International Journal of Social Science & Economic Research
Submit Paper

Title:
STORIES UNFOLD: ISSUES AND CHALLENGES ON DATA PRIVACY USING LATENT DIRICHLET ALLOCATION ALGORITHM

Authors:
Jeffrey C. Cinco

|| ||

Jeffrey C. Cinco
Leyte Normal University, Philippines

MLA 8
Cinco, Jeffrey C. "STORIES UNFOLD: ISSUES AND CHALLENGES ON DATA PRIVACY USING LATENT DIRICHLET ALLOCATION ALGORITHM." Int. j. of Social Science and Economic Research, vol. 3, no. 1, Jan. 2018, pp. 347-360, ijsser.org/more2018.php?id=21. Accessed 2018.
APA
Cinco, J. C. (2018, January). STORIES UNFOLD: ISSUES AND CHALLENGES ON DATA PRIVACY USING LATENT DIRICHLET ALLOCATION ALGORITHM. Int. j. of Social Science and Economic Research, 3(1), 347-360. Retrieved from ijsser.org/more2018.php?id=21
Chicago
Cinco, Jeffrey C. "STORIES UNFOLD: ISSUES AND CHALLENGES ON DATA PRIVACY USING LATENT DIRICHLET ALLOCATION ALGORITHM." Int. j. of Social Science and Economic Research 3, no. 1 (January 2018), 347-360. Accessed , 2018. ijsser.org/more2018.php?id=21.

References
[1]. Jain, P., Gyanchandani, M., & Khare, N. (2016). Big data privacy: a technological perspective and review. Journal of Big Data, 3(1), 25.
[2]. Malin, B., & Sweeney, L. (2004). How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. Journal of biomedical informatics, 37(3), 179-192.
[3]. Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., & Guo, S. (2016). Protection of big data privacy. IEEE access, 4, 1821-1834.
[4]. Grahan Greenleaf. (2010). Comparative study on different approaches to privacy challenges, in particular in the light of technological developments. Retrieved from http://ec.europa.eu/justice/dataprotection/document/studies/files/new_privacy_challenges/final_report_country_report_b3_hong _kong.pdf. Retrieved on May 9, 2017.
[5]. Jeremy M. Mittman. (2014). Singapore issues new regulations in advance of data protection law entering into force. Retrieved from http://privacylaw.proskauer.com/2014/06/articles/international/singapore-issues-newregulations-in-advance-of-data-protection-law-entering-into-force/. Retrieved on May 10, 2017.
[6]. Data security and cybercrime in Italy. Lexology. Retrieved from http://www.lexology.com/library/detail.aspx?g=ed4fa22f-e1de-4333-9ba7-15698e038aff. Retrieved on May 10, 2017
[7]. Online privacy law: United Kingdom. Library of Congress. Retrieved from https://www.loc.gov/law/help/online-privacy-law/uk.php. Retrieved on May 10, 2017.
[8]. Danny Bradbury. (2015). Security and privacy concerns raised around internet of things. Retrieved from http://www.itworldcanada.com/article/what-canadians-can-learn-from-ftcsinternet-of-things-report/101687. Retrieved on May 10, 2017.
[9]. Big data, privacy and security. (nd). The Netherlands Scientific Council for Government Policy. Retrieved from https://english.wrr.nl/topics/big-data-privacy-and-security. Retrieved on May 10, 2017.
[10]. Rainier, A.R. & Crisostomo, S. (2017). Privacy body probes new COMELEC data breach. Retrieved from http://www.philstar.com/headlines/2017/02/21/1674297/privacy-body-probesnew-comelec-data-breach. Retrieved on May 10, 2017.
[11]. Data protection. (nd). Privacy International. Retrieved from https://www.privacyinternational.org/node/44. Retrieved on May 10, 2017.
[12]. Data privacy day - January 28, 2017. (nd). Mississippi Department of Information Technology Services. Retrieved from http://www.its.ms.gov/services/pages/january-28th-is-national-dataprivacy-day.aspx. Retrieved on May 10, 2017
[13]. Data privacy act of 2012. (nd). National Privacy Commission. Retrieved from https://privacy.gov.ph/wp-content/uploads/DPA-of-2012.pdf. Retrieved on May 11, 2017.
[14]. Information. (nd). YOUR Dictionary. Retrieved from http://www.yourdictionary.com/information. Retrieved on May 13, 2017
[15]. Communication privacy management theory. Revolvy. Retrieved from https://www.revolvy.com/main/index.php?s=Communication%20privacy%20management%20th eory. Retrieved on May 16, 2017.
[16]. Data privacy Day. Energy.gov. Retrieved from https://energy.gov/cio/data-privacy-day. Retrieved on June 5, 2017.
[17]. Data Privacy Act of 2012. National Privacy Commission. Retrieved from https://privacy.gov.ph/data-privacy-act-primer/. Retrieved on June 7, 2017.
[18]. Data Privacy and Cybersecurity. (n.d.) Andrews Kurth. Retrieved from https://www.andrewskurth.com/assets/pdf/marea_240.pdf. Retrieved on June 10, 2017.
[19]. Thomson, L. L. (2013). Health Care Data Breaches and Information Security. In American Bar Association (pp. 253-267).
[20]. Sen, J. (2013). Security and privacy issues in cloud computing. Architectures and Protocols for Secure Information Technology Infrastructures, 1-45.
[21]. Koops, B. J. (2014). The trouble with European data protection law. International Data Privacy Law, 4(4), 250-261.
[22]. Usama Fayyad, Gregory Piatetsky-Shapiro, and Padhraic Smyth. (1996). From Data Mining to Knowledge Discovery in Databases. Retrieved from https://ww.csd.uwo.ca/faculty/ling/cs435/fayyad.pdf Retrieved on June 14, 2017.
[23]. Hau, D. (2003). Unauthorized Access - Threats, Risk, and Control. Retrieved from https://www.giac.org/paper/gsec/3161/unauthorized-access-threats-risk-control/105264. Retrieved on June 20, 2017
[24]. Priyadharsini, C and Thanamani, A.S. (2014). An Overview of Knowledge Discovery Database and Data mining Techniques
[25]. UNESCO. (nd). Access to Information. Retrieved from http://en.unesco.org/themes/accessinformation. Retrieved on July 24, 2017.

Abstract:
An emerging trend in the cyberspace is called data privacy that is often unattended and ignored by Netizens. This paper looks into available documents found in journals, news articles and published reports to understand and uncover hidden issues and challenges about data privacy. These documents were extracted and processed using web mining technique and methods using topic modeling of Natural Language Processing (NLP). This study utilized Latent Dirichlet Allocation Algorithm (LDA) using R-programming. LDA is an unsupervised machine learning that has the capability to generate latent themes from the collected text documents or corpus. As a result, five latent themes were identified based on the result and a profound understanding of how data privacy affects the internet society nowadays.

IJSSER is Member of