A Study On Data Transformation For Privacy Protection

碩士 === 國防管理學院 === 國防資訊研究所 === 96 === The popularization of internet and information cause the facility and quickly development for collecting data in all kinds of careers. However, those original unprotected data will be leaked by manager’s omission, ego trip, or hackers’ attack and so on. While tho...

Full description

Bibliographic Details
Main Authors: Jen-Chung Wang, 王仁中
Other Authors: Hsiang-Jung Tsai
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/51458509797159370210
id ndltd-TW-096NDMC1654005
record_format oai_dc
spelling ndltd-TW-096NDMC16540052015-10-13T14:00:24Z http://ndltd.ncl.edu.tw/handle/51458509797159370210 A Study On Data Transformation For Privacy Protection 資料轉換在個人隱私防護之研究 Jen-Chung Wang 王仁中 碩士 國防管理學院 國防資訊研究所 96 The popularization of internet and information cause the facility and quickly development for collecting data in all kinds of careers. However, those original unprotected data will be leaked by manager’s omission, ego trip, or hackers’ attack and so on. While those important data are not transformed appropriated, makes inner secret and privacy unsafely. The research is going to study how to keep efficacy of data mining beneath privacy. Through the invariance property between sorts of data with data transformation, it constructs the procedural choice model of privacy protection. Key words: Data mining, Data transformation, Invariance property, Privacy protection, Procedural choice model Hsiang-Jung Tsai Yen-Lin Yin 蔡向榮 尹延齡 2007 學位論文 ; thesis 101 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防管理學院 === 國防資訊研究所 === 96 === The popularization of internet and information cause the facility and quickly development for collecting data in all kinds of careers. However, those original unprotected data will be leaked by manager’s omission, ego trip, or hackers’ attack and so on. While those important data are not transformed appropriated, makes inner secret and privacy unsafely. The research is going to study how to keep efficacy of data mining beneath privacy. Through the invariance property between sorts of data with data transformation, it constructs the procedural choice model of privacy protection. Key words: Data mining, Data transformation, Invariance property, Privacy protection, Procedural choice model
author2 Hsiang-Jung Tsai
author_facet Hsiang-Jung Tsai
Jen-Chung Wang
王仁中
author Jen-Chung Wang
王仁中
spellingShingle Jen-Chung Wang
王仁中
A Study On Data Transformation For Privacy Protection
author_sort Jen-Chung Wang
title A Study On Data Transformation For Privacy Protection
title_short A Study On Data Transformation For Privacy Protection
title_full A Study On Data Transformation For Privacy Protection
title_fullStr A Study On Data Transformation For Privacy Protection
title_full_unstemmed A Study On Data Transformation For Privacy Protection
title_sort study on data transformation for privacy protection
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/51458509797159370210
work_keys_str_mv AT jenchungwang astudyondatatransformationforprivacyprotection
AT wángrénzhōng astudyondatatransformationforprivacyprotection
AT jenchungwang zīliàozhuǎnhuànzàigèrényǐnsīfánghùzhīyánjiū
AT wángrénzhōng zīliàozhuǎnhuànzàigèrényǐnsīfánghùzhīyánjiū
AT jenchungwang studyondatatransformationforprivacyprotection
AT wángrénzhōng studyondatatransformationforprivacyprotection
_version_ 1717747758187675648