Data mining to combat terrorism and the roots of privacy concerns

被引:6
|
作者
Birrer F.A.J. [1 ]
机构
[1] Leiden Institute for Advanced Computer Science (LIACS), 2300 RA Leiden
关键词
Data mining; Ethics; Privacy; Risk; Security; Systems of subliminal enticement; Terrorism;
D O I
10.1007/s10676-006-0010-6
中图分类号
学科分类号
摘要
Recently, there has been a heavy debate in the US about the government's use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the social risks these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust. © Springer 2006.
引用
收藏
页码:211 / 220
页数:9
相关论文
共 50 条
  • [21] Privacy in Data Mining: A Review
    Dutta, Sharmistha
    Gupta, Ankit Kumar
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 556 - 559
  • [22] Data mining and privacy: An overview
    Clifton, CW
    Mulligan, DK
    Ramakrishnan, R
    [J]. PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION, 2006, : 191 - 208
  • [23] Privacy preserving data mining
    Lindell, Y
    Pinkas, B
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 36 - 54
  • [24] Data Mining, the Internet, and privacy
    Broder, AJ
    [J]. WEB USAGE ANALYSIS AND USER PROFILING, 2000, 1836 : 56 - 73
  • [25] δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining
    Li, Zhizhou
    Lai, Ten H.
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 124 - 142
  • [26] On addressing accuracy concerns in privacy preserving association rule mining
    Guo, Ling
    Guo, Songtao
    Wu, Xintao
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2008, 5012 : 124 - 135
  • [27] Big data management: Security and privacy concerns
    Atoum, Ibrahim A.
    Keshta, Ismail M.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2021, 8 (05): : 73 - 83
  • [28] Big Data Security and Privacy Concerns: A Review
    Khanan, Akbar
    Abdullah, Salwani
    Mohamed, Abdul Hakim H. M.
    Mehmood, Amjad
    Ariffin, Khairul Akram Zainol
    [J]. SMART TECHNOLOGIES AND INNOVATION FOR A SUSTAINABLE FUTURE, 2019, : 55 - 61
  • [29] Special issue on data mining and data privacy
    Torra, Vicenç
    Narukawa, Yasuo
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (11) : 14977 - 14978
  • [30] Data ownership, privacy concerns, and consumer welfare
    Wang, Yuhan
    Dai, Shuanping
    [J]. ECONOMIC AND POLITICAL STUDIES-EPS, 2024,