The Digital Aggregated Self: A Literature Review

As the Internet rapidly establishes itself as a major communications conduit, growing concern exists about personal privacy issues and the related ownership of personal data. Privacy and personal data may be vulnerable to exposure by unauthorized individuals, by commercial entities wishing to profit from the data, and even by the individual to whom the data pertains. Although fragments of data may not present a privacy issue on their own, data mining and other aggregation methods quickly assemble data to create a considerably more sensitive "whole. " This article presents an examination of aggregated personal data ownership, or "the digital aggregated self, " using a literature review and an ethical argument. We propose that while server owners may possess the disaggregated user data stored on their servers, individuals should hold the rights to their set of aggregated data that is stored throughout the entire network of online servers.

[1]  Mary Walker,et al.  Lessons learned: A case study using data mining in the newspaper industry , 2007 .

[2]  S. Deva 'Yahoo! For Good' and the Right to Privacy of Internet Users: A Critique , 2008 .

[3]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[4]  Lynne Y. Williams Catch Me If You Can: A Taxonomically Structured Approach to Cybercrime , 2008 .

[5]  Sumit Sarkar,et al.  Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data , 2006, Inf. Syst. Res..

[6]  Stuart E. Madnick,et al.  An Economic Analysis of Policies for the Protection and Reuse of Noncopyrightable Database Contents , 2008, J. Manag. Inf. Syst..

[7]  Theo Röhle Desperately seeking the consumer: Personalized search engines and the commercial exploitation of user data , 2007, First Monday.

[8]  V. Goel,et al.  The privacy paradox: laying Orwell's ghost to rest. , 2001, CMAJ : Canadian Medical Association journal = journal de l'Association medicale canadienne.

[9]  Daniela Godoy Learning user interests for user profiling in personal information agents , 2006, AI Commun..

[10]  R. Kelly Rainer,et al.  Business intelligence: an analysis of the literature , 2008, IEEE Engineering Management Review.

[11]  L. Floridi Information Technology and Moral Philosophy: Information Ethics: Its Nature and Scope , 2008 .

[12]  Luciano Floridi,et al.  Information ethics, its nature and scope , 2006, CSOC.

[13]  Daniel R. Horne,et al.  The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .

[14]  Susan Landau Security and Privacy Landscape in Emerging Technologies , 2008, IEEE Security & Privacy.

[15]  Ramez Elmasri,et al.  Fundamentals of Database Systems , 1989 .

[16]  Michael Friedewald,et al.  The illusion of security , 2008, CACM.

[17]  Philip S. Yu,et al.  Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.

[18]  Eytan Adar,et al.  Valuating Privacy , 2005, WEIS.

[19]  Radcliff Stewart,et al.  Commentary: Legal Effect of Revealing Private Information in the US and Abroad , 2007, Inf. Syst. Manag..

[20]  Ryan West,et al.  The psychology of security , 2008, CACM.

[21]  Jonathan A. Poritz,et al.  Who Searches the Searchers? Community Privacy in the Age of Monolithic Search Engines , 2007, Inf. Soc..

[22]  Marcin Gorawski,et al.  Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[23]  Allen Stone Natural-Language Processing for Intrusion Detection , 2007, Computer.

[24]  Virginia W. Kupritz,et al.  Privacy matters , 1998, Nature Genetics.

[25]  Eve Maler,et al.  The Venn of Identity: Options and Issues in Federated Identity Management , 2008, IEEE Security & Privacy.

[26]  Krzysztof J. Cios,et al.  Uniqueness of medical data mining , 2002, Artif. Intell. Medicine.

[27]  Raj Bhatnagar,et al.  Agents for Integrating Distributed Data for Complex Computations , 2006, Comput. Informatics.

[28]  Daniel P. Hillyard,et al.  Issues Around the Protection or Revelation of Personal Information , 2007 .

[29]  Orin S. Kerr A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending it , 2003 .

[30]  Corey A Ciocchetti E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors , 2007 .

[31]  David S. Wall,et al.  Crime and the Internet , 2001 .

[32]  Alessandro Acquisti,et al.  Identity Management, Privacy, and Price Discrimination , 2008, IEEE Security & Privacy.

[33]  Robert J. Aalberts,et al.  Trespass, nuisance, and spam: 11th century common law meets the internet , 2007, CACM.

[34]  David Satola,et al.  Legal aspects of Internet governance reform , 2007, Inf. Polity.

[35]  Alexandre V. Evfimievski,et al.  Limiting privacy breaches in privacy preserving data mining , 2003, PODS.

[36]  Jianer Chen,et al.  Theory and Applications of Models of Computation , 2014, Lecture Notes in Computer Science.

[37]  James A. Hendler,et al.  Information accountability , 2008, CACM.

[38]  Lawrence O Gostin,et al.  Health information privacy. , 1995, Cornell law review.

[39]  Josep Domingo-Ferrer,et al.  Editorial: Trends in Aggregation and Security Assessment for Inference Control in Statistical Databases , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[40]  Alfred Kobsa,et al.  Privacy-enhanced personalization , 2006, FLAIRS.

[41]  Shivendu Shivendu,et al.  An Economic Model of Privacy: A Property Rights Approach to Regulatory Choices for Online Personalization , 2006, J. Manag. Inf. Syst..

[42]  YongSeog Kim Streaming association rule (SAR) mining with a weighted order-dependent representation of Web navigation patterns , 2009, Expert Syst. Appl..

[43]  Philip S. Yu,et al.  On static and dynamic methods for condensation-based privacy-preserving data mining , 2008, TODS.

[44]  Sanjay Kumar Madria,et al.  Approximate Query Processing Using Multilayered Data Model to Handle Environmental Constraints, Privacy and Avoiding Inferences , 2007, Int. J. Cooperative Inf. Syst..

[45]  Alfred Kobsa,et al.  Privacy-Enhanced Web Personalization , 2007, The Adaptive Web.

[46]  Kai Lung Hui,et al.  Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach , 2007, J. Manag. Inf. Syst..

[47]  Robert LaRose,et al.  Promoting personal responsibility for internet safety , 2008, CACM.

[48]  Elisa Bertino,et al.  Privacy preserving multi-factor authentication with biometrics , 2006, DIM '06.

[49]  Kimberly F. Balsam Ms Nowhere to Hide , 2007 .

[50]  Shari Lawrence Pfleeger,et al.  Insiders Behaving Badly , 2008, IEEE Security & Privacy.

[51]  Donn B. Parker Possession as an Element of Information Security , 1995, Inf. Secur. J. A Glob. Perspect..