Skip to main content
Top

2015 | OriginalPaper | Chapter

Embedding Privacy and Ethical Values in Big Data Technology

Authors : Michael Steinmann, Julia Shuster, Jeff Collmann, Sorin Adam Matei, Rochelle E. Tractenberg, Kevin FitzGerald, Gregory J. Morgan, Douglas Richardson

Published in: Transparency in Social Media

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The phenomenon now commonly referred to as “Big Data” holds great promise and opportunity as a potential source of solutions to many societal ills ranging from cancer to terrorism; but it might also end up as “…a troubling manifestation of Big Brother, enabling invasions of privacy, decreased civil freedoms (and) increased state and corporate control” (Boyd & Crawford, 2012, p. 664). Discussions about the use of Big Data are widespread as “(d)iverse groups argue about the potential benefits and costs of analyzing genetic sequences, social media interactions, health records, phone logs, government records, and other digital traces left by people” (Boyd & Crawford, 2012, p. 662). This chapter attempts to establish guidelines for the discussion and analysis of ethical issues related to Big Data in research, particularly with respect to privacy. In doing so, it adds new dimensions to the agenda setting goal of this volume. It is intended to help researchers in all fields, as well as policy-makers, to articulate their concerns in an organized way, and to specify relevant issues for discussion, policy-making and action with respect to the ethics of Big Data. On the basis of our review of scholarly literature and our own investigations with big and small data, we have come to recognize that privacy and the great potential for privacy violations constitute major concerns in the debate about Big Data. Furthermore, our approach and our recommendations are generalizable to other ethical considerations inherent in Big Data as we illustrate in the final section of the chapter.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Ball, M. P., Bobe, J. R., Chou, M. F., Clegg, T., Estep, P. W., Lunshof, J. E., et al. (2014). Harvard Personal Genome Project: Lessons from participatory public research. Genome Medicine, 6(2), 10.CrossRef Ball, M. P., Bobe, J. R., Chou, M. F., Clegg, T., Estep, P. W., Lunshof, J. E., et al. (2014). Harvard Personal Genome Project: Lessons from participatory public research. Genome Medicine, 6(2), 10.CrossRef
go back to reference Boyd, D. (2014, July 1) What does the Facebook Experiment teach us? The Medium. Online. Boyd, D. (2014, July 1) What does the Facebook Experiment teach us? The Medium. Online.
go back to reference Boyd, D., & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662–679.CrossRef Boyd, D., & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662–679.CrossRef
go back to reference Cohen, J. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 52, 1373–1438.CrossRef Cohen, J. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 52, 1373–1438.CrossRef
go back to reference Cohen, J. (2012). Configuring the networked citizen. In A. Sarat, L. Douglas, & M. M. Umphrey (Eds.), Imagining new legalities: Privacy and its possibilities in the 21st century (pp. 129–153). Stanford, CA: Stanford University Press.CrossRef Cohen, J. (2012). Configuring the networked citizen. In A. Sarat, L. Douglas, & M. M. Umphrey (Eds.), Imagining new legalities: Privacy and its possibilities in the 21st century (pp. 129–153). Stanford, CA: Stanford University Press.CrossRef
go back to reference Collmann, J., & Robinson, A. (2010). Designing ethical practice in biosurveillance: The project Argus doctrine. In D. Zeng, H. Chen, C. Castillo-Chavez, B. Lober, & M. Thurmond (Eds.), Infectious disease informatics and biosurveillance: Research, systems, and case studies. New York: Springer. Collmann, J., & Robinson, A. (2010). Designing ethical practice in biosurveillance: The project Argus doctrine. In D. Zeng, H. Chen, C. Castillo-Chavez, B. Lober, & M. Thurmond (Eds.), Infectious disease informatics and biosurveillance: Research, systems, and case studies. New York: Springer.
