Ask a question from expert

Ask now

ITC571 Assignment on Emerging Technology and Innovations

6 Pages2900 Words317 Views
   

Emerging Technologies and Innovation (ITC571)

   

Added on  2019-10-09

ITC571 Assignment on Emerging Technology and Innovations

   

Emerging Technologies and Innovation (ITC571)

   Added on 2019-10-09

BookmarkShareRelated Documents
Annotated Bibliography Length: 2000 words (10-12 pages)*** The higher penalty will be applied if similarity (plagiarism) percentagegoes beyond 25%.Full NameStudent IDSubjectITC571 – Emerging Technology and InnovationsAssignment NoAnnotated BibliographyDue Date26-April-2018Lecturer’s NameMalka N. HalgamugeA Review on Security and Privacy Challenges ofBig DataYour Name Your EmailSchool of Computing and Mathematics, Charles Sturt University, Melbourne, VictoriaAbstract -This section will be completed in the final report.Key Words— Natural hazards, large flood events, flood risk assessment metrics, flood hazardsI.INTRODUCTIONThe Introduction section should contain literature citations to discuss other similar proposals.* CSU expect 12-15 references for this section (in-text citation is compulsory). e.g.http://www.citethisforme.com/us/bibliography-basics/what-is-a-citation/in-texthttps://www.youtube.com/watch?v=R5igNRmKLugBelow is the rough guide to follow the structure of theBibliography(Introduction).Please also follow the Introduction section of the attached papers from HD students of this subject.Rough Guide to the Structure of theAnnotated Bibliography(Introduction),as follows:
ITC571 Assignment on Emerging Technology and Innovations_1
Section 1: Significance of the researchThe selected topic is interesting and useful as it the field of big data is constantly growing and therefore there is a need to understand the impact it is likely to have on the population. Section 2: How original is the approach?The current approach is focused on assessing twelve research papers and then building the aim for the research. Section 3-4: Literature review in the area what you are workingThe current section focuses on assessing various research works that are related to the topic under consideration, that is, the security and privacy challenges of big data. Big Data is new on the technological horizon and even then lots of studies various forms of studies have been conducted on this aspect considering its future potential. The first study selected for the assessment is from Kaisler et al [1]. The paper has assessed the issues and challenges that are being faced by big data in the current scenario and issues it is expected to face in the future. The researchers have focused on assessing the storage aspect of the big data. There are various characteristics of big data that have been mentioned by the researchers that pose challenge in managing the data and they are volume, velocity, variety, value, and complexity. The storage and management of data pose challenge to the organizations who are willing to utilize vast nature of the data. The research method adopted by the researchers were secondary in nature and the researchers mostly referred to the studies conducted by the other researchers in the same field.The second study considered is by Lu et al [2]. The paper is concerned with assessing the efficiency and privacy of the big data computation. The paper is very close to the current selected topic. The researchers have stated that the big data can be used for the data mining and making decisions that are beneficial to the intended goals of the user. While stating this aspect, the researchers have displayed concern regarding the security and privacy challenges of the big data. They have stated that the authenticity of the data leads to convincing results. However, if there is lack in the security and privacy of the data, then there is the likelihood that the people would not be comfortable in releasing their personal data to the various entities for any form of assessment or analysis. The methodology adopted by the researcher depended on the secondary sources such as the industry defined data and the studies conducted by the previous researchers. The paper identified various big data privacy and security caveats.The third study considered is by Tene and Polonetsky [3] regarding the privacy and user control in relation to the big data and analysis. On theoretical point of view, this paper is closely related to the topic of current paper. The researchers stated that privacy concerns arise when data deluge takes place. The study methodology adopted by the researchers were based on the various government policy documents and the studies of the previous researchers. The researchers have concluded that there is a need to build appropriatebalance between the usage of the data and the privacy management of the users. The paper has suggested that the policymakers should focus on the key aspects of laws that protect the privacy of the individuals. The fourth study considered is by Rubinstein [4] that has conducted the secondary study on whether the emergence of big data will end the privacy of the users or it can be new beginning of something. The paper has reached to the conclusion that building privacy laws is important in order to push the organizations that rely on the big data analytics for their business to take care of the data retrieval and management. The paperalso put forth the argument that the current policies regarding the data privacy are not in the line the development in this field. Therefore, there is a need to revisit the policies built and makes changes in line tothe recent development.
