Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems

Published: 17 March 2021 Publication History

Abstract

Events such as Facebook-Cambridge Analytica scandal and data aggregation efforts by technology providers have illustrated how fragile modern society is to privacy violations. Internationally recognized entities such as the National Science Foundation (NSF) have indicated that Artificial Intelligence (AI)-enabled models, artifacts, and systems can efficiently and effectively sift through large quantities of data from legal documents, social media, Dark Web sites, and other sources to curb privacy violations. Yet considerable efforts are still required for understanding prevailing data sources, systematically developing AI-enabled privacy analytics to tackle emerging challenges, and deploying systems to address critical privacy needs. To this end, we provide an overview of prevailing data sources that can support AI-enabled privacy analytics; a multi-disciplinary research framework that connects data, algorithms, and systems to tackle emerging AI-enabled privacy analytics challenges such as entity resolution, privacy assistance systems, privacy risk modeling, and more; a summary of selected funding sources to support high-impact privacy analytics research; and an overview of prevailing conference and journal venues that can be leveraged to share and archive privacy analytics research. We conclude this paper with an introduction of the papers included in this special issue.

References

[1]
Ahmed Abbasi, Suprateek Sarker, and Roger Chiang. 2016. Big data research in information systems: Toward an inclusive research agenda. J. Assoc. Inf. Syst. 17, 2 (February 2016), I–XXXII.
[2]
A. Acquisti, L. Brandimarte, and G. Loewenstein. 2015. Privacy and human behavior in the age of information. Science (80). 347, 6221 (January 2015), 509--514.
[3]
A. Acquisti and J. Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Secur. Priv. Mag. 3, 1 (January 2005), 26--33.
[4]
Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson. 2017. Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Comput. Surv. 50, 3 (October 2017), 1--41.
[5]
Idris Adjerid, Eyal Peer, and Alessandro Acquisti. 2018. Beyond the privacy paradox: Objective versus relative risk in privacy decision making. MIS Q. 42, 2 (February 2018), 465--488.
[6]
Imrul Chowdhury Anindya, Harichandan Roy, Murat Kantarcioglu, and Bradley Malin. 2017. Building a dossier on the cheap: Integrating distributed personal data resources under cost constraints. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. 1549--1558.
[7]
Nolan Arnold, Mohammadreza Ebrahimi, Ning Zhang, Ben Lazarine, Mark Patton, Hsinchun Chen, and Sagar Samtani. 2019. Dark-net ecosystem cyber-threat intelligence (CTI) tool. In 2019 IEEE International Conference on Intelligence and Security Informatics (ISI'19).
[8]
Indranil Bardhan, Hsinchun Chen, and Elena Karahanna. 2020. Connecting systems, data, and people: A multidisciplinary research roadmap for chronic disease management. MIS Q. 44, 1 (2020), 185--200.
[9]
Vaishak Belle and Ioannis Papantonis. 2020. Principles and practice of explainable machine learning. (September 2020). Retrieved from http://arxiv.org/abs/2009.11698.
[10]
Katy Börner and David E. Polley. 2014. Visual Insights: A Practical Guide to Making Sense of Data. The MIT Press.
[11]
Joseph R. Buckman, Jesse C. Bockstedt, and Matthew J. Hashim. 2019. Relative privacy valuations under varying disclosure characteristics. Inf. Syst. Res. 30, 2 (June 2019), 375--388.
[12]
Zike Cao, Kai-Lung Hui, and Hong Xu. 2018. An economic analysis of peer disclosure in online social communities. Inf. Syst. Res. 29, 3 (September 2018), 546--566.
[13]
