Search for: "Daniel Barth-Jones" Results 1 - 7 of 7
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
10 Sep 2014, 11:06 am by Jeff
My boy Daniel Barth-Jones has an article in FierceBigData discussing MOOCs, MUACs, and how concerns that de-identification might skew research results shouldn't be the death of deidentification or anonymization. [read post]
13 Feb 2015, 12:24 pm by Jeff
  A big hat tip to Daniel Barth-Jones (@dbarthjones) for this link. [read post]
22 Jun 2012, 8:18 am by jyakowitz
Daniel Barth-Jones has recently uploaded a fascinating new article that revisits the famous Gov. [read post]
4 Dec 2011, 6:02 pm by Daniel Solove
Panelists: Daniel Barth-Jones, PhD, MPH, Assistant Professor of Clinical Epidemiology, Columbia University Mitra Rocca, Associate Director in Medical Informatics, Food and Drug Administration, Sentinel Project Harlan Yu, Ph.D. candidate in the Computer Science Department and the Center for Information Technology Policy at Princeton University Moderator: Marcy Wilder, Partner and Co-Director of the Hogan Lovells Privacy and Information Management Practice … [read post]
13 May 2013, 10:43 am by Michelle N. Meyer
., research participant, re-identification researcher, privacy scholar, research ethicist) and will, I expect, have a range of perspectives on these questions: Misha Angrist Madeleine Ball Daniel Barth-Jones Yaniv Erlich Beau Gunderson Stephen Wilson Michelle Meyer Arvind Narayanan Paul Ohm Latanya Sweeney Jennifer Wagner I hope readers will join us on May 20. [read post]
6 Sep 2012, 12:16 pm by Daniel Barth-Jones
The Myth of Superuser: Toward Accurate Assessment of Unrealized Possibilities In a recent Concurring Opinion blog post, I provided a critical re-examination of the famous re-identification of Massachusetts Governor William Weld’s health information as accounted by Paul Ohm, in his 2010 paper “Broken Promises of Privacy” and exposed a fatal flaw, the “Myth of the Perfect Population Register”  which constitutes a serious challenge to all re-identification attacks. [read post]