Cyberspace Governance:
|
|
- Osborne Conley
- 6 years ago
- Views:
Transcription
1 Cyberspace Governance: security, surveillance and privacy: metadata Virgilio Almeida Harvard University Cambridge, October 2016
2 References YA De Montjoye, CA Hidalgo, M Verleysen, VD Blondel, Unique in the crowd: The privacy bounds of human mobility Nature ScienMfic Reports, March YA De Montjoye, L Radaelli, VK Singh, Unique in the shopping mall: On the re- idenmfiability of credit card metadata, Science Vol. 347, Issue 6221, Hal Abelson et al., Keys under Doormats: MandaMng insecurity by requiring government access to all data and communicamons, Journal of Cybersecurity, Vol. 1(1) (2015). Virgilio Almeida, Doneda, Danilo and Marilia Monteiro, Governance Challenges for the Internet of Things, IEEE Internet CompuMng, vol. 19, no. 4, 2015
3 Course Outline The central goal of the course is to present students a combinamon of knowledge from mulmple disciplines in order to allow them to carry out evidence- based analysis of problems and issues related to cyberspace governance. Weeks : Cyberspace and Internet Governance Concepts a. The development of Internet, the main principles governing Internet b. The Regime Complex for Managing Global Cyber AcMviMes c. The Convergence of Social and Technological Networks d. Internet governance concepts and models e. ICANN and management of domain names f. IANA and management of IP addresses, the case of IPv6
4 Examples of the data-oriented approach Science and Nature armcles Privacy in the Crowd: the privacy bounds of human mobility Privacy in the Shopping Mall: on the reindenmfiability of credit card metadata Propose Changes to Policies Policy Issue: PRIVACY Collect Data: Mobility & Financial Analyze QuanHtaHve Results Create Empirical Data Models for Re- idenhficahon
5 Data can shed light on some key problems in cyberspace governance QuanMtaMve Research to Analyze Public and Private Policies for Cyberspace Development of Regulatory Models Interdisciplinary Studies Empirical Models AnalyMcal Models DATA
6 YA de Montjoye, L Radaelli, VK Singh, AS Pentland Science 347 (6221), UNIQUE IN THE SHOPPING MALL
7 Characteristics of the work It uses 3 months of credit card records for 1.1 million people It shows that four spamotemporal points are enough to uniquely re- idenmfy 90% of individuals. It shows that knowing the price of a transacmon increases the risk of reidenmficamon by 22%, on average. In science, it is essenmal for the data to be available and shareable. Sharing data allows scienmsts to build on previous work, replicate re- sults, or propose alternamve hypotheses and models. These metadata are generated by our use of technology and, hence, may reveal a lot about an individual. Making these data sets broadly available, therefore, requires solid quanmtamve guarantees on the risk of reidenmficamon, à privacy risks
8 Characteristics of the work: metrics Unicity quanmfies the intrinsic re- idenmficamon risk of a data set. Unicity quanmfies how much outside informamon one would need, on average, to re- idenmfy a specific and known user in a simply anonymized data set. The higher a data set s unicity is, the more reidenmfiable it is. Outside informamon could be a tweet that posimons a user at an approximate Mme for a mobility data set or a publicly available movie review for the Nehlix data set. A recent survey shows that financial and credit card data sets are considered the most sensimve personal data worldwide
9 Data Set To provide a quanmtamve assessment of the likelihood of idenmficamon from financial data, we used a data set D of 3 months of credit card transacmons for 1.1 million users in 10,000 shops The data set was simply anonymized, which means that it did not contain any names, account numbers, or obvious idenmfiers.
10 Results The risk of re- idenmficamon of D is quanmfied by unicity ε. Unicity is the risk of re- idenmficamon knowing p pieces of outside informamon about a user. It evaluates ε(p) of D as the percentage of its users who are re- idenmfied with p randomly selected points from their financial trace. Example: Suppose you are searching for Sco1 in a simply anonymized credit card data set. You know two points about Sco1: he went to the bakery on 23 September and to the restaurant on 24 September. Searching through the data set reveals that there is one and only one person in the enare data set who went to these two places on these two days. S(I p ) is thus equal to 1, Sco1 is re- idenafied, and you now know all of his other transacaons, such as the fact that he went shopping for shoes and groceries on 23 September, and how much he spent. Financial traces contain one addimonal column that can be used to reidenmfy an individual: the price of a transacmon. A piece of outside informamon, a spamotemporal tuple can become a triple: space, Mme, and the approximate price of the transacmon.