Hsinchun Chen, Roger H. L. Chiang, and Veda C. Storey. 2012. Business intelligence and analytics: From big data to big impact. MIS Q. 36, 4 (2012), 1165--1188.
[14]
Robert E. Crossler and France Bélanger. 2019. Why would I use location-protective settings on my smartphone? Motivating protective behaviors and the existence of the privacy knowledge--belief gap. Inf. Syst. Res. 30, 3 (September 2019), 995--1006.
[15]
Anupam Das, Martin Degeling, Daniel Smullen, and Norman Sadeh. 2018. Personalized privacy assistants for the internet of things: Providing users with notice and choice. IEEE Pervasive Comput. 17, 3 (July 2018), 35--46.
[16]
Anupam Das, Martin Degeling, Xiaoyou Wang, Junjue Wang, Norman Sadeh, and Mahadev Satyanarayanan. 2017. Assisting users in a world full of cameras: A privacy-aware infrastructure for computer vision applications. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). 1387--1396.
[17]
André Deuker. 2010. Addressing the privacy paradox by expanded privacy awareness -- The example of context-aware services. In Privacy and Identity Management for Life. 275--283.
[18]
Mengnan Du, Ninghao Liu, and Xia Hu. 2019. Techniques for interpretable machine learning. Commun. ACM 63, 1 (July 2019), 68--77.
[19]
Po-Yi Du, Ning Zhang, Mohammedreza Ebrahimi, Sagar Samtani, Ben Lazarine, Nolan Arnold, Rachael Dunn, Sandeep Suntwal, Guadalupe Angeles, Robert Schweitzer, and Hsinchun Chen. 2018. Identifying, collecting, and presenting hacker community data: Forums, IRC, carding shops, and DNMs. In 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). 70--75.
[20]
Malaka El, Emma McMahon, Sagar Samtani, Mark Patton, and Hsinchun Chen. 2017. Benchmarking vulnerability scanners: An experiment on SCADA devices and scientific instruments. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). 83--88.
[21]
Pardis Emami-Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security (SOUPS’17). 399--412.
[22]
Esther Gal-Or, Ronen Gal-Or, and Nabita Penmetsa. 2018. The role of user privacy concerns in shaping competition among platforms. Inf. Syst. Res. 29, 3 (September 2018), 698--722.
[23]
Shirley Gregor and Alan R. Hevner. 2013. Positioning and presenting design science research for maximum impact. MIS Q. 37, 2 (2013), 337--355.
[24]
John Grisham, Sagar Samtani, Mark Patton, and Hsinchun Chen. 2017. Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). 13--18.
[25]
Christopher R. Harrell, Mark Patton, Hsinchun Chen, and Sagar Samtani. 2018. Vulnerability assessment, remediation, and automated reporting: Case studies of higher education institutions. In 2018 IEEE International Conference on Intelligence and Security Informatics (ISI'18).
[26]
Irina Heimbach and Oliver Hinz. 2018. The impact of sharing mechanism design on content sharing in online social networks. Inf. Syst. Res. 29, 3 (September 2018), 592--611.
[27]
Hemant Jain, Balaji Padmanabhan, Paul A. Pavlou, and Raghu T. Santanam. 2018. Humans, algorithms, and augmented intelligence: The future of work, organizations, and society. Inf. Syst. Res. 29, 1 (March 2018), 250--251.
[28]
Seung Hyun Kim and Juhee Kwon. 2019. How do EHRs and a meaningful use initiative affect breaches of patient information? Inf. Syst. Res. 30, 4 (December 2019), 1184--1202.
[29]
Mehmet Kuzu, Murat Kantarcioglu, Elizabeth Ashley Durham, Csaba Toth, and Bradley Malin. 2013. A practical approach to achieve private medical record linkage in light of public resources. J. Am. Med. Informatics Assoc. 20, 2 (March 2013), 285--292.
[30]
Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (May 2015), 436--444.
[31]
Xiao-Bai Li and Jialun Qin. 2017. Anonymizing and sharing medical text records. Inf. Syst. Res. 28, 2 (2017), 332--352.
[32]
Yunji Liang, Sagar Samtani, Bin Guo, and Zhiwen Yu. 2020. Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective. IEEE Internet Things J. 7, 9 (September 2020), 9128--9143.
[33]
Fangyu Lin, Zara Ahmad-Post, Yizhi Liu, James Lee Hu, Mohammadreza Ebrahimi, Jingyu Xin, Sagar Samtani, Weifeng Li, and Hsinchun Chen. 2020. Linking personally identifiable information from the dark web to the surface web: A deep entity resolution approach. In IEEE International Conference on Data Mining (ICDM) Workshop on Deep Learning for Cyber Threat Intelligence (DL-CTI).
[34]
Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. 2016. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security (SOUPS’16). 27--41.
[35]
Yizhi Liu, Fang Yu Lin, Zara Ahmad-Post, Mohammadreza Ebrahimi, Ning Zhang, James Lee Hu, Jingyu Xin, Weifeng Li, and Hsinchun Chen. 2020. Identifying, collecting, and monitoring personally identifiable information: From the dark web to the surface web. In 2020 IEEE International Conference on Intelligence and Security Informatics (ISI). 1--6.
[36]
Yongtai Liu, Chao Yan, Zhijun Yin, Zhiyu Wan, Weiyi Xia, Murat Kantarcioglu, Yevgeniy Vorobeychik, Ellen Wright Clayton, and Bradley A. Malin. 2019. Biomedical research cohort membership disclosure on social media. In 2019 Annual AMIA Symposium Proceedings. 607--616. Retrieved from http://www.ncbi.nlm.nih.gov/ /32308855.
[37]
Venkata Vamsikrishna Meduri, Lucian Popa, Prithviraj Sen, and Mohamed Sarwat. 2020. A comprehensive benchmark framework for active learning methods in entity matching. In Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data. 1133--1147.
[38]
National Science & Technology Council. 2019. The National Artificial Intelligence Research and Development Strategic Plan: 2019 Update. Washington, D.C. Retrieved from https://www.nitrd.gov/pubs/National-AI-RD-Strategy-2019.pdf.
[39]
National Science & Technology Council. 2019. Federal Cybersecurity Research and Development Strategic Plan. Retrieved from https://www.nitrd.gov/pubs/Federal-Cybersecurity-RD-Strategic-Plan-2019.pdf.
[40]
National Science Foundation. 2019. National Artificial Intelligence (AI) Research Institutes (2019). nsf20503 | NSF -- National Science. Retrieved from https://www.nsf.gov/pubs/2020/nsf20503/nsf20503.pdf.
[41]
Jay F. Nunamaker, Nathan W. Twyman, Justin Scott Giboney, and Robert O. Briggs. 2017. Creating high-value real-world impact through systematic programs of research. MIS Q. 41, 2 (February 2017), 335--351.
[42]
Jay F. Nunamaker, Minder Chen, and Titus D. M. Purdin. 1990. Systems development in information systems research. J. Manag. Inf. Syst. 7, 3 (1990), 89--106.
[43]
Isabelle Oomen and Ronald Leenes. 2008. Privacy risk perceptions and privacy protection strategies. In Policies and Research in Identity Management. Springer US, Boston, MA, 121--138.
[44]
Ken Peffers, Tuure Tuunanen, Marcus A. Rothenberger, and Samir Chatterjee. 2007. A design science research methodology for information systems research. J. Manag. Inf. Syst. 24, 3 (2007), 45--77.
[45]
Fabian Prasser, James Gaupp, Zhiyu Wan, Weiyi Xia, Yevgeniy Vorobeychik, Murat Kantarcioglu, Klaus Kuhn, and Brad Malin. 2017. An open source tool for game theoretic health data de-identification. In 2017 Annual AMIA Symposium Proceedings. 1430--1439. Retrieved from http://www.ncbi.nlm.nih.gov/ /29854212.
[46]
Arun Rai. 2020. Explainable AI: From black box to glass box. J. Acad. Mark. Sci. 48, 1 (January 2020), 137--141.
[47]
Arun Rai, Panos Constantinides, and Saonee Sarker. 2018. Editor's comments: Next-generation digital platforms: Toward human--AI hybrids. MIS Q. 43, 1 (2018), iii--ix.
[48]
Sagar Samtani, Maggie Abate, Victor Benjamin, and Weifeng Li. 2020. Cybersecurity as an industry: A cyber threat intelligence perspective. In The Palgrave Handbook of International Cybercrime and Cyberdeviance. Springer International Publishing, Cham, 135--154.
