Please enable JavaScript.
Coggle requires JavaScript to display documents.
Evaluating data-driven Applications and solutions - Coggle Diagram
Evaluating data-driven Applications and solutions
The explosion in data
High cost in web servers
Companies like Amazon Web Services making the cost low
Finally making storage cost extremely low
Many companies consume this data
Continues growth in personal and commercial use of data
Massive data storage centres now drive relentless acquisition and data mining.
Evolving data security impacts
The downside can be organisations can access and use personal location information
The advantage of GPS is Location tracking in mobile devices
Can track gps
Mobile and 'Internet of Things' Devices provide other opportunities to collect data
data no longer just collected by input
Data is no longer coming solely from manual inputs
Information as a commodity
User information can be shared to help support an individual when in a database
consumer profiles can be sold and bought
Australian privacy policy was developed to support the ethical use of data
Information used to gather wants and needs and needs about potential customers
Supermarket giants Coles and Woolworths use loyalty cards as a means of collecting data
Information social evolution
Australia card, 1980s
Provided for all citizens
decrease issues involving tax frauds
Used to identify false medicare usage
required when performing any identity-specific actions
An individual's signature and photographs similar to those collected in the application process for an Australian passport
To present that card when gaining employment, seeking government benefits or services
MyGov website, 2010s
crime authentication portal
managed by the department of human services
Uses several 'challenges' before granting access
used to increase online accessibility of personal information
The system is designed to ease the complication of accessing services online and to amalgamate access in a central system
The verdict
After 30 years the question remains has society matured and evolved to legitimise governmental data identification
Or has the Australian card program been implemented by stealth over a generation
Retention and disposal of data
This is required by the Australian privacy act
Sensitive personal information that is no longer required needs to be disposed of recording systems
Organisations must follow in destroying or de-identifying personal Information
At other times, companies may be prescribed by law to retain certain types of data for specified times
Metadata is information surrounding communications via voice and data
De-identification of organisational data
Review how the Australian privacy principles have been taken into account
companies trying so safety provided more uses for data
encourages open access to data for the good of all
document to data dictionary to help end users to use the datasets
De-identify the dataset for open consumption
Quality-assure de-identification measures through consultations with privacy experts
Evaluating data-driven solutions
Evaluating while generating solutions
SQL statements may involve initially testing functionality with test data
at this point check weather or not the internal components are effective in solving the problem
Evaluating while developing solutions
Ensure data is secure
make sure all prescribed requirement are met and evaluation has taken place
Evaluating solutions
Criteria checklists help us explore the requirements for the task
To evaluate a digital solutions, we refer back to the prescribed criteria
prototypes can provide room to make further improvements
Evaluating while exploring data-driven problems and solutions
make sure evaluation is critical throughout exploration and investigation
During the development of the project
We must then form these requirements into the criteria