A Study On Data Transformation For Privacy Protection

碩士 === 國防管理學院 === 國防資訊研究所 === 96 === The popularization of internet and information cause the facility and quickly development for collecting data in all kinds of careers. However, those original unprotected data will be leaked by manager’s omission, ego trip, or hackers’ attack and so on. While tho...

Full description

Bibliographic Details
Main Authors: Jen-Chung Wang, 王仁中
Other Authors: Hsiang-Jung Tsai
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/51458509797159370210
Description
Summary:碩士 === 國防管理學院 === 國防資訊研究所 === 96 === The popularization of internet and information cause the facility and quickly development for collecting data in all kinds of careers. However, those original unprotected data will be leaked by manager’s omission, ego trip, or hackers’ attack and so on. While those important data are not transformed appropriated, makes inner secret and privacy unsafely. The research is going to study how to keep efficacy of data mining beneath privacy. Through the invariance property between sorts of data with data transformation, it constructs the procedural choice model of privacy protection. Key words: Data mining, Data transformation, Invariance property, Privacy protection, Procedural choice model