go back to reference Cooper, T., & Collmann, J. (2005). Managing information security and privacy in health care data mining. In H. Chen, S. Fuller, C. Friedman, & W. Hersh (Eds.), Advances in medical informatics: Knowledge management and data mining in biomedicine (Springer’s integrated series in information systems, Vol. 8). New York: Springer. Cooper, T., & Collmann, J. (2005). Managing information security and privacy in health care data mining. In H. Chen, S. Fuller, C. Friedman, & W. Hersh (Eds.), Advances in medical informatics: Knowledge management and data mining in biomedicine (Springer’s integrated series in information systems, Vol. 8). New York: Springer.
go back to reference Cooper, T., Collmann, J., & Neidermeier, H. (2008). Organizational repertoires and rites in health information security. Cambridge Quarterly of Healthcare Ethics, 17(4), 441–452.CrossRef Cooper, T., Collmann, J., & Neidermeier, H. (2008). Organizational repertoires and rites in health information security. Cambridge Quarterly of Healthcare Ethics, 17(4), 441–452.CrossRef
go back to reference Department of Defense, Office of the Inspector General, Information Technology Management. (2003). Terrorist Information Awareness Program (D-2004-033). Arlington, VA. Department of Defense, Office of the Inspector General, Information Technology Management. (2003). Terrorist Information Awareness Program (D-2004-033). Arlington, VA.
go back to reference Dumbill, E. (2012, January 12). What is big data? O’Reilly Radar. Online. Dumbill, E. (2012, January 12). What is big data? O’Reilly Radar. Online.
go back to reference Einav, L., & Levin, J. D. (2013). The data revolution and economic analysis. In J. Lerner & S. Stern (Eds.), Innovation policy and the economy. Cambridge, MA: MIT Press. doi:10.3386/w19035. Einav, L., & Levin, J. D. (2013). The data revolution and economic analysis. In J. Lerner & S. Stern (Eds.), Innovation policy and the economy. Cambridge, MA: MIT Press. doi:10.​3386/​w19035.
go back to reference Fung, B. (2014, February 27). Why civil rights groups are warning against ‘big data’. The Washington Post. Online Fung, B. (2014, February 27). Why civil rights groups are warning against ‘big data’. The Washington Post. Online
go back to reference Häyrinen, K., Saranto, K., & Nykänen, P. (2008). Definition, structure, content, use and impacts of electronic health records: A review of the research literature. International Journal of Medical Informatics, 77(5), 291–304.CrossRef Häyrinen, K., Saranto, K., & Nykänen, P. (2008). Definition, structure, content, use and impacts of electronic health records: A review of the research literature. International Journal of Medical Informatics, 77(5), 291–304.CrossRef
go back to reference Hildebrandt, M. (2011). Who needs stories if you can get the data? ISPs in the era of big data crunching. Philosophy of Technology, 24, 371–390.CrossRef Hildebrandt, M. (2011). Who needs stories if you can get the data? ISPs in the era of big data crunching. Philosophy of Technology, 24, 371–390.CrossRef
go back to reference Kaisler, S., Armour, F., Espinosa, J.A., & Money, W. (2013) Big data: Issues and challenges moving forward. In System Sciences (HICSS). 46th Hawaii International Conference, Maui, 2013. Kaisler, S., Armour, F., Espinosa, J.A., & Money, W. (2013) Big data: Issues and challenges moving forward. In System Sciences (HICSS). 46th Hawaii International Conference, Maui, 2013.
go back to reference Kroft, S. (2014, August 24) The data brokers: Selling your personal information. 60 Minutes. Online. Kroft, S. (2014, August 24) The data brokers: Selling your personal information. 60 Minutes. Online.
go back to reference Lazarus, D. (2014, April 24) Verizon wireless sells out customers with creepy new tactic. Los Angeles Times. Online. Lazarus, D. (2014, April 24) Verizon wireless sells out customers with creepy new tactic. Los Angeles Times. Online.
go back to reference Matei, S. (2014). Email correspondence 2014. Matei, S. (2014). Email correspondence 2014.
go back to reference Meyer, R. (2014, June 28). Everything we know about Facebook’s secret mood manipulation experiment. The Atlantic. Online. Meyer, R. (2014, June 28). Everything we know about Facebook’s secret mood manipulation experiment. The Atlantic. Online.
go back to reference Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27–32.CrossRef Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27–32.CrossRef
