Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/62181
Full metadata record
DC FieldValueLanguage
dc.contributor.authorEstivill-Castro, Vladimiren
dc.contributor.authorBrankovic, Ljiljanaen
dc.contributor.authorDowe, David Len
dc.date.accessioned2024-08-15T22:59:13Z-
dc.date.available2024-08-15T22:59:13Z-
dc.date.issued1999-
dc.identifier.citationPrivacy Law & Policy Reporter, 6(3), p. 1-5en
dc.identifier.issn1449-826Xen
dc.identifier.issn1321-3563en
dc.identifier.urihttps://hdl.handle.net/1959.11/62181-
dc.description.abstract<p>Data is one of the most important corporate assets of companies, governments and research institutions. It is now possible to have fast access to correlate information stored in independent and distant databases, to analyse and visualise data online and use data mining tools for automatic and semi-automatic exploration and pattern discovery. Knowledge discovery and data mining (KDDM) is an umbrella term describing techniques for extracting information from data and suggesting patterns in very large databases. With the expansion of computer technology, huge volumes of detailed personal data are now regularly collected and analysed by marketing applications using KDDM techniques. KDDM is also being used in other domains where privacy issues are very delicate. The FBI applied KDDM techniques to analyse crime data and reduce possibilities as part of investigations into the Oklahoma City bombing, the Unabomber case, and many other crimes. Another example is the application of KDDM to analysing medical data. While there are many beneficial applications of KDDM to these domains, individuals can easily imagine the potential damage caused by unauthorised disclosure of financial or medical records.</p>en
dc.languageenen
dc.publisherProspect Publishingen
dc.relation.ispartofPrivacy Law & Policy Reporteren
dc.titlePrivacy in Data Miningen
dc.typeJournal Articleen
local.contributor.firstnameVladimiren
local.contributor.firstnameLjiljanaen
local.contributor.firstnameDavid Len
local.profile.schoolSchool of Science and Technologyen
local.profile.emaillbrankov@une.edu.auen
local.output.categoryC2en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.publisher.placeAustraliaen
local.format.startpage1en
local.format.endpage5en
local.identifier.volume6en
local.identifier.issue3en
local.contributor.lastnameEstivill-Castroen
local.contributor.lastnameBrankovicen
local.contributor.lastnameDoween
dc.identifier.staffune-id:lbrankoven
local.profile.orcid0000-0002-5056-4627en
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/62181en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitlePrivacy in Data Miningen
local.output.categorydescriptionC2 Non-Refereed Article in a Scholarly Journalen
local.relation.urlhttps://classic.austlii.edu.au/au/journals/PrivLawPRpr/1999/44.htmlen
local.relation.urlhttp://www8.austlii.edu.au/cgi-bin/viewdoc/au/journals/PLPR/1999/44.htmlen
local.search.authorEstivill-Castro, Vladimiren
local.search.authorBrankovic, Ljiljanaen
local.search.authorDowe, David Len
local.uneassociationNoen
local.atsiresearchNoen
local.sensitive.culturalNoen
local.year.published1999en
local.fileurl.closedpublishedhttps://rune.une.edu.au/web/retrieve/6d8c170e-8e85-4260-b936-5329626d0277en
local.subject.for2020460402 Data and information privacyen
local.subject.seo2020220405 Cybersecurityen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypePre-UNEen
local.profile.affiliationtypeExternal Affiliationen
Appears in Collections:Journal Article
School of Science and Technology
Files in This Item:
1 files
File SizeFormat 
Show simple item record
Google Media

Google ScholarTM

Check


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.