the view from computation and algorithms andrew olney university of memphis

15
The View from Computation and Algorithms Andrew Olney University of Memphis

Upload: prudence-wood

Post on 29-Dec-2015

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: The View from Computation and Algorithms Andrew Olney University of Memphis

The View from Computation and Algorithms

Andrew OlneyUniversity of Memphis

Page 2: The View from Computation and Algorithms Andrew Olney University of Memphis

This Session

• Una-May O’Reilly– MOOCs: Research collaboration, data privacy, and

the role of technology

• Shuangbao Wang– The illusion of privacy in an age of cyberinsecurity

• Solon Barocas– Big data and unexpected threats to privacy

Page 3: The View from Computation and Algorithms Andrew Olney University of Memphis

My Background

• Research– Language, Education, AI

• Data– Video, Speech, Motion, Posture, Text, EEG,

Eyetracking, Learning, Decisions/Judgments

• Admin

Page 4: The View from Computation and Algorithms Andrew Olney University of Memphis

MOOCdb (Una-May)

• Open-ended standard data description

• Enable cross-course analysis

Page 5: The View from Computation and Algorithms Andrew Olney University of Memphis

Video (Shuangbao)

• Automated video content analysis (inVideo)– Audio: keywords/language patterns– Video: reference pictures/knowledge

• inVideo could be applied to provide rich data on videos, turn them into more effective learning tools, and improve MOOCs

Page 6: The View from Computation and Algorithms Andrew Olney University of Memphis

Privacy Threats (Solon)

• Benefits– Scientific knowledge– Decision making– Self knowledge

• Privacy protections must be sufficient to enable benefits• Problems

– Anonymity is an oxymoron• An identifier is an identifier• De-anonymization• Inference

– Informed consent cannot be guaranteed– Tyranny of the minority – the Target case

• Risk assessment

Page 7: The View from Computation and Algorithms Andrew Olney University of Memphis

Focus Questions

• Threats/harms– De-anonymization– Public perception/discouragement

• Potential value– Scientific knowledge– Decision making– Self knowledge

• What IRB should do

Page 8: The View from Computation and Algorithms Andrew Olney University of Memphis

Deanonymization

• Encryption?

• Self-identification– AOL’s 4417749

• Cross-comparison – Netflix (external)– Target (internal)

Page 9: The View from Computation and Algorithms Andrew Olney University of Memphis

Identifiability

• How much “encryption” is enough?– Time vs. set size

• Is it possible to guarantee?– Relative to data type– Relative to cross-comparison

Page 10: The View from Computation and Algorithms Andrew Olney University of Memphis

Identifiable data types

• Important characteristics– Stationary– Distinctive

• Face• Vocal tracts• Movement• Word choice

Page 11: The View from Computation and Algorithms Andrew Olney University of Memphis

Cross-comparison

Page 12: The View from Computation and Algorithms Andrew Olney University of Memphis

Threats

• Deanonymization very real– Low dimensionality data set with “vanilla”

indicators

• “Real World” data makes it worse– More chance of cross-comparison– But this is where the interesting questions are

Page 13: The View from Computation and Algorithms Andrew Olney University of Memphis

What should IRB do?

• Risk analysis – centered– Worst case scenario considered for

privacy/confidentiality breach

• How will data be shared– Is public ‘anonymized’ warranted?– Restricted-use

Page 14: The View from Computation and Algorithms Andrew Olney University of Memphis
Page 15: The View from Computation and Algorithms Andrew Olney University of Memphis

Questions?

http://andrewmolney.name