The Australian Computer Society Code of Legit Habits 2014 is expected to be applied by all Computing Professionals in Australia. It sets out six values but stresses the primacy of the public passion as the overriding rate.

COMP3425 Files Mining Assignment 1 2026 | Australian National College (ANU)

COMP3425 Files Mining Assignment 1

This project specification would possibly perhaps be updated to copy clarifications and changes after it is miles first issued.

You are required to put up a single file within the form of a single PDF file with a file name that choices your College U-number ID. The principle web page must bear a clearly identified title and author, with both name and college U-number, that would possibly perhaps form a separate duvet web page. You may well perhaps perhaps merely additionally connect supporting information as appendices within the same PDF file. Appendices would possibly perhaps no longer be marked.

Here’s a single-person project and desires to be carried out on your bear. It be necessary to make employ of quality reference cloth and reasonably reference via in-text citations, together with cloth offered to you within the course. Any cloth that you quote must bear the provision clearly referenced. It is unacceptable to display masks any piece of another author’s work as your bear. Anyone found doing so will be penalised in marks. Moreover to, ANU plagiarism procedures notice. This course introduces foremost ideas that would possibly perhaps doubtlessly be addressed by obvious Generative AI tools (e.g., ChatGPT). Hence, the employ of any Generative AI tools isn’t any longer approved in graded assessments inner this course.

You are strongly encouraged to initiate engaged on the project straight away. You may well perhaps perhaps put up as time and again as you desire. Supreme the last submission at the due date will be assessed.

Job

The Australian Computer Society Code of Legit Habits 2014 is expected to be applied by all Computing Professionals in Australia. It sets out six values but stresses the primacy of the public passion as the overriding rate. In 2018, the Australian Authorities Office of the Australian Files Commissioner launched the Files to Files Analytics and the Australian Privateness Principles (APP). In 2022, UNESCO published the Recommendation on the Ethics of Artificial Intelligence (SHS/BIO/PI/2021/1) for voluntary application by Member States. The advice is tall in scope and much-reaching in implementation responsibilities over the complete AI way lifecycle. It comprises an announcement of values and 10 principles that must be revered by all actors within the AI lifecycle, together with “information scientists, cease-customers, industrial enterprises, universities and public and non-public entities” (p. 10). These three documents are offered with this project specification.

Moreover to to those papers, you’d like to additionally read Clarke R. (2018), “Pointers for the Responsible Utility of Files Analytics”, Computer Law & Security Overview 34, 3 (Jul-Aug 2018), which is equipped with this project specification and hereafter usually known as the Pointers. It be necessary to additionally read the paper, Du, Liu and Hu (2020) “Tactics for Interpretable Machine Studying”, Communications of the ACM 63(1), which is additionally offered with the project.

You are to take into fable the application of the ACS code of conduct, the 10 UNESCO Principles, Clarke’s Pointers and Du et al’s Tactics to the following fictitious insider detection scenario. You may well perhaps perhaps merely additionally employ the APP e-book, which is handy.

Insider Detection Scenario (from Clarke R. (2016) “Gargantuan Files, Gargantuan Dangers”, Files Methods Journal 26, 1 (January 2016) 77-90, PrePrint at http://www.rogerclarke.com/EC/BDBR.html)

A executive company receives terse directions from the executive to rep out ahead of the whistleblower threat, with Brutus, Judas Iscariot, Macbeth, Manning and Snowden invoked as examples of trusted insiders who became. The company increases the intrusiveness and frequency of worker vetting and lowers the threshold at which obvious vetting is undertaken. To lengthen the pool of readily accessible information, the company workout routines its powers to develop rep admission to to border actions, credit rating history, court docket records, regulation enforcement companies’ persons-of-passion lists, and financial monitoring indicators. It applies great information analytics to a consolidated database comprising no longer fully these sources, but additionally all inner communications, and all postings to social media gathered by a specialist external services corporation.

The principle execute of these measures is to additional minimize worker loyalty to the organisation. To the extent that productivity is measurable, it sags. The fraudulent positives increasing from information analytics explode thanks to the leap in negative sentiments expressed on inner networks and in social media, and within the vituperative language that the postings comprise. The fraudulent positives drastically lengthen the scale of the haystack, making the presumed needles even more sturdy to safe. The toxic ambiance increases the alternatives for a vindictive insider to obfuscate their activities and even to safe entertaining collaborators. In the end, frosty heads prevail by declaring how few contributors ever primarily leak information without authority.

The wave of over-reaction slowly subsides, leaving a bruised and dissatisfied staff with a coarse taste in its mouth. [Section 4].

It be necessary to acknowledge the following questions, clearly indicating which put a question to you are answering inner your submission. The safe page lengths urged for every put a question to here are for steering fully; the given web page length restrict for the final project is critical.

Demand 1. (1 web page) Lift into consideration the ACS code of conduct. For every of the six values, taking fable of any associated sub-way, discuss whether or no longer the associated rate become demonstrated within the scenario and to what extent. At the same time as you assess any rate as largely irrelevant to the scenario, then a extraordinarily transient motive for this overview is enough.

Demand 2. (1/2 web page) Lift into consideration the 10 UNESCO Principles [S III.2]. Taking a look closely at Precept Proportionality and Enact No Damage [p20], discuss how this principle is applied (or no longer) within the scenario and title any attainable hurt that would possibly perhaps merely want ensued.

Demand 3. (2 pages) Lift into consideration the numbered tricks in Desk 2 of Clarke’s Pointers for the in fee application of information analytics. From every segment (1 Long-established, 2 Files Acquisition, 3 Files prognosis, and 4 Utilize of the Inferences), resolve one guideline that you are taking into fable would bear been applied within the scenario. Its application would possibly perhaps merely no longer be explicit within the scenario description, but it completely must be associated and necessary to the scenario, and which that you can argue that it become applied effectively and therefore didn’t make a contribution to the negative penalties of the scenario. Whisper its role within the scenario, together with the way it will bear contributed to obvious outcomes. Define why it is miles extra associated than all and sundry among the different tricks that you are taking into fable would bear been applied within the same segment. Argue the way it is miles roughly associated than any tricks within the same segment that you are taking into fable would possibly perhaps merely bear been neglected within the scenario. Watch out to take into fable the procedure of the tricks slightly than a very literal interpretation; which that you can merely rephrase the chosen guideline for the scenario context the put precious. For added clarification of this level, look Piece 3 in Clarke’s Pointers.

Demand 4. (1 web page) (a) Settle one, numbered guideline (e.g. guideline 3.3) in Desk 2 of the Pointers that you are taking into fable to bear been neglected within the scenario. You may well perhaps perhaps merely resolve any guideline that you didn’t resolve for Demand 3. Discuss how the failure to take into fable the guideline of thumb would possibly perhaps bear contributed to the negative of the scenario. (b) Moreover to, title some other attainable penalties that would possibly perhaps bear occurred due to the the failure to take into fable that same guideline. For this cause, the penalties you resolve are no longer necessarily explicit accurate thru the scenario description. You may well perhaps perhaps safe it handy to take into fable this exercise as contributing to a chance overview process earlier than your hypothetical involvement within the prognosis work of the scenario.

Demand 5. (1 web page) Lift into consideration the paper by Du et al, Tactics for Interpretable Machine Studying. Discuss whether or no longer and the way intrinsic and put up-hoc interpretability ways will be applied to the scenario and what advantages would possibly perhaps ensue

QUALITY: 100% ORIGINAL PAPER NO ChatGPT.NO PLAGIARISMCUSTOM PAPER

Best Custom Essay Writing Services

Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.

We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.

Why Choose AcademicWritersBay.com?

  • Our papers are 100% original, custom-written from scratch.
  • We’re here to support you around the clock, any day of the year.
  • You’ll find our prices competitive and reasonable.
  • We handle papers across all subjects, regardless of urgency or difficulty.
  • Need a paper urgently? We can deliver within 6 hours!
  • Relax with our on-time delivery commitment.
  • We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
  • Benefit from unlimited amendments upon request to get the paper you envisioned.
  • We pledge our dedication to meeting your expectations and achieving the grade you deserve.

Our Process: Getting started with us is as simple as can be. Here’s how to do it:

  • Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
  • Provide the specifics of your paper in the “PAPER DETAILS” section.
  • Select your academic level, the deadline, and the required number of pages.
  • Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
  • Follow the simple payment instructions and soon, our writers will be hard at work on your paper.

AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.

ORDER NOW and experience the difference with AcademicWritersBay.com, where excellence meets timely delivery.

NO PLAGIARISM