ๅฐŠๆ•ฌ็š„ ๅพฎไฟกๆฑ‡็Ž‡๏ผš1ๅ†† โ‰ˆ 0.046166 ๅ…ƒ ๆ”ฏไป˜ๅฎๆฑ‡็Ž‡๏ผš1ๅ†† โ‰ˆ 0.046257ๅ…ƒ [้€€ๅ‡บ็™ปๅฝ•]
SlideShare a Scribd company logo
Information privacy and data mining
7/2/2019 Compiled by: Kamal Acharya 1
7/2/2019 Compiled by: Kamal Acharya 2
Introduction
โ€ข What is information privacy?
A number of definitions:
โ€“ Definition1: Information privacy is the individualโ€™s ability to control the
circulation of information relating to him/her.
โ€“ Definition2: it is the claim of individuals, groups or institutions to
determine for themselves when how and to what extent information about
them is communicated to others.
7/2/2019 Compiled by: Kamal Acharya 3
Basic principles to protect information privacy
โ€ข The OECD principles are given below:
โ€“ Collection limitation
โ€“ Data quality
โ€“ Purpose specification
โ€“ Use limitation
โ€“ Security safeguards
โ€“ Openness
โ€“ Individual participation
โ€“ Accountability
โ€“ International application
7/2/2019 Compiled by: Kamal Acharya 4
Contd..
โ€ข Collection limitation:
โ€“ Principle: There should be limits to the collection of personal data and any
such data should be obtained by lawful and fair means and, where
appropriate, with the knowledge or consent of the data subject.
โ€“ Description: This principle deals with two issues. Firstly it limits the
collection of personal data that puts an end to indiscriminate collection of
personal data. Secondly, deals with practices used in data collection. The
knowledge or consent of the data subject is essential although the principle
accepts that consent of the data subject may not always be possible.
7/2/2019 Compiled by: Kamal Acharya 5
Contd..
โ€ข Data Quality:
โ€“ Principle: Personal data should be relevant to the purposes for which they
are to be used, and, to the extent necessary for those purposes, should be
accurate, complete and kept up-to-date.
โ€“ Description: This principle in essence states that data should be related to
the purpose for which it is to be used. For example, data including
opinions may not always be useful to collect since it may not be relevant
for the purposes for which the data is to be used.
7/2/2019 Compiled by: Kamal Acharya 6
Contd..
โ€ข Purpose specification:
โ€“ Principle: The purposes for which personal data are collected should be
specified not later than at the time of data collection and the subsequent
use limited to the fulfillment of those purposes or such others as are not
incompatible with those purposes and as are specified on each occasion of
change of purpose.
โ€“ Description: The purpose of data collection should be identified before
data collection and any changes afterwards must be specified. Also, when
data no longer serves a purpose, it may be necessary to destroy the data if
practicable.
7/2/2019 Compiled by: Kamal Acharya 7
Contd..
โ€ข Use limitation:
โ€“ Principle: Personal data should not be disclosed, made
available or otherwise used for purposes other than those
specified in accordance with principle 3 except with the
consent of the data subject or by the authority of law.
โ€“ Description: the earlier principles were more dealing with
data collection. This principle deals with data use and data
disclosure. data
7/2/2019 Compiled by: Kamal Acharya 8
Contd..
โ€ข Security safeguards:
โ€“ Principle: Personal data should be protected by reasonable
security safeguards against such risks as loss or unauthorized
access, destruction, use, modification or disclosure of data.
โ€“ Description: To enforce the principle of use limitations, it is
required that there be appropriate safeguards. The safeguards
should include physical safeguards as well as safeguards for
the computer systems.
7/2/2019 Compiled by: Kamal Acharya 9
Contd..
โ€ข Openness:
โ€“ Principle: There should be a general policy of openness about
developments, practices and policies with respect to personal
data. Means should be readily available of establishing the
existence and nature of personal data, and the main purposes
of their use, as well as the identity and usual residence of the
data controller.
7/2/2019 Compiled by: Kamal Acharya 10
Contd..
โ€ข Individual participation: An individual should have the right:
โ€“ To obtain data from a data controller, or otherwise,
confirmation or not, the data controller has data relating to
him;
โ€“ To have communicated to him, data relating to him
โ€ข Within a reasonable time;
โ€ข At a charge, if any, that is not excessive;
โ€ข In a reasonable manner; and
โ€ข In a form that is readily intelligible to him;
7/2/2019 Compiled by: Kamal Acharya 11
Contd..
โ€ข To be given reasons if a request made under first two scenarios is
denied, and to be able to challenge such denial; and
โ€ข To challenge data relating to him and, if the challenge is
successful, to have the data erased, rectified, completed or
amended.
This is perhaps the most important principle. It involves the rights
of the individuals to acquire information about the collection,
storage and use of personal data. The right of access should be
