Estimating Age Privacy Leakage in Online Social Networks
|
|
- Francine Beasley
- 7 years ago
- Views:
Transcription
1 Estimating Age Privacy Leakage in Online Social Networks Ratan Dey, Polytechnic Institute of New York University (NYU-Poly) IT Security for the Next Generation American Cup, New York 9-11 November, 2011
2 Motivation Third parties can ascertain private attributes by aggregating information Only 1.5% of 1.47M users reveal age. Whether it is possible to estimate the age of the remaining users i.e., those who aim to hide their ages with a high accuracy? Why Birth year? PAGE 2
3 Our contributions Age estimation Estimate the ages of 1.2M NYC Facebook users, based only on the limited profile information and friendship links provided in March 2010 dataset Develop a novel two step estimation methodology Exploit side information Exploit underlying social network structure Large Datasets July M active users, full profile pages, used as ground truth March M users, limited profile pages, want to estimate of 1.2M users Age Estimation for highly private users PAGE 3
4 Step by step age estimation Utilizing side information Step 0: Low hanging fruit - birth years publicly available. Step 1: Using high school graduation year BY = HSY mentions Step 2: Using Friends high school graduating classes mentions mentions PAGE 4
5 CS Vs Error level graph for step 1 & 2 Utilizing side information Using step 1, we can estimate Birth year for 94% of the users within error level 2 or less. Using step 2, we can estimate Birth year for 85% of the users within error level 2 or less. PAGE 5
6 Summary of results from step 0,1,2 Utilizing side information Let G = {1.2M users, want to estimate ages} Let H = G 0 U G 1 U G 2 Set # NYC users % of NYC users # Ground truth users % of Ground truth users MAE on Ground truth users CS(4) on Ground truth users G 0 15, % 8, % 0 100% G 1 215, % 98, % % G 2 453, % 141, % % H 685, % 248, % % PAGE 6
7 Step 3: Iterative method utilizing social links Initialization (Iteration #0)? C A? B? PAGE 7
8 Step 3: Iterative method utilizing social links Iteration #1? C Assigned ages in iteration #1 PAGE 8
9 Step 3: Iterative method utilizing social links Iteration #2 Assigned ages in iteration #2 x u (i+1) = α x u (i) + (1 α)φ[x v (i), v in F u (i)] BY = MEAN MEDIAN STD or percentiles PAGE 9
10 Reverse Friend Lookup Estimating ages of highly private users For 46.3% of these users we can find at least 15 (NYC) friends. PAGE 10
11 Defenses for the Age Privacy Attack User can configure her privacy settings so that age, high-school graduation year, and friend lists are not available in her limited profile (that is, to non-friends). Reverse lookup can also be potentially used to infer not only age, but also other attributes including religious & political preferences. To prevent reverse friend lookup Please hide me from friends friend lists too PAGE 11
12 Conclusion We investigated how difficult is it to estimate the ages of OSN users who do not reveal their ages publicly. We develop a novel two step procedure Exploit side information like high school graduation year or high school graduation year of friends Exploit the underlying social network structure to develop an iterative algorithm Iterative method can be potentially used to infer not only age, but also other attributes. Our overall methodology able to estimate the ages of 84% of the NYC users with a 4 year mean absolute error. It is very hard for a user to avoid privacy leakages, even if the user takes maximal measures to do so. Our work casts serious doubts on age privacy in OSNs. PAGE 12
13 Thank You Ratan Dey, Polytechnic Institute of New York University (NYU-Poly) IT Security for the Next Generation American Cup, New York 9-11 November, 2011
The High-School Profiling Attack: How Online Privacy Laws Can Actually Increase Minors Risk
The High-School Profiling Attack: How Online Privacy Laws Can Actually Increase Minors Risk Ratan Dey, Yuan Ding, Keith W Ross Polytechnic Institute of New York University, Brooklyn, New York ratan@cis.poly.edu,dingyuan1987@gmail.com,ross@poly.edu
More informationDynamic Trust Management for the Internet of Things Applications
Dynamic Trust Management for the Internet of Things Applications Fenye Bao and Ing-Ray Chen Department of Computer Science, Virginia Tech Self-IoT 2012 1 Sept. 17, 2012, San Jose, CA, USA Contents Introduction
More informationProfiling High-School Students with Facebook: How Online Privacy Laws Can Actually Increase Minors Risk
Profiling High-School Students with Facebook: How Online Privacy Laws Can Actually Increase Minors Risk Ratan Dey Polytechnic Institute of New York University Brooklyn, New York ratan@cis.poly.edu Yuan
More informationMALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
More informationA Social Network-Based Recommender System (SNRS)
A Social Network-Based Recommender System (SNRS) Jianming He and Wesley W. Chu Computer Science Department University of California, Los Angeles, CA 90095 jmhek@cs.ucla.edu, wwc@cs.ucla.edu Abstract. Social
More informationPrivacy Attacks in Social Media Using Photo Tagging Networks: A Case Study with Facebook
Privacy Attacks in Social Media Using Photo Tagging Networks: A Case Study with Facebook ABSTRACT João Paulo Pesce UFMG Brazil jpesce@dcc.ufmg.br Gustavo Rauber UFMG Brazil rauber@dcc.ufmg.br Social-networking
More informationMAXIMIZING THE VALUE OF YOUR NETWORK PENETRATION TESTS. Jay Ferron. CEHi, CISSP, CHFIi, C)PTEi, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM
MAXIMIZING THE VALUE OF YOUR NETWORK PENETRATION TESTS Jay Ferron CEHi, CISSP, CHFIi, C)PTEi, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM jferron@interactivesecuritytraining.com blog.mir.net 203-675-8900
More informationExamining Differences (Comparing Groups) using SPSS Inferential statistics (Part I) Dwayne Devonish
Examining Differences (Comparing Groups) using SPSS Inferential statistics (Part I) Dwayne Devonish Statistics Statistics are quantitative methods of describing, analysing, and drawing inferences (conclusions)
More informationAdvanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know
Whitepaper Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Phone (0) 161 914 7798 www.distology.com info@distology.com detecting the unknown Integrity
More informationSecuring and Accelerating Databases In Minutes using GreenSQL
Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update
More informationHTTPS Traffic Classification
HTTPS Traffic Classification Wazen M. Shbair, Thibault Cholez, Jérôme François, Isabelle Chrisment Jérôme François Inria Nancy Grand Est, France jerome.francois@inria.fr NMLRG - IETF95 April 7th, 2016
More informationHOW ACUNETIX ENSURES WEB APPLICATION SECURITY
HOW ACUNETIX ENSURES WEB APPLICATION SECURITY www.alliancetechpartners.com HOW ACUNETIX ENSURES WEB APPLICATION SECURITY Waiting for a security breach to occur is not an option for businesses that deal
More informationCollaborations between Official Statistics and Academia in the Era of Big Data
Collaborations between Official Statistics and Academia in the Era of Big Data World Statistics Day October 20-21, 2015 Budapest Vijay Nair University of Michigan Past-President of ISI vnn@umich.edu What
More informationCrawling and Detecting Community Structure in Online Social Networks using Local Information
Crawling and Detecting Community Structure in Online Social Networks using Local Information TU Delft - Network Architectures and Services (NAS) 1/12 Outline In order to find communities in a graph one
More informationCS346: Advanced Databases
CS346: Advanced Databases Alexandra I. Cristea A.I.Cristea@warwick.ac.uk Data Security and Privacy Outline Chapter: Database Security in Elmasri and Navathe (chapter 24, 6 th Edition) Brief overview of
More informationA Study of Privacy Settings Errors in an Online Social Network
