Preview

Discipleship

Powerful Essays
Open Document
Open Document
13571 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Discipleship
-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------
IS4233 Project:
-------------------------------------------------
Privacy and Data Mining
-------------------------------------------------

------------------------------------------------- by -------------------------------------------------
Lim Jie Feng Kenneth (U087144X)
-------------------------------------------------
Simone Phoon Zhi Yun (U096849W)
-------------------------------------------------
Thiang Chong Siong (A0073773U)
-------------------------------------------------
Zhou Yuan Yi (U095215A)
-------------------------------------------------

-------------------------------------------------

-------------------------------------------------

-------------------------------------------------
Department of Information Systems
-------------------------------------------------
School of Computing
-------------------------------------------------
National University of Singapore
-------------------------------------------------
AY2012/2013

Table of Contents 1. Background 3 1.1 Definition of Data Mining 3 1.2 Data Warehouse 3 1.3 Data Mining Process 4 1.4 Data-Mining Techniques 4 1.5 Applications of Data Mining 5 1.6 Issues of Data Mining 8 2. Importance of Research 8 2.1 Privacy 9 2.2 Data Mining and Privacy 9 3. Literature Review 10 3.1 Privacy and Data Mining in the US 10 3.1.1 US Privacy Invasion Laws 10 3.1.2 The Fourth Amendment 11 3.1.3 Health Insurance



Bibliography: Wordnet search - 3.1. (n.d.). Retrieved November 11, 2012, from WordNet Search: http://wordnetweb.princeton.edu/perl/webwn?s=data mining Fulda, J Aggarwal, C. C., & Yu, P. S. (2008). Privacy-Preserving Data Mining: Models and Algorithms. Springer. J, W. D., Karim, K., Kalpana, N., Charlie, G., & M, H. A. (2003). Patients consent preferences for research uses information in electronic medical records:interview and survey data. BMJ . Baker, R., Shiels, C., Stevenson, K., Fraser, R., & Stone, M. (2000). What proportion of patients refuse consent to data collection from their records for research purposes. British Journal of General Practice . Project, H. P. (2003). Medical Privacy Stories. Retrieved November 1, 2012, from Health Privacy Project: http://www.healthprivacy.org/usr_doc/Privacy_storiesupd.pdf Cooper, T., & Collman, J Sweeney, L. (2002). k-ANONYMITY: A Model For Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems , 557-570. Goodwin, L., & Prather, J. (2002). Protecting patient privacy in clinical data mining. Journal of Healthcare Information Management , 62-67. Lin, Z., Hewett, M., & Altman, R. B. (2002). Using binning to maintain confidentiality of medical data. AMIA Symposium, (pp. 454-458). Quantin, C., Ferdynus, C., Avillach, P., Gouyon, B., Sagot, P., & Gouyon, J.-B. (1998). Automatic record hash coding and linkage for epidemiological follow-up data confidentiality. Methods of Information in Medicine , 271-277. Wiederhold, G. (2002). Future of Security and Privacy in Medical Information. Stud Health Technol Inform , 213-229. COPPA. (1998). COPPA - Children 's Online Privacy Protection Act. Retrieved November 1, 2012, from COPPA: http://www.coppa.org/coppa.htm Sullivan, B Matecki, L. A. (2010). Update: COPPA is Ineffective Legislation! Next Steps for Protecting Youth Privacy Rights in the Social Networking Era. Northwestern Journal of Law & Social Policy , 5 (2). Robling, M. R., Houston, H., Hood, K., Pill, R., Fay, J., & Evans, H. (2004). Public attitudes towards the use of primary care patient record data in medical research without consent: a qualitative study. J Med Ethics . Katz v. United States, 389 U.S. 347 (U.S. Supreme Court December 18, 1967). Bose, I., Lam, A. K., Leung, V. W., Li, I. H., & Wong, H. O. (2008). Business Data Warehouse: The Case of Wal-Mart. In Data Mining Applications for Empowering Knowledge Societies. IGI Global. Hartley, M. (2007, Nov). Facebook users complain of new tracking. Retrieved from Associated Press: http://www.theglobeandmail.com/technology/facebook-users-complain-of-new-tracking/article1090151/ IDA, S Kantarcıoglu, M., Jin, J., & Clifton, C. (2004). When do Data Mining Results Violate Privacy? KDD’04 . Loh, D. (2012, October 15). Parliament passes Data Protection Bill. Retrieved from Channel Newsasia: http://www.channelnewsasia.com/stories/singaporelocalnews/view/1231456/1/.html MICA MITRE. (2001, July). Stopping Traffic: Anti drug network (ADNET). MITRE Digest Archives. Retrieved from MITRE: http://www.mitre.org/news/digest/archives/2001/adnet.html Prashanth, K Prosser, W. L. (1960). Privacy. California Law Review, 48 , 383-423. Rahman, H. (2008). Prospects and Scopes of Data Mining Applications in Society Development Activities. In Data Mining Applications for Empowering Knowledge Societies. IGI Global. Security, D. o. (2007). 2007 data mining report. Retrieved from Department of Homeland Security: http://www.dhs.gov/xlibrary/assets/privacy/privacy_rpt_datamining_2007.pdf Solove, D Spargue, R. (2009). Legal Frameworks for Data Mining. In Social Implications of Data Mining and Informational Privacy. IGI Global. Tien, L. (2004). Privacy, technology and data mining. Ohio Northern University Law Review, 30 , 389-415. Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4 , 193-220. Yap, J. (2012, October 16). Singapore finally passes personal data protection bill. Retrieved from ZDNet.com: http://www.zdnet.com/sg/singapore-finally-passes-personal-data-protection-bill-7000005811/ Schechner, S EU. (2011, Jun 16). Attitudes on Data Protection and Electronic Identity in the European Union. Retrieved from European Commission: http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf EU EU. (2011). Legisation. Retrieved from European Data Protection Supervisor: http://www.edps.europa.eu/EDPSWEB/edps/EDPS/Dataprotection/Legislation SIGKDD Curiculum Committee Zentut. (2012). Data mining Techniques. (Zentut, Producer) Retrieved November 10, 2012, from Zentut - online tech tutorial: http://www.zentut.com/data-mining/data-mining-techniques/ Data Mining Techniques Frand, J. (2011, March 01). Data mining. Retrieved Nov 11, 2012, from Anderson.ucla.edu: http://www.anderson.ucla.edu/faculty/jason.frand/teacher/technologies/palace/datamining.htm Kimball, R AF, W. (1967). Privacy and Freedom (Vol. 1). New York, Atheneum.

