International Journal of Advance Engineering and Research Development. Privacy Decision for controlling Photo Sharing on Online Social Network

Size: px
Start display at page:

Download "International Journal of Advance Engineering and Research Development. Privacy Decision for controlling Photo Sharing on Online Social Network"

Transcription

1 Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May-2017 Privacy Decision for controlling Photo Sharing on Online Social Network Kapil Pardeshi 1, Dhiraj Patil 2, Raju Naikare 3, Ninad Chhatre 4 Prof. Deepak Gupta 5 1,2,3,4,5 Computer Engineering, Siddhant College of Engineering, Pune e-issn (O): p-issn (P): Abstract Photo sharing is a charming component which progresses Online Social Networks (OSNs). Unfortunately, it might release users security if they are allowed to post, comment, and mark a photo openly. In this paper, we try to address this issue and study the situations when a user shares a photo containing individuals other than him/her. To anticipate possible security spillage of a photo, we designed a system to enable each individual in a photo aware of the posting activity and share in the decision making on the photo posting. Consequently, we require a capable facial acknowledgement (FR) structure that can see everyone in the photo. In any case, all the additionally asking for security setting may control the photos quantity freely available to design the FR system. To deal with this issue, our system attempts to utilize users private photos to arrange an altered FR system especially arranged to isolate possible photo co-proprietors without releasing their privacy. We also add to a disseminated accords based framework to reduce the computational versatile quality and guarantee the private get ready set. We exhibit that our system is superior to anything other possible procedures to the extent acknowledgment extent and adequacy i.e. effectiveness. Keywords- Social network, photo privacy, secure multi-party computation, support, vector machine, collaborative learning I. INTRODUCTION The massive use of social networking sites and with the vogue of photo sharing on social networking sites users naively tends to share personal information. Social networking users may or may not be aware of getting their personal information to be leaked or will benefit the malevolent hackers or may commit any kind of privacy breaches. The intense popularization of Internet and the vast germination of web services that facilitates the participatory information sharing, users likely tend to share personal information which may lead to lethal causes. Social media use has become so pervasive communication media that help connect people and stay in touch beyond boundaries. It is becoming progressively more obvious that social networks have become a part of people s lives. To check status updates from the family and friends, tablet and smart phone are used by the young generation. Young people are becoming more socially capable due to social networking sites. With the adoration of sharing, Facebook has stood out as the most famous SNSs in the world where people expend time for hours. Some people on internet sites carry out dreadful acts and screen themselves behind the secrecy provided by the internet. Young people being unaware of reading the privacy policy of different websites, most of the times unknowingly reveal their personal information. If the young people fail to read the policies then it may cause risk of disclosing individual s personal information which is a cybercrime such as an identity theft. Facebook has helped a lot to create lots of different source of entertainment and informational media for personal as well as business use around the globe. It is also available in various languages and country thus involving people from all over the globe and connecting people of various dialects together as it provides translation feature. In the past, there was a buzz regarding the privacy settings of Facebook as it was very complicated but later they have simplified it for better understanding and easy access to common people. Due to lack of knowledge and understanding of privacy features of Facebook, people make many mistakes. Another important thin which should be controlled is the availability of the personal information which should be prevented d from leakage as it may reveal personal information of an individual in the form of videos, images or any data. So the information should be precise else it may lose control on the information once it is let out on internet. Facebook has provided an ease of uploading and sharing photos online in an instant. If the individual is not identified by the photo tags, then the face of an individual can be identified through the use of the facial recognition software and publicly available information which identifies the person on the photo. Since the social networking sites provides us the ease and fulfills our needs they have become the integral part of our life who provides social needs such as information sharing, social interaction and communication. Because of such an ease more people are reliable on online social network where they place their images, personal information and videos without giving a second thought. These records placed on social sites can be used for malicious purpose as it becomes a permanent record. For example, any photo posted on the site may lead a connection to some mafia world which may cause threat to someone. Privacy protection over OSNs has become an important issue as many users are careless while posting the contents of the photo which may cause far reaching effects. Facebook has feature of photo tagging which is of prime concern as it makes individual involve other person by tagging individuals and make them involve in the photo posting activity. This is initiated by tagging photos of All rights Reserved 911

2 individual who are present in the photo and thus inviting them to be active part of it. Users may even post the details or any information of the individual without their involvement and consent. The situation may be brought out due to proper tools and designs along with the lack of experience and awareness in users. This paper proposes a system based on new consent, which approaches to achieve privacy and efficiency at the same time. The local train data is formed by setting individuals private photo set so as to train the data and make individual learn the local training results. Once this result is achieved then global knowledge can be formed by exchanging the data among the users thus expanding the knowledge of the users. Later, the knowledge can be expanded and can be used as reference by the users. At last the information can be shared among various users and thus consensus can be reached through it. II. RELATED WORK Security and privacy in social network is now becoming an important research area nowadays. When a user uploads information in OSN they have a scope in mind and the privacy involves keeping that information s within the intended scope. Scope can be defined as size of the audience, extent of usage allowed, and duration of the content. Privacy is breached when information is moved beyond this scope. Case studies show that most users do not change their default privacy settings provided by the OSNs there by creating privacy issues. Current OSNS demands user to be system and policy administers for regulating their data, where users can restrict data sharing to a specific set of trusted users. In literature [6, 7, 8, 9], several proposals of an access control scheme for OSNs have been introduced. But most of them were based on the property of trust. For example, Carminative et al. introduced a trust-based access control mechanism, which allows the specification of access rules for online resources where authorized users are denoted in terms of the relationship type, depth, and trust level between users in OSNs. They also proposed a semi-decentralized discretionary access control system and an enforcement mechanism for controlled sharing of information in OSNs. Fong et al. Proposed an access control model that deals with the access control mechanism implemented in Facebook. Gates described a new method where access control was based on relationship which is a new security paradigm that addresses the requirements of the Web 2.0. Then, Fong recently formulated a paradigm called a Relationship-Based Access Control (ReBAC) where, the authorization decisions was based on the relationships between the resource owner and the resource accessor in an OSN. However, these works couldn t accommodate privacy control requirements with respect to the data sharing in OSNs. Several recent works in access control mechanism recognized the need of joint management for data sharing, in OSNs, especially in the area of photo sharing. Squicciarini et al. Proposed a solution for privacy management for photo sharing in OSNs. In this work they considered the privacy control of a content that is co-owned by multiple users in an OSN, where each co-owner may separately specify his/her own privacy preference for the shared content. The Clarke-Tax mechanism was adopted to provide the collective enforcement in the shared content. Evaluation of the scheme was done by applying Game theory. However, the drawback of this solution is the usability issue and they do not accommodate all stakeholders privacy preferences. Hongxin Hu et.al, proposes a simple but flexible mechanism for collaborative management of shared data in OSNs associated with multiple users. Even though they addressed multiparty access control issues, chances of privacy risk and data sharing loss are high due to a simple conflict resolution strategy. In contrast, in this work an effective conflict resolution solution is introduced, which makes a tradeoff between privacy protection and data sharing by considering the privacy concerns from multiple associated users.. III. PROPOSED SYSTEM To propose a facial recognition system for preserving privacy of photo sharing that can recognize everyone in the photo which enables each person in a photo is alert of the posting action and participate in the decision making while posting the photo.. IV. SYSTEM ARCHITECTURE A mechanism has been designed to make users aware of the posting activity and make them actively take part in the photo posting and decision making paradigm for which a facial recognition (FR) system is recommended which can recognize everyone present in the photo. If more privacy setting is done then it may limit the number of photos which will be utilized as the training set for FR system. In order to overcome this problem and for training set for FR system we would utilize the private photos of users which would differentiate the photo co-owners without affecting their privacy. A distributed consensus based method is developed which would protect the private training set and even reduce the computational complexity. Our contributions to this work when compared with previous work are mentioned below: We can find the potential owners of shared photos automatically even when the use of generated tags is kept as an option in our paper. Private photos in a privacy-preserving manner and social contexts to derive a personal FR engine for any Particular user is proposed in our All rights Reserved 912

3 We propose a consensus-based method to achieve privacy and efficiency. Fig.1 System Architecture System Features: photo privacy: Users care about privacy are unlikely to put photos online. Perhaps it is exactly those people who really want to have a photo privacy protection scheme. To break this dilemma, we propose a privacy-preserving distributed collaborative training system as our FR engine. In our system, we ask each of our users to establish a private photo set of their own. We use these private photos to build personal FR engines based on the specific social context and promise that during FR training, only the discriminating rules are revealed but nothing else With the training data (private photo sets) distributed among users, this problem could be formulated as a typical secure multi-party computation problem. Intuitively, we may apply cryptographic technique to protect the private photos, but the computational and communication cost may pose a serious problem for a large OSN. Social network: Study the statistics of photo sharing on social networks and propose a three realms model: a social realm, in which identities are entities, and friendship a relation; second, a visual sensory realm, of which faces are entities, and cooccurrence in images a relation; and third, a physical realm, in which bodies belong, with physical proximity being a relation. They show that any two realms are highly correlated. Given information in one realm, we can give a good estimation of the relationship of the other realm. Stone et al., for the first time, propose to use the contextual information in the social realm and co photo relationship to do automatic FR. They define a pair wise conditional random field (CRF) model to find the optimal joint labeling by maximizing the conditional density. Specifically, they use the existing labeled photos as the training samples and combine the photo co-occurrence statistics and baseline FR score to improve the accuracy of face annotation. discuss the difference between the traditional FR system and the FR system that is designed specifically for OSNs. They point out that a customized FR system for each user is expected to be much more accurate in his/her own photo collections. social networks such as Face book. Unfortunately, careless photo posting may reveal privacy of individuals in a posted photo. To curb the privacy leakage, we proposed to enable individuals potentially in a photo to give the permissions before posting a co-photo. We designed a privacy-preserving FR system to identify individuals in a co-photo. Friend list: Basically, in our proposed one-against-one strategy a user needs to establish classifiers between self, friend and friend, friend also known as the two loops in Algorithm. 2. During the first loop, there is no privacy concerns of Alice s friend list because friendship graph is undirected. However, in the second loop, Alice need to coordinate all her friends to build classifiers between them. According to our protocol, her friends only communicate with her and they have no idea of what they are computing for. Friend list could also be revealed during the classifier reuse stage. For example, suppose Alice want to find ubt between Bob and Tom, which has already been computed by Bob. Alice will first query user k All rights Reserved 913