simple to exercise.
7/2/2019 Compiled by: Kamal Acharya 12
Contd..
โ€ข Accountability:
โ€“ The data controller should be accountable for complying with
measures which give effect to the principles stated above.
โ€“ This principle requires that the data collector comply with the
privacy protection principles. Accountability should be
supported by legal sanctions and perhaps a code of conduct.
7/2/2019 Compiled by: Kamal Acharya 13
Uses and misuses of data mining
โ€ข Data mining involves the extraction of implicit, previously
unknown and potentially useful knowledge form large databases.
โ€ข Data mining is a very challenging task since it involves building
and using software that will manage, explore, summarize, model,
analyze and interpret large datasets in order to identify patterns
and abnormalities.
7/2/2019 Compiled by: Kamal Acharya 14
Contd..
โ€ข Uses:
โ€“ Data mining techniques are being used increasingly in a wide
variety of applications.
โ€“ The applications include:
โ€ข Fraud prevention
โ€ข Catching tax avoidance
โ€ข Catching drug smugglers
โ€ข Reducing customer churn and learning more about customers behavior.
7/2/2019 Compiled by: Kamal Acharya 15
Contd..
โ€ข Misuses of data mining:
7/2/2019 Compiled by: Kamal Acharya 16
Primary aims of data mining
โ€ข Some aims of data mining are:
โ€“ The primary aim of data mining applications is to better
understand the customer and improve customer services.
โ€“ Some applications aim to discover anomalous patterns in
order to help identify, for example, fraud , abuse, waste,
terrorist suspects or drug smugglers.
7/2/2019 Compiled by: Kamal Acharya 17
Contd..
โ€ข In many applications in private enterprises, the primary aim is
to improve the profitability of an enterprise.
โ€ข In many applications the primary purpose is to improve
human judgment, for example, in marketing diagnoses, in
resolving crime, in sorting out manufacturing problems, in
predicting share prices or currency movements or commodity
prices.
7/2/2019 Compiled by: Kamal Acharya 18
Contd..
โ€ข In some government applications, one of the aims of data mining is to
identify criminal activities.
โ€ข In some situations, data mining is used to find patterns that are simply
not possible without help of data mining, given the huge amounts of
data that must be processed.
Many data mining systems designed to achieve one or more of these aims
do not lead to personal privacy violations, but some do. In particular,
applications that aim to discover anomalous behavior can lead to
significantly violations of individual privacy.
7/2/2019 Compiled by: Kamal Acharya 19
Pitfalls of data mining
โ€ข Dempsey and Rosenzweig identify five pitfalls of data mining
when personally identifiable information is used in data mining
applications like identifying terrorist suspects.
โ€ข These five categories are:
โ€“ Unintentional Mistake-Mistaken identity
โ€“ Unintentional Mistake- Faulty Inference
โ€“ Intentional abuse
โ€“ Security Breach
โ€“ Mission Creep
7/2/2019 Compiled by: Kamal Acharya 20
Contd..
โ€ข Unintentional Mistake- Mistaken Identity:
โ€“ This kind problem arises when an innocent person shares
some identifier information with one or more persons that
have been identified as having a profile of interest in a data
mining application.
7/2/2019 Compiled by: Kamal Acharya 21
Contd..
โ€ข Unintentional Mistake- Faulty inference:
โ€“ This kind of problem arises when profiles are matched and
the data mining user misinterpret the result of the match.
โ€“ Faulty inferences then may be derived resulting, for example,
in an innocent person becoming a suspect and leading to
further investigation about the person
7/2/2019 Compiled by: Kamal Acharya 22
Contd..
โ€ข Intentional abuse:
โ€“ People employed in running a data mining system and
security organizations have access to sensitive personal
information and not all of them are trustworthy.
โ€“ This sensitive information may be used for unauthorized
purposes for personal financial gain.
7/2/2019 Compiled by: Kamal Acharya 23
Contd..
โ€ข Security Breach:
โ€“ Given that data mining system using personal information
have sensitive information may be stolen or carelessly
disclosed without strict security measures.
7/2/2019 Compiled by: Kamal Acharya 24
Contd..
โ€ข Mission Creep:
โ€“ Once a data mining system, for example for a national
security application, has been established and personal
information from a variety of source collected, there is likely
to be a temptation to use the information for other
applications. Such mission creep has been reported in data
mining applications.
7/2/2019 Compiled by: Kamal Acharya 25
Homework
โ€ข What is information privacy?
โ€ข What are the basic OECD information privacy protection
principles?
โ€ข List two important uses of data mining?
โ€ข List two important misuses of data mining?
โ€ข What are the primary aims of data mining?
โ€ข List the five pitfalls of data mining?
โ€ข What is privacy preserving data mining?
Thank You !
Compiled by: Kamal Acharya 267/2/2019

