Risk Assessment of Error-Prone Personal Information in Data Quality Tools

2011 ◽  
Vol 6 (2) ◽  
Author(s):  
Cihan Varol ◽  
Coskun Bayrak
2018 ◽  
Vol 6 (10) ◽  
pp. 193
Author(s):  
Abdurrahman Kirtepe

In this study, the risk assessment levels of athletes in different branches were examined in terms of various variables. Descriptive scanning model was used in the study. In the research, the survey was completed with a sample method of 105 people. The questionnaire was used as a data collection tool in the research. The questionnaire consists of questions about personal information and the Risk Assessment scale for athletes and coaches. Data analysis was performed in SPSS 21 package program. Descriptive statistics such as frequency, percent, and mean, standard deviation, minimum and maximum were used in data analysis. Data analysis was performed in SPSS 21 package program. Descriptive statistics such as frequency, percent, and mean, standard deviation, minimum and maximum were used in data analysis. As a result of the research, it was determined that the risk assessment perceptions of athletes according to their age, branches, educational status and income status did not differ. As a result of the research, it was determined that the risk assessment perceptions of athletes according to their age, branches, educational status and income status did not differ.


Author(s):  
Siani Pearson ◽  
Tomas Sander

Regulatory compliance in areas such as privacy has become a major challenge for organizations. In large organizations there can be hundreds or thousands of projects that involve personal information. Ensuring that all those projects properly take privacy considerations into account is a complex challenge for accountable privacy management. Accountable privacy management requires that an organization makes sure that all relevant projects are in compliance and that there is evidence and assurance that this actually is the case. To date, there has been no suitable automated, scalable support for accountable privacy management; it is such a tool that the authors describe in this chapter. Specifically, they describe a privacy risk assessment and compliance tool which they are developing and rolling out within a large, global company – called HP Privacy Advisor (HP PA) – and its generalisation and extension. The authors also bring out those security, privacy, risk, and trust-related aspects they have been researching related to this work in particular.


Data Mining ◽  
2013 ◽  
pp. 1496-1518 ◽  
Author(s):  
Siani Pearson ◽  
Tomas Sander

Regulatory compliance in areas such as privacy has become a major challenge for organizations. In large organizations there can be hundreds or thousands of projects that involve personal information. Ensuring that all those projects properly take privacy considerations into account is a complex challenge for accountable privacy management. Accountable privacy management requires that an organization makes sure that all relevant projects are in compliance and that there is evidence and assurance that this actually is the case. To date, there has been no suitable automated, scalable support for accountable privacy management; it is such a tool that the authors describe in this chapter. Specifically, they describe a privacy risk assessment and compliance tool which they are developing and rolling out within a large, global company – called HP Privacy Advisor (HP PA) – and its generalisation and extension. The authors also bring out those security, privacy, risk, and trust-related aspects they have been researching related to this work in particular.


2019 ◽  
Vol 214 ◽  
pp. 01030
Author(s):  
Juraj Smiesko

An integrated system for data quality and conditions assessment for the ATLAS Tile Calorimeter is known amongst the ATLAS Tile Calorimeter as the Tile-in-One. It is a platform for combining all of the ATLAS Tile Calorimeter offline data quality tools in one unified web interface. It achieves this by using simple main web server to serve as central hub and group of small web applications called plugins, which provide the data quality assessment tools. Every plugin runs in its own virtual machine in order to prevent interference between the plugins and also to increase stability of the platform.


2009 ◽  
Vol 55 (3) ◽  
pp. 276-280 ◽  
Author(s):  
A. Küster ◽  
J. Bachmann ◽  
U. Brandt ◽  
I. Ebert ◽  
S. Hickmann ◽  
...  

Author(s):  
Norman E Fenton ◽  
Scott McLachlan ◽  
Peter Lucas ◽  
Kudakwashe Dube ◽  
Graham A Hitman ◽  
...  

AbstractConcerns about the practicality and effectiveness of using Contact Tracing Apps (CTA) to reduce the spread of COVID19 have been well documented and, in the UK, led to the abandonment of the NHS CTA shortly after its release in May 2020. We present a causal probabilistic model (a Bayesian network) that provides the basis for a practical CTA solution that addresses some of the concerns and which has the advantage of minimal infringement of privacy. Users of the model can provide as much or little personal information as they wish about relevant risk factors, symptoms, and recent social interactions. The model then provides them feedback about the likelihood of the presence of asymptotic, mild or severe COVID19 (past, present and projected). When the model is embedded in a smartphone app, it can be used to detect new outbreaks in a monitored population and identify outbreak locations as early as possible. For this purpose, the only data needed to be centrally collected is the probability the user has COVID19 and the GPS location.


2002 ◽  
Vol 3 (1) ◽  
Author(s):  
Martin R. Gibbs ◽  
Graeme Shanks ◽  
Reeva Lederman

In this paper we use an Information Systems (informatics) perspective to critically examine legislation designed to regulate the way private sector organizations collect, store, use, and disclose personal information. We focus on The Privacy Amendment (Private Sector) Act 2000 (Cth), which has recently been enacted in Australia. We argue that the ability of organizations to respond to the requirements of this legislation is affected by the data quality of the personal information they possess. In particular, this paper examines one problem associated with data quality that erodes an organization's ability to comply with legislation designed to protect the information privacy of individuals – the fragmentation of customer data across multiple databases owned and maintained by separate functional units within an organization. Given the ubiquity of these kinds of data quality problems we conclude that current legislative regimes to regulate private sector use of personal information in countries such as Australia and European Union member states can lead to contrary outcomes resulting in legislation that is either unenforceable or acts to encourage the development of high-quality, integrated customer databases that have the potential to erode information privacy. We believe that new models able to grapple with management of personal information in distributed, mobile and ubiquitous computing environments need to be developed.


Sign in / Sign up

Export Citation Format

Share Document