4 see if auk has already been computed. If this query is made in plaintext, Bob immediately knows Alice and Bob are friends. To address this problem, Alice will first make a list for desired classifiers use private set operations in [10] to query against her neighbors classifiers lists one by one. Classifiers in the intersection part will be reused. Notice that even with this protection, mutual friends between Alice and Bob are still revealed to Bob, this is the trade-off we made for classifiers reuse. Actually, OSNs like Face book shows mutual friends anyway and there is no such privacy setting as hide mutual friends Collaborative Learning: To break this dilemma, we propose a privacy-preserving distributed collaborative training system as our FR engine. In our system, we ask each of our users to establish a private photo set of their own. We use these private photos to build personal FR engines based on the specific social context and promise that during FR training, only the discriminating rules are revealed but nothing else. propose to use multiple personal FR engines to work collaboratively to improve the recognition ratio. Specifically, they use the social context to select the suitable FR engines that contain the identity of the queried face image with high probability This data isolation property is the essence of our secure collaborative learning model and the detailed security analysis. V. RELEVANT MATHEMATICS ASSOCIATED WITH THE PROJECT Let S is the Whole System Consists: S = U,SP,TS,PP,PF. 1.U is the set of number users. U=U1,U2...Un. 2.SP is the set of special policy. SP=SP1,SP2...SPn. 3.TS is set of number tranning set. TS=TS1,TS2...TSn. PF is set of numbers of post photo. PF=PF1,PF2...PFn Step 1: user interface with GUI. Step 2: user specify policy for security and privacy. SP=SP1,SP2...SPn Step 3:user use training set for posting a photo. TS=TS1,TS2...TSn. Step 4:After getting permission post a photo. PF=PF1,PF2...PFn. Output: we get a secure photo posting mechanism. VI. All rights Reserved 914

5 @IJAERD-2017, All rights Reserved 915

6 @IJAERD-2017, All rights Reserved 916

7 VII. Conclusion and Future Work Photograph sharing is a standout amongst the most prevalent elements in online informal organizations, for example, Facebook. Lamentably, imprudent photograph posting may uncover security of people in a posted photograph. To control the security spillage, we proposed to empower people possibly in a photograph to give the consents before posting a co-photograph. We planned a security safeguarding FR framework to recognize people in a co-photograph. The proposed framework is highlighted with low calculation expense and privacy of the preparation set. Hypothetical examination and trials were directed to show adequacy and effectiveness of the proposed plan. We expect that our proposed plan be exceptionally helpful in ensuring clients' protection in photograph/picture sharing over online informal organizations. Then again, there dependably exist exchange off in the middle of protection and utility. For instance, in our present Android application, the co-photograph must be post with consent of all the co-proprietors. Idleness presented in this procedure will enormously affect client experience of OSNs. Moreover, neighborhood FR preparing will deplete battery rapidly. Our future work could be the way to move the proposed preparing plans to individual mists like Drop box and/or icloud. VIII. References [1] A. Besmer and H. Richter Lipford. Moving beyond untagging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 10, pages , New York, NY, USA, ACM. [2] B. Carminati, E. Ferrari, and A. Perego. Rule-based access control for social networks. In R. Meersman, Z. Tari, and P. Herrero, editors, On the Move to Meaningful Internet Systems OTM. [3] K. Choi, H. Byun, and K.-A. Toh. A collaborative face recognition framework on a social network platform. In Automatic Face Gesture Recognition, FG 08. 8th IEEE International Conference on, pages 1 6, [4] N. Mavridis, W. Kazmi, and P. Toulis. Friends with faces: How social networks can enhance face recognition and vice versa. In Computational Social Network Analysis, Computer Communications and Networks, pages Springer London, [5]A. C. Squicciarini, M. Shehab, and F. Paci. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web, WWW 09, pages , New York, NY, USA, ACM. [6] K. Choi, H. Byun, and K.-A. Toh. A collaborative face recognition framework on a social network platform. In Automatic Face Gesture Recognition, FG 08. 8th IEEE International Conference on, pages 1 6, [7] K.-B. Duan and S. S. Keerthi. Which is the best multiclass svm method? an empirical study. In Proceedings of the 6th international conference on Multiple Classifier Systems, MCS 05, pages , Berlin, Heidelberg, Springer-Verlag. [8] P. A. Forero, A. Cano, and G. B. Giannakis. Consensus-based distributed support vector machines. J. Mach. Learn. Res., 99: , August All rights Reserved 917

PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING

PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING Ajay Kumar Teotia, Rajkumar Dukare, Kajal Vende, Poonam Patil, Mrs. Sindhu M.R Abstract-Photo sharing is a captivating feature which popularizes

More information

Privacy as Impression Management

Privacy as Impression Management Institute for Software Research Privacy as Impression Management Sameer Patil patil@uci.edu Alfred Kobsa kobsa@ics.uci.edu ISR Technical Report # UCI-ISR-03-13 Institute for Software Research ICS2 210

More information

The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy

The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy The Use of Commercial Databases for National Security: Privacy, Evaluation, and Accuracy Rebecca Wright Computer Science Department Stevens Institute of Technology www.cs.stevens.edu/~rwright National

More information

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter Extraction and Recognition of Text From Digital English Comic Image Using Median Filter S.Ranjini 1 Research Scholar,Department of Information technology Bharathiar University Coimbatore,India ranjinisengottaiyan@gmail.com

More information

Discovering Your Family History with MyHeritage Unique Technologies By: Daniel Horowitz - -