11 Results: metrics and plots
12 Results: metrics and plots
13 Unique in the Crowd
14 Science versus Art: in the context of cyberspace governance Science Principles Fundamental laws ExplanaMon Discovery Analysis DissecMon Art PracMce Skilled performance AcMon InvenMon Synthesis construcmon To understand informamon processes, computer scienmsts must observe phenomena, formulate explanamons, and test them. This is the scienmfic method Art refers to useful practices of a field. (*)Walter Tichy, Should Computer Scientists Experiment More?
15 Comments on the methods SCIENCE OBJECTS DOMINATING METHOD Logic & Mathematics Simple Abstract objects: propositions, numbers, Reductionism (analysis) Deduction Internet cyberspace Natural Sciences Social Sciences Humanities Natural objects: physical bodies, fields and interactions, living organisms Social objects: human individuals, groups, society, Cultural objects : human ideas, actions and relationships, language, artifacts Hypothetico-deductive method Hypothetico-deductive method + Hermeneutics Hermeneutics, Theory & methodology of interpretation (*)Gordana DODIG- CRNLOVIC ScienMfic Methods in Computer Science
16 Comments on the methods An example of a research quesmon: What privacy means in the digital age where everything is recorded and we leave permanent traces of our idenaty everywhere, whether we like it or not. So what is the relaaon between metadata and privacy? (*)Gordana DODIG- CRNLOVIC ScienMfic Methods in Computer Science
17 The Scientific Method Research question? ExisMng Knowledge 1 Theory SelecMon 6 Hypothesis must be adjusted Hypothesis 2 Hypothesis must be adjusted Old or New Theory confirmed 5 PredicMon 3 Tests & ObservaMon 4
18 Examples of the data-oriented approach Privacy in the Crowd: the privacy bounds of human mobility Privacy in the Shopping Mall: on the reindenmfiability of credit card metada Policy Issue: PRIVACY Propose Changes to Policies Collect Data: Mobility & Financial Analyze QuanHtaHve Results Create Empirical Data Models for Re- idenhficahon
19 Next Class 1. One or two paragraphs describing areas of interest (i.e., potenmal problems or topics) for the course project. I will review the proposals and suggest references. 2. Chapters 5 of DeNardis Book 3. Anne Edmundson, Roya ENsafi, Nick Feamster, Jennifer Rexford,Characterizing and Avoiding RouMng Detours Through Surveillance States, May Hal Abelson et al., Keys under Doormats: MandaMng insecurity by requiring government access to all data and communicamons, Journal of Cybersecurity, Vol. 1(1) (2015).
20 THANKS!
Cybersecurity Governance
Cybersecurity Governance Virgilio Almeida Harvard University Cambridge, September 2016 Discussion papers Elaine Mcardlle, The New Age of Surveillance, Harvard Law Today hgp://today.law.harvard.edu/feature/new-
More informationOSHA & Arc Flash. Scott Ray Distribution Project Engineer POWER Engineers, Inc.
OSHA & Arc Flash Scott Ray Distribution Project Engineer POWER Engineers, Inc. Outline Arc Flash Overview OSHA Overview Arc Flash Study Next Steps Why This Method? Questions Methodology Steps Analysis
More informationsdi ontology and implications for research in the developing world
sdi ontology and implications for research in the developing world yola georgiadou beyond sdi september 20, 2006 INTERNATIONAL INSTITUTE FOR GEO-INFORMATION SCIENCE AND EARTH OBSERVATION Structure Cycle
More informationFall Can Baykan. Arch467 Design Methods
Arch 467 Design Methods 2019 Can Baykan 1 What is design? This is the first question of design theory,design methods, philosophy of design, etc. Types of problems design, diagnosis, classification Types
More informationResearch Methodologies for Management Sciences & Interdisciplinary Research in Contemporary World
MPRA Munich Personal RePEc Archive Research Methodologies for Management Sciences & Interdisciplinary Research in Contemporary World Syed Akif Hasan and Muhammad Imtiaz Subhani and Ms. Amber Osman Iqra
More informationEconomic Clusters Efficiency Mathematical Evaluation
European Journal of Scientific Research ISSN 1450-216X / 1450-202X Vol. 112 No 2 October, 2013, pp.277-281 http://www.europeanjournalofscientificresearch.com Economic Clusters Efficiency Mathematical Evaluation
More informationOn the Internet, No One Knows You re A Researcher
On the Internet, No One Knows You re A Researcher Elizabeth Buchanan, Ph.D. Center for Information Policy Research School of Information Studies University of Wisconsin-Milwaukee Thanks to the National
More informationTowards a Software Engineering Research Framework: Extending Design Science Research
Towards a Software Engineering Research Framework: Extending Design Science Research Murat Pasa Uysal 1 1Department of Management Information Systems, Ufuk University, Ankara, Turkey ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationThe Nature of Science in The Next Generation Science Standards
The Nature of Science in The Next Generation Science Standards Scientists and science teachers agree that science is a way of explaining the natural world. In common parlance, science is both a set of
More informationGraph simple non-linear relations with and without the use of digital technologies and solve simple related equations.
