This website uses cookies to ensure you have the best experience. Learn more

Privacy And Security Issues In Data Mining

2342 words - 10 pages

Introduction
There are various kinds of definitions about what data mining is. The authors in [1] define data mining as “the process of extracting previously unknown information from (usually large quantities of) data, which can, in the right context, lead to knowledge”. Data mining is widely used in areas such as business analysis, bioinformatics analysis, medical analysis, etc. Data mining techniques bring us a lot of benefits. Business companies can use data mining tools to search potential customers and increase their profits; medical diagnosis can use data mining to predict potential disease. Although the term “data mining” itself is neutral and has no ethical implications, it is often related to the analysis of information associated with individuals. “The ethical dilemmas arise when data mining is executed over the data of an individual” [2]. For example, using a user’s data to do data mining and classifying the user into some group may result in a variety of ethical issues. In this paper, we deal with two kinds of ethical issues caused by data mining techniques: informational privacy issues in web-data mining and database security issues in data mining. We also look at these ethical issues in a societal level and a global level.
Informational Privacy Issues in Web-data Mining
There is a debate between the benefits and potential informational privacy issues in web-data mining. There are large amount of valuable data on the web, and those data can be retrieved easily by using search engine. When web-data mining techniques are applied on these data, we can get a large number of benefits. Web-data mining techniques are appealing to business companies for several reasons [1]. For example, if a company wants to expand its business and find more potential customers, it can use web-data mining techniques to analyze personal data and any other useful information. The company can also provide more personalized services to their existing customers by using web-data mining techniques [1]. In general, those techniques can bring more profits to the company by having more customers and selling more products and services, or by reducing costs [1]. So there is no doubt that web-data mining can be quite beneficial to businesses [1].
However, people’s informational privacy may be violated in the process of web-data mining. “Information privacy mainly concerns the control of information about oneself” [1]. The authors in [1] point out that “informational privacy can be violated when information concerning an individual is obtained, used, or disseminated, especially if this occurs without their knowledge or consent”. Web-data mining is categorized into two three different types: content mining, structure mining, and structure mining [1]. Content mining means analyzing the content available in web documents [1]. The web documents can include text, images, audio files, etc. Structure mining aims to analyze the way in which different web documents are linked...

Find Another Essay On Privacy and Security Issues in Data Mining

Privacy and Security in Social Networking Sites

1918 words - 8 pages In today’s society, privacy, security, and convenience has turned into a paradoxical issue dealing with the information age (Barnes, 2006…). In fact, one of the primary driving instruments are the usage - and rise – of social networking sites such as: Facebook, Myspace, and Twitter. Having said that - and considering these networks gather considerable amounts of information about its users, the idea of securing your information is momentous

Data Mining Benefits and Drawbacks Essay

2784 words - 11 pages data mining. It would certainly seem that the general security of society is a good thing. In regards to terrorist activities the greatest good of society would certainly be served by finding, tracking, and eliminating terrorists. Never mind the rights approach concern with personal privacy for the moment. Data mining could be used to find terrorist, in which case it would be an ethical action. But what if data mining is used simply to

Security Breaches in Comunication and Data Systems

4082 words - 17 pages There are many average security measures that have a major effect in counteracting terrorist activity over the computer; these are things such as firewalls and virus checkers. A company needs to be ready and practical, they need to have set controls and trained professionals in order to prevent a cyber-attack. Cyber security is a moving target, because they never keep the information up for long periods of time. Therefore there should be

Internet Privacy and Security

1113 words - 5 pages the same in many ways. Browser security is protection against personal information or data being stolen from oneself to commit fraud, browser security helps us determine secure sites online vs unsafe sites. They are also the same because they share the responsibility along with us, to know how to use the internet appropriately, and safe guard us from viruses, internet stockers, hackers, etc. Privacy and Security are both equally important, to

Surveillance and Privacy Issues

1116 words - 5 pages Phil LeRoy COM 6650 Take Home Final December 12, 2013 2) It is getting ever easier to record anything, or everything, that you see. This opens fascinating possibilities-and alarming ones.” The Economist, Nov. 16, 2013 Discuss this statement in the light of the medias recent preoccupation with surveillance and privacy issues. Include government surveillance and social media. For example the young woman who accused Florida state quarterback

Security and Private Issues in Ecommerce

1568 words - 7 pages SECURITY AND PRIVATE ISSUES IN ECOMMERCE INTRODUCTION: Privacy means that the control over data and security of one is the attempt to access the data by other unauthorized . These are two critical issues facing by both consumers and e-commerce sites alike. Since the invention of the World Wide Web , electronic commerce based on the Internet has grown from a simple idea into reality. Consumers browse through

Data Mining and the US Government

4283 words - 17 pages effects of how our email registration for a company might spawn numerous unwanted junk emails and advertisements. Also, similar to many of the issues in the government arena, data mining generates too much data for processing. Many of it useful, but "it is just as likely to identify meaningless patterns or trends, which in turn wastes time and resources". [13] What is Privacy? How better to define privacy, especially in the United

Data Mining and the Social Web

1717 words - 7 pages . It presents a potential privacy concern for users because they did not consciously consent to have their user information mined and sold. Data mining itself is a power tool in advertising, however does question is does the use and creation of Data mining algorithms have the potential to lead to privacy violations when it is used to create targeted advertisements? Facebook is a social media site that boasts 500 million users worldwide making

E-commerce: Security and Privacy

2129 words - 9 pages E-commerce: Security and Privacy As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through

Government Control and Privacy Issues in 1984 by George Orwell

1709 words - 7 pages -graph/>. Jayson, Sharon. "Social Media Research Raises Privacy and Ethics Issues." USA Today. Gannett, 12 Mar. 2014. Web. 06 Apr. 2014. . Litke, Eric. "State Cops Can Track Residents' Cellphones." Daily Tribune Media. N.p., 28 Mar. 2014. Web. 06 Apr. 2014.

Security Issues in Cyberspace

1325 words - 6 pages ]. Computer security is such a security that is considered to protect the computer system against attacks or harms. I refer computer system here to be comprised of hardware, software, data, and the user. Any attack or harm against the flow of data or information is to be defined as a computer security problem such as disruption of operations through viruses, worms and logic bombs along with unauthorized access [2]. Security issues in cyberspace Security

Similar Essays

Privacy And Security Issues On Facebook

2038 words - 8 pages Executive Summary Problem Statement: In this white paper we will address how privacy and security can be improved on Facebook. Important Points: · Background of Facebook · Privacy Problems with Facebook · Possible Security and Privacy Solutions · Summary · Works Cited Background of Facebook Facebook allows people to connect with friends across the seas with different cultures. Originally, Facebook was started in 2003 by a man named

How Privacy Preserving Data Mining Protects Your Information

665 words - 3 pages large volume of datasets. In the crypto-based approach, data owners have to cooperatively implement specially designed data mining algorithms. Though these algorithms achieve verifiable privacy protection but they suffers from performance and scalability issues. Usage of hiding association rules is projected due to high performance which is generated from frequent item sets. Specific threshold is set at the disclosure risk rate and confidential

Data Mining, Data Warehousing And Data Dredging

1118 words - 4 pages store data and information in hopes of making better decisions about market conditions, customer relations and predictions how do they know if the data is too old, duplicate or useless? With the massive amounts of resources including hardware, time and money being spent to maintain data warehouses perhaps more effort should be put into figuring out if there is even a need for it. But do the benefits out weigh the problems? "Using data mining

Security And Privacy In Social Media

1797 words - 8 pages limitations on the information that various surveillance companies have access to. Unfortunately, devices used today contain high-technical software that the average person does not understand and cannot change. At the present time there is not a universal design to protect the privacy of individual’s data while using social networks. It appears that there are more problems than solutions to security and privacy in the social media. However