Discovering Your Family History with MyHeritage Unique Technologies By: Daniel Horowitz - - Discovering Your Family History with MyHeritage Unique Technologies By: Daniel Horowitz - Daniel@MyHeritage.com - Tweeter: @MyHChiefGen MyHeritage has developed seven powerful technologies to help genealogy

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

SPTF: Smart Photo-Tagging Framework on Smart Phones

SPTF: Smart Photo-Tagging Framework on Smart Phones , pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,

More information

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments An Introduction to a Taxonomy of Information Privacy in Collaborative Environments GEOFF SKINNER, SONG HAN, and ELIZABETH CHANG Centre for Extended Enterprises and Business Intelligence Curtin University

More information

RepliPRI: Challenges in Replicating Studies of Online Privacy

RepliPRI: Challenges in Replicating Studies of Online Privacy RepliPRI: Challenges in Replicating Studies of Online Privacy Sameer Patil Helsinki Institute for Information Technology HIIT Aalto University Aalto 00076, FInland sameer.patil@hiit.fi Abstract Replication

More information

AUTOMATED MALARIA PARASITE DETECTION BASED ON IMAGE PROCESSING PROJECT REFERENCE NO.: 38S1511

AUTOMATED MALARIA PARASITE DETECTION BASED ON IMAGE PROCESSING PROJECT REFERENCE NO.: 38S1511 AUTOMATED MALARIA PARASITE DETECTION BASED ON IMAGE PROCESSING PROJECT REFERENCE NO.: 38S1511 COLLEGE : BANGALORE INSTITUTE OF TECHNOLOGY, BENGALURU BRANCH : COMPUTER SCIENCE AND ENGINEERING GUIDE : DR.

More information

CS 261 Notes: Zerocash

CS 261 Notes: Zerocash CS 261 Notes: Zerocash Scribe: Lynn Chua September 19, 2018 1 Introduction Zerocash is a cryptocurrency which allows users to pay each other directly, without revealing any information about the parties

More information

Face Recognition for Personal Photos using Online Social Network Context and Collaboration

Face Recognition for Personal Photos using Online Social Network Context and Collaboration Face Recognition for Personal Photos using Online Social Network Context and Collaboration Guest Lecture at KAIST 14 December, 2010 Wesley De Neve, Jaeyoung Choi, Yong Man Ro Image and Video Systems Lab

More information

Building DIGITAL TRUST People s Plan for Digital: A discussion paper

Building DIGITAL TRUST People s Plan for Digital: A discussion paper Building DIGITAL TRUST People s Plan for Digital: A discussion paper We want Britain to be the world s most advanced digital society. But that won t happen unless the digital world is a world of trust.

More information

International Journal of Advance Engineering and Research Development. Generating The Summary Of Geographic Area

International Journal of Advance Engineering and Research Development. Generating The Summary Of Geographic Area Scientific Journal of Impact Factor (SJIF): 4.14 International Journal of Advance Engineering and Research Development Volume 3, Issue 4, April -2016 Generating The Summary Of Geographic Area Priyanka

More information

CS221 Project Final Report Gomoku Game Agent

CS221 Project Final Report Gomoku Game Agent CS221 Project Final Report Gomoku Game Agent Qiao Tan qtan@stanford.edu Xiaoti Hu xiaotihu@stanford.edu 1 Introduction Gomoku, also know as five-in-a-row, is a strategy board game which is traditionally

More information

Privacy Issues with Sharing Reputation across Virtual Communities

Privacy Issues with Sharing Reputation across Virtual Communities Privacy Issues with Sharing Reputation across Virtual Communities Nurit Gal-Oz Department of Computer Science Ben-Gurion University of the Negev Tal Grinshpoun Department of Software Engineering SCE -

More information

A social networking-based approach to information management in construction

A social networking-based approach to information management in construction 175 A social networking-based approach to information management in construction Michael HENRY* and Yoshitaka KATO** Successful project completion in the construction industry requires careful and timely

More information

We encourage you to print this booklet for easy reading. Blogging for Beginners 1

We encourage you to print this booklet for easy reading. Blogging for Beginners 1 We have strived to be as accurate and complete as possible in this report. Due to the rapidly changing nature of the Internet the contents are not warranted to be accurate. While all attempts have been

More information

Designing Semantic Virtual Reality Applications

Designing Semantic Virtual Reality Applications Designing Semantic Virtual Reality Applications F. Kleinermann, O. De Troyer, H. Mansouri, R. Romero, B. Pellens, W. Bille WISE Research group, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium

More information

CoPE: Enabling Collaborative Privacy Management in Online Social Networks

CoPE: Enabling Collaborative Privacy Management in Online Social Networks CoPE: Enabling Collaborative Privacy Management in Online Social Networks Anna C. Squicciarini, Heng Xu, and Xiaolong (Luke) Zhang College of Information Sciences and Technology, Pennsylvania State University,

More information

MEASURES TO INCREASE THE EFFICIENCY OF CIF COMMITTEES. CTF-SCF/TFC.11/7/Rev.1 January 27, 2014

MEASURES TO INCREASE THE EFFICIENCY OF CIF COMMITTEES. CTF-SCF/TFC.11/7/Rev.1 January 27, 2014 MEASURES TO INCREASE THE EFFICIENCY OF CIF COMMITTEES CTF-SCF/TFC.11/7/Rev.1 January 27, 2014 I. INTRODUCTION 1. At the May 2013 CIF Committee meetings, the CIF Administrative Unit was requested to give

More information

Privacy and Security in an On Demand World

Privacy and Security in an On Demand World Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where

More information

Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents

Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents Loyola University Maryland Provisional Policies and Procedures for Intellectual Property, Copyrights, and Patents Approved by Loyola Conference on May 2, 2006 Introduction In the course of fulfilling the

More information

Social Media Intelligence in Practice: The NEREUS Experimental Platform. Dimitris Gritzalis & Vasilis Stavrou June 2015

Social Media Intelligence in Practice: The NEREUS Experimental Platform. Dimitris Gritzalis & Vasilis Stavrou June 2015 Social Media Intelligence in Practice: The NEREUS Experimental Platform Dimitris Gritzalis & Vasilis Stavrou June 2015 Social Media Intelligence in Practice: The NEREUS Experimental Platform 3 rd Hellenic

More information

The Response from Motorola Ltd. to the Consultation on The Licence-Exemption Framework Review

The Response from Motorola Ltd. to the Consultation on The Licence-Exemption Framework Review The Response from Motorola Ltd. to the Consultation on The Licence-Exemption Framework Review June 21 st 2007. Key Points 1. The introduction of the concept of a version of Commons in which the possible

More information

Amigo Approach Towards Perceived Privacy

Amigo Approach Towards Perceived Privacy Amigo Approach Towards Perceived Privacy Maddy Janse, Peter Vink, Yeo LeeChin, and Abdullah Al Mahmud Philips Research, High Tech Campus 5, 5656 AE Eindhoven, The Netherlands Abstract. Perceived privacy,

More information

SeaFish: A Game for Collaborative and Visual Image Annotation and Interlinking

SeaFish: A Game for Collaborative and Visual Image Annotation and Interlinking SeaFish: A Game for Collaborative and Visual Image Annotation and Interlinking Stefan Thaler 1, Katharina Siorpaes 1,DavidMear 3, Elena Simperl 1,2, and Carl Goodman 3 1 University of Innsbruck, STI-Innsbruck,

More information

Mobile and broadband technologies for ameliorating social isolation in older people

Mobile and broadband technologies for ameliorating social isolation in older people Mobile and broadband technologies for ameliorating social isolation in older people www.broadband.unimelb.edu.au June 2012 Project team Frank Vetere, Lars Kulik, Sonja Pedell (Department of Computing and

More information

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing

More information

Practical privacy-aware opportunistic networking

Practical privacy-aware opportunistic networking Practical privacy-aware opportunistic networking Iain Parris School of Computer Science University of St Andrews St Andrews, Fife, KY16 9SX, UK ip@cs.st-andrews.ac.uk Tristan Henderson School of Computer

More information

Avoiding Enemies of Trust Common Behaviors that Inadvertently Damage Trust at Work 1 and How to Avoid Them

Avoiding Enemies of Trust Common Behaviors that Inadvertently Damage Trust at Work 1 and How to Avoid Them Avoiding Enemies of Trust Common Behaviors that Inadvertently Damage Trust at Work 1 and How to Avoid Them Enemies of Trust: Sincerity 1. Failing to update. Changing your mind about a decision or direction

More information

Heuristic Evaluation of Spiel

Heuristic Evaluation of Spiel Heuristic Evaluation of Spiel 1. Problem We evaluated the app Spiel by Addison, Katherine, SunMi, and Joanne. Spiel encourages users to share positive and uplifting real-world items to their network of

More information

Responsible Data Use Policy Framework

Responsible Data Use Policy Framework 1 May 2018 Sidewalk Toronto is a joint effort by Waterfront Toronto and Sidewalk Labs to create a new kind of complete community on Toronto s waterfront that combines cutting-edge technology and forward-thinking

More information

Details of the Proposal

Details of the Proposal Details of the Proposal Draft Model to Address the GDPR submitted by Coalition for Online Accountability This document addresses how the proposed model submitted by the Coalition for Online Accountability

More information

Fingerprinting Based Indoor Positioning System using RSSI Bluetooth

Fingerprinting Based Indoor Positioning System using RSSI Bluetooth IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 4, 2013 ISSN (online): 2321-0613 Fingerprinting Based Indoor Positioning System using RSSI Bluetooth Disha Adalja 1 Girish

More information

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

Enabling Trust in e-business: Research in Enterprise Privacy Technologies Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing

More information

Study on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development. Ya Nie

Study on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development. Ya Nie International Conference on Education, Sports, Arts and Management Engineering (ICESAME 2016) Study on Relationship between Scientific and Technological Resource Sharing and Regional Economic Development

More information

HUMAN COMPUTER INTERFACE

HUMAN COMPUTER INTERFACE HUMAN COMPUTER INTERFACE TARUNIM SHARMA Department of Computer Science Maharaja Surajmal Institute C-4, Janakpuri, New Delhi, India ABSTRACT-- The intention of this paper is to provide an overview on the

More information

37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game

37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game 37 Game Theory Game theory is one of the most interesting topics of discrete mathematics. The principal theorem of game theory is sublime and wonderful. We will merely assume this theorem and use it to

More information

Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011

Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011 Volume 3, Number 3 The Researcher s Toolbox, Part II May 2011 Editor-in-Chief Jeremiah Spence Image Art!"##$%"#&&'()*+,-*.)/%0.1+2' ' ' ' ' ' ' ' ',..34556-789)5/:;

More information

ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES

ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES DIRK KRAFZIG MANAS DEB MARTIN FRICK DIGITAL COOKBOOK ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES For more details visit: https://digital-cookbook.com/ GRAPHIC DESIGN BY KNUT JUNKER AND DIETMAR

More information

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product

Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Privacy-Preserving Collaborative Recommendation Systems Based on the Scalar Product Justin Zhan I-Cheng Wang Abstract In the e-commerce era, recommendation systems were introduced to share customer experience

More information

Methodology for Agent-Oriented Software

Methodology for Agent-Oriented Software ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this

More information

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication Ahmet Onur Durahim, İsmail Fatih Yıldırım, Erkay Savaş and Albert Levi durahim, ismailfatih, erkays, levi@sabanciuniv.edu

More information

My Earnings from PeoplePerHour:

My Earnings from PeoplePerHour: Hey students and everyone reading this post, since most of the readers of this blog are students, that s why I may call students throughout this post. Hope you re doing well with your educational activities,

More information

Social Viewing in Cinematic Virtual Reality: Challenges and Opportunities

Social Viewing in Cinematic Virtual Reality: Challenges and Opportunities Social Viewing in Cinematic Virtual Reality: Challenges and Opportunities Sylvia Rothe 1, Mario Montagud 2, Christian Mai 1, Daniel Buschek 1 and Heinrich Hußmann 1 1 Ludwig Maximilian University of Munich,

More information

Note Computations with a deck of cards

Note Computations with a deck of cards Theoretical Computer Science 259 (2001) 671 678 www.elsevier.com/locate/tcs Note Computations with a deck of cards Anton Stiglic Zero-Knowledge Systems Inc, 888 de Maisonneuve East, 6th Floor, Montreal,

More information

Games, Privacy and Distributed Inference for the Smart Grid

Games, Privacy and Distributed Inference for the Smart Grid CUHK September 17, 2013 Games, Privacy and Distributed Inference for the Smart Grid Vince Poor (poor@princeton.edu) Supported in part by NSF Grant CCF-1016671 and in part by the Marie Curie Outgoing Fellowship

More information

AGENT BASED MANUFACTURING CAPABILITY ASSESSMENT IN THE EXTENDED ENTERPRISE USING STEP AP224 AND XML

AGENT BASED MANUFACTURING CAPABILITY ASSESSMENT IN THE EXTENDED ENTERPRISE USING STEP AP224 AND XML 17 AGENT BASED MANUFACTURING CAPABILITY ASSESSMENT IN THE EXTENDED ENTERPRISE USING STEP AP224 AND XML Svetan Ratchev and Omar Medani School of Mechanical, Materials, Manufacturing Engineering and Management,

More information

Towards Location and Trajectory Privacy Protection in Participatory Sensing

Towards Location and Trajectory Privacy Protection in Participatory Sensing Towards Location and Trajectory Privacy Protection in Participatory Sensing Sheng Gao 1, Jianfeng Ma 1, Weisong Shi 2 and Guoxing Zhan 2 1 Xidian University, Xi an, Shaanxi 710071, China 2 Wayne State

More information

IEEE Internet of Things

IEEE Internet of Things IEEE Internet of Things Vint Cerf - December 15th 2015 Version for Email Context & Perception The Internet of Things is already amongst us The living room of the future The Internet of Things is hereofand

More information

Privacy preserving data mining multiplicative perturbation techniques

Privacy preserving data mining multiplicative perturbation techniques Privacy preserving data mining multiplicative perturbation techniques Li Xiong CS573 Data Privacy and Anonymity Outline Review and critique of randomization approaches (additive noise) Multiplicative data

More information

ABSTRACT. Keywords Virtual Reality, Java, JavaBeans, C++, CORBA 1. INTRODUCTION

ABSTRACT. Keywords Virtual Reality, Java, JavaBeans, C++, CORBA 1. INTRODUCTION Tweek: Merging 2D and 3D Interaction in Immersive Environments Patrick L Hartling, Allen D Bierbaum, Carolina Cruz-Neira Virtual Reality Applications Center, 2274 Howe Hall Room 1620, Iowa State University

More information

Live Hand Gesture Recognition using an Android Device

Live Hand Gesture Recognition using an Android Device Live Hand Gesture Recognition using an Android Device Mr. Yogesh B. Dongare Department of Computer Engineering. G.H.Raisoni College of Engineering and Management, Ahmednagar. Email- yogesh.dongare05@gmail.com

More information

Identifying and Managing Joint Inventions

Identifying and Managing Joint Inventions Page 1, is a licensing manager at the Wisconsin Alumni Research Foundation in Madison, Wisconsin. Introduction Joint inventorship is defined by patent law and occurs when the outcome of a collaborative

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

Unlinkability and Redundancy in Anonymous Publication Systems

Unlinkability and Redundancy in Anonymous Publication Systems Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous

More information

Portrait of a Privacy Invasion

Portrait of a Privacy Invasion Portrait of a Privacy Invasion Detecting Relationships Through Large-scale Photo Analysis Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna UC Santa Barbara Santa Barbara, CA, USA {yans,chris,vigna}@cs.ucsb.edu

More information

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology

More information

Problem 4.R1: Best Range

Problem 4.R1: Best Range CSC 45 Problem Set 4 Due Tuesday, February 7 Problem 4.R1: Best Range Required Problem Points: 50 points Background Consider a list of integers (positive and negative), and you are asked to find the part

More information

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016 Global Standards Symposium Security, privacy and trust in standardisation ICDPPC Chair John Edwards 24 October 2016 CANCUN DECLARATION At the OECD Ministerial Meeting on the Digital Economy in Cancun in

More information

How Many Pixels Do We Need to See Things?