You May Also Find These Documents Helpful

  • Good Essays

    Hcs 465 Week 4

    • 765 Words
    • 4 Pages

    Since the data was retrieved from a database the information can be used safely to protect the rights of the patients. No hands on or questioning were done of the specific patient population to cause harm or undo stress.…

    • 765 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The patient and physician should be advised about the existence of computerized data bases in which medical information concerning the patient is stored. Such information should be communicated to the physician and patient prior to the physician’s release of the medical information to the entity or entities maintaining the computer data bases. All individuals and organizations with some form of access to the computerized data bases, and the level of access permitted, should be specifically identified in advance. Full disclosure of this information to the patient is necessary in obtaining informed consent to treatment. Patient data should be assigned a security level appropriate for the data’s degree of sensitivity, which should be used to control who has access to the information.…

    • 690 Words
    • 3 Pages
    Good Essays
  • Good Essays

    HIPPA Tutorial Summary

    • 1340 Words
    • 5 Pages

    Pritts, J. L. (2010). The Importance and Value of Protecting the Privacy of Health Information: The Roles of the HIPAA Privacy Rule and the Common Rule in Health Research . Retrieved from…

    • 1340 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In today’s world of technology patient’s face an ever challenging issue of protecting their privacy. One of the biggest areas infringing on a patient’s privacy would be the prescription health information that is being released by pharmacists and the way in which that information is used. Information is given to a wide variety of entities and to individuals, which raises enormous concern about the privacy rights of patients, especially considering the fact that the patient has not given consent for the release of this information.…

    • 1067 Words
    • 5 Pages
    Good Essays
  • Good Essays

    As of today there are issues with the information technology systems, clinical data management systems and the increasing automation of the electronic medical records. All of these present a significant amount of patient privacy and confidentiality issues. When we say confidential, meaning in healthcare we are talking about the protection of a patient’s medical information and keeping their medical information private and safe from any third parties. Administrators are expected to follow the HIPAA Privacy Rule. The HIPAA protects the privacy of patient’s medical information. Patient’s medical records are sensitive personal information that is covered with privacy. There are several ethical…

    • 585 Words
    • 3 Pages
    Good Essays
  • Good Essays

    HIPAA CIA And Safeguards

    • 599 Words
    • 3 Pages

    HIPAA, CIA, and Safeguards Medical data are increasingly computerized, which means, inevitably, medical data are increasingly subject to the risks associated with computer security, namely: •Confidentiality: data revealed to people not authorized to see them •Integrity: unauthorized changes to data, intentional or otherwise •Availability: access to data denied by persons or events…

    • 599 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Such information should be available only to the physician of record and other health care and insurance personnel as necessary. Privacy is an individual’s constitutional right to be left alone, to be free from unwarranted publicity, and to conduct his or her life without its being made public.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Better Essays

