SlideShare une entreprise Scribd logo
1  sur  40
Télécharger pour lire hors ligne
Partners in Building UAE's Security & Economy




 Privacy in the Age of
 Big Data




                                                                                                                                       © 2013 Emirates Identity Authority. All rights reserved
 Presented by Dr. Ali M. Al-Khouri




                                                                                                                   www.emiratesid.ae
 In: Big Data Systems, Applications and Privacy Conference –
 Organised by New York University, Abu Dhabi, UAE.
 10 – 11 March 2013 | Injazat Data Systems | Abu Dhabi | UAE
 Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬
 Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics
 that guarantees innovative and sophisticated services for the benefit of UAE
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Big Data in Digital World ?




     • The proliferation of modern technologies, smart devices and
                                              Climate Change
       popularity of social networking is generating unprecedented
       amounts of data, both structured and unstructured, whether it be
       text, audio or video.

     • Data has become                                   ubiquitous in this digital world.
     • Sheer amount of bytes that we generate daily is indeed mind
       boggling!

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                       www.emiratesid.ae
                                                                                             © 2012 Emirates Identity Authority. All rights reserved
The Age of Big Data ?

              every day, we create
              2.5 quintillion                                    bytes
              of data ..
                                                                                 This data is
                                                                                  big data
              90%                                   of the data in the
              world today has been created                               Climate Change
              in the last two years.

              IBM Report


                We are truly in a
                digital explosion era!


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                           www.emiratesid.ae
                                                                                 © 2012 Emirates Identity Authority. All rights reserved
Data Growth
                                                               112 Zettabytes


                        all computer hard drives in the
                        world = 160 exabytes in 2006

                        all storage systems didn’t reach
                        one zettabyte of information in
                        2012!
                                                         295




    Global Growth of Digital Storage Capacity 1986-2021
                    By 2020, 112 Zettabytes of data (75% growth rate)
                    One Zettabyte = 1,000,000,000,000,000,000,000 byte, or 1000 exabytes
Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                          www.emiratesid.ae
                                                                                © 2012 Emirates Identity Authority. All rights reserved
Big Data ?

  • is generated from practically
    every where:
             - Social media sites
               (facebook, twitter, linked-in..)
             - digital pictures and videos,
             - e-mails,
             - purchase transaction
               records,                                  Climate Change
             - cell phone, GPS signals,
             - geo-stationary satellites,
             - meteorological sensors
             - to name a few.

  • This continues to grow at an
    exponential rate.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬           www.emiratesid.ae
                                                                 © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Big Data characteristics?



        • Big Data has come
          to be characterized
          by the Volume,
          Velocity and
          Variety of Data that
          is generated.

        • These constitute the
          3Vs of Big Data.




                                                         TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                                 www.emiratesid.ae
                                                                                                       © 2012 Emirates Identity Authority. All rights reserved
3Vs of Big Data ?



                                                                                                      Velocity
              Volume                                                                              provides the
       provides the                                                                              time at which
      amount of data                                                                               the data is
      and the form of                                                                            collected and
           data                                                                                     analyzed




                                       Variety provides the
                                    type of data collected
                                                              TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                         www.emiratesid.ae
                                                                                              © 2012 Emirates Identity Authority. All rights reserved
4th ‘V’ of Big Data ?


     • However, there is the
       fourth dimension - a
       fourth V- Veracity
       which encompasses
       the 3Vs!

     • Veracity provides the
            confidence in
            the truthfulness of
            the data.




                                                         TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                                 www.emiratesid.ae
                                                                                                       © 2012 Emirates Identity Authority. All rights reserved
Personal ID and Big Data ?
    Veracity of Data itself can be depicted using three dimensions:


     1. Veracity of Data is
     established by how the
     data itself is enabled-                                        2. Veracity of Data
     which stands for the                                           is established by the
     source of data.                                                means and
                                                                    methods of
                                                                    analysis- providing
                                                         Identity   discernible
                                                                    information



            3. Veracity of Data is then characterized by Personal
            Identity Management. This is the critical dimension
            of Big Data Veracity.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                   www.emiratesid.ae
                                                                         © 2012 Emirates Identity Authority. All rights reserved
Big Data ?

