Some Studies on Web Mining Ethical Issues and Challenges [PDF]

seriousness of these ethical issues should be a joint responsibility of Internet users and organizations. Keywords-- Dat

0 downloads 4 Views 391KB Size

Recommend Stories


Ethical Issues
Suffering is a gift. In it is hidden mercy. Rumi

Ethical Issues
Don't ruin a good today by thinking about a bad yesterday. Let it go. Anonymous

Challenge studies of human volunteers: ethical issues
So many books, so little time. Frank Zappa

SME Issues, Challenges and Prospects SME Issues, Challenges and Prospects
Be who you needed when you were younger. Anonymous

Literature Review on Web Mining
The best time to plant a tree was 20 years ago. The second best time is now. Chinese Proverb

Ethical Issues in Six
And you? When will you begin that long journey into yourself? Rumi

Pharmacogenetics, ethical issues
Suffering is a gift. In it is hidden mercy. Rumi

[PDF] Download Ethical Issues in Modern Medicine
Almost everything will work again if you unplug it for a few minutes, including you. Anne Lamott

Moral and Ethical Issues and Dilemmas
Don't watch the clock, do what it does. Keep Going. Sam Levenson

Commerce Education in India : Issues and Issues and Challenges Challenges Challenges
When you talk, you are only repeating what you already know. But if you listen, you may learn something

Idea Transcript


International Journal of Trend in Research and Development, Volume 3(4), ISSN: 2394-9333 www.ijtrd.com

Some Studies on Web Mining Ethical Issues and Challenges 1

1,2,3

Dr.A.Siva Prasad, 2Dr.CH.V.M.K.Hari and 3R.Venkateswara Rao Department of Computer Science, Dr.V. S. Krishna Government Degree College, Visakhapatnam, Andhra Pradesh, India

Abstract: Web is a system changed the world for distributing data. Its revolution dictating the world economy. No business, no company, left intact. The technology has a wide range of choices and vital to the success of the organization in decision-making. Any business units that have large amounts of information, because the web technology. The data is extracted from the vast amounts of information. The ultimate goal of the general system of knowledge mining to extract knowledge from existing data for future use is applied to set up the structure. Privacy and personal values of individuals has to be in consideration to make sure you are treated fairly and to justice. Bearing this in mind the seriousness of these ethical issues should be a joint responsibility of Internet users and organizations. Keywords-- Data Mining, Data Mining, Privacy, Ethics. I.

INTRODUCTION

A. Information types: According to information from the Web or from the website information (Juan D. Velásquez,2013) has classified in three different sources. 1. Information: objects of type a web page, is different types of image, free text, sound average, etc. 2. Hierarchy of documents: Mining structure, and aim to fully investigate how different Web documents are joined 3 Log: Transaction data is entered in the Web server shows all. Often this type of information, called as user activity data to what is known as navigation the user is visiting, while the user was on the page (Garrie and Wong, 2007). II.

INTIMIDATION OF WEB MINING

To obtain the necessary information, the web mining technology has to overcome the fundamental problem (Jiawei Han, Kevin Cheng Chuan, 2002) . It will play an important role in keyword, address and link content-based web search, and are compatible. However, these search engines is still high-quality, intelligent service (S. Brin and L. Page, 1998). Complete privacy, will not be able to get in the electronic age. Doing, e-commerce government transactions, card or ATM transactions are the source of information about your daily activities. In any processing system, it is expected that the private sector knowledge of misuse or abuse by an external entity. In most cases, public data processing and business applications, people, under the leadership of the region, in order to provide useful results for the organization and the society was claimed. It is not possible to be a help a average customer sensitivity and knowledge misuse (La Paz, et al., 2002).It is a very difficult one to decide the court rules that protect the IJTRD | Jul-Aug 2016 Available [email protected]

confidentiality, data processing applications by reducing the likelihood of various strategies, to find solutions to these issues. In terms of the legal definition of privacy is a difficult process. Complete privacy is not an inherent part of any society participation in society it requires interaction with communication, which makes the unattainable absolute privacy (Gavison 1984). Obtained Information from a diversity of sources may be from formal databases created particularly for the analysis of crime and intelligence data (Colleen Mc,2015). There are different types of knowledge might be effective in the context of fault prevention, examination or prosecution and victim protection, such processes inevitably raise significant concerns particularly in relation to privacy and data security (Felicity Gerry QC et al,2016). A. Secure Data Exchange A sender wishes to transmit a secret to a receiver through a communication (Jérôme Renault et al,2014) Organizations without compromise, should do secure information exchange between and share information for mutual benefit (Clifton, Kantarcioglu, physician, Lin and Zhu 2002). In order to protect the privacy of individuals and organizations use data scrambling version. And avoid the illegal extraction of information which is available in the work. Net user‟s causes problem, the protection of privacy should be one of the policy of shoppers shopping center, as there is a fact that they give us hope of buying online. Therefore, they to guarantee the confidentiality of data(Mehmet Cudi OKUR,2008). Nowadays the requirements of web shopping are increasing. But credit card scam has been serious, and have their own problems (Fang-Yie Leu et al,2015 ) B. Privacy Issues Mason(1986), was the first person forecasted the risk personal privacy was an initial factor and the ability to use a personal computer. Existing privacy preserving techniques like, anonymization requires dataset can be divided into attributes like, sensitive attributes, quasi identifiers, and non-sensitive attributes(Brijesh B. Mehta,2), Olson, D.L stated that Data mining is a very important tool, but requires detailed data about customers. Levine (2003) examined a number of factors of privacy, as shown in Table2.1 Privacy Factors Issue

Role

Informed approval

Permission enquired

individuality development

Private reflection and experimentation for growth

496

International Journal of Trend in Research and Development, Volume 3(4), ISSN: 2394-9333 www.ijtrd.com prevention of discrimination

Laws insufficient for personal protection

Division

Market, family, religion, politics, other relationships separated

Although several occasions proved relation of privacy and technology have to come together, to focus the IT business, basing on the nature of information, the data utility (Clifton et al., 2002, Dutta et al., 2011), and also the business benefits (Cohen, 1999). Under this criterion, a comparison of private advantage of privacy with the advantages to society of the availability of information is meant (Wilson, 2006). C. Privacy threatened by web-data mining This is to protect Internet users' privacy . Privacy is our understanding, however, is conceptually fragile. The word "privacy" deals with social behavior and domain( Johnson, 2001).When data is made unidentified before producing the profile, however, the information discovered is no longer linked to person, and there is a direct sense of the violation of privacy because the profiles do not contain personal data "real" (Vedder 2001) (Juan D. Velásquez,2013). The majority of research is on data security and which is not suitable for firms that outsource their business operations and the used threat models particular aspects of threats and attacks, which show the use of multiple steps to thief and misuse the information, and depend on the type of the stolen information (Yosra Miaoui et al,2015). D. Content and structure mining We must conclude that little can be done to limit the risk , of the possible misuse of data content and structure of the web, and for the solution. Since public mining personal data on the web has not been prevented with legal measures and monitoring of web content mining activity. This, however, it is very difficult to know exactly, Monitoring should be conducted by independent organizations, and support for companies, without the support of the miners, you can hide the fact so easily in the Web data mining activities(Lita van Wel and Lamber Royakkers,2004). E. Log mining E-commerce is growing rapidly with time in terms of both business and data. Many of them rely on these websites to attract new customers and retain the existing ones. In order to achieve this goal web log files can be used that records customer's access patterns (Prajyoti Lopes, Bidisha Roy,2015 )Interesting web data usage patterns understands better to meet the needs of Webbased applications.. Using this data, Web site browsing behavior with his or her identity or the origin of the web user helps to capture needs of the client(Lita van Wel and Lamber Royakkers,2004). The analyses of these log file allow us to confirm that this type of activities provide a trivial support for a focused and active learning (Jordi Cuadros et al,2015). Web usage is considered to be classified: Data Web Server: The rise of usage of information has given new opportunities for analyzing, visualizing, and interacting with data across the sciences, and biodiversity science is no exception IJTRD | Jul-Aug 2016 Available [email protected]

