scholarly journals Towards an Understanding of Privacy Management Architecture in Big Data: An Experimental Research

Author(s):  
Nick Hajli ◽  
Farid Shirazi ◽  
Mina Tajvidi ◽  
Nurul Huda
Author(s):  
Yoshinori Osawa ◽  
Satoru Imamura ◽  
Atsushi Takeda ◽  
Gen Kitagata ◽  
Norio Shiratori ◽  
...  

2020 ◽  
Vol 3 (1) ◽  
pp. 1-33
Author(s):  
Winarsih Winarsih ◽  
Irwansyah Irwansyah

AbstrakPerkembangan media sosial di Indonesia begitu pesat dengan jumlah pengguna yang  terus  meningkat.   Akan   tetapi  hal  tersebut   kurang  diimbangi   dengan kesadaran tentang privasi dalam kaitannya dengan big data yang dihasilkan oleh penyedia  layanan.  Penyedia  layanan  memberikan  kebijakan  berupa  syarat dan ketentuan  akan tetapi masyarakat  umumnya masih rendah dalam hal memiliki kesadaran  tentang privasi  data pribadi  mereka.  Penelitian  ini bertujuan  untuk mengetahui  solusi dari permasalahan  privasi  big data  dalam  media  sosial  dan dianalisis   dengan   teori  privasi   komunikasi.   Metode  yang  digunakan   dalam penelitian ini adalah metode meta-analisis yang mengolah hasil temuan dari penelitian sebelumnya. Hasil dari penelitian ini berupa solusi bagi perlindungan privasi data individu saat pembuatan, penyimpanan, dan pemrosesan data. Kata Kunci: data besar, Indonesia, kebijakan, media sosial, privasi AbstractThe development of social media in Indonesia is high increasing. However, this is not  accompanied   by  awareness   of  privacy  in  its  commitment   to  big  data generated  by service providers.  The service provider provides an agreed policy, will provide the public about their data privacy issues. This article used Communication Privacy Management to finding solution about big data privacy problems.   The  method  used  in  this  study  is  a  meta-analysis   method   that processes  the findings  from previous  studies.  The results  of this study contain solutions for privacy protection when creating data, data storage, and processing data. Keywords: big data, Indonesia, policy, social media, privacy


2019 ◽  
Vol 64 (9) ◽  
pp. 60-74
Author(s):  
Jacek Maślankowski

The goal of this paper is to present, on the one hand, the benefits for offi-cial statistics (labour market) resulting from the use of web scraping methods to gather data on job advertisements from websites belonging to big data compilations, and on the other, the challenges connected to this process. The paper introduces the results of experimental research where web-scraping and text-mining methods were adopted. The analysis was based on the data from 2017–2018 obtained from the most popular job-searching websites, which was then collated with Statistics Poland’s data obtained from Z-05 forms. The above-mentioned analysis demonstrated that web-scraping methods canbe adopted by public statistics services to obtain statistical data from alternative sourcescomplementing the already-existing databases, providing the findings of such researchremain coherent with the results of the already-existing studies.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Rui Bai

The traditional preaching way of imparting knowledge can only stifle children’s imagination, creativity, and learning initiative a little bit, which is harmful to children’s healthy and happy growth. This paper combines big data technology to evaluate the effect of game teaching method in preschool education, analyzes the teaching effect of game teaching method in preschool education, and combines big data technology to find problematic teaching points. Based on the collaborative filtering algorithm of preschool children, this paper estimates the current preschool children’s score for the game by referring to the scores of neighbor preschool children on the predicted game and constructs an intelligent model. Finally, this paper combines experimental research to verify the model proposed in this paper. From the experimental research, it can be seen that the method proposed in this paper has a certain effect.


Author(s):  
Karthika K. ◽  
Devi Priya R. ◽  
Sathishkumar S.

Various unimaginable opportunities and applications can be attained by the development of internet-connected automation. The network system with numerous wired or wireless smart sensors is called as IoT. It is showing various enhancement for past few years. Without proper security protection, various attacks and threats like cyberattacks threat causes serious disaster to IoT from the day it was introduced. Hence, IoT security system is improvised by various security and the management techniques. There are six sections in security management of IoT works. IoT security requirement is described intensively. The proposed layered of security management architecture is being defined and explained. Thus, this proposed architecture shows the security management system for IoT network tight security management for a network of the IoT which is elaborately explained with examples and about GDPR. In information security, intrusion recognizable proof is the showing of placing exercises that attempt to deal the protection, respectability, or availability of a benefit.


Sign in / Sign up

Export Citation Format

Share Document