    When it comes to privacy it has become a major concern to both patients and the medical staff. HIPAA and privacy rules help to protect the patient’s privacy. “The HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically (2003).” Over time many studies have been conducted that shows that patient want to be in control over who can access their information. The privacy of patients has increased over the years with many different ways to keep personal information private.…

    • 1058 Words
    • 5 Pages
    Better Essays
  • Best Essays

    References: Author Unknown. Breach Report 2010, Redspin Inc. Dec. 2010. Retrieved from http://www.redspin.com/resources/whitepapers-datasheets/index.php on April 19, 2012. Badzek, L., Gross, G. Confidentiality and Privacy: At the Forefront for Nurses. The American Journal of Nursing, Vol. 99, No. 6 (June, 1999), pp.52-54. Lippincott Williams & Wilkins. Retrieved April 18, 2012 from http://www.jstor.org/stable/3472150. Byfield, E. 315,000 Patients ' Information Disappears From Emory Healthcare. WSBTV. Retrieved April 18, 2012 from file:///F:/Ethics%20information%20age/315,000%20patients%27%20information%20disappears%20from%20Emory%20Healthcare%20_%20www.wsbtv.com.htm Dixon, P. MEDICAL IDENTITY THEFT: The Information Crime that Can Kill You, March 3, 2006. World Privacy Forum. Retrieved from http://www.worldprivacyforum.org/pdf/wpf_medicalidtheft2006.pdf on April 24, 2012. Foreman, Judy (26 June 2006). "At Risk of Exposure”. Los Angeles Times. Retrieved April 23 , 2012. Gellman, R. Fact Sheet 8a: HIPAA Basics: Medical Privacy in the Electronic Age. Privacy Clearing House. March, 2012. Retrieved April 19, 2012 from http://www.privacyrights.org/fs/fs8a-hipaa.htm. Health Insurance Portability and Accountability Act of 1996, 42 U.S.C. § 1320d-9 (2010).…

    • 1982 Words
    • 57 Pages
    Best Essays
  • Powerful Essays

    Patient privacy has been a major issue within the healthcare field for many years. With the increasing use of medical information technology more and more people are being authorized to view patient health information. Not only do physicians and nurses have access; but this has broadened to include allied health professionals, billing specialists, quality assurance employees, social workers, medical records technicians etc... (Pendrak & Ericon, 1998). All of these healthcare professionals have a duty to take any steps necessary to protect the patient 's right to privacy when it comes to their health information.…

    • 1410 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    U.S. Department of Health & Human Services. (2010). Health Information Privacy. Retrieved July 11, 2010 from http://www.hhs.gov/ocr/privacy/…

    • 1028 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Cis 500 Data Mining Report

    • 2046 Words
    • 9 Pages

    This report is an analysis of the benefits of data mining to business practices. It also assesses the reliability of data mining algorithms and with examples. “Data Mining is a process that uses statistical, mathematical, artificial intelligence, and machine learning techniques…

    • 2046 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    In today’s electronic age, many employers are faced daunting task of making a legal call when determining if monitoring employee behavior is appropriate at all times. In essence, “Little Brother” is always watching. According to Schulman (2013), Little Brother represents the tremendous capabilities technology as provided for employers to keep track of what their work force is up to. Several programs are available that search e-mails, as well as software to block objectionable websites. The most brazen of manager and supervisors can simply go enter your hard drive and review one’s cookies and history, as well as access any employee’s company e-mail. As much as an employee deletes his/her history, or sends unwanted emails to the recycle bin, much of this information still exists on the company server, and many corporations are willing to pay computer consultants to unearth any desired information.…

    • 1036 Words
    • 5 Pages
    Better Essays
  • Good Essays

    1984 - Reflection Paper

    • 694 Words
    • 3 Pages

    Since Orwell's book 1984 written in 1948, we have developed methods to produce more advanced and less costly computer technology. Value Added Networks continue to rise in popularity. Data warehousing (information availability) and data mining (information analysis) have become hot topics in today's world. Personal data that has always been available, but not easily accessible, is now computerized and merged with larger databases. These databases are linked to form massive data repositories. This practice is not limited to the private sector; government databases such as the Department of Motor Vehicles and criminal records are accessible to those willing to pay for access. The ability to desegregate personal information and profile individuals is easier than ever.…

    • 694 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Storing and Sharing

    • 375 Words
    • 2 Pages

    Data Protection Act 1998, it is the main piece of legislation that governs the protection of personal data in the UK. The Key Principles are:…

    • 375 Words
    • 2 Pages
    Good Essays

Related Topics