Home
This Title All WIREs
WIREs RSS Feed
How to cite this WIREs title:
WIREs Data Mining Knowl Discov
Impact Factor: 7.250

Data mining privacy preserving: Research agenda

Full article on Wiley Online Library:   HTML PDF

Can't access this content? Tell your librarian.

Abstract In the modern days, the amount of the data and information is increasing along with their accessibility and availability, due to the Internet and social media. To be able to search this vast data set and to discover unknown useful data patterns and predictions, the data mining method is used. Data mining allows for unrelated data to be connected in a meaningful way, to analyze the data, and to represent the results in the form of useful data patterns and predictions that help and predict future behavior. The process of data mining can potentially violate sensitive and personal data. Individual privacy is under attack if some of the information leaks and reveals the identity of a person whose personal data were used in the data mining process. There are many privacy‐preserving data mining (PPDM) techniques and methods that have a task to preserve the privacy and sensitive data while providing accurate data mining results at the same time. PPDM techniques and methods incorporate different approaches that protect data in the process of data mining. The methodology that was used in this article is the systematic literature review and bibliometric analysis. This article identifieds the current trends, techniques, and methods that are being used in the privacy‐preserving data mining field to make a clear and concise classification of the PPDM methods and techniques with possibly identifying new methods and techniques that were not included in the previous classification, and to emphasize the future research directions. This article is categorized under: Commercial, Legal, and Ethical Issues > Security and Privacy
Systematic Literature Review Steps (Wahono, 2015)
[ Normal View | Magnified View ]
Timespan of techniques and methods of PPDM
[ Normal View | Magnified View ]
Classification of the PPDM techniques and methods
[ Normal View | Magnified View ]
Document co‐citation analysis
[ Normal View | Magnified View ]
Most influential authors separated in clusters
[ Normal View | Magnified View ]
Number of publications by year. *Total = 104
[ Normal View | Magnified View ]
PRISMA flow diagram presenting steps in the identification and screening of records (Moher et al., 2009)
[ Normal View | Magnified View ]

Browse by Topic

Commercial, Legal, and Ethical Issues > Security and Privacy

Access to this WIREs title is by subscription only.

Recommend to Your
Librarian Now!

The latest WIREs articles in your inbox

Sign Up for Article Alerts