Advertisement

Effects of Unreliable Group Profiling by Means of Data Mining

  • Bart Custers
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2843)

Abstract

With the rise of data mining technologies, group profiling -i.e. ascribing characteristics to groups of people- has increasingly become a useful tool for policy-making, direct marketing, etc. However, group profiles usually contain statistics and therefore the characteristics of group profiles may be valid for the group and for individuals as members of that group, though not for individuals as such. When individuals are judged by group characteristics they do not posses as individuals, this may strongly influence the advantages and disadvantages of using group profiles. However, striving for more reliable group profiles only provides a partial solution to this problem, since perfectly reliable group profiles may still result in unjustifiable treatment of people. A broader solution to deal with the disadvantages of group profiles may be found in developing new ethical, legal, and technological standards that adequately recognize the possible harmful consequences of particular types of information.

Keywords

Data mining KDD group profiling personal data data protection reliability distributivity security selection stigmatization confrontation ethics 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Harvey, J.: Stereotypes and Group-Claims: Epistemological and Moral Issues, and Their Implications for Multi-Culturalism in Education. Journal of Philosophy of Education 24(1), 39–50 (1990)CrossRefGoogle Scholar
  2. 2.
    Black, S.K.: Telecommunications Law in the Internet Age. Morgan- Kaufmann Publishers, San Francisco (2002)Google Scholar
  3. 3.
    Geller, L.N., Alper, J.S., Billings, P.R., Barash, C.I., Beckwith, J., Natowicz, M.: Individual, Family, and Societal Dimensions of Genetic Discrimination: A Case Study Analysis. Science and Engineering Ethics 2(1), 71–88 (1996)CrossRefGoogle Scholar
  4. 4.
    Vedder, A.H.: KDD: The challenge to individualism. Ethics and Information Technology 1, 275–281 (1999)CrossRefGoogle Scholar
  5. 5.
    Vedder, A.H.: Privacy en woorden die tekort schieten. In: Nouwt, S., Voermans, W. (eds.) Privacy in het informatietijdperk, pp. 17–30. SDU Uitgevers, Den Haag (1996)Google Scholar
  6. 6.
    Frawley, W.J., Piatetsky-Shapiro, G., Matheus, C.J.: Knowledge Discovery in Databases: An Overview. In: Piatetsky-Shapiro, G., Frawley, W.J. (eds.) Knowledge Discovery in Databases, AAAI Press / The MIT Press, Menlo Park, California (1993)Google Scholar
  7. 7.
    Denning, D.E.: Cryptography and Data Security. Addison-Wesley, Amsterdam (1983)Google Scholar
  8. 8.
    Custers, B.H.M.: Data Mining and Group Profiling on the Internet. In: Vedder, A. (ed.) Ethics and the Internet, Intersentia, Antwerpen (2001)Google Scholar
  9. 9.
    Denning, D.E., Schlörer, J.: Inference Controls for Statistical Databases. IEEE Computer 16(7), 69–82 (1983)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Bart Custers
    • 1
  1. 1.Faculty of LawTilburg UniversityTilburgThe Netherlands

Personalised recommendations