A Study of Privacy Settings Errors in an Online Social Network Michelle Madejski* michelle.madejski@gmail.com Maritza Johnson, Steven M. Bellovin Columbia University {maritzaj,smb}@cs.columbia.edu Abstract
More informationInferring Private Attributes in Online Social Networks
PVM 212-077 Inferring Private Attributes in Online Social Networks Network Architectures and Services Group (NAS) Department of Electrical Engineering, Mathematics and Computer Science Faculty of Electrical
More informationExtracting Information from Social Networks
Extracting Information from Social Networks Aggregating site information to get trends 1 Not limited to social networks Examples Google search logs: flu outbreaks We Feel Fine Bullying 2 Bullying Xu, Jun,
More informationTable of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
More informationBasheer Al-Duwairi Jordan University of Science & Technology
Basheer Al-Duwairi Jordan University of Science & Technology Outline Examples of using network measurements /monitoring Example 1: fast flux detection Example 2: DDoS mitigation as a service Future trends
More informationDetecting false users in Online Rating system & Securing Reputation
Detecting false users in Online Rating system & Securing Reputation ABSTRACT: With the rapid development of reputation systems in various online social networks, manipulations against such systems are
More information(Big) Data Anonymization Claude Castelluccia Inria, Privatics
(Big) Data Anonymization Claude Castelluccia Inria, Privatics BIG DATA: The Risks Singling-out/ Re-Identification: ADV is able to identify the target s record in the published dataset from some know information
More informationData Mining for Customer Relationship Management (CRM)
Data Mining for Customer Relationship Management (CRM) Jaideep Srivastava srivasta@cs.umn.edu 1 Introduction Data Mining has enjoyed great popularity in recent years, with advances in both research and
More informationInformation Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787
Information Security in Big Data: Privacy and Data Mining (IEEE, 2014) Dilara USTAÖMER 2065787 2015/5/13 OUTLINE Introduction User Role Based Methodology Data Provider Data Collector Data Miner Decision
More informationUbiquitous and Mobile Computing CS 528: Information Leakage through Mobile Analytics Services
Ubiquitous and Mobile Computing CS 528: Information Leakage through Mobile Analytics Services Amit Srivastava Computer Science Dept. Worcester Polytechnic Institute (WPI) This paper is about.. Analytics
More informationData Loss Prevention: Data-at-Rest vs. Data-in-Motion
Data Loss Prevention: vs. Data-in-Motion Despite massive security efforts in place today by large organizations, data breaches continue to occur and identity theft is on the rise. Something has to change.
More informationUnderstanding and Specifying Social Access Control Lists
Understanding and Specifying Social Access Control Lists Mainack Mondal MPI-SWS mainack@mpi-sws.org Krishna P. Gummadi MPI-SWS gummadi@mpi-sws.org Yabing Liu Northeastern University ybliu@ccs.neu.edu Alan
More informationProceedings of the Third International Workshop on Formal Methods for Interactive Systems (FMIS 2009)
Electronic Communications of the EASST Volume X (2009) Proceedings of the Third International Workshop on Formal Methods for Interactive Systems (FMIS 2009) Poporo: A Formal Framework for Social Networking
More informationIDENTIFICATION OF KEY LOCATIONS BASED ON ONLINE SOCIAL NETWORK ACTIVITY
H. Efstathiades, D. Antoniades, G. Pallis, M. D. Dikaiakos IDENTIFICATION OF KEY LOCATIONS BASED ON ONLINE SOCIAL NETWORK ACTIVITY 1 Motivation Key Locations information is of high importance for various
More informationAnalyzing the Customer Journey: Attribution Modeling for Online Marketing Exposures in a Multi- Channel Setting
Analyzing the Customer Journey: Attribution Modeling for Marketing Exposures in a Multi- Channel Setting Conference Innovative Approaches to Advertising Effectiveness Eva Anderl, Ingo Becker, Florian v.
