Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Data mining ethics
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Data mining ethics
Data Mining and Consumers’ Information Since both consumers and businesses advantage from the use of data mining, each party has to honour the right of the other one in order to keep an ethical function of the data mining relationship between the two of them. Long ago, data mining was only about essential and voluntary information collected from customers who were aware that their information is being gathered. Nowadays, the ethical issues raised are whether the data collected will be used against customers’ rights, and whether it will become a part that is accessible in the future by others. The strategies proposed by Payne and Trumbach, with regard to Data mining(1) and consumers’ information, propose that in the right moral structure, data mining can be ethically effective and protective to consumers’ right. Six principals are needed for a productive ethical data mining strategy: anonymity, disclosure, choice, time limits, trust and accuracy of data (Payne & Trumbach, 2009). First, let’s discuss the issue of data mining and anonymity. This principle is based on the idea of limiting personal identifying data. It argues that to have an ethical data mining, customers should be allowed to be anonymous whenever they have the chance. For instance, a client can purchase an online order only by using a username, password and zip code (Danna & Gandy, 2002). Therefore, this client will get the same exact service like anyone else without disclose his/ her personal identity. This strategy is effective and helpful since it protects the customer from unwanted exposure, and at the same time, serves his needs by giving him/ her same shopping experience as any other client. On the other hand, some people might argue that in some situation, a... ... middle of paper ... ...them make the best choice in terms of their personal data. Fourth issue is data mining and time line that contains how long consumer personal information will be used. The next issue is about basic, guarded and extended trust. This strategy ethically guards the costumer from any damage caused by disclosure since it requests not to misuse the consumers’ trust. It also assists the relationship among parties that work together explicitly. The last issue discussed is the ethical principle of accuracy in data mining. Ethical data mining requires serving consumers as individuals and not to rob them from accurate service because of an unfitting clumping system used by the firm. To sum up, all the previous six principles work ethically well together successfully to serve the consumers’ needs, to protect their rights of privacy, and to give them the best costumers’ services.
Chet Craig is the Central Plant Manager of the Norris Company. He started as an expediter in the company's eastern plant and was quickly promoted to Production Supervisor in three years. After two years, he was promoted to Assistant to the Manager of the Eastern Plant. Five years later, Chet was transferred to the central plant as an Assistant, and after one month, was promoted to his current position.
In the essay “Where Anonymity Breeds Contempt” the author Julie Zhou demonstrates the negative impact Anonymity in the internet has had on human beings. Following with a convincing argument for unmasking these “trolls” of the internet.
In the Engineering and Technology Journal, two engineers, Gareth Mitchell and Guy Clapperton, gave their thoughts on both sides of the privacy issue. Is gathering information violating personal privacy? They made their arguments using currency as a metaphor for personal information and online services a product. Mitchell argues the case that giving out personal information is “too high a price to pay” (Mitchell, 2013, p. 26). He says that despite the option to opt out of cookies and certain information, many sites are more covert and make their opt out option less accessible than a pop up asking to opt out. The site makes it hard for the Internet user to say no to being tracked. Mitchell warns the reader to take more consideration into what information they are giving away and that “privacy is not to be taken for granted” (Mitchell, 2013, p. 26). Getting information from the Internet would mean tra...
According to the Federal Trade Commission, a data broker is a company that packages consumer information from numerous sources and sells this consumer information to other businesses or people (Katz, par 2). Throughout this paper, I will employ course materials, class debates, and lecture notes to analyze a data broker company operating under the name of Spokeo. First, I will also evaluate how and why data brokers, particularly Spokeo, package and sell consumer information. Then, I will examine various characteristics of Spokeo with regards to Daniel Kahneman’s Prospect Theory. Thirdly, I will consider and analyze aspects of Spokeo taking into account William Prosser’s four legal aspects of privacy. Finally, I will discuss what packaging and selling consumer information may mean for consumers’ attitudes and
The author appear to be moderately perplexed by the fact that American state that they are concerned about privacy but they yet disclose personal information to entities. I would offer that the reason many are disclosing the information, is that business will not offer their services or product without the personal information. One can go to another vendor for service, only to have the same problem repeated. Now what is perplexing, is the authors claim that “a significant number, 11%” (Caftori & Teicher, 2002) of the population believes that corporate owners should go to prison for violations of information privacy. I must say, I never thought of 11% of a population as a significant percentage, but I am just a student. More confusion for the authors is when a computer system that handles big data has faulty output. They use the analogy of an airline, and if they lose your luggage and should receive compensation, but this is not the case when the DMV provides faulty data. This should not be perplexing, with the airline an explicit contract is made with the purchase of the ticket. The airline is transport my body and my luggage to the agreed location without damage or loss. Luggage is tangible. The contents are worth x amount of dollars and the airline pays the individual
The personal connection Americans have with their phones, tablets, and computers; and the rising popularity of online shopping and social websites due to the massive influence the social media has on Americans, it is clear why this generation is called the Information Age, also known as Digital Age. With the Internet being a huge part of our lives, more and more personal data is being made available, because of our ever-increasing dependence and use of the Internet on our phones, tablets, and computers. Some corporations such as Google, Amazon, and Facebook; governments, and other third parties have been tracking our internet use and acquiring data in order to provide personalized services and advertisements for consumers. Many American such as Nicholas Carr who wrote the article “Tracking Is an Assault on Liberty, With Real Dangers,” Anil Dagar who wrote the article “Internet, Economy and Privacy,” and Grace Nasri who wrote the article “Why Consumers are Increasingly Willing to Trade Data for Personalization,” believe that the continuing loss of personal privacy may lead us as a society to devalue the concept of privacy and see privacy as outdated and unimportant. Privacy is dead and corporations, governments, and third parties murdered it for their personal gain not for the interest of the public as they claim. There are more disadvantages than advantages on letting corporations, governments, and third parties track and acquire data to personalized services and advertisements for us.
One of the biggest problems that affect everyone is data aggregation. The more the technology develop, the powerful and dangerous it gets. Today there are many companies that aggregate a lot of information about us. Those companies gathering our data from different sources, which create a detailed record about us. Since all services have been computerized whether it is handled directly or indirectly through computers, there is no way to hide your information. We used computers, because they are faster, better, and accurate more that any human being. It solved many problems; however, it created new ones. Data does not means anything if it stands alone, because it is only recoded facts and figure, yet when it organized and sorted, it become information. These transformed information. Data aggregation raises many questions such as, who is benefiting from data aggregation? What is the impact on us (the users)? In this paper I will discuses data aggregation and the ethics and legal issues that affect us.
If the data collectors notify the user that their data will be collected, and how will they use these data. Meanwhile, they also give the user the right to choose if they want their data to be collected or not. In my opinion, this is not the invasion of the user privacy. By the data protection law, it states that people are aware of how information collected about them will be used. However, most of the people do not have enough knowledge about data protection law, and the serious effect of the Cookies behind their operator. CNN conducted a survey showed that most the public, about 56%, did not know that websites and advertisers have the capability to track their activities by placing cookies on their hard drives [4]. As users themselves, we are on the heels of increasing our vigilance right now, because many unethical merchants will gain their benefit by violating our privacy through blind spots of our knowledge. Schools or the news media should also pay attention. Schools should provide courses to educate students, so that, students can go back and tell their families and friends. News media should also report more relevant things to make people more
However, the same personal data is being compromised and eroding privacy. Companies have been getting bolder in their attempts to gather, share and sell data. The latest trend is outsourcing data to third party companies for data processing, which can be done at a lower cost. One of the main problems with this approach is that a lot of very sensitive data is being sent, which could be harmful in the wrong hands. Most companies require their customers to "opt-out" to prevent their data from being shared with a company's affiliates. This process requires the customer to explicitly tell the company not to share their data, which is usually in the form of a web site or a survey sent in the mail. These surveys are often thrown away by consumers, so they don't even realize that they're giving the companies a green light to sell and share their data.
The problem causes the harm to companies’ image, the troublesome to consumers, the loss of confidence in the rule of law and the increase in the awareness on privacy and respective solutions are provided to tackle the consequences. Consumer privacy is an essential element in e-business. To further expand the utilization of e-business, each party should bear the responsibility to respect the privacy and to respect human rights.
...e same time, the time has come to raise consciousness, support research and standard-setting, and prepare model codes for those systems that do employ privacy-enhancing technologies. The opportunities for individuals to customize privacy preferences, research should be conducted to evaluate alternative arrangements should be generated. On top of that, the digital applications should provide transparent criteria, including ease of understanding, adequacy of notification, compliance with standards, contractual fairness and enforceability, appropriate choice of defaults, efficiency relative to the potential benefits, and integration with other means of privacy protection. Particular attention should be paid to uniformity of protocols across different industries and applications, so that consumers are not overwhelmed by a pointless diversity of interfaces and contracts.
There are various kinds of definitions about what data mining is. The authors in [1] define data mining as “the process of extracting previously unknown information from (usually large quantities of) data, which can, in the right context, lead to knowledge”. Data mining is widely used in areas such as business analysis, bioinformatics analysis, medical analysis, etc. Data mining techniques bring us a lot of benefits. Business companies can use data mining tools to search potential customers and increase their profits; medical diagnosis can use data mining to predict potential disease. Although the term “data mining” itself is neutral and has no ethical implications, it is often related to the analysis of information associated with individuals. “The ethical dilemmas arise when data mining is executed over the data of an individual” [2]. For example, using a user’s data to do data mining and classifying the user into some group may result in a variety of ethical issues. In this paper, we deal with two kinds of ethical issues caused by data mining techniques: informational privacy issues in web-data mining and database security issues in data mining. We also look at these ethical issues in a societal level and a global level.
Companies must adhere to the Data Protection Act (1998) which protects consumers’ data privacy. According to the EU Data Protection Directive (1995), there are eight principles of which the data collection should follow:
Foxman, E. R., & Kilcoyne, P. (n.d.). Information technology, marketing practice, and consumer privacy: ethical issues. Journal of Public Policy & Marketing, 12(1), 106-119.
Data privacy is not equal to data security. Data security ensures that data or information systems are protected from invalid operations, including unauthorized access, use, exposure, damage, modification, copy, deletion and so on. Data security can’t guarantee data privacy and vice versa. Figure 1 shows the relation between data security and data privacy. A represents the situation where data privacy is violated while