ACMNA296 7 8 9 10 11 12 TI-Nspire Investigation Student 50 min Objective Graph simple non-linear relations with and without the use of digital technologies and solve simple related equations. Introduction
More informationCommon Core Structure Final Recommendation to the Chancellor City University of New York Pathways Task Force December 1, 2011
Common Core Structure Final Recommendation to the Chancellor City University of New York Pathways Task Force December 1, 2011 Preamble General education at the City University of New York (CUNY) should
More informationDo Populations Conform to the Law of Anomalous Numbers?
Do Populations Conform to the Law of Anomalous Numbers? Frédéric SANDRON* The first significant digit of a number is its leftmost non-zero digit. For example, the first significant digit of the number
More informationOn the Monty Hall Dilemma and Some Related Variations
Communications in Mathematics and Applications Vol. 7, No. 2, pp. 151 157, 2016 ISSN 0975-8607 (online); 0976-5905 (print) Published by RGN Publications http://www.rgnpublications.com On the Monty Hall
More informationCOMPLEXITY MEASURES OF DESIGN DRAWINGS AND THEIR APPLICATIONS
The Ninth International Conference on Computing in Civil and Building Engineering April 3-5, 2002, Taipei, Taiwan COMPLEXITY MEASURES OF DESIGN DRAWINGS AND THEIR APPLICATIONS J. S. Gero and V. Kazakov
More informationAnalogies Between Science and Design: What Models of Science Can Learn from Models of Engineering Design? Christian Schunn University of Pittsburgh
Analogies Between Science and Design: What Models of Science Can Learn from Models of Engineering Design? Christian Schunn University of Pittsburgh What I won t talk about Psychology of Science Complex
More informationSELFRIDGE AIR TRAFFIC CONTROL Mark Winsor, Air Traffic Manager, Steven Oliver, RAPCON Chief Controller,
SELFRIDGE AIR TRAFFIC CONTROL Mark Winsor, Air Traffic Manager, 239-5190 Steven Oliver, RAPCON Chief Controller, 239-4517 APPROACH CONTROL AIRSPACE Click Click Click MTC NOT TO SCALE MTC
More informationArtificial Intelligence: Your Phone Is Smart, but Can It Think?
Artificial Intelligence: Your Phone Is Smart, but Can It Think? Mark Maloof Department of Computer Science Georgetown University Washington, DC 20057-1232 http://www.cs.georgetown.edu/~maloof Prelude 18
More informationRevised East Carolina University General Education Program
Faculty Senate Resolution #17-45 Approved by the Faculty Senate: April 18, 2017 Approved by the Chancellor: May 22, 2017 Revised East Carolina University General Education Program Replace the current policy,
More informationThoughts on Reimagining The University. Rajiv Ramnath. Program Director, Software Cluster, NSF/OAC. Version: 03/09/17 00:15
Thoughts on Reimagining The University Rajiv Ramnath Program Director, Software Cluster, NSF/OAC rramnath@nsf.gov Version: 03/09/17 00:15 Workshop Focus The research world has changed - how The university
More informationDRAFT 2016 CSTA K-12 CS
2016 CSTA K-12 CS Standards: Level 1 (Grades K-5) K-2 Locate and identify (using accurate terminology) computing, input, and output devices in a variety of environments (e.g., desktop and laptop computers,
More informationAdvanced Cyberinfrastructure for Science, Engineering, and Public Policy 1
Advanced Cyberinfrastructure for Science, Engineering, and Public Policy 1 Vasant G. Honavar, Katherine Yelick, Klara Nahrstedt, Holly Rushmeier, Jennifer Rexford, Mark D. Hill, Elizabeth Bradley, and
More informationTutorial: Metaphysics of Business Technology Research
Tutorial: Metaphysics of Business Technology Research Workshop on Social Aspects in Business Intelligence and Technology (SABIT), 24 March, 2015, Nice, France Janne J. Korhonen, Aalto University, Finland
More informationAwareness and Understanding in Computer Programs A Review of Shadows of the Mind by Roger Penrose
Awareness and Understanding in Computer Programs A Review of Shadows of the Mind by Roger Penrose John McCarthy Computer Science Department Stanford University Stanford, CA 94305. jmc@sail.stanford.edu
More informationOpen Science for the 21 st century. A declaration of ALL European Academies
connecting excellence Open Science for the 21 st century A declaration of ALL European Academies presented at a special session with Mme Neelie Kroes, Vice-President of the European Commission, and Commissioner
More informationResearch & Development (R&D) defined (3 phase process)
Research & Development (R&D) defined (3 phase process) Contents Research & Development (R&D) defined (3 phase process)... 1 History of the international definition... 1 Three forms of research... 2 Phase
More informationChapter 2 Scientific Method
Chapter 2 Scientific Method Day Activity Homework 1 Notes I,II Cost/Benefit Case* Article Analysis 2 Notes III, IV Metric System WS/ Oil Spill Experiment* Graphing* 3 Notes V Satellite Imaging Activity*
More informationFortunately, there are many good answers to this question!
