Data Mining and Privacy: An Initial Attempt at a Comprehensive Code of Conduct for Online Business
نویسندگان
چکیده
The prevalence of data mining by businesses and government organizations raises concerns among many individuals about the privacy of their personal data. We address this issue by offering a different perspective that reconciles the conflicting desires of businesses and consumers. We describe privacy, data mining, and their interaction in the larger context, identify the costs and benefits of the uses of data mining, and discuss potential stakeholders found at the intersection of the two subjects. To help synthesize our proposed code of ethical conduct, we examine existing codes of conduct and how they relate to the issue of privacy in the context of data mining with people, processes, and technology. Showing that a uniform code of ethical conduct for online privacy is feasible from both a managerial and ethical perspective, we provide an initial philosophical and principle synthesis that businesses and organizations can tailor for their own specific customers and needs. The developed code of ethical conduct respects consumers’ desire for privacy while allowing businesses to use data mining techniques to elicit information that benefits both the business and the consumer.
منابع مشابه
An Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملA Data Mining approach for forecasting failure root causes: A case study in an Automated Teller Machine (ATM) manufacturing company
Based on the findings of Massachusetts Institute of Technology, organizations’ data double every five years. However, the rate of using data is 0.3. Nowadays, data mining tools have greatly facilitated the process of knowledge extraction from a welter of data. This paper presents a hybrid model using data gathered from an ATM manufacturing company. The steps of the research are based on CRISP-D...
متن کاملIntroducing an algorithm for use to hide sensitive association rules through perturb technique
Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...
متن کاملCustomer lifetime value model in an online toy store
Business all around the world uses different approaches to know their customers, segment them and formulate suitable strategies for them. One of these approaches is calculating the value of each customer for the company. In this paper by calculating Customer Lifetime Value (CLV) for individual customers of an online toy store named Alakdolak, three customer segments are extracted. The level of ...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CAIS
دوره 37 شماره
صفحات -
تاریخ انتشار 2015