<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Social security Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/social-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/social-security/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Mon, 10 Aug 2020 06:22:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>How to protect yourself from data mining</title>
		<link>https://www.aiuniverse.xyz/how-to-protect-yourself-from-data-mining/</link>
					<comments>https://www.aiuniverse.xyz/how-to-protect-yourself-from-data-mining/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 06:21:58 +0000</pubDate>
				<category><![CDATA[Data Mining]]></category>
		<category><![CDATA[data mining]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[Social security]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=10772</guid>

					<description><![CDATA[<p>Source: wxow.com Eau Claire (WQOW)-&#160;President Trump recently expressed his intention to ban Chinese-owned apps, like TikTok and WeChat, from the United States in order to protect Americans <a class="read-more-link" href="https://www.aiuniverse.xyz/how-to-protect-yourself-from-data-mining/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/how-to-protect-yourself-from-data-mining/">How to protect yourself from data mining</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: wxow.com</p>



<p><strong>Eau Claire (WQOW)-&nbsp;</strong>President Trump recently expressed his intention to ban Chinese-owned apps, like TikTok and WeChat, from the United States in order to protect Americans from data mining. But how serious is data mining, and what are some ways you can protect yourself from it?</p>



<p>Data mining involves the collection, storage and processing of large sets of data in order to spot patterns. Once identified, these patterns can be used by companies to better understand trends in purchasing behavior, help banks detect fraudulent credit card transactions or even aid in the detection of money laundering or other criminal activities.</p>



<p>However, some argue that the use of data mining is an invasion of customer privacy. Personal information, like social security numbers, may become vulnerable to hacking, identity theft, or other unethical behaviors.</p>



<p>Justin Patchin, an expert in social networking with UW-Eau Claire, said data mining is virtually unavoidable.</p>



<p>&#8220;Any website you use, any game you play, social media app, particularly if it&#8217;s free, you&#8217;re giving up your information by utilizing that platform,&#8221; Patchin said.</p>



<p>Patchin said the best way to avoid social media data mining is to avoid social media altogether. Still, other businesses will have your information in one form or another.</p>



<p>When it comes to TikTok, Patchin said users can limit their data sharing by simply viewing videos, rather than posting.</p>
<p>The post <a href="https://www.aiuniverse.xyz/how-to-protect-yourself-from-data-mining/">How to protect yourself from data mining</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/how-to-protect-yourself-from-data-mining/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Use Machine Learning to Manage User Access</title>
		<link>https://www.aiuniverse.xyz/how-to-use-machine-learning-to-manage-user-access/</link>
					<comments>https://www.aiuniverse.xyz/how-to-use-machine-learning-to-manage-user-access/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Sat, 16 Sep 2017 06:54:08 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Machine Learning]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[data goldmine hackers]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[ML algorithm]]></category>
		<category><![CDATA[ML Engineer]]></category>
		<category><![CDATA[Social security]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=1155</guid>

					<description><![CDATA[<p>Source &#8211; rtinsights.com As machine learning methods continue to improve, so do the possibilities of their utility throughout all industries. The worlds of healthcare and finance, for example, <a class="read-more-link" href="https://www.aiuniverse.xyz/how-to-use-machine-learning-to-manage-user-access/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/how-to-use-machine-learning-to-manage-user-access/">How to Use Machine Learning to Manage User Access</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; <strong>rtinsights.com</strong></p>
<p>As machine learning methods continue to improve, so do the possibilities of their utility throughout all industries. The worlds of healthcare and finance, for example, are particularly vulnerable to breaches in data security. Social security numbers, names, addresses and financial information are the data goldmine hackers are seeking to find and exploit.</p>
<p>While technologies such as blockchain are quickly evolving to make it nearly impossible for data to be hacked, their complexity and limitations aren’t currently functional for the millions of transactions that occur (particularly in the finance sector).</p>
<h2><strong>Machine learning and the human factor</strong></h2>
<p>Experian recently released an report stating that 66 percent of companies surveyed admitted that employees are “the weakest link in their efforts to create a strong security posture.” As such, not only are there serious threats external to organizations, but also a distinct risk of negligence from employees who are careless or purposeful in enacting a data breach.</p>
<p>The more data breaches that occur, the less confidence consumers have in the organizations that store sensitive data. Capital One is one organization working to scale machine learning methodologies to manage both external and internal user access. Recently, Jon Austin, a machine learning engineer from Capital One, gave a demonstration at the Qubole Data Platforms Conferenceof how the enterprise is using machine learning to manage administrative access on the back end.</p>
<p>“Start with the problem you are trying to solve” Austin said, while swiftly clicking through an array of graphics depicting edges and nodes. “Nodes are your individuals who have access to the data, and the edges are the relationships between the nodes.” The primary information Austin emphasized through his training data was the frequency of each user’s access to areas of the Capital One database. Using the Jaccard Index calculation, Austin and his team could then measure the similarities among users. This would further assist in determining the who, what, where, and when of access.</p>
<h2><strong>How machine learning identifies user patterns</strong></h2>
<p>But how can this help user access management? As Austin explained, machine learning models can be trained to recognize normal vs. abnormal (or risky) user access patterns. For example, if data scientist Dana usually enacts access and initiates her pull requests from her work computer between 8 a.m. and 5 p.m. Pacific time, the machine learning algorithm recognizes this as a typical pattern. However, if she’s traveling for a conference and tries to access the database from her laptop outside the normal timeframe – even if using a VPN – the machine learning algorithm will flag this as abnormal and prevent Dana from access.</p>
<p>Of course, these edge-case scenarios can be accounted for with further training and test sets. Also, Dana could notify the administrator that she’ll be requesting access from a different location and within a different time zone. As such, access privileges can be modified to accommodate the shift.</p>
<p>The primary takeaway here is to continuously update the machine learning model to adapt to new situations, but also to discern outlier scenarios and alert administrators. From that point, the administrator can immediately act so Dana can continue with her work. Or, if Dana is not traveling and this is a possible data breach threat, then the organization is alerted before any damage is done.</p>
<p>Certainly, machine learning is in the fine-tuning stages. And humans still need to play intermediary for taking decisive action on the information that algorithms provide. Machine learning can, however, lessen the latency gap between unauthorized access and a disastrous data breach.</p>
<p>Human beings are perpetually penetration testing. Machine learning won’t change that fundamental aspect of human nature. But, it’s a handy prevention tool that should be seriously considered in managing the intricacies of user access.</p>
<p>The post <a href="https://www.aiuniverse.xyz/how-to-use-machine-learning-to-manage-user-access/">How to Use Machine Learning to Manage User Access</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/how-to-use-machine-learning-to-manage-user-access/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
