Data Mining Applications Based on the Privacy
碩士 === 佛光人文社會學院 === 資訊學研究所 === 90 === Recently, most of data mining applications are going to extract useful information from comprehensive data stores to support business decision- makings. The processes of data collection, data analysis and data explanation of data mining have inspired various kin...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/67863855908329876622 |
id |
ndltd-TW-090FGU00585003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-090FGU005850032015-10-13T17:39:43Z http://ndltd.ncl.edu.tw/handle/67863855908329876622 Data Mining Applications Based on the Privacy 從隱私權看資料探勘技術之應用 Chi-Chuan Wu 吳寂絹 碩士 佛光人文社會學院 資訊學研究所 90 Recently, most of data mining applications are going to extract useful information from comprehensive data stores to support business decision- makings. The processes of data collection, data analysis and data explanation of data mining have inspired various kinds of serious ethical issues. The privacy violation is the most important one that people concern. In 1999, Tavani proposed a scenario of bank load to address that the application of data mining should cause privacy violation according to the principles of OECD’s “Guidelines on the Protection of Privacy and Transborder Flows of Personal Data”. In this paper, based on “Doctrine of Reasonable Expectation” and Moor’s “Restricted Access Theory of Privacy”, we take the scenario to inspect the informational privacy issue. By reengineering the procedure of bank management, we propose a practical solution to prevent privacy violation. Then by empirical study of an online questionnaire, we verify a research hypothesis. The results show that the protagonist of the scenario has a reasonable expectation on his personal information. Data mining won’t necessarily violate privacy. For the scenario, the more privacy you concern, the more violation you cognize. So we conclude that to keep balance between information technology and privacy protection actually relies on privacy concerns and careful usage of information technology. 謝建成 戚國雄 2002 學位論文 ; thesis 64 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 佛光人文社會學院 === 資訊學研究所 === 90 === Recently, most of data mining applications are going to extract useful information from comprehensive data stores to support business decision- makings. The processes of data collection, data analysis and data explanation of data mining have inspired various kinds of serious ethical issues. The privacy violation is the most important one that people concern. In 1999, Tavani proposed a scenario of bank load to address that the application of data mining should cause privacy violation according to the principles of OECD’s “Guidelines on the Protection of Privacy and Transborder Flows of Personal Data”. In this paper, based on “Doctrine of Reasonable Expectation” and Moor’s “Restricted Access Theory of Privacy”, we take the scenario to inspect the informational privacy issue. By reengineering the procedure of bank management, we propose a practical solution to prevent privacy violation. Then by empirical study of an online questionnaire, we verify a research hypothesis. The results show that the protagonist of the scenario has a reasonable expectation on his personal information. Data mining won’t necessarily violate privacy. For the scenario, the more privacy you concern, the more violation you cognize. So we conclude that to keep balance between information technology and privacy protection actually relies on privacy concerns and careful usage of information technology.
|
author2 |
謝建成 |
author_facet |
謝建成 Chi-Chuan Wu 吳寂絹 |
author |
Chi-Chuan Wu 吳寂絹 |
spellingShingle |
Chi-Chuan Wu 吳寂絹 Data Mining Applications Based on the Privacy |
author_sort |
Chi-Chuan Wu |
title |
Data Mining Applications Based on the Privacy |
title_short |
Data Mining Applications Based on the Privacy |
title_full |
Data Mining Applications Based on the Privacy |
title_fullStr |
Data Mining Applications Based on the Privacy |
title_full_unstemmed |
Data Mining Applications Based on the Privacy |
title_sort |
data mining applications based on the privacy |
publishDate |
2002 |
url |
http://ndltd.ncl.edu.tw/handle/67863855908329876622 |
work_keys_str_mv |
AT chichuanwu dataminingapplicationsbasedontheprivacy AT wújìjuàn dataminingapplicationsbasedontheprivacy AT chichuanwu cóngyǐnsīquánkànzīliàotànkānjìshùzhīyīngyòng AT wújìjuàn cóngyǐnsīquánkànzīliàotànkānjìshùzhīyīngyòng |
_version_ |
1717783303321288704 |