Functional genomics data: privacy risk assessment and technological mitigation

Author(s):  
Gamze Gürsoy ◽  
Tianxiao Li ◽  
Susanna Liu ◽  
Eric Ni ◽  
Charlotte M. Brannon ◽  
...  
Author(s):  
Gamze Gürsoy ◽  
Tianxiao Li ◽  
Susanna Liu ◽  
Eric Ni ◽  
Charlotte M. Brannon ◽  
...  

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Vallari Chandna ◽  
Praneet Tiwari

Purpose Nascent firms and startups are often subject to challenges that their more mature counterparts can avoid. While cybersecurity is an issue that all firms contend with, it is especially challenging for new entrepreneurial ventures who lack the resources and capabilities of established firms. The purpose of this paper is to seek to delve deeper into the cybersecurity and risk management needs of small firms and startups. Design/methodology/approach Extant literature and available tools are explored to develop a usable framework applicable to small firms and new entrepreneurial ventures. Findings The liabilities of newness and smallness make entrepreneurial ventures a unique context in which to study the significance of cybersecurity and data privacy risk management. The authors offer an overview of issues and potential solutions relevant to entrepreneurial ventures. Research limitations/implications While offering practical insights, the work is a theoretical framework. The framework will enable researchers to develop more nuanced theory when it comes to cybersecurity and data privacy risk management. Practical implications The framework illustrates four distinct contexts for cybersecurity and risk management when it comes to the needs of small firms and startups. Adoption levels are explained, and small business operators and entrepreneurs can thus use the framework to determine the most appropriate approach for their enterprise. Originality/value The authors develop a framework illustrating adoption of different security and risk management practices by entrepreneurial ventures based on their specific needs and context. The authors thus offer practical solutions for startups and nascent firms regarding cybersecurity and privacy management.


Author(s):  
Dimitris Geneiatakis ◽  
Charalabos Medentzidis ◽  
Ioannis Kounelis ◽  
Gary Steri ◽  
Igor Nai Fovino

2019 ◽  
Author(s):  
Gamze Gürsoy ◽  
Charlotte M. Brannon ◽  
Fabio C.P. Navarro ◽  
Mark Gerstein

AbstractFunctional genomics data is becoming clinically actionable, raising privacy concerns. However, quantifying the privacy leakage by genotyping is difficult due to the heterogeneous nature of sequencing techniques. Thus, we present FANCY, a tool that rapidly estimates number of leaking variants from raw RNA-Seq, ATAC-Seq and ChIP-Seq reads, without explicit genotyping. FANCY employs supervised regression using overall sequencing statistics as features and provides an estimate of the overall privacy risk before data release. FANCY can predict the cumulative number of leaking SNVs with a 0.95 average R2 for all independent test sets. We acknowledged the importance of accurate prediction even when the number of leaked variants is low, so we developed a special version of model, which can make predictions with higher accuracy for only a few leaking variants. A python and MATLAB implementation of FANCY, as well as custom scripts to generate the features can be found at https://github.com/gersteinlab/FANCY. We also provide jupyter notebooks so that users can optimize the parameters in the regression model based on their own data. An easy-to-use webserver that takes inputs and displays results can be found at fancy.gersteinlab.org.


10.2196/13046 ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. e13046 ◽  
Author(s):  
Mengchun Gong ◽  
Shuang Wang ◽  
Lezi Wang ◽  
Chao Liu ◽  
Jianyang Wang ◽  
...  

Background Patient privacy is a ubiquitous problem around the world. Many existing studies have demonstrated the potential privacy risks associated with sharing of biomedical data. Owing to the increasing need for data sharing and analysis, health care data privacy is drawing more attention. However, to better protect biomedical data privacy, it is essential to assess the privacy risk in the first place. Objective In China, there is no clear regulation for health systems to deidentify data. It is also not known whether a mechanism such as the Health Insurance Portability and Accountability Act (HIPAA) safe harbor policy will achieve sufficient protection. This study aimed to conduct a pilot study using patient data from Chinese hospitals to understand and quantify the privacy risks of Chinese patients. Methods We used g-distinct analysis to evaluate the reidentification risks with regard to the HIPAA safe harbor approach when applied to Chinese patients’ data. More specifically, we estimated the risks based on the HIPAA safe harbor and limited dataset policies by assuming an attacker has background knowledge of the patient from the public domain. Results The experiments were conducted on 0.83 million patients (with data field of date of birth, gender, and surrogate ZIP codes generated based on home address) across 33 provincial-level administrative divisions in China. Under the Limited Dataset policy, 19.58% (163,262/833,235) of the population could be uniquely identifiable under the g-distinct metric (ie, 1-distinct). In contrast, the Safe Harbor policy is able to significantly reduce privacy risk, where only 0.072% (601/833,235) of individuals are uniquely identifiable, and the majority of the population is 3000 indistinguishable (ie the population is expected to share common attributes with 3000 or less people). Conclusions Through the experiments based on real-world patient data, this work illustrates that the results of g-distinct analysis about Chinese patient privacy risk are similar to those from a previous US study, in which data from different organizations/regions might be vulnerable to different reidentification risks under different policies. This work provides reference to Chinese health care entities for estimating patients’ privacy risk during data sharing, which laid the foundation of privacy risk study about Chinese patients’ data in the future.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Zhiru Li ◽  
Wei Xu ◽  
Huibin Shi ◽  
Yuanyuan Zhang ◽  
Yan Yan

Considering the importance of energy in our lives and its impact on other critical infrastructures, this paper starts from the whole life cycle of big data and divides the security and privacy risk factors of energy big data into five stages: data collection, data transmission, data storage, data use, and data destruction. Integrating into the consideration of cloud environment, this paper fully analyzes the risk factors of each stage and establishes a risk assessment index system for the security and privacy of energy big data. According to the different degrees of risk impact, AHP method is used to give indexes weights, genetic algorithm is used to optimize the initial weights and thresholds of BP neural network, and then the optimized weights and thresholds are given to BP neural network, and the evaluation samples in the database are used to train it. Then, the trained model is used to evaluate a case to verify the applicability of the model.


Sign in / Sign up

Export Citation Format

Share Document