Шукаєте відповіді та рішення тестів для BCSE318L Data Privacy (Theory) Winter 2024-25 (C2+TC2) [VL2024250501609]? Перегляньте нашу велику колекцію перевірених відповідей для BCSE318L Data Privacy (Theory) Winter 2024-25 (C2+TC2) [VL2024250501609] в moovit.vit.ac.in.
Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!
A hospital maintains a network of patients and doctors where edges represent consultations. To share this dataset for medical research while preserving patient privacy, which method would be most effective?
An attacker uses publicly available information to match anonymized patient records and infer a person’s illness. This is an example of:
Netflix released an anonymized dataset of movie ratings for a research competition. However, researchers were able to link records to IMDb users, revealing personal movie preferences. What was the main weakness in Netflix’s anonymization process?
A social science research institute tracks household spending habits over 5 years. To anonymize this longitudinal data, which approach is most effective?
A bank releases transaction records of its customers after applying k-anonymity. However, all customers in one anonymized group have the same income level.This allows an attacker to infer a person’s salary if they know the group to which the person belongs.
Question:Which technique should the bank implement to strengthen privacy protection?
A hospital releases an anonymized dataset with Age and ZIP Code as quasi-identifiers:
Age | Zip Code | Disease |
30-35 | 1234X | diabetes |
30-35 | 1234X | flu |
30-35 | 1234X | cancer |
36-40 | 456Y | cancer |
36-40 | 456Y | flu |
36-40 | 456Y | flu |
What is the k-value in this dataset for k-Anonymity?
In the context of dynamic data protection, what does the term "data masking" refer to?
If a dataset satisfies 3-Anonymity, what does it mean?
A company wants to protect customer purchase data while allowing meaningful insights for analysis. They apply differential privacy but notice that adding too much noise affects accuracy.
Question:What is the primary trade-off when using differential privacy?
A company uses a differential privacy technique to release customer data but uses a very low epsilon (ε) value. While the data is heavily perturbed, it loses its usability for business analysis. What risk does this illustrate?
Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!