First things first, but not necessarily in that order! — words of wisdom from Doctor Who The tweet below got me thinking about the importance of privacy. Data mining demands sound privacy policies in age of ‘big data’ http://t.co/1N0gZhz #datamining #BI #bigdata After all, in this day of age, with access to all sorts of disparate information, it becomes easier and easier to uniquely identify a person by their behaviors and external patterns. In Dr. Latanya Sweeney’s ground breaking paper k-Anonymity: a model for protecting privacy, she had noted the following startling observations: Based…
Category: Medical Informatics
CMU/MSR Mindswap on Privacy
As some of you may have noticed in some of my more recent blog postings, I have started writing about my interest in the field of privacy. With all that is going on these days with tonnes of information floating on the web and the ability to join disparate data sources together to reveal interesting patterns (or individuals) – it will become imperative that we find ways to guarantee privacy of the individual if we are ever to find interesting patterns within our data. The example that I had used with my most recent blog on the subject of…
Presentation: Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
These are the slides on differential privacy case studies I had presented at the MindSwap on Privacy Technology, October 19–20, 2007. Center for Computational Thinking, Carnegie Mellon, Pittsburgh, PA.
Data Mining applied to Medical Research
As a follow up to my blog below concerning analyzing medical data and privacy, check out my channel8.msdn.com interview concerning the application of data mining to medical research and the reason why privacy is so important. http://channel8.msdn.com/Posts/Denny-Lee-from-SQL-CAT-Data-Mining-applied-to-medical-research/
Analyzing Data while Protecting Privacy – A Differential Privacy Case Study
Abstract Analysis and sharing of aggregate data (e.g., number of users whose favorite color is blue) is crucial to understanding patterns of the population being studied. The problem is that even summary data can expose the individuals who make up this information. Therefore, we are studying the use of privacy preserving data analysis techniques that will protect the individual and allow analysts to understand general trends. We believe that while there are unique perturbations of the data with these techniques, analysts will be able to use the data and protect the users at the same time. The case study involves…
Early establishment of a pool of latently infected, resting CD4+ T cells during primary HIV-1 infection
Early establishment of a pool of latently infected, resting CD4+ T cells during primary HIV-1 infectionTae-Wook Chun,*† Delphine Engel,* M. Michelle Berrey,‡ Theresa Shea,‡ Lawrence Corey,‡ and Anthony S. Fauci* *Laboratory of Immunoregulation, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Bethesda, MD 20892; and ‡Departments of Medicine and Laboratory Medicine, University of Washington and Program in Infectious Diseases, Fred Hutchinson Cancer Research Center, Seattle, WA 98104 †To whom reprint requests should be addressed at: Laboratory of Immunoregulation, National Institute of Allergy and Infectious Diseases, National Institutes of Health, Building 10, Room 6A32, Bethesda, MD 20892. e-mail: twchun@nih.gov. …