Write technology assessment report for Dumnonia Corporation

Assignment Help Other Subject
Reference no: EM132371554 , Length: word count:3000

Security and Privacy Issues in Analytics Assignment - Technology Assessment Report

Learning outcomes - In this assignment, you will be focusing on the following unit learning outcome (ULO) -

  • Apply and justify the use of a range of appropriate technological and organisational approaches to mitigate security risks associated with data analytics.
  • Apply and justify the use of a range of appropriate technological and organisational approaches to mitigate privacy risks associated with data analytics.
  • Evaluate vulnerabilities in organization and personal data and justify appropriate strategies to attack and defend.

Brief description of the task -

You are required to write a 2500-3000 word technology assessment report for the Dumnonia Corporation.

The report relates to the implementation of k-anonymity as a model for protecting privacy of sensitive data for Dumnonia Corporation.

Instructions -

For this assessment, you have been interviewing the following Dumnonia staff, interview notes of which shall be made available through the FutureLearn/CloudDeakin platform:

  • Caradoc - CEO - Interview notes based upon the use of k-anonymity by Dumnonia from an organisational perspective;
  • Guinevere - CIO - Interview notes based upon the use of k-anonymity and implementation of k-anonymity for Dumnonia. This interview will be a technical perspective;
  • Constantine - CSO - Interview notes based upon the implementation of k-anonymity for Dumnonia. This interview will be a technical perspective;

The k-anonymity technique allows for clustering of data based on the publicly known handle of each data sample of a given dataset, whilst keeping the sensitive part of the data sample a secret.

Consequently, the clustering of data is achieved, such that each cluster contains k items and the sensitive data associated with each item is kept a secret. k-anonymity mitigates the requirement for encrypting data, which could otherwise prove to be a costly operation.

For this assignment, prepare a report that addresses the following points:

1. Organisational drivers for Dumnonia that require anonymization techniques to solve their problems.

2. Description of technology solutions that can be employed to implement k-anonymity within Dumnonia Corporation.

3. Development of an implementation guide for Dumnonia that can be followed in order to apply k-anonymity to the sensitive data of Dumnonia.

4. Additionally, you should compare two different implementations of k-anonymity (either by running experiments on the adult and INFORMS datasets) or by reporting a detailed study of two types of k-anonymity techniques.

For implementation: either download two implementations of k-anonymity code, or write code of your own. You can download the adult and INFORMS datasets, and produce the Normalised Certainty Penalty (NCP) percentage for each dataset for K=10, and also record the execution times.

For comparison of two approaches: Some examples you could compare are Mondrian vs Clustering Based approaches, but any published algorithm would be acceptable.

5. Compare the two methods to suggest which approach Dumnonia Corporation may wish to adopt. If you implemented your own method, you do not need to compare and contrast approaches, simply report the NCP percentage and the execution code of your code in the report. Otherwise, report on the comparison of the two methods in terms of which one best suits the problem faced by Dumnonia Corporation.

Report structure - The report should be structured in the following way:

  • Executive Summary of your report findings (250 words)
  • Organisational Drivers for Dumnonia (250 words)
  • Discussion of the organisational drivers for Dumnonia relating to the implementation of k-anonymity (400 words)
  • Technology Solution Assessment (500 words)
  • Detailed assessment of the technologies that Dumnonia have selected on how to implement k-anonymity for protecting privacy of their sensitive data (500 words)
  • k-anonymity Implementation Guide (500 words)
  • Comparison of two publically available implementations or k-anonymity techniques, or writing and discussion of your own code. (500 words).

Attachment:- Security and Privacy Issues in Analytics Assignment Files.rar

Reference no: EM132371554

Questions Cloud

Genetic code for this enzyme protein is within the dna : The enzyme, RNA polymerase, is needed to transcribe DNA into mRNA, which is then translated into proteins (such as the polymerase).
Express a clear opinion about the issue you are researching : Most mainstream news sites contain opinion sections, but these can be drawn from any source you'd like--as long as they express a clear opinion about the issue.
What would be the expected outcomes : Choose an organization and identify an area in which it needs to communicate a change. What type of change agent and change model needs to be implemented?
Explain how you dealt with the change : At times, change can be hard to accept, but when change adds value, one becomes motivated to take the necessary steps to do things differently.
Write technology assessment report for Dumnonia Corporation : SIT719 Security and Privacy Issues in Analytics Assignment - Technology Assessment Report for Dumnonia Corporation, Deakin University, Australia
Identify specific messages about gender : Identify specific messages about gender presented in the mass media. Discuss messages about gender you have received from your family or cultural group.
How a theory from another discipline may shed light : Competent social workers are able to construct a strong foundation upon which to build skills by understanding theories from a variety of disciplines.
Write a memo to jek porkins, the audit senior on the dhl : Write a memo to Jek Porkins, the audit senior on the DHL assignment - The business risk impact and the accounts (as well as related audit assertions)
Writing the detailed description of the area researched : PowerPoint presentation outlining the content of your paper. At a minimum include the following: Detailed description of the area researched.

Reviews

len2371554

9/16/2019 4:02:36 AM

Key information - Weight: 30% of total mark for this unit. Length: Between 2500 and 3000 words. Submit: Electronically via Turnitin during Week 9 (FutureLearn Course 5, Week 1). You must correctly use the Harvard method in this assessment. See the Deakin referencing guide. What do I do now? - Start collecting and researching information. Read the information provided by the Dumnonia staff. Think out of box! Develop the report in Microsoft Word. Look at the assessment rubric and the unit learning outcomes to ensure that you understand what you are being assessed (and marked) on.

len2371554

9/16/2019 4:02:29 AM

Rubric - Criteria 1: Executive summary & technology overview 20% The report excels at addressing the research question and report requirements. Excellent depth and insight is clearly shown and eloquently expressed. Criteria 2: Technology Solution Assessment 40% Provides an assessment which excels at showing initiative and originality in identifying relevant privacy and security issues. The use of technological solutions is extensively supported by theory and practical examples.

len2371554

9/16/2019 4:02:20 AM

Criteria 3: k- Anonymity Implementation Guide 30% The guide provides sophisticated advice for implementation, which is well thought out and highly relevant to the organisation. Excellent depth and insight is clearly shown and eloquently expressed. Criteria 4: k- Anonymity Algorithm Performance Comparison 10% The report clearly contrasts two different k-anonymity techniques or two publicly available implementations of k-anonymity, while providing an in-depth and detailed explanation of each algorithm and the tradeoffs involved, or provides a fully implemented code in working order.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd