Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Data mining ethics
Data analysis ethical consideration
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Introduction There are various kinds of definitions about what data mining is. The authors in [1] define data mining as “the process of extracting previously unknown information from (usually large quantities of) data, which can, in the right context, lead to knowledge”. Data mining is widely used in areas such as business analysis, bioinformatics analysis, medical analysis, etc. Data mining techniques bring us a lot of benefits. Business companies can use data mining tools to search potential customers and increase their profits; medical diagnosis can use data mining to predict potential disease. Although the term “data mining” itself is neutral and has no ethical implications, it is often related to the analysis of information associated with individuals. “The ethical dilemmas arise when data mining is executed over the data of an individual” [2]. For example, using a user’s data to do data mining and classifying the user into some group may result in a variety of ethical issues. In this paper, we deal with two kinds of ethical issues caused by data mining techniques: informational privacy issues in web-data mining and database security issues in data mining. We also look at these ethical issues in a societal level and a global level. Informational Privacy Issues in Web-data Mining There is a debate between the benefits and potential informational privacy issues in web-data mining. There are large amount of valuable data on the web, and those data can be retrieved easily by using search engine. When web-data mining techniques are applied on these data, we can get a large number of benefits. Web-data mining techniques are appealing to business companies for several reasons [1]. For example, if a company wants to expand its bu... ... middle of paper ... ... R. Sarre, V. Estivill-Castro, D. deVries. On the Ethical and Legal Implications of Data Mining. Technical Report SIE-06-001, Australia, 2006. [3] B. Thuraisingham. Data mining, national security, privacy and civil liberties. In ACM SIGKDD Explorations, Volume 4 Issue 2, page 1-5. New York, 2002. [4] H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology. Ethics & Behavior, 7(3): 207-220, 1997. [5] J.S. Fulda. Data Mining and Privacy. In R. Spinello and H. Trvani, editors, Readings in CyberEthics, pages 413-417. Jones and Barlett, Sudbury MA, 2001. [6] O’Leary. Knowledge discovery as a threat to database security. In G. Piatetsky-Shapiro & W. J. Frawley, ‘Knowledge discovery in databases’, AAAI Press, page 507-516, 1991. [7] Elmasri & Navathe. Fundamentals of database systems, 4th edition. Addison-Wesley, Redwood City, CA. 2004.
Klosterman, Chuck. "Can Data Be Evil?" New York Times Magazine 5 Jan. 2014: 14. Academic OneFile. Web. 7 May 2014.
Privacy Preserving Data Mining (PPDM) was proposed by D. Agrawal and C. C. Agrawal [1] and by Y. Lindell and B. Pinkas [5] simultaneously. To address this problem, researchers have since proposed various solutions that fall into two broad categories based on the level of privacy protection they provide. The first category of the Secure Multiparty Computation (SMC) approach provides the strongest level of privacy; it enables mutually distrustful entities to mine their collective data without revealing anything except for what can be inferred from an entity’s own input and the output of the mining operation alone by Y. Lindell and B. Pinkas in [5], J. Vaidya and C.W.Clifton in [6]. In principle, any data mining algorithm can be implemented by using generic algorithms of SMC by O.Goldreich in [7].However, these algorithms are extraordinarily expensive in practice, and impractical for real use. To avoid the high computational cost, various solutions those are more efficient than generic SMC algorithms have been proposed for specific mining tasks. Solutions to build decision trees over the horizontally partitioned data were proposed by Y. Lindell and B. Pinkas in [5]. For vertically partitioned data, algorithms have been proposed to address the association rule mining by J. Vaidya and C.W.Clifton in [6], k-means clustering by J. Vaidya and C. Clifton in[8], and frequent pattern mining problems by A.W.C. Fu, R.C.W. Wong, and K. Wang in [9]. The work of by B. Bhattacharjee, N. Abe, K. Goldman, B. Zadrozny, V.R. Chillakuru, M.del Carpio, and C. Apte in [10] uses a secure coprocessor for privacy preserving collaborative data mining and analysis. The second category of the partial information hiding approach trades pr...
