Sean Mulvany, Ph.D Technology Transfer Case Manager

Slides:



Advertisements
Similar presentations
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Advertisements

Security+ Guide to Network Security Fundamentals
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
MS Excel Lesson 5 – Creating Formulae. MS Excel - formula All formulae start with an = sign as seen in the formula box. Formulae designate cells rather.
Private Information Shielding Service for Overcoming Privacy Risk in Recommender System Choong Hee Lee, Junseok Hwang.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Introduction With TimeCard users can tag SharePoint events with information that converts them into time sheets. This way they can report.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
EGovernment Ireland’s eGovernment Strategy Enda Holland, Department of Public Expenditure and Reform.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
The Banner HR User’s Guide to the Affirmative Action Summary Data Form, NZAAADC USNH HR November 2006.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
The Data Protection Act & Facebook Privacy Group CTutor: Corina Cirstea.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Verification After Testing Before submitting completed answer sheets, please ensure the following: All student names are filled in, legible, and spelled.
Cognos Report Studio Prompts and Subqueries. Creating a Prompt In the Query Explorer, drag the field that will require a criteria prompt into the filter.
Keeping Updated Ensuring hospital IT systems support ePortfolio.
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
Networks ∙ Services ∙ People Nicole Harris UK federation meeting eduGAIN, REFEDS and the UK 23 June 2015 Project Development Officer GÉANT.
Infinite Campus Training Teachers will demonstrate application of Infinite Campus teacher tools by preparing their grade book for the academic year.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
PRIVACY AND DATA PROTECTION in THE BIG DATA AGE JONATHAN PRICE.
CIS-2005 : Xi’an - China 1 A New Conceptual Framework within Information Privacy: Meta Privacy Mr. Geoff Skinner Dr Song Han Prof. Elizabeth Chang Curtin.
Fine Tuning: Six Things You Can Do Right Now to Improve Your Information Security Chad Carrington.
An agency of the European Union Guidance on the anonymisation of clinical reports for the purpose of publication in accordance with policy 0070 Industry.
The future of data protection: General Data Protection Regulation
Remote access to research data files resulting from linkages
Naviance Class of 2017.
Creating an Online Test Session
Dr. Victoria Banti-Markouti
What Does GDPR mean for you
IBM Rational Rhapsody Advanced Systems Training v7.5
The Irish Economy: Prospects in Uncertain Times
MODELOS DE GESTIÓN DE CALIDAD
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
World Wide Web policy.
Web Development Web Servers.
Sourcing Event Tool Kit Multiline Sourcing, Market Baskets and Bundles
Security.
Anonymous Communication
A new Privacy Policy for the University of Pennsylvania Libraries
Social Media: What You Should Know
Introduction With TimeCard users can tag SharePoint events with information that converts them into time sheets. This way they can report.
Students Welcome to “Students” training module..
Android App Food Ordering | Food Ordering Android App | Android App Food Delivery | Android App Foodpanda
Radar Watchkeeping: Have you monitored your Communication department’s radar to avoid collisions with the new Regulation? 43rd EDPS-DPO meeting, 31 May.
By (Group 17) Mahesha Yelluru Rao Surabhee Sinha Deep Vakharia
The Household Consumer
Privacy Preserving Data Mining
Anonymous Communication
What's in an Ad? Connor Leonhardt.
Encryption and Hacking
The activity of Art. 29. Working Party György Halmos
HP ALM Defects Module To protect the confidential and proprietary information included in this material, it may not be disclosed or provided to any third.
IAS 40 Investment Property
How to upgrade your RSFORM!PRO forms for GDPR compliance
I (do not) consent to behavioural advertising
Project to set up service for secure remote access to research data files resulting from linkages IASSIST 2007.
4CeeD Demonstration Step-by-step demonstration showing creation, uploading, and sharing of research data Timothy Spila, Ph.D. June 4, 2018.
College I am thinking of and applying to
A Glimpse of Recommender Systems on the Web
Anonymous Communication
Exploiting Unintended Feature Leakage in Collaborative Learning
Cross Site Request Forgery (CSRF)
Should we also regulate non-personal data?
Presentation transcript:

Sean Mulvany, Ph.D Technology Transfer Case Manager Privacy ensuring recommender system Sean Mulvany, Ph.D Technology Transfer Case Manager Trinity Research & Innovation
Trinity College Dublin, the University of Dublin, Dublin 2, Ireland.
 +353 86 3181881 +353 1 896 4985 sean.mulvany@tcd.ie @seanmulvany

OVERVIEW Currently Users rate some items (directly, by clicking, buying, viewing, pairwise comparison etc), task of the recommender is to predict their ratings for other items of interest. The pattern of item ratings supplied by a user by itself can identify that user, even if not explicitly tagged with a user id. Already demonstrated in the wild e.g. netflix/IMDB de-anonymisation attack. Privacy/data protection concerns, e.g. in EU, mean: User ratings data, even if anonymised by removing user IDs, cannot be used for other purposes or sold to third parties Inadvertent release of ratings data, e.g. due to mishap or hacking, carries excessive privacy and reputational risk Growing user unease

BLC Private Recommender BLC Uses Shared Identities (“nyms”) For Privacy Users rate items as before, e.g. in app or browser. But now app/browser selects a shared identity/nym and submits ratings using this The system only ever sees/stores (nym, item, rating) information. A “hiding in the crowd” type of privacy, which comes with strong guarantees. Even if nym used by user is inadvertently disclosed, items rated by user are not revealed. Easily understood by users No degradation in prediction performance, no need to add “noise” to ratings to gain privacy

Excellent Recommendation Performance Shared Identities Improve Prediction Performance As Well As Privacy It is already widely recognised, e.g. by advertisers, that users can be grouped into categories by taste, demographic, location etc Grouping boosts the prediction performance of collaborative filters, if groups are chosen well, since users sharing a group are much more alike than the general population. State of the art performance “out of the box”, no fine-tuning

Thank You http://www.tcd.ie/research_innovation/ http://www.tcd.ie/research_innovation/technology/