This website uses cookies to ensure you have the best experience. Learn more

Privacy Endangerment With The Use Of Data Mining

1050 words - 5 pages

Privacy Endangerment with the Use of Data Mining
An emergent Information Technology (IT) issue that has been rising in the past few years has been data mining. Data mining is utilized to retrieve personal identifiable information provided by individuals through the use of Internet services such as: social media networks, email, and other networks that contain data bases full of personal information. If such data retrieval if not done careful, it can cause ethical issues for the companies that are involved. The ethical issues related to data mining are violation of privacy, confidentiality, and respect of persons’ rights. Issues that required the immediate attention regarding data ...view middle of the document...

, & Krotov, V., 2006). Most companies complied with the request but Google did not. Google’s fiasco raised a series of questions about Google’s ethical use of information. Resulting on a Congress movement to provide a legislation that would instruct companies to destroy stored data with personal information. This same incident allowed the Department of Justice to review several data mining collections that indicated that these companies were protecting the user against the law (i.e. murder plots, child pornography, and a variety of other crimes.)
Our government currently uses data mining to identify potential terrorist or criminal acts. However, these invasions of confidentiality and privacy are allowed and protected by federal laws. The responsible use of these federal laws allows our citizens to remain safe. Government employees authorized to conduct data mining undergo a series of ethics training and refresher training that allows them to understand that importance of protecting personal identifiable information. However, there will always be a possibility of government data mining to be compromised by unethical behavior.
Data mining is utilized to provide the following identifiers: “Association, Sequence or path analysis, Classification, Clustering, and Forecasting” (Rouse, M., 2015). Although most data mining is legally utilized to establish user trends to be able to target their interest. Thus allowing corporations to profit from their consumers needs without risking erroneous marketing. Data mining if done unethically can expose users’ information to be at risk of potential illegal targeting or their information may be stolen. Thus creating a greater risk of identity theft.
The main ethical violation that data mining brings to users is the high possibility of their confidentiality, privacy and the respect of people’s rights being violated. Currently, Social media and Internet companies spend countless hours on ethical training and Code of Conduct training to reduce and ultimately prevent the users’ confidentiality from being violated. These ethical principles “recognize the necessity of protecting these rights and the welfare afforded of those who trust providers. Because of emerging threats to privacy, client data may currently be under protected, regardless of current policies” (Lustgarten, S. D., 2015).
Unfortunately, the “digitalization of records and communication also provides greater threat to outside entities that may unlawfully infringe...

Other Papers Like Privacy Endangerment with the Use of Data Mining

Fully Discuss the Data Gathering Methods You Will Use

1260 words - 6 pages internal managers. The survey will consist of open ended and close ended questions. The answers are expected to be answered with integrity as I use these answers to analyze the overall data. Once the analysis has been completed, the data will be kept confidential. Sincerely, Mr. Lasana

Critically Compare the Use of Myth with the Use of Analogy to Express the Human Understanding of God

791 words - 4 pages Critically compare the use of myth with the use of analogy to express the human understanding of God. (35 marks) As the idea of who God is and his nature is subjective, people have relied on many different things to explain God to others and to understand him and his ways themselves. Myths and analogies are among the techniques that people use. Myths are traditional stories that convey the beliefs and values of the communities that tell them

A Company Is (Morally) Allowed Within the Legal Framework to Gain Unlimited Access to Consumer’s Privacy for the Use of Customer Loyalty Programmes

855 words - 4 pages maintain clients. Instead of feeling threatened by handing out private information, the consumer needs to feel rewarded – their information is being put to good use. BIBLIOGRAPHY: Hilton. "Hilton HHonors - MyWay Benefits." Hilton HHonors. Hilton. Web. 20 Mar. 2012. . Bush, Michael. "Data Security." Edelman.com. Edelman, 07 Mar. 2012. Web. 21 Mar. 2012. . Petreitis, David, Karel De Baere, and Latika Sharma. "E-privacy: A Key Asset for Winning Customer Loyalty." PWC.com. PricewaterhouseCoopers. Web. 21 Mar. 2012. .