(Julia Janicki, 2016), the user logs are collected by the web server. Typical data IP address, reference and use is included in the pages of time. Application Server data: This feature keeps track of various types of sequence of business events; it has the ability to record in the application as server log and helps us to improve the business You can protect the privacy of web users by privacy protection tool, and web user has a possibility to make decisions based on information. Companies and organizations must inform customers about what is collecting the information and how it is used(Scribbins,2001), the customer companies and organizations will inform about it, there is a possibility to help users understand the privacy policy . III. WEB MINING AND RESEARCH CHALLENGES With the rapid development of online information, the World Wide Web (WWW) is a right area of data mining. Using different tools and data mining techniques via the Internet is termed web mining(Md. Zahid Hasan et al,2012). Web mining is used to solve the problems of information related. A. Process Mining Process mining is a process management and data analysis techniques are used to find the link between information and model. Businesses have adopted process management approaches such as business process re-engineering (BPR) and Six Sigma for their survival and growth (Sungbum Park, Young Sik Kang,2016). Mining process is to extract information from the event log on the way to capture the business process as to when it is being executed. For example, in any store point of sale based on market data collected provides only the end of the process. The overall objective of any online store's final stage to maximize the probability of reaching each visit or expected to maximize sales. B. Threat Analysis It is one more challenge of data mining. Softwares are available for doing data mining to detect violations of credit card. Researchers should have a challenge to build a model in real time. The challenge is necessary for many companies they have exchanges with external companies(Md. Zahid Hasan et al,2012), like insurance, credit cards, and detection of telecommunications fraud is very concerned about both researchers particular organization (Sankar K. Pal et al.2002). present approaches to risk management s need for dynamics approaches to risk detection as part of a planned resource application aimed at reducing the expected penalty of undesired outcomes for the object of the estimation (J.H. Powell et al,,2016) C. Semantic Web Mining E-commerce has grown rapidly and a good E-Commerce website has become indispensable for every commerce based organization. However these industries are helpful in developing countries like India, as it is still lagging behind to satisfy the demanding and dynamic needs of consumers (Neha Verma et

497

International Journal of Trend in Research and Development, Volume 3(4), ISSN: 2394-9333 www.ijtrd.com al,2015).Semantic Web mining and Web mining are research areas of rapid development is intended to combine two areas of study. Researchers on the web by searching for semantic structure, both in the area of web mining results are eager to improve. Security and confidentiality of such information and knowledge management and search, a lot of areas of the industry as these research activities (Al. Gerd Stumme et, 2006) (Md. Zahid Hasan et al,2012).

[12]

[13] [14]

CONCLUSION To keep the tempo with technical challenges and World Wide Web becomes an increasingly important part of present society; firms of all kinds are making efforts to use web mining for several purposes. Many of these effects are commercial in nature, since there is money involved in gathering and intelligent analysis of information about people. While most of the benefits go to the web mining, web users may face the problems of web data mining. Companies can hide their ultimate goals fairly and gather information easily in obtaining certain bits of information. Knowingly or unknowingly, consumers publish private data like Credit or debit card transactions, ATM visits, web site browsing and purchases in day to day activities. References [1]

[2]

[3]

[4] [5]

[6]

[7]

[8]

[9]

[10]

[11]

Garrie, D., & Wong, R. (2007). The future of consumer web data: a european/us perspective. International Journal of Law and Information Technology, 15,129– 152. Jiawei Han,Kevin,Chen-Chuan Chang "Data Mining for Web Intelligence" IEEE International Conferensce on Data Mining, 2002 S. Brin and L. Page, ―The Anatomy of a Large-Scale Hypertextual Web Search Engine,‖ Proc. 7th International World Wide Web Conf. (WWW98), ACM Press, New York, 1998, pp. 107-117. Gavison, R. (1984), Privacy and the limits of the law in „(?)‟, pp. 332–351. Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X.& Zhu, M. (2002), „Tools for privacy preserving data mining‟, SigKDD Explorations 4(2), 28–34. Mason, R. (1986) „Four ethical issues of the information age‟, MIS Quarterly, Vol. 10, No. 1, pp.5– 12. Sama, L.M. and Shoaf, V. (2002) „Ethics on the web: applying moral decision-making to the new media‟, Journal of Business Ethics, Vol. 36, Nos. 1–2, pp.93– 103. Levine, P. (2003) „Information technology and the social construction of information privacy: comment‟, Journal of Accounting and Public Policy, Vol. 22, pp.281–285. Black, J., Hashimzade, N., & Myles, G. (2009). A dictionary of economics. USA: Oxford University Press. Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X.& Zhu, M. (2002), „Tools for privacy preserving data mining‟, SigKDD Explorations 4(2), 28–34. Cohen, J. (1999). Examined lives: informational privacy and the subject as object. Stanford Law Review, 52, 1373–1417.

