Data Mining Applications Based on the Privacy

碩士 === 佛光人文社會學院 === 資訊學研究所 === 90 === Recently, most of data mining applications are going to extract useful information from comprehensive data stores to support business decision- makings. The processes of data collection, data analysis and data explanation of data mining have inspired various kin...

Full description

Bibliographic Details
Main Authors: Chi-Chuan Wu, 吳寂絹
Other Authors: 謝建成
Format: Others
Language:zh-TW
Published: 2002
Online Access:http://ndltd.ncl.edu.tw/handle/67863855908329876622
Description
Summary:碩士 === 佛光人文社會學院 === 資訊學研究所 === 90 === Recently, most of data mining applications are going to extract useful information from comprehensive data stores to support business decision- makings. The processes of data collection, data analysis and data explanation of data mining have inspired various kinds of serious ethical issues. The privacy violation is the most important one that people concern. In 1999, Tavani proposed a scenario of bank load to address that the application of data mining should cause privacy violation according to the principles of OECD’s “Guidelines on the Protection of Privacy and Transborder Flows of Personal Data”. In this paper, based on “Doctrine of Reasonable Expectation” and Moor’s “Restricted Access Theory of Privacy”, we take the scenario to inspect the informational privacy issue. By reengineering the procedure of bank management, we propose a practical solution to prevent privacy violation. Then by empirical study of an online questionnaire, we verify a research hypothesis. The results show that the protagonist of the scenario has a reasonable expectation on his personal information. Data mining won’t necessarily violate privacy. For the scenario, the more privacy you concern, the more violation you cognize. So we conclude that to keep balance between information technology and privacy protection actually relies on privacy concerns and careful usage of information technology.