More informationChallenges of Data Privacy in the Era of Big Data. Rebecca C. Steorts, Vishesh Karwa Carnegie Mellon University November 18, 2014
Challenges of Data Privacy in the Era of Big Data Rebecca C. Steorts, Vishesh Karwa Carnegie Mellon University November 18, 2014 1 Outline Why should we care? What is privacy? How do achieve privacy? Big
More informationData mining successfully extracts knowledge to
C O V E R F E A T U R E Privacy-Preserving Data Mining Systems Nan Zhang University of Texas at Arlington Wei Zhao Rensselaer Polytechnic Institute Although successful in many applications, data mining
More informationFacebook Friend Suggestion Eytan Daniyalzade and Tim Lipus
Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus 1. Introduction Facebook is a social networking website with an open platform that enables developers to extract and utilize user information
More informationGE Energy Transformer Monitoring: How Moving forward from Monitoring to Diagnostics can Positively Impact Indian Business and Industry
GE Energy Transformer Monitoring: How Moving forward from Monitoring to Diagnostics can Positively Impact Indian Business and Industry Brian Sparling, SMIEEE GridTech 2007, Delhi February 5-6, 2007 The
More informationCombining Data from Different Genotyping Platforms. Gonçalo Abecasis Center for Statistical Genetics University of Michigan
Combining Data from Different Genotyping Platforms Gonçalo Abecasis Center for Statistical Genetics University of Michigan The Challenge Detecting small effects requires very large sample sizes Combined
More informationAn apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
More informationOn the Effectiveness of Obfuscation Techniques in Online Social Networks
On the Effectiveness of Obfuscation Techniques in Online Social Networks Terence Chen 1,2, Roksana Boreli 1,2, Mohamed-Ali Kaafar 1,3, and Arik Friedman 1,2 1 NICTA, Australia 2 UNSW, Australia 3 INRIA,
More informationWorkday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
More informationPredictive Analytics
Predictive Analytics How many of you used predictive today? 2015 SAP SE. All rights reserved. 2 2015 SAP SE. All rights reserved. 3 How can you apply predictive to your business? Predictive Analytics is
More informationThinking small about big data: Privacy considerations for the public sector Shaun Brown Partner, nnovation LLP
Thinking small about big data: Privacy considerations for the public sector Shaun Brown Partner, nnovation LLP March 30, 2016 Thinking small about big data: objectives Consider big data as a concept Focus
More informationManagement Decision Making. Hadi Hosseini CS 330 David R. Cheriton School of Computer Science University of Waterloo July 14, 2011
Management Decision Making Hadi Hosseini CS 330 David R. Cheriton School of Computer Science University of Waterloo July 14, 2011 Management decision making Decision making Spreadsheet exercise Data visualization,
More informationCOURSE SYLLABUS COURSE TITLE:
1 COURSE SYLLABUS COURSE TITLE: FORMAT: CERTIFICATION EXAMS: 55043AC Microsoft End to End Business Intelligence Boot Camp Instructor-led None This course syllabus should be used to determine whether the
More informationALDR: A New Metric for Measuring Effective Layering of Defenses
ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs Department of Computer Science Columbia University boggs@cs.columbia.edu Salvatore J. Stolfo Department of Computer Science
More informationProblem of the Month Through the Grapevine
The Problems of the Month (POM) are used in a variety of ways to promote problem solving and to foster the first standard of mathematical practice from the Common Core State Standards: Make sense of problems
More informationStatistical Challenges with Big Data in Management Science
Statistical Challenges with Big Data in Management Science Arnab Kumar Laha Indian Institute of Management Ahmedabad Analytics vs Reporting Competitive Advantage Reporting Prescriptive Analytics (Decision
More informationA Novel Defense Mechanism against Distributed Denial of Service Attacks using Fuzzy Logic
A Novel Defense Mechanism against Distributed Denial of Service Attacks using Fuzzy Logic Shivani, Er. Amandeep Singh, Dr. Ramesh Chand Kashyap Abstract In this advanced smart life, internet and computer
More informationMATHEMATICS QUESTION TASK CARDS
STRAND A Q-CARD #1 STRAND A Q-CARD #2 Design a question that requires students to understand the different ways numbers are represented and used in the real-world. What is the...of...? Explain how you
More informationAlok Gupta. Dmitry Zhdanov
RESEARCH ARTICLE GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE Alok Gupta Department of Information and Decision Sciences, Carlson School of Management, University
More informationThe 2011 HEC-DowJones Private Equity Performance Ranking. For Release Monday, 14 November 2011
The 2011 HEC-DowJones Private Equity Performance Ranking For Release Monday, 14 November 2011 Executive Summary The 2011 HEC-DowJones Private Equity Performance Ranking lists the world s Top PE firms in
More informationSome Research Challenges for Big Data Analytics of Intelligent Security
Some Research Challenges for Big Data Analytics of Intelligent Security Yuh-Jong Hu hu at cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,
More informationAlignment, Depth of Knowledge, & Change Norman L. Webb Wisconsin Center for Education Research http://facstaff.wcer.wisc.
Alignment, Depth of Knowledge, & Change Norman L. Webb Wisconsin Center for Education Research http://facstaff.wcer.wisc.edu/normw/ Florida Educational Research Association 50 th Annual Meeting Miami,
More informationJVM Performance Study Comparing Oracle HotSpot and Azul Zing Using Apache Cassandra
JVM Performance Study Comparing Oracle HotSpot and Azul Zing Using Apache Cassandra January 2014 Legal Notices Apache Cassandra, Spark and Solr and their respective logos are trademarks or registered trademarks
More informationExchange vs. Dealers: A High-Frequency Analysis of In-Play Betting Prices
Exchange vs. Dealers: A High-Frequency Analysis of In-Play Betting Prices Department of Economics, Lancaster University October 27 2010 Karen Croxson Oxford-Man Institute and University of Oxford J. James
More informationTowards running complex models on big data
Towards running complex models on big data Working with all the genomes in the world without changing the model (too much) Daniel Lawson Heilbronn Institute, University of Bristol 2013 1 / 17 Motivation
More informationBM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
More informationBig Picture of Big Data Software Engineering With example research challenges
Big Picture of Big Data Software Engineering With example research challenges Nazim H. Madhavji, UWO, Canada Andriy Miranskyy, Ryerson U., Canada Kostas Kontogiannis, NTUA, Greece madhavji@gmail.com avm@ryerson.ca
More informationTo Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 06 (June. 2014), V2 PP 34-38 www.iosrjen.org To Enhance The Security In Data Mining Using Integration Of Cryptograhic
More informationSampling Online Social Networks
Sampling Online Social Networks Athina Markopoulou 1,3 Joint work with: Minas Gjoka 3, Maciej Kurant 3, Carter T. Butts 2,3, Patrick Thiran 4 1 Department of Electrical Engineering and Computer Science
More informationOLAP Online Privacy Control
OLAP Online Privacy Control M. Ragul Vignesh and C. Senthil Kumar Abstract--- The major issue related to the protection of private information in online analytical processing system (OLAP), is the privacy
More informationManaging Incompleteness, Complexity and Scale in Big Data
Managing Incompleteness, Complexity and Scale in Big Data Nick Duffield Electrical and Computer Engineering Texas A&M University http://nickduffield.net/work Three Challenges for Big Data Complexity Problem:
More informationNetwork mining for crime/fraud detection. FuturICT CrimEx January 26th, 2012 Jan Ramon
Network mining for crime/fraud detection FuturICT CrimEx January 26th, 2012 Jan Ramon Overview Administrative data and crime/fraud Data mining and related domains Data mining in large networks Opportunities
More informationFREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
More informationDATA ANALYSIS IN PUBLIC SOCIAL NETWORKS
International Scientific Conference & International Workshop Present Day Trends of Innovations 2012 28 th 29 th May 2012 Łomża, Poland DATA ANALYSIS IN PUBLIC SOCIAL NETWORKS Lubos Takac 1 Michal Zabovsky
More informationEnterprise Forensics and ediscovery (EnCase) Privacy Impact Assessment
Enterprise Forensics and ediscovery (EnCase) Privacy Impact Assessment PIA Approval Date Mar. 14, 2011 System Overview The Enterprise Forensics and ediscovery (EnCase) solution is a major application that
More informationEPSRC Cross-SAT Big Data Workshop: Well Sorted Materials
EPSRC Cross-SAT Big Data Workshop: Well Sorted Materials 5th August 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations
More informationCSCI 6900. Computer Network Attacks and Defenses
CSCI 6900 Computer Network Attacks and Defenses Lecture 2: Overview of research topics in computer and network security (part B) Instructor: Prof. Roberto Perdisci Spam Detection SPAM = Unsolicited bulk
More informationCENTRAL PARK TEMPERATURE THREE RADICALLY DIFFERENT US GOVERNMENT VERSIONS O
CENTRAL PARK TEMPERATURE THREE RADICALLY DIFFERENT US GOVERNMENT VERSIONS O ur national centers regard station data as critical to measure recent climate change. The raw observations are taken from the
More informationLecture 11: Chapter 5, Section 3 Relationships between Two Quantitative Variables; Correlation
Lecture 11: Chapter 5, Section 3 Relationships between Two Quantitative Variables; Correlation Display and Summarize Correlation for Direction and Strength Properties of Correlation Regression Line Cengage
More informationThe Intelligent Data Analysis System for Social Science
The Intelligent Data Analysis System for Social Science - Incorporating Object-oriented and Knowledge-based approaches Alex Liu, Ph.D. Director Research Methods Institute Los Angeles, CA, USA in http://www.researchmethods.org/ida.pdf
More informationAccounting 15.515 Session 4
Accounting 15.515 Revenue Recognition Accounts Receivable Deferred Revenue 1 Why do we care about revenue recognition? We want to understand how Net Income is computed so we can interpret this performance
More informationNino Pellegrino October the 20th, 2015
Learning Behavioral Fingerprints from NetFlows... using Timed Automata Nino Pellegrino October the 20th, 2015 Nino Pellegrino Learning Behavioral Fingerprints October the 20th, 2015 1 / 32 Use case Nino
More informationHow To Stop A Malware From Running On A Computer
A CUCKOO S EGG IN THE MALWARE NEST ON-THE-FLY SIGNATURE-LESS MALWARE ANALYSIS, DETECTION AND CONTAINMENT FOR LARGE NETWORKS CHRISTIAAN SCHADE TWENTE SECURITY LAB UNIVERSITY OF TWENTE THE NETHERLANDS MALWARE
More informationFinding Your Way in Testing Jungle. A Learning Approach to Web Security Testing.
Finding Your Way in Testing Jungle A Learning Approach to Web Security Testing. Research Questions Why is it important to improve website security? What techniques are already in place to test security?
More informationBIG DATA AND ANALYTICS
BIG DATA AND ANALYTICS Björn Bjurling, bgb@sics.se Daniel Gillblad, dgi@sics.se Anders Holst, aho@sics.se Swedish Institute of Computer Science AGENDA What is big data and analytics? and why one must bother
More informationBASIC STATISTICAL METHODS FOR GENOMIC DATA ANALYSIS
BASIC STATISTICAL METHODS FOR GENOMIC DATA ANALYSIS SEEMA JAGGI Indian Agricultural Statistics Research Institute Library Avenue, New Delhi-110 012 seema@iasri.res.in Genomics A genome is an organism s
More informationBitSight Insights Global View. Revealing Security Performance Metrics Across Major World Economies
BitSight Insights Global View Revealing Security Performance Metrics Across Major World Economies Introduction There is no denying the global nature of 21st century business. The export and import of goods
More informationTeaching Computers to Lie Improving Security Using Deception. Mohammed Almeshekah Purdue University
Teaching Computers to Lie Improving Security Using Deception Mohammed Almeshekah Purdue University Holistic View of Information Security Defenses Denial/Isolation > Prevent and Hide Holistic View of Information
More informationLead Generation Lessons From 4,000 Businesses. A study based on real data from 4,000 businesses
Lead Generation Lessons From 4,000 Businesses A study based on real data from 4,000 businesses tempocreative.com tempocreative @tempocreative 480 659 4100 Real Data from 4,000 Businesses This study is
More informationA Cost-efficient Building Automation Security Testbed for Educational Purposes
A Cost-efficient Building Automation Security Testbed for Educational Purposes Jaspreet Kaur, Michael Meier, Sebastian Szlósarczyk and Steffen Wendzel Cyber Security Department Fraunhofer Institute for
More informationBig Data: Key Concepts The three Vs
Big Data: Key Concepts The three Vs Big data in general has context in three Vs: Sheer quantity of data Speed with which data is produced, processed, and digested Diversity of sources inside and outside.
More informationSocial Prediction in Mobile Networks: Can we infer users emotions and social ties?
Social Prediction in Mobile Networks: Can we infer users emotions and social ties? Jie Tang Tsinghua University, China 1 Collaborate with John Hopcroft, Jon Kleinberg (Cornell) Jinghai Rao (Nokia), Jimeng
More information15.00 15.30 30 XML enabled databases. Non relational databases. Guido Rotondi
Programme of the ESTP training course on BIG DATA EFFECTIVE PROCESSING AND ANALYSIS OF VERY LARGE AND UNSTRUCTURED DATA FOR OFFICIAL STATISTICS Rome, 5 9 May 2014 Istat Piazza Indipendenza 4, Room Vanoni
More informationExploiting the dark triad for national defense capabilities. Dimitris Gritzalis
Exploiting the dark triad for national defense capabilities Dimitris Gritzalis May 2015 Exploiting the dark triad for national defense capabilities Professor Dimitris A. Gritzalis (dgrit@aueb.gr) Information
More informationJourney to the West Gábor Pék, PhD
Journey to the West Gábor Pék, PhD CrySyS Lab, Department of Networked Systems and Services Budapest University of Technology and Economics Journey to the West the old way Journey to the West is a Chinese
More informationHigh-Frequency Active Internet Topology Mapping
High-Frequency Active Internet Topology Mapping Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Robert Beverly Assistant Professor Naval Postgraduate School rbeverly@nps.edu
More informationCOPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act
The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview
More informationUsing Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures
Workshop on Novel Approaches to Risk and Security Management for Utility Providers and Critical Infrastructures Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures Xiaobing
More informationA Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1
A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1 Yannis Stavrakas Vassilis Plachouras IMIS / RC ATHENA Athens, Greece {yannis, vplachouras}@imis.athena-innovation.gr Abstract.
More informationPROCEDURE. The permission rights assigned to allow data custodians to view, copy, enter, download, update or query data.
Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act, RSA 2000, c.a-18; Electronic Transactions Act, SA 2001, c.e- 5.5; Freedom of
More informationCOMP 631: COMPUTER NETWORKS. Internet Routing. Jasleen Kaur. Fall 2014. Forwarding vs. Routing: Local vs. Distributed
OMP 3: OMPUTER NETWORKS // OMP 3: OMPUTER NETWORKS Internet Routing Jasleen Kaur Fall 0 Forwarding vs. Routing: Local vs. istributed oth datagram and virtual-circuit based networks need to know how to
More informationClosing the Antivirus Protection Gap
A comparative study on effective endpoint protection strategies May 2012 WP-EN-05-07-12 Introduction Corporate economic concerns have put increased pressure on already limited IT resources in recent years
More informationAcross-Model Collective Ensemble Classification
Across-Model Collective Ensemble Classification Hoda Eldardiry and Jennifer Neville Computer Science Department Purdue University West Lafayette, IN 47907 (hdardiry neville)@cs.purdue.edu Abstract Ensemble
More informationPrivacy: Legal Aspects of Big Data and Information Security
Privacy: Legal Aspects of Big Data and Information Security Presentation at the 2 nd National Open Access Workshop 21-22 October, 2013 Izmir, Turkey John N. Gathegi University of South Florida, Tampa,
More informationDisambiguating Implicit Temporal Queries by Clustering Top Relevant Dates in Web Snippets
Disambiguating Implicit Temporal Queries by Clustering Top Ricardo Campos 1, 4, 6, Alípio Jorge 3, 4, Gaël Dias 2, 6, Célia Nunes 5, 6 1 Tomar Polytechnic Institute, Tomar, Portugal 2 HULTEC/GREYC, University
More informationHealthcare, transportation,
Smart IT Argus456 Dreamstime.com From Data to Decisions: A Value Chain for Big Data H. Gilbert Miller and Peter Mork, Noblis Healthcare, transportation, finance, energy and resource conservation, environmental
More informationEECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
More informationBIG DATA TECHNOLOGY. Hadoop Ecosystem
BIG DATA TECHNOLOGY Hadoop Ecosystem Agenda Background What is Big Data Solution Objective Introduction to Hadoop Hadoop Ecosystem Hybrid EDW Model Predictive Analysis using Hadoop Conclusion What is Big
More informationOn the Placement of Management and Control Functionality in Software Defined Networks
On the Placement of Management and Control Functionality in Software Defined Networks D.Tuncer et al. Department of Electronic & Electrical Engineering University College London, UK ManSDN/NfV 13 November
More informationCyber Security Assessment of Enterprise-Wide Architectures
Cyber Security Assessment of Enterprise-Wide Architectures Mathias Ekstedt, Associate Prof. Industrial Information and Control Systems KTH Royal Institute of Technology Agenda Problem framing Management/design
More informationCounselor Ethics in a Wired World: Best Practices Online
Counselor Ethics in a Wired World: Best Practices Online SECTION A:THE COUNSELING RELATIONSHIP A.1. Welfare of Those Served by Rehabilitation Counselors A.2. Respecting Diversity A.3. Client Rights in
More information