Infringement of Individual Privacy via Mining Differentially Private GWAS Statistics

Author(s):  
Yue Wang ◽  
Jia Wen ◽  
Xintao Wu ◽  
Xinghua Shi
Keyword(s):  
MedienJournal ◽  
2020 ◽  
Vol 44 (1) ◽  
pp. 41-54
Author(s):  
Isabell Koinig

The youth constitutes the largest user base of social media networks. While this generation has grown up in a digitally immersed environment, they are still not immune to the dangers the online space bears. Hence, maintaining their privacy is paramount. The present article presents a theoretical contribution, that is based on a review of relevant articles. It sets out to investigate the importance adolescents attribute to online privacy, which is likely to influence their willingness to disclose data. In line with a “new privacy paradox”, information disclosure is seen as unavoidable, given the centrality of social networks to adolescents’ lives. This goes hand in hand with individual privacy management. As individuals often lack knowledge as to how to protect their privacy, it is essential to educate the youth about their possibilities, equipping them with agency and self-responsibilization. This corresponds with a teen-centric approach to privacy as proposed by the TOSS framework.


MedienJournal ◽  
2020 ◽  
Vol 44 (1) ◽  
pp. 41-54
Author(s):  
Isabell Koinig

The youth constitutes the largest user base of social media networks. While this generation has grown up in a digitally immersed environment, they are still not immune to the dangers the online space bears. Hence, maintaining their privacy is paramount. The present article presents a theoretical contribution, that is based on a review of relevant articles. It sets out to investigate the importance adolescents attribute to online privacy, which is likely to influence their willingness to disclose data. In line with a “new privacy paradox”, information disclosure is seen as unavoidable, given the centrality of social networks to adolescents’ lives. This goes hand in hand with individual privacy management. As individuals often lack knowledge as to how to protect their privacy, it is essential to educate the youth about their possibilities, equipping them with agency and self-responsibilization. This corresponds with a teen-centric approach to privacy as proposed by the TOSS framework.


2016 ◽  
Vol 24 (1) ◽  
pp. 93-115 ◽  
Author(s):  
Xiaoying Yu ◽  
Qi Liao

Purpose – Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical to the security of our systems. However, due to the explosion of user accounts and increasing complexity of password rules, users are struggling to find ways to make up sufficiently secure yet easy-to-remember passwords. This paper aims to investigate whether there are repetitive patterns when users choose passwords and how such behaviors may affect us to rethink password security policy. Design/methodology/approach – The authors develop a model to formalize the password repetitive problem and design efficient algorithms to analyze the repeat patterns. To help security practitioners to analyze patterns, the authors design and implement a lightweight, Web-based visualization tool for interactive exploration of password data. Findings – Through case studies on a real-world leaked password data set, the authors demonstrate how the tool can be used to identify various interesting patterns, e.g. shorter substrings of the same type used to make up longer strings, which are then repeated to make up the final passwords, suggesting that the length requirement of password policy does not necessarily increase security. Originality/value – The contributions of this study are two-fold. First, the authors formalize the problem of password repetitive patterns by considering both short and long substrings and in both directions, which have not yet been considered in past. Efficient algorithms are developed and implemented that can analyze various repeat patterns quickly even in large data set. Second, the authors design and implement four novel visualization views that are particularly useful for exploration of password repeat patterns, i.e. the character frequency charts view, the short repeat heatmap view, the long repeat parallel coordinates view and the repeat word cloud view.


Author(s):  
Dedi Gunawan ◽  
Yusuf Sulistyo Nugroho ◽  
Maryam ◽  
Fatah Yasin Al Irsyadi

2015 ◽  
Vol 34 (23) ◽  
pp. 3081-3103 ◽  
Author(s):  
Christine M. O'Keefe ◽  
Donald B. Rubin

Author(s):  
Kerina H Jones ◽  
Arron S Lacey ◽  
Brian L Perkins ◽  
Mark I Rees

