life Sciences industry with focus on medical devices,
More informationSmart cities Europe. Eddy Hartog, Head of Unit Smart Mobility and Living DG CONNECT European Commission
Smart cities Europe Eddy Hartog, Head of Unit Smart Mobility and Living DG CONNECT European Commission 16 February 2017 EU and Smart Cities Cities Committee of the Regions EU Policy Research Policy making
More informationTowards a Magna Carta for Data
Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier
More informationBackground T
Background» At the 2013 ISSC, the SAE International G-48 System Safety Committee accepted an action to investigate the utility of the Safety Case approach vis-à-vis ANSI/GEIA-STD- 0010-2009.» The Safety
More informationRick Clemmer Media briefing in China. Rick Clemmer, President & CEO NXP Semiconductors March 19, 2012 Shanghai
Rick Clemmer Media briefing in China Rick Clemmer, President & CEO NXP Semiconductors March 19, 2012 Shanghai Today s agenda NXP update Share our vision Zoom in China 2 NXP Semiconductors NXP Semiconductors
More informationApplied Safety Science and Engineering Techniques (ASSET TM )
Applied Safety Science and Engineering Techniques (ASSET TM ) The Evolution of Hazard Based Safety Engineering into the Framework of a Safety Management Process Applied Safety Science and Engineering Techniques
More informationModel Based Systems Engineering
Model Based Systems Engineering SAE Aerospace Standards Summit 25 th April 2017 Copyright 2017 by INCOSE Restrictions on use of the INCOSE SE Vision 2025 are contained on slide 22 1 Agenda and timings
More informationSafety Case Construction and Reuse using Patterns. Abstract
Safety Case Construction and Reuse using Patterns T P Kelly, J A McDermid High Integrity Systems Engineering Group Department of Computer Science University of York York YO1 5DD E-mail: tpk jam@cs.york.ac.uk
More informationMetrology in the Digital Transformation
Metrology in the Digital Transformation This project proposal is about to establish a European metrology data infrastructure, a European Metrology Cloud to support the processes of conformity assessment
More informationFrontiers of big and open linked data Seminar 11 May 2016, University of Minho, Braga
Frontiers of big and open linked data Seminar 11 May 2016, University of Minho, Braga Prof.dr.ir. Marijn Janssen Delft University of Technology 1 Illustrations by Annemarie van der Linde Datification 2
More informationProtection of Privacy Policy
Protection of Privacy Policy Policy No. CIMS 006 Version No. 1.0 City Clerk's Office An Information Management Policy Subject: Protection of Privacy Policy Keywords: Information management, privacy, breach,
More informationUNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD)
UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT (CSTD) Contribution to the CSTD ten-year review of the implementation of WSIS outcomes Submitted by PAKISTAN DISCLAIMER: The views presented
More informationFSMA Update. Jennifer Thomas Interim Director for FSMA Operations Center for Food Safety and Applied Nutrition Food and Drug Administration May 2018
FSMA Update Jennifer Thomas Interim Director for FSMA Operations Center for Food Safety and Applied Nutrition Food and Drug Administration May 2018 Foundational Rules Regulation Final Rule Published Preventive
More informationIEEE Smart Cities Initiative
Forum on Shaping smarter and more sustainable cities: striving for sustainable development goals Rome, Italy, 18-19 May 2016 IEEE Smart Cities Initiative Dario Petri IEEE and University of Trento, Italy
More informationA Pattern Catalog for GDPR Compliant Data Protection
A Pattern Catalog for GDPR Compliant Data Protection Dominik Huth, 22.11.2017, PoEM Doctoral Consortium Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische
More informationThe future of software engineering
The future of software engineering Perdita Stevens School of Informatics University of Edinburgh Plan This course is designed from my perspective, of course, and you have watched or will watch my inaugural
More informationWilliam Milam Ford Motor Co
Sharing technology for a stronger America Verification Challenges in Automotive Embedded Systems William Milam Ford Motor Co Chair USCAR CPS Task Force 10/20/2011 What is USCAR? The United States Council
More informationMaking Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016
Making Identity Use Predictable UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Why Am I Here CertiPath High Assurance Identity Trust Framework Supports Aerospace and Defense
More informationIndustrial Innovation Information Days Brussels 3-4 October 2017
