Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Editorial
. 2018 Dec 11:5:180286.
doi: 10.1038/sdata.2018.286.

On the privacy-conscientious use of mobile phone data

Affiliations
Editorial

On the privacy-conscientious use of mobile phone data

Yves-Alexandre de Montjoye et al. Sci Data. .

Abstract

The breadcrumbs we leave behind when using our mobile phones—who somebody calls, for how long, and from where—contain unprecedented insights about us and our societies. Researchers have compared the recent availability of large-scale behavioral datasets, such as the ones generated by mobile phones, to the invention of the microscope, giving rise to the new field of computational social science.

PubMed Disclaimer

Conflict of interest statement

The authors declare no competing interests.

Figures

Figure 1
Figure 1. Matrix of the four models for the privacy-conscientious use of mobile phone data.

References

    1. International Telecommunication Union. The World in 2014: ICT Facts and Figures (2014).
    1. Jerven M. Poor Numbers: How We Are Misled by African Development Statistics and What To Do About It. (Cornell University Press, 2013).
    1. Bengtsson L., Lu X., Thorson A., Garfield R. & von Schreeb J. Improved response to disasters and outbreaks by tracking population movements with mobile phone network data: a post-earthquake geospatial study in Haiti. PLoS Med. 8, e1001083 (2011). - PMC - PubMed
    1. Oliver N., Matic A. & Frias-Martinez E. Mobile network data for public health: opportunities and challenges. Frontiers in Public Health 3, 189 (2015). - PMC - PubMed
    1. Samarati P. & Sweeney L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04 1–19 (1998).

Publication types