Skip to main content

Leveraging Open Algorithms (OPAL) for the Safe, Ethical, and Scalable Use of Private Sector Data in Crisis Contexts

  • Chapter
  • First Online:

Abstract

The Open Algorithms (OPAL) is an approach where a dedicated server installed within a data holding institution receives queries from the outside world and responds with aggregated and anonymized indicators, thus providing insights into the raw data that reside inside the institution without jeopardizing these assets. This chapter discusses how in the future the Open Algorithms (OPAL) system or an equivalent mechanism could allow using data collected and controlled by private companies that are shared through data challenges such as the D4R in a scalable, ethical manner.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Mayer-Schönberger V, Cukier K (2014) Big data: a revolution that will transform how we live, work, and think, First Mariner, Books edn. Mariner Books, Houghton Mifflin Harcourt, Boston

    Google Scholar 

  2. United Nations (2013) A new global partnership: eradicate poverty and transform economies through sustainable development, New York, NY

    Google Scholar 

  3. United Nations (2014) A world that counts: mobilising the data revolution for sustainable development

    Google Scholar 

  4. Dittrich, D., & Kenneally, E. (2012). The Menlo Report: Ethical principles guiding information and communication technology research. US Department of Homeland Security

    Google Scholar 

  5. Letouzé E (2015) The law, politics, and ethics of cell phone data analytics, Data-Pop Alliance

    Google Scholar 

  6. “Saving Big Data from Itself”, Note to Self, WNYC Studios, 25-Jan-2017

    Google Scholar 

  7. Salah AA, Pentland A, Lepri B, Letouzé E, Vinck P, de Montjoye YA, Dong X, Dağdelen Ö (2018) Data for refugees: the D4R challenge on mobility of Syrian refugees in Turkey. arXiv preprint arXiv:1807.00523

  8. “Waiting on hold—Ebola and big data,” The Economist, 27-Oct-2014

    Google Scholar 

  9. International Crisis Group, “Containing the Shock Waves from Venezuela,” International Crisis Group, Brussels, Belgium, Latin America 65, Mar. 2018

    Google Scholar 

  10. de Montjoye Y-A et al (2018) On the privacy-conscientious use of mobile phone data. Scientific Data 5:180286

    Article  Google Scholar 

  11. de Montjoye Y-A, Kendall J, Kerry CF (2014) Enabling humanitarian use of mobile phone data. Brookings issues in technology innovation series, vol 26. Brookings Institution, Washington, DC

    Google Scholar 

  12. de Montjoye Y-A, Hidalgo CA, Verleysen M, Blondel VD (2013) Unique in the crowd: the privacy bounds of human mobility. Scientific Reports 3:1376

    Article  Google Scholar 

  13. de Montjoye Y-A, Shmueli E, Wang SS, Pentland AS (2014) openPDS: protecting the privacy of metadata through safe answers. PLoS ONE 9(7):e98790

    Article  Google Scholar 

  14. Francis P, Probst Eide S, Munz R (2017) Diffix: High-Utility Database Anonymization. In: Schweighofer E, Leitold H, Mitrakas A, Rannenberg K (eds) Privacy Technologies and Policy, vol 10518. Cham: Springer International Publishing, pp 141–158

    Chapter  Google Scholar 

  15. Johnson N, Near JP, Song D (2018) Towards practical differential privacy for SQL queries. Proc VLDB Endow 11(5):526–539

    Google Scholar 

  16. Nabar SU, Kenthapadi K, Mishra N, Motwani R (2008) A survey of query auditing techniques for data privacy. In: Aggarwal CC, Yu PS (eds) Privacy-preserving data mining, vol 34. Boston, MA: Springer US, pp 415–431

    Chapter  Google Scholar 

  17. Dwork C (2011) Differential privacy. In: van Tilborg HCA, Jajodia S (eds) Encyclopedia of cryptography and security. Boston, MA: Springer US, pp 338–340

    Google Scholar 

  18. Chaum D, Crépeau C, Damgard I (1988) Multiparty unconditionally secure protocols. In: Proceedings of the twentieth annual ACM symposium on Theory of computing—STOC ’88, Chicago, Illinois, United States, pp 11–19

    Google Scholar 

  19. Gascón A et al (2017) Privacy-preserving distributed linear regression on high-dimensional data. Proc Priv Enhancing Technol 2017(4):345–364

    Article  Google Scholar 

  20. Lazer D et al (2009) Computational social science. Science 323(5915):721–723

    Article  Google Scholar 

  21. “OPAL Project,” OPAL Project. [Online]. https://www.opalproject.org/a-closer-look. Accessed 14 Feb 2019

  22. McKinsey Global Institute, “Notes from the AI Frontier: Applying AI for Social Good,” McKinsey & Company, Dec. 2018

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Emmanuel Letouzé .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Letouzé, E. (2019). Leveraging Open Algorithms (OPAL) for the Safe, Ethical, and Scalable Use of Private Sector Data in Crisis Contexts. In: Salah, A., Pentland, A., Lepri, B., Letouzé, E. (eds) Guide to Mobile Data Analytics in Refugee Scenarios. Springer, Cham. https://doi.org/10.1007/978-3-030-12554-7_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-12554-7_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-12553-0

  • Online ISBN: 978-3-030-12554-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics