Computers and Data Collection

Slides:



Advertisements
Similar presentations
Web Mining.
Advertisements

Data-Mining and Record-Matching. Whenever you fill out a form for an organisation, business or government, the information usually ends up being stored.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
DATA MINING CS157A Swathi Rangan. A Brief History of Data Mining The term “Data Mining” was only introduced in the 1990s. Data Mining roots are traced.
Databases Chapter Distinguish between the physical and logical view of data Describe how data is organized: characters, fields, records, tables,
Week 9 Data Mining System (Knowledge Data Discovery)
Database Applications and Implications 8.  2001 Prentice Hall8.2 Chapter Outline The Electronic File Cabinet: Database Basics Beyond the Basics: Database.
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
Data Mining By Archana Ketkar.
Data Mining Adrian Tuhtan CS157A Section1.
Chapter 14 The Second Component: The Database.
Databases Chapter 11.
Chapter 9 e-Commerce Systems.
DataMining By Guan Hang Su CS157A section 2 fall 2005.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Marketing Principles L.Ingram CHAPTER 6: SPORTS MARKET RESEARCH & OUTLETS.
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
King Fahd University of Petroleum & Minerals Department of Management and Marketing MKT 345 Marketing Research Dr. Alhassan G. Abdul-Muhmin Secondary Data.
Protecting your money: Identity Theft
D ATA, D ATABASE, DBMS, DBMS SOFTWARE, R ELATION, A PPLICATION, ENVIRONMENT, BENEFITS. Week 8 Mr.Mohammed Rahmath.
Knowledge Discovery & Data Mining process of extracting previously unknown, valid, and actionable (understandable) information from large databases Data.
MAKING THE BUSINESS BETTER Presented By Mohammed Dwikat DATA MINING Presented to Faculty of IT MIS Department An Najah National University.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Chapter Eight Database Applications and Implications.
Privacy and Information Week 5. Computers and Government uThousands of government offices and departments exist uAll use computers in some manner.
Database Applications Database Applications and Implications.
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Data Mining Solutions (Westphal & Blaxton, 1998) Dr. K. Palaniappan Dept. of Computer Engineering & Computer Science, UMC.
Nilsa Polanco CMP 230 LA01 Meta Search Engine Presentation.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Privacy Understanding risks & problems is a 1st step toward protecting privacy.
Data Mining Chapter 1 Introduction -- Basic Data Mining Tasks -- Related Concepts -- Data Mining Techniques.
Chapter 8 Database Applications and Implications.
Chapter Eight Database ( 資料庫 ) Applications and Implications.
4. Secondary Data.
Database Design Part of the design process is deciding how data will be stored in the system –Conventional files (sequential, indexed,..) –Databases (database.
컴퓨터와 사회 프라이버시와 개인 정보 1 이 충기 명지대학교 컴퓨터소프트웨어학과. 컴퓨터와 사회 프라이버시와 개인 정보 2 A Gift of Fire Privacy and Personal Information The Impact of Computer Technology.
Lecturer: Gareth Jones. How does a relational database organise data? What are the principles of a database management system? What are the principal.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 4c, Database H Definition H Structure H Parts H Types.
Business Intelligence - 2 BUS 782. Topics Data warehousing Data Mining.
What is Privacy?. 3 Types of Privacy 1.Accessibility Privacy 2.Decisional Privacy 3.Informational Privacy.
Privacy and Data Mining What Do “They” Know About You?
Teens lesson fourteen consumer privacy presentation slides 03/08.
Data Mining Status and Risks Dr. Gregory Newby UNC-Chapel Hill
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Topic 1 : Database Systems. Point #1 Data  Data are raw facts  Unprocessed, thus, no meaning.
Miloš Kotlar 2012/115 Single Layer Perceptron Linear Classifier.
DATA MINING It is a process of extracting interesting(non trivial, implicit, previously, unknown and useful ) information from any data repository. The.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
HCS 212: Introduction to MIS
College lesson ten consumer privacy presentation slides 04/09.
privacy and information
Data Mining.
AGENDA Introduction Kind of information smart card contain
Chapter 8 Business Intelligence & ERP
SECTION 5: INFORMATION PROCESSING
Adrian Tuhtan CS157A Section1
Handling Data Using Databases
Privacy and Information
כריית נתונים.
Teens lesson fourteen consumer privacy presentation slides 03/08.
Understanding Customer Behaviors with Information Technologies
What is Direct Marketing ?
Privacy and Data Mining
Privacy and Data Mining
Presentation transcript:

Computers and Data Collection Module 5 Section 2

Computers Have Facilitated.... The collection of data Analysis of data Storage of data Access of data Distribution of data Reasons Speed Anonymity Internet has broadened access to information

Database Program to help you store, manage, and analyze your data Databases make it easier to: Store large quantities of information Retrieve information quickly and flexibly Organize and reorganize information Print and distribute information in a variety of ways

Other Databases Employee ID scanners Prescription drugs Bank machines Cellular phone calls Browsing on Net - cookies Sweepstakes Satellites Credit cards Supermarket scanners Electronic tolls Mail-order transactions E-mail

Public records DMV Voter registration Birth and death certificates Marriage certificates Property records Court records Divorce records Arrest records Postal address records

Confidential Records Social welfare information Tax information School records Public library records Criminal history Health records

Internet and data collection Cookies Search engines - quicker more available info Open-ended nature of net - no rules to define what is personal info Newsgroup, chat rooms, e-mail remains available for years

Purposes of Record Systems Help agencies perform their functions efficiently Determine eligibility for government job Determine eligibility for benefits programs Detect fraud Recover payments of delinquent debt

Acquisition of Data Census Surveillance Identification Networking

Methods Used Computer matching Computer profiling Combining and comparing information from different databases Computer profiling using data in computer files to determine characteristics of people most likely to engage in a certain behavior

Data Mining Analyze to perform data profiles Create from customer files than matches are made Businesses and governments keep records and sell them

Data Mining Results Analysis of data for relationships that have not been discovered Associations One event can be correlated to another Sequences One event leads to another Classification Recognition of patterns resulting in new organizations

Data Mining Results Clustering Forecasting Finding and visualizing groups of facts not previously known Forecasting Discovering patterns in the data that can lead to predictions about the future

Data Mining Uses Target customers Advertise to current customers Manipulate markets Select, monitor, and control employees

Social Security Number Major use for identification Linked to Banking data Credit report Driving record Earnings history Work history .......