2022 IEEE Symposium on Visualization for Cyber Security (VizSec) 2022
DOI: 10.1109/vizsec56996.2022.9941431
|View full text |Cite
|
Sign up to set email alerts
|

PRIVEE: A Visual Analytic Workflow for Proactive Privacy Risk Inspection of Open Data

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…Collaborative efforts are critical because open data projects frequently involve several stakeholders, which promotes knowledge exchange and resource sharing. User-friendly data portals, as advocated by the Open Data Charter, are required for efficient data sharing [42]. It is critical to ensure that data is easily accessible, downloadable, and machine-readable.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Collaborative efforts are critical because open data projects frequently involve several stakeholders, which promotes knowledge exchange and resource sharing. User-friendly data portals, as advocated by the Open Data Charter, are required for efficient data sharing [42]. It is critical to ensure that data is easily accessible, downloadable, and machine-readable.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Computing embeddings is often at the beginning of a VA pipeline to unify input data into the same vector space, particularly for anomaly detection and risk inspection. In PRIVEE [BIVD22], embeddings are used to find and represent joinable datasets. Additional operations, such as weighting factors, can be incorporated into embedding vectors to convey additional customized, attribute‐based information.…”
Section: Categorization Of Va + Embedding Approachesmentioning
confidence: 99%
“…Sawyer et al observed that the performance of human observers deteriorates over time in a low-signal vigilance scenario, which is a likely scenario for data defenders [32], who are faced with the arduous task of finding needles, i.e., privacy vulnerabilities, in the unsuspecting haystack of linkable open data. As our third contribution, we discuss how vulnerabilities can be detected and triaged using visual analytic interventions [2] that can serve as cognitive aid for data defenders for continuous monitoring of privacy risks. We focus on the vulnerabilities discovered and their possible remediation through visual analytic solutions (Section IV).…”
Section: Introductionmentioning
confidence: 99%