期刊文献+

数据挖掘中的隐私问题与限制接近/控制理论 被引量:3

Privacy problems in Data Mining and the Restricted Access/Limited Control Theory of Privacy
原文传递
导出
摘要 大数据时代,数据挖掘技术得到广泛应用,但也引起了人们对个人隐私问题的担忧。数据挖掘技术引发的隐私问题具有独特性,给传统隐私理论提出了挑战。通过研究,分析了传统隐私理论在解释数据挖掘中的隐私问题时的理论困境,介绍了摩尔(James H.Moor)和塔瓦尼(Herman T.Tavani)的限制接近/控制理论及其对数据挖掘中隐私问题的解决,阐述了该理论在应用于数据挖掘中隐私问题时的优点和不足。 In the era of big data,data mining technology is widely used, but also arouses people' s concerns about privacy issues. Because privacy problems caused by data mining technology has its particularity, data mining technology has posed challenges to the traditional theory of privacy. Through research, this paper analyzes the theoretical dilemma of the traditional privacy theory in explaining the privacy problems of data mining, introduces Moor and Tavani' s the Restricted Access/Limited Control theory of privacy and its solution to the privacy problems in data mining,and elaborates the theory's advantages and disadvantages in the practice of data mining.
出处 《自然辩证法研究》 CSSCI 北大核心 2017年第5期103-107,共5页 Studies in Dialectics of Nature
关键词 数据挖掘 困境 限制接近/控制理论 Data mining Dilemma The Restricted Access/Limited Control Theory of Privacy
  • 相关文献

参考文献3

二级参考文献17

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2(美)Adam N R, Jones D H.Security of statistical databases with an output perturbation techiniqueournal[J].Journdl of Management and Information Systems,1989, 6 (1): 101-110.
  • 3Bonnorris S. autionary notes for the automated processing of data[J].EEE Expert, 1995,10(2): 53-54.
  • 4(美)Clifton C,Marks D.Security and Privacy implications of data miningn[R].In SIGMOD workshop on Data Mining and Knowledge Discovery, Montreal, Canada, June 1996. ACM.
  • 5杨玉麟,曹美琴.论数据挖掘与公民信息隐私权的冲突与调适[J].高校图书情报论坛,2007,6(3):44-46. 被引量:1
  • 6刘先红.论数据挖掘中的个人数据隐私权问题[J].大众科技,2007,9(11):80-81. 被引量:2
  • 7X. Feng,J. C. Zhao,K. Xu.Link prediction in complex networks: a clustering perspective[J].The European Physical Journal B.2012(1)
  • 8Vaidya, Jaideep,Atluri, Vijayalakshmi,Warner, Janice,Guo, Qi.Role Engineering via Prioritized Subset Enumeration[J].IEEE Transactions on Dependable and Secure Computing.2010(3)
  • 9Linyuan Lü,Tao Zhou.Link prediction in weighted networks: The role of weak ties[J].EPL (Europhysics Letters).2010(1)
  • 10Huiping Guo,Yingjiu Li,Anyi Liu,Sushil Jajodia.A fragile watermarking scheme for detecting malicious modifications of database relations[J].Information Sciences.2005(10)

共引文献732

同被引文献26

引证文献3

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部