Needs for Anonymized Mobile Data Discussion Topic / Working Group Seminar 08471.

Slides:



Advertisements
Similar presentations
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences Paul Smart, Ali.
Advertisements

OneM2M Technical Requirements - Driven by EU BUTLER and IEEE PAC - Group Name: WG1 (REQ) Source: Friedbert Berens, FBConsulting Sarl,
CS 495 Application Development for Smart Devices Mobile Crowdsensing Current State and Future Challenges Mobile Crowdsensing. Overview of Crowdsensing.
EEA Neighbourhood project - Presentation to 10 th Eionet workshop on air quality Tim Haigh 17 – 18 October 2005.
©GoldSim Technology Group LLC., 2004 Probabilistic Simulation “Uncertainty is a sign of humility, and humility is just the ability or the willingness to.
Cross-Curricular Teaching EDU 412/413. Overview QEP Competencies What are cross-curricular themes? Two Perspectives Methods for teaching cross-curricular.
Privacy Preserving Publication of Moving Object Data Joey Lei CS295 Francesco Bonchi Yahoo! Research Avinguda Diagonal 177, Barcelona, Spain 6/10/20151CS295.
GeoInformatics Discussion Group Betty Salzberg & Peggy Agouris.
Strategize Your Organization’s Future: Perform a Killer Pest Analysis Danette Shepard, MPA D.R. Shepard Consulting and Services, LLC.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
The Need for an Integrated View of Water Quality Modeling and Monitoring Bruce Kiselica USEPA, Region 2 Second Workshop on Advanced Technologies in Real.
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
WHO EURO – ECEH, Bonn Methods and models to estimate the impact of transport on health and the environment in cities Pierpaolo Mudu THE PEP INTERNATIONAL.
GeoPKDD Geographic Privacy-aware Knowledge Discovery and Delivery Kick-off meeting Pisa, March 14, 2005.
The Federal Enterprise Architecture A Way Ahead on Information Sharing Bryan Aucoin Chief Technical Officer Enterra Solutions
Riding the Mobile Wave: What Local Health Departments Need in order to Adopt Social Media and Mobile Health Technologies for Emergency Preparedness Disaster.
HORIZON 2020 The EU Framework Programme for Research and Innovation Societal Challenge 6 Topics under DG CONNECT H3 responsibility European Commission,
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
UCD Research Strategy 1.Global Ireland 2.Health and Healthcare Delivery 3.Information, Computation & Communications 4.Earth Sciences, Energy & Environment.
Use of Remote Sensing Data to Improve FAO Statistics Overview Global Food Security Support Analysis 30m (GFSAD30) July 2015 Madison, WI Fabio.
G-NIKE Transforming Enterprise Conference, US Dept. of Commerce, Washington 28 January 2003 IT-enabled Growth Nodes in Europe Ramon O’Callaghan Internet.
C2-SENSE WP 3 / Task 3.5 (AIT) Bojan Božić, Gerald Schimak, Refiz Duro C2-SENSE WP3 Meeting Paris
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
The Science of Prediction Location Intelligence Conference April 4, 2006 How Next Generation Traffic Services Will Impact Business Dr. Oliver Downs, Chief.
1 Data analysis. 2 Turning data into information.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
MOBILE BIG DATA CARS, PHONES, AND SENSORS Sam Madden Professor EECS MIT CSAIL
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
ENVIRONMENT – Natural Resources Expert in applied Remote Sensing, Earth Observation & GIS Strong experience in international projects SME Phone: +32 (0)
Economic Development Maps and Apps for State and Local Governments Lindsay King Nikki Golding Chris Buscaglia.
1 Innovation in Services Business Service Design and Innovation Fostering the Economic and Legal Framework for Innovation Performance and Development of.
Community Resilience To Climate Change in Hawai`i 2009 Hawai`i Conservation Conference Hawai`i in a Changing Climate: Ecological, Economic, and Policy.
DriveSense’14 NSF Workshop on Large-Scale Traffic and Driving Activity Data DriveSense’14, Oct 30-31, Norfolk, VA.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Health Management Information Systems Unit 3 Electronic Health Records Component 6/Unit31 Health IT Workforce Curriculum Version 1.0/Fall 2010.
Ephemeral Network Broker to Facilitate Future Mobility Business Models/Transactions A collaboration between Ford University Research Program and University.
Mapping Socio-Economic Indicators in Google Earth Dr. Brian Eddy Dept. of Geography and Environmental Studies, Carleton University.
Geographic Information & Society: Some things to think about GEOG 370 Christine Erlien.
Session-2 Participants Cyrus Shahabi Raju Vatsavai Mohamed Mokbel Shashi Shekhar Mubarak Shah Jans Aasman Monika Sester Wei Ding Phil Hwang Anthony Stefanidis.
Some common applications of geospatial technologies Your Phone: real-time traffic, Uber, ‘nearest Starbucks’, 911, most apps Archeology: lidar, site map,
Questions When have you used GPS? GPS technology uses satellites to pinpoint position on Earth with the aid of a GPS device or unit Have you ever used.
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
Sensing, Collection, Mining of Vehicular Data Group – 1 Breakout Session DriveSense NSF Workshop Oct 31, 2014.
IS3220 Information Technology Infrastructure Security
Big Data Quality Challenges for the Internet of Things (IoT) Vassilis Christophides INRIA Paris (MUSE team)
Blue Coat Cloud Continuum
national scope = unique IE opportunity
Emilija Manic, PhD, Associate Professor The Faculty of Economics
ArcGIS for Emergency Management– An Overview
Changing Graduate Public Health Education
Data and Applications Security
Chris Mannaerts (ITC), AA Work Package 4 lead
Earthquakes: Some staggering facts
Planning a Learning Unit
Geospatial and Problem Specific Semantics Danielle Forsyth, CEO and Co-Founder Thetus Corporation 20 June, 2006.
Data Warehousing Data Mining Privacy
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Red Sky Update “Watching the horizon for emerging health threats”
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Food and Nutrition Surveillance and Response in Emergencies
Data and Applications Security
Presentation transcript:

Needs for Anonymized Mobile Data Discussion Topic / Working Group Seminar 08471

What do we need to learn?  Applications Importance Societal Supportable Privacy constraints  Knowledge What information must be present in the data?  Structure How should the data be represented to make learning easy? Seminar 08471: Geographic Privacy-Aware Knowledge Discovery and Delivery

The Killer App(s) for Anonymized Data  Context and Location Aware Services When can we have expectation of privacy (sensors)? · Expectation “in a crowd” vs. “in the Wald” Public Safety Emergency response, evacuation Public security / law enforcement Lookup/location advertising Business workflows – factory, logistics – real-time response Traffic / transportation Mixed-reality games Enhanced tourism / Edutainment  Location Microdata Public Safety Planning Investigation Health research Personal health-related data (e.g., exercise data, environmental sensors) Epidemiology, pathology Collaborative filtering / collaborative recommendation Geomarketing Business workflows – factory, logistics – real-time response Urban planning Seminar 08471: Geographic Privacy-Aware Knowledge Discovery and Delivery

Information Required  Frequent vs. outlier  Location vs. trajectory  Data quality Exact? Probabilistic? Generalization of truth? Trajectory Patterns (Dino) example of learning that involves approximation Seminar 08471: Geographic Privacy-Aware Knowledge Discovery and Delivery

Real-time traffic analysis and services (Infomobility): Information Required  Frequent vs. outlier Outlier events Frequent normality  Location vs. trajectory Generally want trajectory, planned destination Aggregate data largely sufficient Sometimes point data sufficient (e.g., accident)  Service: Need to know current location, destination Can this be provided anonymously?  Background information Road network Calendar / events  Data quality / Granularity Granularity: road segment Outlier events – exact Frequency – probably want relatively close to exact, particularly when near capacity Seminar 08471: Geographic Privacy-Aware Knowledge Discovery and Delivery

Research on anonymized (geo) Health Info.: Information Required  Geospatial information Sensor-based / atmospheric conditions Geography – relevant semantics Telemedicine – magnifies geospatial variables Ex: Continuous heart monitoring  Frequent vs. outlier Outlier population / Adverse Drug Events Sporadic events (e.g., heart conditions)  Location vs. trajectory referenced with conditions Conditions inferred from trajectory and georeferenced data Correlation between individuals based on colocation (not necessarily in time)  Data quality Exact? Probabilistic? Generalization of truth? (Don’t tell them what the real data is)  Define policy before technology hits the market Seminar 08471: Geographic Privacy-Aware Knowledge Discovery and Delivery

Privacy and Web 2.0  Change in sensitivity?  What does privacy mean when people volunteer/publish data? (Particularly mobile/georeferenced data)  Interplay of privacy and trust  Do people know what they are giving up? Inference Archival  Psychological privacy vs. quantifiable risk  Context for privacy How does integration of other data with location affect privacy? Anonymity in the presence of external information? Seminar 08471: Geographic Privacy-Aware Knowledge Discovery and Delivery

Seminar Proceedings Killer App  Traffic Data  Health Data Research Web 2.0 outline  Kinds of geospatial self- published data  Uses  Risks / (Mis)uses  What do we do about this? Education Regulation Policy Technology Risk Assessment Research Agenda Seminar 08471: Geographic Privacy-Aware Knowledge Discovery and Delivery

Other “next steps” Seminar 08471: Geographic Privacy-Aware Knowledge Discovery and Delivery

Seminar Proceedings  Killer Apps. for anonymized data Description Data needs Anonymity/privacy  Traffic Data  Health  Privacy in Web 2.0 What is self-published geospatial data? Uses/value? Privacy concerns: Risk Perceptions Recommendations Seminar 08471: Geographic Privacy-Aware Knowledge Discovery and Delivery

Data Representation Enable use of existing tools?  Identical to real data Reconstruct representative trajectories (Saygin, Nergiz, Atzori GIS’08)  Region bounds  Region distributions (PDF) Seminar 08471: Geographic Privacy-Aware Knowledge Discovery and Delivery

Context for Privacy Discussion Topic / Working Group Seminar 08471