• About
  • Advertise
  • Contact
Saturday, April 25, 2026
No Result
View All Result
NEWSLETTER
iotphoenix
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
  • Home
  • Tech

    Cisco, AWS integrate IoT, edge network software and services

    5G research by DARPA will lead to commercial applications

    Siemens and Google Cloud team to deliver AI-based manufacturing solutions

    Will Apple’s Internet of Things vision hurt a beautiful idea?

    Katherine the White Shark crashes research site’s servers

    TCP/IP stack vulnerabilities threaten IoT devices

    Trending Tags

    • IIoT
    • You’re probably doing your IIoT implementation wrong
    • Splunk debuts IIoT product for in-depth analytics
  • Mobile
  • Internet of Things
  • Technology Industry
  • Networking
  • Software
  • Cloud Computing
  • Security
No Result
View All Result
iotphoenix
No Result
View All Result
Home Mobile

Sleep and other patterns pinpoint individuals in datasets, study finds

in Mobile
0 0
0
SHARES
32
VIEWS
Share on FacebookShare on Twitter

A human’s “real-world movements” are so unique that people can be distinguished by their patterns, a new study conducted by Columbia University and Google finds. And that’s even if the datasets are anonymized.

Sleep cycles captured by fitness IoT products, commuting schedules stored by bots, the days of the week that one goes to work and other habits could all one day be used to discern one person from another, the study says.

What’s more, the computer scientists say all you need is one dataset to obtain results, for example, a few bank card transactions.

And the researchers reckon that if you start adding more data sets, you can get even better results. They say location tracking is one of the keys to figuring out who is the same person. In that case, geotagged posts on just a couple of social media apps is all that’s needed to associate accounts held by an individual.

The secret is correlating the datasets. For example, shoppers can be picked out by combining anonymous bank card purchases with cellphone logs in a geographic area. With the locations, such as the cell tower logs, and the credit card purchases, you can figure individuals accurately, the scientists say.

However, using just one dataset works, too.

Scientists performed the pinpointing in experiments using an algorithm.

“It works by calculating the probability that one person posting at a given time and place could also be posting in a second app, at another time and place,” the article says.

Tracking human behaviors

One day that could be extended to other patterns, such as sleep. People who have exact, regular, non-sleep deprived habits—such as those that may become more normal as future robots take over our work roles—could conceivably be precisely picked out.

For example, regularly waking up at 7 a.m. and pressing a nearby IoT light switch a moment later provides data points that may very well be unique within an apartment building served by the same microcell-driven internet connection. That’s you and only you, even if the dataset is stripped of any identifying name.

“Location datasets are a particularly fruitful domain to study,” the researchers say in their paper (PDF), “especially when linked to other datasets.”

The team says their algorithm “leverages any pair of sporadic location-based datasets to determine the most likely matching between the users it contains.” In other words, the digital traces left behind by individuals can be blended and amalgamated.

But learning user behavior to make recommendations, such as product recommendations based on geotagging, isn’t inherently bad, they say. The problem arises when the user doesn’t know it is being done, such as by a marketing firm they have no association with.

I wrote about how mobile networks harvest user data, anonymize it and then sell it on to marketers in “How wireless providers are quietly cashing in on your location data.”

“The idea that these traces can all be merged and connected is both fascinating and unsettling,” the researchers say.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download Nulled WordPress Themes
Download WordPress Themes
Download WordPress Themes Free
Download Premium WordPress Themes Free
free online course
download lava firmware
Download Best WordPress Themes Free Download
free download udemy paid course
Tags: Sleep and other patterns pinpoint individuals in datasetsstudy finds
Next Post

Using the IoT for good: Beacon of Hope project to help fight human trafficking

Recommended

Slideshow: Beyond passwords

New Microsoft BizTalk Server coming in Sept.

RFID boosts supply chain performance

Loading

Category

  • Analysis
  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Guest Opinions
  • Hardware
  • Infrastructure
  • Insider Insights
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • New Connections
  • News
  • Open Source
  • Opinion
  • Research
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Videos
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2024 iotphoenix.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Technology Industry

© 2024 iotphoenix.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In