Privacy Issues in Geospatial Visual Analytics
Visual and interactive techniques can pose specific challenges to personal privacy by enabling a human analyst to link data to context, pre-existing knowledge, and additional information obtained from various sources. Unlike in computational analysis, relevant knowledge and information do not have to be represented in a structured form in order to be used effectively by a human. Furthermore, humans can note such kinds of patterns and relationships that are hard to formalize and detect by computational techniques. The privacy issues particularly related to the use of visual and interactive methods are currently studied neither in the areas of visualization and visual analytics nor in the area of data mining and computational analysis. There is a need to fill this gap, which requires concerted inter-disciplinary efforts.
KeywordsMobility privacy visual analytics
Unable to display preview. Download preview PDF.
- Andrienko, G., Andrienko, N., and Heurich, M. An event-based conceptual model for context-aware movement analysis. International Journal of Geographical Information Science, 2011, in pressGoogle Scholar
- Andrienko, G.,Andrienko, N., Giannotti, F., Monreale,A., and Pedreschi, D. Movement Data Anonymity through Generalization. SPRINGL 2009 – Proceedings of 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, November 3, 2009, Seattle, WA, USA; http://doi.acm.org/10.1145/1667502.1667510Google Scholar
- Armstrong, M.P. Geographic Information Technologies and Their Potentially Erosive Effects on Personal Privacy, Studies in the Social Sciences, 27(1), 2002, pp. 19–28Google Scholar
- Cho, G. GIS, Personal Privacy and the Law. Wilson, J.P., and Fotheringham, A.S. (eds). Handbook of Geographic Information Science, Oxford: Blackwell Publishing, 2008, pp. 519–539.Google Scholar
- Duckham, M., Kulik, L., and Birtley,A.Aspatiotemporal model of obfuscation strategies and counter strategies for location privacy. In Raubal, M., Miller, H., Frank,A., and Goodchild, M. (eds), Lecture Notes in Computer Science 4197, Springer, 2006, pp. 47–64.Google Scholar
- Giannotti, F., and Pedreschi, D., eds. Mobility, Data Mining and Privacy – Geographic Knowledge discovery. Springer, Berlin, 2007.Google Scholar
- Gutmann, M.P., and Stern, P.C., eds. Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data, Panel on Confidentiality Issues Arising from the Integration of Remotely Sensed and Self-Identifying Data, National Research Council, National Academies Press, Washington, DC, USA, 2007Google Scholar
- Maciejewski, R., Rudolph, S., Hafen, R., Abusalah, A., Yakout, M., Ouzzani, M., Cleveland, W.S., Grannis, S.J., Wade, M. and Ebert, D.S. Understanding Syndromic Hotspots – A Visual Analytics Approach. IEEE Symposium on Visual Analytics Science and Technology VAST 2008, Columbus, OH, pp. 35–42.Google Scholar
- Monreale, A., Andrienko, G., Andrienko, N., Giannotti, F., Pedreschi, D., Rinzivillo, S., and Wrobel, S. Movement Data Anonymity through Generalization, Transactions on Data Privacy, 3(3), 2010, pp. 91–121Google Scholar