IJTRD | Jul-Aug 2016 Available [email protected]

[15]

[16]

[17]

[18] [19]

[20]

[21]

[22]

[23]

[24]

[25]

[26]

Wilson, J. (2006). Health insurance portability and accountability act privacy rule causes ongoing concerns among clinicians and researchers. Annals of Internal Medicine, 145, 313–316. D.G. Johnson. Computer Ethics, 3rd. edition. PrenticeHall,Upper Saddle River New Jersey, 2001. A. Vedder. KDD, Privacy, Individuality, and Fairness. In R. Spinello and H. Tavani, editors, Readings in CyberEthics,pages 404–412. Jones and Bartlett, Sudbury MA, 2001 K. Scribbins. Privacy@net, An International Comparative Study of Consumer Privacy on the Internet. Consumers International(http://www.consumersinternational.org/ne ws/press releases/fprivreport.pdf), 2001. Sankar K. Pal, Varun Talwar, and Pabitra Mitra, "Web Mining in Soft Computing Framework: Relevance, State of the Art and Future Directions", IEEE transactions on neural network, Vol. 13, No. 5, September 2002, pp.1163-1177. Gerd Stumme ,Andreas Hotho , Bettina Berendt, “Semantic Web Mining”, Journal of Web Semantics: Science, Services and Agents on the World Wide Web, Vol.4 Issue 2, June, 2006, pp. 124-143. Colleen McCu,Data Mining and Predictive Analysis (Second Edition), 2015, Pages 75-106 Felicity Gerry QC, Julia Muraszkiewicz, Niovi Vavoula ,Computer Law & Security Review,,The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns, Volume 32, Issue 2, April 2016, Pages 205-217 Fang-Yie Leu, Yi-Li Huang, Sheng-Mao Wang ,A Secure M-Commerce System based on credit card transaction ,Electronic Commerce Research and Applications, Volume 14, Issue 5, September–October 2015, Pages 351-360 Jérôme Renault, Ludovic Renou, Tristan Tomala , Secure message transmission on directed networks , Games and Economic Behavior, Volume 85, May 2014, Pages 1-18 Brijesh B. Mehta, Udai Pratap Rao,Privacy Preserving Unstructured Big Data Analytics: Issues and Challenges ,Procedia Computer Science, Volume 78, 2016, Pages 120-124 Yosra Miaoui, Noureddine Boudriga, Ezzeddine Abaoub, Economics of Privacy: A Model for Protecting Against Cyber Data Disclosure Attacks , rocedia Computer Science, Volume 72, 2015, Pages 569-57. Jordi Cuadros, Carme Artigas, Fina Guitart, Francesc Martori ,Analyzing a Virtual-Lab Based Contextualized Activity from Action Logs ,Procedia - Social and Behavioral Sciences, Volume 182, 13 May 2015, Pages 441-447. Prajyoti Lopes, Bidisha Roy ,Dynamic Recommendation System Using Web Usage Mining for E-commerce Users,Procedia Computer Science, Volume 45, 2015, Pages 60-69. Julia Janicki, Nitish Narula, Matt Ziegler, Benoit Guénard, Evan P. Economo,Visualizing and interacting with large-volume biodiversity data using client– server web-mapping applications: The design and

498

International Journal of Trend in Research and Development, Volume 3(4), ISSN: 2394-9333 www.ijtrd.com [27]

[28]

[29]

[30]

implementation of antmaps.org ,Ecological Informatics, Volume 32, March 2016, Pages 185-193. Sungbum Park, Young Sik Kang ,A Study of Process Mining-based Business Process Innovation ,Procedia Computer Science, Volume 91, 2016, Pages 734-743. J.H. Powell, N. Mustafee, A.S. Chen, M. Hammond ,System-focused risk identification and assessment for disaster preparedness: Dynamic threat analysis ,European Journal of Operational Research, Volume 254, Issue 2, 16 October 2016, Pages 550-564 Neha Verma, Dheeraj Malhotra, Monica Malhotra, Jatinder Singh ,E-commerce Website Ranking Using Semantic Web Mining and Neural Computing ,Procedia Computer Science, Volume 45, 2015, Pages 42-51. Md. Zahid Hasan, Khawja Jakaria Ahmad Chisty and Nur-E-Zaman Ayshik, Research Challenges in Web Data Mining, International Journal of Computer Science

IJTRD | Jul-Aug 2016 Available [email protected]

[31] [32]

[33]

[34]

[35]

and Telecommunications [Volume 3, Issue 7, July 2012] Peter Fule and John F. Roddick, Detecting Privacy and Ethical Sensitivity in Data Mining Results Olson, D.L. (XXXX),„Ethical aspects of web log data mining‟, Int. J. Information Technology and Management, Vol. X, No. Y, pp.XXX–XXX. Lita van Wel and Lamber Royakkers , Ethical issues in web data mining, Ethics and Information Technology 6: 129–140, 2004. Mehmet Cudi OKUR ,ON ETHICAL AND LEGAL ASPECTS OF DATA MINING,Journal of yasar university,2008 Juan D. Velásquez ,Web mining and privacy concerns: Some important legal issues to be consider before applying any data and information extraction technique in web-based environments, Expert Systems with Applications 40 (2013)

499

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.