Behavioral and Perceptual Models for Secure Data Analysis and Management
DOI:
https://doi.org/10.18034/gdeb.v8i2.653Keywords:
Collective Behavior Analysis, Artificial intelligence, Data ModelAbstract
The ability to monitor and forecast citizen behavior on a large scale developed to be a top target for governments subject to security and intelligence that are collective in the current worldwide culture where the web has become the primary medium for commerce and communication. Meanwhile, significant privacy-related issues have surfaced considering the innovative opportunities that artificial intelligence (AI) generates for collective behavior analysis when presented to governments as a way in which the government will comprehend. In the current study, we conducted an extensive literature analysis using techniques such as data mining and interviews such as in-depth to determine the primary uses of Artificial Intelligence that governments use and describe citizens' privacy issues. Our findings showed that the government employed 11 AI initiatives to enhance interactions with residents, local organizations, services offered by government agencies, and the economy, among other things. Issues are identified relating to the risk of behavior modification, intelligent decision-making, data privacy regulation and law, digital surveillance, and decision automation as they pertain to people's privacy when governments deploy AI. Finally, the report concluded that the debate of developing rules centered on the moral citizen data architecture gathering, with consequences for governments aiming to regulate security, morality, and data privacy. We also suggest a study schedule with 16 research questions to be investigated in future studies.
Downloads
References
Achar, S. (2015). Requirement of Cloud Analytics and Distributed Cloud Computing: An Initial Overview. International Journal of Reciprocal Symmetry and Physical Sciences, 2, 12–18. Retrieved from https://upright.pub/index.php/ijrsps/article/view/70 DOI: https://doi.org/10.18034/ijrsps.v2.70
Achar, S. (2016). Software as a Service (SaaS) as Cloud Computing: Security and Risk vs. Technological Complexity. Engineering International, 4(2), 79-88. https://doi.org/10.18034/ei.v4i2.633 DOI: https://doi.org/10.18034/ei.v4i2.633
Achar, S. (2018). Security of Accounting Data in Cloud Computing: A Conceptual Review. Asian Accounting and Auditing Advancement, 9(1), 60–72. https://4ajournal.com/article/view/70
Barrionuevo, M., Lopresti, M., Miranda, N., & Piccoli, F. (2018). Secure computer network: Strategies and challengers in big data era. Journal of Computer Science and Technology, 18(3). https://doi.org/10.24215/16666038.18.e28 DOI: https://doi.org/10.24215/16666038.18.e28
Chimakurthi, V. N. S. S. (2017). Cloud Security - A Semantic Approach in End to End Security Compliance. Engineering International, 5(2), 97-106. https://doi.org/10.18034/ei.v5i2.586 DOI: https://doi.org/10.18034/ei.v5i2.586
Chimakurthi, V. N. S. S. (2018). Emerging of Virtual Reality (VR) Technology in Education and Training. Asian Journal of Humanity, Art and Literature, 5(2), 157-166. https://doi.org/10.18034/ajhal.v5i2.606 DOI: https://doi.org/10.18034/ajhal.v5i2.606
Dhall, S., Bhushan, B., & Gupta, S. (2016). An improved hybrid mechanism for secure data communication. International Journal of Computer Network and Information Security, 8(6), 67. DOI: https://doi.org/10.5815/ijcnis.2016.06.08
Emani, S., & Yamin, C. K. (2012). Patient perceptions of a personal health record: A test of the diffusion of innovation model. Journal of Medical Internet Research, 14(6). https://doi.org/10.2196/jmir.2278 DOI: https://doi.org/10.2196/jmir.2278
Gao, R., Wen, Y., & Zhao, H. (2015). Secure data fusion in wireless multimedia sensor networks via compressed sensing. Journal of Sensors. https://doi.org/10.1155/2015/636297 DOI: https://doi.org/10.1155/2015/636297
Gao, R., Wen, Y., Zhao, H., & Meng, Y. (2014). Secure data aggregation in wireless multimedia sensor networks based on similarity matching. International Journal of Distributed Sensor Networks, https://doi.org/10.1155/2014/494853 DOI: https://doi.org/10.1155/2014/494853
Pahl, C., & Xiong, H. (2013, September 1). Migration to PaaS clouds - Migration process and architectural concerns. 2013 IEEE 7th International Symposium on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, IEEE Xplore, 86-91. https://doi.org/10.1109/MESOCA.2013.6632740 DOI: https://doi.org/10.1109/MESOCA.2013.6632740
Pham, T. D., Tran, D., & Ma, W. (2017). Ownership protection of outsourced biomedical time series data based on optimal watermarking scheme in data mining. Australasian Journal of Information Systems, 21. https://doi.org/10.3127/ajis.v21i0.1541 DOI: https://doi.org/10.3127/ajis.v21i0.1541
Talukder, A. K., Zimmerman, L., & A, P. H. (2010). Cloud Economics: Principles, Costs, and Benefits. Computer Communications and Networks, 343–360. https://doi.org/10.1007/978-1-84996-241-4_20 DOI: https://doi.org/10.1007/978-1-84996-241-4_20
Yang, Z., Huang, Y., Li, X., & Wang, W. (2018). Efficient secure data provenance scheme in multimedia outsourcing and sharing. Computers, Materials, & Continua, 56(1), 1-17. https://doi.org/10.3970/cmc.2018.03697
Zentall, T. R., Galizio, M., Critchfield, T. S. (2002). Categorization, concept learning, and behavior analysis: An introduction. Journal of the Experimental Analysis of Behavior, 78(3), 237-248. DOI: https://doi.org/10.1901/jeab.2002.78-237
Zhuoxuan, J., Yan, Z., Xiaoming, L. (2015). Learning behavior analysis and prediction based on MOOC data. Journal of computer research and development, 52(3), p. 614.
--0--