SlideShare a Scribd company logo
1 of 26
Information privacy and data mining
7/2/2019 Compiled by: Kamal Acharya 1
7/2/2019 Compiled by: Kamal Acharya 2
Introduction
• What is information privacy?
A number of definitions:
– Definition1: Information privacy is the individual’s ability to control the
circulation of information relating to him/her.
– Definition2: it is the claim of individuals, groups or institutions to
determine for themselves when how and to what extent information about
them is communicated to others.
7/2/2019 Compiled by: Kamal Acharya 3
Basic principles to protect information privacy
• The OECD principles are given below:
– Collection limitation
– Data quality
– Purpose specification
– Use limitation
– Security safeguards
– Openness
– Individual participation
– Accountability
– International application
7/2/2019 Compiled by: Kamal Acharya 4
Contd..
• Collection limitation:
– Principle: There should be limits to the collection of personal data and any
such data should be obtained by lawful and fair means and, where
appropriate, with the knowledge or consent of the data subject.
– Description: This principle deals with two issues. Firstly it limits the
collection of personal data that puts an end to indiscriminate collection of
personal data. Secondly, deals with practices used in data collection. The
knowledge or consent of the data subject is essential although the principle
accepts that consent of the data subject may not always be possible.
7/2/2019 Compiled by: Kamal Acharya 5
Contd..
• Data Quality:
– Principle: Personal data should be relevant to the purposes for which they
are to be used, and, to the extent necessary for those purposes, should be
accurate, complete and kept up-to-date.
– Description: This principle in essence states that data should be related to
the purpose for which it is to be used. For example, data including
opinions may not always be useful to collect since it may not be relevant
for the purposes for which the data is to be used.
7/2/2019 Compiled by: Kamal Acharya 6
Contd..
• Purpose specification:
– Principle: The purposes for which personal data are collected should be
specified not later than at the time of data collection and the subsequent
use limited to the fulfillment of those purposes or such others as are not
incompatible with those purposes and as are specified on each occasion of
change of purpose.
– Description: The purpose of data collection should be identified before
data collection and any changes afterwards must be specified. Also, when
data no longer serves a purpose, it may be necessary to destroy the data if
practicable.
7/2/2019 Compiled by: Kamal Acharya 7
Contd..
• Use limitation:
– Principle: Personal data should not be disclosed, made
available or otherwise used for purposes other than those
specified in accordance with principle 3 except with the
consent of the data subject or by the authority of law.
– Description: the earlier principles were more dealing with
data collection. This principle deals with data use and data
disclosure. data
7/2/2019 Compiled by: Kamal Acharya 8
Contd..
• Security safeguards:
– Principle: Personal data should be protected by reasonable
security safeguards against such risks as loss or unauthorized
access, destruction, use, modification or disclosure of data.
– Description: To enforce the principle of use limitations, it is
required that there be appropriate safeguards. The safeguards
should include physical safeguards as well as safeguards for
the computer systems.
7/2/2019 Compiled by: Kamal Acharya 9
Contd..
• Openness:
– Principle: There should be a general policy of openness about
developments, practices and policies with respect to personal
data. Means should be readily available of establishing the
existence and nature of personal data, and the main purposes
of their use, as well as the identity and usual residence of the
data controller.
7/2/2019 Compiled by: Kamal Acharya 10
Contd..
• Individual participation: An individual should have the right:
– To obtain data from a data controller, or otherwise,
confirmation or not, the data controller has data relating to
him;
– To have communicated to him, data relating to him
• Within a reasonable time;
• At a charge, if any, that is not excessive;
• In a reasonable manner; and
• In a form that is readily intelligible to him;
7/2/2019 Compiled by: Kamal Acharya 11
Contd..
• To be given reasons if a request made under first two scenarios is
denied, and to be able to challenge such denial; and
• To challenge data relating to him and, if the challenge is
successful, to have the data erased, rectified, completed or
amended.
This is perhaps the most important principle. It involves the rights
of the individuals to acquire information about the collection,
storage and use of personal data. The right of access should be
simple to exercise.
7/2/2019 Compiled by: Kamal Acharya 12
Contd..
• Accountability:
– The data controller should be accountable for complying with
measures which give effect to the principles stated above.
– This principle requires that the data collector comply with the
privacy protection principles. Accountability should be
supported by legal sanctions and perhaps a code of conduct.
7/2/2019 Compiled by: Kamal Acharya 13
Uses and misuses of data mining
• Data mining involves the extraction of implicit, previously
unknown and potentially useful knowledge form large databases.
• Data mining is a very challenging task since it involves building
and using software that will manage, explore, summarize, model,
analyze and interpret large datasets in order to identify patterns
and abnormalities.
7/2/2019 Compiled by: Kamal Acharya 14
Contd..
• Uses:
– Data mining techniques are being used increasingly in a wide
variety of applications.
– The applications include:
• Fraud prevention
• Catching tax avoidance
• Catching drug smugglers
• Reducing customer churn and learning more about customers behavior.
7/2/2019 Compiled by: Kamal Acharya 15
Contd..
• Misuses of data mining:
7/2/2019 Compiled by: Kamal Acharya 16
Primary aims of data mining
• Some aims of data mining are:
– The primary aim of data mining applications is to better
understand the customer and improve customer services.
– Some applications aim to discover anomalous patterns in
order to help identify, for example, fraud , abuse, waste,
terrorist suspects or drug smugglers.
7/2/2019 Compiled by: Kamal Acharya 17
Contd..
• In many applications in private enterprises, the primary aim is
to improve the profitability of an enterprise.
• In many applications the primary purpose is to improve
human judgment, for example, in marketing diagnoses, in
resolving crime, in sorting out manufacturing problems, in
predicting share prices or currency movements or commodity
prices.
7/2/2019 Compiled by: Kamal Acharya 18
Contd..
• In some government applications, one of the aims of data mining is to
identify criminal activities.
• In some situations, data mining is used to find patterns that are simply
not possible without help of data mining, given the huge amounts of
data that must be processed.
Many data mining systems designed to achieve one or more of these aims
do not lead to personal privacy violations, but some do. In particular,
applications that aim to discover anomalous behavior can lead to
significantly violations of individual privacy.
7/2/2019 Compiled by: Kamal Acharya 19
Pitfalls of data mining
• Dempsey and Rosenzweig identify five pitfalls of data mining
when personally identifiable information is used in data mining
applications like identifying terrorist suspects.
• These five categories are:
– Unintentional Mistake-Mistaken identity
– Unintentional Mistake- Faulty Inference
– Intentional abuse
– Security Breach
– Mission Creep
7/2/2019 Compiled by: Kamal Acharya 20
Contd..
• Unintentional Mistake- Mistaken Identity:
– This kind problem arises when an innocent person shares
some identifier information with one or more persons that
have been identified as having a profile of interest in a data
mining application.
7/2/2019 Compiled by: Kamal Acharya 21
Contd..
• Unintentional Mistake- Faulty inference:
– This kind of problem arises when profiles are matched and
the data mining user misinterpret the result of the match.
– Faulty inferences then may be derived resulting, for example,
in an innocent person becoming a suspect and leading to
further investigation about the person
7/2/2019 Compiled by: Kamal Acharya 22
Contd..
• Intentional abuse:
– People employed in running a data mining system and
security organizations have access to sensitive personal
information and not all of them are trustworthy.
– This sensitive information may be used for unauthorized
purposes for personal financial gain.
7/2/2019 Compiled by: Kamal Acharya 23
Contd..
• Security Breach:
– Given that data mining system using personal information
have sensitive information may be stolen or carelessly
disclosed without strict security measures.
7/2/2019 Compiled by: Kamal Acharya 24
Contd..
• Mission Creep:
– Once a data mining system, for example for a national
security application, has been established and personal
information from a variety of source collected, there is likely
to be a temptation to use the information for other
applications. Such mission creep has been reported in data
mining applications.
7/2/2019 Compiled by: Kamal Acharya 25
Homework
• What is information privacy?
• What are the basic OECD information privacy protection
principles?
• List two important uses of data mining?
• List two important misuses of data mining?
• What are the primary aims of data mining?
• List the five pitfalls of data mining?
• What is privacy preserving data mining?
Thank You !
Compiled by: Kamal Acharya 267/2/2019

More Related Content

What's hot

3 d transformation
3 d transformation3 d transformation
3 d transformationPooja Dixit
 
Window to viewport transformation
Window to viewport transformationWindow to viewport transformation
Window to viewport transformationAnkit Garg
 
Computer graphics basic transformation
Computer graphics basic transformationComputer graphics basic transformation
Computer graphics basic transformationSelvakumar Gna
 
Line Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - NotesLine Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - NotesOmprakash Chauhan
 
2d-transformation
2d-transformation2d-transformation
2d-transformationPooja Dixit
 
Polygon clipping
Polygon clippingPolygon clipping
Polygon clippingAnkit Garg
 
Monitors & workstation,Donald ch-2
Monitors & workstation,Donald ch-2Monitors & workstation,Donald ch-2
Monitors & workstation,Donald ch-2Iftikhar Ahmad
 
Image processing second unit Notes
Image processing second unit NotesImage processing second unit Notes
Image processing second unit NotesAAKANKSHA JAIN
 
2 d viewing computer graphics
2 d viewing computer graphics2 d viewing computer graphics
2 d viewing computer graphicsKALESHWAR KUMAR
 
Major issues in data mining
Major issues in data miningMajor issues in data mining
Major issues in data miningSlideshare
 
I. AO* SEARCH ALGORITHM
I. AO* SEARCH ALGORITHMI. AO* SEARCH ALGORITHM
I. AO* SEARCH ALGORITHMvikas dhakane
 
Viewing transformation
Viewing transformationViewing transformation
Viewing transformationUdayan Gupta
 
3D Transformation in Computer Graphics
3D Transformation in Computer Graphics3D Transformation in Computer Graphics
3D Transformation in Computer Graphicssabbirantor
 
Overview of the graphics system
Overview of the graphics systemOverview of the graphics system
Overview of the graphics systemKamal Acharya
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphicsKamal Acharya
 
B. SC CSIT Computer Graphics Unit1.2 By Tekendra Nath Yogi
B. SC CSIT Computer Graphics Unit1.2 By Tekendra Nath YogiB. SC CSIT Computer Graphics Unit1.2 By Tekendra Nath Yogi
B. SC CSIT Computer Graphics Unit1.2 By Tekendra Nath YogiTekendra Nath Yogi
 
Knowledge representation and Predicate logic
Knowledge representation and Predicate logicKnowledge representation and Predicate logic
Knowledge representation and Predicate logicAmey Kerkar
 

What's hot (20)

3 d transformation
3 d transformation3 d transformation
3 d transformation
 
Window to viewport transformation
Window to viewport transformationWindow to viewport transformation
Window to viewport transformation
 
Computer graphics basic transformation
Computer graphics basic transformationComputer graphics basic transformation
Computer graphics basic transformation
 
Line Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - NotesLine Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - Notes
 
2d-transformation
2d-transformation2d-transformation
2d-transformation
 
Polygon clipping
Polygon clippingPolygon clipping
Polygon clipping
 
Monitors & workstation,Donald ch-2
Monitors & workstation,Donald ch-2Monitors & workstation,Donald ch-2
Monitors & workstation,Donald ch-2
 
Image processing second unit Notes
Image processing second unit NotesImage processing second unit Notes
Image processing second unit Notes
 
2 d viewing computer graphics
2 d viewing computer graphics2 d viewing computer graphics
2 d viewing computer graphics
 
Major issues in data mining
Major issues in data miningMajor issues in data mining
Major issues in data mining
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
I. AO* SEARCH ALGORITHM
I. AO* SEARCH ALGORITHMI. AO* SEARCH ALGORITHM
I. AO* SEARCH ALGORITHM
 
Viewing transformation
Viewing transformationViewing transformation
Viewing transformation
 
3D Transformation in Computer Graphics
3D Transformation in Computer Graphics3D Transformation in Computer Graphics
3D Transformation in Computer Graphics
 
Overview of the graphics system
Overview of the graphics systemOverview of the graphics system
Overview of the graphics system
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
B. SC CSIT Computer Graphics Unit1.2 By Tekendra Nath Yogi
B. SC CSIT Computer Graphics Unit1.2 By Tekendra Nath YogiB. SC CSIT Computer Graphics Unit1.2 By Tekendra Nath Yogi
B. SC CSIT Computer Graphics Unit1.2 By Tekendra Nath Yogi
 
Knowledge representation and Predicate logic
Knowledge representation and Predicate logicKnowledge representation and Predicate logic
Knowledge representation and Predicate logic
 
Line clipping
Line clippingLine clipping
Line clipping
 
Shading
ShadingShading
Shading
 

Similar to Information Privacy and Data Mining

New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
Real world data engineering practices for GDPR
Real world data engineering practices for GDPRReal world data engineering practices for GDPR
Real world data engineering practices for GDPRChing-Yu Wu
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in IndiaLATHA H C
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Mediadevbhargav1
 
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...Knobbe Martens - Intellectual Property Law
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...IDERA Software
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance PreparationLawPlus Ltd.
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Part 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfPart 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfkiruthigajawahar6
 
Data Ethics Framework 2.pptx
Data Ethics Framework 2.pptxData Ethics Framework 2.pptx
Data Ethics Framework 2.pptxUgurKaplancali
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxJaeKim165097
 
chapter 5.ppt data collection and analysis
chapter 5.ppt data collection and analysischapter 5.ppt data collection and analysis
chapter 5.ppt data collection and analysisetebarkhmichale
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Aaron Banham
 
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTSA BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTSInternet Law Center
 
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docxevonnehoggarth79783
 

Similar to Information Privacy and Data Mining (20)

New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
Real world data engineering practices for GDPR
Real world data engineering practices for GDPRReal world data engineering practices for GDPR
Real world data engineering practices for GDPR
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
Data privacy Legislation in India
Data privacy Legislation in IndiaData privacy Legislation in India
Data privacy Legislation in India
 
Privacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social MediaPrivacy and Data Security | Data Collection | Social Media
Privacy and Data Security | Data Collection | Social Media
 
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
What You Should Know About Data Privacy- Knobbe Martens Webinar Series for St...
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
PDPA Compliance Preparation
PDPA Compliance PreparationPDPA Compliance Preparation
PDPA Compliance Preparation
 
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Part 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdfPart 3 - Data Protection Principles.pdf
Part 3 - Data Protection Principles.pdf
 
Data Ethics Framework 2.pptx
Data Ethics Framework 2.pptxData Ethics Framework 2.pptx
Data Ethics Framework 2.pptx
 
DATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptxDATA-PRIVACY-ACT.pptx
DATA-PRIVACY-ACT.pptx
 
chapter 5.ppt data collection and analysis
chapter 5.ppt data collection and analysischapter 5.ppt data collection and analysis
chapter 5.ppt data collection and analysis
 
Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0Associates quick guide to gdpr v 1.0
Associates quick guide to gdpr v 1.0
 
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTSA BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
 
Final projet
Final  projetFinal  projet
Final projet
 
Can we ask that
Can we ask thatCan we ask that
Can we ask that
 
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
 

More from Kamal Acharya

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computerKamal Acharya
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer SecurityKamal Acharya
 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHPKamal Acharya
 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in phpKamal Acharya
 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPKamal Acharya
 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data WarehousingKamal Acharya
 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data MiningKamal Acharya
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data miningKamal Acharya
 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingKamal Acharya
 

More from Kamal Acharya (20)

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computer
 
Computer Arithmetic
Computer ArithmeticComputer Arithmetic
Computer Arithmetic
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Session and Cookies
Session and CookiesSession and Cookies
Session and Cookies
 
Functions in php
Functions in phpFunctions in php
Functions in php
 
Web forms in php
Web forms in phpWeb forms in php
Web forms in php
 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHP
 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in php
 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHP
 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHP
 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data Warehousing
 
Search Engines
Search EnginesSearch Engines
Search Engines
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Cluster Analysis
Cluster AnalysisCluster Analysis
Cluster Analysis
 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data Mining
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data mining
 
Data Preprocessing
Data PreprocessingData Preprocessing
Data Preprocessing
 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data Warehousing
 
Functions in Python
Functions in PythonFunctions in Python
Functions in Python
 
Python Flow Control
Python Flow ControlPython Flow Control
Python Flow Control
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Information Privacy and Data Mining

  • 1. Information privacy and data mining 7/2/2019 Compiled by: Kamal Acharya 1
  • 2. 7/2/2019 Compiled by: Kamal Acharya 2 Introduction • What is information privacy? A number of definitions: – Definition1: Information privacy is the individual’s ability to control the circulation of information relating to him/her. – Definition2: it is the claim of individuals, groups or institutions to determine for themselves when how and to what extent information about them is communicated to others.
  • 3. 7/2/2019 Compiled by: Kamal Acharya 3 Basic principles to protect information privacy • The OECD principles are given below: – Collection limitation – Data quality – Purpose specification – Use limitation – Security safeguards – Openness – Individual participation – Accountability – International application
  • 4. 7/2/2019 Compiled by: Kamal Acharya 4 Contd.. • Collection limitation: – Principle: There should be limits to the collection of personal data and any such data should be obtained by lawful and fair means and, where appropriate, with the knowledge or consent of the data subject. – Description: This principle deals with two issues. Firstly it limits the collection of personal data that puts an end to indiscriminate collection of personal data. Secondly, deals with practices used in data collection. The knowledge or consent of the data subject is essential although the principle accepts that consent of the data subject may not always be possible.
  • 5. 7/2/2019 Compiled by: Kamal Acharya 5 Contd.. • Data Quality: – Principle: Personal data should be relevant to the purposes for which they are to be used, and, to the extent necessary for those purposes, should be accurate, complete and kept up-to-date. – Description: This principle in essence states that data should be related to the purpose for which it is to be used. For example, data including opinions may not always be useful to collect since it may not be relevant for the purposes for which the data is to be used.
  • 6. 7/2/2019 Compiled by: Kamal Acharya 6 Contd.. • Purpose specification: – Principle: The purposes for which personal data are collected should be specified not later than at the time of data collection and the subsequent use limited to the fulfillment of those purposes or such others as are not incompatible with those purposes and as are specified on each occasion of change of purpose. – Description: The purpose of data collection should be identified before data collection and any changes afterwards must be specified. Also, when data no longer serves a purpose, it may be necessary to destroy the data if practicable.
  • 7. 7/2/2019 Compiled by: Kamal Acharya 7 Contd.. • Use limitation: – Principle: Personal data should not be disclosed, made available or otherwise used for purposes other than those specified in accordance with principle 3 except with the consent of the data subject or by the authority of law. – Description: the earlier principles were more dealing with data collection. This principle deals with data use and data disclosure. data
  • 8. 7/2/2019 Compiled by: Kamal Acharya 8 Contd.. • Security safeguards: – Principle: Personal data should be protected by reasonable security safeguards against such risks as loss or unauthorized access, destruction, use, modification or disclosure of data. – Description: To enforce the principle of use limitations, it is required that there be appropriate safeguards. The safeguards should include physical safeguards as well as safeguards for the computer systems.
  • 9. 7/2/2019 Compiled by: Kamal Acharya 9 Contd.. • Openness: – Principle: There should be a general policy of openness about developments, practices and policies with respect to personal data. Means should be readily available of establishing the existence and nature of personal data, and the main purposes of their use, as well as the identity and usual residence of the data controller.
  • 10. 7/2/2019 Compiled by: Kamal Acharya 10 Contd.. • Individual participation: An individual should have the right: – To obtain data from a data controller, or otherwise, confirmation or not, the data controller has data relating to him; – To have communicated to him, data relating to him • Within a reasonable time; • At a charge, if any, that is not excessive; • In a reasonable manner; and • In a form that is readily intelligible to him;
  • 11. 7/2/2019 Compiled by: Kamal Acharya 11 Contd.. • To be given reasons if a request made under first two scenarios is denied, and to be able to challenge such denial; and • To challenge data relating to him and, if the challenge is successful, to have the data erased, rectified, completed or amended. This is perhaps the most important principle. It involves the rights of the individuals to acquire information about the collection, storage and use of personal data. The right of access should be simple to exercise.
  • 12. 7/2/2019 Compiled by: Kamal Acharya 12 Contd.. • Accountability: – The data controller should be accountable for complying with measures which give effect to the principles stated above. – This principle requires that the data collector comply with the privacy protection principles. Accountability should be supported by legal sanctions and perhaps a code of conduct.
  • 13. 7/2/2019 Compiled by: Kamal Acharya 13 Uses and misuses of data mining • Data mining involves the extraction of implicit, previously unknown and potentially useful knowledge form large databases. • Data mining is a very challenging task since it involves building and using software that will manage, explore, summarize, model, analyze and interpret large datasets in order to identify patterns and abnormalities.
  • 14. 7/2/2019 Compiled by: Kamal Acharya 14 Contd.. • Uses: – Data mining techniques are being used increasingly in a wide variety of applications. – The applications include: • Fraud prevention • Catching tax avoidance • Catching drug smugglers • Reducing customer churn and learning more about customers behavior.
  • 15. 7/2/2019 Compiled by: Kamal Acharya 15 Contd.. • Misuses of data mining:
  • 16. 7/2/2019 Compiled by: Kamal Acharya 16 Primary aims of data mining • Some aims of data mining are: – The primary aim of data mining applications is to better understand the customer and improve customer services. – Some applications aim to discover anomalous patterns in order to help identify, for example, fraud , abuse, waste, terrorist suspects or drug smugglers.
  • 17. 7/2/2019 Compiled by: Kamal Acharya 17 Contd.. • In many applications in private enterprises, the primary aim is to improve the profitability of an enterprise. • In many applications the primary purpose is to improve human judgment, for example, in marketing diagnoses, in resolving crime, in sorting out manufacturing problems, in predicting share prices or currency movements or commodity prices.
  • 18. 7/2/2019 Compiled by: Kamal Acharya 18 Contd.. • In some government applications, one of the aims of data mining is to identify criminal activities. • In some situations, data mining is used to find patterns that are simply not possible without help of data mining, given the huge amounts of data that must be processed. Many data mining systems designed to achieve one or more of these aims do not lead to personal privacy violations, but some do. In particular, applications that aim to discover anomalous behavior can lead to significantly violations of individual privacy.
  • 19. 7/2/2019 Compiled by: Kamal Acharya 19 Pitfalls of data mining • Dempsey and Rosenzweig identify five pitfalls of data mining when personally identifiable information is used in data mining applications like identifying terrorist suspects. • These five categories are: – Unintentional Mistake-Mistaken identity – Unintentional Mistake- Faulty Inference – Intentional abuse – Security Breach – Mission Creep
  • 20. 7/2/2019 Compiled by: Kamal Acharya 20 Contd.. • Unintentional Mistake- Mistaken Identity: – This kind problem arises when an innocent person shares some identifier information with one or more persons that have been identified as having a profile of interest in a data mining application.
  • 21. 7/2/2019 Compiled by: Kamal Acharya 21 Contd.. • Unintentional Mistake- Faulty inference: – This kind of problem arises when profiles are matched and the data mining user misinterpret the result of the match. – Faulty inferences then may be derived resulting, for example, in an innocent person becoming a suspect and leading to further investigation about the person
  • 22. 7/2/2019 Compiled by: Kamal Acharya 22 Contd.. • Intentional abuse: – People employed in running a data mining system and security organizations have access to sensitive personal information and not all of them are trustworthy. – This sensitive information may be used for unauthorized purposes for personal financial gain.
  • 23. 7/2/2019 Compiled by: Kamal Acharya 23 Contd.. • Security Breach: – Given that data mining system using personal information have sensitive information may be stolen or carelessly disclosed without strict security measures.
  • 24. 7/2/2019 Compiled by: Kamal Acharya 24 Contd.. • Mission Creep: – Once a data mining system, for example for a national security application, has been established and personal information from a variety of source collected, there is likely to be a temptation to use the information for other applications. Such mission creep has been reported in data mining applications.
  • 25. 7/2/2019 Compiled by: Kamal Acharya 25 Homework • What is information privacy? • What are the basic OECD information privacy protection principles? • List two important uses of data mining? • List two important misuses of data mining? • What are the primary aims of data mining? • List the five pitfalls of data mining? • What is privacy preserving data mining?
  • 26. Thank You ! Compiled by: Kamal Acharya 267/2/2019

Editor's Notes

  1. OECD => Organization for Economic Cooperation and Development