Computer security for data collection technologies

Camille Cobb, Samuel Sudar, Nicholas Reiter, Richard Anderson, Franziska Roesner, Tadayoshi Kohno

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Many organizations in the developing world (e.g., NGOs), include digital data collection in their workow. Data collected can include information that may be considered sensitive, such as medical or socioeconomic data, and which could be affected by computer security attacks or uninten- Tional mishandling. The attitudes and practices of organi- zations collecting data have implications for confidentiality, availability, and integrity of data. This work, a collaboration between computer security and ICTD researchers, explores security and privacy attitudes, practices, and needs within organizations that use Open Data Kit (ODK), a prominent digital data collection platform. We conduct a detailed threat modeling exercise to inform our view on potential se- curity threats, and then conduct and analyze a survey and interviews with technology experts in these organizations to ground this analysis in real deployment experiences. We then reect upon our results, drawing lessons for both organizations collecting data and for tool developers.

Original languageEnglish (US)
Title of host publicationProceedings of the 8th International Conference on Information and Communication Technologies and Development, ICTD 2016
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450343060
DOIs
StatePublished - Jun 3 2016
Externally publishedYes
Event8th International Conference on Information and Communication Technologies and Development, ICTD 2016 - Ann Arbor, United States
Duration: Jun 3 2016Jun 6 2016

Publication series

NameACM International Conference Proceeding Series
Volume03-06-June-2016

Conference

Conference8th International Conference on Information and Communication Technologies and Development, ICTD 2016
Country/TerritoryUnited States
CityAnn Arbor
Period6/3/166/6/16

Keywords

  • Data collection
  • ICTD
  • Security

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Computer security for data collection technologies'. Together they form a unique fingerprint.

Cite this