2,347 research outputs found

    Survey: Leakage and Privacy at Inference Time

    Get PDF
    Leakage of data from publicly available Machine Learning (ML) models is an area of growing significance as commercial and government applications of ML can draw on multiple sources of data, potentially including users' and clients' sensitive data. We provide a comprehensive survey of contemporary advances on several fronts, covering involuntary data leakage which is natural to ML models, potential malevolent leakage which is caused by privacy attacks, and currently available defence mechanisms. We focus on inference-time leakage, as the most likely scenario for publicly available models. We first discuss what leakage is in the context of different data, tasks, and model architectures. We then propose a taxonomy across involuntary and malevolent leakage, available defences, followed by the currently available assessment metrics and applications. We conclude with outstanding challenges and open questions, outlining some promising directions for future research

    Garantia de privacidade na exploração de bases de dados distribuídas

    Get PDF
    Anonymisation is currently one of the biggest challenges when sharing sensitive personal information. Its importance depends largely on the application domain, but when dealing with health information, this becomes a more serious issue. A simpler approach to avoid this disclosure is to ensure that all data that can be associated directly with an individual is removed from the original dataset. However, some studies have shown that simple anonymisation procedures can sometimes be reverted using specific patients’ characteristics, namely when the anonymisation is based on hidden key attributes. In this work, we propose a secure architecture to share information from distributed databases without compromising the subjects’ privacy. The work was initially focused on identifying techniques to link information between multiple data sources, in order to revert the anonymization procedures. In a second phase, we developed the methodology to perform queries over distributed databases was proposed. The architecture was validated using a standard data schema that is widely adopted in observational research studies.A garantia da anonimização de dados é atualmente um dos maiores desafios quando existe a necessidade de partilhar informações pessoais de carácter sensível. Apesar de ser um problema transversal a muitos domínios de aplicação, este torna-se mais crítico quando a anonimização envolve dados clinicos. Nestes casos, a abordagem mais comum para evitar a divulgação de dados, que possam ser associados diretamente a um indivíduo, consiste na remoção de atributos identificadores. No entanto, segundo a literatura, esta abordagem não oferece uma garantia total de anonimato, que pode ser quebrada através de ataques específicos que permitem a reidentificação dos sujeitos. Neste trabalho, é proposta uma arquitetura que permite partilhar dados armazenados em repositórios distribuídos, de forma segura e sem comprometer a privacidade. Numa primeira fase deste trabalho, foi feita uma análise de técnicas que permitam reverter os procedimentos de anonimização. Na fase seguinte, foi proposta uma metodologia que permite realizar pesquisas em bases de dados distribuídas, sem que o anonimato seja quebrado. Esta arquitetura foi validada sobre um esquema de base de dados relacional que é amplamente utilizado em estudos clínicos observacionais.Mestrado em Ciberseguranç

    Living Happily in the Era of COVID-19: Philosophical and Positive Psychology Intervention in Secondary Education

    Get PDF
    In the coronavirus pandemic crisis, the mental well-being of adolescents was significantly burdened and, in this context, an innovative school intervention program was applied and its effect was investigated. The program involved a structured 11-weeks-long psycho-educational intervention on a sample of 11 Greek high school students (aged 16-17 years), combining principles of Epicurean and Stoic Philosophy with Positive Psychology techniques, aiming at promoting their mental well-being and the effective management of the psychological effects of the pandemic crisis. A qualitative methodology was used for data collection, including triangulation and data enrichment, self-referential demographic questionnaires, focus group and group interviews, semi-structured individual oral interviews and written descriptions and narratives. Before the intervention, the students’ needs and expectations were investigated through written narratives and, after the intervention, semi-structured individual oral interviews and group interviews recorded their personal experiences and evaluative judgments. The application of positive techniques of meaning in life, optimism, gratitude and the development of positive relationships, combined with a cognitive reconstruction based on the principles of Epicureanism and Stoicism, had beneficial effects on the participating students, including emotional state improvement, mental well-being enhancement, and improved aspects of quality of life, such as subjective health, cognitive and school performance, family and interpersonal relationships. The highlight of the study was the emergence of the supporting role of Philosophy in the effectiveness of the applied techniques of Positive Psychology in the management of the psychological and social impact of the COVID-19 pandemic

    Exploring value co-creation within buyer-seller relationship in mobile applications services : a model development

    Get PDF
    Mobile phones have become an indispensable part of consumers’ life where they access core and supporting services via mobile applications services (m-applications). The focus of the present study is to explore dyadic buyer-seller roles in m-applications services’ value creation taking mobile banking applications services (MB-applications) as a case study. While prior research on value co-creation in service dominant logic (S-d logic) serves as a foundation for this study, it does not provide adequate guidance on how buyer and seller co-create value in m-applications services.To address this shortcoming, semi-structured interviews were carried out with 12 banks’ officials in banks’ headquarters of Saudi Arabia. Also, six focus groups were conducted; three with MB-application services users and three with non-users which were held in Riyadh College of Technology (RCT). In addition, a content analysis of MB-applications services was conducted to support suppliers’ perspectives regarding value propositions (service offering). A conceptual framework is developed for managing co-creation to illustrate practical application of the framework.The findings pointed to six factors that shape shape service suppliers’ ability to offer and deliver value via MB-applications, namely; brand image building, bank’s business vision, customer culture-orientation, bank’s internal environment, information technology system and positioning strategy. These factors combine to establish a value proposition for banks’ customers in the MB-applications services domain.Customer’s value creation as value in-use during usage emerged in different usage situations. A value framework incorporating value consumptions (Sheth et al., 1991a) is proposed. It identifies the main value-adding elements in m-applications and the primary drivers for adopting m-applications. Findings revealed that bank managers attempted to support customers’ value creation, which was reflected in MB-application content. However, support was constrained by some insufficient assumptions about customers and the m-commerce architecture. Factors that impede MB-applications use include consumers’ banking habits, perceived risk (security and privacy); usability hindrance, marketing and promotion, technical problems, and socio-cultural barriers. Implications are drawn for service delivery value perception and mobile marketing theory, and recommendations are made to service suppliers and commercial banks to achieve sustained returns of investment from MB-applications services

    Inferential Intuitive and Analytic Thought Processes in Criminal Investigative Decision

    Get PDF
    According to previous researchers police detectives\u27 decisional thought processes correlate with investigative accuracy and these decisional thought processes consist of inferential intuitive and analytic thought processes. Researchers have established investigative decisional dual process use but have not established United States police detectives\u27 conceptualization of decisional inferential intuitive and analytic thought processes in criminal investigations in which they partook. The purpose of this qualitative study was to explore 11 United States police detectives\u27 conceptualizations of decisional thought processes based on criminal investigations in which they partook. Dual process theory framed this study. Using narrative inquiry research, individual face-to-face interviews were analyzed thematically and structurally. The results of this analysis indicated significant themes associated with inferential intuitive and analytic thought process conceptualizations. Themes that were established were: (a) inferential intuitive starting points, (b) inferential intuitive information, (c) inferential intuitive experience driven, (d) inferential intuitive value, (e) inferential intuitive fallible, (f) analytic mandatory, (g) analytic purpose, (h) analytic collaborative. Police detectives, as well as society as a whole, may benefit from the results of this study through enhanced investigative training and education. Enhanced investigative training and education may result in a reduction of investigative decisional errors

    Everyday mobile/assistive technology supporting adults with intellectual &/or developmental disabilities in the community setting

    Get PDF
    Twelve pilot project participants with intellectual and/or developmental disabilities used mobile devices (smartwatch and smartphone technology) and individualized apps focused on time management, coping, budgeting, exercise, and safety, to support independence and community engagement. Ten participants with Intellectual and/or Developmental Disabilities (IDD) and five front-line Coordinators participated in post-project focus groups in which common patterns of responses and salient findings were noted, including the emergence of a peer technology expert. Five themes emerged from focus group data, which were then developed into five broad technological, clinical, and methodological recommendations for phase two, that will follow this pilot project. Duration data showed variable change in pre-post duration of supports; related changes were part of these recommendations. The small sample size and current pilot study status suggests cautious interpretation and application of results beyond the immediate context of this project; however, this pilot project has developed a foundation for a more comprehensive intervention
    • …
    corecore