The Many Reasons we Teach Science and What Everyone Should Know about How it Works ESTABLISH and SMEC 2012 Dublin City University 7-9 June, 2012 William F. McComas Parks Family Professor of Science Education
More informationINTERACTIVE DYNAMIC PRODUCTION BY GENETIC ALGORITHMS
INTERACTIVE DYNAMIC PRODUCTION BY GENETIC ALGORITHMS M.Baioletti, A.Milani, V.Poggioni and S.Suriani Mathematics and Computer Science Department University of Perugia Via Vanvitelli 1, 06123 Perugia, Italy
More informationEmployment for All! Spectrum AGM Conrad Tyrkin October 2014
Employment for All! Spectrum AGM Conrad Tyrkin October 2014 Thanks for having me! Today I want to talk about: - Who I am - Why we are talking about jobs - What we are doing about ge:ng jobs for everyone
More informationComputer & Information Science & Engineering (CISE)
Computer & Information Science & Engineering (CISE) Wendy J. Nilsen, PhD Computer and Information Science and Engineering http://www.nsf.gov/cise Advanced Cyberinfrastructure Computing & Communication
More informationMaster of Comm. Systems Engineering (Structure C)
ENGINEERING Master of Comm. DURATION 1.5 YEARS 3 YEARS (Full time) 2.5 YEARS 4 YEARS (Part time) P R O G R A M I N F O Master of Communication System Engineering is a quarter research program where candidates
More informationCreating Scientific Concepts
Creating Scientific Concepts Nancy J. Nersessian A Bradford Book The MIT Press Cambridge, Massachusetts London, England 2008 Massachusetts Institute of Technology All rights reserved. No part of this book
More informationCONTENTS FOREWORD... VII ACKNOWLEDGMENTS... IX CONTENTS... XI LIST OF FIGURES... XVII LIST OF TABLES... XIX LIST OF ABBREVIATIONS...