More Related Content

What's hot

Dynamic Itemset Counting
Dynamic Itemset CountingDynamic Itemset Counting
Dynamic Itemset Counting
Tarat Diloksawatdikul
ย 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
TrustArc
ย 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
ย 
Data mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, ClassificationData mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, Classification
Dr. Abdul Ahad Abro
ย 
BIM Data Mining Unit1 by Tekendra Nath Yogi
 BIM Data Mining Unit1 by Tekendra Nath Yogi BIM Data Mining Unit1 by Tekendra Nath Yogi
BIM Data Mining Unit1 by Tekendra Nath Yogi
Tekendra Nath Yogi
ย 
Intruders
IntrudersIntruders
Intruders
Dr.Florence Dayana
ย 
Crucial decisions in designing a data warehouse
Crucial decisions in designing a data warehouseCrucial decisions in designing a data warehouse
Crucial decisions in designing a data warehouse
Manju Rajput
ย 
Active database
Active databaseActive database
Active database
Dabbal Singh Mahara
ย 
BIM Data Mining Unit3 by Tekendra Nath Yogi
 BIM Data Mining Unit3 by Tekendra Nath Yogi BIM Data Mining Unit3 by Tekendra Nath Yogi
BIM Data Mining Unit3 by Tekendra Nath Yogi
Tekendra Nath Yogi
ย 
planning & project management for DWH
planning & project management for DWHplanning & project management for DWH
planning & project management for DWH
VESIT/University of Mumbai
ย 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
Giorgos Cheliotis
ย 
Data explosion
Data explosionData explosion
Data explosion
G Prachi
ย 
BIM Data Mining Unit4 by Tekendra Nath Yogi
 BIM Data Mining Unit4 by Tekendra Nath Yogi BIM Data Mining Unit4 by Tekendra Nath Yogi
BIM Data Mining Unit4 by Tekendra Nath Yogi
Tekendra Nath Yogi
ย 
Data Stream Management
Data Stream ManagementData Stream Management
Data Stream Management
k_tauhid
ย 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
ย 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Ali Broumandnia
ย 
NE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISNE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSIS
rathnaarul
ย 
Data mining
Data miningData mining
Data mining
EmaSushan
ย 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
ย 
Data mining PPT
Data mining PPTData mining PPT
Data mining PPT
Kapil Rode
ย 

What's hot (20)

Dynamic Itemset Counting
Dynamic Itemset CountingDynamic Itemset Counting
Dynamic Itemset Counting
ย 
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...
ย 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
ย 
Data mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, ClassificationData mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, Classification
ย 
BIM Data Mining Unit1 by Tekendra Nath Yogi
 BIM Data Mining Unit1 by Tekendra Nath Yogi BIM Data Mining Unit1 by Tekendra Nath Yogi
BIM Data Mining Unit1 by Tekendra Nath Yogi
ย 
Intruders
IntrudersIntruders
Intruders
ย 
Crucial decisions in designing a data warehouse
Crucial decisions in designing a data warehouseCrucial decisions in designing a data warehouse
Crucial decisions in designing a data warehouse
ย 
Active database
Active databaseActive database
Active database
ย 
BIM Data Mining Unit3 by Tekendra Nath Yogi
 BIM Data Mining Unit3 by Tekendra Nath Yogi BIM Data Mining Unit3 by Tekendra Nath Yogi
BIM Data Mining Unit3 by Tekendra Nath Yogi
ย 
planning & project management for DWH
planning & project management for DWHplanning & project management for DWH
planning & project management for DWH
ย 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
ย 
Data explosion
Data explosionData explosion
Data explosion
ย 
BIM Data Mining Unit4 by Tekendra Nath Yogi
 BIM Data Mining Unit4 by Tekendra Nath Yogi BIM Data Mining Unit4 by Tekendra Nath Yogi
BIM Data Mining Unit4 by Tekendra Nath Yogi
ย 
Data Stream Management
Data Stream ManagementData Stream Management
Data Stream Management
ย 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
ย 
Chapter 1
Chapter 1Chapter 1
Chapter 1
ย 
NE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISNE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSIS
ย 
Data mining
Data miningData mining
Data mining
ย 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
ย 
Data mining PPT
Data mining PPTData mining PPT
Data mining PPT
ย 

Similar to Information Privacy and Data Mining

New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
ย 
Real world data engineering practices for GDPR
Real world data engineering practices for GDPRReal world data engineering practices for GDPR
Real world data engineering practices for GDPR
Ching-Yu Wu
ย 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
PrivacyCenter.cloud
ย 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
LATHA H C
ย 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
devbhargav1
ย 
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
Knobbe Martens - Intellectual Property Law
ย 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
IDERA Software
ย 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
shekharkanodia
ย 
Enlightened Privacy โ€“ by Design for a Smarter Grid
Enlightened Privacy โ€“ by Design for a Smarter GridEnlightened Privacy โ€“ by Design for a Smarter Grid
Enlightened Privacy โ€“ by Design for a Smarter Grid
bradley_g
ย 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance Preparation
LawPlus Ltd.
ย 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
ย 
Part 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfPart 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdf
kiruthigajawahar6
ย 
Data Ethics Framework 2.pptx
Data Ethics Framework 2.pptxData Ethics Framework 2.pptx
Data Ethics Framework 2.pptx
UgurKaplancali
ย 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
JaeKim165097
ย 
chapter 5.ppt data collection and analysis
chapter 5.ppt data collection and analysischapter 5.ppt data collection and analysis
chapter 5.ppt data collection and analysis
etebarkhmichale
ย 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
Aaron Banham
ย 
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTSA BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
Internet Law Center
ย 
Final projet
Final  projetFinal  projet
Final projet
serge-parfait Goma
ย 
Can we ask that
Can we ask thatCan we ask that
Can we ask that
CoAction Staff Association
ย 
Data Management Regulation Up To Date Policy.pptx
Data Management Regulation Up To Date Policy.pptxData Management Regulation Up To Date Policy.pptx
Data Management Regulation Up To Date Policy.pptx
KanishkaKartikeya
ย 

Similar to Information Privacy and Data Mining (20)

New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
ย 
Real world data engineering practices for GDPR
Real world data engineering practices for GDPRReal world data engineering practices for GDPR
Real world data engineering practices for GDPR
ย 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
ย 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
ย 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
ย 
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
ย 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
ย 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
ย 
Enlightened Privacy โ€“ by Design for a Smarter Grid
Enlightened Privacy โ€“ by Design for a Smarter GridEnlightened Privacy โ€“ by Design for a Smarter Grid
Enlightened Privacy โ€“ by Design for a Smarter Grid
ย 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance Preparation
ย 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
ย 
Part 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfPart 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdf
ย 
Data Ethics Framework 2.pptx
Data Ethics Framework 2.pptxData Ethics Framework 2.pptx
Data Ethics Framework 2.pptx
ย 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
ย 
chapter 5.ppt data collection and analysis
chapter 5.ppt data collection and analysischapter 5.ppt data collection and analysis
chapter 5.ppt data collection and analysis
ย 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
ย 
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTSA BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
ย 
Final projet
Final  projetFinal  projet
Final projet
ย 
Can we ask that
Can we ask thatCan we ask that
Can we ask that
ย 
Data Management Regulation Up To Date Policy.pptx
Data Management Regulation Up To Date Policy.pptxData Management Regulation Up To Date Policy.pptx
Data Management Regulation Up To Date Policy.pptx
ย 

