Data Mining Applications Based on the Privacy

碩士 === 佛光人文社會學院 === 資訊學研究所 === 90 === Recently, most of data mining applications are going to extract useful information from comprehensive data stores to support business decision- makings. The processes of data collection, data analysis and data explanation of data mining have inspired various kin...

Full description

Bibliographic Details
Main Authors: Chi-Chuan Wu, 吳寂絹
Other Authors: 謝建成
Format: Others
Language:zh-TW
Published: 2002
Online Access:http://ndltd.ncl.edu.tw/handle/67863855908329876622
id ndltd-TW-090FGU00585003
record_format oai_dc
spelling ndltd-TW-090FGU005850032015-10-13T17:39:43Z http://ndltd.ncl.edu.tw/handle/67863855908329876622 Data Mining Applications Based on the Privacy 從隱私權看資料探勘技術之應用 Chi-Chuan Wu 吳寂絹 碩士 佛光人文社會學院 資訊學研究所 90 Recently, most of data mining applications are going to extract useful information from comprehensive data stores to support business decision- makings. The processes of data collection, data analysis and data explanation of data mining have inspired various kinds of serious ethical issues. The privacy violation is the most important one that people concern. In 1999, Tavani proposed a scenario of bank load to address that the application of data mining should cause privacy violation according to the principles of OECD’s “Guidelines on the Protection of Privacy and Transborder Flows of Personal Data”. In this paper, based on “Doctrine of Reasonable Expectation” and Moor’s “Restricted Access Theory of Privacy”, we take the scenario to inspect the informational privacy issue. By reengineering the procedure of bank management, we propose a practical solution to prevent privacy violation. Then by empirical study of an online questionnaire, we verify a research hypothesis. The results show that the protagonist of the scenario has a reasonable expectation on his personal information. Data mining won’t necessarily violate privacy. For the scenario, the more privacy you concern, the more violation you cognize. So we conclude that to keep balance between information technology and privacy protection actually relies on privacy concerns and careful usage of information technology. 謝建成 戚國雄 2002 學位論文 ; thesis 64 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 佛光人文社會學院 === 資訊學研究所 === 90 === Recently, most of data mining applications are going to extract useful information from comprehensive data stores to support business decision- makings. The processes of data collection, data analysis and data explanation of data mining have inspired various kinds of serious ethical issues. The privacy violation is the most important one that people concern. In 1999, Tavani proposed a scenario of bank load to address that the application of data mining should cause privacy violation according to the principles of OECD’s “Guidelines on the Protection of Privacy and Transborder Flows of Personal Data”. In this paper, based on “Doctrine of Reasonable Expectation” and Moor’s “Restricted Access Theory of Privacy”, we take the scenario to inspect the informational privacy issue. By reengineering the procedure of bank management, we propose a practical solution to prevent privacy violation. Then by empirical study of an online questionnaire, we verify a research hypothesis. The results show that the protagonist of the scenario has a reasonable expectation on his personal information. Data mining won’t necessarily violate privacy. For the scenario, the more privacy you concern, the more violation you cognize. So we conclude that to keep balance between information technology and privacy protection actually relies on privacy concerns and careful usage of information technology.
author2 謝建成
author_facet 謝建成
Chi-Chuan Wu
吳寂絹
author Chi-Chuan Wu
吳寂絹
spellingShingle Chi-Chuan Wu
吳寂絹
Data Mining Applications Based on the Privacy
author_sort Chi-Chuan Wu
title Data Mining Applications Based on the Privacy
title_short Data Mining Applications Based on the Privacy
title_full Data Mining Applications Based on the Privacy
title_fullStr Data Mining Applications Based on the Privacy
title_full_unstemmed Data Mining Applications Based on the Privacy
title_sort data mining applications based on the privacy
publishDate 2002
url http://ndltd.ncl.edu.tw/handle/67863855908329876622
work_keys_str_mv AT chichuanwu dataminingapplicationsbasedontheprivacy
AT wújìjuàn dataminingapplicationsbasedontheprivacy
AT chichuanwu cóngyǐnsīquánkànzīliàotànkānjìshùzhīyīngyòng
AT wújìjuàn cóngyǐnsīquánkànzīliàotànkānjìshùzhīyīngyòng
_version_ 1717783303321288704