logo

Crowdly

BCSE318L Data Privacy (Theory) Winter 2024-25 (C2+TC2) [VL2024250501609]

Looking for BCSE318L Data Privacy (Theory) Winter 2024-25 (C2+TC2) [VL2024250501609] test answers and solutions? Browse our comprehensive collection of verified answers for BCSE318L Data Privacy (Theory) Winter 2024-25 (C2+TC2) [VL2024250501609] at moovit.vit.ac.in.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

A hospital maintains a network of patients and doctors where edges represent consultations. To share this dataset for medical research while preserving patient privacy, which method would be most effective?

View this question

An attacker uses publicly available information to match anonymized patient records and infer a person’s illness. This is an example of:

View this question

Netflix released an anonymized dataset of movie ratings for a research competition. However, researchers were able to link records to IMDb users, revealing personal movie preferences. What was the main weakness in Netflix’s anonymization process?

View this question

A social science research institute tracks household spending habits over 5 years. To anonymize this longitudinal data, which approach is most effective?

View this question

A bank releases transaction records of its customers after applying k-anonymity. However, all customers in one anonymized group have the same income level.

This allows an attacker to infer a person’s salary if they know the group to which the person belongs.

Question:

Which technique should the bank implement to strengthen privacy protection?

View this question

A hospital releases an anonymized dataset with Age and ZIP Code as quasi-identifiers:

AgeZip CodeDisease
30-351234Xdiabetes
30-351234Xflu
30-351234Xcancer
36-40456Ycancer
36-40456Yflu
36-40456Yflu

What is the k-value in this dataset for k-Anonymity?

View this question

In the context of dynamic data protection, what does the term "data masking" refer to?

View this question

If a dataset satisfies 3-Anonymity, what does it mean?

View this question

A company wants to protect customer purchase data while allowing meaningful insights for analysis. They apply differential privacy but notice that adding too much noise affects accuracy.

Question:

What is the primary trade-off when using differential privacy?

View this question

A company uses a differential privacy technique to release customer data but uses a very low epsilon (ε) value. While the data is heavily perturbed, it loses its usability for business analysis. What risk does this illustrate?

View this question

Want instant access to all verified answers on moovit.vit.ac.in?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!