KDD, data mining, and the challenge for normative privacy

Ethics and Information Technology 1 (4):265-273 (1999)
  Copy   BIBTEX

Abstract

The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use of certain KDD and data-mining techniques, the present study questions whether the use of those techniques necessarily violates the privacy of individuals. This question is considered vis-à-vis a recent theory of privacy advanced by James Moor (1997). The implications of that privacy theory for a data-mining policy are also considered.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,322

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Analytics

Added to PP
2009-01-28

Downloads
128 (#138,472)

6 months
13 (#181,228)

Historical graph of downloads
How can I increase my downloads?

References found in this work

Towards a theory of privacy in the information age.James H. Moor - 1997 - Acm Sigcas Computers and Society 27 (3):27-32.
Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.
Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Privacy.Charles Culver, James Moor, William Duerfeldt, Marshall Kapp & Mark Sullivan - 1994 - Professional Ethics, a Multidisciplinary Journal 3 (3):3-25.
From data to knowledge: implications of data mining.Joseph S. Fulda - 1997 - Acm Sigcas Computers and Society 27 (4):28.

Add more references