{"id":450,"date":"2023-08-06T19:32:41","date_gmt":"2023-08-06T19:32:41","guid":{"rendered":"https:\/\/privacyand.com\/?p=450"},"modified":"2023-08-06T19:32:41","modified_gmt":"2023-08-06T19:32:41","slug":"accidents-along-the-way","status":"publish","type":"post","link":"https:\/\/privacyand.com\/?p=450","title":{"rendered":"Accidents Along the Way"},"content":{"rendered":"\n<p>Otherwise known in PhD land as &#8216;Contributions&#8217;; a nice way of summarizing the things you learned a long the way that may or may not have anything to do with your actual dissertation topic.<\/p>\n\n\n\n<p>My research is a unique approach that applies concepts, tools and techniques to advance a theory of privacy and a formal model.\u00a0\u00a0It extends the notion of computer science aided privacy by introducing decision based thresholds and dynamicity.\u00a0\u00a0The formal model created is evaluated against existing methods and adds significant value based on principles of scientific theory.\u00a0 And, \u00a0the formal model also significantly advances the discussion of privacy.\u00a0\u00a0<\/p>\n\n\n\n<p>I developed eight observable principles for the way privacy behaves, confirming some of our existing knowledge and proposing new unique principles based on the formal model.\u00a0\u00a0In particular, the work demonstrates and solves for the transitivity of privacy as it is not simply a representation of the privacy state of an individual at a given point in time.\u00a0\u00a0My model can follow along each personal information disclosure with every data subject at every point in time throughout a day.\u00a0\u00a0It is a tool for allowing systems to think about how information is shared along a network of organizations, people and processes.<\/p>\n\n\n\n<p>As the formalization developed, some additional distinctive &#8216;contributions&#8217; were identified.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\">\n<li>I accidentally created of an information management based framework for classifying computing services in respect of the collection, use and disclosure of personal information.\u00a0<\/li>\n\n\n\n<li>I evaluate computational science models in respect of representing historically social scientific concepts.<\/li>\n\n\n\n<li>Literature reviews in privacy cross disciplines, thus providing an opportunity to computer scientists to understand the differential nature of privacy in multiple fields (lots of reading, and lots of overlap).<\/li>\n\n\n\n<li>Developing the concept of positive and negative thresholds for privacy providing for system dynamicity.<\/li>\n\n\n\n<li>Proof, using available evidence, that it is not a common organizational practice for Ontario healthcare organizations to conduct privacy impact assessments (as required under various health regulations). <\/li>\n<\/ol>\n\n\n\n<p>That last one was a doozy.  Sneak preview: one hospital administrator was so upset upon receiving my Freedom of Information request, he called my <em>thesis supervisor. to complain.<\/em>  Unbelievable.  <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Otherwise known in PhD land as &#8216;Contributions&#8217;; a nice way of summarizing the things you learned a long the way that may or may not have anything to do with your actual dissertation topic. My research is a unique approach that applies concepts, tools and techniques to advance a theory of privacy and a formal &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/privacyand.com\/?p=450\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Accidents Along the Way&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-450","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7IDr7-7g","_links":{"self":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=450"}],"version-history":[{"count":1,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/450\/revisions"}],"predecessor-version":[{"id":451,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/450\/revisions\/451"}],"wp:attachment":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}