ESID: Exploring the Design and Development of a Visual Analytics Tool for Epidemiological Emergencies
Authors:
Pawandeep Kaur Betz,
Julien Stoll,
Valerie Grappendorf,
Jonas Gilg,
Moritz Zeumer,
Margrit Klitz,
Luca Spataro,
Anna Klein,
Lena Rothenhäusler,
Hartmut Bohnacker,
Hans Krämer,
Michael Meyer-Hermann,
Sybille Somogyi,
Andreas Gerndt,
Martin J. Kühn
Abstract:
Visual analytics tools can help illustrate the spread of infectious diseases and enable informed decisions on epidemiological and public health issues. To create visualisation tools that are intuitive, easy to use, and effective in communicating information, continued research and development focusing on user-centric and methodological design models is extremely important. As a contribution to thi…
▽ More
Visual analytics tools can help illustrate the spread of infectious diseases and enable informed decisions on epidemiological and public health issues. To create visualisation tools that are intuitive, easy to use, and effective in communicating information, continued research and development focusing on user-centric and methodological design models is extremely important. As a contribution to this topic, this paper presents the design and development process of the visual analytics application ESID (Epidemiological Scenarios for Infectious Diseases). ESID is a visual analytics tool aimed at projecting the future developments of infectious disease spread using reported and simulated data based on sound mathematical-epidemiological models. The development process involved a collaborative and participatory design approach with project partners from diverse scientific fields. The findings from these studies, along with the guidelines derived from them, played a pivotal role in sha** the visualisation tool.
△ Less
Submitted 29 August, 2023; v1 submitted 10 April, 2023;
originally announced April 2023.
Robust, privacy-preserving, transparent, and auditable on-device blocklisting
Authors:
Kurt Thomas,
Sarah Meiklejohn,
Michael A. Specter,
Xiang Wang,
Xavier Llorà,
Stephan Somogyi,
David Kleidermacher
Abstract:
With the accelerated adoption of end-to-end encryption, there is an opportunity to re-architect security and anti-abuse primitives in a manner that preserves new privacy expectations. In this paper, we consider two novel protocols for on-device blocklisting that allow a client to determine whether an object (e.g., URL, document, image, etc.) is harmful based on threat information possessed by a so…
▽ More
With the accelerated adoption of end-to-end encryption, there is an opportunity to re-architect security and anti-abuse primitives in a manner that preserves new privacy expectations. In this paper, we consider two novel protocols for on-device blocklisting that allow a client to determine whether an object (e.g., URL, document, image, etc.) is harmful based on threat information possessed by a so-called remote enforcer in a way that is both privacy-preserving and trustworthy. Our protocols leverage a unique combination of private set intersection to promote privacy, cryptographic hashes to ensure resilience to false positives, cryptographic signatures to improve transparency, and Merkle inclusion proofs to ensure consistency and auditability. We benchmark our protocols -- one that is time-efficient, and the other space-efficient -- to demonstrate their practical use for applications such as email, messaging, storage, and other applications. We also highlight remaining challenges, such as privacy and censorship tensions that exist with logging or reporting. We consider our work to be a critical first step towards enabling complex, multi-stakeholder discussions on how best to provide on-device protections.
△ Less
Submitted 5 April, 2023;
originally announced April 2023.