A Study On Data Transformation For Privacy Protection
碩士 === 國防管理學院 === 國防資訊研究所 === 96 === The popularization of internet and information cause the facility and quickly development for collecting data in all kinds of careers. However, those original unprotected data will be leaked by manager’s omission, ego trip, or hackers’ attack and so on. While tho...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/51458509797159370210 |
id |
ndltd-TW-096NDMC1654005 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096NDMC16540052015-10-13T14:00:24Z http://ndltd.ncl.edu.tw/handle/51458509797159370210 A Study On Data Transformation For Privacy Protection 資料轉換在個人隱私防護之研究 Jen-Chung Wang 王仁中 碩士 國防管理學院 國防資訊研究所 96 The popularization of internet and information cause the facility and quickly development for collecting data in all kinds of careers. However, those original unprotected data will be leaked by manager’s omission, ego trip, or hackers’ attack and so on. While those important data are not transformed appropriated, makes inner secret and privacy unsafely. The research is going to study how to keep efficacy of data mining beneath privacy. Through the invariance property between sorts of data with data transformation, it constructs the procedural choice model of privacy protection. Key words: Data mining, Data transformation, Invariance property, Privacy protection, Procedural choice model Hsiang-Jung Tsai Yen-Lin Yin 蔡向榮 尹延齡 2007 學位論文 ; thesis 101 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防管理學院 === 國防資訊研究所 === 96 === The popularization of internet and information cause the facility and quickly development for collecting data in all kinds of careers. However, those original unprotected data will be leaked by manager’s omission, ego trip, or hackers’ attack and so on. While those important data are not transformed appropriated, makes inner secret and privacy unsafely.
The research is going to study how to keep efficacy of data mining beneath privacy. Through the invariance property between sorts of data with data transformation, it constructs the procedural choice model of privacy protection.
Key words: Data mining, Data transformation, Invariance property,
Privacy protection, Procedural choice model
|
author2 |
Hsiang-Jung Tsai |
author_facet |
Hsiang-Jung Tsai Jen-Chung Wang 王仁中 |
author |
Jen-Chung Wang 王仁中 |
spellingShingle |
Jen-Chung Wang 王仁中 A Study On Data Transformation For Privacy Protection |
author_sort |
Jen-Chung Wang |
title |
A Study On Data Transformation For Privacy Protection |
title_short |
A Study On Data Transformation For Privacy Protection |
title_full |
A Study On Data Transformation For Privacy Protection |
title_fullStr |
A Study On Data Transformation For Privacy Protection |
title_full_unstemmed |
A Study On Data Transformation For Privacy Protection |
title_sort |
study on data transformation for privacy protection |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/51458509797159370210 |
work_keys_str_mv |
AT jenchungwang astudyondatatransformationforprivacyprotection AT wángrénzhōng astudyondatatransformationforprivacyprotection AT jenchungwang zīliàozhuǎnhuànzàigèrényǐnsīfánghùzhīyánjiū AT wángrénzhōng zīliàozhuǎnhuànzàigèrényǐnsīfánghùzhīyánjiū AT jenchungwang studyondatatransformationforprivacyprotection AT wángrénzhōng studyondatatransformationforprivacyprotection |
_version_ |
1717747758187675648 |