ITC571 Assignment on Emerging Technology and Innovations_2
The fifth study considered is by Cuzzocrea et al [5]. The current paper has focused on general data storage and warehousing in relation to the big data. However, it has also focused on the data security aspects. The paper has not specifically focuses on the selected topic of privacy and security alone but has covered this aspect too. The researchers have focused on OLAP data cubes and state that the data security is very important as the data structure of OLAP are open by definition. This leads to the necessity of enforcing the security and privacy aspect in OLAP data cubes whether it is in open information system or for the cloud data storage. The sixth study considered is by Hasan et al [6]. The paper has focused on the privacy challenges that are related to user profiling in the big data aspects. User profiling is concerned with collection of information of an individual for the purpose of profile development. The researchers state that the big data aspects allow the organizations to build rich user profiles that are used successfully in the projects such as recommender systems. It has been suggested that as the information that are used by the systems are personal in nature, it is important that the user data is secured. The paper has considered secondary sources for the study and after several studies, the paper has suggested several aspects that can be implemented in order to ensure that the data privacy and security is implemented. They are giving privacy guarantees, flexible policies, evaluation of trust and reputation, content anonymizing, requesting unlinking, and unlinking the origin of the information. The seventh study considered is by Patil and Seshadri [7] on big data privacy and security. The researchers have considered the healthcare sector as the ground of study. The researchers have stated that the big data in the healthcare is getting more important than before. With the emergence of various data collection points, the reasons for data collections have increased substantially. The industry is depending on the prompt data and information delivery technology in order to ensure that the service delivery to the target consumer is increased. The researchers have considered secondary sources for to achieve their research objective. The researchers concluded in the end that the privacy and security of the patient information is ofparamount importance. The use of secure patient data in real-time has been recommended to ensure that theproactivity in healthcare and wellness is increased. The eighth study considered is by Lu et al [8] which assess the information security in relation to the big data. The paper has focused on reviewing the privacy issues that are related with the data mining. The researchers identified four types of users that result into data generation, namely, data provider, collector, miner, and maker. The researchers have discussed privacy concern for each of them. The paper has used the secondary sources for the data and information collection for the study. The paper finally concludes thatthe study from the perspective of the four user types. It states that the privacy for the data provider is non-revelation of the personal sensitive data. The data collectors’ concern is releasing the information in a manner that it does not hamper the privacy of the users. The data miner’s concern is to identify correct data to mine which can be achieved through the usage of secure computation protocols. The decision makers focus on assessing the credibility of the data sourced.The ninth study considered is by Kshetri [9] which assesses the impact of the big data on the consumer’s privacy, security and welfare. The paper has used the secondary sources to achieve the research goal. The researcher has stated that the different set of consumers expect different levels of privacy and security concerns. The paper has identified that the customers have different privacy choices where some can be found to overly concerned with the privacy issues and at the same time other set of customers can be found with limited concern of the privacy aspects. But as per the security aspects are concerned people have samelevel of concern.
ITC571 Assignment on Emerging Technology and Innovations_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Annotated Bibliography : Sustainable Engineering
|6
|1681
|24

Big Data Challenges in IOT and Cloud Assignment
|14
|4998
|315

Data & Web Mining CA1.
|2
|422
|300

1: Why do research problems have to be specific?
|2
|752
|1297

Report On Current Hot Topics In Information Security
|4
|2178
|140

Challenges & Opportunities of Wireless Technology in IoT Applications For People
|10
|2875
|262