More from Kamal Acharya

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computer
Kamal Acharya
ย 
Computer Arithmetic
Computer ArithmeticComputer Arithmetic
Computer Arithmetic
Kamal Acharya
ย 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
Kamal Acharya
ย 
Session and Cookies
Session and CookiesSession and Cookies
Session and Cookies
Kamal Acharya
ย 
Functions in php
Functions in phpFunctions in php
Functions in php
Kamal Acharya
ย 
Web forms in php
Web forms in phpWeb forms in php
Web forms in php
Kamal Acharya
ย 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHP
Kamal Acharya
ย 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in php
Kamal Acharya
ย 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHP
Kamal Acharya
ย 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHP
Kamal Acharya
ย 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data Warehousing
Kamal Acharya
ย 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
Kamal Acharya
ย 
Search Engines
Search EnginesSearch Engines
Search Engines
Kamal Acharya
ย 
Web Mining
Web MiningWeb Mining
Web Mining
Kamal Acharya
ย 
Cluster Analysis
Cluster AnalysisCluster Analysis
Cluster Analysis
Kamal Acharya
ย 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data Mining
Kamal Acharya
ย 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data mining
Kamal Acharya
ย 
Data Preprocessing
Data PreprocessingData Preprocessing
Data Preprocessing
Kamal Acharya
ย 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data Warehousing
Kamal Acharya
ย 
Functions in Python
Functions in PythonFunctions in Python
Functions in Python
Kamal Acharya
ย 

More from Kamal Acharya (20)

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computer
ย 
Computer Arithmetic
Computer ArithmeticComputer Arithmetic
Computer Arithmetic
ย 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
ย 
Session and Cookies
Session and CookiesSession and Cookies
Session and Cookies
ย 
Functions in php
Functions in phpFunctions in php
Functions in php
ย 
Web forms in php
Web forms in phpWeb forms in php
Web forms in php
ย 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHP
ย 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in php
ย 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHP
ย 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHP
ย 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data Warehousing
ย 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
ย 
Search Engines
Search EnginesSearch Engines
Search Engines
ย 
Web Mining
Web MiningWeb Mining
Web Mining
ย 
Cluster Analysis
Cluster AnalysisCluster Analysis
Cluster Analysis
ย 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data Mining
ย 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data mining
ย 
Data Preprocessing
Data PreprocessingData Preprocessing
Data Preprocessing
ย 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data Warehousing
ย 
Functions in Python
Functions in PythonFunctions in Python
Functions in Python
ย 

Recently uploaded

Creativity for Innovation and Speechmaking
Creativity for Innovation and SpeechmakingCreativity for Innovation and Speechmaking
Creativity for Innovation and Speechmaking
MattVassar1
ย 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
ย 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
ย 
bryophytes.pptx bsc botany honours second semester
bryophytes.pptx bsc botany honours  second semesterbryophytes.pptx bsc botany honours  second semester
bryophytes.pptx bsc botany honours second semester
Sarojini38
ย 
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptxScience-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Catherine Dela Cruz
ย 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
ย 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
ย 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
Quizzito The Quiz Society of Gargi College
ย 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
whatchangedhowreflec
ย 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
ย 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
ย 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
MattVassar1
ย 
The basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptxThe basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptx
heathfieldcps1
ย 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
nabaegha
ย 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
ย 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
ย 
Creating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptxCreating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptx
Forum of Blended Learning
ย 
The Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptxThe Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptx
PriyaKumari928991
ย 
(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"
MJDuyan
ย 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
ย 

Recently uploaded (20)

Creativity for Innovation and Speechmaking
Creativity for Innovation and SpeechmakingCreativity for Innovation and Speechmaking
Creativity for Innovation and Speechmaking
ย 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
ย 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
ย 
bryophytes.pptx bsc botany honours second semester
bryophytes.pptx bsc botany honours  second semesterbryophytes.pptx bsc botany honours  second semester
bryophytes.pptx bsc botany honours second semester
ย 
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptxScience-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
ย 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ย 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
ย 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
ย 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
ย 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
ย 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
ย 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
ย 
The basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptxThe basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptx
ย 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
ย 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
ย 
Observational Learning
Observational Learning Observational Learning
Observational Learning
ย 
Creating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptxCreating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptx
ย 
The Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptxThe Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptx
ย 
(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"
ย 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
ย 

