logo

CIS8008 Assessment 3 Name of the University Name

   

Added on  2021-05-31

37 Pages3945 Words357 Views
CIS8008 Assessment 3
Name of the Student
Name of the University

Table of Contents
Task 1...........................................................................................................................3
Task 1.1.....................................................................................................................3
Task 1.2.....................................................................................................................3
Task 2...........................................................................................................................7
Task 2.1.....................................................................................................................7
Task 2.2...................................................................................................................13
Task 2.3...................................................................................................................14
Task 2.4...................................................................................................................16
Task 3.........................................................................................................................22
Task 3.1...................................................................................................................22
Task 3.2...................................................................................................................22
Task 3.3...................................................................................................................23
Task 3.4...................................................................................................................24
Task 3.5...................................................................................................................25
References.................................................................................................................28
Appendix.....................................................................................................................30
Decision tree Performance......................................................................................30
Weka logistic Performance.....................................................................................34

Task 1
Task 1.1
AHG (Automotive Holdings Group Limited) is the chosen organization for this
assignment that has been listed in Australian stock exchange companies list. It has
been categorized in retailing companies and is a diversified automotive logistics and
retailing group with operations within each mainland states of the Australia and New
Zealand. It is one of the largest firm operating in Western Australia, New South
Wales, Queensland and Victoria, and is responsible for driving the largest
automotive retail services. The logistic business of the AHG group operates business
throughout the entire Australian land through the subsidiaries Genuine Truck Bodies
(body building services to the truck industry), Harris Refrigerated Transport, AMCAP
(industrial supplies distribution and motor parts), Rand Transport, Scott's
Refrigerated Freightways and JAT Refrigerated Road Services (transport and cold
storage), VSE (vehicle storage and engineering), Higher Bus (truck and bus
distribution and importation), HQVA (Husqvarna motorcycle and KTM distribution
and importation in New Zealand and Australia), and KTM Sport motorcycles. AHG
engages with the influential and growing tourists market of China. This organization
is selected for this assignment as it has adopted the information technology and
system for empowering and enhancing the operational activities, production, and
output. Online platform of the AHG allows the customers to look at the products and
avail services being offered to them. The reason associated with selecting this
particular organization is that it is actively engaged in the information age by making
use of online platforms and several technological based payment options.
Website: http://www.ahgir.com.au/
Task 1.2
This chapter of the paper discusses the analysis of the AHG limited with respect to
the security and policy statements, which has been described on the website. The
governance of the privacy and security aspects related to the data and information
has been addressed in website considering the nine core principles of the “Australian
Data Governance Draft Code of Practice. Following are the principles on which the
privacy and security governance has been incorporated within the system of the
AHG limited:

No Harm Rule: This principle emphasizes that for the assurance of the collection,
utilization, and information disclosure related to the personal information of the
individuals will require reporting entity in manner to make the application of the best
endeavours in the same context. Moreover, adding more in this content, entity
should be acting with integrity in a manner that the application of the collected data
and information is not supposed to be unethical. There should not be any expose of
the data and the circumstances under which the data those have been collected
among the third party in any condition. The AHG limited has implemented the
policies that bound the organization for prioritizing the privacy and security of the
personal information related to the individuals. Each visitor expressively collects
some of the non-personally identifiable information that is not limited to the type of
the browser, version, referring websites, operating systems, pages viewed and page
access times. The collected information is helpful in serving the purpose of the
personalized contents delivery, visitor traffics, and gauging trends.
Transparency and Honesty: the second principle focuses on the organization’s
honesty during the disclosure, collection, and utilizing the collected data and
information related to the individuals. All the alterations and disclose of the data and
information should be made considering the policy and privacy statement developed
for the proper and effective functioning of the organization. There should be
availability of the concise and easy accessible mechanism allowing the individuals to
access or enquiry about the personal and sensitive data and information. Stress
should be provided on enhancing the awareness, encouragement, and promotion
about the adoption codes while disclosing or sharing the information to the third
party. Updated practices will be adhered considering the collection of the data and
information by the AGH Limited, because of the manipulation in the policy. There are
the possibilities that information exchanged in the unanticipated scenarios have not
been disclosed in the privacy note. The customer service option asks for the
collection of personal information and data in manner to avail the services that could
include the credentials, password recovery questions, and many more.
Fairness: The factor associated with the communities expectations related to the
utilization of the personal information and risks associated with the application of
these data and information must be taken in account while disclosing and collecting
the personal data and information. The access of the personal data and information

related to the individuals have been restricted for the AHG limited under the act of
the privacy. It was identified that the organization has not been fully fair as there has
not been any notes related to the privacy and thus, it can be used for unanticipated
act.
Choice: there should be assurance of the properly developed mechanism, which will
be helpful in proving the choices for the collection and utilization of the personal
information. Despite of the fact, the current alignment of the organization in the
context of the personal data and information, does not consider the facts
implemented in the principles of code of practice. Shehata (2015) stated that “Unless
required by law, organization should not re identify the external data that contains
sensitive information without taking the consent of individual.”
Access and Accuracy: this principle states that the data and information being
exchanged and shared should be accurate and not misleading and in other words,
data being exchanged should not be manipulated. The implementation of the code
can be made effectively through the development and the adoption of the industry
standards. The personal information utilization by the AHG limited intending on the
collection of the personal information and personalization delivery related to the
users accessing the sites (Thompson et al. 2015). Moreover, there should be the
availability of the mechanism that should be ensuring the options those could be
made while collecting and utilizing the information and data related to the personal
and sensitive data.
Safety, Security, and de Identification: the AHG Limited should be organizing and
designing the security standard considering the security aspects in the contrast of
the industry standard that has been recognized and those will be helpful in
addressing the harms and impacts because of the security breach or intrusion. The
stored and collected data sets of the multiple data sets must be treated as the
sensitive and personal information until the organization identifies the de
identification techniques and the security measures those have been of appropriate
standards. Moreover, the organization must assure that the process of de
identification is a robust system through testing and updating regular techniques
those are helpful in contributing this process of the de identification (Marshall 2016).
It can be recommended that the organization should review the existing security

standards for assuring that the implementation is secured and protected from
intrusion.
Accountability: This principle is helpful in guiding the organization to create and
maintain the different categories of the collected personal information and the guide
should be emphasizing and highlighting the aspects related to the information
exchange or disclosure with the third party. The AHG has been taking the
reasonable steps in manner to assure that thy have been bound with the obligations
related to the security and confidentiality related to the collected and data information
of the individuals. Cuomo et al. (2016) highlighted that “The principles set out in code
should be complied by the organization to ensure that it is properly dealing with the
third parties.” There should be the availability of the public statement that assures
the compliance of the company’s policy with the code, demonstrating a commitment
of protecting the data and information being collected.
Stewardship: During reviewing the privacy and security policy implemented by the
AHG, it was identified that there has not any aspect related to the stewardship
principle. This fact resulted in making the statement that there is the need of
implementing this principle within the existing system of the organization. This will be
helpful in assuring that the policies being implemented by the organization will
comply with the codes and the customers will be satisfied regarding the privacy and
security of the data and information being shared in the website. Recommendation
can be made regarding the development and implementation of the process that is
helpful in supporting and assuring the compliance of the policies with the codes
(Datagovernanceaus.com.au 2018).
Enforcement: This is a principle that should be reviewed and implemented within
the existing system of the organization through comparing with the codes in regular
interval of time. The guidelines and statements provided in the code should be
implemented within the policy of the organization in an effective and efficient
manner. The implementation of the codes should comply with the organizational
policy and the organization must be agreed on the proposed guidelines.

Task 2
Task 2.1
EDA (Exploratory Data Analysis) has been driven on the diabetes data though
utilizing the rapid miner studio in manner to assure the understanding on how to
comply the data in this software and how to develop and execute the process. It was
started through saving the imported data in the rapid manner and thereafter in the
local storage. After saving the data, next step taken was to drag the dataset in the
process layout section and connecting the imported data with the output port. After
pressing the run button, following summary statistic was derived:
Figure 1: Summary Statistics Table
There was one dependent variable and eight independent variables in the diabetes
dataset those have been identified that for predicting the dependent variables, all
variables are not so important (perveen et al. 2016). The prediction of the dependent
variable can be made through analysing five or six variables.
Top five variables have been identified through performing the three steps data
analysis process in manner to identify the top five variables those can be utilized for
predicting the diabetes of the patient. There were many variables included in the
dataset and among them top five datasets were selected and scatter diagrams were

prepared considering the same variables. All these the scatter plot diagrams are
mentioned in the appendix section.
All these scatter diagrams are not sufficient for the prediction and so correlation
study has been performed as shown below. This study, has been indicating the eight
independent variables those have been positively alligned with the outcome variable.
It was also identified that the blooad pressure and skin thickness has been
demonstrating the negligible positive relation with the outcome variable. Thus,
eliminating these two variables will not affect the overall result and further analysis
can be driven using sixvariables only.
Figure: Correlation Table
Six independent variables were identified through executing correlation analysis and
so for the enhancement in the efficiency, chi square test has been performed as the
final and last step of the exploratory analysis. Following diagrams express the chi
square test statistics that is confirming the exclusion of the two identified variables in
the previous phase including the elimination of the pregnancies variable. Thus, five
variables have been identified for further analysis:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Financial Ratio Analysis of A.P. Eagers Limited and Automotive Holding Group Limited
|5
|2023
|458

Analysing the Annual Report of Automotive Holdings
|15
|3475
|310

CIS8008 Assessment 3 Name of the Student Name of the University
|39
|4066
|267

CIS8008 Assignment Name of the Student Name of the University
|37
|4225
|94

Desklib - Online Library for Study Material with Solved Assignments, Essays, Dissertations
|38
|4492
|263