"Internet Privacy." Congressional Quarterly Researcher 8.41 ( Nov. 6, 1998 ). Busse Library, Cedar Rapids . 6 July 2003 <http://library.cqpress.com/cqresearcher>
The Human and Ethical Aspects of Big Data, quickly outlines an array of ethical problems that big data has had and will continue to develop in the upcoming years in our society. The author begins by giving an example of the earliest use of big data, the census. Census data can provide a plethora of benefits to society, representation in government, civil planning, such as road and water treatment, as these take years to construct and having the population and these necessities, Time align is crucial. As the author, uses the example of the internment of Japanese-Americans in 1943. Here is big-data supposed to help the citizens of the Unites States, the big data that is supposed to be private. Now in 1943, big data being used to discriminate
In 1977, Larry Ellison, Bob Miner, and Ed Oates founded System Development Laboratories. After being inspired by a research paper written in 1970 by an IBM researcher titled “A Relational Model of Data for Large Shared Data Banks” they decided to build a new type of database called a relational database system. The original project on the relational database system was for the government (Central Intelligence Agency) and was dubbed ‘Oracle.’ They thought this would be appropriate because the meaning of Oracle is source of wisdom.
The word “privacy” did not grow up with us throughout history, as it was already a cultural concept by our founding fathers. This term was later solidified in the nineteenth century, when the term “privacy” became a legal lexicon as Louis Brandeis (1890), former Supreme Court justice, wrote in a law review article, that, “privacy was the right to be let alone.” As previously mentioned in the introduction, the Supreme Court is the final authority on all issues between Privacy and Security. We started with the concept of our fore fathers that privacy was an agreed upon concept that became written into our legal vernacular. It is being proven that government access to individual information can intimidate the privacy that is at the very center of the association between the government and the population. The moral in...
Solove, Daniel J. “5 Myths about Privacy” Washington Post: B3. Jun 16 2013. SIRS. Web. 10
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
The world erupted in outrage following revelations by Edward Snowden regarding the extent of surveillance perform by the National Security Agency. Privacy becomes one of the hottest topic of 2013 and was chosen by the world’s most popular online dictionary, Dictionary.com, as the Word of the Year. However, the government is not the only one that conduct data gathering and surveillance. Employers often monitor their employees, and businesses collect data on theirs customer. The morality of these practices is a topic that generates heated debate.
As society has progressed, there have been many new innovative and unbelievable developments in almost all aspects of life that have ultimately created an impact. More specifically, advancements in technology have rather had a much larger and intense impact on society as it continues to grow. Technology has allowed for many great and useful applications that has made life much easier and convenient. However, many aspects of technology have given a rise to a number of social and ethical issues, causing numerous debates and concerns. One of the more prominent concerns deals with the issue of privacy rights.
1. Unknown. Privacy in Cyberspace: Rules of the Road for the Information Superhighway (Aug 2003). Privacy Rights Clearing House. 29th March 2004. http://www.privacyrights.org/netprivacy.htm
Hughes, Kirsty. "A Behavioral Understanding of Privacy and Its Implications for Privacy Law." Modern Law Review 75.5 (2012): 806-836. Academic Search Complete. Web. 6 Apr. 2014.
A major reason the U.S. needs to increase restrictions on the type and amount of data collected on individuals from the internet is due to the fact that the United States government can track communications and browsing histories of private citizens without warrant or cause. After the terrorist attacks of September 11, 2001, ...
Privacy and security of personal data is one of the most difficult challenges that businesses dealing in e-commerce venture face in today’s global world. Though these business sites have little or no interest in private and personal information of the users, but the information collected by them can however lead to risks. The personal information is often provided by users actively and voluntarily such as names, email ids, physical addresses or even credit card information. Though in some cases information is passively passed on by users and even sites to third party, for example some of site banner ads allow third party advertisers to track users browsing habits. But most often websites gather and use the data containing individual’s information without even their knowledge. Main concern of e-commerce business ventures in today’s world is lower the liability risk in regards to the site’s personal information collection practices. In order to achieve the desired success they should constantly determine and examine what kind of information is being collected by the site and should constantly develop privacy policy statement in order to protect the information. Among many aspects of crime on the information superhighway, electronic vandalism, theft, money laundering, electronic vandalism, illegal interception, electronic funds transfer crimes are some examples. In the following paper more insight on privacy issue. Some of these issues, available options and risks surrounded are further highlighted.