Deliverables Open Research Data Pilot (4) Data Management Plan Initial report of the data management plan. Deliver Qualified Synthetic Data v2 Qualified Synthetic Data sets will be made available publicly A second version will be available at M24 Deliver Qualified Synthetic Data (v1/2) Qualified Synthetic Data sets will be made available publicly. A second version will be available at M24 Updated Data Management Plan The Data Management Plan will describe the data that Safe-DEED will generate, whether and how it will be exploited or made accessible for verification and re-use, and how it will be curated and preserved. Demonstrators, pilots, prototypes (9) Protocols for privacy-preserving data analytics and secure lead-time based pricing v1/2 This document reports on the cryptographic protocols developed for privacy-preserving data analytics and confidential lead time based pricing for use in WP6 and WP7. Task 5.2 contributes to this document. A new version will be available at M30 Baseline prototypes for data valuation Based on a high-level architectural design specified in D4.1, this deliverable will provide a skeleton of the component, including prototypes of the component’s layers using open source data. Implementation of cryptographic building blocks and specialized protocols v3 This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 51 as well as the specialized protocols in Task 52 Task 53 contributes to this document New versions will be available at M24 and M36 Release of the Big Data Valuation component version 1 The final version of the component will be submitted and deployed in the Data Market Austria Protocols for privacy-preserving data analytics and secure lead-time based pricing v2 This document reports on the cryptographic protocols developed for privacypreserving data analytics and confidential lead time based pricing for use in WP6 and WP7 Task 52 contributes to this document A new version will be available at M30 Implementation of cryptographic building blocks and specialized protocols v2 This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 51 as well as the specialized protocols in Task 52 Task 53 contributes to this document New versions will be available at M24 and M36 Business model decision support tool An interactive web app that allows business managers to design datadriven privacypreserving business models through design choices solution patterns and examples Release of the Big Data Valuation component version 2 The final version of the component will be submitted and deployed in the Data Market Austria Implementation of cryptographic building blocks and specialized protocols This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 5.1 as well as the specialized protocols in Task 5.2. Task 5.3 contributes to this document. New versions will be available at M24 and M36 Documents, reports (26) Dissemination, Communication and Engagement Report v2 Yearly reports on activities delivered at M12 M24 and M36 Trust in Data Markets v2 This deliverable will describe the coordinated theory of trust in the data economy based on existing literature in the field of law and ethics This will consider two particular issues commodification of personal data and the tradebetween protection and individual empowerment over data eg data protection by design measures such as homomorphic encryption may prevent empowerment as they prevent individuals from exercising their rights of access or erasure The first iteration will be highlevel exploration and a setting out of the research methodology for the surveys and semistructured interviews The second iteration will present the results of the surveys and interviews make a more indepth analysis of selected topics based on those results and present concrete recommendations for all stakeholders to foster trust in data markets A Revised version of this deliverable will be available at M36 Business models for use cases and generic business models Report that summarizes the developed business models for the specific use cases generalized into generic business model patterns and examples Ethical and Normative Valuation in Data Markets This deliverable will be specify a concrete list of steps and criteria eg through reusable flowcharts andor questionnaires in order to identify and qualify the broader value ie beyond economical value of specific data market constellations Report on the context-aware & context-unaware valuation The deliverable D43 will present the methods what will be used for assigning value to a data set Trust in Data Markets This deliverable will describe the coordinated theory of trust in the data economy, based on existing literature in the field of law and ethics. This will consider two particular issues: commodification of personal data and the trade-between protection and individual empowerment over data (e.g. data protection by design measures such as homomorphic encryption may prevent empowerment as they prevent individuals from exercising their rights of access or erasure). The first iteration will be high-level exploration and a setting out of the research methodology for the surveys and semi-structured interviews. The second iteration will present the results of the surveys and interviews, make a more in-depth analysis of selected topics based on those results, and present concrete recommendations for all stakeholders to foster trust in data markets. A Revised version of this deliverable will be available at M36. Dissemination, Communication and Engagement Plan Based on the proposal plan, constitutes a living document where partners synchronize their communication and engagement strategy Legal and