DocumentCode :
1605213
Title :
Mining the Metadata -- and Its Consequences
Author :
Landau, Susan
Author_Institution :
Worcester Polytech. Inst., Worcester, MA, USA
Volume :
1
fYear :
2015
Firstpage :
4
Lastpage :
5
Abstract :
Traditionally metadata, the who, when, where of a phone call, the IP address, time, date of an Internet connection, has been viewed as deserving of less privacy than the contents of the communication. But ubiquitous computing and communication has changed that equation, and such transactional information has become increasingly revelatory. In this talk, I will discuss how metadata is used in all sorts of investigations, from malware to malfeasance. I will also discuss how the ubiquity of metadata must mean a change in our approaches to it.
Keywords :
Internet; data mining; data privacy; invasive software; meta data; ubiquitous computing; IP address; Internet connection; malfeasance; malware; metadata mining; metadata ubiquity; phone call; transactional information; ubiquitous computing; Data privacy; Law; Metadata; Privacy; Security; Surveillance;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering (ICSE), 2015 IEEE/ACM 37th IEEE International Conference on
Conference_Location :
Florence
Type :
conf
DOI :
10.1109/ICSE.2015.23
Filename :
7194556
Link To Document :
بازگشت