You are on page 1of 14

INSE 6180

Security and Privacy Implications of


Data Mining

Ch. 0: Course Information

Nizar Bouguila
Concordia University
Course Information
n Course Homepage:
¨ Moodle

n Lecture time:
¨ Friday: 17:45-20:15

n Office hours:
¨ Wednesday 15:00-17:00

2
Course Information
n Prerequisite: Basic database knowledge.
¨ Table
¨ Record / Tuple
¨ Attributes
¨ Joining two database tables

n Prerequisite: Basic programming knowledge will help.

n Feel free to ask questions at anytime in lectures

3
Course Objectives

1. To study the basic data mining


techniques and applications.
2. To study the security and privacy threats
caused by data mining.
3. To apply data mining techniques to
detect/prevent security and privacy
threats.
n You will gain the basic knowledge to
apply data mining techniques in future
problems. 4
Instructor’s Information
n Nizar Bouguila

n Email: nizar.bouguila@concordia.ca

n Office: EV007.632

n Office Hour: Wednesday 15:00 – 17:00

5
Required Textbook
n Data Mining: Concepts and
Techniques, 3rd edition, Jiawei
Han, Micheline Kamber, and
Jian Pei, 2012.

n Lecture notes specify the


chapters required for this
course.
6
Workload and Grading
n Be prepared to spend adequate time and effort
on this course due to compressed schedule.

n Project progress report: 10%


n Project presentation & report: 60%
n Assignments: 30%

7
Course Project
n 60% of your final grade.
n Projects teams can go up to 3 members. You have
the option to work alone, but I will use the same
criteria for evaluation.
n Projects could be done in any adequate
programming language.
n Perform some meaningful data mining operations
and analysis on an interesting problem, and then
write a paper.

8
Academic Integrity
n Read:
n http://www.concordia.ca/students/academic-integrity.html
n http://www.concordia.ca/encs/students/sas/expectation-
originality.html
n It's NOT OK to:
¨ Copy from ANYWHERE without saying from where it
came.

9
Academic Integrity
n It's NOT OK to:
¨ Copy from someone else's exam.
¨ Communicate with another student during an exam by
talking or using some form of signals.
¨ Add or remove pages from an examination booklet or
take the booklet out of an exam room.
¨ Theft of university resources: Get hold of or steal
exam or assignment answers or questions.
¨ Personation: Write a test or exam for someone else or
have someone write for you.
¨ Hand in false documents such as medical notes,
transcript or record.
¨ Multiple submission
10
¨ Falsify data or research results.
Academic Integrity
n But if you do...
¨ The Professor will file an incident report.
¨ Interviewed by the Associate Dean.
¨ One or more of the following sanctions:
n A failing grade in the assignment, exam or course
n Community service

n Suspension

n Expulsion from the University

¨A charge of academic misconduct will appear


on your student record.
11
What is data mining?
n Process of extracting interesting (non-trivial,
implicit, previously unknown and potentially
useful) patterns or knowledge from huge amount
of data, preferably in an efficient, scalable,
practical manner.
n Analogy: Mining diamond from stone.
n If so, we should call it
“knowledge” mining!

12
Security and Privacy Implications
n What is the difference between security and
privacy?
n Suppose I collect some personal sensitive
information about you. I put it on a piece of
paper, and put it in a safe in the basement. I
locked it and keep the key under my pillow.
¨ Is your information secure? Yes

¨ Is your information privacy-preserved? Hmm… it depends!

n What if I put an auction at eBay and allow


anyone who gives the highest bid to have the
key under my pillow?
13
Security and Privacy Implications
n What is the difference between security and
privacy?

n Security: concerns about whether or not


adversaries (the bad guys) can access the data.

n Privacy: concerns about how to use the data.

14

You might also like