A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Robust Privacy Preserving of Multiple and Binary Attribute by Using Super Modularity with Perturbation
2018
International Journal of Scientific Research in Computer Science Engineering and Information Technology
Here use of super modularity is also done which balance the risk and utilization of the data. ...
This work provides privacy for sensitive rules that discriminate data on the basis of community, gender, country, etc. Rules are obtained by aprior algorithm of association rule mining. ...
Noise Addition in Statistical Database : This technique was originally used for statistical databases that can maintain data quality in along with the privacy of individuals. ...
doi:10.32628/cseit183838
fatcat:jkg6uoaddrexlpkrbl6b2qb7h4
All in one stroke? Intervention Spaces for Dark Patterns
[article]
2021
arXiv
pre-print
This position paper draws from the complexity of dark patterns to develop arguments for differentiated interventions. ...
The discussions at the 2021 CHI workshop "What can CHI do about dark patterns?" should help hone the matrix structure and fill its fields with specific intervention proposals. ...
Hence, services employing dark patterns risk stiff penalties: in France, Google received fines for a total of 150 million € due to invalid consent design and elicitation [3, 4] . ...
arXiv:2103.08483v2
fatcat:zos76th7kzfqvnfkt6vdbrzafu
A Survey Paper on Frequent Itemset Mining Methods and Techniques
2015
International Journal of Science and Research (IJSR)
Individual privacy may get affected by exposing frequent itemsets.Therefore, differential privacy is now at central alarm. ...
This paper examines literature analysis on several methods for mining frequent itemsets. Further, it also describes in what manner differential privacy is handled in present systems. ...
In [20] Shen and Yustudied the differentially private algorithm for frequent graph mining patterns, which was the first privacy algorithm on graph patterns. ...
doi:10.21275/v4i12.nov151884
fatcat:tlup23qc3fdydnycb4mfyco6me
Current State of Information Security Research In IS
2009
Communications of the Association for Information Systems
Terri Davis, and the anonymous reviewers for their valuable input during the review process. ...
Shim et al. [2006] investigated the increasing use of RFID in cell phones and how the ability of tracking raises questions about an individual concerns for privacy. ...
Management, Governance
Structure
Privacy
Individual,
Group,
Business,
Organization
Client/Server, organization
theory, strategic management,
calculus, risk management,
design theory, Theory ...
doi:10.17705/1cais.02434
fatcat:vjdubkwwcbgtvo4mri67ytfwwu
A Novel Approach of Association Rule Hiding Using DBCT (Distortion, Blocking and Cryptographic Technique)
2019
Helix
Several methods were planned within the literature for hiding sensitive data items. ...
For securing sensitive association rules, privacy preserving data mining includes the concept named "association rule hiding". ...
Eg: Light Cream + Chicken = Frequent Itemset Frequent pattern mining looks for recursive relationships of a given dataset. ...
doi:10.29042/2019-4781-4790
fatcat:sysopr4q6zgvzc72grxc4fbbbi
INFOSEC in a Basket, 2004-2013
2014
Americas Conference on Information Systems
We conducted a systematic review of ten years of 85 InfoSec studies published in the IS Senior Scholars Basket of eight journals. ...
We conclude that InfoSec research is maturing, yet abundant opportunities still exist to conduct further research aimed at building stronger theories and offering stronger implications for InfoSec practice ...
Hence an understanding of human interactions, patterns of behavior and meanings associated with the actions of individuals becomes important." ...
dblp:conf/amcis/McLaughlinG14
fatcat:vs5ayig22vgvdi3cdzaapbkequ
Subject Membership Inference Attacks in Federated Learning
[article]
2022
arXiv
pre-print
risk. ...
Recently, subject-level privacy has emerged as an alternative privacy granularity to protect the privacy of individuals (data subjects) whose data is spread across multiple (organizational) users in cross-silo ...
Item-level privacy tries to protect information about individual market baskets, so that no single checkout can be identified definitively. ...
arXiv:2206.03317v1
fatcat:fa7uezezrnaf5fguib2eyhfbae
Data, Text and Web Mining for Business Intelligence : A Survey
2013
International Journal of Data Mining & Knowledge Management Process
Enterprises use mining technologies to search vast amounts of data for vital insight and knowledge. ...
ACKNOWLEDGEMENTS The author would like to thank Professor Hameed Al-Qaheri, College of Business Administration, Kuwait University for his support and help during this research. ...
Public awareness against the exploitation of individuals' privacy and private data forced the congress to stop funding for this program in 2003. ...
doi:10.5121/ijdkp.2013.3201
fatcat:urjcxelt7vbvzfmt2ynmenlc5u
Impacts of Data Mining on Relational Database Management System Centric Business Environments
2013
International Journal of Computer Applications
As the data mining is still a young field but exploratory in nature so this research has also given the clear identification on the unresolved challenges on this track and recommendation for future works ...
For this some methods have been devised to remove sensitive IDs from data to protect the privacy of most individuals. ...
So data mining systems are rigorously refining the focus of discovering general patterns but not disclosing or infringing the privacy of individual information. ...
doi:10.5120/13091-0371
fatcat:mpf523oibncolc3mu7guseooam
Privacy Preserving Data Mining using Secure Multiparty Computation Based on Apriori and Fp-Tree Structure of Fp-Growth Algorithm
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The conditional and sub conditional patterns are not generated continuously in APFT. ...
The privacy is maintained by generating the rules based on FP-Tree algorithm under Association Rule Mining (ARM). Privacy and correctness are the important requirements of SMC. ...
This is the major aim of data privacy. The information can be linked to any individual person. If the individual persons data are under mining then that has to be secured. ...
doi:10.35940/ijitee.b6866.019320
fatcat:2hfsazqgcvfgda4rjnlbbg4tbu
Investigative Data Warehousing and Mining for Database Security
2006
Americas Conference on Information Systems
Market basket analysis is explored as a potential data mining technique for uncovering rare usage patterns. ...
A pivot table interface is shown as an example of a human-in-the-loop navigation tool for investigating unusual activity at a very detailed level. ...
Finally, market basket analysis is explored as a potential data mining technique for uncovering unusual usage patterns. ...
dblp:conf/amcis/YassinBT06
fatcat:beeqaz4q75gengbpxcxpjw66wi
A Brief Survey on Privacy Preserving Techniques in Data Mining
2016
IOSR Journal of Computer Engineering
Thus, privacy preserving data mining has become a vital field of research. ...
In this paper, various privacy preserving techniques such as Data anonymization, Data Randomization, use of cryptography are presented. General Terms: Data Mining, Privacy and Security. ...
Thus, the knowledge present in the data is extracted for use through securing the individual"s privacy and protecting data holder against the leakage of the data. ...
doi:10.9790/0661-1804054751
fatcat:z2fi6ujibfg5nc453j3z7wkxne
User-Centric Privacy for Identity Federations Based on a Recommendation System
2022
Electronics
Specifications such as SAML, OAuth, OpenID Connect and Mobile Connect are essential for solving identification, authentication and authorisation in contexts such as mobile apps, social networks, e-commerce ...
This work proposes a user-centric approach based on a recommendation system to support users in making privacy decisions such as selecting service providers or choosing their privacy settings. ...
The proposed component should be able to identify at least the following dark pattern categories identified in [44] : Tricky Questions, Sneak into Basket, Roach Motel, Privacy Zuckering, Misdirection, ...
doi:10.3390/electronics11081238
fatcat:nt6xu3ov5ba7vg5lmrzarhzfny
Research on Privacy Preserving Data Mining
2019
Journal of Information Hiding and Privacy Protection
A number of methods and techniques have been developed for privacy preserving data mining. ...
This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation. ...
Acknowledgment: We thank the anonymous reviewers and editors for their very constructive comments. ...
doi:10.32604/jihpp.2019.05943
fatcat:szddbehrrvdzjm6osusmtbcr3q
Quantifying Location Privacy Leakage from Transaction Prices
[chapter]
2016
Lecture Notes in Computer Science
At the same time, valuable datasets pose potential privacy risks that are difficult to foresee. ...
The results show the existence of location privacy risks when releasing consumer purchase histories. ...
Introduction Making data publicly available creates unexpected privacy risks. ...
doi:10.1007/978-3-319-45741-3_20
fatcat:j22xancok5cmln7ynprsq6gdmi
« Previous
Showing results 1 — 15 out of 4,981 results