CONTENTS FOREWORD... VII ACKNOWLEDGMENTS... IX CONTENTS... XI LIST OF FIGURES... XVII LIST OF TABLES... XIX LIST OF ABBREVIATIONS... XXI 1 INTRODUCTION... 1 1.1 Problem Definition... 1 1.2 Research Gap
More informationIntroduction to Computer Science - PLTW #9340
Introduction to Computer Science - PLTW #9340 Description Designed to be the first computer science course for students who have never programmed before, Introduction to Computer Science (ICS) is an optional
More informationHow NFPA 921 can serve as your guide when scaling the subrogation mountain
How NFPA 921 can serve as your guide when scaling the subrogation mountain 1 A subrogation case is never an easy mountain to climb. The climb is difficult under the best of circumstances. The terrain is
More informationFACULTY SENATE ACTION TRANSMITTAL FORM TO THE CHANCELLOR
- DATE: TO: CHANCELLOR'S OFFICE FACULTY SENATE ACTION TRANSMITTAL FORM TO THE CHANCELLOR JUN 03 2011 June 3, 2011 Chancellor Sorensen FROM: Ned Weckmueller, Faculty Senate Chair UNIVERSITY OF WISCONSIN
More informationOffice of Science and Technology Policy th Street Washington, DC 20502
About IFT For more than 70 years, IFT has existed to advance the science of food. Our scientific society more than 17,000 members from more than 100 countries brings together food scientists and technologists
More informationA Modified Perspective of Decision Support in C 2
SAND2005-2938C A Modified Perspective of Decision Support in C 2 June 14, 2005 Michael Senglaub, PhD Dave Harris Sandia National Labs Sandia is a multiprogram laboratory operated by Sandia Corporation,
More informationOutline of Presentation
Understanding Information Seeking Behaviors and User Experience: How to Apply Research Methodologies to Information Technology Management and New Product Design By Denis M. S. Lee Professor of Computer
More informationChapter 1: About Science
Lecture Outline Chapter 1: About Science This lecture will help you understand: What Science Is Scientific Measurements Mathematics The Language of Science Scientific Methods Science, Art, and Religion
More information2. CYBERSPACE Relevance to Sustainability? Critical Features Knowledge Aggregation and Facilitation Revolution Four Cases in the Middle East**
` 17.181/17.182 SUSTAINABLE DEVELOPMENT Week 4 Outline Cyberspace and Sustainability 1. ISSUES left over from WEEK 3 Brief Review Some Empirical Views 2. CYBERSPACE Relevance to Sustainability? Critical
More informationConnectivity in Social Networks
Sieteng Soh 1, Gongqi Lin 1, Subhash Kak 2 1 Curtin University, Perth, Australia 2 Oklahoma State University, Stillwater, USA Abstract The value of a social network is generally determined by its size
More informationThe Beauty and Joy of Computing
The Beauty and Joy of Computing UC Berkeley EECS Sr Lecturer SOE Dan Lecture #13 Social Implications of Computing III This meeting of privacy experts just finished, and the key questions that emerge: Will
More informationJonDonym Users Information Privacy Concerns
JonDonym Users Information Privacy Concerns David Harborth and Sebastian Pape Chair of Mobile Business & Multilateral Security Goethe University Frankfurt am Main September 18th 2018 IFIP SEC 2018 Poznan
More informationMicro-synchrophasors for distribution systems: implications for grid reliability and resilience
Micro-synchrophasors for distribution systems: implications for grid reliability and resilience i-pcgrid March 31, 2017 Dr. Alexandra (Sascha) von Meier Director, Electric Grid Research, California Institute
More information_ To: The Office of the Controller General of Patents, Designs & Trade Marks Bhoudhik Sampada Bhavan, Antop Hill, S. M. Road, Mumbai
Philips Intellectual Property & Standards M Far, Manyata Tech Park, Manyata Nagar, Nagavara, Hebbal, Bangalore 560 045 Subject: Comments on draft guidelines for computer related inventions Date: 2013-07-26
More informationIntroduction to VLSI ASIC Design and Technology
Introduction to VLSI ASIC Design and Technology Paulo Moreira CERN - Geneva, Switzerland Paulo Moreira Introduction 1 Outline Introduction Is there a limit? Transistors CMOS building blocks Parasitics
More informationInnovation and Technology Law Curriculum
Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government
More informationMAT 1272 STATISTICS LESSON STATISTICS AND TYPES OF STATISTICS
MAT 1272 STATISTICS LESSON 1 1.1 STATISTICS AND TYPES OF STATISTICS WHAT IS STATISTICS? STATISTICS STATISTICS IS THE SCIENCE OF COLLECTING, ANALYZING, PRESENTING, AND INTERPRETING DATA, AS WELL AS OF MAKING
More informationIndiana K-12 Computer Science Standards
Indiana K-12 Computer Science Standards What is Computer Science? Computer science is the study of computers and algorithmic processes, including their principles, their hardware and software designs,
More informationIf These Crawls Could Talk: Studying and Documenting Web Archives Provenance
If These Crawls Could Talk: Studying and Documenting Web Archives Provenance Emily Maemura, PhD Candidate Faculty of Information, University of Toronto NetLab Forum February 27, 2018 The Team Nich Worby
More informationTechniques for Generating Sudoku Instances
Chapter Techniques for Generating Sudoku Instances Overview Sudoku puzzles become worldwide popular among many players in different intellectual levels. In this chapter, we are going to discuss different
More informationPaid Surveys Secret. The Most Guarded Secret Top Survey Takers Cash In and Will Never Tell You! Top Secret Report. Published by Surveys & Friends
Paid Surveys Secret The Most Guarded Secret Top Survey Takers Cash In and Will Never Tell You! Top Secret Report Published by Surveys & Friends http://www.surveysandfriends.com All Rights Reserved This
More informationInformation Sociology
Information Sociology Educational Objectives: 1. To nurture qualified experts in the information society; 2. To widen a sociological global perspective;. To foster community leaders based on Christianity.
