11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

136 data securityparticular purpose, such as recording scientific observationsor keeping track <strong>of</strong> customers’ account histories. However,data <strong>of</strong>ten has potential applications beyond thoseconceived by its collector.Conceptually, data mining involves a process <strong>of</strong> refiningdata to extract meaningful patterns—usually with somenew purpose in mind. First, a promising set or subset <strong>of</strong> thedata is selected or sampled. Particular fields (variables) <strong>of</strong>interest are identified. Patterns are found using techniquessuch as regression analysis to find variables that are highlycorrelated to (or predicted by) other variables, or throughclustering (finding the data records that are the most similaralong the selected dimensions). Once the “refined” datais extracted, a representation or visualization (such as areport or graph) is used to express newly discovered informationin a usable form.Similar (if simpler) techniques are being used to targetor personalize marketing, particularly to online customers.For example, online bookstores such as Amazon.com canfind what other books have been most commonly boughtby people buying a particular title. (In other words, identifya sort <strong>of</strong> reader pr<strong>of</strong>ile.) If a new customer searches forthat title, the list <strong>of</strong> correlated titles can be displayed, withan increased likelihood <strong>of</strong> triggering additional purchases.Businesses can also create customer pr<strong>of</strong>iles based on theirlonger-term purchasing patterns, <strong>and</strong> then either use themfor targeted mailings or sell them to other businesses (seee-commerce). In scientific applications, observations canbe “mined” for clues to phenomena not directly related tothe original observation. For example, changes in remotesensor data might be used to track the effects <strong>of</strong> climateor weather changes. Data-mining techniques can even beapplied to the human genome (see bioinformatics).TrendsData mining <strong>of</strong> consumer-related information has emergedas an important application as the volume <strong>of</strong> e-commercecontinues to grow, the amount <strong>of</strong> data generated by largesystems (such as online bookstores <strong>and</strong> auction sites)increases, <strong>and</strong> the value <strong>of</strong> such information to marketersbecomes established. However, the use <strong>of</strong> consumer datafor purposes unrelated to the original purchase, <strong>of</strong>ten bycompanies that have no pre-existing business relationshipto the consumer, can raise privacy issues. (Data is <strong>of</strong>tenrendered anonymous by removing personal identificationinformation before it is mined, but regulations or otherways to assure privacy remain incomplete <strong>and</strong> uncertain.)The most controversial applications <strong>of</strong> data mining arein the area <strong>of</strong> intelligence <strong>and</strong> homel<strong>and</strong> security. Becausesuch applications are <strong>of</strong>ten shrouded in secrecy, the public<strong>and</strong> even lawmakers have difficulty in assessing their value<strong>and</strong> devising privacy safeguards. According to the GovernmentAccountability Office, as <strong>of</strong> 2007 some 199 differentdata-mining programs were in use by at least 52 federalagencies. One <strong>of</strong> the most controversial is ADVISE (AnalysisDissemination, Visualization, Insight <strong>and</strong> SemanticEnhancement), developed by the Department <strong>of</strong> Homel<strong>and</strong>Security since 2003. The program purportedly can match<strong>and</strong> create pr<strong>of</strong>iles using government records <strong>and</strong> users’Web sites <strong>and</strong> blogs. Privacy advocates <strong>and</strong> civil libertarianshave raised concerns, <strong>and</strong> legislation has been introducedthat would require that all federal agencies report their dataminingactivities to Congress (see also counterterrorism<strong>and</strong> computers <strong>and</strong> privacy in the digital age.)Further ReadingClayton, Mark. “U.S. Plans Massive Data Sweep.” Christian <strong>Science</strong>Monitor, February 9, 2006, n.p. Available online. URL: http://www.csmonitor.com/2006/0209/p01s02-uspo.html. AccessedJuly 8, 2007.Dunham, Margaret H. Data Mining: Introductory <strong>and</strong> Advanced Topics.Upper Saddle River, N.J.: Prentice Hall, 2002.Markov, Zdravko, <strong>and</strong> Daniel T. Larose. Data Mining the Web:Uncovering Patterns in Web Content, Structure, <strong>and</strong> Usage.Hoboken, N.J.: Wiley, 2007.Tan, Pang-Ning, Michael Steinbach, <strong>and</strong> Vipin Kumar. Introductionto Data Mining. Upper Saddle River, N.J.: Pearson Education,2006.data securityIn most institutional computing environments, access toprogram <strong>and</strong> data files is restricted to authorized persons.There are several mechanisms for restricting file access in amultiuser or networked system.User StatusBecause <strong>of</strong> their differing responsibilities, users are <strong>of</strong>tengiven differing restrictions on access. For example, theremight be status levels ranging from root to administrator to“ordinary.” A user with root status on a UNIX system is ableto access any file or resource. Any program run by such auser inherits that status, <strong>and</strong> thus can access any resource.Generally, only the user(s) with ultimate responsibility forthe technical functioning <strong>of</strong> the system should be givensuch access, because comm<strong>and</strong>s used by root users have thepotential to wipe out all data on the system. A person withadministrator status may be able to access the files <strong>of</strong> otherusers <strong>and</strong> to access certain system files (in order to changeconfigurations), but will not be able to access certain coresystem files. Ordinary users typically have access only tothe files they create themselves <strong>and</strong> to files designated as“public” by other users.File PermissionsFiles themselves can have permission status. In UNIX,there are separate statuses for the user, any group to whichthe user belongs, <strong>and</strong> “others.” There are also three differentactivities that can be allowed or disallowed: reading, writing,<strong>and</strong> executing. For example, if a file’s permissions areUser Group Otherrwx rw- r—the user can read or write the file or (if it is a directory orprogram), execute it. Members <strong>of</strong> the same group can reador write, but not execute, while others can only read the filewithout being able to change it in any way. Operating systemssuch as Windows NT use a somewhat different struc-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!