1 / 12

Jukka Nikulainen Project Co-ordinator City of Turku (Finland), Surveying and Land Department

GOOD MORNING!!. GIS fusion with new technologies: The Challenges for Privacy Protection and Data Security. Jukka Nikulainen Project Co-ordinator City of Turku (Finland), Surveying and Land Department. The Interactive Well-Being WebMap Project. City of Turku, Finland (Coordinator)

darius
Download Presentation

Jukka Nikulainen Project Co-ordinator City of Turku (Finland), Surveying and Land Department

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. GOOD MORNING!! GIS fusion with new technologies: The Challenges for Privacy Protection and Data Security Jukka Nikulainen Project Co-ordinator City of Turku (Finland), Surveying and Land Department

  2. The Interactive Well-Being WebMap Project City of Turku, Finland (Coordinator) European Dynamics S.A. , Greece Gwent Health Authority, Wales Municipal Development Enterprise of Patras, Greece Torfaen County Borough Coucil, Wales Small Area Health Research Unit, Ireland

  3. Acceptable level of privacy protection and data security Protecting privacy and improving data security Access Policy Limiting the Quality of Data Summary presentation Methods

  4. Access policy: The principle of access level Access level 3 Service User groups with user IDs and user authorisation Service Access level 2 Browsing map presentations Browsing map presentations Access level 1 Browsing map presentations Free access Browsing map presentations Normal Internet user User- groups 2 - n User- group 1

  5. Access policy: Data security “FIREWALL” Intranet user Extranet user The IWWM SERVER The IWWM SERVER Internet user “Virtual” Databases (restricted) “Virtual” Databases (wide)

  6. Limiting the data quality Privacy protection and data security in acceptable level. -How about the analytical and visual power?

  7. Summary presentation method Coordinate based mapping In Finland the position of the buildings is measured to an accuracy of one to ten metres Population census data with personal identity code and information on the houses where people live Medical registers with personal identity code Phenomena (eg diseases) with coordinates

  8. Summary presentation method Coordinate based mapping All information is positioned into a matrix of pixels or cells (500 x 500 m, 1000 x 1000 m etc.) Neighbourhood analysis = The value of a pixel is depending on the number of cases and inhabitants in the pixel and surroundings The variable size sample areas have the same amount of population or expected value Sample areas

  9. Coordinate based mapping: Example Physical exercise at least twice in a week: Red cells represent areas where amount of inhabitants who exercise at least twice in a week is above the average

  10. Coordinate based mapping: Example Overweight Index over 30: Red cells represent areas where amount of inhabitants with overweight index over 30 is above the average

  11. Coordinate based mapping Advantages: Data Security in acceptable level Privacy protection in acceptable level ? Controlled statistical behaviour Identification of phenomena Disadvantages: Requires a good (spatial) standard of databases Random effects are possible The map is only a reflection of (possible) phenomena, not a presentation based on true values

  12. Conclusions GIS & Internet technology: Separated services for the Intranet and Internet (+ Extranet) users Access control does not guarantee privacy protection and data security On-line access to the databases is an excluded option All personal information must be removed from the databases used in the service The conversion procedure (linking together geometrical and attribute data and removing personal data) must be separated from the service Legal and ethical issues must be studied carefully NO MISTAKES!! Thank You!!

More Related