Data Dilemmas in the Information Society: Introduction and Overview

  • Bart CustersEmail author
Part of the Studies in Applied Philosophy, Epistemology and Rational Ethics book series (SAPERE, volume 3)


This chapter provides and introduction to this book and an overview of all chapters. First, it is pointed out what this book is about: discrimination and privacy issues of data mining and profiling and solutions (both technological and non-technological) for these issues. A large part of this book is based on research results of a project on how and to what extent legal and ethical rules can be integrated in data mining algorithms to prevent discrimination. Since this is an introductory chapter, it is explained what data mining and profiling are and why we need these tools in an information society. Despite this unmistakable need, however, data mining and profiling may also have undesirable effects, particularly discriminatory effects and privacy infringements. This creates dilemmas on how to deal with data mining and profiling. Regulation may take place using laws, norms, market forces and code (i.e., constraints in the architecture of technologies). This chapter concludes with an overview of the structure of this book, containing chapters on the opportunities of data mining and profiling, possible discrimination and privacy issues, practical applications and solutions in code, law, norms and the market.


Data Mining Information Society Privacy Issue Personal Profile Data Mining Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Adriaans, P., Zantinge, D.: Data mining. Addison Wesley Longman, England (1996)Google Scholar
  2. Artz, M.J.T., van Eijk, M.M.M.: Klant in het web. In: Privacywaarborgen voor Internettoegang. Achtergrondstudies en verkenningen, vol. 17. Registratiekamer, Den Haag (2000)Google Scholar
  3. Berlin, I.: Four Essays on Liberty. Oxford University Press, Oxford (1969)Google Scholar
  4. Berti, L., Graveleau, D.: Designing and Filtering On-line Information Quality: New Perspectives for Information Service Providers. In: Ethicomp 1998, 4th International Conference on Ethical Issues of Information Technologies, Rotterdam (1998)Google Scholar
  5. Blanchette, J.F., Johnson, D.G.: Data retention and the panopticon society: the social benefits of forgetfulness. In: Introna, L. (ed.) Computer Ethics: Philosophical Enquiry (CEPE 1998). Proceedings of the Conference held at London School of Economics, December 13-14, pp. 113–120. London ACM SIG/London School of Economics (1998)Google Scholar
  6. Böhme: Valuating Privacy with Option Pricing Theory. In: Berthold, S. (ed.) Workshop on the Economics of Information Security (WEIS 2009), June 24-25. University College London, London (2009)Google Scholar
  7. Böhme, Koble: On the Viability of Privacy-Enhancing Technologies in a Self-regulated Business-to-consumer Market: Will Privacy Remain a Luxury Good? In: Proceedings of Workshop on the Economics of Information Security (WEIS), June 7-8. Carnegie Mellon University, Pittsburgh (2007)Google Scholar
  8. Bygrave, L.A.: Data protection law; approaching its rationale, logic and limits. Information law series, vol. 10. Kluwer Law International, The Hague (2002)Google Scholar
  9. Chadwick, R., Levitt, M., Shickle, D.: The right to know and the right not to know. Avebury Ashgate Publishing Ltd., Aldershot (1997)Google Scholar
  10. Clarke, R.: Customer profiling and privacy implications for the finance industry (1997)Google Scholar
  11. Custers, B.H.M.: The Power of Knowledge; Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology, p. 300. Wolf Legal Publishers, Tilburg (2004)Google Scholar
  12. Denning, D.E.: Cryptography and Data Security. Addison-Wesley, Amsterdam (1983)Google Scholar
  13. Etzioni, A.: The Limits of Privacy. Basic Books, New York (1999)Google Scholar
