Looking for BCSE318L Data Privacy (Theory) Winter 2024-25 (C2+TC2) [VL2024250501609] test answers and solutions? Browse our comprehensive collection of verified answers for BCSE318L Data Privacy (Theory) Winter 2024-25 (C2+TC2) [VL2024250501609] at moovit.vit.ac.in.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
A hospital maintains a network of patients and doctors where edges represent consultations. To share this dataset for medical research while preserving patient privacy, which method would be most effective?
An attacker uses publicly available information to match anonymized patient records and infer a person’s illness. This is an example of:
Netflix released an anonymized dataset of movie ratings for a research competition. However, researchers were able to link records to IMDb users, revealing personal movie preferences. What was the main weakness in Netflix’s anonymization process?
A social science research institute tracks household spending habits over 5 years. To anonymize this longitudinal data, which approach is most effective?
A bank releases transaction records of its customers after applying k-anonymity. However, all customers in one anonymized group have the same income level.This allows an attacker to infer a person’s salary if they know the group to which the person belongs.
Question:Which technique should the bank implement to strengthen privacy protection?
A hospital releases an anonymized dataset with Age and ZIP Code as quasi-identifiers:
Age | Zip Code | Disease |
30-35 | 1234X | diabetes |
30-35 | 1234X | flu |
30-35 | 1234X | cancer |
36-40 | 456Y | cancer |
36-40 | 456Y | flu |
36-40 | 456Y | flu |
What is the k-value in this dataset for k-Anonymity?
In the context of dynamic data protection, what does the term "data masking" refer to?
If a dataset satisfies 3-Anonymity, what does it mean?
A company wants to protect customer purchase data while allowing meaningful insights for analysis. They apply differential privacy but notice that adding too much noise affects accuracy.
Question:What is the primary trade-off when using differential privacy?
A company uses a differential privacy technique to release customer data but uses a very low epsilon (ε) value. While the data is heavily perturbed, it loses its usability for business analysis. What risk does this illustrate?
Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!