Nitin Kohli
YOU?
Author Swipe
View article: Expanding Perspectives on Data Privacy: Insights from Rural Togo
Expanding Perspectives on Data Privacy: Insights from Rural Togo Open
Passively collected "big" data sources are increasingly used to inform critical development policy decisions in low- and middle-income countries. While prior work highlights how such approaches may reveal sensitive information, enable surv…
View article: Addressing contemporary threats in anonymised healthcare data using privacy engineering
Addressing contemporary threats in anonymised healthcare data using privacy engineering Open
Cyber-attacks on healthcare entities and leaks of personal identifiable information (PII) are a growing threat. However, it is now possible to learn sensitive characteristics of an individual without PII, by combining advances in artificia…
View article: Privacy guarantees for personal mobility data in humanitarian response
Privacy guarantees for personal mobility data in humanitarian response Open
Personal mobility data from mobile phones and other sensors are increasingly used to inform policymaking during pandemics, natural disasters, and other humanitarian crises. However, even aggregated mobility traces can reveal private inform…
View article: Expanding Perspectives on Data Privacy: Insights from Rural Togo
Expanding Perspectives on Data Privacy: Insights from Rural Togo Open
Passively collected "big" data sources are increasingly used to inform critical development policy decisions in low- and middle-income countries. While prior work highlights how such approaches may reveal sensitive information, enable surv…
View article: Enabling Humanitarian Applications with Targeted Differential Privacy
Enabling Humanitarian Applications with Targeted Differential Privacy Open
The proliferation of mobile phones in low- and middle-income countries has suddenly and dramatically increased the extent to which the world's poorest and most vulnerable populations can be observed and tracked by governments and corporati…
View article: Using Participants' Utility Functions to Compare Versions of Differential Privacy
Using Participants' Utility Functions to Compare Versions of Differential Privacy Open
We use decision theory to compare variants of differential privacy from the perspective of prospective study participants. We posit the existence of a preference ordering on the set of potential consequences that study participants can inc…
View article: Big Data Privacy in Emerging Market Fintech and Financial Services: A Research Agenda
Big Data Privacy in Emerging Market Fintech and Financial Services: A Research Agenda Open
The data revolution in low- and middle-income countries is quickly transforming how companies approach emerging markets. As mobile phones and mobile money proliferate, they generate new streams of data that enable innovation in consumer fi…
View article: Privacy Guarantees for Personal Mobility Data in Humanitarian Response
Privacy Guarantees for Personal Mobility Data in Humanitarian Response Open
Personal mobility data from mobile phones and other sensors are increasingly used to inform policymaking during pandemics, natural disasters, and other humanitarian crises. However, even aggregated mobility traces can reveal private inform…
View article: Differential Privacy for Black-Box Statistical Analyses
Differential Privacy for Black-Box Statistical Analyses Open
We formalize a notion of a privacy wrapper, defined as an algorithm that can take an arbitrary and untrusted script and produce an output with differential privacy guarantees. Our novel privacy wrapper, named TAHOE, incorporates two design…
View article: This Thing Called Fairness
This Thing Called Fairness Open
The explosion in the use of software in important sociotechnical systems has renewed focus on the study of the way technical constructs reflect policies, norms, and human values. This effort requires the engagement of scholars and practiti…
View article: Differential Privacy in Practice: Expose your Epsilons!
Differential Privacy in Practice: Expose your Epsilons! Open
Differential privacy is at a turning point. Implementations have been successfully leveraged in private industry, the public sector, and academia in a wide variety of applications, allowing scientists, engineers, and researchers the abilit…
View article: This Thing Called Fairness: Disciplinary Confusion Realizing a Value in Technology
This Thing Called Fairness: Disciplinary Confusion Realizing a Value in Technology Open
The explosion in the use of software in important sociotechnical systems has renewed focus on the study of the way technical constructs reflect policies, norms, and human values. This effort requires the engagement of scholars and practiti…
View article: A Broader View on Bias in Automated Decision-Making: Reflecting on Epistemology and Dynamics
A Broader View on Bias in Automated Decision-Making: Reflecting on Epistemology and Dynamics Open
Machine learning (ML) is increasingly deployed in real world contexts, supplying actionable insights and forming the basis of automated decision-making systems. While issues resulting from biases pre-existing in training data have been at …
View article: Contestability and Professionals: From Explanations to Engagement with Algorithmic Systems
Contestability and Professionals: From Explanations to Engagement with Algorithmic Systems Open