The Benefits of Securing Patient Privacy

1126 words - 5 pages right, enforced with the signing of HIPPA in 1996. HIPPA protected patients by making the disclosing of patient information against the law. Even though initiatives as the ones mentioned were taken, Privacy continues to be violated in today’s society, therefore it must be understood that privacy is crucial because it develops trust bonds between the patient and clinical staff, privacy gives credibility to the doctors/nurses and lastly privacy

Facebook Has Always Been Accused for Giving Users a False Sense of Control over Their Data Privacy

519 words - 3 pages its purposes. The privacy settings were less clear in relation to the collection and use of data by Facebook itself or by third-parties like application developers. Other than that Carnegie Mellon University shows that Facebook has essentially become a worldwide photo identification database.  The researchers relied on just Facebook’s public profile information and off-the-shelf facial recognition software and were able to match Facebook users

The Influence of the Government Policy on Mining Machinery

684 words - 3 pages , sand making machine, mobile crushing station, and grinding mill which are widely used in mining, building materials, roads, bridges, coal, chemical, metallurgy, refractoriness and other industries. Since 2009, the mining crushing industry has been undergoing rapid development with the support of the national policy. Before the reform and opening up policy, the sand stone production was to some degree in the state of backwardness. The mode of

Use of Therapy with Stroke Victims

1667 words - 7 pages The Use of Music Therapy on Stroke Victims When normal blood flow to the brain fails, a stroke occurs, there are more than 780,000 strokes every year in the United States causing more serious long-term disabilities than any other disease that number is expected to increase in the coming years. (Know Stroke). While preventing strokes is obviously a goal, the development of successful rehabilitation strategies is equally important. Music therapy

Telco Strategies, Investments and Use Cases of Big Data and Analytics

665 words - 3 pages . A total of 40% of the organizations surveyed opted for a centralized approach when setting up the BDA function in their organization. A third opted for a decentralized approach while just 20% set up a separate business unit. Synopsis Big data and analytics: Telco strategies, investments and use cases examines the current situation with regard to big data and analytics among communications service providers, the use cases these organizations

Use of the Edinburgh Postnatal Depression Scale (Epnds) with Mothers of Different Cultural Backgrounds Within Butetown in Cardiff

3299 words - 14 pages . Data Analysis In considering developing an interview schedule in dealing with ethnic mothers these are the things that need to be taken into account: collecting quantitative scores, ages, demography, working out difference in EPNDS mean scores involving quantitative work using statistics SPSS software. Differences between the means of the EPNDS scores would be analysed using the “T test”. Researchers use a variety of statistical tests to

Distinguish Between Parametric And Nonparametric Statistics And Discuss When To Use Each Method In Analysis Of Data

763 words - 4 pages DISTINGUISH BETWEEN PARAMETRIC AND NONPARAMETRIC STATISTICS AND DISCUSS WHEN TO USE EACH METHOD IN ANALYSIS OF DATA The word parametric comes from “metric” meaning to measure, and “para” meaning beside or closely related. The combined term refers to the assumptions about the population from which the measurements were obtained. The two classes of statistical tests are:  Parametric Statistics  Nonparametric Statistics i. Parametric

The Use of Electronic Sources

1096 words - 5 pages have VPN downloaded Accept the terms and conditions (to use this database for study purposes) and now you can search! More help & contact details Video Guides For MBSW students, there is an Induction Module on BlackBoard, with videos and guides to navigate you to the resources you need Downloadable Guides On the Library’s website are a range of downloadable guides to assist you with using ejournals and other databases. Business Research Plus

Related Essays

Mining The Data Warehouse Essay

1691 words - 7 pages Mining the Data Warehouse Summary In “Mining the Data Warehouse”, It speaks of a survey done by Merrill Lynch back in 2006. It tells us that “business intelligence software and data-mining tools were at the top of CIOs’ technology spending list” (Baltzan, Hag, Phillips 87). It gives a few examples of how companies are using the software and tools to gain very valuable information. When Ben & Jerry’s is mentioned, people know the brand

Teachers, Privacy, And The Ethical Use Of Digital Media

2887 words - 12 pages organization’s information gatherers are left with the ethical dilemma of what personal information is to be collected. As we seen with our own government, some information is collected without the citizen’s knowledge. Recent exposure of data collection by a government contractor has sparked a debate on what is ethical when it comes to privacy and national security. A contractor stole government secrets utilizing his credentials and those of

The Extinction Of Privacy Essay

1760 words - 8 pages The Extinction of Privacy Sara Castro EN122 May 21, 2013 Most people believe that privacy is being totally alone, away from everything. Simson Garfinkel author of Database Nation: The Death of Privacy in the 21st Century writes “The problem with this word “privacy” is that it falls short of conveying the really big picture. Privacy isn’t just about hiding things. It’s about self-possession, autonomy, and integrity.” (Garfinkel, 2001

“Despite All The Problems Associated With Their Use, Crime Statistics Created By Governments Remain One Of The Most Useful Sources Of Data About Criminal And Deviant Behaviour” Evaluate This Claim

1558 words - 7 pages “Despite all the problems associated with their use, crime statistics created by governments remain one of the most useful sources of data about criminal and deviant behaviour” Evaluate this claim. Official crime statistics are quantitative data produced by government agencies to provide information regarding crime rates. Crime itself can be defined as an illegal act that violates the current laws for which someone can be punished by