2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) 2016
DOI: 10.1109/ic3i.2016.7917961
|View full text |Cite
|
Sign up to set email alerts
|

Security issues and challenges of big data analytics and visualization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Privacy and security issues are equally important, especially in protecting sensitive customer data from breaches and unauthorised access. E-commerce companies must implement strong data governance practices, encryption, access control and data anonymisation to protect customer privacy and comply with data protection regulations [32], [33]. Addressing these challenges through advanced data management techniques and stringent security measures is critical to leveraging the full potential of big data analytics in demand prediction for ecommerce.…”
Section: Challenges and Opportunities In Big Data Analysis For Demand...mentioning
confidence: 99%
“…Privacy and security issues are equally important, especially in protecting sensitive customer data from breaches and unauthorised access. E-commerce companies must implement strong data governance practices, encryption, access control and data anonymisation to protect customer privacy and comply with data protection regulations [32], [33]. Addressing these challenges through advanced data management techniques and stringent security measures is critical to leveraging the full potential of big data analytics in demand prediction for ecommerce.…”
Section: Challenges and Opportunities In Big Data Analysis For Demand...mentioning
confidence: 99%
“…Association technique is used in a recommender system, in monitoring logs and user profiling in an e-commerce environment. It is used in identifying the similarity between elements and variables of a large dataset [12]. Association rules are also used in retaining confidentiality, for eg.…”
Section: Summary Of Diverse Data Mining and Artificial Intelligence Techniques Used In Early Detection Of Threat Conditionmentioning
confidence: 99%
“…In terms of security issues, when dealing with integration of data from many sources, security mechanisms should be considered at various levels. It is a major requirement for data scientist to think or analyse on how a development of tools will co-operate with diverse data sets and their security demands [73]. Some of the traditional security mechanisms adopted when using relational database is access control which can be role based or credential based access control and this can feature in authentication, authorization and auditing [74] but these are not enough in the era of big data.…”
Section: Benefit Of This Frameworkmentioning
confidence: 99%