ITC571 Project: Ethical Methodologies for Secure Big Data
VerifiedAdded on 2025/04/21
|7
|1016
|459
AI Summary
Desklib provides past papers and solved assignments. This project explores ethical solutions for big data privacy and security.

Proposal for ITC571
Student Name and ID
Project area Privacy and security of big data
Type of Project Review
Technology Big data technology
Technique Illustration technique
Domain Ethical methodology
Project name Ethical methodologies for enhanced privacy and security of big data
Keywords Privacy, security, big data, ethical
1. Introduction Background
Information,
Issues, and
Current Solutions
1. In online dais, the insecure data privacy and security is also innate in the system
which operates Big data technology. This technology works in relation to a system and
develops a developed log about the actions enchanting place. On the basis of this
system an important formula can improve the security and quality of the system which
is utilized this technology is not impermeable. There are many ways to hacked and
controlling the information, the main point is the massive losses of the system that is
using it.
The issues of using big data can be divided into three parts.
1. Lack of data analysis
2. Lack of Complex data security and personal information
3. Data ownership rights
All systems and platforms are not focused on a specific solution. But recently, use the
network firewall to avoid threats to continue running big data.
Shortcomings/
limitations in the
current /existing
solutions
2. There is the sum of malevolent elements that can cross firewalls so, using only
firewalls is not the solution to this problem. Apart from that, in a network device that has
installed keyloggers, that can put the entire system in risk. Only using a network firewall
Student Name and ID
Project area Privacy and security of big data
Type of Project Review
Technology Big data technology
Technique Illustration technique
Domain Ethical methodology
Project name Ethical methodologies for enhanced privacy and security of big data
Keywords Privacy, security, big data, ethical
1. Introduction Background
Information,
Issues, and
Current Solutions
1. In online dais, the insecure data privacy and security is also innate in the system
which operates Big data technology. This technology works in relation to a system and
develops a developed log about the actions enchanting place. On the basis of this
system an important formula can improve the security and quality of the system which
is utilized this technology is not impermeable. There are many ways to hacked and
controlling the information, the main point is the massive losses of the system that is
using it.
The issues of using big data can be divided into three parts.
1. Lack of data analysis
2. Lack of Complex data security and personal information
3. Data ownership rights
All systems and platforms are not focused on a specific solution. But recently, use the
network firewall to avoid threats to continue running big data.
Shortcomings/
limitations in the
current /existing
solutions
2. There is the sum of malevolent elements that can cross firewalls so, using only
firewalls is not the solution to this problem. Apart from that, in a network device that has
installed keyloggers, that can put the entire system in risk. Only using a network firewall
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

is not a proper solution. To address all three securities and privacy related issues of big
data encourage for the investigation.
Importance of
solving this
problem
3. Using a platform on big data continue tagging, loading and streaming, there needs to
be a proper solution of big data and related to security and privacy to it. Big data is the
huge reason to be exposed to dangerous elements for the platform, system and
involved individuals. Get the output in partial or complete loss of sensitive data as
financial and personal.
2. The Main objective
and purpose of this
research
The aims and objectives of this research paper are:
1. Evaluate the data integrity for big data protection
2. Using ethical technique for data ownership rights
3. Latest ethical methodologies and technologies can improve security and privacy for big data
2. The research purpose is to secure and improve privacy practices of big data by using various ethical methodologies. The
big data security can be improved with the help of an illustration technique which helps in dividing the information into
different pairs.
3. Questions need to be
answered
Research Questions:
The questions are created on the basis of the objectives of the research. This study will be conducted on
the basis of following questions:
What type of data is required to be analysed?
What type of data is more relevant to conduct this study, functional or structural? Why?
What type of data in available related to the research area?
How can data be visualized and merged in an effective manner?
data encourage for the investigation.
Importance of
solving this
problem
3. Using a platform on big data continue tagging, loading and streaming, there needs to
be a proper solution of big data and related to security and privacy to it. Big data is the
huge reason to be exposed to dangerous elements for the platform, system and
involved individuals. Get the output in partial or complete loss of sensitive data as
financial and personal.
2. The Main objective
and purpose of this
research
The aims and objectives of this research paper are:
1. Evaluate the data integrity for big data protection
2. Using ethical technique for data ownership rights
3. Latest ethical methodologies and technologies can improve security and privacy for big data
2. The research purpose is to secure and improve privacy practices of big data by using various ethical methodologies. The
big data security can be improved with the help of an illustration technique which helps in dividing the information into
different pairs.
3. Questions need to be
answered
Research Questions:
The questions are created on the basis of the objectives of the research. This study will be conducted on
the basis of following questions:
What type of data is required to be analysed?
What type of data is more relevant to conduct this study, functional or structural? Why?
What type of data in available related to the research area?
How can data be visualized and merged in an effective manner?

4. A Brief Description
of Your Proposal
The network firewalls used by the concerned parties is the current solution to the big data problem. For a
large amount of data this solution is not entirely safe for data protection. Another thing the only firewalls
cannot stop continuous loading, streaming, and tagging. We have to deal with huge amount of data so, the
only firewall is not solving this issue and it can be compromised and altered from anywhere, resulting in
ethical issues like data integrity and ownership. Also, big data needs to handle the privacy of user's data
what they are collecting, which the use of ethical methodology is essential.
5. The Process or
Methodology of Your
Project
Define the chosen technique
The illustration technique is defined in this research which is useful for securing the ethical information and big data. This
technique is useful for transferring or changing important data and information into different codes and symbols for
preventing ethical information.
Review studies on the chosen technique
1. literature review (LR)
- Evaluating the latest Q1 and Q2 journals for an ethical methodology that can be used in big data
- Studying ethical practices for solving data ownership and privacy issues
2. Propose a better solution etc.
- Gathering information about other technologies that can protect data
- For the improvement of security and privacy, we should provide the latest technology which combines
with the system.
of Your Proposal
The network firewalls used by the concerned parties is the current solution to the big data problem. For a
large amount of data this solution is not entirely safe for data protection. Another thing the only firewalls
cannot stop continuous loading, streaming, and tagging. We have to deal with huge amount of data so, the
only firewall is not solving this issue and it can be compromised and altered from anywhere, resulting in
ethical issues like data integrity and ownership. Also, big data needs to handle the privacy of user's data
what they are collecting, which the use of ethical methodology is essential.
5. The Process or
Methodology of Your
Project
Define the chosen technique
The illustration technique is defined in this research which is useful for securing the ethical information and big data. This
technique is useful for transferring or changing important data and information into different codes and symbols for
preventing ethical information.
Review studies on the chosen technique
1. literature review (LR)
- Evaluating the latest Q1 and Q2 journals for an ethical methodology that can be used in big data
- Studying ethical practices for solving data ownership and privacy issues
2. Propose a better solution etc.
- Gathering information about other technologies that can protect data
- For the improvement of security and privacy, we should provide the latest technology which combines
with the system.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Propose your taxonomy and major components
The proposed taxonomy of this project is Data acquisition; illustration and security enhancement i.e. DIS which is used for
enhancing the security and privacy with the help of these three major components such as data acquisition, illustration, and
security enhancement.
6. Expected Outcomes The consumer for this research project will be all organizations, academic platforms and other companies
who uses on big data to analyze the functions of their system. It can enable them to protect and secure
their important information and data form theft and leakage.
The projected outcome of invaluable securing technologies information can be helpful in increasing the
security of data and information. The project would also result in defining relevant ethical considerations
and methodologies that can handle the issues related to privacy of the system and data.
Reference list Reference:
Lokshina, I. V., &Lanting, C. J. (2018). Addressing Ethical Concerns of Big Data as a Prerequisite for a Sustainable
Big Data Industry. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 10(3),
33-54.
Milton, C. L. (2017). The ethics of big data and nursing science. Nursing science quarterly, 30(4), 300-302.
Abouelmehdi, K., Beni-Hessane, A., &Khaloufi, H. (2018). Big healthcare data: preserving security and
privacy. Journal of Big Data, 5(1), 1
Adams, M. (2017). Big data and individual privacy in the age of the internet of things. Technology Innovation
Management Review, 7(4), 12-24. Retrieved from
https://search-proquest-com.ezproxy.csu.edu.au/docview/1963138244?accountid=10344
Jayashree Agarkhed, AshalathaR., "Security and Privacy for Data Storage Service Scheme in Cloud Computing",
International Journal of Information Engineering and Electronic Business (IJIEEB), Vol.9, No.4, pp.7-12, 2017.
The proposed taxonomy of this project is Data acquisition; illustration and security enhancement i.e. DIS which is used for
enhancing the security and privacy with the help of these three major components such as data acquisition, illustration, and
security enhancement.
6. Expected Outcomes The consumer for this research project will be all organizations, academic platforms and other companies
who uses on big data to analyze the functions of their system. It can enable them to protect and secure
their important information and data form theft and leakage.
The projected outcome of invaluable securing technologies information can be helpful in increasing the
security of data and information. The project would also result in defining relevant ethical considerations
and methodologies that can handle the issues related to privacy of the system and data.
Reference list Reference:
Lokshina, I. V., &Lanting, C. J. (2018). Addressing Ethical Concerns of Big Data as a Prerequisite for a Sustainable
Big Data Industry. International Journal of Interdisciplinary Telecommunications and Networking (IJITN), 10(3),
33-54.
Milton, C. L. (2017). The ethics of big data and nursing science. Nursing science quarterly, 30(4), 300-302.
Abouelmehdi, K., Beni-Hessane, A., &Khaloufi, H. (2018). Big healthcare data: preserving security and
privacy. Journal of Big Data, 5(1), 1
Adams, M. (2017). Big data and individual privacy in the age of the internet of things. Technology Innovation
Management Review, 7(4), 12-24. Retrieved from
https://search-proquest-com.ezproxy.csu.edu.au/docview/1963138244?accountid=10344
Jayashree Agarkhed, AshalathaR., "Security and Privacy for Data Storage Service Scheme in Cloud Computing",
International Journal of Information Engineering and Electronic Business (IJIEEB), Vol.9, No.4, pp.7-12, 2017.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

DOI: 10.5815/ijieeb.2017.04.02

1. Generic Diagram
Figure 1: Framework of privacy of big data
Figure 1: Framework of privacy of big data
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