  • is not a new or unknown phenomenon.

  • Big Data as Volume Data has been used
    in Clinical Trials since long, resulting in many
    a ground breaking medicines.

  • Big Data as Volume Data has been in
    existence in DNA mapping and Genetics
    leading to many life-saving healthcare
    procedures.

  • While the Healthcare industry has been the
    initiator of big data analysis, retailers and
    marketing organizations have now started
    to make use of Big Data to further their
    commercial activities.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Web Analytics
• Numerous web analytics
  companies have now made
  it their business to collect all
  this trail and construct
  meaningful data from this
  huge data.

• Billions of posts in social
  networks, blogs, commerce
  sites, e-mails, text messages,
  utility payments are being
  “piggy-backed” to result in
  patterns of the digital
  interactions and individual
  behavior patterns then
  constructed from here.

• This is brilliant from a
  marketing point of view!

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Privacy ?




                                     But, from a privacy perspective, this could
                                      be construed as a blatant violation of
                                                individual privacy.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                       www.emiratesid.ae
                                                                             © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Personal ID and Digital Behaviour ?
  • as individuals, we Interact, we Transact, we
    Collaborate, we Communicate on a daily basis

  • .. which is sought to be
    analyzed for bringing
    commercial
    entities closer
    to the
    psyche of
    the individual
    (knowing
    customers –
    personalising
    services and
    products).




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and Digital Behaviour ?




               Big Data as in information and
               datasets have started to be
               cultivated based on the                   digital
               data we leave in
               our transactions.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬             www.emiratesid.ae
                                                                   © 2012 Emirates Identity Authority. All rights reserved
Digital Behaviour and Data Sets ?

    • We live in the digital world and are
      ubiquitously connected.

    • The Phone is no longer a calling device.

    • Our laptops, Tablets, Phablets and Phones
      keep us constantly engaged.

    • Every interaction leaves a huge trail of
      data leaving behind bits and pieces
          of us with pointers to our real
          behaviour.

    • This raises then many issues governing
      privacy..

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Digital Behaviour and Data Sets ?

      • It is understood that collection of
        information from digital transactions
        and interactions is something that is
        unstoppable.

      • Whether we like it or not, the
        amount of digital trail we leave
        behind in the e-world is amazingly
        large.

      • This digital trail when analyzed is
        almost like a signature that we
        leave behind, making it very easy
        for analysts to identify us as
        individuals in the purported
        anonymity of the web.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Anonymity ?

    • The West, particularly the USA and the EU have
      made conscious moves to protect individual
      privacy from being abused with legal provisions.

    • Anonymity has been the key consideration on
          which the legal provisions have been made so far.

    • However, it has been proved beyond any
      reasonable doubt that anonymity is not
      guaranteed even when personal identifiers are
      removed from the data sets for analysis.

    • Even IP Addresses that relate to machines have
      been cracked to relate them to personal users.

    • So,    where does this leave an individual
          with respect to his/ her privacy?

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬        www.emiratesid.ae
                                                              © 2012 Emirates Identity Authority. All rights reserved
Big Data and Privacy ?



                    Data can be either useful or
                    perfectly anonymous but
                    never both.
                                                                 PAUL OHM
                                                            Associate Professor of Law
                                                         University of Colorado Law School




                    How True?!
Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬          www.emiratesid.ae
                                                                © 2012 Emirates Identity Authority. All rights reserved
Google Saying ?

               .. while anonymized information will always carry some risk of re-
               identification . . . . many of the most pressing privacy risks . . . exist only if
               there is certainty in re-identification, that is if the information can be
               authenticated. As uncertainty is introduced into the re-identification
               equation, we cannot know that the information truly corresponds to a
               particular individual; it becomes more anonymous as larger amounts of
               uncertainty are introduced.




