Skip to main content

The Way Forward

  • Chapter

Part of the book series: Studies in Applied Philosophy, Epistemology and Rational Ethics ((SAPERE,volume 3))

Abstract

The growing use of data mining practices by both government and commercial entities leads to both great promises and challenges. They hold the promise of facilitating an information environment which is fair, accurate and efficient. At the same time, they might lead to practices which are both invasive and discriminatory, yet in ways the law has yet to grasp. This point is demonstrated by showing how the common measures for mitigating privacy concerns, such as a priori limiting measures (particularly access controls, anonymity and purpose specification) are mechanisms that are increasingly failing solutions against privacy and discrimination issues in this novel context.

Instead, a focus on (a posteriori) accountability and transparency may be more useful. This requires improved detection of discrimination and privacy violations as well as designing and implementing techniques that are discrimination-free and privacy-preserving. This requires further (technological) research.

But even with further technological research, there may be new situations and new mechanisms through which privacy violations or discrimination may take place. Novel predictive models can prove to be no more than sophisticated tools to mask the “classic” forms of discrimination, by hiding discrimination behind new proxies. Also, discrimination might be transferred to new forms of population segments, dispersed throughout society and only connected by some attributes they have in common. Such groups will lack political force to defend their interests. They might not even know what is happening.

With regard to privacy, the adequacy of the envisaged European legal framework is discussed in the light of data mining and profiling. The European Union is currently revising the data protection legislation. The question whether these new proposals will adequately address the issues raised in this book is dealt with.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Calders, T., Verwer, S.: Three Naive Bayes Approaches for Discrimination-Free Classification. Special issue of ECML/PKDD (2010)

    Google Scholar 

  • Cate, F.H.: Government, Data Mining: The Need for a Legal Framework. Harvard Civil Rights-Civil Liberties Law Review 43, 436 (2008)

    Google Scholar 

  • Custers, B.H.M.: Data Mining with Discrimination Sensitive and Privacy Sensitive Attributes. In: Proceedings of ISP 2010, International Conference on Information Security and Privacy, Orlando, Florida, July 12-14 (2010)

    Google Scholar 

  • Denning, D.E.: Cryptography and Data Security, p. 17. Addison-Wesley, Amsterdam (1983)

    Google Scholar 

  • Ohm, P.: Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review 57, 1701–1765 (2010)

    Google Scholar 

  • Pedreschi, D., Ruggieri, S., Turini, F.: Discrimination-aware Data Mining. In: 14th ACM International Conference on Knowledge Discovery and Data Mining (KDD 2008), pp. 560–568. ACM (August 2008)

    Google Scholar 

  • Schermer, Wagemans: Onze digitale schaduw, een verkennend onderzoek naar het aantal databases waarin de gemiddelde Nederlander geregistreerd staat. College Bescherming Persoonsgegevens, Den Haag (2009) (in Dutch)

    Google Scholar 

  • Shannon, C.E.: The mathematical theory of communication. Bell Systems Technology Journal 27, 379–423, 623–656 (1948)

    Google Scholar 

  • Shannon, C.E.: Communications theory of secrecy systems. Bell Systems Technology Journal 28, 656–715 (1949)

    MathSciNet  MATH  Google Scholar 

  • Solove, D.: Nothing to Hide: The False Tradeoff Between Privacy and Security. Yale University Press (2011)

    Google Scholar 

  • Taipale, K.A.: Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd. Yale Journal of Law and Technology 7(123) (December 2004)

    Google Scholar 

  • Van den Berg, B., Leenes, R.: Audience Segregation in Social Network Sites. In: Proceedings for SocialCom2010/PASSAT2010 (Second IEEE International Conference on Social Computing/Second IEEE International Conference on Privacy, Security, Risk and Trust), pp. 1111–1117. IEEE, Minneapolis (2010)

    Google Scholar 

  • Vedder, A.H.: KDD: The Challenge to Individualism. Ethics and Information Technology (1), 275–281 (1999)

    Google Scholar 

  • Verwer, Calders: Three Naive Bayes Approaches for Discrimination-Free Classification. In: Data Mining: Special Issue with Selected Papers from ECML-PKDD 2010, Springer (2010)

    Google Scholar 

  • Warren, S.D., Brandeis, L.D.: The right to privacy; the implicit made explicit. Harvard Law Review, 193–220 (1890)

    Google Scholar 

  • Weitzner, D.J., Abelson, H., et al.: Transparent Accountable Data Mining: New Strategies for Privacy Protection. MIT Technical Report. MIT, Cambridge (2006)

    Google Scholar 

  • Westin, A.: Privacy and Freedom. Bodley Head, London (1967)

    Google Scholar 

  • Zarsky, T.Z.: ”Mine Your Own Business!”: Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion. Yale Journal of Law & Technology 5, 56 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bart Custers .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Custers, B., Calders, T., Zarsky, T., Schermer, B. (2013). The Way Forward. In: Custers, B., Calders, T., Schermer, B., Zarsky, T. (eds) Discrimination and Privacy in the Information Society. Studies in Applied Philosophy, Epistemology and Rational Ethics, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30487-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30487-3_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30486-6

  • Online ISBN: 978-3-642-30487-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics