Computer ethics (2nd ed.)
Computers, ethics & social values
Computers, ethics & social values
The KDD process for extracting useful knowledge from volumes of data
Communications of the ACM
Towards a theory of privacy in the information age
ACM SIGCAS Computers and Society
From data to knowledge: implications of data mining
ACM SIGCAS Computers and Society
Legislating Privacy: Technology, Social Values, and Public Policy
Legislating Privacy: Technology, Social Values, and Public Policy
Informational privacy, data mining, and theInternet
Ethics and Information Technology
Privacy protection, control of information, and privacy-enhancing technologies
ACM SIGCAS Computers and Society
Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent
Ethics and Information Technology
Ethical issues in web data mining
Ethics and Information Technology
An examination of the concern for information privacy in the New Zealand regulatory context
Information and Management
Floridi's ontological theory of informational privacy: Some implications and challenges
Ethics and Information Technology
An examination of the concern for information privacy in the New Zealand regulatory context
Information and Management
Self-exposure and exposure of the self: informational privacy and the presentation of identity
Ethics and Information Technology
Hi-index | 0.00 |
The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have been introduced by the use of certain KDD and data-mining techniques, the present study questions whether the use of those techniques necessarily violates the privacy of individuals. This question is considered vis-à-vis a recent theory of privacy advanced by James Moor (1997). The implications of that privacy theory for a data-mining policy are also considered.