Rank the sensitivity of your data High Moderate or Low Rate your controls Good, Adequate or Poor Rate the likelihood that this data will be stolen This is the equivalent of asking someone how tall they are: Tall, Medium Tall, or Medium Short. Instead, you would just ...
数据挖掘 VS 隐私保护 早在 1998 年, Ann Cavoukian 发表了一篇题为《数据挖掘:以破坏隐私为代价》的报告,( Alex Berson 的新书: Building Data Mining Applications for CRM ),引起了很大的轰动。该报告剖析了数据挖掘和隐私的关系,指出数据挖掘可能是个人隐私提倡者未来 10 年所要面对 ...