                     Betsy Masiello                              Alma Whitten
                    Global Public Policy at Google              Privacy for Product and Engineering at Google
                    Betsy Masiello, Alma Whitten: Engineering Privacy in an Age of Information Abundance. AAAI Spring
                    Symposium: Intelligent Information Privacy Management 2010



Federal Authority    | ‫هيئــــــــة اتحــــــــــــادية‬                                                                 www.emiratesid.ae
                                                                                                                        © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Government IdM and Privacy
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
National ID for Big Data Analysis

     • an intense role of
       Government Issued
            Personal Identity as
            a Unique National ID.

     • this will be extremely
       critical in Big Data and
            Big Data Analytics
            providing the required
            privacy in anonymity
            and yet provide
            meaningful data for
            analysis.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
National ID for Big Data Analysis


  • A secure ID would encourage
    users to be engaged more actively
    and more expansively in the digital
    world.

  • It is in this context that the                       Digital
         Identity profile provided and
         packaged in a Secure Smart Card is
         expected to play a pivotal role.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬             www.emiratesid.ae
                                                                   © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                                                         The Digital Identity provides the perfect PROXY
                                                                      for the personal identity.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                    www.emiratesid.ae
                                                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                    The individuals would be known and authenticated as genuine persons
                          by the National Identity Authority providing a THIRD PARTY
                                        authentication for the identity.
Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                   www.emiratesid.ae
                                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                Thus, service providers can identify the potential service seeker securely
                       from the authentication provided by the Emirates ID Authority.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                    www.emiratesid.ae
                                                                          © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID




                        An individual will then be able to transact and interact freely without
                                       compromising his/her personal identity.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                           www.emiratesid.ae
                                                                                 © 2012 Emirates Identity Authority. All rights reserved
National ID for Big Data Analysis

         • The UAE National ID Card is
           designed to provide multi
           factor authentication.

         • At the core of the Digital ID is
           the Unique Identity Number
           issued by the Emirates ID
           Authority.

         • With this ID is associated with
           the Digital Identity Profile
           consisting of Biometric Data-
           Fingerprints and ICAO
           compliant photograph, and
           Digital Certificates issued for
           Identification and Signatures
           issued as a Secure Smart Card.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Personal ID and UAE National ID

         • Apart from the classical ID verification
           and authentication methods, projects
           are underway to upgrade the features
           to provide OTP (One-time-password)
           as per OATH Standards.

         • The ID card is a combi-card to work
           with contactless readers.

         • Projects are underway to develop the
           NFC enabled authentication methods
           using the GSM mobile phones and
           other mobile devices.

         • Each of the Digital ID profile
           components provides the ability for the
           user to be verified and further
           authenticated for access.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Protection of Individual Privacy

    • The Emirates ID Authority
      provides the necessary
          credential verification on
          the web.

    • The National ID Card could be
      used only with the Digital
      Credentials on the web
      transactions.

    • Emirates ID Authority does not
      share the personal information
          but provides only credential
          verification




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Protection of Individual Privacy

       • Service Providers are
         accorded with Verification
         and Authentication Services
         enabling secure remote
              transactions.

       • Service Seekers remain
         anonymous on the web
         since only Digital
              Certificates or Biometrics
              would be used to
              establish credential
              verification.




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Agenda
                      • Introduction: The Age of Big Data
                      • Big Data Characteristics
                      • Constructing Identity from Digital Behaviour
                      • Government IdM and Privacy
                      • Concluding Remarks
                      • Concluding Remarks




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                 www.emiratesid.ae
                                                                       © 2012 Emirates Identity Authority. All rights reserved
Concluding remarks
         • Big Data should be
           viewed to be about
           building Knowledge to
           support social,
           environmental, and
           economical development.

