{"id":568,"date":"2016-11-01T18:14:31","date_gmt":"2016-11-01T23:14:31","guid":{"rendered":"http:\/\/wp.comminfo.rutgers.edu\/vsingh\/?page_id=568"},"modified":"2016-11-01T18:14:31","modified_gmt":"2016-11-01T23:14:31","slug":"privacy","status":"publish","type":"page","link":"https:\/\/sites.comminfo.rutgers.edu\/vsingh\/privacy\/","title":{"rendered":"Privacy"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>Privacy Management<\/b><\/h1>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;justified&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>People have a fundamental right to maintain their personal privacy while using all kinds of technologies in their daily lives. Violations of this right can have extremely negative consequences for an individual, including trauma, depression, loss of dignity, loss of jobs, and in extreme cases loss of life. While people generally have some awareness that their personal data are being collected through their online social networks, mobile devices, and IoT sensors, they are often unaware of the extent and nature of the data collected through these technologies and express surprise and discomfort when they find out. For example, multiple users reported surprise when they found out that their flashlight app was continuously tracking their location information. Our group has been studying how the newer technologies are creating newer privacy challenges as well as opportunities for mitigation.<\/p>\n<p>The projects include:<\/p>\n<p><strong>Uniqueness of personal spending data<\/strong>&#8211; Identifying the limits of anonymity in the emerging big data. For example, in a <em>Science<\/em> paper [6], we reported that it takes only 4 pieces of spatio-temporal information to uniquely identify a customer\u2019s credit card data amongst millions of other anonymized data records. This brings to the fore an urgent need to re-define how we measure privacy, understand it, and ultimately what drives our privacy needs in an information rich eco-system.\u00a0<\/p>\n<p><strong>Predicting privacy attitudes using phone metadata<\/strong> &#8211; We found that a combination of phone use metadata can provide vital insights into a person\u2019s privacy attitudes. This can be used to automatically recommend privacy settings to individuals [4].<\/p>\n<p><strong>Nudging privacy behavior<\/strong> &#8211; We have designed multiple social theory based interfaces that nudge individuals towards more careful privacy decisions [2, 4].\u00a0<\/p>\n<p><strong>Supporting privacy needs of individuals when using COVID symptom reporting apps<\/strong> &#8211; We undertook focus group interviews to understand how individual privacy attitudes change during health emergencies [1] and developed a mechanism that efficiently guarantees differential privacy for crowdsourced symptom data [1].\u00a0\u00a0<\/p>\n<p><strong>Funding and Support<\/strong><\/p>\n<p>We gratefully acknowledge the support from the<span> US <\/span><a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=2027789&amp;HistoricalAwards=false\">National Science Foundation<\/a><span> <\/span>for this work.<\/p>\n<p><strong><\/strong><\/p>\n<p><strong>Related Publications<\/strong><\/p>\n<ol>\n<li>Asif, H., Papakonstantinou, P., Shiau, S., <strong>Singh, V.<\/strong>, &amp; Vaidya, J. (2022), Intelligent Pandemic Surveillance via Privacy-Preserving Crowdsensing. <em>IEEE Intelligent Systems.<\/em> (Accepted. In Press)<\/li>\n<li>Park, J., Ahmed, E., Asif, H., Vaidya, J., &amp;<span>\u00a0<\/span><strong>Singh, V. K.<\/strong><span>\u00a0<\/span>(2022).\u00a0<span>\u00a0<\/span><a href=\"https:\/\/wp.comminfo.rutgers.edu\/vsingh\/wp-content\/uploads\/sites\/110\/2022\/01\/Privacy_Attitudes_and_COVID_Symptom_Tracking_Apps-1.pdf\">Privacy Attitudes and COVID Symptom Tracking Apps: Understanding Active Boundary Management by Users<\/a>. To be published in the<span>\u00a0<\/span><em>Proceedings of the iConference. <\/em><\/li>\n<li>Ghosh, I., &amp;\u00a0<strong style=\"font-size: 14px\">Singh, V.<\/strong><span style=\"font-size: 14px\">\u00a0(2021).\u00a0<\/span><a href=\"https:\/\/wp.comminfo.rutgers.edu\/vsingh\/wp-content\/uploads\/sites\/110\/2022\/01\/Asso-for-Info-Science-Tech-2021-Ghosh-Not-all-my-friends-are-friends-Audience%E2%80%90group%E2%80%90based-nudges-for-managing.pdf\" style=\"font-size: 14px\">\u201cNot all my friends are friends\u201d: Audience\u2010group\u2010based nudges for managing location privacy<\/a><span style=\"font-size: 14px\">. <em>Journal of the Association for Information Science and Technology<\/em>. Early Access:\u00a0<\/span><a href=\"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/full\/10.1002\/asi.24580\" style=\"font-size: 14px\">https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/full\/10.1002\/asi.24580<\/a><span style=\"font-size: 14px\">.<\/span><\/li>\n<li>Ghosh, I., &amp; <strong style=\"font-size: 14px\">Singh, V.<\/strong><span style=\"font-size: 14px\">\u00a0(2020).\u00a0<\/span><a href=\"http:\/\/sites.comminfo.rutgers.edu\/vsingh\/wp-content\/uploads\/sites\/35\/2022\/01\/OIR_PublishedArticle.pdf\" style=\"font-size: 14px\">Phones, privacy, and predictions: A study of phone logged data to predict privacy attitudes of individuals<\/a><span style=\"font-size: 14px\">.\u00a0<\/span><em style=\"font-size: 14px\">Online Information Review<\/em><span style=\"font-size: 14px\">. 44(2), 483-502. DOI:10.1108\/OIR-03-2018-0112<\/span><\/li>\n<li>Nouh, M., Almaatouq, A., Alabdulkareem, A., Singh, V. K., Shmueli, E., Alsaleh, M., Faris, A., &amp; Pentland, A. S. (2014). <a href=\"http:\/\/cces-kacst-mit.org\/publication\/social-information-leakage-effects-awareness-and-peer-pressure-user-behavior\">Social information leakage: Effects of awareness and peer pressure on user behavior.<\/a>\u00a0In\u00a0<i style=\"font-size: 14px\">International Conference on Human Aspects of Information Security, Privacy, and Trust<\/i><span style=\"font-size: 14px\">\u00a0(pp. 352-360). Springer, Cham.<\/span><\/li>\n<li><span style=\"font-size: 14px\"><span style=\"font-size: 14px\"><span>de Montjoye, Y. A., Radaelli, L.,\u00a0<\/span><b>V. K. Singh<\/b><span>, &amp; Pentland, A.\u00a0 (2015).\u00a0<\/span><a href=\"https:\/\/www.dropbox.com\/sh\/lujs7ixvsn6535g\/AAAubLcyjkabJ_4u7cUJjcDDa\/02_Articles%20In%20Scholarly%20Journals\/3_Unique%20in%20the%20Shopping%20Mall.pdf?dl=0\">Unique in the shopping mall: On the reidentifiability of credit card metadata<\/a><span>.\u00a0<\/span><em>Science<\/em><span>,\u00a0<\/span><em>347<\/em><span>(6221), 536-539.<\/span><\/span><\/span><\/li>\n<\/ol>\n<p><strong>Coverage<span style=\"font-size: 14px\"><\/span><\/strong><\/p>\n<p>&#8211; Media coverage for the uniqueness of credit card spending data: <a href=\"http:\/\/bits.blogs.nytimes.com\/2015\/01\/29\/with-a-few-bits-of-data-researchers-identify-anonymous-people\/?_r=0\">New York Times<\/a>,\u00a0<a href=\"http:\/\/www.wsj.com\/articles\/metadata-can-expose-persons-identity-even-when-name-isnt-1422558349\">Wall Street Journal<\/a>,\u00a0<a href=\"http:\/\/www.nature.com\/news\/people-identified-through-credit-card-use-alone-1.16817\">Nature News<\/a>,\u00a0<a href=\"https:\/\/hbr.org\/2015\/02\/theres-no-such-thing-as-anonymous-data\">Harvard Business Review\u00a0<\/a>, and\u00a0<a href=\"http:\/\/www.telegraphindia.com\/1150131\/jsp\/nation\/story_10908.jsp#.VWSlLflVhBc\">The Telegraph<\/a>.<\/p>\n<p>&#8211; <span>US Court of Appeals cited our Science paper in it\u2019s <\/span><a href=\"http:\/\/pdfserver.amlaw.com\/nlj\/NSA_ca2_20150507.pdf\">judgement<\/a><span>\u00a0(page 9) on the NSA case.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><\/strong><\/p>\n<p><strong><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy ManagementPeople have a fundamental right to maintain their personal privacy while using all kinds of technologies in their daily lives. Violations of this right can have extremely negative consequences [&hellip;]<\/p>\n","protected":false},"author":2442,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-568","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sites.comminfo.rutgers.edu\/vsingh\/wp-json\/wp\/v2\/pages\/568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.comminfo.rutgers.edu\/vsingh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.comminfo.rutgers.edu\/vsingh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.comminfo.rutgers.edu\/vsingh\/wp-json\/wp\/v2\/users\/2442"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.comminfo.rutgers.edu\/vsingh\/wp-json\/wp\/v2\/comments?post=568"}],"version-history":[{"count":0,"href":"https:\/\/sites.comminfo.rutgers.edu\/vsingh\/wp-json\/wp\/v2\/pages\/568\/revisions"}],"wp:attachment":[{"href":"https:\/\/sites.comminfo.rutgers.edu\/vsingh\/wp-json\/wp\/v2\/media?parent=568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}