41,304 research outputs found

    Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation

    Full text link
    The growing expanse of e-commerce and the widespread availability of online databases raise many fears regarding loss of privacy and many statistical challenges. Even with encryption and other nominal forms of protection for individual databases, we still need to protect against the violation of privacy through linkages across multiple databases. These issues parallel those that have arisen and received some attention in the context of homeland security. Following the events of September 11, 2001, there has been heightened attention in the United States and elsewhere to the use of multiple government and private databases for the identification of possible perpetrators of future attacks, as well as an unprecedented expansion of federal government data mining activities, many involving databases containing personal information. We present an overview of some proposals that have surfaced for the search of multiple databases which supposedly do not compromise possible pledges of confidentiality to the individuals whose data are included. We also explore their link to the related literature on privacy-preserving data mining. In particular, we focus on the matching problem across databases and the concept of ``selective revelation'' and their confidentiality implications.Comment: Published at http://dx.doi.org/10.1214/088342306000000240 in the Statistical Science (http://www.imstat.org/sts/) by the Institute of Mathematical Statistics (http://www.imstat.org

    Balancing Access to Data And Privacy. A review of the issues and approaches for the future

    Get PDF
    Access to sensitive micro data should be provided using remote access data enclaves. These enclaves should be built to facilitate the productive, high-quality usage of microdata. In other words, they should support a collaborative environment that facilitates the development and exchange of knowledge about data among data producers and consumers. The experience of the physical and life sciences has shown that it is possible to develop a research community and a knowledge infrastructure around both research questions and the different types of data necessary to answer policy questions. In sum, establishing a virtual organization approach would provided the research community with the ability to move away from individual, or artisan, science, towards the more generally accepted community based approach. Enclave should include a number of features: metadata documentation capacity so that knowledge about data can be shared; capacity to add data so that the data infrastructure can be augmented; communication capacity, such as wikis, blogs and discussion groups so that knowledge about the data can be deepened and incentives for information sharing so that a community of practice can be built. The opportunity to transform micro-data based research through such a organizational infrastructure could potentially be as far-reaching as the changes that have taken place in the biological and astronomical sciences. It is, however, an open research question how such an organization should be established: whether the approach should be centralized or decentralized. Similarly, it is an open research question as to the appropriate metrics of success, and the best incentives to put in place to achieve success.Methodology for Collecting, Estimating, Organizing Microeconomic Data

    Curating E-Mails; A life-cycle approach to the management and preservation of e-mail messages

    Get PDF
    E-mail forms the backbone of communications in many modern institutions and organisations and is a valuable type of organisational, cultural, and historical record. Successful management and preservation of valuable e-mail messages and collections is therefore vital if organisational accountability is to be achieved and historical or cultural memory retained for the future. This requires attention by all stakeholders across the entire life-cycle of the e-mail records. This instalment of the Digital Curation Manual reports on the several issues involved in managing and curating e-mail messages for both current and future use. Although there is no 'one-size-fits-all' solution, this instalment outlines a generic framework for e-mail curation and preservation, provides a summary of current approaches, and addresses the technical, organisational and cultural challenges to successful e-mail management and longer-term curation.

    Anonymizing cybersecurity data in critical infrastructures: the CIPSEC approach

    Get PDF
    Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold. To improve these capabilities, logs are usually shared with external entities. However, since cybersecurity logs might contain sensitive data, serious privacy concerns arise, even more when critical infrastructures (CI), handling strategic data, are involved. We propose a tool to protect privacy by anonymizing sensitive data included in cybersecurity logs. We implement anonymization mechanisms grouped through the definition of a privacy policy. We adapt said approach to the context of the EU project CIPSEC that builds a unified security framework to orchestrate security products, thus offering better protection to a group of CIs. Since this framework collects and processes security-related data from multiple devices of CIs, our work is devoted to protecting privacy by integrating our anonymization approach.Peer ReviewedPostprint (published version

    The Impact of Equity Engagement Evaluating the Impact of Shareholder Engagement in Public Equity Investing

    Get PDF
    Over the last decade, growing numbers of investors have become increasingly concerned with the environmental and social impact of their investments across asset classes. This trend has recently been driven by new waves of "impact investors" proactively seeking measurable social and environmental impact in addition to financial returns, and by "responsible investors" making commitments to engage on environmental, social, and governance (ESG) issues through initiatives such as the United Nations-backed Principles for Responsible Investment (PRI). At the same time, engaged shareholders have had long-standing experience using "the power of the proxy" and their voices as investors to hold companies accountable for the impacts they have on employees, stakeholders, communities, and ecosystems.While investor interest in shareholder engagement has grown, our understanding of the impacts associated with engagement activities remains largely anecdotal.In 2012, an important study on Total Portfolio Activation provided a new conceptual and analytical framework for investors to pursue environmental and social impact across all asset classes commonly found in a diversified investment portfolio. Building upon the insights of Total Portfolio Activation, the Impact of Equity Engagement (IE2) initiative seeks to deepen our understanding of the nature of impact in one specific asset class—public equities— where investors' engagement activities have generated meaningful social and environmental impacts.Given the large social and environmental footprints of publicly traded corporations and the persistently high allocation to public equities in most investor portfolios, public equity investing presents a major opportunity for impact investing. Yet impact investing, as currently practiced, has concentrated primarily on smallscale direct investments in private equity and debt, where many investors perceive that social and environmental impact can be more readily observed than in publicly traded companies where ownership is intermediated, diluted, and diffused through secondary capital markets.Indeed, the nature of impact within public equity investing remains poorly understood and insufficiently documented. Because of this, many investors may be overlooking readily available opportunities for generating impact within their existing investment portfolios.To address these misperceptions and missed opportunities, the IE2 initiative is developing a more rigorous framework for documenting the impact of engagement within the public equity asset class.

    Professional Practice Guidelines for Occupationally Mandated Psychological Evaluations

    Get PDF
    Psychological evaluations are relied on by employers, professional licensing boards, and civil service commissions to make hiring and employment decisions affecting individuals, orga- nizations, and the public. To promote best practices, these professional practice guidelines were developed for use by psychologists who perform clinical evaluations of individuals for occupational purposes, regardless of whether the evaluation is intended to obtain employ- ment, to achieve licensure/certification, or to maintain either. These guidelines were created by the Committee on Professional Practice and Standards (COPPS) to educate and inform the practice of psychologists who conduct occupationally mandated psychological evaluations (OMPEs), as well as to stimulate debate and research in this important area
    • 

    corecore