2,671 research outputs found

    Obfuscation and anonymization methods for locational privacy protection : a systematic literature review

    Get PDF
    Dissertation submitted in partial fulfilment of the requirements for the Degree of Master of Science in Geospatial TechnologiesThe mobile technology development combined with the business model of a majority of application companies is posing a potential risk to individuals’ privacy. Because the industry default practice is unrestricted data collection. Although, the data collection has virtuous usage in improve services and procedures; it also undermines user’s privacy. For that reason is crucial to learn what is the privacy protection mechanism state-of-art. Privacy protection can be pursued by passing new regulation and developing preserving mechanism. Understanding in what extent the current technology is capable to protect devices or systems is important to drive the advancements in the privacy preserving field, addressing the limits and challenges to deploy mechanism with a reasonable quality of Service-QoS level. This research aims to display and discuss the current privacy preserving schemes, its capabilities, limitations and challenges

    Catch, Clean, and Release: A Survey of Obstacles and Opportunities for Network Trace Sanitization

    Get PDF
    Network researchers benefit tremendously from access to traces of production networks, and several repositories of such network traces exist. By their very nature, these traces capture sensitive business and personal activity. Furthermore, network traces contain significant operational information about the target network, such as its structure, identity of the network provider, or addresses of important servers. To protect private or proprietary information, researchers must “sanitize” a trace before sharing it. \par In this chapter, we survey the growing body of research that addresses the risks, methods, and evaluation of network trace sanitization. Research on the risks of network trace sanitization attempts to extract information from published network traces, while research on sanitization methods investigates approaches that may protect against such attacks. Although researchers have recently proposed both quantitative and qualitative methods to evaluate the effectiveness of sanitization methods, such work has several shortcomings, some of which we highlight in a discussion of open problems. Sanitizing a network trace, however challenging, remains an important method for advancing network–based research

    From Epistemic Bubbles to Generative Possibilities: Knowledge Leadership and Knowledge Mobilization for Child and Youth Care Practicum Education

    Get PDF
    Child and Youth Care (CYC) Practicum Education (CYCPE) operates in more than 40 public postsecondary institutions (PSI) across Canada. CYC educators instruct and assess, while supervisors mentor thousands of students at child, youth, and family-serving organizations. As an emerging profession, CYC does not yet experience well-established governance, widespread postsecondary research infrastructure, nor public recognition, leaving CYCPE with threats to its credibility and existence. Despite individual CYC educators’ and programs’ extensive professional knowledge, we lack CYC-specific CYCPE organizational knowledge. This problem of practice (PoP) limits CYC educators’ ability to inform, improve, and innovate upon CYCPE’s design and delivery. This organizational improvement plan (OIP) positions CYCPE as an organization, to propose change initiatives that will disrupt its epistemic bubble. A critical postmodern (CPM) perspective forefronts tensions generatively. Organizational culture and discourse theory’s concepts provide a framework to analyze the PoP. Knowledge Leadership (KL)—within a Distributed Leadership (DL) higher education context, along a River Change Model (RCM) change process—propels a change initiative toward a desired state. Organizational knowledge creation and knowledge mobilization (KMb) expands CYCPE’s possibilities. By way of a CYCPE Consciousness-Raising Campaign, two streams of faculty-led change activities are detailed. This inquiry provides a novel perspective on CYCPE’s organization; syntheses of CYCPE’s extant data; application of KL in experiential education; and modification of Outcomes Harvesting (OH) to measure the change initiative’s contributions to a complex context. Ultimately, this inquiry is a call to action, for CYC educators to create and mobilize organizational knowledge, to benefit CYCPE’s complex design and delivery

    Guest Editorial: Ethics and Privacy in Learning Analytics

    Get PDF
    The European Learning Analytics Community Exchange (LACE) project is responsible for an ongoing series of workshops on ethics and privacy in learning analytics (EP4LA), which have been responsible for driving and transforming activity in these areas. Some of this activity has been brought together with other work in the papers that make up this special issue. These papers cover the creation and development of ethical frameworks, as well as tools and approaches that can be used to address issues of ethics and privacy. This editorial suggests that it is worth taking time to consider the often intertangled issues of ethics, data protection and privacy separately. The challenges mentioned within the special issue are summarised in a table of 22 challenges that are used to identify the values that underpin work in this area. Nine ethical goals are suggested as the editors’ interpretation of the unstated values that lie behind the challenges raised in this paper

    Protecting privacy of semantic trajectory

    Get PDF
    The growing ubiquity of GPS-enabled devices in everyday life has made large-scale collection of trajectories feasible, providing ever-growing opportunities for human movement analysis. However, publishing this vulnerable data is accompanied by increasing concerns about individuals’ geoprivacy. This thesis has two objectives: (1) propose a privacy protection framework for semantic trajectories and (2) develop a Python toolbox in ArcGIS Pro environment for non-expert users to enable them to anonymize trajectory data. The former aims to prevent users’ re-identification when knowing the important locations or any random spatiotemporal points of users by swapping their important locations to new locations with the same semantics and unlinking the users from their trajectories. This is accomplished by converting GPS points into sequences of visited meaningful locations and moves and integrating several anonymization techniques. The second component of this thesis implements privacy protection in a way that even users without deep knowledge of anonymization and coding skills can anonymize their data by offering an all-in-one toolbox. By proposing and implementing this framework and toolbox, we hope that trajectory privacy is better protected in research

    Privacy and Anonymization of Neighborhoods in Multiplex Networks

    Get PDF
    Since the beginning of the digital age, the amount of available data on human behaviour has dramatically increased, along with the risk for the privacy of the represented subjects. Since the analysis of those data can bring advances to science, it is important to share them while preserving the subjects' anonymity. A significant portion of the available information can be modelled as networks, introducing an additional privacy risk related to the structure of the data themselves. For instance, in a social network, people can be uniquely identifiable because of the structure of their neighborhood, formed by the amount of their friends and the connections between them. The neighborhood's structure is the target of an identity disclosure attack on released social network data, called neighborhood attack. To mitigate this threat, algorithms to anonymize networks have been proposed. However, this problem has not been deeply studied on multiplex networks, which combine different social network data into a single representation. The multiplex network representation makes the neighborhood attack setting more complicated, and adds information that an attacker can use to re-identify subjects. This thesis aims to understand how multiplex networks behave in terms of anonymization difficulty and neighborhood attack. We present two definitions of multiplex neighborhoods, and discuss how the fraction of nodes with unique neighborhoods can be affected. Through analysis of network models, we study the variation of the uniqueness of neighborhoods in networks with different structure and characteristics. We show that the uniqueness of neighborhoods has a linear trend depending on the network size and average degree. If the network has a more random structure, the uniqueness decreases significantly when the network size increases. On the other hand, if the local structure is more pronounced, the uniqueness is not strongly influenced by the number of nodes. We also conduct a motif analysis to study the recurring patterns that can make social networks' neighborhoods less unique. Lastly, we propose an algorithm to anonymize a pair of multiplex neighborhoods. This algorithm is the core building block that can be used in a method to prevent neighborhood attacks on multiplex networks

    Advancing Employee Engagement With Internationalization Through Networked Leadership Approaches at a Canadian Community College

    Get PDF
    This organizational improvement plan, undergirded by social network theory, addresses the lack of engagement by many organizational members with an ambitious internationalization goal at Sky College (a pseudonym). The institutional climate is one in which day-to-day challenges prevail and motives for internationalization are questioned. Drawing on system and adaptive leadership, and within the functionalist paradigm, the case is made for advancing 4 factors to increase engagement with internationalization: a shared vision and understanding of internationalization, improving internal communication systems, fostering knowledge creation and sharing, and increasing connections in the network. The proposed solution is a 12-month series of focus on internationalization workshops, presentations, knowledge sharing, and dialogue (Series). To achieve these goals, deliver a successful Series, and advance internationalization as a greater strategic initiative, an integrated framework of change based on the change path model and the dual operating system is presented. Series implementation is situated in the awakening and mobilization phases of the change path model. The framework of change emphasizes creating and maintaining urgency around the big opportunity of internationalization, refining the change vision, and clarifying and adjusting Sky College’s internationalization change initiatives. Although the proposed Series may appear to be a simple solution, from a system leadership perspective, it can prove impactful. This approach can create opportunities for collaboration, mobilize stakeholders, and foster an environment in which the change becomes self-sustaining, becoming embedded within the institution. Similarly, from an adaptive leadership perspective, the Series promotes stakeholders as becoming change agents who collaboratively find their way to solutions. Change leaders work to deepen the debate, facilitate focus, and awaken and mobilize the system toward the desired future state. The Series aims to accomplish this outcome and prime Sky College and its organizational members for achieving the internationalization plan’s ambitious goals
    • …
    corecore