Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2023
Graph Database Watermarking Using Pseudo-Nodes
DEC '23: Proceedings of the Second ACM Data Economy WorkshopJune 2023, Pages 14–20https://doi.org/10.1145/3600046.3600049Watermarking is used as proof of ownership for various data types such as images, videos, software, machine learning models, and databases. Datasets are crucial for data driven decision making using Machine Learning for tasks like prediction, ...
- research-articleSeptember 2023
Image Watermarking for Machine Learning Datasets
DEC '23: Proceedings of the Second ACM Data Economy WorkshopJune 2023, Pages 7–13https://doi.org/10.1145/3600046.3600048Machine learning has received increasing attention for the last decade due to its significant success in classification problems in almost every application domain. For its success, the amount of available data for training plays a crucial role in the ...
- research-articleApril 2023
Contributing to Accessibility Datasets: Reflections on Sharing Study Data by Blind People
CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing SystemsApril 2023, Article No.: 827, Pages 1–18https://doi.org/10.1145/3544548.3581337To ensure that AI-infused systems work for disabled people, we need to bring accessibility datasets sourced from this community in the development lifecycle. However, there are many ethical and privacy concerns limiting greater data inclusion, making ...
- research-articleOctober 2021
Knowledge Accumulation, Privacy, and Growth in a Data Economy
Management Science (MANS), Volume 67, Issue 10October 2021, Pages 6480–6492https://doi.org/10.1287/mnsc.2021.3986We build an endogenous growth model with consumer-generated data as a new key factor for knowledge accumulation. Consumers balance between providing data for profit and potential privacy infringement. Intermediate good producers use data to innovate and ...
- research-articleJanuary 2020
Willing Buyer, Willing Seller: Personal Data Trade as a Service
GROUP '20: Companion Proceedings of the 2020 ACM International Conference on Supporting Group WorkJanuary 2020, Pages 59–68https://doi.org/10.1145/3323994.3369899There is an increased sensitivity by people about how companies collect information about them, and how this information is packaged, used and sold. This perceived lack of control is highlighted by the helplessness of users of various platforms in ...
-
- research-articleOctober 2019
Local-first software: you own your data, in spite of the cloud
Onward! 2019: Proceedings of the 2019 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and SoftwareOctober 2019, Pages 154–178https://doi.org/10.1145/3359591.3359737Cloud apps like Google Docs and Trello are popular because they enable real-time collaboration with colleagues, and they make it easy for us to access our work from all of our devices. However, by centralizing data storage on servers, cloud apps also ...
- research-articleJanuary 2019
The study of data-oriented and ownership-based security architecture in open internet environment
ICCSP '19: Proceedings of the 3rd International Conference on Cryptography, Security and PrivacyJanuary 2019, Pages 121–129https://doi.org/10.1145/3309074.3309093DOSA (Data-Oriented Security Architecture, or Data Ownership-based Security Architecture) is an architecture for data protection and application in an open Internet environment. DOSA combines data with ownership by using digital certification ...
- research-articleJanuary 2019
The right to access information under the GDPR
International Journal of Technology Policy and Law (IJTPL), Volume 3, Issue 22019, Pages 131–142https://doi.org/10.1504/ijtpl.2019.104950The present paper offers a critique of the General Data Protection Regulation in the realm of access to information. Even though the GDPR supports the constitutionally obvious position that the right to data protection does not outweigh other equally ...
- research-articleOctober 2018
Digital Copyright Works Management System Based on DOSA
CSAE '18: Proceedings of the 2nd International Conference on Computer Science and Application EngineeringOctober 2018, Article No.: 179, Pages 1–9https://doi.org/10.1145/3207677.3278047A new digital1 copyright works management system for protection, trading and distribution based on DOSA (Data Ownership Security Architecture) can overcome the defects of existing systems. DOSA is an architecture for data protection and application by ...
- research-articleSeptember 2017
Blockchain as a privacy enabler: an odometer fraud prevention system
UbiComp '17: Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable ComputersSeptember 2017, Pages 13–16https://doi.org/10.1145/3123024.3123078Giving people ownership of the data they produce becomes more and more important in times of ever-growing capabilities to collect and analyze data of individuals. In light of this challenge, we show how blockchain technology can enable privacy by ...