[49]
Sagar Samtani, Kory Chinn, Cathy Larson, and Hsinchun Chen. 2016. AZSecure hacker assets portal: Cyber threat intelligence and malware analysis. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). 19--24.
[50]
Sagar Samtani, Ryan Chinn, and Hsinchun Chen. 2015. Exploring hacker assets in underground forums. In 2015 IEEE International Conference on Intelligence and Security Informatics (ISI). 31--36.
[51]
Sagar Samtani, Ryan Chinn, Hsinchun Chen, and Jay F. Nunamaker. 2017. Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. J. Manag. Inf. Syst. 34, 4 (2017), 1023--1053.
[52]
Sagar Samtani, Murat Kantarcioglu, and Hsinchun Chen. 2020. Trailblazing the artificial intelligence for cybersecurity discipline. ACM Trans. Manag. Inf. Syst. 11, 4 (December 2020), 1--19.
[53]
Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark Patton, and Hsinchun Chen. 2016. Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). 25--30.
[54]
Sagar Samtani, Hongyi Zhu, and Hsinchun Chen. 2020. Proactively identifying emerging hacker threats from the dark web. ACM Trans. Priv. Secur. 23, 4 (August 2020), 1--33.
[55]
Sagar Samtani, Hongyi Zhu, Balaji Padmanabhan, Yidong Chai, and Hsinchun Chen. 2020. Deep learning for information systems research. (October 2020). Retrieved from http://arxiv.org/abs/2010.05774.
[56]
Ben Shneiderman, Catherine Plaisant, Maxine Cohen, Steven Jacobs, Niklas Elmqvist, and Nicholas Diakopoulos. 2016. Designing the User Interface: Strategies for Effective Human-Computer Interaction (6th Editio ed.). Pearson.
[57]
Steven Ullman, Sagar Samtani, Ben Lazarine, Hongyi Zhu, Benjamin Ampel, Mark Patton, and Hsinchun Chen. 2020. Smart vulnerability assessment for scientific cyberinfrastructure: An unsupervised graph embedding approach. In 2020 IEEE International Conference on Intelligence and Security Informatics (ISI). 1--6.
[58]
Runzhong Wang, Junchi Yan, and Xiaokang Yang. 2019. Learning combinatorial embedding networks for deep graph matching. In 2019 IEEE/CVF International Conference on Computer Vision (ICCV). 3056--3065.
[59]
Philipp Wunderlich, Daniel J. Veit, and Saonee Sarker. 2019. Adoption of sustainable technologies: A mixed-methods study of german households. MIS Q. 43, 2 (January 2019), 673--691.
[60]
Weiyi Xia, Murat Kantarcioglu, Zhiyu Wan, Raymond Heatherly, Yevgeniy Vorobeychik, and Bradley Malin. 2015. Process-driven data privacy. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. 1021--1030.
[61]
Alyson Leigh Young and Anabel Quan-Haase. 2013. Privacy protection strategies on Facebook. Information, Commun. Soc. 16, 4 (May 2013), 479--500.
[62]
Dongxiang Zhang, Dongsheng Li, Long Guo, and Kian-Lee Tan. 2020. Unsupervised entity resolution with blocking and graph algorithms. IEEE Trans. Knowl. Data Eng. (2020), 1--1.
[63]
Dongxiang Zhang, Yuyang Nie, Sai Wu, Yanyan Shen, and Kian-Lee Tan. 2020. Multi-context attention for entity matching. In Proceedings of The Web Conference 2020. 2634--2640.
[64]
Chen Zhao and Yeye He. 2019. Auto-EM: End-to-end fuzzy entity-matching using pre-trained deep models and transfer learning. In The World Wide Web Conference on - WWW’19. 2413--2424.
[65]
Hongyi Zhu, Sagar Samtani, Randall Brown, and Hsinchun Chen. 2021. A deep learning approach for recognizing activity of daily living (ADL) for senior care: Exploiting interaction dependency and temporal patterns. MIS Q. (2021), Forthcoming. Retrieved from https://ssrn.com/abstract=3595738.
[66]
Hongyi Zhu, Sagar Samtani, Hsinchun Chen, and Jay F. Nunamaker. 2020. Human identification for activities of daily living: A deep transfer learning approach. J. Manag. Inf. Syst. 37, 2 (April 2020), 457--483.

Cited By

View all
  • (2024)Perspective Chapter: Leveraging Artificial Intelligence in a Blotch Academic EnvironmentArtificial Intelligence for Quality Education [Working Title]10.5772/intechopen.1004792Online publication date: 4-Apr-2024
  • (2024)Affect of Manufactured Insights on Human Misfortune in Choice Making, Sluggishness and Security in InstructionREST Journal on Emerging trends in Modelling and Manufacturing10.46632/jemm/10/3/110:3Online publication date: 14-Oct-2024
  • (2024)Paving the AI-Powered Path to a Super Smart SocietySustainable Development, Humanities, and Social Sciences for Society 5.010.4018/979-8-3693-7989-9.ch003(35-60)Online publication date: 18-Oct-2024
  • Show More Cited By

Index Terms

  1. A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Management Information Systems
    ACM Transactions on Management Information Systems  Volume 12, Issue 1
    Special Issue on Analytics for Cybersecurity and Privacy, Part 2 and Regular Papers
    March 2021
    174 pages
    ISSN:2158-656X
    EISSN:2158-6578
    DOI:10.1145/3441846
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 March 2021
    Published in TMIS Volume 12, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Privacy
    2. analytics
    3. artificial intelligence
    4. data
    5. systems
    6. theories

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • National Science Foundation

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)392
    • Downloads (Last 6 weeks)39
    Reflects downloads up to 03 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Perspective Chapter: Leveraging Artificial Intelligence in a Blotch Academic EnvironmentArtificial Intelligence for Quality Education [Working Title]10.5772/intechopen.1004792Online publication date: 4-Apr-2024
    • (2024)Affect of Manufactured Insights on Human Misfortune in Choice Making, Sluggishness and Security in InstructionREST Journal on Emerging trends in Modelling and Manufacturing10.46632/jemm/10/3/110:3Online publication date: 14-Oct-2024
    • (2024)Paving the AI-Powered Path to a Super Smart SocietySustainable Development, Humanities, and Social Sciences for Society 5.010.4018/979-8-3693-7989-9.ch003(35-60)Online publication date: 18-Oct-2024
    • (2024)Influencia de la Inteligencia Artificial en el ámbito educativoInfluence of Artificial Intelligence in the educational field.Vinculatégica EFAN10.29105/vtga10.6-103910:6(122-140)Online publication date: 30-Nov-2024
    • (2023)Analysis of the behaviour of social media users in the context of security risk reduction in the digital environmentSocioloski pregled10.5937/socpreg57-4245457:2(665-691)Online publication date: 2023
    • (2023)Impact of artificial intelligence on human loss in decision making, laziness and safety in educationHumanities and Social Sciences Communications10.1057/s41599-023-01787-810:1Online publication date: 9-Jun-2023
    • (2022)Research Challenges for the Design of Human-Artificial Intelligence Systems (HAIS)ACM Transactions on Management Information Systems10.1145/354954714:1(1-18)Online publication date: 31-Aug-2022

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Login options

    Full Access

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media