         • i.e., to improve efficiency,
           speed & accuracy of
           decisions, ability to
           forecast, cut costs, save
           energy, improve services,
           optimise infrastructure,
           enhance citizens quality of
           life, reduce environmental
           footprints, fuel innovation
           and diverse sustainable
           economic growth.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved
Concluding remarks

                                                         • Complexity will remain an issue!

                                                         • Successfully exploiting the value in
                                                           big data requires experimentation and
                                                           exploration.


         • Private sector will still lead the game, as Big Data will be viewed as a
           source of competition and growth.

         • Public sector will need to take Big Data more seriously, and put in
           place data-strategies to create new waves of productivity growth.

         • Main challenge: shortage of skills            [USA by 2018 will face shortage of around 2
               million managers and analysts with know-how to create and use big data to make
               effective decisions].


         • Need to address policies related to privacy, security, etc.

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬                                 www.emiratesid.ae
                                                                                       © 2012 Emirates Identity Authority. All rights reserved
UAE National ID and Privacy




         • All data should be treated as personally identifiable and
               subjected to the regulatory framework.

         • UAE (Emirates ID Authority) would provide this regulatory framework
           to ensure identity protection.

         • Technical and Technology Solutions are already in place to support the
           regulatory and legal framework.


Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬             www.emiratesid.ae
                                                                   © 2012 Emirates Identity Authority. All rights reserved
More Information:

     Read our recent research from:
     http://www.emiratesid.gov.ae/ar/media-center/publications.aspx




Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬         www.emiratesid.ae
                                                               © 2012 Emirates Identity Authority. All rights reserved
You can use all
  the quantitative
  data you can get,
  but you still
  have to
  distrust it and
  use your own
  intelligence
  and judgment.
  [Alvin Toffler]
  Dr. Ail M. Al-Khouri
  Director General |
  Emirates Identity Authority |
  United Arab Emirates |
  ali.alkhouri@emiratesid.ae |
  www.emiratesid.ae

Federal Authority   | ‫هيئــــــــة اتحــــــــــــادية‬   www.emiratesid.ae
                                                         © 2012 Emirates Identity Authority. All rights reserved

Contenu connexe

Tendances

Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...APNIC
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?Patrick Soenen
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorOlivier Busolini
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Dr. Ahmed Al Zaidy
 
Pole Investigations
Pole InvestigationsPole Investigations
Pole InvestigationsNeo4j
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
Data Privacy Compliance: Why & How
Data Privacy Compliance: Why & How  Data Privacy Compliance: Why & How
Data Privacy Compliance: Why & How Andrea Huck-Esposito
 
Data Privacy
Data PrivacyData Privacy
Data PrivacyHome
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsIain Dickson
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRCharlie Pownall
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionMohit Pandey
 
Microsoft azure, dynamics 365, and other online services iso27001, 27018, 2...
Microsoft azure, dynamics 365, and other online services   iso27001, 27018, 2...Microsoft azure, dynamics 365, and other online services   iso27001, 27018, 2...
Microsoft azure, dynamics 365, and other online services iso27001, 27018, 2...VidipOlhyan
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasuresKAMRAN KHALID
 
La cybersecurity e la protezione dei dati
La cybersecurity e la protezione dei datiLa cybersecurity e la protezione dei dati
La cybersecurity e la protezione dei datiVincenzo Calabrò
 

Tendances (20)

Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
Presentation on 'Understanding and Utilising Threat Intelligence in Cybersecu...
 
GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?GDPR Are you ready for auditing privacy ?
GDPR Are you ready for auditing privacy ?
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5Fundamentals of Information Systems Security Chapter 5
Fundamentals of Information Systems Security Chapter 5
 
Pole Investigations
Pole InvestigationsPole Investigations
Pole Investigations
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
Data Privacy Compliance: Why & How
Data Privacy Compliance: Why & How  Data Privacy Compliance: Why & How
Data Privacy Compliance: Why & How
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Microsoft azure, dynamics 365, and other online services iso27001, 27018, 2...
Microsoft azure, dynamics 365, and other online services   iso27001, 27018, 2...Microsoft azure, dynamics 365, and other online services   iso27001, 27018, 2...
Microsoft azure, dynamics 365, and other online services iso27001, 27018, 2...
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
La cybersecurity e la protezione dei dati
La cybersecurity e la protezione dei datiLa cybersecurity e la protezione dei dati
La cybersecurity e la protezione dei dati
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 

Similaire à Partners in Building UAE's Security & Economy Through Privacy in the Age of Big Data

Konceptuelt overblik over Big Data, Flemming Bagger, IBM
Konceptuelt overblik over Big Data, Flemming Bagger, IBMKonceptuelt overblik over Big Data, Flemming Bagger, IBM
Konceptuelt overblik over Big Data, Flemming Bagger, IBMIBM Danmark
 
Data Science Courses - BigData VS Data Science
Data Science Courses - BigData VS Data ScienceData Science Courses - BigData VS Data Science
Data Science Courses - BigData VS Data ScienceDataMites
 
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012James Mailley
 
Trends and Development in Government Sector: Building e-Government Backbone
Trends and Development in Government Sector: Building e-Government BackboneTrends and Development in Government Sector: Building e-Government Backbone
Trends and Development in Government Sector: Building e-Government BackboneArab Federation for Digital Economy
 
Identity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudIdentity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudCharles Li
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analyticsMike Davis
 
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptxHamidHajaoui1
 
The Development of a National Identity Management System to Support National ...
The Development of a National Identity Management System to Support National ...The Development of a National Identity Management System to Support National ...
The Development of a National Identity Management System to Support National ...Arab Federation for Digital Economy
 
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoSmarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoJyothi Satyanathan
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...eswcsummerschool
 

Similaire à Partners in Building UAE's Security & Economy Through Privacy in the Age of Big Data (20)

Developing More Inclusive and Innovative Government
Developing More Inclusive and Innovative GovernmentDeveloping More Inclusive and Innovative Government
Developing More Inclusive and Innovative Government
 
Strategic Vision: Public eID Programs in GCC Countries
Strategic Vision: Public eID Programs in GCC CountriesStrategic Vision: Public eID Programs in GCC Countries
Strategic Vision: Public eID Programs in GCC Countries
 
The Development of Digital Economy
The Development of Digital EconomyThe Development of Digital Economy
The Development of Digital Economy
 
Konceptuelt overblik over Big Data, Flemming Bagger, IBM
Konceptuelt overblik over Big Data, Flemming Bagger, IBMKonceptuelt overblik over Big Data, Flemming Bagger, IBM
Konceptuelt overblik over Big Data, Flemming Bagger, IBM
 
Data Science Courses - BigData VS Data Science
Data Science Courses - BigData VS Data ScienceData Science Courses - BigData VS Data Science
Data Science Courses - BigData VS Data Science
 
KMWorld Presentation
KMWorld PresentationKMWorld Presentation
KMWorld Presentation
 
ٍSmart Government Circle of Attention
ٍSmart Government Circle of AttentionٍSmart Government Circle of Attention
ٍSmart Government Circle of Attention
 
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
Big Data and Mobile Recruitment - Irish Recruiters Conf Dec 2012
 
Trends and Development in Government Sector: Building e-Government Backbone
Trends and Development in Government Sector: Building e-Government BackboneTrends and Development in Government Sector: Building e-Government Backbone
Trends and Development in Government Sector: Building e-Government Backbone
 
The Development of a Federal Digital Identity
The Development of a Federal Digital IdentityThe Development of a Federal Digital Identity
The Development of a Federal Digital Identity
 
Identity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudIdentity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the Cloud
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analytics
 
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
2.ICESCO-Mr ADEL SMEDA -Role of Big Data on Achieving Smart Cities-1.pptx
 
The Development of a National Identity Management System to Support National ...
The Development of a National Identity Management System to Support National ...The Development of a National Identity Management System to Support National ...
The Development of a National Identity Management System to Support National ...
 
