Discipleship

Only available on StudyMode
  • Download(s) : 26
  • Published : January 23, 2013
Open Document
Text Preview
-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------
IS4233 Project:
-------------------------------------------------
Privacy and Data Mining
-------------------------------------------------

-------------------------------------------------
by
-------------------------------------------------
Lim Jie Feng Kenneth (U087144X)
-------------------------------------------------
Simone Phoon Zhi Yun (U096849W)
-------------------------------------------------
Thiang Chong Siong (A0073773U)
-------------------------------------------------
Zhou Yuan Yi (U095215A)
-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------
Department of Information Systems
-------------------------------------------------
School of Computing
-------------------------------------------------
National University of Singapore
-------------------------------------------------
AY2012/2013

Table of Contents
1.Background3
1.1Definition of Data Mining3
1.2Data Warehouse3
1.3Data Mining Process4
1.4Data-Mining Techniques4
1.5Applications of Data Mining5
1.6Issues of Data Mining8
2.Importance of Research8
2.1Privacy9
2.2Data Mining and Privacy9
3.Literature Review10
3.1Privacy and Data Mining in the US10
3.1.1US Privacy Invasion Laws10
3.1.2The Fourth Amendment11
3.1.3Health Insurance Portability and Accountability Act13
3.1.4Children’s Online Privacy Protection Act (COPPA)15
3.2Privacy and Data Mining in EU16
3.2.1EU Personal Data Protection16
3.3Privacy and Data Mining in Singapore19
4.Solutions21
4.1Problems Analysis21
4.1.1Root-cause Analysis21
4.1.2Considerations22
4.2Legal Laws and Enforcements – Informational Privacy Act23
4.2.1Solution Implementation23
4.2.2Problems Addressed24
4.2.3Benefits24
4.2.4Limitations25
4.3Privacy-Preserving Data Mining Technical Solutions25
4.3.1Solution Implementation25
4.3.2Problems Addressed27
4.3.3Benefits27
4.3.4Limitations27
4.4Licensing Solution28
4.4.1Solution Implementation28
4.4.2Problem Addressed28
4.4.3Benefits28
4.4.4Limitations29
4.5Increasing Awareness Solution30
4.5.1Solution Implementation30
4.5.2Problems Addressed31
4.5.3Benefits31
4.5.4Limitations31
5.Conclusion32
Bibliography33

1. Background
In today’s digitalized society, things can be turned into data of some form. We used to have to painstakingly write out reports by hand, making sure that every word is neat and legible so as to avoid losing marks for ugly handwriting. Now, we just type out the reports and have it printed or virtually sent to the professors for marking. We used to have to go out of our houses and do grocery shopping. Nowadays, it is possible to sit in front of a computer, go online, order groceries, and have them delivered right to our front door. There is probably even that option of saving what you buy frequently, or store information such as your regular weekly grocery list on the website. This is all data. Whether it is just a document meant for schoolwork, or just a grocery shopping list, all of it is data for some purpose or another. It can exist as raw data or in some format or other, and the content can range from important personal information, to something as...
tracking img