Computer Science Magazine - Fall 2014

Page 4

Privacy: A Social Bridge Enabling E-Commerce researchers in dal's e-Privacy Lab are working on ways to uplift privacy “Without security and privacy, consumers will not trust…We are counting on the digital economy for jobs and growth in EU,” said

Paul Timmers, Director of the Sustainable and Secure Society Directorate DG CONNECT, European Commission, in Athens 2014. Dr. Peter Bodorik (Dalhousie Faculty of Computer Science), Dr. Dawn Jutla (Saint Mary’s Sobey School of Business and adjunct professor to Dalhousie’s Faculty of Computer Science) and graduate research students in the e-Privacy Lab are working on research that has an international impact on the emerging field of privacy engineering. Their work is helping inform the nascent privacy engineering field from technical, organizational, user, and governance perspectives. Privacy not only enables online commerce, but it protects the human right to be left alone and to control the dissemination of information. Privacy engineering is important in its promise to help shape increasingly online civil societies as well as support economic renewal from digital economies. In the e-Privacy Lab, research and development is conducted on the architectures, methods, methodologies, and

4 |

computer Science

management building blocks for privacy and e-commerce. The team is translating their know-how into tools for privacy-enabling start-ups and larger businesses. Privacy Engineering and Big Data The digitization of vast quantities of information leads to the collaboration of many stakeholders to develop shared

standards-based interoperable platforms. This convergence supports the efficient analysis and flow of information to accelerate new discoveries. But significant discipline-based communication gaps exist among policymakers, businesses and software engineers. Where policymakers leverage rich textual language, software engineers comSystem

-Dr -Dr -Dr

-Dr

SSL – All communication over secure communication connection

-Dr -Dr

-Dr

-Dr -Dr

Review recommended treatments

-Dr

PII Replacement – Replace PII with codes in program’s input data

Doctor

-Dr

-Dr

Privacy Notice – on storage and usage of obtained data Agreement – Obtain agreement on storage and use of obtained data -Ds

-Ds

-Ds

-Ds

Data Scientist

View alterntive patients treatments

Anonymization - Anonymize data (program’s result) - anonymization method

Figure 1: One software engineer’s visual for embedding privacy into IBM Watson’s Sloan Kettering Cancer Treatment applications.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Computer Science Magazine - Fall 2014 by Dalhousie University - Issuu