19,259 research outputs found

    Privacy Violation and Detection Using Pattern Mining Techniques

    Get PDF
    Privacy, its violations and techniques to bypass privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have become conscious of the implications of privacy violation and its impact on them and to other stakeholders. Moreover, nations across the world are coming out with privacy protecting legislations to prevent data privacy violations. Such legislations however expose organizations to the issues of intentional or unintentional violation of privacy data. A violation by either malicious external hackers or by internal employees can expose the organizations to costly litigations. In this paper, we propose PRIVDAM; a data mining based intelligent architecture of a Privacy Violation Detection and Monitoring system whose purpose is to detect possible privacy violations and to prevent them in the future. Experimental evaluations show that our approach is scalable and robust and that it can detect privacy violations or chances of violations quite accurately. Please contact the author for full text at [email protected]

    Data analytics 2016: proceedings of the fifth international conference on data analytics

    Get PDF

    Chapter Evolving Roles of Spontaneous Reporting Systems to Assess and Monitor Drug Safety

    Get PDF
    This chapter aims to describe current and emerging roles of spontaneous reporting systems (SRSs) for assessing and monitoring drug safety. Moreover, it offers a perspective on the near future, which entails the so-called era of Big Data, keeping in mind both regulator and researcher viewpoints. After a panorama on key data sources and analyses of post-marketing data of adverse drug reactions, a critical appraisal of methodological issues and debated future applications of SRSs will be presented, including the exploitation and challenges in evidence integration (i.e., merging and combining heterogeneous sources of data into a unique indicator of risk) and patient’s reporting via social media. Finally, a call for a responsible use of these studies is offered, with a proposal on a set of minimum requirements to assess the quality of disproportionality analysis in terms of study conception, performing and reporting

    Evolving Roles of Spontaneous Reporting Systems to Assess and Monitor Drug Safety

    Get PDF
    This chapter aims to describe current and emerging roles of spontaneous reporting systems (SRSs) for assessing and monitoring drug safety. Moreover, it offers a perspective on the near future, which entails the so-called era of Big Data, keeping in mind both regulator and researcher viewpoints. After a panorama on key data sources and analyses of post-marketing data of adverse drug reactions, a critical appraisal of methodological issues and debated future applications of SRSs will be presented, including the exploitation and challenges in evidence integration (i.e., merging and combining heterogeneous sources of data into a unique indicator of risk) and patient’s reporting via social media. Finally, a call for a responsible use of these studies is offered, with a proposal on a set of minimum requirements to assess the quality of disproportionality analysis in terms of study conception, performing and reporting

    Building access control policy model for Privacy Preserving and Testing Policy Conflicting Problems

    Get PDF
    This paper proposes a purpose-based access control model in distributed computing environment for privacy preserving policies and mechanisms, and describes algorithms for policy conflicting problems. The mechanism enforces access policy to data containing personally identifiable information. The key component is purpose involved access control models for expressing highly complex privacy-related policies with various features. A policy refers to an access right that a subject can have on an object, based on attribute predicates, obligation actions, and system conditions. Policy conflicting problems may arise when new access policies are generated that are possible to be conflicted to existing policies. As a result of the policy conflicts, private information cannot be well protected. The structure of purpose involved access control policy is studied, and efficient conflict-checking algorithms are developed and implemented. Finally a discussion of our work in comparison with other related work such as EPAL is presented
    • …
    corecore