The View from Computation and Algorithms Andrew Olney University of Memphis.

15
The View from Computation and Algorithms Andrew Olney University of Memphis

Transcript of The View from Computation and Algorithms Andrew Olney University of Memphis.

Page 1: The View from Computation and Algorithms Andrew Olney University of Memphis.

The View from Computation and Algorithms

Andrew OlneyUniversity of Memphis

Page 2: The View from Computation and Algorithms Andrew Olney University of Memphis.

This Session

• Una-May O’Reilly– MOOCs: Research collaboration, data privacy, and

the role of technology

• Shuangbao Wang– The illusion of privacy in an age of cyberinsecurity

• Solon Barocas– Big data and unexpected threats to privacy

Page 3: The View from Computation and Algorithms Andrew Olney University of Memphis.

My Background

• Research– Language, Education, AI

• Data– Video, Speech, Motion, Posture, Text, EEG,

Eyetracking, Learning, Decisions/Judgments

• Admin

Page 4: The View from Computation and Algorithms Andrew Olney University of Memphis.

MOOCdb (Una-May)

• Open-ended standard data description

• Enable cross-course analysis

Page 5: The View from Computation and Algorithms Andrew Olney University of Memphis.

Video (Shuangbao)

• Automated video content analysis (inVideo)– Audio: keywords/language patterns– Video: reference pictures/knowledge

• inVideo could be applied to provide rich data on videos, turn them into more effective learning tools, and improve MOOCs

Page 6: The View from Computation and Algorithms Andrew Olney University of Memphis.

Privacy Threats (Solon)

• Benefits– Scientific knowledge– Decision making– Self knowledge

• Privacy protections must be sufficient to enable benefits• Problems

– Anonymity is an oxymoron• An identifier is an identifier• De-anonymization• Inference

– Informed consent cannot be guaranteed– Tyranny of the minority – the Target case

• Risk assessment

Page 7: The View from Computation and Algorithms Andrew Olney University of Memphis.

Focus Questions

• Threats/harms– De-anonymization– Public perception/discouragement

• Potential value– Scientific knowledge– Decision making– Self knowledge

• What IRB should do

Page 8: The View from Computation and Algorithms Andrew Olney University of Memphis.

Deanonymization

• Encryption?

• Self-identification– AOL’s 4417749

• Cross-comparison – Netflix (external)– Target (internal)

Page 9: The View from Computation and Algorithms Andrew Olney University of Memphis.

Identifiability

• How much “encryption” is enough?– Time vs. set size

• Is it possible to guarantee?– Relative to data type– Relative to cross-comparison

Page 10: The View from Computation and Algorithms Andrew Olney University of Memphis.

Identifiable data types

• Important characteristics– Stationary– Distinctive

• Face• Vocal tracts• Movement• Word choice

Page 11: The View from Computation and Algorithms Andrew Olney University of Memphis.

Cross-comparison

Page 12: The View from Computation and Algorithms Andrew Olney University of Memphis.

Threats

• Deanonymization very real– Low dimensionality data set with “vanilla”

indicators

• “Real World” data makes it worse– More chance of cross-comparison– But this is where the interesting questions are

Page 13: The View from Computation and Algorithms Andrew Olney University of Memphis.

What should IRB do?

• Risk analysis – centered– Worst case scenario considered for

privacy/confidentiality breach

• How will data be shared– Is public ‘anonymized’ warranted?– Restricted-use

Page 14: The View from Computation and Algorithms Andrew Olney University of Memphis.
Page 15: The View from Computation and Algorithms Andrew Olney University of Memphis.

Questions?

http://andrewmolney.name