4,981 Hits in 4.1 sec

A Robust Privacy Preserving of Multiple and Binary Attribute by Using Super Modularity with Perturbation

Priya Ranjan, Raj Kumar Paul
2018 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Here use of super modularity is also done which balance the risk and utilization of the data.  ...  This work provides privacy for sensitive rules that discriminate data on the basis of community, gender, country, etc. Rules are obtained by aprior algorithm of association rule mining.  ...  Noise Addition in Statistical Database : This technique was originally used for statistical databases that can maintain data quality in along with the privacy of individuals.  ... 
doi:10.32628/cseit183838 fatcat:jkg6uoaddrexlpkrbl6b2qb7h4

All in one stroke? Intervention Spaces for Dark Patterns [article]

Arianna Rossi, Kerstin Bongard-Blanchy
2021 arXiv   pre-print
This position paper draws from the complexity of dark patterns to develop arguments for differentiated interventions.  ...  The discussions at the 2021 CHI workshop "What can CHI do about dark patterns?" should help hone the matrix structure and fill its fields with specific intervention proposals.  ...  Hence, services employing dark patterns risk stiff penalties: in France, Google received fines for a total of 150 million € due to invalid consent design and elicitation [3, 4] .  ... 
arXiv:2103.08483v2 fatcat:zos76th7kzfqvnfkt6vdbrzafu

A Survey Paper on Frequent Itemset Mining Methods and Techniques

2015 International Journal of Science and Research (IJSR)  
Individual privacy may get affected by exposing frequent itemsets.Therefore, differential privacy is now at central alarm.  ...  This paper examines literature analysis on several methods for mining frequent itemsets. Further, it also describes in what manner differential privacy is handled in present systems.  ...  In [20] Shen and Yustudied the differentially private algorithm for frequent graph mining patterns, which was the first privacy algorithm on graph patterns.  ... 
doi:10.21275/v4i12.nov151884 fatcat:tlup23qc3fdydnycb4mfyco6me

Current State of Information Security Research In IS

Humayun Zafar, Jan Guynes Clark
2009 Communications of the Association for Information Systems  
Terri Davis, and the anonymous reviewers for their valuable input during the review process.  ...  Shim et al. [2006] investigated the increasing use of RFID in cell phones and how the ability of tracking raises questions about an individual concerns for privacy.  ...  Management, Governance Structure Privacy Individual, Group, Business, Organization Client/Server, organization theory, strategic management, calculus, risk management, design theory, Theory  ... 
doi:10.17705/1cais.02434 fatcat:vjdubkwwcbgtvo4mri67ytfwwu

A Novel Approach of Association Rule Hiding Using DBCT (Distortion, Blocking and Cryptographic Technique)

Naidu P. R. S., B. Prasanth Kumar
2019 Helix  
Several methods were planned within the literature for hiding sensitive data items.  ...  For securing sensitive association rules, privacy preserving data mining includes the concept named "association rule hiding".  ...  Eg: Light Cream + Chicken = Frequent Itemset Frequent pattern mining looks for recursive relationships of a given dataset.  ... 
doi:10.29042/2019-4781-4790 fatcat:sysopr4q6zgvzc72grxc4fbbbi

INFOSEC in a Basket, 2004-2013

Mark-David McLaughlin, Janis L. Gogan
2014 Americas Conference on Information Systems  
We conducted a systematic review of ten years of 85 InfoSec studies published in the IS Senior Scholars Basket of eight journals.  ...  We conclude that InfoSec research is maturing, yet abundant opportunities still exist to conduct further research aimed at building stronger theories and offering stronger implications for InfoSec practice  ...  Hence an understanding of human interactions, patterns of behavior and meanings associated with the actions of individuals becomes important."  ... 
dblp:conf/amcis/McLaughlinG14 fatcat:vs5ayig22vgvdi3cdzaapbkequ

Subject Membership Inference Attacks in Federated Learning [article]

Anshuman Suri, Pallika Kanani, Virendra J. Marathe, Daniel W. Peterson
2022 arXiv   pre-print
risk.  ...  Recently, subject-level privacy has emerged as an alternative privacy granularity to protect the privacy of individuals (data subjects) whose data is spread across multiple (organizational) users in cross-silo  ...  Item-level privacy tries to protect information about individual market baskets, so that no single checkout can be identified definitively.  ... 
arXiv:2206.03317v1 fatcat:fa7uezezrnaf5fguib2eyhfbae

Data, Text and Web Mining for Business Intelligence : A Survey

Abdul-Aziz Rashid Al-Azmi
2013 International Journal of Data Mining & Knowledge Management Process  
Enterprises use mining technologies to search vast amounts of data for vital insight and knowledge.  ...  ACKNOWLEDGEMENTS The author would like to thank Professor Hameed Al-Qaheri, College of Business Administration, Kuwait University for his support and help during this research.  ...  Public awareness against the exploitation of individuals' privacy and private data forced the congress to stop funding for this program in 2003.  ... 
doi:10.5121/ijdkp.2013.3201 fatcat:urjcxelt7vbvzfmt2ynmenlc5u

Impacts of Data Mining on Relational Database Management System Centric Business Environments

Md. SajjatulIslam, Md. Zainal Abedin
2013 International Journal of Computer Applications  
As the data mining is still a young field but exploratory in nature so this research has also given the clear identification on the unresolved challenges on this track and recommendation for future works  ...  For this some methods have been devised to remove sensitive IDs from data to protect the privacy of most individuals.  ...  So data mining systems are rigorously refining the focus of discovering general patterns but not disclosing or infringing the privacy of individual information.  ... 
doi:10.5120/13091-0371 fatcat:mpf523oibncolc3mu7guseooam

Privacy Preserving Data Mining using Secure Multiparty Computation Based on Apriori and Fp-Tree Structure of Fp-Growth Algorithm

The conditional and sub conditional patterns are not generated continuously in APFT.  ...  The privacy is maintained by generating the rules based on FP-Tree algorithm under Association Rule Mining (ARM). Privacy and correctness are the important requirements of SMC.  ...  This is the major aim of data privacy. The information can be linked to any individual person. If the individual persons data are under mining then that has to be secured.  ... 
doi:10.35940/ijitee.b6866.019320 fatcat:2hfsazqgcvfgda4rjnlbbg4tbu

Investigative Data Warehousing and Mining for Database Security

Areej Yassin, Donald J. Berndt, Monica Chiarini Tremblay
2006 Americas Conference on Information Systems  
Market basket analysis is explored as a potential data mining technique for uncovering rare usage patterns.  ...  A pivot table interface is shown as an example of a human-in-the-loop navigation tool for investigating unusual activity at a very detailed level.  ...  Finally, market basket analysis is explored as a potential data mining technique for uncovering unusual usage patterns.  ... 
dblp:conf/amcis/YassinBT06 fatcat:beeqaz4q75gengbpxcxpjw66wi

A Brief Survey on Privacy Preserving Techniques in Data Mining

Vinoth kumar J, Santhi V
2016 IOSR Journal of Computer Engineering  
Thus, privacy preserving data mining has become a vital field of research.  ...  In this paper, various privacy preserving techniques such as Data anonymization, Data Randomization, use of cryptography are presented. General Terms: Data Mining, Privacy and Security.  ...  Thus, the knowledge present in the data is extracted for use through securing the individual"s privacy and protecting data holder against the leakage of the data.  ... 
doi:10.9790/0661-1804054751 fatcat:z2fi6ujibfg5nc453j3z7wkxne

User-Centric Privacy for Identity Federations Based on a Recommendation System

Carlos Villarán, Marta Beltrán
2022 Electronics  
Specifications such as SAML, OAuth, OpenID Connect and Mobile Connect are essential for solving identification, authentication and authorisation in contexts such as mobile apps, social networks, e-commerce  ...  This work proposes a user-centric approach based on a recommendation system to support users in making privacy decisions such as selecting service providers or choosing their privacy settings.  ...  The proposed component should be able to identify at least the following dark pattern categories identified in [44] : Tricky Questions, Sneak into Basket, Roach Motel, Privacy Zuckering, Misdirection,  ... 
doi:10.3390/electronics11081238 fatcat:nt6xu3ov5ba7vg5lmrzarhzfny

Research on Privacy Preserving Data Mining

Pingshui Wang, Tao Chen, Zecheng Wang
2019 Journal of Information Hiding and Privacy Protection  
A number of methods and techniques have been developed for privacy preserving data mining.  ...  This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation.  ...  Acknowledgment: We thank the anonymous reviewers and editors for their very constructive comments.  ... 
doi:10.32604/jihpp.2019.05943 fatcat:szddbehrrvdzjm6osusmtbcr3q

Quantifying Location Privacy Leakage from Transaction Prices [chapter]

Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Vincent Lenders, Srdjan Capkun
2016 Lecture Notes in Computer Science  
At the same time, valuable datasets pose potential privacy risks that are difficult to foresee.  ...  The results show the existence of location privacy risks when releasing consumer purchase histories.  ...  Introduction Making data publicly available creates unexpected privacy risks.  ... 
doi:10.1007/978-3-319-45741-3_20 fatcat:j22xancok5cmln7ynprsq6gdmi
« Previous Showing results 1 — 15 out of 4,981 results