How Many Pixels Do We Need to See Things? How Many Pixels Do We Need to See Things? Yang Cai Human-Computer Interaction Institute, School of Computer Science, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15213, USA ycai@cmu.edu

More information

Zero-Based Code Modulation Technique for Digital Video Fingerprinting

Zero-Based Code Modulation Technique for Digital Video Fingerprinting Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and

More information

Digital transformation in the Catalan public administrations

Digital transformation in the Catalan public administrations Digital transformation in the Catalan public administrations Joan Ramon Marsal, Coordinator of the National Agreement for the Digital Society egovernment Working Group. Government of Catalonia Josep Lluís

More information

Some UX & Service Design Challenges in Noise Monitoring and Mitigation

Some UX & Service Design Challenges in Noise Monitoring and Mitigation Some UX & Service Design Challenges in Noise Monitoring and Mitigation Graham Dove Dept. of Technology Management and Innovation New York University New York, 11201, USA grahamdove@nyu.edu Abstract This

More information

Getting started with AutoCAD mobile app. Take the power of AutoCAD wherever you go

Getting started with AutoCAD mobile app. Take the power of AutoCAD wherever you go Getting started with AutoCAD mobile app Take the power of AutoCAD wherever you go Getting started with AutoCAD mobile app Take the power of AutoCAD wherever you go i How to navigate this book Swipe the

More information

Science Impact Enhancing the Use of USGS Science

Science Impact Enhancing the Use of USGS Science United States Geological Survey. 2002. "Science Impact Enhancing the Use of USGS Science." Unpublished paper, 4 April. Posted to the Science, Environment, and Development Group web site, 19 March 2004

More information

Agreement Technologies Action IC0801

Agreement Technologies Action IC0801 Agreement Technologies Action IC0801 Sascha Ossowski Agreement Technologies Large-scale open distributed systems Social Science Area of enormous social and economic potential Paradigm Shift: beyond the

More information

Anti cheating guidelines for Arbiters

Anti cheating guidelines for Arbiters Annex 19B Anti cheating guidelines for Arbiters (These guidelines shall be included in the subjects and will be taught in all Workshops, FIDE Arbiters Seminars and Courses for International and FIDE Arbiters).

More information

The questions posed by a conscientious STA investigator would fall into five basic categories:

The questions posed by a conscientious STA investigator would fall into five basic categories: Seeing Technology s Effects: An inquiry-based activity for students designed to help them understand technology s impacts proactively Jason Ohler 1999 // jason.ohler@uas.alaska.edu // www.jasonohler.com

More information

Modeling Social Networking Privacy

Modeling Social Networking Privacy Modeling Social Networking Privacy Carolina Dania IMDEA Software Institute, Madrid, Spain Universidad Complutense de Madrid, Spain carolina.dania@imdea.org Abstract. Privacy-related issues are becoming

More information

Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business.

Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business. Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1 Ethics, Technology, Sustainability and Social Issues in Business Name Institutional Affiliation ETHICS, TECHNOLOGY, SUSTAINABILITY AND

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of Table of Contents Game Mechanics...2 Game Play...3 Game Strategy...4 Truth...4 Contrapositive... 5 Exhaustion...6 Burnout...8 Game Difficulty... 10 Experiment One... 12 Experiment Two...14 Experiment Three...16

More information

Privacy Policy. Catalyst.Net Limited. Version 1.0

Privacy Policy. Catalyst.Net Limited. Version 1.0 Privacy Policy Catalyst.Net Limited Version 1.0 November 2017 1 Scope 1.1. This Privacy Policy describes how Catalyst collects, uses, discloses, stores and gives access to Personal Information in accordance

More information

Speaking Notes for Grades 4 to 6 Presentation

Speaking Notes for Grades 4 to 6 Presentation Speaking Notes for Grades 4 to 6 Presentation Understanding your online footprint: How to protect your personal information on the Internet SLIDE (1) Title Slide SLIDE (2) Key Points The Internet and you

More information

Autonomic gaze control of avatars using voice information in virtual space voice chat system

Autonomic gaze control of avatars using voice information in virtual space voice chat system Autonomic gaze control of avatars using voice information in virtual space voice chat system Kinya Fujita, Toshimitsu Miyajima and Takashi Shimoji Tokyo University of Agriculture and Technology 2-24-16

More information

Techniques for Generating Sudoku Instances

Techniques for Generating Sudoku Instances Chapter Techniques for Generating Sudoku Instances Overview Sudoku puzzles become worldwide popular among many players in different intellectual levels. In this chapter, we are going to discuss different

More information

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10 Dynamic extended DES Yi-Shiung Yeh 1, I-Te Chen 2, Ting-Yu Huang 1, Chan-Chi Wang 1, 1 Department of Computer Science and Information Engineering National Chiao-Tung University 1001 Ta-Hsueh Road, HsinChu

More information

Impediments to designing and developing for accessibility, accommodation and high quality interaction

Impediments to designing and developing for accessibility, accommodation and high quality interaction Impediments to designing and developing for accessibility, accommodation and high quality interaction D. Akoumianakis and C. Stephanidis Institute of Computer Science Foundation for Research and Technology-Hellas

More information

Most of us will have heard of Open Data. Many of us are working to implement it.