Industrial Innovation Information Days Brussels 3-4 October 2017 NMBP Programme Parallel Sessions OPEN INNOVATION TEST BEDS Calls 2018/2019 Helene CHRAYE, HoU Unit D3 DG Research & Innovation A joint presentation
More informationNational Medical Device Evaluation System: CDRH s Vision, Challenges, and Needs
National Medical Device Evaluation System: CDRH s Vision, Challenges, and Needs Jeff Shuren Director, CDRH Food and Drug Administration Center for Devices and Radiological Health 1 We face a critical public
More informationFOODINTEGRITY Ensuring the Integrity of the European food chain
FOODINTEGRITY Ensuring the Integrity of the European food chain 613688: Collaborative Project Seventh Framework Programme KBBE.2013.2.4 01: Assuring quality and authenticity in the food chain Publishable
More informationTaking a broader view
Taking a broader view A brief introduction to DNV GL 1 SAFER, SMARTER, GREENER We are a global classification, certification, technical assurance and advisory company 2 In a challenging world we make businesses
More informationThe new deal of data in the data-driven person centric-care
The new deal of data in the data-driven person centric-care Maritta Perälä-Heape, Professor of practice, University of Oulu, Faculty of Medicine, Center for health and technology, Oulu, Finland OuluHealth
More informationIntegrating Fundamental Values into Information Flows in Sustainability Decision-Making
Integrating Fundamental Values into Information Flows in Sustainability Decision-Making Rónán Kennedy, School of Law, National University of Ireland Galway ronan.m.kennedy@nuigalway.ie Presentation for
More informationSystems Engineering Overview. Axel Claudio Alex Gonzalez
Systems Engineering Overview Axel Claudio Alex Gonzalez Objectives Provide additional insights into Systems and into Systems Engineering Walkthrough the different phases of the product lifecycle Discuss
More informationThe IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017
The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems Overview June, 2017 @johnchavens Ethically Aligned Design A Vision for Prioritizing Human Wellbeing
More informationOutline. Outline. Assurance Cases: The Safety Case. Things I Like Safety-Critical Systems. Assurance Case Has To Be Right
Assurance Cases: New Directions & New Opportunities* John C. Knight University of Virginia February, 2008 *Funded in part by: the National Science Foundation & NASA A summary of several research topics
More informationSmart Cities as a platform
Smart Cities as a platform Shared Value Urban Solutions Jan Wester Why Benchmark if you could Benchlearn 4-12-2014 8:21 Mapping Smart Cities EU Conclusions Of cities > 100,000, 51% have two or more Smart
More informationCONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017
CONSENT IN THE TIME OF BIG DATA Richard Austin February 1, 2017 1 Agenda 1. Introduction 2. The Big Data Lifecycle 3. Privacy Protection The Existing Landscape 4. The Appropriate Response? 22 1. Introduction
More informationCompliance & Safety. Mark-Alexander Sujan Warwick CSI
Compliance & Safety Mark-Alexander Sujan Warwick CSI What s wrong with this equation? Safe Medical Device #1 + Safe Medical Device #2 = Unsafe System (J. Goldman) 30/04/08 Compliance & Safety 2 Integrated
More informationData Protection and Privacy in a M2M world. Yiannis Theodorou, Regulatory Policy Manager GSMA Latam Plenary Peru, November 2013
Data Protection and Privacy in a M2M world Yiannis Theodorou, Regulatory Policy Manager GSMA Latam Plenary Peru, November 2013 A M2M world? Machine-to-machine (M2M) is the exchange of mainly data communications
More informationNuclear Ecosystem and Safety Culture Self-Assessment at a Regulatory Body
Nuclear Ecosystem and Safety Culture Self-Assessment at a Regulatory Body May 21 to 24, IAEA, Vienna By Nasir Afghan (PhD) nafghan@iba.edu.pk Institute of Business Administration, IBA, Karachi, Pakistan
More informationThe Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert Group on Artificial Intelligence
Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF T. 0303 123 1113 F. 01625 524510 www.ico.org.uk The Information Commissioner s response to the Draft AI Ethics Guidelines of the High-Level Expert
More informationEnhancing Model-Based Engineering of Product Lines by Adding Functional Safety
Enhancing Model-Based Engineering of Product Lines by Adding Functional Safety Stephan Baumgart 1 and Joakim Fröberg 2, Sasikumar Punnekkat 2, 3 1 Dept. Change Management and Process Development, Volvo
More informationComputational Reproducibility in Medical Research:
Computational Reproducibility in Medical Research: Toward Open Code and Data Victoria Stodden School of Information Sciences University of Illinois at Urbana-Champaign R / Medicine Yale University September
More informationTowards an MDA-based development methodology 1
Towards an MDA-based development methodology 1 Anastasius Gavras 1, Mariano Belaunde 2, Luís Ferreira Pires 3, João Paulo A. Almeida 3 1 Eurescom GmbH, 2 France Télécom R&D, 3 University of Twente 1 gavras@eurescom.de,
More informationHL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR)
HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) Alexander Mense - University of Applied Sciences Vienna Bernd Blobel - Medical Faculty,
More informationHamburg, 25 March nd International Science 2.0 Conference Keynote. (does not represent an official point of view of the EC)
Open Science: Public consultation on "Science 2.0: Science in transition" Key results, insights and possible follow up J.C. Burgelman S.Luber, R. Von Schomberg, W. Lusoli European Commission DG Research
More informationTRUSTING THE MIND OF A MACHINE
TRUSTING THE MIND OF A MACHINE AUTHORS Chris DeBrusk, Partner Ege Gürdeniz, Principal Shriram Santhanam, Partner Til Schuermann, Partner INTRODUCTION If you can t explain it simply, you don t understand
More informationRoadmap Pitch: Road2CPS - Roadmapping Project Platforms4CPS Roadmap Workshop
Roadmap Pitch: Road2CPS - Roadmapping Project Platforms4CPS Roadmap Workshop Meike Reimann 23/10/2017 Paris Road2CPS in a nutshell Road2CPS: Strategic action for future CPS through roadmaps, impact multiplication
More informationICSU World Data System Strategic Plan Trusted Data Services for Global Science
ICSU World Data System Strategic Plan 2014 2018 Trusted Data Services for Global Science 2 Credits: Test tubes haydenbird; Smile, Please! KeithSzafranski; View of Taipei Skyline Halstenbach; XL satellite
More informationEnabling a Smarter World. Dr. Joao Schwarz da Silva DG INFSO European Commission
Enabling a Smarter World Dr. Joao Schwarz da Silva DG INFSO European Commission How were the successive technology revolutions unleashed? Technological Revolutions Technological Revolutions The Industrial
More informationTutorials.
Tutorials http://www.incose.org/emeasec2018 T1 Model-Based Systems Engineering (MBSE) goes digital: How digitalization and Industry 4.0 will affect systems engineering (SE) Prof. St. Rudolph (University
More informationA Knowledge-Centric Approach for Complex Systems. Chris R. Powell 1/29/2015
A Knowledge-Centric Approach for Complex Systems Chris R. Powell 1/29/2015 Dr. Chris R. Powell, MBA 31 years experience in systems, hardware, and software engineering 17 years in commercial development
More informationSMART CITY VNPT s APPROACH & EXPERIENCE. VNPT Group
SMART CITY VNPT s APPROACH & EXPERIENCE VNPT Group Thanh Hoa, 5 th July 2018 1 SmartCity AGENDA 1 Technology context for Smart City 2 VNPT s Approach for Smart City 3 VNPT s Experience in Smart City Development
More informationDATA PROTECTION IMPACT ASSESSMENT
DATA PROTECTION IMPACT ASSESSMENT Tool to support implementation of DPIA Ewa Piatkowska ewa.piatkowska@ait.ac.at Centre for Digital Safety and Security AIT Austrian Institute of Technology PRIVACY AND
More informationTowards Code of Conduct on Processing of Personal Data for Purposes of Scientific Research in the Area of Health
Towards Code of Conduct on Processing of Personal Data for Purposes of Scientific Research in the Area of Health 19/4/2017 BBMRI-ERIC WHAT HAPPENED SO FAR? 2 2015-2016 Holding a Day of Action on the draft
More informationDeviational analyses for validating regulations on real systems
REMO2V'06 813 Deviational analyses for validating regulations on real systems Fiona Polack, Thitima Srivatanakul, Tim Kelly, and John Clark Department of Computer Science, University of York, YO10 5DD,
More informationContextual Integrity through the lens of computer science
Contextual Integrity through the lens of computer science Sebastian Benthall Seda Gürses Helen Nissenbaum A presentation of S. Benthall, S. Gürses and H. Nissenbaum. Contextual Integrity through the Lens
More informationUNIT-III LIFE-CYCLE PHASES
INTRODUCTION: UNIT-III LIFE-CYCLE PHASES - If there is a well defined separation between research and development activities and production activities then the software is said to be in successful development
More informationTowards Digital Ecosystems
LABORATOIRE D INFORMATIQUE DE L UNIVERSITE DE PAU ET DES PAYS DE L ADOUR Towards Digital Ecosystems Dr. Richard Chbeir, Ph.D. in CS Richard.chbeir@univ-pau.fr TH e-gif Day 2016 http://liuppa.univ-pau.fr
More informationAPEC Internet and Digital Economy Roadmap
2017/CSOM/006 Agenda Item: 3 APEC Internet and Digital Economy Roadmap Purpose: Consideration Submitted by: AHSGIE Concluding Senior Officials Meeting Da Nang, Viet Nam 6-7 November 2017 INTRODUCTION APEC
More informationResponsible Data Use Policy Framework
1 May 2018 Sidewalk Toronto is a joint effort by Waterfront Toronto and Sidewalk Labs to create a new kind of complete community on Toronto s waterfront that combines cutting-edge technology and forward-thinking
More informationDistilling Scenarios from Patterns for Software Architecture Evaluation A Position Paper
Distilling Scenarios from Patterns for Software Architecture Evaluation A Position Paper Liming Zhu, Muhammad Ali Babar, Ross Jeffery National ICT Australia Ltd. and University of New South Wales, Australia
More informationInformation and Communication Technology
Information and Communication Technology Academic Standards Statement We've arranged a civilization in which most crucial elements profoundly depend on science and technology. Carl Sagan Members of Australian
More informationPrivacy, Technology and Economics in the 5G Environment
Privacy, Technology and Economics in the 5G Environment S A M A N T K H A J U R I A A S S I S T P R O F E S S O R, C M I K N U D E R I K S K O U B Y P R O F E S S O R, D I R E C T O R C M I S K O U B Y
More informationRFID and privacy - Some industry perspectives (ICC, EICTA)
RFID and privacy - Some industry perspectives (ICC, EICTA) Jeroen Terstegge ICC, EICTA OECD, Paris 2005-10-05 Identification Technologies: Connecting PEOPLE to Information, Entertainment and Services.
More informationThe Internet of Things: an overview
The Internet of Things: an overview "Workshop on New Frontiers in Internet of Things Telecommunications/ICT4D Laboratory (T/ICT4D) of the Abdus Salam International Centre for Theoretical Physics (ICTP)
More informationSPECIFICATIONS FOR GAMMA IMAGING SYSTEM
SPECIFICATIONS FOR GAMMA 1. Scope This Statement of Work (SOW) describes the requirements for a System or subsystems pertaining to gamma imaging. The IAEA is considering acquiring gamma imaging systems
More informationGDPR & Teknologiske Trends
GDPR & Teknologiske Trends Are we guiding from the Front??!!!??? Hans Peter Dueholm, Nordic CTO, IBM Distinguished Engineer +45 2880 4269 Hans Peter Dueholm Nordic CTO, IBM Distinguished Engineer Cand.scient.oecon.
More informationTuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers
Tuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers an important and novel tool for understanding, defining
More informationFood Product Standards to Support Exports
Food Product Standards to Support Exports March 14, 2018 Lusaka, Zambia Presentation Overview GMA Background Core Regulatory Principles to Support Food/Ag Exports Science-Based Standards Regulatory Coherence
More informationHorizon 2020 ICT Robotics Work Programme (draft - Publication: 20 October 2015)
NCP TRAINING BRUSSELS 07 OCTOBER 2015 1 Horizon 2020 ICT Robotics Work Programme 2016 2017 (draft - Publication: 20 October 2015) Cécile Huet Deputy Head of Unit Robotics Directorate General for Communication
More informationclarification to bring legal certainty to these issues have been voiced in various position papers and statements.
ESR Statement on the European Commission s proposal for a Regulation on the protection of individuals with regard to the processing of personal data on the free movement of such data (General Data Protection
More informationCity Protocol. Empowering and Improving Cities Through Collaboration
City Protocol Empowering and Improving Cities Through Collaboration Meet the Presenter Jim Aloisi City Protocol Editor CPTF Steering Committee jaloisi@cityprotocol.org 2 WHAT IS CITY PROTOCOL SOCIETY?
More informationSmart City Indicators
Smart City Indicators meanings of indicators in a place based understanding Rudolf Giffinger TU Wien Centre of Regional Science - SRF EERA JP Smart Cities Symposium on Key Performance Indicators for Smart
More informationCBD Request to WIPO on the Interrelation of Access to Genetic Resources and Disclosure Requirements
CBD Request to WIPO on the Interrelation of Access to Genetic Resources and Disclosure Requirements Establishing an adequate framework for a WIPO Response 1 Table of Contents I. Introduction... 1 II. Supporting
More informationComments from CEN CENELEC on COM(2010) 245 of 19 May 2010 on "A Digital Agenda for Europe"
Comments from CEN CENELEC on COM(2010) 245 of 19 May 2010 on "A Digital Agenda for Europe" Agreed by CEN and CENELEC Members following a written consultation process 1 European standardization to support
More information