Please use this identifier to cite or link to this item:
https://hdl.handle.net/10321/4196
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ahamad, Shahanawaj | en_US |
dc.contributor.author | Roshan, Amit | en_US |
dc.contributor.author | Lourens, Melanie Elizabeth | en_US |
dc.contributor.author | Shekher, Vineet | en_US |
dc.contributor.author | Joshi, Kapil | en_US |
dc.contributor.author | Alanya-Beltran, Joel | en_US |
dc.date.accessioned | 2022-08-26T12:44:27Z | - |
dc.date.available | 2022-08-26T12:44:27Z | - |
dc.date.issued | 2022-04-28 | - |
dc.identifier.citation | Ahamad, S., et al. 2022. The critical role played by big data management in effectively addressing the security and overall privacy concerns through correlation analysis. 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Presented at: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). : 130-134. doi:10.1109/icacite53722.2022.9823900 | en_US |
dc.identifier.isbn | 9781665437899 | - |
dc.identifier.uri | https://hdl.handle.net/10321/4196 | - |
dc.description.abstract | Due to the widespread application of big data in a wide range of fields, there has been a significant rise in a diverse range of data assets, and numerous data analysis technologies, such as standardized data mining or quantitative analytical techniques, are speeding up the constant enlargement of the big data industry. The fact that information from several different resources has a life cycle from acquisition to disposal is a key property of big data, as is the fact that new information may be obtained via analysis, combining, and exploitation of existing data. Yet, information security & dependability challenges arise at every stage of the life cycle, rendering the protection of individually identifying data a vital goal throughout the whole process. It is possible to evaluate user behavior using different big data analytics techniques, and the collection of this information results in the violation of personal privacy. This study analyses dangers and security challenges that arise during the administration of large amounts of data by verifying the existing standards produced by international standardization bodies and doing an analysis of relevant research. | en_US |
dc.format.extent | 5 p. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Big data | en_US |
dc.subject | Security | en_US |
dc.subject | Privacy | en_US |
dc.subject | Information | en_US |
dc.subject | Management | en_US |
dc.subject | Analytical | en_US |
dc.subject | Internet of Things (IOT) | en_US |
dc.subject | Application | en_US |
dc.title | The critical role played by big data management in effectively addressing the security and overall privacy concerns through correlation analysis | en_US |
dc.type | Conference | en_US |
dc.date.updated | 2022-08-24T10:00:29Z | - |
dc.relation.conference | 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) | en_US |
dc.identifier.doi | 10.1109/icacite53722.2022.9823900 | - |
item.fulltext | With Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en | - |
item.openairetype | Conference | - |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Research Publications (Management Sciences) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Ahamad_Lourens_2022.pdf | Article | 283.06 kB | Adobe PDF | View/Open |
ICACITE Copyright clearance.docx | Copyright Clearance | 240.9 kB | Microsoft Word XML | View/Open |
Page view(s)
241
checked on Dec 22, 2024
Download(s)
90
checked on Dec 22, 2024
Google ScholarTM
Check
Altmetric
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.