Skip to main content

Part of the book series: Studies in Applied Philosophy, Epistemology and Rational Ethics ((SAPERE,volume 3))

Abstract

A broad variety of governmental initiatives are striving to use advanced computerized processes to predict human behavior. This is especially true when the behavioral trends sought generate substantial risks or are difficult to enforce. Data mining applications are the technological tools which make governmental prediction possible. The growing use of predictive practices premised upon the analysis of personal information and powered by data mining, has generated a flurry of negative reactions and responses. A central concern often voiced in this context is the lack of transparency these processes entail. Although echoed across the policy, legal and academic debate, the nature of transparency in this context is unclear and calls for a rigorous analysis. Transparency might pertain to different segments of the data mining and prediction process. This chapter makes initial steps in illuminating the true meaning of transparency in this specific context and provides tools for further examining this issue.

This chapter begins by briefly describing and explaining the practices of data mining, when used to predict future human conduct on the basis of previously collected personal information. It then moves to address the flow of information generated in the prediction process. In doing so, it introduces a helpful taxonomy regarding four distinct segments within the prediction process. Each segment presents unique transparency-related challenges. Thereafter, the chapter provides a brief theoretical analysis seeking the foundations for transparency requirements. The analysis addresses transparency as a tool to enhance government efficiency, facilitate crowdsourcing and promote autonomy. Finally, the chapter concludes by bringing the findings of the two previous sections together. It explains at which contexts the arguments for transparency are strongest, and draws out the implications of these conclusions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Benkler, Y.: The wealth of networks, ch. 4. Yale University Press, New Haven and London (2007), www.benkler.org/Benkler_Wealth_Of_Networks.pdf (accessed December 29, 2011)

  • Cate, F.H.: Government, data mining: The need for a legal framework. Harvard Civil Rights-Civil Liberties Law Review 43(2), 435–489 (2008)

    Google Scholar 

  • Citron, D.: Open code governance. University of Chicago Legal Forum 2008, 355–387 (2008)

    Google Scholar 

  • Citron, D.: Technological due process. Washington University Law Review 85, 1249–1313 (2008)

    Google Scholar 

  • EPIC. Future attribute screening technology (FAST) project, http://epic.org/privacy/fastproject/ (accessed December 30, 2011)

  • Fenster, M.: The opacity of transparency. Iowa Law Review 91, 885–949, 895–896 (2006)

    Google Scholar 

  • Friedman, B., Nissenbaum, H.: Software agents and user autonomy. ACM, New York (1997)

    Google Scholar 

  • Kreimer, S.F.: The freedom of information act and the ecology of transparency. University of Pennsylvania Journal of Constitutional Law 10(5), 1011–1080, 1056–1056 (2008)

    Google Scholar 

  • Lessig, L.: Code and other laws of cyberspace. Basic Books, New York (1999)

    Google Scholar 

  • Lessig, L.: Against transparency: The perils of openness in government. The New Republic (October 9, 2009), http://www.tnr.com/article/books-and-arts/against-transparency (accessed December 29, 2011)

  • Martens, D., Provost, F.: Explaining documents’ classification. New York University - Stern School of Business Working Paper No. CeDER-11-01: 1-39. (2011), http://pages.stern.nyu.edu/fprovost/Papers/martens-CeDER-11-01.pdf (accessed December 29, 2011)

  • Mendel, T.: Freedom of information: a comparative survey, 2nd edn., (UNESCO), Section 1:30 (2008), http://portal.unesco.org/ci/en/files/26159/12054862803freedom_information_en.pdf/freedom_information_en.pdf

  • McCullagh, D.: Real-life “minority report” program gets a try-out. CBSNews (2011), http://www.cbsnews.com/stories/2011/10/07/tech/cnettechnews/main20117207.shtml (accessed December 29, 2011)

  • Ramasastry, A.: Lost in translation? data mining, national security and the adverse inference problem. Santa Clara Computer & High Technology Law Journal 22(4), 757–796 (2005)

    Google Scholar 

  • Reidenberg, J.R.: Setting standards for fair information practice in the U.S. private sector. Iowa Law Review 80(3), 497–551, 515 (1995)

    Google Scholar 

  • Schauer, F.: Profiles, probabilities and stereotypes, p. 31. Harvard University Press, Cambridge (2006)

    Google Scholar 

  • Slobogin, C.: Government data mining and the fourth amendment. University of Chicago Law Review 75, 317–341 (2008)

    Google Scholar 

  • Solove, D.J.: Data mining and the security-liberty debate. University of Chicago Law Review 74, 343–362 (2008)

    Google Scholar 

  • Steinbock, D.J.: Data matching, data mining, and due process. Georgia Law Review 40, 1–86, 23 (2005)

    Google Scholar 

  • TAPAC. The report of the technology and privacy advisory committee, safeguarding privacy in the fight against terrorism (2004), http://epic.org/privacy/profiling/tia/tapac_report.pdf (accessed July 12, 2011)

  • Fung, A., Graham, M., Weil, D.: Full Disclosure: The Perils and Promise of Transparency. Cambridge University Press, New York (2007)

    Book  Google Scholar 

  • Westin, A.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

  • Zarsky, T.Z.: Mine your own business!: Making the case for the implications of the data mining of personal information in the forum of public opinion. Yale Journal of Law & Technology 5, 1–56 (2002-2003)

    Google Scholar 

  • Zarsky, T.Z.: Governmental data mining and its alternatives. Penn State Law Review 116(2), 285–330 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tal Zarsky .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Zarsky, T. (2013). Transparency in Data Mining: From Theory to Practice. In: Custers, B., Calders, T., Schermer, B., Zarsky, T. (eds) Discrimination and Privacy in the Information Society. Studies in Applied Philosophy, Epistemology and Rational Ethics, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30487-3_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30487-3_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30486-6

  • Online ISBN: 978-3-642-30487-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics