David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jack Alan Reynolds
Learn more about PhilPapers
Ethics and Information Technology 1 (4):265-273 (1999)
The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use of certain KDD and data-mining techniques, the present study questions whether the use of those techniques necessarily violates the privacy of individuals. This question is considered vis-à-vis a recent theory of privacy advanced by James Moor (1997). The implications of that privacy theory for a data-mining policy are also considered.
|Keywords||Computer Science Ethics User Interfaces and Human Computer Interaction Management of Computing and Information Systems Library Science Technology Management|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
David W. Shoemaker (2010). Self-Exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity. [REVIEW] Ethics and Information Technology 12 (1):3-15.
Herman T. Tavani (2008). Floridi's Ontological Theory of Informational Privacy: Some Implications and Challenges. [REVIEW] Ethics and Information Technology 10 (2-3):155-166.
William E. Berry (2003). Miranda Rights and Cyberspace Realities: Risks to "the Right to Remain Silent". Journal of Mass Media Ethics 18 (3 & 4):230 – 249.
William Berry (2003). Miranda Rights and Cyberspace Realities: Risks to "the Right to Remain Silent". Journal of Mass Media Ethics 18 (3):230-249.
Similar books and articles
Elin Palm (2009). Privacy Expectations at Work—What is Reasonable and Why? Ethical Theory and Moral Practice 12 (2):201 - 215.
Herman T. Tavani (2004). Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent. Ethics and Information Technology 6 (1):15-28.
Dinah Payne & Cherie Courseault Trumbach (2009). Data Mining: Proprietary Rights, People and Proposals. Business Ethics 18 (3):241-252.
Anton Vedder (1999). KDD: The Challenge to Individualism. [REVIEW] Ethics and Information Technology 1 (4):275-281.
Frans A. J. Birrer (2005). Data Mining to Combat Terrorism and the Roots of Privacy Concerns. Ethics and Information Technology 7 (4):211-220.
Lita van Wel & Lambèr Royakkers (2004). Ethical Issues in Web Data Mining. Ethics and Information Technology 6 (2):129-140.
Irene Pollach (2005). A Typology of Communicative Strategies in Online Privacy Policies: Ethics, Power and Informed Consent. [REVIEW] Journal of Business Ethics 62 (3):221 - 235.
Herman T. Tavani (1999). Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology 1 (2):137-145.
Added to index2009-01-28
Total downloads32 ( #124,902 of 1,906,955 )
Recent downloads (6 months)2 ( #345,326 of 1,906,955 )
How can I increase my downloads?