What <em>is</em> Differential Privacy?

What is Dif...

Yesterday at the WWDC keynote, Apple announced a series of new security and privacy features, including one feature that’s drawn a bit of attention — and confusion. Specifically, Apple announced that they will be using a technique called “Differential Privacy” (henceforth: DP) to improve the privacy of their data collection practices. The reaction to this […]

Data Privacy & Data Science: The Next Generation of Data Experimentation

Data Privacy & ...

Collection of consumer data is mainstream and global. The generally accepted premise of the big data movement is to collect as much data as possible, since storage is in theory cheap, and then to use distributed computing and advanced analytics to cypher through the mess to be able to answer complex questions across your enterprise. […]

Data Trusts Could Allay Our Privacy Fears

Data Trusts Could Al...

Current data-sharing arrangements are more akin to a form of data feudalism than data democracy The 1832 reform act was a response to social change in the evolving industrial landscape of pre-Victorian Britain. It introduced new parliamentary constituencies. It eliminated “rotten boroughs”: small constituencies controlled by a handful of voters. It also gave the vote […]

Data Trusts

Data Trusts...

Data is at its most powerful when it is interconnected. A major challenge for modern data is interconnection of different data types to obtain a fuller picture of the data subject. Questions about an individual’s mental health, for example, might benefit from interlinking social media with the medical record. Obviously, such data would be extremely […]

When You Share a Data Set Consider Privacy

When You Share a Dat...

By: Julia Lien – ODSC data science team contributor Data Science podcast Linear Digressions recently had a fascinating episode about Netflix’s 2010 lawsuit from releasing anonymized data for its statistical modeling contest, Netflix Prize. Though the movie rating data was anonymized, two researchers at University of Texas were able to successfully identify users by cross-referencing […]