Question

In: Computer Science

Explain how/why data mining and web mining respectively pose a threat to both individual and group...

Explain how/why data mining and web mining respectively pose a threat to both individual and group privacy. Why does it matter? List at least three privacy-enhancement technologies (PETS) that exist to protect users and how/whether they work

Solutions

Expert Solution

Web mining and data mining issues:

Web mining and data mining have their own privacy issues. They are techniques that use collection of algorithms and methods from web data. The behaviour of data is used to analyze the users behind it. The technique works with users' privacy and hence there is always a need to improve them so that privacy of the user is protected.

One of the key issues to individuals and businesses has been the transactions. Because during these transactions huge amounts of data, preferences and user habits are exposed. This certainly threatens the privacy of group or individual and can risk the database. It matters because apart from risking someone's sensitive data it also risks the reputation of the business.

PET or privacy enhancing technologies aim at reducing the use of personal data by protecting the information or basic data.

Three PETs in use are:

1. Cryptographic algorithms:

These are used in encryption of data and for secure computations. The result generated can be decrypted by finding the operational matches. This type of data can be transferred easily and securely over the internet. The main operations used on data are multiplication or addition. However, there is no restriction on how many operations should be performed.

2. Data masing:

These are used by many businesses to secure the sensitive data of the data sets. Obfuscation is a very common masking technique in which many methods are used to replace the sensitive data with misleading data. In many other methods, identifier fields are removed and fictitious data is placed.

3. AI algorithms:

There are some data generation algorithms for synthetic use. It is also useful in testing scenarios in which case even a third party client can access data. Federated learning is another way of doing so. In this method, the algorithm is trained over many edge devices. Servers hold data and they are used to train data as well. It also helps in minimizing data.



Related Solutions

explain why burns pose a major threat to the body.
explain why burns pose a major threat to the body.
1) Does increasing poverty and homelessness pose a threat to the broader economy? Why or why...
1) Does increasing poverty and homelessness pose a threat to the broader economy? Why or why not? 2) What, if anything, is the role of all levels of government(federal, state, and local governments) in reducing poverty and homelessness in the United States? Address poverty and homelessness from an economic point of view.
Discuss the differences and commonalities between text mining and Web mining. Explain with your own words,...
Discuss the differences and commonalities between text mining and Web mining. Explain with your own words, please
What is Data mining in healthcare? Explain briefly the most common challenges of data mining on...
What is Data mining in healthcare? Explain briefly the most common challenges of data mining on Medical Databases? add the references at the end of your paper
(a) Briefly explain the data mining process. (b) What are the different problems that data mining...
(a) Briefly explain the data mining process. (b) What are the different problems that data mining can solve in general? Explain.
Briefly explain how “data mining” can potentially explain stock return predictability.
Briefly explain how “data mining” can potentially explain stock return predictability.
How does a group influence the behavior of the individual? How does an individual counter the...
How does a group influence the behavior of the individual? How does an individual counter the influence of the group? write at least 250 words
What is IT Architecture and how does the benefit outweigh the costs? Why is data mining...
What is IT Architecture and how does the benefit outweigh the costs? Why is data mining becoming more important? What are the benefits of cloud computing? What role does personal conflict or politics play in the success of data governance?
Why is data mining a key piece of analytics?
Why is data mining a key piece of analytics?
Data Mining Techniques Please discuss whether or not the following problems are data mining tasks. Explain...
Data Mining Techniques Please discuss whether or not the following problems are data mining tasks. Explain why. (a). Retrieve students' records from a relational table with grade = "A". [5 points] (b). From the table of students' information, check if attributes last name and address have any correlations. [5 points] (c). Find all the documents from the text database containing keywords "data mining". [5 points] (d). Divide the text database into several groups, each group containing near-duplicate or similar documents....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT