The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Understanding bike trip patterns in a bike sharing system is important for researchers designing models for station placement and bike scheduling. By bike trip patterns, we refer to the large number of bike trips observed between two stations. However, due to privacy and operational concerns, bike trip data are usually not made publicly available. In this paper, instead of relying on time-consuming...
Today big data is synonymous with every business and organization, so much so that data brokers have made a business of trading this big data like any other commodity. In turn, the buyers of this big data make massive profits. The only one who loses out on profits and his privacy is the internet user — the generator and owner of this big data. Our work looks at allowing the user to monetize on his...
Among the privacy-preserving approaches that are known in the literature, h-anonymity remains the basis of more advanced models while still being useful as a stand-alone solution. Applying h-anonymity in practice, though, incurs severe loss of data utility, thus limiting its effectiveness and reliability in real-life applications and systems. However, such loss in utility does not necessarily arise...
This paper describes a functional view of a privacy architecture based on a shared-services model. The architecture exposes 7 functional management components: Master Management, Privacy Monitoring, Private Data Identification, Policy Management, Privacy Service Injection, Privacy Logging, and Privacy Analytics for (re)use by multiple applications operating in heterogeneous Big Data environments....
Sequential, predominantly temporal nature of the vast amounts of big data released every day from many different sources could potentially be linked, aligned along the time and deliver new evidence for the next generation predictive systems or knowledge discovery engines. However, big data owners are reluctant to share their data due to legally binding privacy and identity protection concerns, thereby...
In the face of heterogeneity, privacy laws and the scale of various data sources, Privacy Preserving Record Linkage is an increasingly relevant topic for organizations that intent to collaborate on a data level. In addition, new collaboration scenarios require an exchange that would take place online and in real-time. To address these needs, in this paper we present a framework for consensual and...
This paper discusses how born-digital cultural material can be opened up for research. We focus in particular on the grey area between private mobile phone data and its publication and use for research and beyond. We report on the results of the ‘Empowering Data Citizens’ (EDC) project, which is a collaboration between King's College London and the Open Data Institute. The work builds on the project...
Traditional security techniques (e.g., authorization and encryption) have been extensively used in data management systems to provide security and privacy for many years. However, recent security breaches (e.g., WikiLeaks) showed that even if perfect access control is achieved, malicious insiders can still infer sensitive information and can misuse this sensitive information. To address this issue,...
Set-valued dataset contains different types of items/values per individual, for example, visited locations, purchased goods, watched movies, or search queries. As it is relatively easy to re-identify individuals in such datasets, their release poses significant privacy threats. Hence, organizations aiming to share such datasets must adhere to personal data regulations. In order to get rid of these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.