1 / 7

Data Privacy and Biometrics

Data Privacy and Biometrics. Week 10 - October 31, November 2. Guest speaker. Bradley Malin, Data Privacy Lab. Announcements. Marc Langheinrich’s talk on privacy in ubiquitous computing - Thursday at noon, Heinz Batya Friedman’s talk on Privacy by Design, Friday, Nov 18 at noon.

ananda
Download Presentation

Data Privacy and Biometrics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Privacy and Biometrics Week 10 - October 31, November 2

  2. Guest speaker • Bradley Malin, Data Privacy Lab

  3. Announcements • Marc Langheinrich’s talk on privacy in ubiquitous computing - Thursday at noon, Heinz • Batya Friedman’s talk on Privacy by Design, Friday, Nov 18 at noon

  4. Homework discussion • Should people always be allowed to be anonymous on the Internet? If so, how can illegal, irresponsible, or anti-social behavior be prevented? If not, why not and when should anonymity be prohibited? What level of identification is appropriate for various types of Internet interactions? Use some of the class readings or other articles to support your argument.

  5. Suppose some researchers were interested in finding out whether there was any correlation between grades in this class and student college, department, or class. If I were to add grade information to this table and give it to the researchers, would you consider this to be an anonymous release of this data? Why or why not? Rewrite this table so that it is k-anonymous where k=2 and so that its value to the researchers is maximized Do you believe k=2 provides a sufficient level of anonymity for this type of data release? Why or why not? COLLEGE DEPT CLASS SCS CS Junior SCS CS Junior SCS CS Senior SCS CS Senior SCS SE Master SCS ROB Doct CIT ECE Senior CIT MSE Senior CIT INI Master CIT ECE Master CIT EPP Doct CMU IS Master HNZ PPM Master HNZ PPM Master HNZ PPM Master HNZ PPM Master Homework Discussion

  6. Fingerprints Hand geometry Iris Retina Face Voice Typing patterns Signature Gait Smell Biometrics

  7. Homework discussion • Pick a biometric identifier and do some research on it • Briefly describe how this biometric is used for identification and/or authentication • Describe two specific applications for which this biometric is currently used. (Or if it is only in the research prototype stage, describe two applications for which it is being proposed.) For each one be sure to say whether the biometric is being used for identification or authentication (or both) • What advantages do proponents claim this biometric has over other biometrics? • What concerns have been raised about this biometric?

More Related