Privacy analytics

Hamed Haddadi, Richard Mortier, Steven Hand, Ian Brown, Eiko Yoneki, Jon Crowcroft, Derek McAuley

Research output: Chapter in Book/Report/Conference proceedingChapter

17 Citations (Scopus)

Abstract

People everywhere are generating ever-increasing amounts of data, often without being fully aware of who is recording what about them. For example, initiatives such as mandated smart metering, expected to be widely deployed in the UK in the next few years and already attempted in countries such as the Netherlands, will generate vast quantities of detailed, personal data about huge segments of the population. Nei- ther the impact nor the potential of this society-wide data gathering are well understood. Once data is gathered, it will be processed - and society is only now beginning to grapple with the consequences for privacy, both legal and ethical, of these actions, e.g., Brown et al. [4]. There is the potential for great harm through, e.g., invasion of privacy; but also the potential for great benefits by using this data to make more efficient use of resources, as well as releasing its vast economic potential [28]. In this editorial we briey discuss work in this area, the challenges still faced, and some potential avenues for addressing them.

Original languageEnglish
Title of host publicationComputer Communication Review
Pages94-98
Number of pages5
Volume42
Edition2
DOIs
Publication statusPublished - Apr 2012
Externally publishedYes

Fingerprint

Data privacy
Economics

Keywords

  • Aggregation
  • Mobility
  • Privacy
  • Profiling
  • Surveys

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Cite this

Haddadi, H., Mortier, R., Hand, S., Brown, I., Yoneki, E., Crowcroft, J., & McAuley, D. (2012). Privacy analytics. In Computer Communication Review (2 ed., Vol. 42, pp. 94-98) https://doi.org/10.1145/2185376.2185390

Privacy analytics. / Haddadi, Hamed; Mortier, Richard; Hand, Steven; Brown, Ian; Yoneki, Eiko; Crowcroft, Jon; McAuley, Derek.

Computer Communication Review. Vol. 42 2. ed. 2012. p. 94-98.

Research output: Chapter in Book/Report/Conference proceedingChapter

Haddadi, H, Mortier, R, Hand, S, Brown, I, Yoneki, E, Crowcroft, J & McAuley, D 2012, Privacy analytics. in Computer Communication Review. 2 edn, vol. 42, pp. 94-98. https://doi.org/10.1145/2185376.2185390
Haddadi H, Mortier R, Hand S, Brown I, Yoneki E, Crowcroft J et al. Privacy analytics. In Computer Communication Review. 2 ed. Vol. 42. 2012. p. 94-98 https://doi.org/10.1145/2185376.2185390
Haddadi, Hamed ; Mortier, Richard ; Hand, Steven ; Brown, Ian ; Yoneki, Eiko ; Crowcroft, Jon ; McAuley, Derek. / Privacy analytics. Computer Communication Review. Vol. 42 2. ed. 2012. pp. 94-98
@inbook{32fa17f019e4424ba285078cfd50ad99,
title = "Privacy analytics",
abstract = "People everywhere are generating ever-increasing amounts of data, often without being fully aware of who is recording what about them. For example, initiatives such as mandated smart metering, expected to be widely deployed in the UK in the next few years and already attempted in countries such as the Netherlands, will generate vast quantities of detailed, personal data about huge segments of the population. Nei- ther the impact nor the potential of this society-wide data gathering are well understood. Once data is gathered, it will be processed - and society is only now beginning to grapple with the consequences for privacy, both legal and ethical, of these actions, e.g., Brown et al. [4]. There is the potential for great harm through, e.g., invasion of privacy; but also the potential for great benefits by using this data to make more efficient use of resources, as well as releasing its vast economic potential [28]. In this editorial we briey discuss work in this area, the challenges still faced, and some potential avenues for addressing them.",
keywords = "Aggregation, Mobility, Privacy, Profiling, Surveys",
author = "Hamed Haddadi and Richard Mortier and Steven Hand and Ian Brown and Eiko Yoneki and Jon Crowcroft and Derek McAuley",
year = "2012",
month = "4",
doi = "10.1145/2185376.2185390",
language = "English",
volume = "42",
pages = "94--98",
booktitle = "Computer Communication Review",
edition = "2",

}

TY - CHAP

T1 - Privacy analytics

AU - Haddadi, Hamed

AU - Mortier, Richard

AU - Hand, Steven

AU - Brown, Ian

AU - Yoneki, Eiko

AU - Crowcroft, Jon

AU - McAuley, Derek

PY - 2012/4

Y1 - 2012/4

N2 - People everywhere are generating ever-increasing amounts of data, often without being fully aware of who is recording what about them. For example, initiatives such as mandated smart metering, expected to be widely deployed in the UK in the next few years and already attempted in countries such as the Netherlands, will generate vast quantities of detailed, personal data about huge segments of the population. Nei- ther the impact nor the potential of this society-wide data gathering are well understood. Once data is gathered, it will be processed - and society is only now beginning to grapple with the consequences for privacy, both legal and ethical, of these actions, e.g., Brown et al. [4]. There is the potential for great harm through, e.g., invasion of privacy; but also the potential for great benefits by using this data to make more efficient use of resources, as well as releasing its vast economic potential [28]. In this editorial we briey discuss work in this area, the challenges still faced, and some potential avenues for addressing them.

AB - People everywhere are generating ever-increasing amounts of data, often without being fully aware of who is recording what about them. For example, initiatives such as mandated smart metering, expected to be widely deployed in the UK in the next few years and already attempted in countries such as the Netherlands, will generate vast quantities of detailed, personal data about huge segments of the population. Nei- ther the impact nor the potential of this society-wide data gathering are well understood. Once data is gathered, it will be processed - and society is only now beginning to grapple with the consequences for privacy, both legal and ethical, of these actions, e.g., Brown et al. [4]. There is the potential for great harm through, e.g., invasion of privacy; but also the potential for great benefits by using this data to make more efficient use of resources, as well as releasing its vast economic potential [28]. In this editorial we briey discuss work in this area, the challenges still faced, and some potential avenues for addressing them.

KW - Aggregation

KW - Mobility

KW - Privacy

KW - Profiling

KW - Surveys

UR - http://www.scopus.com/inward/record.url?scp=84872815366&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84872815366&partnerID=8YFLogxK

U2 - 10.1145/2185376.2185390

DO - 10.1145/2185376.2185390

M3 - Chapter

VL - 42

SP - 94

EP - 98

BT - Computer Communication Review

ER -