Database Reference
In-Depth Information
and organization of the data should be incorporated. With regard to analyzing data,
metadata should be incorporated about the process of analyses, the algorithms used,
the databases harvested and the methodology of mining. Finally, with regard to us-
ing (aggregated) data, data must be gathered about in what context the patterns,
profiles and rules will be applied and used.
By requiring and clustering a minimum set of (contextual) information, the val-
ue of the dataset is retained or even increased, and the privacy and discrimination
problems following from the loss of context might be better addressed than by the
data minimization principle. Nevertheless, it has to be stressed that not all privacy
and discrimination problems are caused by a loss of contextuality, nor can all pri-
vacy and discrimination problems be solved by the data mini mum mization prin-
ciples. Moreover, the data mini mum mization principles are neither totally new to
the technical, nor to the juridical doctrine. Finally, no efforts have been made in
this chapter to outline how data mini mum mization principles may be put into prac-
tice or be implemented in data mining rules.
References
Bu, S., et al.: Preservation of Patterns and Input-Output Privacy. In: Proceedings of ICDE
2007, pp. 696-705 (2007)
Calders, T., Verwer, S.: Three Naive Bayes Approaches for Discrimination-Free Classifica-
tion. Data Mining and Knowledge Discovery 21(2), 277-292 (2010)
Custers, B.H.M.: The Power of Knowledge; Ethical, Legal, and Technological Aspects of
Data Mining and Group Profiling in Epidemiology. Wolf Legal Publishers, Tilburg
(2004)
Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of associa-
tion rules. In: Proceedings of the 8th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining (KDD 2002), pp. 217-228 (2002)
Fulda, J.S.: Data Mining and Privacy. Alb. L.J. Sci. & Tech. (11), 105-113 (2000)
Grice, H.P.: Logic and conversation. In: Cole, P., Morgan, J. (eds.) Syntax and Semantics,
vol. (3), pp. 41-58. Academic Press, New York (1975)
Guzik, K.: Discrimination by Design: Data Mining in the United States's 'War on Terror-
ism'. Surveillance & Society (7), 1-17 (2009)
Hildebrandt, M., Gutwirth, S. (eds.): Profiling the European Citizen Cross-Disciplinary
Perspectives. Springer, New York (2008)
Kantarcioglu, M., Jin, J., Clifton, C.: When do data mining results violate privacy? In: Pro-
ceedings of the 10th ACM SIGKDD International Conference on Knowledge Discov-
ery and Data mining (KDD 2004), pp. 599-604. ACM, New York (2004)
Kuhn, P.: Sex discrimination in labor markets: The role of statistical evidence. The Ameri-
can Economic Review (77), 567-583 (1987)
LaCour-Little, M.: Discrimination in mortgage lending: A critical review of the literature.
Journal of Real Estate Literature (7), 15-50 (1999)
Larose, D.T.: Data mining methods and models. John Wiley & Sons, Inc. All, New Yersey
(2006)
Müller, V.C.: Would you mind being watched by machines? Privacy concerns in data
mining. AI & Soc. (23), 529-544 (2009)
Search WWH ::




Custom Search