An Innovative Framework for e Government Transformation
An Innovative Framework for e Government TransformationAn Innovative Framework for e Government Transformation
An Innovative Framework for e Government Transformation
 
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoSmarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
 
OWF12/Java Michael hirt
OWF12/Java Michael hirtOWF12/Java Michael hirt
OWF12/Java Michael hirt
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
ESWC SS 2012 - Wednesday Keynote Spyros Kotoulas : Managing the Information o...
 
Smart & Safer Cities by Richard Knight
Smart & Safer Cities by Richard KnightSmart & Safer Cities by Richard Knight
Smart & Safer Cities by Richard Knight
 

Plus de Arab Federation for Digital Economy

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربيةArab Federation for Digital Economy
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةArab Federation for Digital Economy
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Arab Federation for Digital Economy
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتArab Federation for Digital Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةArab Federation for Digital Economy
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيArab Federation for Digital Economy
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionArab Federation for Digital Economy
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةArab Federation for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟Arab Federation for Digital Economy
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...Arab Federation for Digital Economy
 

Plus de Arab Federation for Digital Economy (20)

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
 
Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19
 
سلطة العقل
سلطة العقلسلطة العقل
سلطة العقل
 
الحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارساتالحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارسات
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
 
Digital economy and national security
Digital economy and national securityDigital economy and national security
Digital economy and national security
 
New World Economy
New World EconomyNew World Economy
New World Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئة
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
 
Digital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital TransformationDigital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital Transformation
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
 
Conflicts in Organisations
Conflicts in OrganisationsConflicts in Organisations
Conflicts in Organisations
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
 

Dernier

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Partners in Building UAE's Security & Economy Through Privacy in the Age of Big Data