Ethical Requirements for non-Personal Data Use Case Concrete specification of the legal and ethical requirements that need to be taken into account for the development of the non-personal data use case in WP7. The main focus will be on intellectual property law, competition law, network security and relevant legislative proposals at EU level such as the proposed Regulation for the free flow of non-personal data Report on the application of re-identifcation techniques on use-case data v2 The report on the application of reidentification techniques on usecase data M12M24 documents our efforts to deanonymize data made available by usecase partners Dissemination, Communication and Engagement Report v3 Yearly reports on activities delivered at M12 M24 and M36 Personal data Trials report final version This final deliverable is an extension of D62 containing the complete details about all pilots on data driven content production In the phase the final project implementations will be tested All WP6 tasks contribute to this deliverable Legal Framework and Ethical Issues High-level description of applicable EU legal frameworks and identification of key requirements for Safe- DEED’s work in WP’s 2, 4, 5 and the use cases in WPs 6 and 7. Safe-DEED Volume Provides a coherent and relatively brief view of the projects successes Dissemination, Communication and Engagement Report Yearly reports on activities, delivered at M12, M24 and M36. Quantification of economic impact Report on the quantified impact of the developed technologies on business model metrics as developed in WP2 as well as generic economic indicators of trust value creation adoption and turnover Report on the Professional Partners Community Summarizes the materials made available fortraining and the results of the series of workshops organized at M18 and M33 User experiment report Summarizes the findings from user experiments on the developed technologies. Is updated at M24 and at M36. Legal and Ethical Requirements for Personal Data Use Case Concrete specification of the legal and ethical requirements that need to be taken into account for the development of the personal data use case in WP6. The main focus will be on legal frameworks such as the GDPR, and the proposals for an ePrivacy Regulation and Digital Content Directive. Threat and incentive model Report on threat and incentives for sharing and using data from multi-actor perspective, validated through expert interviews and use cases Syllabus for Teaching Module Coherent set of teaching materials including slides reading documentation etc for a 90minutes teaching module based on SafeDEED insights and aimed at students in different disciplines User experiment report v3 Summarizes the findings from user experiments on the developed technologies Is updated at M24 and at M36 User experiment report v2 Summarizes the findings from user experiments on the developed technologies Is updated at M24 and at M36 Report on the requirements and design This deliverable will summarize the list of functional and technological requirements imposed on the Big Data Valuation Component based on the results of interviews with stakeholders. Sustainable Business Strategy and Report Reports on the market analysis performed at the beginning of the project the exploitation strategies envision by the partners and their outcome by the end of the project Report on the application of re-identification techniques on use-case data The report on the application of re-identification techniques on use-case data (M12/M24) documents our efforts to deanonymize data made available by use-case partners. Requirements for secure computation on large datasets with multiple owners This document describes the requirements in terms of performance characteristics and functionality from MPC/PSI and multi- user data-aggregation protocols.. Task 5.1 contributes to this document. Other (4) Low complexity primitives v1/2 This document reports on the improvements to low complexity primitives optimized for metrics important for PSI/MPC protocols. Task 5.1 contributes to this document. A second version is available at M24 PSI/MPC and multi-user data aggregation protocols v1/2 This document reports on the improvements to private set intersection, multiparty computation and multi-user data aggregation protocols. Task 5.1 contributes to this document. A second version will be available at M24 PSI/MPC and multi-user data aggregation protocols v2 This document reports on the improvements to private set intersection multiparty computation and multiuser data aggregation protocols Task 51 contributes to this document A second version will be available at M24 Low complexity primitives v2 This document reports on the improvements to low complexity primitives optimized for metrics important for PSIMPC protocols Task 51 contributes to this document A second version is available at M24 Websites, patent fillings, videos etc. (1) Webpage The main digital presence of the project Publications Peer reviewed articles (5) Business Data Sharing through Data Marketplaces: A Systematic Literature Review Author(s): Antragama Ewa Abbas, Wirawan Agahari, Montijn van de Ven, Anneke Zuiderwijk , Mark de Reuver Published in: Journal of Theoretical and Applied Electronic Commerce Research, Issue Volume 16, Issue 7, 2021, Page(s) 3321-3339, ISSN 0718-1876 Publisher: Editorial Universidad de Talca DOI: 10.3390/jtaer16070180 Formal Analysis and Estimation of Chance in Datasets Based on Their Properties Author(s): Taha, Abdel Aziz; Papariello, Luca; Alexandros, Bampoulidis; Knoth, Petr; Lupu, Mihai Published in: IEEE Transactions on Knowledge and Data