Neuroimaging, Big Data, and Privacy Issues

advertisement
Neuroimaging
Big Data and the Privacy Issue
Li Yao, Ph.D.
Dean and Prof.
College of Information Science and Technology
Beijing Normal University (BNU), China
Outline:
• Background
• Big Data in Neuroimaging
• Privacy and Security
• Future Strategy
1, Background
Beijing Normal University
Washington
Beijing
State Key Lab of Cognitive
Neuroscience and Learning
College of Information
Science and Technology
1, Background
 College of Information Science and Technology
 State Key Lab of Cognitive Neuroscience and Learning
Our lab develops and employs
multiple analytic approaches to
understand the cognitive and
neural mechanisms of brain
development and genetic
constraints. Neuroimaging data
are from multiple sources such
as behavioral, molecular
genetics, EEG, MRI, NIRS.
MRI
EEG
fNIRS
1, Background
(a) Design and acquisition of different kinds of
human neuroimaging data
1, Background
(b) developments and applications of various
analytic approaches
1, Background
(c) Initiation and continued development on
procedures to enhance the learning capacities
using neuro-feedback techniques.
2, Big Data from NeuroImaging
sMRI
fMRI
MRI-DTI
2, Big Data from NeuroImaging
FDG-PET
Reiman, 2010
fNIRs
EEG
2, Big Data from NeuroImaging
Characteristics with 4V
How big the neuroimaging data?
~100,000 locations, measured
simultaneously hundreds of times, resulting
in billions of pairwise relation, collected in
multiple experimental conditions, and from
multiple participants per study.
2, Big Data from NeuroImaging
Imaging header file:
2, Big Data from NeuroImaging
Problems:
Privacy
 How to best protect individual
privacy while making the needed
information available to research?
Security
 How to secure the data on the cloud
or severs that is also an important issue
to private information?
3, Privacy and Security
Current Situation in China:
Privacy and Ethics:
Approved by IRB
Research Consent form
3, Privacy and Security
Security:
Information disclosure
Information encryption
4, Future strategies
strategies to privacy:
 Training and education
 Some techniques: de-faced, demographic
information…
strategies to Security:
 The existing techniques are mature and available.
In my opinion, the most important,
above all of these, the rule, law and
policies need to be made from the
central and local governments.
4, Future strategies
What I am seeking:
(a) techniques on securing the patients or study
participants privacy in handling neuroimaging
and behavior “big data”,
(b) ways to assist government regulatory
agencies’ sharing policy,
(c) understanding the culture and ethics
difference in big data environments between
western countries and China.

What I have to offer:
Expertise in:
(a) design and acquisition different kinds of
human neuro-imaging data,
(b) application of various analytic approaches to
process and understand brain data and their
relations to learning and human behaviors from
patients with Alzheimer’s to people who are
cognitively normal,
(c) initiation and continued development on
procedures to enhance the learning capacities
using real-time neuro-feedback provided by
fMRI and EEG techniques.

Thanks for your
attention
Li Yao,
Email: yaoli@bnu.edu.cn
Download