Information Privacy and Data Mining

  • 1. Information privacy and data mining 7/2/2019 Compiled by: Kamal Acharya 1
  • 2. 7/2/2019 Compiled by: Kamal Acharya 2 Introduction โ€ข What is information privacy? A number of definitions: โ€“ Definition1: Information privacy is the individualโ€™s ability to control the circulation of information relating to him/her. โ€“ Definition2: it is the claim of individuals, groups or institutions to determine for themselves when how and to what extent information about them is communicated to others.
  • 3. 7/2/2019 Compiled by: Kamal Acharya 3 Basic principles to protect information privacy โ€ข The OECD principles are given below: โ€“ Collection limitation โ€“ Data quality โ€“ Purpose specification โ€“ Use limitation โ€“ Security safeguards โ€“ Openness โ€“ Individual participation โ€“ Accountability โ€“ International application
  • 4. 7/2/2019 Compiled by: Kamal Acharya 4 Contd.. โ€ข Collection limitation: โ€“ Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. โ€“ Description: This principle deals with two issues. Firstly it limits the collection of personal data that puts an end to indiscriminate collection of personal data. Secondly, deals with practices used in data collection. The knowledge or consent of the data subject is essential although the principle accepts that consent of the data subject may not always be possible.
  • 5. 7/2/2019 Compiled by: Kamal Acharya 5 Contd.. โ€ข Data Quality: โ€“ Principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date. โ€“ Description: This principle in essence states that data should be related to the purpose for which it is to be used. For example, data including opinions may not always be useful to collect since it may not be relevant for the purposes for which the data is to be used.
  • 6. 7/2/2019 Compiled by: Kamal Acharya 6 Contd.. โ€ข Purpose specification: โ€“ Principle: The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfillment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose. โ€“ Description: The purpose of data collection should be identified before data collection and any changes afterwards must be specified. Also, when data no longer serves a purpose, it may be necessary to destroy the data if practicable.
  • 7. 7/2/2019 Compiled by: Kamal Acharya 7 Contd.. โ€ข Use limitation: โ€“ Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with principle 3 except with the consent of the data subject or by the authority of law. โ€“ Description: the earlier principles were more dealing with data collection. This principle deals with data use and data disclosure. data
  • 8. 7/2/2019 Compiled by: Kamal Acharya 8 Contd.. โ€ข Security safeguards: โ€“ Principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data. โ€“ Description: To enforce the principle of use limitations, it is required that there be appropriate safeguards. The safeguards should include physical safeguards as well as safeguards for the computer systems.
  • 9. 7/2/2019 Compiled by: Kamal Acharya 9 Contd.. โ€ข Openness: โ€“ Principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller.
  • 10. 7/2/2019 Compiled by: Kamal Acharya 10 Contd.. โ€ข Individual participation: An individual should have the right: โ€“ To obtain data from a data controller, or otherwise, confirmation or not, the data controller has data relating to him; โ€“ To have communicated to him, data relating to him โ€ข Within a reasonable time; โ€ข At a charge, if any, that is not excessive; โ€ข In a reasonable manner; and โ€ข In a form that is readily intelligible to him;
  • 11. 7/2/2019 Compiled by: Kamal Acharya 11 Contd.. โ€ข To be given reasons if a request made under first two scenarios is denied, and to be able to challenge such denial; and โ€ข To challenge data relating to him and, if the challenge is successful, to have the data erased, rectified, completed or amended. This is perhaps the most important principle. It involves the rights of the individuals to acquire information about the collection, storage and use of personal data. The right of access should be simple to exercise.
  • 12. 7/2/2019 Compiled by: Kamal Acharya 12 Contd.. โ€ข Accountability: โ€“ The data controller should be accountable for complying with measures which give effect to the principles stated above. โ€“ This principle requires that the data collector comply with the privacy protection principles. Accountability should be supported by legal sanctions and perhaps a code of conduct.
