-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
IS4233 Project:
-------------------------------------------------
Privacy and Data Mining
-------------------------------------------------
------------------------------------------------- by -------------------------------------------------
Lim Jie Feng Kenneth (U087144X)
-------------------------------------------------
Simone Phoon Zhi Yun (U096849W)
-------------------------------------------------
Thiang Chong Siong (A0073773U)
-------------------------------------------------
Zhou Yuan Yi (U095215A)
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
-------------------------------------------------
Department of Information Systems
-------------------------------------------------
School of Computing
-------------------------------------------------
National University of Singapore
-------------------------------------------------
AY2012/2013
Table of Contents 1. Background 3 1.1 Definition of Data Mining 3 1.2 Data Warehouse 3 1.3 Data Mining Process 4 1.4 Data-Mining Techniques 4 1.5 Applications of Data Mining 5 1.6 Issues of Data Mining 8 2. Importance of Research 8 2.1 Privacy 9 2.2 Data Mining and Privacy 9 3. Literature Review 10 3.1 Privacy and Data Mining in the US 10 3.1.1 US Privacy Invasion Laws 10 3.1.2 The Fourth Amendment 11 3.1.3 Health Insurance
Bibliography: Wordnet search - 3.1. (n.d.). Retrieved November 11, 2012, from WordNet Search: http://wordnetweb.princeton.edu/perl/webwn?s=data mining Fulda, J Aggarwal, C. C., & Yu, P. S. (2008). Privacy-Preserving Data Mining: Models and Algorithms. Springer. J, W. D., Karim, K., Kalpana, N., Charlie, G., & M, H. A. (2003). Patients consent preferences for research uses information in electronic medical records:interview and survey data. BMJ . Baker, R., Shiels, C., Stevenson, K., Fraser, R., & Stone, M. (2000). What proportion of patients refuse consent to data collection from their records for research purposes. British Journal of General Practice . Project, H. P. (2003). Medical Privacy Stories. Retrieved November 1, 2012, from Health Privacy Project: http://www.healthprivacy.org/usr_doc/Privacy_storiesupd.pdf Cooper, T., & Collman, J Sweeney, L. (2002). k-ANONYMITY: A Model For Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems , 557-570. Goodwin, L., & Prather, J. (2002). Protecting patient privacy in clinical data mining. Journal of Healthcare Information Management , 62-67. Lin, Z., Hewett, M., & Altman, R. B. (2002). Using binning to maintain confidentiality of medical data. AMIA Symposium, (pp. 454-458). Quantin, C., Ferdynus, C., Avillach, P., Gouyon, B., Sagot, P., & Gouyon, J.-B. (1998). Automatic record hash coding and linkage for epidemiological follow-up data confidentiality. Methods of Information in Medicine , 271-277. Wiederhold, G. (2002). Future of Security and Privacy in Medical Information. Stud Health Technol Inform , 213-229. COPPA. (1998). COPPA - Children 's Online Privacy Protection Act. Retrieved November 1, 2012, from COPPA: http://www.coppa.org/coppa.htm Sullivan, B Matecki, L. A. (2010). Update: COPPA is Ineffective Legislation! Next Steps for Protecting Youth Privacy Rights in the Social Networking Era. Northwestern Journal of Law & Social Policy , 5 (2). Robling, M. R., Houston, H., Hood, K., Pill, R., Fay, J., & Evans, H. (2004). Public attitudes towards the use of primary care patient record data in medical research without consent: a qualitative study. J Med Ethics . Katz v. United States, 389 U.S. 347 (U.S. Supreme Court December 18, 1967). Bose, I., Lam, A. K., Leung, V. W., Li, I. H., & Wong, H. O. (2008). Business Data Warehouse: The Case of Wal-Mart. In Data Mining Applications for Empowering Knowledge Societies. IGI Global. Hartley, M. (2007, Nov). Facebook users complain of new tracking. Retrieved from Associated Press: http://www.theglobeandmail.com/technology/facebook-users-complain-of-new-tracking/article1090151/ IDA, S Kantarcıoglu, M., Jin, J., & Clifton, C. (2004). When do Data Mining Results Violate Privacy? KDD’04 . Loh, D. (2012, October 15). Parliament passes Data Protection Bill. Retrieved from Channel Newsasia: http://www.channelnewsasia.com/stories/singaporelocalnews/view/1231456/1/.html MICA MITRE. (2001, July). Stopping Traffic: Anti drug network (ADNET). MITRE Digest Archives. Retrieved from MITRE: http://www.mitre.org/news/digest/archives/2001/adnet.html Prashanth, K Prosser, W. L. (1960). Privacy. California Law Review, 48 , 383-423. Rahman, H. (2008). Prospects and Scopes of Data Mining Applications in Society Development Activities. In Data Mining Applications for Empowering Knowledge Societies. IGI Global. Security, D. o. (2007). 2007 data mining report. Retrieved from Department of Homeland Security: http://www.dhs.gov/xlibrary/assets/privacy/privacy_rpt_datamining_2007.pdf Solove, D Spargue, R. (2009). Legal Frameworks for Data Mining. In Social Implications of Data Mining and Informational Privacy. IGI Global. Tien, L. (2004). Privacy, technology and data mining. Ohio Northern University Law Review, 30 , 389-415. Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4 , 193-220. Yap, J. (2012, October 16). Singapore finally passes personal data protection bill. Retrieved from ZDNet.com: http://www.zdnet.com/sg/singapore-finally-passes-personal-data-protection-bill-7000005811/ Schechner, S EU. (2011, Jun 16). Attitudes on Data Protection and Electronic Identity in the European Union. Retrieved from European Commission: http://ec.europa.eu/public_opinion/archives/ebs/ebs_359_en.pdf EU EU. (2011). Legisation. Retrieved from European Data Protection Supervisor: http://www.edps.europa.eu/EDPSWEB/edps/EDPS/Dataprotection/Legislation SIGKDD Curiculum Committee Zentut. (2012). Data mining Techniques. (Zentut, Producer) Retrieved November 10, 2012, from Zentut - online tech tutorial: http://www.zentut.com/data-mining/data-mining-techniques/ Data Mining Techniques Frand, J. (2011, March 01). Data mining. Retrieved Nov 11, 2012, from Anderson.ucla.edu: http://www.anderson.ucla.edu/faculty/jason.frand/teacher/technologies/palace/datamining.htm Kimball, R AF, W. (1967). Privacy and Freedom (Vol. 1). New York, Atheneum.