  14. Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P.: From Data Mining to Knowledge Discovery: An Overview. In: Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R. (eds.) Advances in Knowledge Discovery and Data Mining. AAAI Press/The MIT Press, Menlo Park, California (1996b)Google Scholar
  15. Frawley, W.J., Piatetsky-Shapiro, G., Matheus, C.J.: Knowledge Discovery in Databases; an overview. In: Piatetsky-Shapiro, G., Frawley, W.J. (eds.) Knowledge Discovery in Databases. AAAI Press/The MIT Press, Menlo Park, California (1993)Google Scholar
  16. Friedman, B., Kahn Jr., P.H., Borning, A.: Value Sensitive Design and information systems. In: Zhang, P., Galletta, D. (eds.) Human-Computer Interaction in Management Information Systems: Foundations, pp. 348–372. M.E. Sharpe, Armonk (2006)Google Scholar
  17. Hand, D.J.: Data mining: statistics and more? The American Statistician 52(2), 112–118 (1998)MathSciNetGoogle Scholar
  18. Harcourt, B.E.: Against Prediction: Profiling, Policing and Punishing in an Actuarial Age. University of Chicago Press, Chicago (2007)Google Scholar
  19. Hildebandt, M.: Behavioral Biometric Profiling and Transparency Enhancing Tools. Scientific Report of EU-program Future of Identity in the Information Society (FIDIS), WP7-D7.12 (2009),
  20. Hildebrandt, M., Gutwirth, S.: Profiling the European Citizen. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  21. Holsheimer, M., Siebes, A.: Data Mining: the Search for Knowledge in Databases. Report CS-R9406 Centrum voor Wiskunde en Informatica, Computer Science/Department of Algorithmics and Architecture (1991)Google Scholar
  22. Lessig, L.: Code Version 2.0. Basic Books, New York (2006)Google Scholar
  23. Mitchell, T.M.: Machine Learning and Data Mining. Communications of the ACM 42(11) (1999)Google Scholar
  24. Posner, R.A.: Uncertain Shield. Rowman & Littlefield Publishers, Inc., New York (2006)Google Scholar
  25. Regan, P.M.: Privacy and commercial use of personal data: policy developments in the United States. Paper Presented at the Rathenau Institute Conference on Privacy, Amsterdam (January 17, 2002)Google Scholar
  26. Schaller, R.R.: Moore’s Law: Past, Present and Future. IEEE Spectrum 34, 52–59 (1997)CrossRefGoogle Scholar
  27. Schauer, F.: Profiles, Probabilities and Stereotypes. Harvard University Press, Cambridge (2003)Google Scholar
  28. Solove, D.: The Digital Person; Technology and Privacy in the Information Age. University Press, New York (2004)Google Scholar
  29. SPSS Inc. Data Mining with Confidence. SPSS Inc., Chicago (1999)Google Scholar
  30. Stallings, W.: Cryptography and Network Security; principles and practice. Prentice Hall, Upper Saddle River (1999)Google Scholar
  31. Tavani, H.: Internet Privacy: some distinctions between Internet-specific and Internet-enhanced privacy concerns. In: Proceedings of the 4th Ethicomp International Conference on the Social and Ethical Impacts of Information and Communication Technologies, Ethicomp 1999 (1999)Google Scholar
  32. Vedder, A.H.: KDD: The challenge to individualism. Ethics and Information Technology 1, 275–281 (1999)CrossRefGoogle Scholar
  33. Vedder, A.H., Custers, B.H.M.: Whose responsibility is it anyway? Dealing with the consequences of new technologies. In: Sollie, P., Düwell, M. (eds.) Evaluating New Technologies: Methodological Problems for the Ethical Assessment of Technology Developments, pp. 21–34. Springer, New York (2009) (The international library of ethics, law and technology, 3)Google Scholar
  34. Westin, A.: Privacy and Freedom. Bodley Head, London (1967)Google Scholar
  35. Zarsky, T.: Mine Your Own Business! Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion. Yale Journal of Law and Technology 5, 57 (2002-2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.eLaw, Institute for Law in the Information SocietyLeiden UniversityLeidenThe Netherlands

Personalised recommendations