ABSTRACTObjectivesData safe havens can bring together and combine a rich array of anonymised person-based data for research and policy evaluation within a secure setting. To date, the majority of available datasets have been structured micro-data derived from routine health-related records. Possibilities are opening up for the greater reuse of genomic data such as Genome Wide Association studies (GWAS) and Whole Exome/Genome Sequencing (WES or WGS). However, there are considerable challenges to be addressed if the benefits of using these data in combination with health-related data are to be realized safely. ApproachWe explore the benefits and challenges of using genomic datasets with health-related data, and using the Secure Anonymised Information Linkage (SAIL) system as a case study, the implications and way forward for Data Safe Havens in seeking to incorporate genomic data for use with health-related data. ResultsThe benefits of using GWAS, WES and WGS data in conjunction with health-related data include the potential to explore genetics at a population level and open up novel research areas. These include the ability to increasingly stratify and personalize how medical indications are detected and treated through precision medicine by understanding rare conditions and adding socioeconomic and environmental context to genomic data. Among the challenges are: data availability, computing capacity, technical solutions, legal and regulatory frameworks, public perceptions, individual privacy and organizational risk. Many of the challenges within these areas are common to person-based data in general, and often Data Safe Havens have been designed to address these. But there are also aspects of these challenges, and other challenges, specific to genomic data. These include issues due to the unknown clinical significance of genomic information now or in the future, with corresponding risks for privacy and impact on individuals. ConclusionGenomic data sets contain vast amounts of valuable information, some of which is currently undefined, but which may have direct bearing on individual health at some point. The use of these data in combination with health-related data has the potential to bring great benefits, better clinical trial stratification, epidemiology project design and clinical improvements. It is, therefore, essential that such data are surrounded by a properly-designed, robust governance framework including technical and procedural access controls that enable the data to be used safely.


2019 ◽  
Author(s):  
Fabian Stephany

User data fuel the digital economy, while individual privacy is at stake. Governments react differently to this challenge. Estonia, a small Baltic state, has become a role model for the renewal of the social contract in times of big data (hence, often ironically referred to as "E-stonia"). While e-governance usage has been growing in many parts of Europe during the last ten years, some regions are lagging behind. The Estonian example suggests that online governance is most accepted in a small state, with a young population, trustworthy institutions and the need of technological renewal. This work examines the development of e-governance usage (citizens interacting digitally with the government) during the last decade in Europe from a comprehensive cross-country perspective: Size, age and trust are relevant for the usage of digital government services in Europe. However, the quality of past communication infrastructure is not related to e-governance popularity.


2014 ◽  
Vol 9 (1) ◽  
pp. 12-24
Author(s):  
Michael Comerford

The plethora of new data sources, combined with a growing interest in increased access to previously unpublished data, poses a set of ethical challenges regarding individual privacy. This paper sets out one aspect of those challenges: the need to anonymise data in such a form that protects the privacy of individuals while providing sufficient data utility for data users. This issue is discussed using a case study of Scottish Government’s administrative data, in which disclosure risk is examined and data utility is assessed using a potential ‘real-world’ analysis.


2021 ◽  
Author(s):  
Julie Gustavel

Issues about informational privacy have emerged in tandem with the escalating increase in nformation stored in electronic formats. Data protection is a pressing issue not only because files of personal information are being kept in greater detail and for longer periods of time, but also because the data can be retrieved and compared or matched without delay, regardless of geography. While defenders of information technology cite efficiency and safety among the countervailing benefits, concerns from an increasingly tech-savvy public have introduced a sense of urgency to demand tough legislation. Although many studies have provided evidence of online privacy concerns, few have explored the nature of the concern in detail, especially in terms of government policy for our new online environment. Bill C-6, Canada's recent legislative action, has provided a practical basis from which to appraise governments' role in privacy protection. With this in mind, the paper will be divided into two parts. Part one will be undertaken to: (A) evaluate the arguments of critics as well as defenders of contemporary record-keeping practices and the philosophical conceptions of privacy, which underlie them; and, using these themes (B) provide a comprehensive assessment of the effectiveness of Bill C- 6, examining the ways in which policy makers have begun to treat privacy as both a commodity and a secondary adjunct to business activity. Part two of the paper, purposes a series of recommendations or, more specifically, a framework for Bill C-6 that would, more effectively, protect individual privacy from private entities, who collect online data.


Sign in / Sign up

Export Citation Format

Share Document