Social Impacts of Data Mining 2004/12/30. Outline Is data mining a hype or a persistent growing business? Is data mining merely managers’ business or.

Slides:



Advertisements
Similar presentations
Chapter 1 Overview of Databases and Transaction Processing.
Advertisements

Big Data Privacy Issues in Public Social Media Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
CHARTERED SECRETARIES AUSTRALIA New Privacy Laws 6 June 2013.
Management Information Systems, Sixth Edition
Overview of Databases and Transaction Processing Chapter 1.
1 ACCTG 6910 Building Enterprise & Business Intelligence Systems (e.bis) Introduction to Data Mining Olivia R. Liu Sheng, Ph.D. Emma Eccles Jones Presidential.
Database Applications and Implications 8.  2001 Prentice Hall8.2 Chapter Outline The Electronic File Cabinet: Database Basics Beyond the Basics: Database.
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 15-1 Accounting Information Systems 9 th Edition Marshall.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
3 / 12 CHAPTER Databases MIS105 Irfan Ahmed Ilyas.
1 Introduction Introduction to database systems Database Management Systems (DBMS) Type of Databases Database Design Database Design Considerations.
Privacy & Personal Information -- Why do we care or do we?
Introduction to Building a BI Solution 권오주 OLAPForum
Data Warehousing: Defined and Its Applications Pete Johnson April 2002.
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
ADJUSTING JOURNAL ENTRIES ADJUSTING ENTRIES – Purpose is to MAKE SURE THE T ACCOUNTS ARE CORRECT. (REFLECT ECONOMIC REALITY)
© 2007 by Prentice Hall Management Information Systems, 10/e Raymond McLeod and George Schell 1 Information in Action.
Slide 1 Tomorrow’s Technology and You Chapter 7 Databases and Privacy © 2006 Prentice-Hall, Inc.
Point of Sale Collection, cleanup and data analysis.
DAVID M. KROENKE’S DATABASE PROCESSING, 10th Edition © 2006 Pearson Prentice Hall 2-1 David M. Kroenke’s Chapter One: Why DB? Database Processing: Fundamentals,
Intro to MIS – MGS351 Databases and Data Warehouses Chapter 3.
Chapter 1 Course Orientation. Outline Definition of data source management Definition of data source management Importance data source management to organization.
Database Systems – Data Warehousing
Chapter 5 Lecture 2. Principles of Information Systems2 Objectives Understand Data definition language (DDL) and data dictionary Learn about popular DBMSs.
1 California State University, Fullerton Chapter 7 Information System Data Management.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Database Design Part of the design process is deciding how data will be stored in the system –Conventional files (sequential, indexed,..) –Databases (database.
Chapter 6: Getting the Marketing Information We Need.
Principles of Database Design, Conclusions AIMS 2710 R. Nakatsu.
Chapter No 4 Query optimization and Data Integrity & Security.
Dimensional Modeling Primer Chapter 1 Kimball & Ross.
Data Warehouse. Group 5 Kacie Johnson Summer Bird Washington Farver Jonathan Wright Mike Muchane.
Database Systems Basic Data Management Concepts
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Ch6. Introduction to Database. What is a Database? Database is a collection of related information. It is organized so that it can easily be accessed,
Organizing Data and Information
Kristen Lockhart COMPUTER PRIVACY & PERSONAL INFORMATION What types of information do companies have and share about YOU?
Respecting People's Privacy in Ministry 1. Context 2. Why should we bother? 3. APP Summary 4. Information Pathway.
1 Lecture 1: Introduction Outline course’s focus intruder’s capabilities motivation for security worms, viruses, etc. legal and patent issues.
Chapter 1 Overview of Databases and Transactions.
Periscope the Ninja Stuff Tips and Tricks for Maximizing your Broadcasts.
Computer Security By Duncan Hall.
Using Technology to Manage Information Chapter 13.
DATA MANAGEMENT AND DATABASES. Data Management Data management is the process of controlling the information generated during a research project or transaction.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Chapter 1 Overview of Databases and Transaction Processing.
Project Outline I A New CRM database must accomplish the following:  Deliver support resources for internal IT  Integrate all data from existing CRM.
Chapter 3 Building Business Intelligence Chapter 3 DATABASES AND DATA WAREHOUSES Building Business Intelligence 6/22/2016 1Management Information Systems.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Management Information Systems by Prof. Park Kyung-Hye Chapter 7 (8th Week) Databases and Data Warehouses 07.
Popular Database Management Systems
Intro to MIS – MGS351 Databases and Data Warehouses
SPIA Web Application Introduction.
VuFind Account Based Recommender
Fundamentals of Information Systems
Introduction C.Eng 714 Spring 2010.
APP entities (organisations)
1 2 3 Here we are on the Ohio Web Library’s home page. To get to Business Source Premier, use the following steps: 1. Go to Ohio Web Library 2. Click on.
Who Uses Encryption? Module 7 Section 3.
Cambridge National Certificate in Information Technologies
Overview of Databases and Transaction Processing
Topics Covered in COSC 6340 Data models (ER, Relational, XML (short))
Data Warehousing and Data Mining
An Introduction to Data Warehousing
Topics Covered in COSC 6340 Data models (ER, Relational, XML)
GDPR (General Data Protection Regulation)
Data Warehousing Concepts
Presentation transcript:

Social Impacts of Data Mining 2004/12/30

Outline Is data mining a hype or a persistent growing business? Is data mining merely managers’ business or everyone’s business? Is data mining a threat to privacy and data security? Trends in data mining

Is data mining a hype or a persistent growing business? Life cycle of technology adoption

Is data mining a hype or a persistent growing business? At what stage is data mining? Integration of data mining into existing business technology –Database system –OLAP system –User security –Inventory and order management system –Product management

Is data mining merely managers’ business or everyone’s business? Data mining will surely help company executives a great deal in understanding the market and their business. Data mining will become increasingly available to everyone. –What could I do at home with data mining? –Do I have to understand the inside of a data mining system or the tricks of data mining algorithms in order to do data mining?

Is data mining a threat to privacy and data security? Like any other technology, data mining can be used for good or bad. –When I provide a company with information about myself, are these data going to be used in ways I don’t expect? –Will the data be sold to other companies? –Can I find out what is recorded about me? –How can I find out which companies have information about me? –Do I have the right or the means to refuse companies to use the profiling information they have about me?

Is data mining a threat to privacy and data security? Are there any means set up by which I can correct any errors in the profile data recorded about me? What if I want to erase, complete, amend, or update the data? Will the information about me be “anonymized,” or will it be traceable to me? How secure are the data? How accountable is the company who collects or stores my data, if these data are stolen or misused?

Trends in data mining Application exploration Scalable data mining methods Integration of data mining with database system, data warehouse systems, and web database systems Standardization of data mining language Visual data mining New methods for mining comlex types of data Web mining Privacy protection and information security in data mining