Skip to main content
Log in

KDD, data mining, and the challenge for normative privacy

  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use of certain KDD and data-mining techniques, the present study questions whether the use of those techniques necessarily violates the privacy of individuals. This question is considered vis-à-vis a recent theory of privacy advanced by James Moor (1997). The implications of that privacy theory for a data-mining policy are also considered.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • A. Allen. Uneasy Access: Privacy for Women in a Free Society. Rowman and Littlefield, Totowa, NJ, 1988.

    Google Scholar 

  • J-F. Blanchette and D. G. Johnson. Cryptography, Data Retention, and the Panopticon Society: The Social Benefits of Forgetfulness. In L. D. Introna, editor, Proceedings of the Conference on Computer Ethics: Philosophical Enquiry '98, pp. 94–105. University of London Press, London, UK, 1998.

    Google Scholar 

  • W. Brennan. Eisenstandt v. Baird (U.S. Supreme Court Decision), 1972.

  • A. Cavoukian. Data Mining: Staking a Claim on Your Privacy. Information and Privacy Commissioner's Report, Ontario, Canada.

  • J. W. DeCew. In Pursuit of Privacy: Law, Ethics and the Rise of Technology. Cornell University Press, Ithaca, New York, 1997.

    Google Scholar 

  • U. Fayyad, G. Piatetsky-Shapiro and P. Smyth. The KDD Process for Extracting Useful Knowledge From Volumes of Data. Communications of the ACM, 39(11): 27–34, 1996.

    Google Scholar 

  • C. Fried, Privacy: A Rational Context. Chap. IX in Anatomy of Values. Cambridge University Press, New York, 1970. Reprinted in M.D. Ermann, M.B. Williams and C. Gutierrez, editors, Computers, Ethics, and Society, pp. 51–63. Oxford University Press, New York, 1990.

    Google Scholar 

  • J. S. Fulda. From Data to Knowledge: Implications of Data Mining. Computers of Society, 27(4): 28, 1997.

    Google Scholar 

  • R. Gavison. Privacy and the Limits of the Law, Yale Law Journal, 89, 1980. Reprinted in D. G. Johnson and H. Nissenbaum, editors, Computers, Ethics & Social Values, pp. 332–351. Prentice Hall, Englewood Cliffs, NJ, 1995.

  • D. G. Johnson. Computer Ethics. 2nd ed. Prentice Hall, Englewood Cliffs, NJ, 1994.

    Google Scholar 

  • J. H. Moor. The Ethics of Privacy Protection, Library Trends, 39 (1 & 2): 69–82, 1990.

    Google Scholar 

  • J. H. Moor et al. Privacy, Professional Ethics, 3 (3 & 4): 3–25, 1994.

    Google Scholar 

  • J. H. Moor. Towards a Theory of Privacy in the Information Age. Computers and Society, 27(3): 27–32, 1997.

    Google Scholar 

  • H. Nissenbaum. Can We Protect Privacy in Public? In M. J. van den Hoven, editor. Proceedings of the Conference on Computer Ethics: Philosophical Enquiry '97 pp. 191–204. Erasmus University Press Rotterdam, The Netherlands, 1998.

    Google Scholar 

  • J. Rachels. Why is Privacy Important? Philosophy and Public Affairs, 12(4). Reprinted in D. G. Johnson and H. Nissenbaum, editors. Computers, Ethics & Social Values, pp. 351–257. Prentice Hall, Englewood Cliffs, NJ, 1995.

  • P. Regan. Legislating Privacy: Technology, Social Values, and Public Policy. University of North Carolina Press, Chapel Hill NC, 1995.

    Google Scholar 

  • H. T. Tavani. Internet Search Engines and Personal Privacy. In M. J. van den Hoven, editor, Proceedings of the Conference of Computer Ethics: Philosophical Enquiry '97, pp. 214–223. Erasmus University Press, Rotterdam, The Netherlands, 1998.

    Google Scholar 

  • H. T. Tavani. Informational Privacy, Data Mining, and the Internet. Ethics and Information Technology, 1(2), 1999.

  • H. T. Tavani (in press). Privacy and Security, Chap. 4 In D. Langford, editor, Internet Ethics. Macmillan Press, London, UK.

  • A. H. Vedder, E. Schreuders and R. Van Kralingen. Knowledge Discovery in Databases and De-individualization. In L. D. Introna, editor, Proceedings of the Conference on Computer Ethics: Philosophical Enquiry '98, pp. 121–125. University of London Press, London, UK, 1998.

    Google Scholar 

  • S. Warren and L. Brandeis. The Right to Privacy. Harvard Law Review, 14(5), 1890.

  • A. F. Westin. Privacy and Freedom. Anatheum Press, New York, 1967.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tavani, H.T. KDD, data mining, and the challenge for normative privacy. Ethics and Information Technology 1, 265–273 (1999). https://doi.org/10.1023/A:1010051717305

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1010051717305

Keywords

Navigation