Show simple item record

dc.contributor.authorVranopoulos, G
dc.contributor.authorClarke, N
dc.contributor.authorAtkinson, S
dc.date.accessioned2023-11-02T08:51:57Z
dc.date.available2023-11-02T08:51:57Z
dc.date.issued2023-10-31
dc.identifier.issn2167-6461
dc.identifier.issn2167-647X
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/21535
dc.description.abstract

Organisations have been investing in analytics relying on internal and external data to gain a competitive advantage. However, the legal and regulatory acts imposed nationally and internationally have become a challenge, especially for highly regulated sectors like health or finance/banking. Data handlers like Facebook and Amazon have already sustained considerable fines or are under investigation due to violations of data governance. The era of Big Data has further intensified the challenges of minimising the risk of data loss by introducing the dimensions of Volume, Velocity and Variety into confidentiality. Although Volume and Velocity have been extensively researched, Variety, "the ugly duckling" of Big Data, is often neglected and difficult to solve, thus increasing the risk of data exposure and data loss. In mitigating the risk of data exposure and data loss in this paper, a framework is proposed to utilise algorithmic classification and workflow capabilities to provide a consistent approach towards data evaluations across the organisation. A rule-based system, implementing the corporate data classification policy, will minimise the risk of exposure by facilitating users to identify the approved guidelines and enforce them quickly. The framework includes an exception handling process with appropriate approval for extenuating circumstances. The system was implemented in a Proof of Concept working prototype to showcase the capabilities and provide a hands-on experience. The Information System was evaluated and accredited by a diverse audience of academics and senior business executives in the fields of security and data management. The audience had an average experience of approximately 25 years and amasses a total experience of almost three centuries (294 years). The results confirmed that the 3Vs are of concern and that Variety, with a majority of 90% of the commentators, is the most troubling. In addition to that, with an approximate average of 60%, it was confirmed that appropriate policies, procedure and prerequisites for classification are in place whilst implementation tools are lagging.

dc.format.mediumPrint-Electronic
dc.languageen
dc.publisherMary Ann Liebert Inc
dc.subjectbig data
dc.subjectvariety
dc.subjectdata confidentiality
dc.subjectdata governance data loss prevention
dc.subjectdata exposure
dc.subjectanonymization
dc.subjectdepersonalization
dc.subjectde-anonymization
dc.subjectreidentification
dc.titleBig Data Confidentiality: An Approach Toward Corporate Compliance Using a Rule-Based System
dc.typejournal-article
dc.typeArticle
dc.typeEarly Access
plymouth.author-urlhttps://www.ncbi.nlm.nih.gov/pubmed/37906117
plymouth.publication-statusPublished online
plymouth.journalBig Data
dc.identifier.doi10.1089/big.2022.0201
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Academics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics
dc.publisher.placeUnited States
dcterms.dateAccepted2023-09-12
dc.date.updated2023-11-02T08:51:51Z
dc.rights.embargodate2023-11-4
dc.identifier.eissn2167-647X
rioxxterms.versionofrecord10.1089/big.2022.0201


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV