Legal and Technical Issues of Privacy Preservation in Data Mining

To paraphrase Winograd (1992), we bring to our communities a tacit comprehension of right and wrong that makes social responsibility an intrinsic part of our culture. Our ethics are the moral principles we use to assert social responsibility and to perpetuate safe and just societies. Moreover, the introduction of new technologies can have a profound effect on our ethical principles. The emergence of very large databases, and the associated automated data analysis tools, present yet another set of ethical challenges to consider. Socio-ethical issues have been identified as pertinent to data mining and there is a growing concern regarding the (ab)use of sensitive information (Clarke, 1999; Clifton et al., 2002; Clifton and Estivill-Castro, 2002; Gehrke, 2002). Estivill-Castro et al., discuss surveys regarding public opinion on personal privacy that show a raised level of concern about the use of private information (Estivill-Castro et al., 1999). There is some justification for this concern; a 2001 survey in InfoWeek found that over 20% of companies store customer data with information about medical profile and/or customer demographics with salary and credit information, and over 15% store information about customers’ legal histories. BACKGROUND

[1]  S. Fienberg Privacy and Confidentiality in an e-Commerce World: Data Mining, Data Warehousing, Matching and Disclosure Limitation , 2006, math/0609288.

[2]  Ljiljana Brankovic,et al.  Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules , 1999, DaWaK.

[3]  Pamela Samuelson,et al.  Liability for defective electronic information , 1993, CACM.

[4]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[5]  Jayant R. Haritsa,et al.  On Addressing Efficiency Concerns in Privacy Preserving Data Mining , 2003, ArXiv.

[6]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[7]  F RoddickJohn,et al.  Exploratory medical knowledge discovery , 2003 .

[8]  Willi Klösgen,et al.  KDD: Public and Private Concerns , 1995, IEEE Expert.

[9]  Alexandre V. Evfimievski,et al.  Privacy preserving mining of association rules , 2002, Inf. Syst..

[10]  Felix FX Lindner Software security is software reliability , 2006, Commun. ACM.

[11]  Kenneth C. Laudon,et al.  Markets and privacy , 1993, CACM.

[12]  Yasmin H. Said,et al.  Data Mining in Electronic Commerce , 2006 .

[13]  Chris Clifton,et al.  When do data mining results violate privacy? , 2004, KDD.

[14]  John F. Roddick,et al.  Detecting Privacy and Ethical Sensitivity in Data Mining Results , 2004, ACSC.

[15]  Benny Pinkas,et al.  Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.

[16]  Brian Subirana,et al.  Legal programming , 2004, CACM.

[17]  Jayant R. Haritsa,et al.  On Addressing Efficiency Concerns in Privacy-Preserving Mining , 2003, DASFAA.

[18]  Mathias Klang,et al.  Spyware – the ethics of covert software , 2004, Ethics and Information Technology.

[19]  Michael J. A. Berry,et al.  Data mining techniques - for marketing, sales, and customer support , 1997, Wiley computer publishing.

[20]  Roger Clarke,et al.  Person location and person tracking - Technologies, risks and policy implications , 2001, Inf. Technol. People.

[21]  Jayant R. Haritsa,et al.  A Framework for High-Accuracy Privacy-Preserving Mining , 2005, ICDE.

[22]  Josep Domingo-Ferrer,et al.  Privacy in Data Mining , 2005, Data Mining and Knowledge Discovery.

[23]  Chris Clifton,et al.  Protecting Against Data Mining through Samples , 1999, DBSec.

[24]  H JohnGeorge Behind-the-scenes data mining , 1999 .

[25]  Herman T. Tavani,et al.  Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent , 2004, Ethics and Information Technology.

[26]  Mirka Miller,et al.  Relative Compromise of Statistical Databases , 1990, Aust. Comput. J..

[27]  Gregory Piatetsky-Shapiro,et al.  Knowledge Discovery in Personal Data vs. Privacy: A mini-symposium , 1995, IEEE Expert.

[28]  John G. Gammack,et al.  Ethical Responsibility and the Management of Knowledge , 1999, Aust. Comput. J..

[29]  Norman Mooradian,et al.  A Gift of Fire: Social, Legal, and Ethical Issues in Computing , 1998 .

[30]  Alex Alves Freitas,et al.  Understanding the crucial differences between classification and discovery of association rules: a position paper , 2000, SKDD.

[31]  John F. Roddick,et al.  Exploratory medical knowledge discovery: experiences and issues , 2003, SKDD.

[32]  Chris Clifton,et al.  SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING , 1996 .

[33]  George H. John Behind-the-scenes data mining: a report on the KDD-98 panel , 1999, SKDD.