Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Topic: Security, Privacy and Ethics in Data Mining. In this task, you are required to read the journal articles provided below and write a short discussion paper based on the topic of security,...

1 answer below »

Topic: Security, Privacy and Ethics in Data Mining.

In this task, you are required to read the journal articles provided below and write a short discussion paper based on the topic of security, privacy and ethics in data mining. You must:

  • identify the major security, privacy and ethical implications in data mining;
  • evaluate how significant these implications are for the business sector; and
  • support your response with appropriate examples and references.

The recommended word length for this posting is 500 to 800 words.

Journal articles:

Abouelmehdi, Beni-Hssane, Khaloufi, & Saadi. (2017).Big data security and privacy in healthcare: A Review. Procedia Computer Science, 113, 73-80.https://www.sciencedirect.com/science/article/pii/S XXXXXXXXXX

McDermott, Y. (2017).Conceptualising the right to data protection in an era of Big Data. Big Data & Society, 4(1), Big Data & Society, 2017, Vol.4(1).http://journals.sagepub.com/doi/pdf/10.1177/ XXXXXXXXXX

Answered Same Day Aug 15, 2020 ITC516 Charles Sturt University

Solution

Ankit answered on Aug 18 2020
152 Votes
The term “Data mining” is the methodology use to study huge quantity of information from various sides and abstract that information into helpful data. Data mining methodologies are profitable system for finance field or bank, retail field etc. that assistance to withdraw helpful information from huge database.
Healthcare organizations store huge amount of data, maintain it and actually transmit huge the same data to support the delivery of efficient and proper care. Securing these data has been a difficult and expensive requirement for decades. [Abouelmehdi]
Matters gets complicated, the healthcare industry continues to be one of the most susceptible to publicly disclosed data
eaches. In fact, attackers can use data mining methods and procedures to find out sensitive data and release it to public and thus data
each happens.
While implementing security measures remains a complex process, the stakes are continually raised as the ways to defeat security controls become more sophisticated. [Abouelmehdi, Beni-Hssane]
This methodology allows huge quantity of information which is wrong used for finding so far undisclosed, perhaps helpful learning. The efficiency and level of improvements in business can increased the capacity and power of data mining. Moreover the privacy and security of highly sensitive data isn't regarded for the most part in the process, which makes security, privacy and ethical implications in some...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here