Computers, ethics & social values
Computers, ethics & social values
Data mining with neural networks: solving business problems from application development to decision support
Computer matching and personal privacy: can they be compatible?
Proceedings of the symposium on Computers and the quality of life
The KDD process for extracting useful knowledge from volumes of data
Communications of the ACM
The data warehouse and data mining
Communications of the ACM
The World-Wide Web: quagmire or gold mine?
Communications of the ACM
Towards a theory of privacy in the information age
ACM SIGCAS Computers and Society
Privacy and the varieties of moral wrong-doing in an information age
ACM SIGCAS Computers and Society
Reason, relativity, and responsibility in computer ethics
ACM SIGCAS Computers and Society
AI watch: data mining and the Web
ACM SIGCAS Computers and Society
Legislating Privacy: Technology, Social Values, and Public Policy
Legislating Privacy: Technology, Social Values, and Public Policy
ACM SIGCAS Computers and Society
ACM SIGCAS Computers and Society
Privacy protection, control of information, and privacy-enhancing technologies
ACM SIGCAS Computers and Society
KDD, data mining, and the challenge for normative privacy
Ethics and Information Technology
Method in computer ethics: Towards amulti-level interdisciplinary approach
Ethics and Information Technology
Ethical issues in web data mining
Ethics and Information Technology
Sindice.com: a document-oriented lookup index for open linked data
International Journal of Metadata, Semantics and Ontologies
Ethics and Information Technology
The usage of coarse wordage: a study of the mob rule on China's internet
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Self-exposure and exposure of the self: informational privacy and the presentation of identity
Ethics and Information Technology
Proceedings of the 2011 workshop on Data mining for medicine and healthcare
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
The privacy in the time of the internet: secrecy vs transparency
Proceedings of the second ACM conference on Data and Application Security and Privacy
Anita Allen: Unpopular privacy: what must we hide?
Ethics and Information Technology
Effective sanitization approaches to hide sensitive utility and frequent itemsets
Intelligent Data Analysis
Hi-index | 0.00 |
Privacy concerns involving data mining are examined interms of four questions: (1) What exactly isdata mining? (2) How does data mining raise concernsfor personal privacy? (3) How do privacy concernsraised by data mining differ from those concernsintroduced by ’traditional‘ information-retrievaltechniques in computer databases? (4) How do privacyconcerns raised by mining personal data from theInternet differ from those concerns introduced bymining such data from ’data warehouses?‘ It is arguedthat the practice of using data-mining techniques,whether on the Internet or in data warehouses, to gaininformation about persons raises privacy concerns that(a) go beyond concerns introduced in traditionalinformation-retrieval techniques in computer databasesand (b) are not covered by present data-protectionguidelines and privacy laws.