ITC516 Data Mining And Visualisation For Business Intelligence

ITC516 Data Mining And Visualisation For Business Intelligence

Free Samples

ITC516 Data Mining And Visualisation For Business Intelligence

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

ITC516 Data Mining And Visualisation For Business Intelligence

0 Download5 Pages / 1,079 Words

Course Code: ITC516
University: Charles Sturt University is not sponsored or endorsed by this college or university

Country: Australia

There will be an online quiz during Week 6). The online quiz must be attempted by the students individually on the Interact site for ITC516. The Quiz is worth 5 marks of the overall marks available for assessment 2.Students need to attempt and finish the online quizzes within the specific date and time window.You will have an hour (1 hour) to complete the quiz which consists of 30 multiple choice questions. Once you start your quiz, you must complete it in one sitting. You only have one attempt at the quiz. The topics of the online quizzes are:Introduction to Data MiningData InterpretationKnowledge RepresentationOverview of Basic Algorithms and CredibilityDecision Trees Part 2 – Written Exercise Topic: Security, Privacy and Ethics in Data Mining.In this task, you are required to read the journal articles provided below and write a short discussion paper based on the topic of security, privacy and ethics in data mining. You must:identify the major security, privacy and ethical implications in data mining;evaluate how significant these implications are for the business sector; andsupport your response with appropriate examples and references.

Big Data makes extensive use of data mining techniques in order to make use of data that has been collected (Solove, 2008). Data mining extracts data from large databases such that they can be used by contemporary organizations. The process of data mining possesses substantial security, ethical and privacy threats. The current scope of analysis includes discussing implications that contemporary organization faces with relevant examples.
Big Data collects large and varied types of data and then data mining extracts such data. These data are further processed through data analytics such as to arrive at decisions (Abouelmehdi, Beni-Hssane, Khaloufi & Saadi, 2017). These data encompasses company related data, consumer data and other related information. This information extracted consists of various personal and confidential based information, which might pose ethical, security and privacy related threats. Therefore, companies need to make evaluation prior to using such data related to their data analytics purposes.
Security threats comprise of using data from old along with new databases. Data mining professionals working with large volumes of data might be making use of extensive data by extracting them (Jensen, Jensen & Brunak, 2012). Availability of huge volumes of data and information such as consumer records and confidential information might lead to considerable security threats.
Example of Security Threat: Customer using credit card in their purchase at a retail store and such information being made available to varied data analytics professional might pose considerable threats. It is for this reason that Tesco allows other associate companies to use limited part of its databases. It has special programs for data coding and protection for data extraction.  
Privacy threats in data analytics might arise in case private information is collected from customers. Companies using Big Data might be making use of consumer information using technologies available. This might put consumer information at risk.
Example: IBM is devising mechanism for providing accurate data models, which can protect consumer privacy and confidentiality. Privacy threats are so well-spread that almost every other company today is making use of consumer data in analytics (Xu, Jiang, Wang, Yuan & Ren, 2014).
Ethical concerns connecting to data analytics might arise as consumers are never aware of their private information being used. Companies and government at certain times makes use of private consumer information for greater good. But in every case they need to make consumers aware regarding use of such information (Chen, Chiang & Storey, 2012). This would prevent any rise in ethical concerns of the Company and Government as well.
Example: Government making use of Income Tax return to estimate earning of a portion of population is an ethical concern.
Implications for Businesses Regarding Security, Privacy and Ethical Issues
Implications regarding security, privacy and ethical threats are considerable in the Big Data sector. Data mining has raised several concerns on brand names causing their defamation. Companies while making use of consumer data needs to make them aware through a disclaimer (McDermott, 2017). This would prevent any sort of ethical implications or legal proceedings in the future. It would also allow companies the opportunity to manage and establish their brand names for the future and build on consumer brand loyalty. Consumer awareness in recent period has led to rise to companies seeking steps towards information consumers. This would lead to better dealings with consumers and avoid legal litigation (Michael & Miller, 2013). Number of countries is now developing rules and regulations that prevent companies from undertaking unethical data and information of their consumers. Therefore, companies can avoid such legal proceedings and adopt sustainable procedures in their Big Data.
Data mining aimed at providing benefits in data analytics to businesses, poses considerable threats to general consumers. Companies need to consider possibilities to reduce any threats occurring from security, privacy and ethical related concerns. Consumers need to be made aware regarding usage of such data so that there is no defamation case against the brand name. This would allow prevention of brand name deterioration and conduct in an ethical manner.

ANS: The DATA.txt file was created by including relation, attribute, and data keywords preceded by a “@” symbol. The ‘DATA.txt’ was later saved in .arff format, and opened in Weka. The screenshot of the initial screen of Weka has been provided in Figure 1.

ANS: The data was analyzed in Weka and the histograms in Figure 2 reveal the characteristics of the information. Descriptive values of the attributes were observed in the process tab page and screenshots have been provided (Figure 3 – Figure 7). The number of missing values, mean, standard deviations along with maximum and minimum values were provided by the compiler for each attribute. The scatter plots from the Visualize tab page has been presented in Figure 8. High scattered (low correlation) nature of the data points was observed from the scatter plots.

Unsupervised Discretize filter was applied to the Assignment-4 attribute and a screenshot of the filter output has been provided in Figure 9. The filter transformed the range of numeric attributes into nominal attributes, by simple binning. The shape seemed to be rightly skewed.

The filling of the missing values in Weka Viewer window manually was possible and the screenshot has been provided in Figure 10. The ‘Replace Missing Value’ filter was used and the missing values were replaced by the mean values of the attributes. The filter outputs have been provided using screenshots (Figure 11 – Figure 15). ‘Replace Missing Value’ filter screen has been put in Figure 16, which suggested mode and mean as the probable replacement for the missing values

Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., &Saadi, M. (2017). Big Data security and privacy in healthcare: a review. Procedia Computer Science, 113, 73-80.
Chen, H., Chiang, R.H. and Storey, V.C., 2012. Business intelligence and analytics: from big data to big impact. MIS quarterly, pp.1165-1188.
Jensen, P.B., Jensen, L.J. and Brunak, S., 2012. Mining electronic health records: towards better research applications and clinical care. Nature Reviews Genetics, 13(6), p.395.
McDermott, Y. (2017). Conceptualising the right to data protection in an era of Big Data. Big Data & Society, 4(1), 2053951716686994.
Michael, K. and Miller, K.W., 2013. Big data: New opportunities and new challenges [guest editors’ introduction]. Computer, 46(6), pp.22-24.
Solove, D. J. (2008).Data mining and the security-liberty debate. The University of Chicago Law Review, 75(1), 343-362.
Xu, L., Jiang, C., Wang, J., Yuan, J. and Ren, Y., 2014. Information security in big data: privacy and data mining. IEEE Access, 2, pp.1149-1176.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 5 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). Data Mining And Visualisation For Business Intelligence. Retrieved from

“Data Mining And Visualisation For Business Intelligence.” My Assignment Help, 2021,

My Assignment Help (2021) Data Mining And Visualisation For Business Intelligence [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘Data Mining And Visualisation For Business Intelligence’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Data Mining And Visualisation For Business Intelligence [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



Looking for top-notch term paper writing service? can be the best choice for you. We have the finest team of 5000+PhD expert writers who provide you with unmatched assistance. Whether you are pursuing Marketing, Law, Nursing, English, and the likes, you will always receive a well-crafted term paper format. From offering you unwavering assistance in drafting an essay outline to conclude on a strong note; we have got it all. What more, we provide you with brilliant samples absolutely free which will help you in understanding how to write a term paper. To know more, have a word with 24*7 active customer support team.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Our Essay Writing Service Features

Qualified Writers
Looming deadline? Get your paper done in 6 hours or less. Message via chat and we'll get onto it.
We care about the privacy of our clients and will never share your personal information with any third parties or persons.
Free Turnitin Report
A plagiarism report from Turnitin can be attached to your order to ensure your paper's originality.
Safe Payments
The further the deadline or the more pages you order, the lower the price! Affordability is in our DNA.
No Hidden Charges
We offer the lowest prices per page in the industry, with an average of $7 per page
24/7/365 Support
You can contact us any time of day and night with any questions; we'll always be happy to help you out.
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$15.99 Plagiarism report
$3.99 Outline
$21.99 Unlimited Revisions
Get all these features for $65.77 FREE
Do My Paper

Frequently Asked Questions About Our Essay Writing Service

Academic Paper Writing Service

Our essay writers will gladly help you with:

Business Plan
Presentation or Speech
Admission Essay
Case Study
Reflective Writing
Annotated Bibliography
Creative Writing
Term Paper
Article Review
Critical Thinking / Review
Research Paper
Thesis / Dissertation
Book / Movie Review
Book Reviews
Literature Review
Research Proposal
Editing and proofreading
Find Your Writer

Latest Feedback From Our Customers

Customer ID:  # 678224
Research Paper
Highly knowledgeable expert, reasonable price. Great at explaining hard concerts!
Writer: Raymond B.
Customer ID: # 619634
Essay (any type)
Helped me with bear and bull markets right before my exam! Fast teacher. Would work with Grace again.
Writer: Lilian G.
Customer ID: # 519731
Research Paper
If you are scanning reviews trying to find a great tutoring service, then scan no more. This service elite!
Writer: Grace P.
Customer ID: #499222
Essay (any type)
This writer is great, finished very fast and the essay was perfect. Writer goes out of her way to meet your assignment needs!
Writer: Amanda B.
Place an Order

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:

Powered by

× WhatsApp Us