Page 51 - TrafficInfratech Magazine Feb - Mar 2020
P. 51

SMART MOBILITY






















































                data for identification. For example,   illicitly obtained key or password   Creating value while
                one Australian student was able to   was needed to access confidential   protecting privacy
                locate military bases in the Middle   information.
                East using anonymised data from a   Security protection makes sure   Any company that provides
                fitness app. In fact, MIT researchers   that data is not provided to the   third parties with consumer data
                have long known that it is possible                            is likely to inadvertently transmit
                to identify individuals using as little   unintended recipient. Privacy issues,   information that identifies those
                                                                               affected by the data. This is not a
                as four location data points.   on the other hand, arise when
                                                companies open certain information   problem for companies that confine
                The nuance between              to their data users, which can   their data internally, to improve
                privacy and security            then be exploited for malicious   their own services. However,
                                                                               companies that provide open data
                                                purposes. Well-meaning developers
                  In  such  cases  of  invasion                                to foster innovation must take
                of privacy, reconstructions of   or researchers can rely on open data   a thoughtful approach before
                anonymized  location  data  are   to design smarter solutions and   disclosing information.
                carried out using publicly available   yet, with wrong intent, this can be   Businesses that rely on and share
                data. In the case of the Australian   cross-referenced with other external   open  data  must  operate  more
                student, no security breach was   information  to reveal information   intelligently to defend users’ privacy.
                officially found; in other words, no   that is not intended to be exposed.  Research teams whose goal it is to







         www.trafficinfratech-com-500653.hostingersite.com                                                        February-March 2020 / TrafficInfraTech  51
   46   47   48   49   50   51   52   53   54   55   56