- short-paperApril 2016
Ethical and privacy issues in the design of learning analytics applications
- Hendrik Drachsler,
- Tore Hoel,
- Adam Cooper,
- Gábor Kismihók,
- Alan Berg,
- Maren Scheffel,
- Weiqin Chen,
- Rebecca Ferguson
LAK '16: Proceedings of the Sixth International Conference on Learning Analytics & KnowledgeApril 2016, Pages 492–493https://doi.org/10.1145/2883851.2883933Issues related to Ethics and Privacy have become a major stumbling block in application of Learning Analytics technologies on a large scale. Recently, the learning analytics community at large has more actively addressed the EP4LA issues, and we are now ...
- tutorialMarch 2015
Ethical and privacy issues in the application of learning analytics
- Hendrik Drachsler,
- Tore Hoel,
- Maren Scheffel,
- Gábor Kismihók,
- Alan Berg,
- Rebecca Ferguson,
- Weiqin Chen,
- Adam Cooper,
- Jocelyn Manderveld
LAK '15: Proceedings of the Fifth International Conference on Learning Analytics And KnowledgeMarch 2015, Pages 390–391https://doi.org/10.1145/2723576.2723642The large-scale production, collection, aggregation, and processing of information from various learning platforms and online environments have led to ethical and privacy concerns regarding potential harm to individuals and society. In the past, these ...
- short-paperMarch 2015
Learning analytics beyond the LMS: the connected learning analytics toolkit
LAK '15: Proceedings of the Fifth International Conference on Learning Analytics And KnowledgeMarch 2015, Pages 11–15https://doi.org/10.1145/2723576.2723627We present a Connected Learning Analytics (CLA) toolkit, which enables data to be extracted from social media and imported into a Learning Record Store (LRS), as defined by the new xAPI standard. A number of implementation issues are discussed, and a ...
- research-articleSeptember 2014
Who owns your data?
UbiComp '14 Adjunct: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct PublicationSeptember 2014, Pages 623–628https://doi.org/10.1145/2638728.2641679Popular and professional discussions of personal data are often framed in terms of ownership -- that human data subjects own the data they emit and share. This framing has implications for consent concepts. Ownership, however, is an inappropriate way to ...
- research-articleNovember 2013
Foundations for infrastructure and interfaces to support user control in long-term user modelling
OzCHI '13: Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, CollaborationNovember 2013, Pages 125–134https://doi.org/10.1145/2541016.2541034Personal sensors track data about many aspects of our lives. This data can be used to form a long-term user model to help people self reflect on their long-term goals. Yet, there is a dearth of work on designing the infrastructure and associated ...
- research-articleMay 2013
A cloud-based consumer-centric architecture for energy data analytics
e-Energy '13: Proceedings of the fourth international conference on Future energy systemsJanuary 2013, Pages 63–74https://doi.org/10.1145/2487166.2487174With the advent of utility-owned smart meters and smart appliances, the amount of data generated and collected about consumer energy consumption has rapidly increased. Energy usage data is of immense practical use for consumers for audits, analytics, ...
- ArticleOctober 2012
The Digital Aggregated Self: A Literature Review
CYBERC '12: Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge DiscoveryOctober 2012, Pages 170–177https://doi.org/10.1109/CyberC.2012.36As the Internet rapidly establishes itself as a major communications conduit, growing concern exists about personal privacy issues and the related ownership of personal data. Privacy and personal data may be vulnerable to exposure by unauthorized ...
- ArticleApril 2006
Language support for fast and reliable message-based communication in singularity OS
EuroSys '06: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006April 2006, Pages 177–190https://doi.org/10.1145/1217935.1217953Message-based communication offers the potential benefits of providing stronger specification and cleaner separation between components. Compared with shared-memory interactions, message passing has the potential disadvantages of more expensive data ...
Also Published in:
ACM SIGOPS Operating Systems Review: Volume 40 Issue 4, October 2006 - ArticleSeptember 2000
When Knowledge becomes Information: A case of Mistaken Identity
DEXA '00: Proceedings of the 11th International Workshop on Database and Expert Systems ApplicationsSeptember 2000, Page 1128We discuss research conducted by the authors in a large financial services firm. The purpose of the research was to examine issues relating to the use of a research database (RDB), designed primarily to provide market information to clients. While the ...