More informationHuman-Computer Interaction Research: a Paradigm Clash?
Human-Computer Interaction Research: a Paradigm Clash? G. W. MATTHIAS RAUTERBERG TECHNICAL UNIVERSITY EINDHOVEN FACULTY INDUSTRIAL DESIGN USER-CENTERED ENGINEERING GROUP (UCE) DEN DOLECH 2, 5600 MB EINDHOVEN,
More informationAll that begins... peace be upon you
All that begins... peace be upon you Faculty of Mechanical Engineering Department of Thermo Fluids Mechanical Engineering «an etymology» Abu Hasan ABDULLAH September 2017 Outline 1 Science & Engineering
More informationTake Control of Sudoku
Take Control of Sudoku Simon Sunatori, P.Eng./ing., M.Eng. (Engineering Physics), F.N.A., SM IEEE, LM WFS MagneScribe : A 3-in-1 Auto-Retractable Pen
More informationThe Beauty and Joy of Computing
The Beauty and Joy of Computing Data UC Berkeley EECS Sr Lecturer SOE Dan Bendable Displays!!! http://abcnews.go.com/technology/lgsflexible-screens-rolling-off-factory-lines/ story?id=20498107! Data and
More informationAna Vang. LS00376_001 South Burlington- 1961
The Hydrologic Impacts of the Vermont Interstate Highway System Ana Vang LS00376_001 South Burlington- 1961 Outline Project Goals Interstate History Vermont Interstate Build- out and Impervious Surface
More informationJournal of Unconventional Oil and Gas Resources
Journal of Unconventional Oil and Gas Resources 15 (2016) 146 157 Contents lists available at ScienceDirect Journal of Unconventional Oil and Gas Resources journal homepage: www.elsevier.com/locate/juogr
More informationWhat does the EUR-ACE Bachelor and Master label stay for?
What does the EUR-ACE Bachelor and Master label stay for? ENAEE Conference Leuven, Sept. 2013 Dr.-Ing. Martin Molzahn ASIIN Accreditation Commission for Degree Programmes EUR-ACE label: increasing demand
More informationNine Weeks: First Curriculum Map Instructor: Abbie Merryman Class: Photography & Digital Image Grade: 9-12 Shadyside Local Schools Building:
Weeks: First Curriculum Map Instructor: Abbie Merryman Class: Photography & Digital Image Grade: 9-12 Shadyside Local Schools Building: Shadyside High Schoool Weeks Cognitive & Creative Learning Processes
More informationComparative Study of various Surveys on Sentiment Analysis
Comparative Study of various Surveys on Milanjit Kaur 1, Deepak Kumar 2. 1 Student (M.Tech Scholar), Computer Science and Engineering, Lovely Professional University, Punjab, India. 2 Assistant Professor,
More informationStatistical Thinking & Methodology: Pillars of Data Availability & Quality in the Big Data Era
Statistical Thinking & Methodology: Pillars of Data Availability & Quality in the Big Data Era Pedro Luis do Nascimento Silva Principal Researcher, ENCE Contents Context Data quality Quality frameworks
More informationComputational Sciences and Engineering (CSE): A New Paradigm in Scientific Research & Education. Abul K. M. Fahimuddin
Computational Sciences and Engineering (CSE): A New Paradigm in Scientific Research & Education Abul K. M. Fahimuddin Scientific Research Staff Germany Motivation: Chemical Dispersion in Urban Areas Motivation:
More informationScience of Computers: Epistemological Premises
Science of Computers: Epistemological Premises Autonomous Systems Sistemi Autonomi Andrea Omicini andrea.omicini@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università
More information* * GEOGRAPHY 0460/04
Cambridge IGCSE *0123456789* GEOGAPHY 0460/04 Paper 4 Alternative to Coursework r examination from 2020 SPECIME PAPE You must answer on the question paper. You will need: Insert (enclosed) uler Calculator
More informationElements of Scholarly Discourse in a Digital World
Elements of Scholarly Discourse in a Digital World Victoria Stodden Graduate School of Library and Information Science University of Illinois at Urbana-Champaign Center for Informatics Research in Science
More informationUse of ICT Technologies and its Dependency Level among P.G. Students and Faculty Members of G.B. Pant University of Agriculture and Technology
Use of ICT Technologies and its Dependency Level among P.G. Students and Faculty Members of G.B. Pant University of Agriculture and Technology P. Mahesh Chandra Belwal 1 and M.Sadik Batcha 2 1 Research
More informationThe Importance of Scientific Reproducibility in Evidence-based Rulemaking
