Ethics and Information Technology

, Volume 6, Issue 2, pp 129–140 | Cite as

Ethical issues in web data mining

  • Lita van Wel
  • Lambèr Royakkers


Web mining refers to the whole of data miningand related techniques that are used toautomatically discover and extract informationfrom web documents and services. When used in abusiness context and applied to some type ofpersonal data, it helps companies to builddetailed customer profiles, and gain marketingintelligence. Web mining does, however, pose athreat to some important ethical values likeprivacy and individuality. Web mining makes itdifficult for an individual to autonomouslycontrol the unveiling and dissemination of dataabout his/her private life. To study thesethreats, we distinguish between `content andstructure mining' and `usage mining.' Webcontent and structure mining is a cause forconcern when data published on the web in acertain context is mined and combined withother data for use in a totally differentcontext. Web usage mining raises privacyconcerns when web users are traced, and theiractions are analysed without their knowledge.Furthermore, both types of web mining are oftenused to create customer files with a strongtendency of judging and treating people on thebasis of group characteristics instead of ontheir own individual characteristics and merits(referred to as de-individualisation). Althoughthere are a variety of solutions toprivacy-problems, none of these solutionsoffers sufficient protection. Only a combinedsolution package consisting of solutions at anindividual as well as a collective level cancontribute to release some of the tensionbetween the advantages and the disadvantages ofweb mining. The values of privacy andindividuality should be respected and protectedto make sure that people are judged and treatedfairly. People should be aware of theseriousness of the dangers and continuouslydiscuss these ethical issues. This should be ajoint responsibility shared by web miners (bothadopters and developers), web users, andgovernments.

ethics individuality KDD privacy web data mining 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. M.J.A. Berry and G.S. Linoff. Mining the Web: Transforming Customer Data. John Wiley & Sons, New York, 2002.Google Scholar
  2. R. Clarke. 'Profiling’ and Its Privacy Implications. Privacy Law & Policy Reporter, 1: 128, 1994.Google Scholar
  3. R. Clarke. Platform for Privacy Preferences: A Critique. Privacy Law & Policy Reporter, 5 (3): 46–48, 1998.Google Scholar
  4. B. Custers. Data Mining and Group Profiling on the Internet. In A. Vedder, editor, Ethics and the Internet, pages 87–104. Intersentia, Antwerpen Groningen Oxford, 2001.Google Scholar
  5. O. Etzioni. The World Wide Web: Quagmire or Gold Mine? Communications of the ACM, 39 (11): 65–68, 1996.Google Scholar
  6. D.R. Fordham, D.A. Riordan and M. Riordan. Business Intelligence. Management Accounting, 83 (11): 24–29, 2002.Google Scholar
  7. J.S. Fulda. Data Mining and Privacy. In R. Spinello and H. Tavani, editors, Readings in CyberEthics, pages 413–417. Jones and Bartlett, Sudbury MA, 2001.Google Scholar
  8. D.G. Johnson. Computer Ethics, 3rd. edition. Prentice-Hall, Upper Saddle River New Jersey, 2001.Google Scholar
  9. J.F. Johnson. Immunity from the Illegitimate Focused Attention of Others: An Explanation of our Thinking and Talking about Privacy. In A. Vedder, editor, Ethics and the Internet, pages 49–70. Intersentia, Antwerpen Groningen Oxford, 2001.Google Scholar
  10. R. Kosala, H. Blockeel and F. Neven. An Overview of Web Mining. In J. Meij, editor, Dealing with the Data Flood: Mining Data, Text and Multimedia, pages 480–497. STT, Rotterdam, 2002.Google Scholar
  11. S.K. Madria, S.S. Bhowmick, W.-K. Ng and E.P. Lim. Research Issues in Web-data Mining. Lecture Notes in Computer Science, 1676: 303–312, 1999.Google Scholar
  12. B. Mobasher, R. Cooley and J. Srivastava. Automatic Personalization Based on Web Usage Mining. Communications of the ACM, 43 (8): 142–151, 2000.Google Scholar
  13. M.D. Mulvenna, S.S. Anand and A.G. Büchner. Personalization on the Net Using Web Mining. Communications of the ACM, 43 (8): 123–125, 2000.Google Scholar
  14. H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology. Ethics & Behavior, 7 (3): 207–220, 1997.Google Scholar
  15. E. Philips, D. Vriens and G. Kienhorst, editors. Business Intelligence. Kluwer, Deventer, 1999.Google Scholar
  16. R. Pierik. Group Profiles, Equality, and the Power of Numbers. In A. Vedder, editor, Ethics and the Internet, pages 105–123. Intersentia, Antwerpen Groningen Oxford, 2001.Google Scholar
  17. K. Scribbins. Privacy@net, An International Comparative Study of Consumer Privacy on the Internet. Consumers International ( releases/fprivreport.pdf), 2001.Google Scholar
  18. J. Srivastava, R. Cooley, M. Deshpande and P.N. Tan. Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data. ACM SIGKDD, 1(2): 12–23, 2000.Google Scholar
  19. H.T. Tavani. Informational Privacy, Data Mining, and the Internet.’ Ethics and Information Technology, 1: 137–145, 1999a.Google Scholar
  20. H.T. Tavani. KDD, Data Mining, and the Challenge to Normative Privacy. Ethics and Information Technology, 1: 265–273, 1999a.Google Scholar
  21. H.T. Tavani. Privacy Enhancing Technologies as a Panacea for Online Privacy Concerns: Some Ethical Considerations. Ethics and Information Technology, 9: 26–36, 2000.Google Scholar
  22. H.T. Tavani and J. Moor. Privacy Protection, Control of Information, and Privacy-Enhancing Technologies. Computers and Society, 31: 6–11, 2001.Google Scholar
  23. A. Vedder. KDD: The Challenge to Individualism. Ethics and Information Technology, 1: 275–281, 1999.Google Scholar
  24. A. Vedder. Privacy and Confidentiality. Medical Data, New Information Technologies, and the Need for Normative Principles Other than Privacy Rules. Law and Medicine, 3: 441–459, 2000.Google Scholar
  25. A. Vedder. KDD, Privacy, Individuality, and Fairness. In R. Spinello and H. Tavani, editors, Readings in CyberEthics, pages 404–412. Jones and Bartlett, Sudbury MA, 2001.Google Scholar

Copyright information

© Kluwer Academic Publishers 2004

Authors and Affiliations

  • Lita van Wel
    • 1
  • Lambèr Royakkers
    • 1
  1. 1.Department of Philosophy and Ethics of TechnologyEindhovenThe Netherlands

Personalised recommendations