In 2001, the MIT Technology Review listed data mining as one of the top 10 technologies that will change the world.[i] So, what is data mining? For many people, the simple answer is that data mining is the collecting of people’s information when logged onto the Internet. But Webopedia emphasizes that data mining is not the collection of data itself, but the statistical interpretation of it – allowing people to obtain new information or find hidden patterns within that collected data.[ii] It is the combination of these, collection and analysis, which are cause for concern. People want to know: What information is being collected about me? Who has access to that information? What decisions are people making about me based upon that information?
This paper looks at how data mining is currently being used on the Internet. It examines whether our privacy rights are vulnerable. Ways in which our privacy can be protected are explored. Finally, an ethical question is considered: ‘Are we maintaining our privacy with the current usage of data mining on the Internet?’ This question is looked at from several ethical points of view.
II. Examples of Data Mining Use
In general, nearly every time you surf or make a purchase online, information is collected on your actions. Then targeted advertising can be presented online, emailed, snail-mailed or even phoned to you. The business concept behind this is “best predictor of future behavior is relevant past behavior” (ala Dr. Phil). One company claims that retailers can increase their return on data mining investment by 1,000 percent.[i] The first step in understanding data mining is to look at the various ways t...
... middle of paper ...
[x] Sara Baase, A Gift of Fire (Upper Saddle River, NJ: Prentice Hall, 2003)44, 46, 55, 85, 86
[xi] American Civil Liberties Union, MATRIX: Myths and Reality, 10 Feb 2004, 17 Feb 2004, http://www.aclu.org/news/NewsPrint.cfm?ID=14894&c=130
[xii] Dan Verton, Senate Kills Data Mining Program, 18 Jul 2003, Computerworld, 17 Mar 2004, http://www.pcworld.com/news/article/0%2Caid%2C111626%2C00.asp
[xiii] Martin S Olivier, Database Privacy - Balancing Confidentiality, Integrity and Availability, SIGKDD Explorations 4:2 (December 2002): 20-27, 29 Feb 2004, http://www.acm.org/sigs/sigkdd/explorations/issue4-2/olivier.pdf
[xiv] Patricia Ellen Freed, Thinking Ethically about Policy Issues, Jewish College of Nursing and Allied Health, 13 Mar 2004, http://www.icss.net/~freedos/Pages/Debate/Review.html
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Introduction There are various kinds of definitions about what data mining is. The authors in  define data mining as “the process of extracting previously unknown information from (usually large quantities of) data, which can, in the right context, lead to knowledge”. Data mining is widely used in areas such as business analysis, bioinformatics analysis, medical analysis, etc. Data mining techniques bring us a lot of benefits. Business companies can use data mining tools to search potential customers and increase their profits; medical diagnosis can use data mining to predict potential disease.... [tags: business and bioinformatic analysis]
1885 words (5.4 pages)
- The Ethical Concerns with Data Mining Introduction to Data Mining and Warehousing With the advent of computer technologies that can store large quantities of data, cross reference that data, and compute patterns in the data, benefits abound in many applications. However, with it comes new ethical concerns regarding the privacy and security of the persons or entities in which the information was sourced. While permission may have been received with each bit of information, which may have appeared harmless to divulge, there are issues regarding the data's ownership -- its sharability in US or globally, its combination with other data, its accuracy, its security, and its overall end use... [tags: Computers]
2887 words (8.2 pages)
- Data Mining With the increased and widespread use of technologies, interest in data mining has increased rapidly. Companies are now utilized data mining techniques to exam their database looking for trends, relationships, and outcomes to enhance their overall operations and discover new patterns that may allow them to better serve their customers. Data mining provides numerous benefits to businesses, government, society as well as individual persons. However, like many technologies, there are negative things that caused by data mining such as invasion of privacy right.... [tags: Hackers Computers Technology Essays]
4464 words (12.8 pages)
- Ethical Issues Raised by Data Mining Data mining is the practice of gathering data from various sources and manipulating it to provide richer information than any of contributing sources is able to do alone or to produce previously unknown information. Businesses and governments share information that they have collected with the purpose of cross-referencing it to find out more information about the people tracked in their databases. Data mining has many benefits. Stores are able to stock merchandise that better reflects what customers want.... [tags: Databases Technology Computers Essays]
3397 words (9.7 pages)
- Basics of Algorithm Algorithms are the basic building blocks of life, like an atom to molecules. Programmers have developed some techniques when it comes to organizing complex algorithms. There are blocks when it comes to the making up parts of algorithms operations and one block is considered the series of the rest of the building blocks. The general duties of an algorithm is to do what a programmer wants the computer to complete (tasks). The computer will execute the program if the algorithm steps are written correctly for the program to understand.... [tags: algorithm, programmers, customer clustering]
1114 words (3.2 pages)
- ... Privacy and confidentiality are secured by techniques other than they would be if the data were engraved by hand in a hospital chart or even in the ink from crushed flowers on a papyrus scroll (Goodman & Cava, 2008). However, Goodman & Cava (2008) observed three means by which IT prompts unique challenges because of their distinctiveness. The first strategy is when complete genomes can be emailed and stored, ordinary amount of data increases new privacy and confidentiality concerns. The quantity of data in transmission or storage heightens the challenges of inappropriate release.... [tags: Health care, Leadership, Privacy law, Privacy]
1249 words (3.6 pages)
- Data Mining and the US Government Introduction On the morning of September 11, 2001, millions of Americans, and many more around the world, woke up to heart-wrenching news of a horrific magnitude. Two planes had collided into the twin towers of the World Trade Center in New York, a third rammed into the Pentagon in Washington, D.C., and yet a fourth crash-landed in Philadelphia. All victims of this carefully planned act of terrorism, several hundreds of innocent lives were lost in the direct assaults on the planes, a couple of thousand more were injured or killed from the damage caused by the attacks, and hundreds more were sacrificed in the rescue attempts. It is unthinkable that su... [tags: Computers Software National Security Essays]
3949 words (11.3 pages)
- Imagine someone told you that every bit of personal information you have exchanged with an individual or company through any digital interface such as the internet, cell phone, GPS devices, and electronic payment systems has been piled upon millions of other people’s personal information in datasets that are unfathomably large and incomprehensible to any human mind. Would you believe it. What if the same individual continued to tell you that these data sets are “mined” using complex algorithms to discover subtle patterns, correlations, and relationships among citizens.... [tags: technology, abundance of data]
1209 words (3.5 pages)
- Introduction The Internet has received a great deal of attention in the media lately due to its tremendous growth in usage by both consumers and businesses. The unique capabilities of the Internet has captured the attention of the marketing community. While a growing number of companies have or are interested in developing an Internet presence, there is still a great deal of uncertainty about it and the potential ethical issues associated with its use as a marketing medium. Although many businesses are acknowledging the importance of a Web site, but the potential ethical issues related to marketing on the Internet still having an uncertainty in this situation.... [tags: Business Ethics ]
1594 words (4.6 pages)
- Global Privacy… Are You Being Watched?. Introduction Privacy has grown to become an intensely complex and important human rights topic in the information age. The right to privacy underlines human dignity. One of the first privacy laws can be traced back hundreds of years, to 1361, when England enacted the Justice of the Peace Act, which allowed the arrest of eavesdroppers and peeping toms.1 About every country in the world explicitly recognizes a right of privacy in their constitution, allowing people to have a right to home communication secrecy and inviolability at the very least.... [tags: Surveillance Technology Essays]
2323 words (6.6 pages)