  • 1. Partners in Building UAE's Security & Economy Privacy in the Age of Big Data © 2013 Emirates Identity Authority. All rights reserved Presented by Dr. Ali M. Al-Khouri www.emiratesid.ae In: Big Data Systems, Applications and Privacy Conference – Organised by New York University, Abu Dhabi, UAE. 10 – 11 March 2013 | Injazat Data Systems | Abu Dhabi | UAE Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE
  • 2. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 3. Agenda • Introduction: The Age of Big Data • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 4. Big Data in Digital World ? • The proliferation of modern technologies, smart devices and Climate Change popularity of social networking is generating unprecedented amounts of data, both structured and unstructured, whether it be text, audio or video. • Data has become ubiquitous in this digital world. • Sheer amount of bytes that we generate daily is indeed mind boggling! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 5. The Age of Big Data ? every day, we create 2.5 quintillion bytes of data .. This data is big data 90% of the data in the world today has been created Climate Change in the last two years. IBM Report We are truly in a digital explosion era! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 6. Data Growth 112 Zettabytes all computer hard drives in the world = 160 exabytes in 2006 all storage systems didn’t reach one zettabyte of information in 2012! 295 Global Growth of Digital Storage Capacity 1986-2021 By 2020, 112 Zettabytes of data (75% growth rate) One Zettabyte = 1,000,000,000,000,000,000,000 byte, or 1000 exabytes Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 7. Big Data ? • is generated from practically every where: - Social media sites (facebook, twitter, linked-in..) - digital pictures and videos, - e-mails, - purchase transaction records, Climate Change - cell phone, GPS signals, - geo-stationary satellites, - meteorological sensors - to name a few. • This continues to grow at an exponential rate. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 8. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 9. Big Data characteristics? • Big Data has come to be characterized by the Volume, Velocity and Variety of Data that is generated. • These constitute the 3Vs of Big Data. TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 10. 3Vs of Big Data ? Velocity Volume provides the provides the time at which amount of data the data is and the form of collected and data analyzed Variety provides the type of data collected TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 11. 4th ‘V’ of Big Data ? • However, there is the fourth dimension - a fourth V- Veracity which encompasses the 3Vs! • Veracity provides the confidence in the truthfulness of the data. TWDI Best Practices Report Q4 2011- Big Data Analysis- Philip Russom Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 12. Personal ID and Big Data ? Veracity of Data itself can be depicted using three dimensions: 1. Veracity of Data is established by how the data itself is enabled- 2. Veracity of Data which stands for the is established by the source of data. means and methods of analysis- providing Identity discernible information 3. Veracity of Data is then characterized by Personal Identity Management. This is the critical dimension of Big Data Veracity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 13. Big Data ? • is not a new or unknown phenomenon. • Big Data as Volume Data has been used in Clinical Trials since long, resulting in many a ground breaking medicines. • Big Data as Volume Data has been in existence in DNA mapping and Genetics leading to many life-saving healthcare procedures. • While the Healthcare industry has been the initiator of big data analysis, retailers and marketing organizations have now started to make use of Big Data to further their commercial activities. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 14. Web Analytics • Numerous web analytics companies have now made it their business to collect all this trail and construct meaningful data from this huge data. • Billions of posts in social networks, blogs, commerce sites, e-mails, text messages, utility payments are being “piggy-backed” to result in patterns of the digital interactions and individual behavior patterns then constructed from here. • This is brilliant from a marketing point of view! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 15. Privacy ? But, from a privacy perspective, this could be construed as a blatant violation of individual privacy. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 16. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 17. Personal ID and Digital Behaviour ? • as individuals, we Interact, we Transact, we Collaborate, we Communicate on a daily basis • .. which is sought to be analyzed for bringing commercial entities closer to the psyche of the individual (knowing customers – personalising services and products). Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 18. Personal ID and Digital Behaviour ? Big Data as in information and datasets have started to be cultivated based on the digital data we leave in our transactions. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 19. Digital Behaviour and Data Sets ? • We live in the digital world and are ubiquitously connected. • The Phone is no longer a calling device. • Our laptops, Tablets, Phablets and Phones keep us constantly engaged. • Every interaction leaves a huge trail of data leaving behind bits and pieces of us with pointers to our real behaviour. • This raises then many issues governing privacy.. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 20. Digital Behaviour and Data Sets ? • It is understood that collection of information from digital transactions and interactions is something that is unstoppable. • Whether we like it or not, the amount of digital trail we leave behind in the e-world is amazingly large. • This digital trail when analyzed is almost like a signature that we leave behind, making it very easy for analysts to identify us as individuals in the purported anonymity of the web. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 21. Anonymity ? • The West, particularly the USA and the EU have made conscious moves to protect individual privacy from being abused with legal provisions. • Anonymity has been the key consideration on which the legal provisions have been made so far. • However, it has been proved beyond any reasonable doubt that anonymity is not guaranteed even when personal identifiers are removed from the data sets for analysis. • Even IP Addresses that relate to machines have been cracked to relate them to personal users. • So, where does this leave an individual with respect to his/ her privacy? Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 22. Big Data and Privacy ? Data can be either useful or perfectly anonymous but never both. PAUL OHM Associate Professor of Law University of Colorado Law School How True?! Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 23. Google Saying ? .. while anonymized information will always carry some risk of re- identification . . . . many of the most pressing privacy risks . . . exist only if there is certainty in re-identification, that is if the information can be authenticated. As uncertainty is introduced into the re-identification equation, we cannot know that the information truly corresponds to a particular individual; it becomes more anonymous as larger amounts of uncertainty are introduced. Betsy Masiello Alma Whitten Global Public Policy at Google Privacy for Product and Engineering at Google Betsy Masiello, Alma Whitten: Engineering Privacy in an Age of Information Abundance. AAAI Spring Symposium: Intelligent Information Privacy Management 2010 Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 24. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Government IdM and Privacy • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 25. National ID for Big Data Analysis • an intense role of Government Issued Personal Identity as a Unique National ID. • this will be extremely critical in Big Data and Big Data Analytics providing the required privacy in anonymity and yet provide meaningful data for analysis. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 26. National ID for Big Data Analysis • A secure ID would encourage users to be engaged more actively and more expansively in the digital world. • It is in this context that the Digital Identity profile provided and packaged in a Secure Smart Card is expected to play a pivotal role. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 27. Personal ID and UAE National ID The Digital Identity provides the perfect PROXY for the personal identity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 28. Personal ID and UAE National ID The individuals would be known and authenticated as genuine persons by the National Identity Authority providing a THIRD PARTY authentication for the identity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 29. Personal ID and UAE National ID Thus, service providers can identify the potential service seeker securely from the authentication provided by the Emirates ID Authority. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 30. Personal ID and UAE National ID An individual will then be able to transact and interact freely without compromising his/her personal identity. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 31. National ID for Big Data Analysis • The UAE National ID Card is designed to provide multi factor authentication. • At the core of the Digital ID is the Unique Identity Number issued by the Emirates ID Authority. • With this ID is associated with the Digital Identity Profile consisting of Biometric Data- Fingerprints and ICAO compliant photograph, and Digital Certificates issued for Identification and Signatures issued as a Secure Smart Card. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 32. Personal ID and UAE National ID • Apart from the classical ID verification and authentication methods, projects are underway to upgrade the features to provide OTP (One-time-password) as per OATH Standards. • The ID card is a combi-card to work with contactless readers. • Projects are underway to develop the NFC enabled authentication methods using the GSM mobile phones and other mobile devices. • Each of the Digital ID profile components provides the ability for the user to be verified and further authenticated for access. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 33. Protection of Individual Privacy • The Emirates ID Authority provides the necessary credential verification on the web. • The National ID Card could be used only with the Digital Credentials on the web transactions. • Emirates ID Authority does not share the personal information but provides only credential verification Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 34. Protection of Individual Privacy • Service Providers are accorded with Verification and Authentication Services enabling secure remote transactions. • Service Seekers remain anonymous on the web since only Digital Certificates or Biometrics would be used to establish credential verification. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 35. Agenda • Introduction: The Age of Big Data • Big Data Characteristics • Constructing Identity from Digital Behaviour • Government IdM and Privacy • Concluding Remarks • Concluding Remarks Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 36. Concluding remarks • Big Data should be viewed to be about building Knowledge to support social, environmental, and economical development. • i.e., to improve efficiency, speed & accuracy of decisions, ability to forecast, cut costs, save energy, improve services, optimise infrastructure, enhance citizens quality of life, reduce environmental footprints, fuel innovation and diverse sustainable economic growth. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 37. Concluding remarks • Complexity will remain an issue! • Successfully exploiting the value in big data requires experimentation and exploration. • Private sector will still lead the game, as Big Data will be viewed as a source of competition and growth. • Public sector will need to take Big Data more seriously, and put in place data-strategies to create new waves of productivity growth. • Main challenge: shortage of skills [USA by 2018 will face shortage of around 2 million managers and analysts with know-how to create and use big data to make effective decisions]. • Need to address policies related to privacy, security, etc. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 38. UAE National ID and Privacy • All data should be treated as personally identifiable and subjected to the regulatory framework. • UAE (Emirates ID Authority) would provide this regulatory framework to ensure identity protection. • Technical and Technology Solutions are already in place to support the regulatory and legal framework. Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 39. More Information: Read our recent research from: http://www.emiratesid.gov.ae/ar/media-center/publications.aspx Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved
  • 40. You can use all the quantitative data you can get, but you still have to distrust it and use your own intelligence and judgment. [Alvin Toffler] Dr. Ail M. Al-Khouri Director General | Emirates Identity Authority | United Arab Emirates | ali.alkhouri@emiratesid.ae | www.emiratesid.ae Federal Authority | ‫هيئــــــــة اتحــــــــــــادية‬ www.emiratesid.ae © 2012 Emirates Identity Authority. All rights reserved