Page 51 - TrafficInfratech Magazine Feb - Mar 2020
P. 51
SMART MOBILITY
data for identification. For example, illicitly obtained key or password Creating value while
one Australian student was able to was needed to access confidential protecting privacy
locate military bases in the Middle information.
East using anonymised data from a Security protection makes sure Any company that provides
fitness app. In fact, MIT researchers that data is not provided to the third parties with consumer data
have long known that it is possible is likely to inadvertently transmit
to identify individuals using as little unintended recipient. Privacy issues, information that identifies those
affected by the data. This is not a
as four location data points. on the other hand, arise when
companies open certain information problem for companies that confine
The nuance between to their data users, which can their data internally, to improve
privacy and security then be exploited for malicious their own services. However,
companies that provide open data
purposes. Well-meaning developers
In such cases of invasion to foster innovation must take
of privacy, reconstructions of or researchers can rely on open data a thoughtful approach before
anonymized location data are to design smarter solutions and disclosing information.
carried out using publicly available yet, with wrong intent, this can be Businesses that rely on and share
data. In the case of the Australian cross-referenced with other external open data must operate more
student, no security breach was information to reveal information intelligently to defend users’ privacy.
officially found; in other words, no that is not intended to be exposed. Research teams whose goal it is to
www.trafficinfratech-com-500653.hostingersite.com February-March 2020 / TrafficInfraTech 51

