3,889 research outputs found

    USING CROWDSOURCING FOR PROJECT MANAGEMENT

    Get PDF
    Crowdsourcing is coined first by Jeff Howe and become more popular in recent years. It is concept of outsourcing in the crowd. Crowdsourcing can be useful to project managers when they need to perform tasks with low budget, massive participants, multi-disciplinary, expert or non-experts. Using 10 rules from Howe will help a project manager manage the crowd and achieve their project objective. By addressing some questions such as why should a project manager use crowdsourcing? What the benefits and risks of crowdsourcing. This articles explain the contribution of crowdsourcing in project and change managemen

    Paillier based Privacy-Preserving Mining of Association Rules from Outsourced Transaction Databases

    Get PDF
    The Cloud computing is computing in which massive assembling of remote servers are managed to authorized centralized data storage and online access to computer resources , while Privacy-preserving data mining (PPDM) is one of the latest inclination in privacy and security studies. It is determined by one of the important positioning issues of the information era - the right to privacy. With the use of cloud computing services, an organization lack in computational resources can deploy its mining requires to an outsider service provider. However, both the elements and the association rules of the deployed database are observed as private property of the organization. The data owner converts its data and sends it to the server, ships mining queries to the server, and recoup the actual design from the extricate designs received from the outsider server for corporate privacy prevention. In this theory, we study the problems of outsourcing the association rule mining mechanisms within a corporate privacy-preserving framework. The Rob Frugal method is founded with defeat the security obligations of outsourced data. This method is an encryption plan which is based on one to one substitution ciphers for items and fake pattern from the database. In this system attacker discovers data by guessing attack, also man in the middle attack which is possible on Rob Frugal encryption to conquer this problem, the proposed technique encompasses Paillier encryption for enhancing the security level for outsourced data with the less complexity and to protect against the forging the contents of the correspondence. FP-growth algorithm is used for generating association rules for improving the performance and for preserving a homomorphic encryption algorithm Paillier cryptosystem is being used

    Outsourcing, Data Insourcing, and the Irrelevant Constitution

    Get PDF

    Outsourcing, Data Insourcing, and the Irrelevant Constitution

    Get PDF
    Long before revelations of the National Security Agency\u27s data collection programs grabbed headlines, scholars and the press decried the burgeoning harms to privacy that metadata mining and new surveillance technologies present. Through publicly accessible social media sites, web-tracking technologies, private data mining consolidators, and its own databases, the government is just a mouse click away from a wealth of intimate personal information that was virtually inaccessible only a decade ago. At the heart of the conundrum is the government\u27s ability to source an unprecedented amount of personal data from private third parties. This trail of digital information is being insourced into government coffers with no constitutional accountability-much like governmental powers are being outsourced to private contractors without constitutional restraint. These phenomena reveal a troubling trend: the diminishment of the Constitution\u27s relevance when the government works in tandem with third parties. Outmoded Fourth Amendment doctrine offers no pathway around this problem. Nor has legislation kept apace with technological advancements to forestall abuses before they occur. Moreover, the primary theories for challenging the private exercise of public power-the private delegation and state action doctrines-rarely persuade modern courts. Rather than focusing on the privacy aspects of big data, this Article proceeds from the standpoint of the structural Constitution, and reframes existing doctrines for rendering the government constitutionally accountable for actions taken through a third party, on the theory that exclusive reliance on the political branches for the protection of individual privacy rights in the age of big data is insufficient

    Overcoming Challenges and Unlocking the Potential: Empowering Small and Medium Enterprises (SMEs) with Data Analytics Solutions

    Get PDF
    In today's data-driven business landscape, Data Analytics (DA) has emerged as a vital tool for organizations to extract insights from their existing data, enabling informed decision-making. While large enterprises have wholeheartedly embraced DA as a strategic asset for operational enhancement, SMEs have been comparatively slower in adopting these transformative solutions. To remain competitive and surpass their rivals, SMEs must recognize the significance of harnessing their data assets effectively to drive decision-making processes. This research aims to delve into the challenges hindering the adoption of DA among SMEs, particularly focusing on issues such as inadequate information infrastructure and limited awareness of the benefits that DA can offer. Furthermore, this study investigates the implementation of data analytics as a practical solution to address these challenges, providing a comprehensive analysis of both the advantages and disadvantages associated with DA adoption in the SME context. By shedding light on the untapped potential of data analytics, this research aims to empower SMEs and equip them with the necessary tools to thrive in today's digitally-driven era of business

    A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing

    Get PDF
    Cloud computing (CC) is among the most rapidly evolving computer technologies. That is the required accessibility of network assets, mainly information storage with processing authority without the requirement for particular and direct user administration. CC is a collection of public and private data centers that provide a single platform for clients throughout the Internet. The growing volume of personal and sensitive information acquired through supervisory authorities demands the usage of the cloud not just for information storage and for data processing at cloud assets. Nevertheless, due to safety issues raised by recent data leaks, it is recommended that unprotected sensitive data not be sent to public clouds. This document provides a detailed appraisal of the research regarding data protection and privacy problems, data encrypting, and data obfuscation, including remedies for cloud data storage. The most up-to-date technologies and approaches for cloud data security are examined. This research also examines several current strategies for addressing cloud security concerns. The performance of each approach is then compared based on its characteristics, benefits, and shortcomings. Finally, go at a few active cloud storage data security study fields
    corecore