Please enable JavaScript.
Coggle requires JavaScript to display documents.
Evaluationg data-driven applications and solutions - Coggle Diagram
Evaluationg data-driven applications and solutions
the explosion of data
big data
over coming chalanes such as computing power, cost and development of networks.
Companys offer storage inferstructure.
Big-data companys build arrays of computing and data-storage capacity.
services such as advertising, marketing and profitble data-driven processes.
Evolving data security impacts
Personal data is not protected in the real word anymore.
GPS positioing
Companys can download and acess personal location information.
learn more about customers
information as a commodity
data bases have a siginificant advangate.
lots of info can be given to agencies and groups tp support growing needs of a population.
austrlian privacey princples
ethical use of a persons private information.
Profiles can be traded or sold.
identify theft
info can be mind
information can be veiw, analysised and collected.
customer wants and needs, to increase profitability
loyalty cards
mobile number, email, name, birth date and gender.
information social evolution
Australia Card, 1980's
ALP goverment, Bob Hawk
solution to tax avoidance, illegal immigration and minimise health care fraud.
super key
govmernents, federate all govermental identification sustems through interconnection
20 databases, 10 govmernet departments
strong privacy controls
a way to identify any austrlian
MyGov website, 2010's
centralised authentication protal
link goverment services
two step authetication method
SMS to a mobile phone slected by the user
ease the complication of accessing sercives online
amalgamate access in a central system.
build extreamly detialed records about an indervidual
income, occupation, spouse, children, social security benifites, medical and travel information
the verdict
30 years
australia ready for identirifcation and suveillance systems?
austrlian Card implemented by stealth
retention and disposal of data
process in place to manage
Austrlian privecy Act and Austrlian provecy princples
senesitve personal information needs to be desposed of
secure, timely and reasonable manner
security of personal information
meta data
all information surrounding the content of communications via voices and data networks
call times, dates, duration, who was called.
201, ABC investicated and reported goverment deparments making requests via the austrlian federal police.
the artivle safegaurds that had been put in place.
de-identification of organaisational data
rapid growth of data institutions.
ways to use valuble aspects of datasets
without compremising pricvecy or security
open data movment
non-sensitive data.
free use of data
adding a value to data
data can be acessed and is approved by AUS gov
de-identifying perosnal ingotmation is complete when
the info is no longer about an indertifible indervidual or indervidual who is reasonbly identifyible.
open data by
de-identify data
quality-assure de-identiifcation measures through consultation.
Austrlian privacy principles taken into account
a data dictionary
evaluating data-driven solutions
evaluating while exploring data-driven problems and solutions.
minmap
articulate, concepts, ideas, issues, requirments and investigations.
develop functional and non-functional requirments
form into criterion
do the criteria descrive requriemnts?
have criteria been constructed so as not to be ambiguous?
criteira achiveable?
evaluating while developing solutions
structured data
visualises diffrent aproaches
informal documented notes
developmental judgements for the solution
evaluating while generating solutions.
testing is helpful
effectivness, robustness, suitbility.
compare with criterion
testing SQL with test data
Evaluating solutions
refer to refined determined and self-determined sucess critiera
explore ramifications of meeting or not meeting criterion