  • 13. 7/2/2019 Compiled by: Kamal Acharya 13 Uses and misuses of data mining โ€ข Data mining involves the extraction of implicit, previously unknown and potentially useful knowledge form large databases. โ€ข Data mining is a very challenging task since it involves building and using software that will manage, explore, summarize, model, analyze and interpret large datasets in order to identify patterns and abnormalities.
  • 14. 7/2/2019 Compiled by: Kamal Acharya 14 Contd.. โ€ข Uses: โ€“ Data mining techniques are being used increasingly in a wide variety of applications. โ€“ The applications include: โ€ข Fraud prevention โ€ข Catching tax avoidance โ€ข Catching drug smugglers โ€ข Reducing customer churn and learning more about customers behavior.
  • 15. 7/2/2019 Compiled by: Kamal Acharya 15 Contd.. โ€ข Misuses of data mining:
  • 16. 7/2/2019 Compiled by: Kamal Acharya 16 Primary aims of data mining โ€ข Some aims of data mining are: โ€“ The primary aim of data mining applications is to better understand the customer and improve customer services. โ€“ Some applications aim to discover anomalous patterns in order to help identify, for example, fraud , abuse, waste, terrorist suspects or drug smugglers.
  • 17. 7/2/2019 Compiled by: Kamal Acharya 17 Contd.. โ€ข In many applications in private enterprises, the primary aim is to improve the profitability of an enterprise. โ€ข In many applications the primary purpose is to improve human judgment, for example, in marketing diagnoses, in resolving crime, in sorting out manufacturing problems, in predicting share prices or currency movements or commodity prices.
  • 18. 7/2/2019 Compiled by: Kamal Acharya 18 Contd.. โ€ข In some government applications, one of the aims of data mining is to identify criminal activities. โ€ข In some situations, data mining is used to find patterns that are simply not possible without help of data mining, given the huge amounts of data that must be processed. Many data mining systems designed to achieve one or more of these aims do not lead to personal privacy violations, but some do. In particular, applications that aim to discover anomalous behavior can lead to significantly violations of individual privacy.
  • 19. 7/2/2019 Compiled by: Kamal Acharya 19 Pitfalls of data mining โ€ข Dempsey and Rosenzweig identify five pitfalls of data mining when personally identifiable information is used in data mining applications like identifying terrorist suspects. โ€ข These five categories are: โ€“ Unintentional Mistake-Mistaken identity โ€“ Unintentional Mistake- Faulty Inference โ€“ Intentional abuse โ€“ Security Breach โ€“ Mission Creep
  • 20. 7/2/2019 Compiled by: Kamal Acharya 20 Contd.. โ€ข Unintentional Mistake- Mistaken Identity: โ€“ This kind problem arises when an innocent person shares some identifier information with one or more persons that have been identified as having a profile of interest in a data mining application.
  • 21. 7/2/2019 Compiled by: Kamal Acharya 21 Contd.. โ€ข Unintentional Mistake- Faulty inference: โ€“ This kind of problem arises when profiles are matched and the data mining user misinterpret the result of the match. โ€“ Faulty inferences then may be derived resulting, for example, in an innocent person becoming a suspect and leading to further investigation about the person
  • 22. 7/2/2019 Compiled by: Kamal Acharya 22 Contd.. โ€ข Intentional abuse: โ€“ People employed in running a data mining system and security organizations have access to sensitive personal information and not all of them are trustworthy. โ€“ This sensitive information may be used for unauthorized purposes for personal financial gain.
  • 23. 7/2/2019 Compiled by: Kamal Acharya 23 Contd.. โ€ข Security Breach: โ€“ Given that data mining system using personal information have sensitive information may be stolen or carelessly disclosed without strict security measures.
  • 24. 7/2/2019 Compiled by: Kamal Acharya 24 Contd.. โ€ข Mission Creep: โ€“ Once a data mining system, for example for a national security application, has been established and personal information from a variety of source collected, there is likely to be a temptation to use the information for other applications. Such mission creep has been reported in data mining applications.
  • 25. 7/2/2019 Compiled by: Kamal Acharya 25 Homework โ€ข What is information privacy? โ€ข What are the basic OECD information privacy protection principles? โ€ข List two important uses of data mining? โ€ข List two important misuses of data mining? โ€ข What are the primary aims of data mining? โ€ข List the five pitfalls of data mining? โ€ข What is privacy preserving data mining?
  • 26. Thank You ! Compiled by: Kamal Acharya 267/2/2019

Editor's Notes

  1. OECD => Organization for Economic Cooperation and Development
  ็ฟป่ฏ‘๏ผš