Engineering, Issue 1, 2021, ISSN 1041-4347 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/tkde.2021.3068009 Toward a Complete Data Valuation Process. Challenges of Personal Data Author(s): Mihnea Tufiș, Ludovico Boratto Published in: Journal of Data and Information Quality, Issue Volume 13, Issue 4, 2021, ISSN 1936-1955 Publisher: Association for Computing Machinary, Inc. DOI: 10.1145/3447269 The Role of Ecosystem Data Governance in Adoption of Data Platforms by Internet-of-Things Data Providers: Case of Dutch Horticulture Industry Author(s): Fabian De Prieelle, Mark De Reuver, Jafar Rezaei Published in: IEEE Transactions on Engineering Management, 2020, Page(s) 1-11, ISSN 0018-9391 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/tem.2020.2966024 Business model tooling: where research and practice meet Author(s): Harry Bouwman, Mark de Reuver, Marikka Heikkilä, Erwin Fielt Published in: Electronic Markets, 2020, ISSN 1019-6781 Publisher: Springer Verlag DOI: 10.1007/s12525-020-00424-5 Other (1) Privately Connecting Mobility to Infectious Diseases via Applied Cryptography Author(s): Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch Published in: 2021 Publisher: in review Conference proceedings (10) Business model implications of privacy-preserving technologies in data marketplaces Author(s): Wirawan Agahari, Riccardo Dolci, Mark de Reuver Published in: 29th European Conference on Information Systems – Human Values Crisis in a Digitizing World, 2021 Publisher: Association of the Information Systems (AIS) Practice and Challenges of (De-)Anonymisation for Data Sharing Author(s): Alexandros Bampoulidis, Alessandro Bruni, Ioannis Markopoulos, Mihai Lupu Published in: RCIS 2020. Lecture Notes in Business Information Processing, vol 385, 2020, ISBN 978-3-030-50316-1 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-50316-1_32 Understanding how privacy-preserving technologies transform data marketplace platforms and ecosystems: the case of Multi-Party Computation Author(s): Wirawan Agahari, Mark de Reuver, Tobias Fiebig Published in: 6th Innovation in Information Infrastructure (III) Workshop, 2019 Publisher: N/A The Data-Driven Business Value Matrix - A Classification Scheme for Data-Driven Business Models Author(s): Gert Breitfuss ,Michael Fruhwirth,Viktoria Pammer-Schindler,Hermann Stern, Sebastian Dennerlein Published in: BLED 2019 Proceedings, 2019, Page(s) 803 – 821 Publisher: AIS Electronic Library PrioPrivacy: A Local Recoding K-Anonymity Tool for Prioritised Quasi-Identifiers Author(s): Alexandros Bampoulidis, Ioannis Markopoulos, Mihai Lupu Published in: IEEE/WIC/ACM International Conference on Web Intelligence on - WI '19 Companion, 2019, Page(s) 314-317, ISBN 9781450369886 Publisher: ACM Press DOI: 10.1145/3358695.3360918 Consumer studies on digital platforms adoption and continuance: A structured literature review Author(s): Roel Faber, Mark de Reuver Published in: 27th European Conference on Information Systems - Information Systems for a Sharing Society, 2019, Page(s) 151-171, ISBN 978-1-7336325-0-8 Publisher: AIS Electronic Library A Horizontal Patent Test Collection Author(s): Mihai Lupu, Alexandros Bampoulidis, Luca Papariello Published in: Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019, Page(s) 1213-1216, ISBN 9781450361729 Publisher: ACM DOI: 10.1145/3331184.3331346 Multi-Party Computation (MPC) as Control Mechanism and its Effect on Firms' Participation in Data Sharing via Data Marketplaces Author(s): Wirawan Agahari Published in: Bled 2020 eConference Proceedings, 2020, ISBN 978-961-286-362-3 Publisher: University of Maribor Press DOI: 10.18690/978-961-286-362-3 Data Service Cards - A Supporting Tool For Data-Driven Business Author(s): Breitfuß, G., Fruhwirth, M., Wolf-Brenner, C., Riedl, A., De Reuver, M., Ginthoer, R., Pimas, O. Published in: Bled 2020 eConference Proceedings, 2020, Page(s) 599 – 614, ISBN 978-961-286-362-3 Publisher: University of Maribor Press DOI: 10.18690/978-961-286-362-3.40 An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC Author(s): Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang Published in: Asiacrypt 2020, 2020, ISBN 978-3-030-64837-4 Publisher: Springer, Cham DOI: 10.1007/978-3-030-64837-4_16 Book chapters (4) Multi-party Revocation in Sovrin: Performance through Distributed Trust Author(s): Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch Published in: Topics in Cryptology – CT-RSA 2021, 2021, Page(s) 527-551 Publisher: Springer DOI: 10.1007/978-3-030-75539-3_22 On the Replicability of Combining Word Embeddings and Retrieval Models Author(s): Luca Papariello, Alexandros Bampoulidis, Mihai Lupu Published in: Advances in Information Retrieval - 42nd European Conference on IR Research, ECIR 2020, Lisbon, Portugal, April 14–17, 2020, Proceedings, Part II, Issue 12036, 2020, Page(s) 50-57, ISBN 978-3-030-45441-8 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-45442-5_7 Feistel Structures for MPC, and More Author(s): Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger Published in: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II, Issue 11736, 2019, Page(s) 151-171, ISBN 978-3-030-29961-3 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-29962-0_8 Chance influence in datasets with a large number of features Author(s): Abdel Aziz Taha, Alexandros Bampoulidis, Mihai Lupu Published in: Data Science – Analytics and Applications - Proceedings of the 2nd International Data Science Conference – iDSC2019, 2019, Page(s) 21-26, ISBN 978-3-658-27494-8 Publisher: Springer Fachmedien Wiesbaden DOI: 10.1007/978-3-658-27495-5_2 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available