Workshop on Privacy, Security, and Data Mining
How do we mine data when we aren't allowed to see it?

To be held in conjunction with The 2002 IEEE International Conference on Data Mining.

Maebashi TERRSA, Maebashi City, Japan, December 9, 2002

Printable version available in PDF


Program Now Available

In the light of developments in technology to analyze personal data, public concerns regarding privacy are rising. While some believe that statistical and Knowledge Discovery and Data Mining (KDDM) research is detached from this issue, we can certainly see that the debate is gaining momentum as KDDM and statistical tools are more widely adopted by public and private organizations hosting large databases of personal records. One of the key requirements of a data mining project is access to the relevant data. Privacy and Security concerns can constrain such access, threatening to derail data mining projects. The purpose of this workshop is to discuss these issues and promote achievements of researchers in the area. We want to bring together experts, including both researchers and practitioners, in privacy, data mining and its applications, and statistical database security.


There are many data mining situations where these privacy and security issues arise. A few examples are:

Workshop Content and Format

This will be a full day workshop, opening with a presentation by an invited speaker to set the stage. The rest of the day will consist of paper sessions with ample time for questions and breaks for discussion. The goal is to bring participants up to speed on the issues and solutions in this area, outline key research problems, and encourage collaborations to address these problems.

To encourage quality submissions, the proceedings will be published as Volume 14 of the Conferences in Research and Practice in Information Technology series. In addition, the best paper from the workshop will compete with regular papers from the International Conference on Data Mining to have extended versions considered for possible publication in the Journal of Knowledge and Information Systems.

Topics of Interest

Papers are solicited that identify and propose technical solutions to such problems. Sample topics (by no means an exhaustive list) include:


Attendance is not limited to the paper authors. We strongly encourage other interested parties to attend the workshop. One of the objectives of the workshop is to promote the interaction among researchers and those who have experienced security and privacy constraints on data mining.

Submission Guidelines

Papers should be at most 12 pages long in single-column format, 12-point font, with at least 1-inch margins on all sides. Please submit electronically (PDF or PostScript preferred, contact one of the chairs for help with other formats) to on or before September 13, 2002.

Important Dates

Intention to submit (appreciated, but not required)September 1, 2002
Submission Deadline:September 23, 2002
Acceptance Notification:October 7, 2002
Camera-ready Copies:October 21, 2002
Workshop date:December 9, 2002

Program Committee


Ljiljana Brankovic, University of Newcastle
Department of Computer Science and Software Engineering
University of Newcastle
Callaghan, New South Wales, 2308 Australia
+61-4921-6054, Fax: +61-4921-6929

Chris Clifton
Department of Computer Sciences
Purdue University
West Lafayette, Indiana 47907-2066 USA
+1 765-494-6005, Fax: +1 765 494-0739

Vladimir Estivill-Castro
School of Computing and Information Technology
Nathan and Logan Campuses
Griffith University
Brisbane 4111, Queensland, Australia
+61-7-3875-5402, Fax: +61-7-3875-5051

Daniel Barbará, George Mason University
Stephen Fienberg, Carnegie-Mellon University
Johannes Gehrke, Cornell University
Franco Malvestuto, University of Rome
Benny Pinkas, DIMACS
John Roddick, Flinders University
Jozef Siran, Slovak University of Technology
Ramakrishnan Srikant, IBM Research

Valid XHTML 1.1!