• Research Paper on:
    Computer Information Systems Industry Employment

    Number of Pages: 5

     

    Summary of the research paper:

    In five pages this paper considers the views of 3 computer information systems' employees regarding pros, cons, and employment sacrifices. Three sources are cited in the bibliography.

    Name of Research Paper File: D0_JGAcisin.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    possible sacrifices that must be made are all discussed herein. Also gives some information as to texts that are considered most important to them in their line of work.  DATA MINING In todays security minded world and after the terrorist attacks that are happening everywhere, one important job in the computer information systems field is in that of  data mining. In his job Robert Tager does security data mining for a number of clients. This involves pulling up information about individuals. As Tager relates, it  is somewhat akin to be a private investigator via the Internet. One of his favorite books on the subject is Principles of Data Mining by Heikki Mannila, Padhraic Smyth,  and David J. Hand. His field is extremely interesting he claims, and it is also very thought provoking. He constantly has to look for ways to find out bits  and pieces of information about possibly dangerous people. In fact, the latest software for electronic profiling enables the user to collect intensive information from various sources through aggressive data  mining and artificial intelligence techniques. The problem as will be addressed herein is that while the technology is in place to collect this information on individuals, who is justified  in using it, and why? Seemingly any company wishing to do intense data scanning on consumers will be able to justify to their own satisfaction the use of privacy-invading  software tactics. The drawback to this job is that because of the data mining techniques employed by some airlines to label potential terrorists, one family was subjected to humiliating searches  at airports as software had labeled him and his family as potential terrorists. This was completely erroneous but because he frequently traveled to his native country, software had put 

    Back to Research Paper Results