Behavioral and Perceptual Models for Secure Data Analysis and Management

Authors

  • Sandesh Achar Staff Engineer, Intuit Inc., Mountain View, California, USA

DOI:

https://doi.org/10.18034/gdeb.v8i2.653

Keywords:

Collective Behavior Analysis, Artificial intelligence, Data Model

Abstract

The ability to monitor and forecast citizen behavior on a large scale developed to be a top target for governments subject to security and intelligence that are collective in the current worldwide culture where the web has become the primary medium for commerce and communication. Meanwhile, significant privacy-related issues have surfaced considering the innovative opportunities that artificial intelligence (AI) generates for collective behavior analysis when presented to governments as a way in which the government will comprehend. In the current study, we conducted an extensive literature analysis using techniques such as data mining and interviews such as in-depth to determine the primary uses of Artificial Intelligence that governments use and describe citizens' privacy issues. Our findings showed that the government employed 11 AI initiatives to enhance interactions with residents, local organizations, services offered by government agencies, and the economy, among other things. Issues are identified relating to the risk of behavior modification, intelligent decision-making, data privacy regulation and law, digital surveillance, and decision automation as they pertain to people's privacy when governments deploy AI. Finally, the report concluded that the debate of developing rules centered on the moral citizen data architecture gathering, with consequences for governments aiming to regulate security, morality, and data privacy. We also suggest a study schedule with 16 research questions to be investigated in future studies.

Metrics

Metrics Loading ...

Downloads

Download data is not yet available.

References

Achar, S. (2015). Requirement of Cloud Analytics and Distributed Cloud Computing: An Initial Overview. International Journal of Reciprocal Symmetry and Physical Sciences, 2, 12–18. Retrieved from https://upright.pub/index.php/ijrsps/article/view/70 DOI: https://doi.org/10.18034/ijrsps.v2.70

Achar, S. (2016). Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity. Engineering International, 4(2), 79-88. https://doi.org/10.18034/ei.v4i2.633 DOI: https://doi.org/10.18034/ei.v4i2.633

Achar, S. (2018). Security of Accounting Data in Cloud Computing: A Conceptual Review. Asian Accounting and Auditing Advancement, 9(1), 60–72. https://4ajournal.com/article/view/70

Barrionuevo, M., Lopresti, M., Miranda, N., & Piccoli, F. (2018). Secure computer network: Strategies and challengers in big data era. Journal of Computer Science and Technology, 18(3). https://doi.org/10.24215/16666038.18.e28 DOI: https://doi.org/10.24215/16666038.18.e28

Chimakurthi, V. N. S. S. (2017). Cloud Security - A Semantic Approach in End to End Security Compliance. Engineering International, 5(2), 97-106. https://doi.org/10.18034/ei.v5i2.586 DOI: https://doi.org/10.18034/ei.v5i2.586

Chimakurthi, V. N. S. S. (2018). Emerging of Virtual Reality (VR) Technology in Education and Training. Asian Journal of Humanity, Art and Literature, 5(2), 157-166. https://doi.org/10.18034/ajhal.v5i2.606 DOI: https://doi.org/10.18034/ajhal.v5i2.606

Dhall, S., Bhushan, B., & Gupta, S. (2016). An improved hybrid mechanism for secure data communication. International Journal of Computer Network and Information Security, 8(6), 67. DOI: https://doi.org/10.5815/ijcnis.2016.06.08

Emani, S., & Yamin, C. K. (2012). Patient perceptions of a personal health record: A test of the diffusion of innovation model. Journal of Medical Internet Research, 14(6). https://doi.org/10.2196/jmir.2278 DOI: https://doi.org/10.2196/jmir.2278

Gao, R., Wen, Y., & Zhao, H. (2015). Secure data fusion in wireless multimedia sensor networks via compressed sensing. Journal of Sensors. https://doi.org/10.1155/2015/636297 DOI: https://doi.org/10.1155/2015/636297

Gao, R., Wen, Y., Zhao, H., & Meng, Y. (2014). Secure data aggregation in wireless multimedia sensor networks based on similarity matching. International Journal of Distributed Sensor Networks, https://doi.org/10.1155/2014/494853 DOI: https://doi.org/10.1155/2014/494853

Pahl, C., & Xiong, H. (2013, September 1). Migration to PaaS clouds - Migration process and architectural concerns. 2013 IEEE 7th International Symposium on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, IEEE Xplore, 86-91. https://doi.org/10.1109/MESOCA.2013.6632740 DOI: https://doi.org/10.1109/MESOCA.2013.6632740

Pham, T. D., Tran, D., & Ma, W. (2017). Ownership protection of outsourced biomedical time series data based on optimal watermarking scheme in data mining. Australasian Journal of Information Systems, 21. https://doi.org/10.3127/ajis.v21i0.1541 DOI: https://doi.org/10.3127/ajis.v21i0.1541

Talukder, A. K., Zimmerman, L., & A, P. H. (2010). Cloud Economics: Principles, Costs, and Benefits. Computer Communications and Networks, 343–360. https://doi.org/10.1007/978-1-84996-241-4_20 DOI: https://doi.org/10.1007/978-1-84996-241-4_20

Yang, Z., Huang, Y., Li, X., & Wang, W. (2018). Efficient secure data provenance scheme in multimedia outsourcing and sharing. Computers, Materials, & Continua, 56(1), 1-17. https://doi.org/10.3970/cmc.2018.03697

Zentall, T. R., Galizio, M., Critchfield, T. S. (2002). Categorization, concept learning, and behavior analysis: An introduction. Journal of the Experimental Analysis of Behavior, 78(3), 237-248. DOI: https://doi.org/10.1901/jeab.2002.78-237

Zhuoxuan, J., Yan, Z., Xiaoming, L. (2015). Learning behavior analysis and prediction based on MOOC data. Journal of computer research and development, 52(3), p. 614.

--0--

Downloads

Published

2019-12-31

How to Cite

Achar, S. (2019). Behavioral and Perceptual Models for Secure Data Analysis and Management. Global Disclosure of Economics and Business, 8(2), 143-152. https://doi.org/10.18034/gdeb.v8i2.653