منابع مشابه
Control use of data to protect privacy.
Massive data collection by businesses and governments calls into question traditional methods for protecting privacy, underpinned by two core principles: (i) notice, that there should be no data collection system whose existence is secret, and (ii) consent, that data collected for one purpose not be used for another without user permission. But notice, designated as a fundamental privacy princi...
متن کاملDoes Differential Privacy Protect Terry Gross' Privacy?
The concept of differential privacy was motivated through the example of Terry Gross’ height in Dwork (2006). In this paper, we show that when a procedure based on differential privacy is implemented, it neither protects Terry Gross’ privacy nor does it provide meaningful responses to queries. We also provide an additional illustration using income data from the US Census. These illustrations r...
متن کاملMobile phone data for public health: towards data-sharing solutions that protect individual privacy and national security
We outline the constraints faced by operators when deciding to share de-identified data with researchers or policy makers. We describe a conservative approach that we have taken to harness the value of CDRs for infectious disease epidemiology while ensuring that identification of individuals is impossible. We believe this approach serves as a useful and highly conservative model for productive ...
متن کاملCollaborative Research: ITR: Distributed Data Mining to Protect Information Privacy
Data mining technology has emerged as a means of identifying patterns and trends from large quantities of data. Data mining has used a data warehousing model of gathering all data into a central site, then running an algorithm against that data. Privacy considerations may prevent this approach. For example, the Centers for Disease Control (CDC) may want to use data mining to identify trends and...
متن کاملPrivacy for Location Data in Mobile Networks
The new EU Directive 2002/58/EC has introduced with its Art. 9 special protection for location data other than traffic data. In this paper, we argue that also location data within traffic data can contain sensitive information about the ”relative positioning” and ”co-located displacements” of mobile nodes and thus also requires special protection. After a brief introduction to how mobility is s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2014
ISSN: 0028-0836,1476-4687
DOI: 10.1038/514035c