David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Jack Alan Reynolds
Learn more about PhilPapers
Ethics and Information Technology 1 (2):137-145 (1999)
Privacy concerns involving data mining are examined in terms of four questions: (1) What exactly is data mining? (2) How does data mining raise concerns for personal privacy? (3) How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? (4) How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It is argued that the practice of using data-mining techniques, whether on the Internet or in data warehouses, to gain information about persons raises privacy concerns that (a) go beyond concerns introduced in traditional information-retrieval techniques in computer databases and (b) are not covered by present data-protection guidelines and privacy laws.
|Keywords||Computer Science Ethics User Interfaces and Human Computer Interaction Management of Computing and Information Systems Library Science Technology Management|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
Tony Doyle (2009). Privacy and Perfect Voyeurism. Ethics and Information Technology 11 (3):181-189.
David W. Shoemaker (2010). Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity. [REVIEW] Ethics and Information Technology 12 (1):3-15.
Wilhelm Peekhaus (2007). Privacy for Sale—Business as Usual in the 21st Century: An Economic and Normative Critique. Journal of Information Ethics 16 (1):83-98.
Tony Doyle (2013). Anita Allen: Unpopular Privacy: What Must We Hide? [REVIEW] Ethics and Information Technology 15 (1):63-67.
Similar books and articles
Irene Pollach (2005). A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent. [REVIEW] Journal of Business Ethics 62 (3):221 - 235.
Jacques Penders (2004). Privacy in (Mobile) Telecommunications Services. Ethics and Information Technology 6 (4):247-260.
Frans A. J. Birrer (2005). Data Mining to Combat Terrorism and the Roots of Privacy Concerns. Ethics and Information Technology 7 (4):211-220.
Lita van Wel & Lambèr Royakkers (2004). Ethical Issues in Web Data Mining. Ethics and Information Technology 6 (2):129-140.
Herman T. Tavani (2004). Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent. Ethics and Information Technology 6 (1):15-28.
Dinah Payne & Cherie Courseault Trumbach (2009). Data Mining: Proprietary Rights, People and Proposals. Business Ethics 18 (3):241-252.
Herman T. Tavani (1999). KDD, Data Mining, and the Challenge for Normative Privacy. Ethics and Information Technology 1 (4):265-273.
Added to index2009-01-28
Total downloads89 ( #18,275 of 1,692,428 )
Recent downloads (6 months)12 ( #18,548 of 1,692,428 )
How can I increase my downloads?