Data Mining as Pre-EDD Investigatory Tool Team 9.

Slides:



Advertisements
Similar presentations
Public Health Surveillance Vital Records are Vital! Chesley Richards, MD, MPH, FACP Deputy Director for Public Health Scientific Services Centers for Disease.
Advertisements

1 Guidance for the American Recovery and Reinvestment Act of 2009 By David G. Bullock, Partner Macias Gini & O’Connell LLP.
Confidentiality and HIPAA
The importance of a Compliance program is to ensure that our agency meets the highest possible standards for all relevant federal, state and local regulations,
Unified Carrier Registration (UCR) Update August 24, 2006.
Achieving Better Care by Monitoring All Prescriptions (ABC-MAP) Act 191 of 2014 Board Meeting April 8, 2015.
Machine Learning and Data Mining Course Summary. 2 Outline  Data Mining and Society  Discrimination, Privacy, and Security  Hype Curve  Future Directions.
Data Mining – Intro.
Business Intelligence in Crime Ji Zhang Lucas Matecki Lamont Davis Jenny Brunnert.
Chapter 8 Marketing Research and Sales Forecasting
CIT 858: Data Mining and Data Warehousing Course Instructor: Bajuna Salehe Web:
Business Intelligence
Spreadsheet Management. Sarbanes-Oxley Act (SOX, 2002) Requires “an effective system of internal control” for financial reporting in publicly- held companies.
XP Information Information is everywhere in an organization Employees must be able to obtain and analyze the many different levels, formats, and granularities.
OLAM and Data Mining: Concepts and Techniques. Introduction Data explosion problem: –Automated data collection tools and mature database technology lead.
CISB594 – Business Intelligence Data Mining. CISB594 – Business Intelligence Reference Materials used in this presentation are extracted mainly from the.
Chapter 11 Databases. 11 Chapter 11: Databases2 Chapter Contents  Section A: File and Database Concepts  Section B: Data Management Tools  Section.
Social Network Analysis
CS490D: Introduction to Data Mining Prof. Chris Clifton April 14, 2004 Fraud and Misuse Detection.
Kansas State University Department of Computing and Information Sciences CIS 830: Advanced Topics in Artificial Intelligence From Data Mining To Knowledge.
Data Mining Chun-Hung Chou
© 2010 IBM Corporation © 2011 IBM Corporation September 6, 2012 NCDHHS FAMS Overview for Behavioral Health Managed Care Organizations.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
CIS 9002 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
Fraud and Prevention: Lessons from the Fire Service August 24,
1 MEDICAL ERROR REPORTING AND ANALYSIS Vijaya Gotla UmaDevi Bandaru Lavanya Gundamaraju.
Contact Center Security Strategies Karl Walder Director - Solutions Noble Systems.
Generating Intelligent Links to Web Pages by Mining Access Patterns of Individuals and the Community Benjamin Lambert Omid Fatemieh CS598CXZ Spring 2005.
1 1 Slide Introduction to Data Mining and Business Intelligence.
Appendix E – Checklist for Review of Performance Audits Presented by: Ashton Coleman Department of Defense Office of the Inspector General August 16, 2012.
1 Controversial Issues  Data mining (or simple analysis) on people may come with a profile that would raise controversial issues of  Discrimination 
Against Data-Mining Uses Team 10 Ben Jabara Jesse Lentz Ben Heller.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
Guest Lecture Introduction to Data Mining Dr. Bhavani Thuraisingham September 17, 2010.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Ali Alhamdan, PhD National Information Center Ministry of Interior
CSCE 201 Open Source Information Privacy. CSCE Farkas2 Reading List Recommended reading: – Open Source Intelligence: Private Sector Capabilities.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Data Visualization Michel Bruley Teradata Aster EMEA Marketing Director April 2013 Michel Bruley Teradata Aster EMEA Marketing Director.
Indiana Regional Sewer District Association October 26, 2015.
University of Jyväskylä Department of Mathematical Information Technology ICANNGA 2009 Mining Time Series State Changes with Prototype Based Clustering.
Chapter 1 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Data Mining Status and Risks Dr. Gregory Newby UNC-Chapel Hill
Identifying and Analyzing Patterns of Evasion HM Investigator: Shashi Shekhar (U Minnesota) Collaborators: Renee Laubscher, James Kang Kickoff.
Waqas Haider Bangyal. 2 Source Materials “ Data Mining: Concepts and Techniques” by Jiawei Han & Micheline Kamber, Second Edition, Morgan Kaufmann, 2006.
Mining of Massive Datasets Edited based on Leskovec’s from
Chapter 2 Data, Text, and Web Mining. Data Mining Concepts and Applications  Data mining (DM) A process that uses statistical, mathematical, artificial.
National Security Agency (NSA) Surveillance Christopher Boyd.
ILP model- Montenegro OSCE Annual Police Experts Meeting
CS570: Data Mining Spring 2010, TT 1 – 2:15pm Li Xiong.
Office of the Chief Privacy Officer Update June 23, 2016 Lucia Savage, JD, Chief Privacy Officer, ONC.
AN OPPORTUNITY TO ENTER INTO A JOINT VENTURE PARTNERSHIP WITH NTIS FOR DATA INNOVATION NTIS Information Session Department of Commerce Auditorium and Webcast.
Book web site:
Data Mining – Intro.
Background and Overview
MANAGING APPLICATION SECURITY
Introduction C.Eng 714 Spring 2010.
Data and Applications Security Introduction to Data Mining
ALZHEIMER DISEASE PREDICTION USING DATA MINING TECHNIQUES P.SUGANYA (RESEARCH SCHOLAR) DEPARTMENT OF COMPUTER SCIENCE TIRUPPUR KUMARAN COLLEGE FOR WOMEN.
Introduction Data Mining for Business Analytics.
How to Operationalize Big Data Security Analytics
Data Warehousing and Data Mining
Smart Portal To Protect Child Online
Data Mining: Concepts and Techniques
Data Mining: Concepts and Techniques
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Data Warehousing Data Mining Privacy
Data Mining: Concepts and Techniques
NPHS 1510 Federal and International
Presentation transcript:

Data Mining as Pre-EDD Investigatory Tool Team 9

Data Mining Overview Use of sophisticated data analysis tools to discover previously unknown, valid patterns and relationships in large data sets –E.g., Statistical models, mathematical algorithms, machine learning methods Can be performed on many types of data including those in structured, textual, spatial, Web, or multimedia forms Use of sophisticated data analysis tools to discover previously unknown, valid patterns and relationships in large data sets –E.g., Statistical models, mathematical algorithms, machine learning methods Can be performed on many types of data including those in structured, textual, spatial, Web, or multimedia forms

Data Mining Overview cont. Government and Industry Most Common Purposes –Improving service or performance –Detecting fraud, waste, abuse –Analyzing scientific and research information –Managing human resources –Detecting criminal activities or patterns –Analyzing intelligence and detecting terrorist activities Government and Industry Most Common Purposes –Improving service or performance –Detecting fraud, waste, abuse –Analyzing scientific and research information –Managing human resources –Detecting criminal activities or patterns –Analyzing intelligence and detecting terrorist activities

Advantages as Pre-EDD Tool Assist researchers by speeding up their data analyzing process, allowing them more time to work on other projects. Improve effectiveness by Identifying patterns and relationships that may otherwise go unnoticed. Advances in technology are allowing for more efficient techniques Assist researchers by speeding up their data analyzing process, allowing them more time to work on other projects. Improve effectiveness by Identifying patterns and relationships that may otherwise go unnoticed. Advances in technology are allowing for more efficient techniques

Data Mining Initiatives Able Danger –The Department of Defense characterized Able Danger as a demonstration project to test analytical methods and technology on very large amounts of data. National Security Agency (NSA) –Speculation on NSA terrorist surveillance dating back to at least 2002, involving the domestic collection, analysis, and sharing of information. Able Danger –The Department of Defense characterized Able Danger as a demonstration project to test analytical methods and technology on very large amounts of data. National Security Agency (NSA) –Speculation on NSA terrorist surveillance dating back to at least 2002, involving the domestic collection, analysis, and sharing of information.

Data Mining Initiatives cont. The Novel Intelligence from Massive Data (NIMD) Program –NIMD program focuses on the development of data mining and analysis tools to be used in working with massive data. The Novel Intelligence from Massive Data (NIMD) Program –NIMD program focuses on the development of data mining and analysis tools to be used in working with massive data.

Factors Affecting Use of Data Mining as Pre-EDD Tool…. Data Quality –In the wake of Choicepoint, Lexis-Nexis, etc. full aware of commercial risks of privacy breaches, bad data quality, accuracy, etc. Access vs. Accuracy Interoperability –What use is data without proper context and resources? (Collaboration with sharing data, just data mining might not be enough to stop criminals and terrorists or be meaningful). Quantity vs. Meaningfulness Mission/Purpose –Limiting privacy laws may be useful, but abuse, other uses of data may occur outside of original intention. Authenticity vs. Illegitimacy Data Quality –In the wake of Choicepoint, Lexis-Nexis, etc. full aware of commercial risks of privacy breaches, bad data quality, accuracy, etc. Access vs. Accuracy Interoperability –What use is data without proper context and resources? (Collaboration with sharing data, just data mining might not be enough to stop criminals and terrorists or be meaningful). Quantity vs. Meaningfulness Mission/Purpose –Limiting privacy laws may be useful, but abuse, other uses of data may occur outside of original intention. Authenticity vs. Illegitimacy

Limiting Privacy Laws Equals Increasing Oversight? H.R the Civil Liberties Restoration Act of 2005 –Department or agency engaged in any activity or use or develop data-mining technology submit a public report to Congress –A list and analysis of the laws and regulations that would apply to the data mining activity –Laws and regulations that would need to be modified to allow the data mining activity to be implemented –Information on how individuals whose information is being used in the data mining activity will be notified of the use of their information –These reports would be due to Congress no later than 90 days after the enactment of H.R. 1502, and would be required to be updated annually to include “any new data-mining technologies.” H.R the Civil Liberties Restoration Act of 2005 –Department or agency engaged in any activity or use or develop data-mining technology submit a public report to Congress –A list and analysis of the laws and regulations that would apply to the data mining activity –Laws and regulations that would need to be modified to allow the data mining activity to be implemented –Information on how individuals whose information is being used in the data mining activity will be notified of the use of their information –These reports would be due to Congress no later than 90 days after the enactment of H.R. 1502, and would be required to be updated annually to include “any new data-mining technologies.”

Sources