Data mining to combat terrorism and the roots of privacy concerns

被引:6
|
作者
Birrer F.A.J. [1 ]
机构
[1] Leiden Institute for Advanced Computer Science (LIACS), 2300 RA Leiden
关键词
Data mining; Ethics; Privacy; Risk; Security; Systems of subliminal enticement; Terrorism;
D O I
10.1007/s10676-006-0010-6
中图分类号
学科分类号
摘要
Recently, there has been a heavy debate in the US about the government's use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the social risks these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust. © Springer 2006.
引用
收藏
页码:211 / 220
页数:9
相关论文
共 50 条
  • [41] Medical privacy versus data mining
    Farkas, C
    Valtorta, M
    Fenner, S
    [J]. WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVII, PROCEEDINGS: CYBERNETICS AND INFORMATICS: CONCEPTS AND APPLICATIONS (PT II), 2001, : 194 - 199
  • [42] A Review on Privacy Preserving Data Mining
    Shanthi, A. S.
    Karthikeyan, M.
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 438 - 441
  • [43] Study of Privacy Preserving Data Mining
    Li, Haisheng
    [J]. 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 700 - 703
  • [44] Informational privacy, data mining, and the Internet
    Tavani, Herman T.
    [J]. Ethics and Information Technology, 1999, 1 (02): : 137 - 145
  • [45] Survey on privacy preserving data mining
    Wang, Pingshui
    [J]. International Journal of Digital Content Technology and its Applications, 2010, 4 (09) : 1 - 7
  • [46] On privacy in time series data mining
    Zhu, Ye
    Fu, Yongjian
    Fu, Huirong
    [J]. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2008, 5012 : 479 - +
  • [47] Informational privacy, data mining, and the Internet
    Tavani H.T.
    [J]. Ethics and Information Technology, 1999, 1 (2) : 137 - 145
  • [48] The roots of terrorism
    Smith, Jonathan
    [J]. PROFESSIONAL ENGINEERING, 2006, 19 (19) : 21 - 21
  • [49] A Survey on Privacy Issues and Privacy Preservation in Spatial Data Mining
    Kamakshi, P.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1759 - 1762
  • [50] Information Security in Big Data: Privacy and Data Mining
    Xu, Lei
    Jiang, Chunxiao
    Wang, Jian
    Yuan, Jian
    Ren, Yong
    [J]. IEEE ACCESS, 2014, 2 : 1149 - 1176