Detecting Privacy and Ethical Sensitivity in Data Mining Results

Knowledge discovery allows considerable insight into data. This brings with it the inherent risk that what is inferred may be private or ethically sensitive. The process of generating rules through a mining operation becomes an ethical issue when the results are used in decision making processes that effect people, or when mining customer data unwittingly compromises the privacy of those customers.Significantly, the sensitivity of a rule not be apparent to the miner, particularly since the volume and diversity of rules can often be large. However, given the subjective nature of such sensitivity, rather than prohibit the production of ethically and privacy sensitive rules, we present here an alerting process that detects and highlights the sensitivity of the discovered rules. The process caters for differing sensitivities at the attribute value level and allows a variety of sensitivity combination functions to be employed. These functions have been tested empirically and the results of these tests are reported.

[1]  R. Gavison Privacy and the Limits of Law , 1980 .

[2]  J. Rachels Why privacy is important , 1985 .

[3]  Mirka Miller,et al.  Relative Compromise of Statistical Databases , 1990, Aust. Comput. J..

[4]  Abraham Silberschatz,et al.  On Subjective Measures of Interestingness in Knowledge Discovery , 1995, KDD.

[5]  Abraham Silberschatz,et al.  What Makes Patterns Interesting in Knowledge Discovery Systems , 1996, IEEE Trans. Knowl. Data Eng..

[6]  Sigal Sahar,et al.  Interestingness via what is not interesting , 1999, KDD '99.

[7]  Howard J. Hamilton,et al.  Heuristic Measures of Interestingness , 1999, PKDD.

[8]  Alex Alves Freitas,et al.  On rule interestingness measures , 1999, Knowl. Based Syst..

[9]  John F. Roddick,et al.  On the impact of knowledge discovery and data mining , 2000 .

[10]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[11]  Howard J. Hamilton,et al.  Evaluation of Interestingness Measures for Ranking Discovered Knowledge , 2001, PAKDD.

[12]  Roger Clarke,et al.  Person location and person tracking - Technologies, risks and policy implications , 2001, Inf. Technol. People.

[13]  Alexandre V. Evfimievski,et al.  Randomization in privacy preserving data mining , 2002, SKDD.

[14]  Benny Pinkas,et al.  Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.

[15]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[16]  Vladimir Estivill-Castro,et al.  Preface: proceedings of the ICDM 2002 workshop on privacy, security, and data mining , 2002 .

[17]  O. Günther,et al.  Privacy conflicts in CRM services for online shops: a case study , 2002 .

[18]  Alexandre V. Evfimievski,et al.  Privacy preserving mining of association rules , 2002, Inf. Syst..

[19]  John F. Roddick,et al.  Exploratory medical knowledge discovery: experiences and issues , 2003, SKDD.

[20]  John F. Roddick,et al.  Guiding knowledge discovery through interactive data mining , 2003 .

[21]  Parag C. Pendharkar Managing Data Mining Technologies in Organizations: Techniques and Applications , 2003 .

[22]  GehrkeJohannes,et al.  Privacy preserving mining of association rules , 2004 .

[23]  Josep Domingo-Ferrer,et al.  Privacy in Data Mining , 2005, Data Mining and Knowledge Discovery.