Some Caveats on Profiling

In this chapter we endeavor to expose the singularity of profiling techniques, data mining or knowledge discovery in databases. Pursuant to this, we point at a number of caveats that are linked to the specifics of profiling. Those caveats pertain to issues related to dependence, privacy, data protection, fairness (non-discrimination), due process, auditability and transparency of the profilers and knowledge asymmetries. This chapter reiterates and builds further upon some of the findings of our research on profiling we presented in a volume we co-edited: Profiling the European Citizen. Cross-disciplinary Perspectives, which brought together leading experts in the domains of compute science, law and philosophy. We thank these authors, members of the ED funded consortium on the Future of Identity in the Information Society (FIDIS), for their joint effort to compose a handbook on a subject that is mostly discussed from singular disciplinary perspective.

[1]  R. Ericson,et al.  The New Politics of Surveillance and Visibility , 2006 .

[2]  Roger Brownsword Reinventing Data Protection , 2009 .

[3]  Curtis E. A. Karnow Liability for Distributed Artificial Intelligences , 1996 .

[4]  Bibi van den Berg,et al.  The Situated Self: Identity in a world of Ambient Intelligence , 2010 .

[5]  Antoinette Rouvroy,et al.  Privacy, Data Protection, and the Unprecedented Challenges of Ambient Intelligence , 2007 .

[6]  Claudio U. Ciborra,et al.  Digital Technologies and the Duality of Risk , 2004 .

[7]  Serge Gutwirth,et al.  Privacy and the Information Age , 2001 .

[8]  G. Marx Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.

[9]  Yves Poullet,et al.  Application of Convention 108 to the profiling mechanism: some ideas for the future work of the consultative committee (T-PD): final version , 2008 .

[10]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[11]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[12]  Mireille Hildebrandt,et al.  Ambient Intelligence, Criminal Liability and Democracy , 2008 .

[13]  Tomas A. Lipinski,et al.  The Digital Person: Technology and Privacy in the Information Age , 2008 .

[14]  Jonathan L. Zittrain Privacy 2.0 , 2008 .

[15]  J.E.J. Prins,et al.  When Personal Data, Behaviour and Virtual Identities Become a Commodity : Would a Property Rights Approach Matter? , 2006 .

[16]  James A. Hendler,et al.  Information accountability , 2008, CACM.

[17]  Oscar Gandy 15. Data Mining, Surveillance, and Discrimination in the Post-9/11 Environment , 2005 .

[18]  Pm Schwartz,et al.  Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices , 2001 .

[19]  Wim Schreurs,et al.  Cogitas, Ergo Sum. The Role of Data Protection Law and Non-discrimination Law in Group Profiling in the Private Sector , 2008, Profiling the European Citizen.

[20]  Jean-Marc Dinant,et al.  Application of Convention 108 to the profiling mechanism Some ideas for the future work of the consultative committee ( TPD ) , 2008 .

[21]  D. Citron Technological Due Process , 2007 .

[22]  Tal Z. Zarsky "MINE YOUR OWN BUSINESS!": MAKING THE CASE FOR THE IMPLICATIONS OF THE DATA MINING OF PERSONAL INFORMATION IN THE FORUM OF PUBLIC OPINION , 2003 .

[23]  D. Lyon Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .

[24]  B.H.M. Custers,et al.  'The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology , 2004 .

[25]  Tal Zarsky Desperately Seeking Solutions: Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society , 2004 .

[26]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[27]  Mireille Hildebrandt,et al.  Who is Profiling Who? Invisible Visibility , 2009 .

[28]  Serge Gutwirth,et al.  Regulating Profiling in a Democratic Constitutional State , 2008, Profiling the European Citizen.

[29]  Serge Gutwirth,et al.  Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .

[30]  Daniel J. Steinbock,et al.  Data Matching, Data Mining, and Due Process , 2005 .

[31]  Anton Vedder,et al.  KDD: The challenge to individualism , 1999, Ethics and Information Technology.

[32]  Elizabeth D. Mynatt,et al.  Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .

[33]  M. Hildebrandt,et al.  A vision of ambient law , 2007 .

[34]  Jenann Ismael,et al.  The Situated Self , 2007 .