Most of us will have heard of Open Data. Many of us are working to implement it. Most of us will have heard of Open Data. Many of us are working to implement it. New Zealand Police is well progressed on this journey. We have learned some things along the way that others who are also

More information

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd

Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Mobile Crowdsensing enabled IoT frameworks: harnessing the power and wisdom of the crowd Malamati Louta Konstantina Banti University of Western Macedonia OUTLINE Internet of Things Mobile Crowd Sensing

More information

A Principle-Based Transparency Framework for Intelligent Environments

A Principle-Based Transparency Framework for Intelligent Environments http://dx.doi.org/10.14236/ewic/hci2016.68 A Principle-Based Transparency Framework for Intelligent Environments Mohsen Amiribesheli Faculty of Science and Technology Bournemouth University Pool, Dorset,

More information

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA August 5, 2016 ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA The Information Technology Association of Canada (ITAC) appreciates the opportunity to participate in the Office of the Privacy Commissioner

More information

AN APPROACH TO ONLINE ANONYMOUS ELECTRONIC CASH. Li Ying. A thesis submitted in partial fulfillment of the requirements for the degree of

AN APPROACH TO ONLINE ANONYMOUS ELECTRONIC CASH. Li Ying. A thesis submitted in partial fulfillment of the requirements for the degree of AN APPROACH TO ONLINE ANONYMOUS ELECTRONIC CASH by Li Ying A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Software Engineering Faculty of Science and

More information

12 Content Marketing Tips for Small Businesses

12 Content Marketing Tips for Small Businesses Content Marketing Tips Use your words wisely 12 Content Marketing Tips for Small Businesses How can you get the most out of your content marketing and promote your business to best of your ability? Read

More information

1 Introduction. Yan Shoshitaishvili*, Christopher Kruegel, and Giovanni Vigna Portrait of a Privacy Invasion

1 Introduction. Yan Shoshitaishvili*, Christopher Kruegel, and Giovanni Vigna Portrait of a Privacy Invasion Yan Shoshitaishvili*, Christopher Kruegel, and Giovanni Vigna Portrait of a Privacy Invasion Detecting Relationships Through Large-scale Photo Analysis The popularity of online social networks has changed

More information

Keywords: - Gaussian Mixture model, Maximum likelihood estimator, Multiresolution analysis

Keywords: - Gaussian Mixture model, Maximum likelihood estimator, Multiresolution analysis Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Expectation

More information

Identification of Cardiac Arrhythmias using ECG

Identification of Cardiac Arrhythmias using ECG Pooja Sharma,Int.J.Computer Technology & Applications,Vol 3 (1), 293-297 Identification of Cardiac Arrhythmias using ECG Pooja Sharma Pooja15bhilai@gmail.com RCET Bhilai Ms.Lakhwinder Kaur lakhwinder20063@yahoo.com

More information

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS Evren Terzi, Hasan B. Celebi, and Huseyin Arslan Department of Electrical Engineering, University of South Florida

More information

First steps towards a mereo-operandi theory for a system feature-based architecting of cyber-physical systems

First steps towards a mereo-operandi theory for a system feature-based architecting of cyber-physical systems First steps towards a mereo-operandi theory for a system feature-based architecting of cyber-physical systems Shahab Pourtalebi, Imre Horváth, Eliab Z. Opiyo Faculty of Industrial Design Engineering Delft

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

Probabilities and Probability Distributions

Probabilities and Probability Distributions Probabilities and Probability Distributions George H Olson, PhD Doctoral Program in Educational Leadership Appalachian State University May 2012 Contents Basic Probability Theory Independent vs. Dependent

More information

The number theory behind cryptography

The number theory behind cryptography The University of Vermont May 16, 2017 What is cryptography? Cryptography is the practice and study of techniques for secure communication in the presence of adverse third parties. What is cryptography?

More information

Laboratory 1: Uncertainty Analysis

Laboratory 1: Uncertainty Analysis University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can

More information

STUDY ON INTRODUCING GUIDELINES TO PREPARE A DATA PROTECTION POLICY

STUDY ON INTRODUCING GUIDELINES TO PREPARE A DATA PROTECTION POLICY LIBRARY UNIVERSITY OF MORATUWA, SRI LANKA ivsoratuwa LB!OON O! /5~OFIO/3 STUDY ON INTRODUCING GUIDELINES TO PREPARE A DATA PROTECTION POLICY P. D. Kumarapathirana Master of Business Administration in Information

More information

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017 CONSENT IN THE TIME OF BIG DATA Richard Austin February 1, 2017 1 Agenda 1. Introduction 2. The Big Data Lifecycle 3. Privacy Protection The Existing Landscape 4. The Appropriate Response? 22 1. Introduction

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VISUAL CRYPTOGRAPHY FOR IMAGES MS. SHRADDHA SUBHASH GUPTA 1, DR. H. R. DESHMUKH

More information

Report to Congress regarding the Terrorism Information Awareness Program

Report to Congress regarding the Terrorism Information Awareness Program Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003

More information

Clinical Open Innovation

Clinical Open Innovation Clinical Open Innovation Reinventing Invention through an Open Clinical Intelligence Network January 2012 A Call to Action by Tom Krohn and Barry Crist, Lilly Clinical Open Innovation In November of 2010,

More information