Protection of Direct and Indirect Discrimination using Prevention Methods
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Along with privacy, discrimination is a very important issue when considering the legal and ethical aspects of data mining. It is more than observable that the majority people do not want to be discriminated because of their gender, nationality, religion, age and so on, particularly when those aspects are used for making decisions about them like giving them a occupation, loan, insurance, etc. determining such possible biases and eliminating them from the training data without harming their decision-making utility is therefore extremelypopular. For this reason, antidiscrimination methods containing discrimination detection and prevention have been introduced in data mining. Discrimination prevention consists of suggestmodels that do not lead to discriminatory decisions even if the original training datasets are essentially biased. In this section, by focusing on the discrimination prevention, we present taxonomy for classifying and examining discrimination prevention schemes. Then, we begin a group of pre-processing discrimination prevention schemes and indicate the special features of each approach and how these approaches deal with direct or indirect discrimination. A production of metrics used to estimate the performance of those approaches is also specified. In conclusion, we finish our learn by specifying interesting future directions in this research body.
Authors and Affiliations
S. Rajeswari
A review of High Performance Computing
Current high performance computing (HPC) applications are found in many consumers, industrial and research fields. There is a great deal more to remote sensing data than meets the eye, and extracting that inform...
A Business Oriented Framework For Enhancing Web Security Service (BOF4EWSS) Network And Features For E-Businesses Classification Techniques.
Abstract: In the field of web security service is an extremely complex and very contemporary issue. As soon as the considering this current technology suite to assist the interacting e-businesses challenges for security...
Visual Representations in High School Edublogs
Abstract: Visuals speak a language of their own. In fact, they can have more impact than words. Whenprepared intuitively, they have the power to overcome regional barriers, in terms of comprehensibility of verballa...
Audio Steganography Using Discrete Wavelet Transformation(DWT) & Discrete Cosine Transformation (DCT)
Abstract: Steganography is an art and a science of communicating in a way, which hides the existence of thecommunication. It is also called as “covered writing”, because it uses a “cover” of a message for sending a...
Classification Algorithms for Predicting Computer Science Students Study Duration
The Department of Computer Science Universitas Klabat offers a bachelor program in Computer Science which should be completed within eight semesters or four years. Some students can accomplish the course in less than fou...