David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jack Alan Reynolds
Learn more about PhilPapers
Ethics and Information Technology 1 (2):137-145 (1999)
Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using data-mining techniques, whether on the Internet or in data warehouses, to gain information about persons raises privacy concerns that go beyond concerns introduced in traditional information-retrieval techniques in computer databases and are not covered by present data-protection guidelines and privacy laws
|Keywords||Computer Science Ethics User Interfaces and Human Computer Interaction Management of Computing and Information Systems Library Science Technology Management|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
David W. Shoemaker (2010). Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity. [REVIEW] Ethics and Information Technology 12 (1):3-15.
Tony Doyle (2009). Privacy and Perfect Voyeurism. Ethics and Information Technology 11 (3):181-189.
Peter J. Carew, Larry Stapleton & Gabriel J. Byrne (2008). Implications of an Ethic of Privacy for Human-Centred Systems Engineering. AI and Society 22 (3):385-403.
Gordon Hull (2015). Successful Failure: What Foucault Can Teach Us About Privacy Self-Management in a World of Facebook and Big Data. Ethics and Information Technology 17 (2):89-101.
Yeslam Al-Saggaf & Md Zahidul Islam (2015). Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem. Science and Engineering Ethics 21 (4):941-966.
Similar books and articles
Irene Pollach (2005). A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent. [REVIEW] Journal of Business Ethics 62 (3):221 - 235.
Jacques Penders (2004). Privacy in (Mobile) Telecommunications Services. Ethics and Information Technology 6 (4):247-260.
Frans A. J. Birrer (2005). Data Mining to Combat Terrorism and the Roots of Privacy Concerns. Ethics and Information Technology 7 (4):211-220.
Lita van Wel & Lambèr Royakkers (2004). Ethical Issues in Web Data Mining. Ethics and Information Technology 6 (2):129-140.
Herman T. Tavani (2004). Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent. Ethics and Information Technology 6 (1):15-28.
Dinah Payne & Cherie Courseault Trumbach (2009). Data Mining: Proprietary Rights, People and Proposals. Business Ethics 18 (3):241-252.
Herman T. Tavani (1999). KDD, Data Mining, and the Challenge for Normative Privacy. Ethics and Information Technology 1 (4):265-273.
Added to index2009-01-28
Total downloads108 ( #33,787 of 1,790,148 )
Recent downloads (6 months)11 ( #75,613 of 1,790,148 )
How can I increase my downloads?