The Importance of Scientific Reproducibility in Evidence-based Rulemaking Victoria Stodden School of Information Sciences University of Illinois at Urbana-Champaign Social and Decision Analytics Laboratory
More informationUSER RESEARCH: THE CHALLENGES OF DESIGNING FOR PEOPLE DALIA EL-SHIMY UX RESEARCH LEAD, SHOPIFY
USER RESEARCH: THE CHALLENGES OF DESIGNING FOR PEOPLE DALIA EL-SHIMY UX RESEARCH LEAD, SHOPIFY 1 USER-CENTERED DESIGN 2 3 USER RESEARCH IS A CRITICAL COMPONENT OF USER-CENTERED DESIGN 4 A brief historical
More information2 Smart Cities. Big Data, Real Time Transport, Social Media, and Urban Simulation Michael
5 th February 2014 2 Smart Cities Big Data, Real Time Transport, Social Media, and Urban Simulation Michael Batty m.batty@ucl.ac.uk @jmichaelbatty http://www.complexcity.info/ http://www.casa.ucl.ac.uk/
More informationEfficiency and detectability of random reactive jamming in wireless networks
Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering
More informationCourse Topics. COS 109: Computers in our World. Today: Administration. House rules. A bit of numeracy. Administrivia.
COS 109: Computers in our World Andrea LaPaugh aslp@cs.princeton.edu www.cs.princeton.edu/~aslp 304 Computer Science Building, 258-4568 (email is always better) TAs: Jacopo Cesareo, 103B CS Building, jcesareo@...,
More informationBig data for the analysis of digital economy & society Beyond bibliometrics
0 Big data for the analysis of digital economy & society Beyond bibliometrics Stephane Berghmans, DVM PhD VP Academic & Research Relations EU, Elsevier With support from Judith Kamalski (Analytical Services)
More informationInternet of Things. (Ref: Slideshare)
Internet of Things (Ref: Slideshare) Contents Introduction/Overview The Internet of Things Applications of IoT Challenges and Barriers in IoT Future of IoT Internet Revolution Impact of the Internet Education
More informationResearch Statement. Imani Palmer
Research Statement Imani Palmer I have a profound passion for security and privacy research. My key research focuses on science of security, applied hacking, and security education. My current research
More informationComputational Reproducibility in Medical Research:
Computational Reproducibility in Medical Research: Toward Open Code and Data Victoria Stodden School of Information Sciences University of Illinois at Urbana-Champaign R / Medicine Yale University September
More informationcode V(n,k) := words module
Basic Theory Distance Suppose that you knew that an English word was transmitted and you had received the word SHIP. If you suspected that some errors had occurred in transmission, it would be impossible
More informationPOLICY RESEARCH, ACTION RESEARCH, AND INTERPRETIVE RESEARCH IN INFORMATION SYSTEMS AREAS
Faculty of Computer Science - University of Indonesia POLICY RESEARCH, ACTION RESEARCH, AND INTERPRETIVE RESEARCH IN INFORMATION SYSTEMS AREAS RESEARCH METHODOLOGY CLASS Lecturer : RIRI SATRIA Date : October
More informationThe Need for Hypotheses in Informatics
The Need for Hypotheses in Informatics Alan Bundy University of Edinburgh 9-Oct-10 1 The Significance of Research 9-Oct-10 2 Importance of Hypotheses Science and engineering proceed by the formulation
More informationThanks, and Apologies What This Lecture will be About
5 October 2013 Prix Vautrin Lud Smart Cities, Virtual Realities & Big Data in the Global Age Michael Batty m.batty@ucl.ac.uk @jmichaelbatty http://www.complexcity.info/ http://www.spatialcomplexity.info/
More information1 Name of Course Module: History and Philosophy of Science-2. 2 Course Code: 3 Name(s) of academic staff: Prof. C. K. Raju
1 Name of Course Module: History and Philosophy of Science-2 2 Course Code: 3 Name(s) of academic staff: Prof. C. K. Raju 4 Rationale for the inclusion of the course/module in the programme: 1. Part 1
More informationLearning Goals and Related Course Outcomes Applied To 14 Core Requirements
Learning Goals and Related Course Outcomes Applied To 14 Core Requirements Fundamentals (Normally to be taken during the first year of college study) 1. Towson Seminar (3 credit hours) Applicable Learning
More informationLevel Below Basic Basic Proficient Advanced. Policy PLDs. Cognitive Complexity
Level Below Basic Basic Proficient Advanced Policy PLDs (Performance Level Descriptors) General descriptors that provide overall claims about a student's performance in each performance level; used to
More informationModelling Critical Context in Software Engineering Experience Repository: A Conceptual Schema
Modelling Critical Context in Software Engineering Experience Repository: A Conceptual Schema Neeraj Sharma Associate Professor Department of Computer Science Punjabi University, Patiala (India) ABSTRACT
More informationRiel Miller, UNESCO, Riel Miller Head of Foresight
Riel Miller Head of Foresight The Emergent Present: Repetition & Difference In an emergent present the only constant is change the change of that which repeats and that which is different. The future only
More informationCONCURRENT AND RETROSPECTIVE PROTOCOLS AND COMPUTER-AIDED ARCHITECTURAL DESIGN
CONCURRENT AND RETROSPECTIVE PROTOCOLS AND COMPUTER-AIDED ARCHITECTURAL DESIGN JOHN S. GERO AND HSIEN-HUI TANG Key Centre of Design Computing and Cognition Department of Architectural and Design Science
More informationBecause what is Known must be Shared
Because what is Known must be Shared Academic Experience as Intellectual Property Dr Evangelia Lipitakis Solutions Consultant Clarivate Analytics Evangelia.lipitakis@clarivate.com Father of Citation Indexing
More informationTrusted Data Intermediaries
Workshop Summary Trusted Data Intermediaries Civil society organizations increasingly use a combination of money, time and digital data for public good. The question facing these organizations is how to
More informationHarmonic Distortion Levels Measured at The Enmax Substations
Harmonic Distortion Levels Measured at The Enmax Substations This report documents the findings on the harmonic voltage and current levels at ENMAX Power Corporation (EPC) substations. ENMAX is concerned
More informationSlide 15 The "social contract" implicit in the patent system
Slide 15 The "social contract" implicit in the patent system Patents are sometimes considered as a contract between the inventor and society. The inventor is interested in benefiting (personally) from
More informationDesign thinking, process and creative techniques
Design thinking, process and creative techniques irene mavrommati manifesto for growth bruce mau Allow events to change you. Forget about good. Process is more important than outcome. Don t be cool Cool
More informationTransforming a Digital Generation: How the Economic and Legal Implications of Blockchain Will Reshape Society
Transforming a Digital Generation: How the Economic and Legal Implications of Blockchain Will Reshape Society State of the Art Agenda Technological Potential & Legal Implications Looking Ahead: Key Policy
More informationUnit 11 Probability. Round 1 Round 2 Round 3 Round 4
Study Notes 11.1 Intro to Probability Unit 11 Probability Many events can t be predicted with total certainty. The best thing we can do is say how likely they are to happen, using the idea of probability.
More informationINTRODUCTION TO CULTURAL ANTHROPOLOGY
Suggested Course Options Pitt Greensburg- Dual Enrollment in Fall 2018 (University Preview Program) For the complete Schedule of Classes, visit www.greensburg.pitt.edu/academics/class-schedules ANTH 0582
More informationOverview of the Research Process Comments by Dan A. Simunic, UBC
Overview of the Research Process Comments by Dan A. Simunic, UBC Craft of Accounting Research Workshop June 2016 Planning a Research Project Idea Research Question(s) What has already been done? Literature
More informationINVESTIGATING BINAURAL LOCALISATION ABILITIES FOR PROPOSING A STANDARDISED TESTING ENVIRONMENT FOR BINAURAL SYSTEMS
20-21 September 2018, BULGARIA 1 Proceedings of the International Conference on Information Technologies (InfoTech-2018) 20-21 September 2018, Bulgaria INVESTIGATING BINAURAL LOCALISATION ABILITIES FOR
More informationIAEA Training in level 1 PSA and PSA applications. PSA Project. IAEA Guidelines for PSA
IAEA Training in level 1 PSA and PSA applications PSA Project IAEA Guidelines for PSA Introduction The following slides present the IAEA documents that deal with procedures, guidance and good practices
More informationHL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR)
HL7 Standards and Components to Support Implementation of the European General Data Protection Regulation (GDPR) Alexander Mense - University of Applied Sciences Vienna Bernd Blobel - Medical Faculty,
More information