go back to reference Moyer, M. (2014). Twitter to release all tweets to scientists. Scientific American, 310(6). Moyer, M. (2014). Twitter to release all tweets to scientists. Scientific American, 310(6).
go back to reference Musgrave, S. (2014, May 3). A vast hidden surveillance network runs across America, powered by the repo industry. The Boston Globe. Online. Musgrave, S. (2014, May 3). A vast hidden surveillance network runs across America, powered by the repo industry. The Boston Globe. Online.
go back to reference Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 101–139. Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 101–139.
go back to reference Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford Law Books. Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford Law Books.
go back to reference Ramirez, E. (2014). Protecting consumer privacy in the big data age. Washington, DC: Federal Trade Commission. Ramirez, E. (2014). Protecting consumer privacy in the big data age. Washington, DC: Federal Trade Commission.
go back to reference Safire, W. (2002, November 14). You are a suspect. New York Times. Online. Safire, W. (2002, November 14). You are a suspect. New York Times. Online.
go back to reference Simon, S. (2014, May 15). Data mining your children. Politico. Online. Simon, S. (2014, May 15). Data mining your children. Politico. Online.
go back to reference Simons, B., & Spafford, E. H. (2003, January 23). Co-chairs, US ACM Policy Committee, Association for Computing Machinery, Letter to Honorable John Warner, Chairman, Senate Committee on Armed Forces. Simons, B., & Spafford, E. H. (2003, January 23). Co-chairs, US ACM Policy Committee, Association for Computing Machinery, Letter to Honorable John Warner, Chairman, Senate Committee on Armed Forces.
go back to reference Singer, N. (2014, April 21). InBloom student data repository to close. New York Times. Online. Singer, N. (2014, April 21). InBloom student data repository to close. New York Times. Online.
go back to reference Solove, D. J. (2008). Understanding privacy. Boston: Harvard University Press. Solove, D. J. (2008). Understanding privacy. Boston: Harvard University Press.
go back to reference Stoové, M. A., & Pedrana, A. E. (2014). Making the most of a brave new world: Opportunities and considerations for using Twitter as a public health monitoring tool. Preventive Medicine, 63, 109–111.CrossRef Stoové, M. A., & Pedrana, A. E. (2014). Making the most of a brave new world: Opportunities and considerations for using Twitter as a public health monitoring tool. Preventive Medicine, 63, 109–111.CrossRef
go back to reference Sullivan, G. (2014, July 3). Sheryl Sandberg not sorry for Facebook mood manipulation study. Washington Post. Online. Sullivan, G. (2014, July 3). Sheryl Sandberg not sorry for Facebook mood manipulation study. Washington Post. Online.
go back to reference Tavani, H. (2008). Informational privacy: Concepts, theories, and controversies. In K. E. Himma & H. Tavani (Eds.), The handbook of information and computer ethics (pp. 131–164). Hoboken, NJ: Wiley.CrossRef Tavani, H. (2008). Informational privacy: Concepts, theories, and controversies. In K. E. Himma & H. Tavani (Eds.), The handbook of information and computer ethics (pp. 131–164). Hoboken, NJ: Wiley.CrossRef
go back to reference Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5, 199–210.CrossRef Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5, 199–210.CrossRef
go back to reference Wittgenstein, L. (2001). Philosophical investigations. The German text, with a revised English translation (3rd ed., pp. 27–28). Malden, MA: Blackwell. Wittgenstein, L. (2001). Philosophical investigations. The German text, with a revised English translation (3rd ed., pp. 27–28). Malden, MA: Blackwell.
go back to reference Washington Post (2002, November 16). Total information awareness. Washington Post, Saturday. Washington Post (2002, November 16). Total information awareness. Washington Post, Saturday.
Metadata
Title
Embedding Privacy and Ethical Values in Big Data Technology
Authors
Michael Steinmann
Julia Shuster
Jeff Collmann
Sorin Adam Matei
Rochelle E. Tractenberg
Kevin FitzGerald
Gregory J. Morgan
Douglas Richardson
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-18552-1_15

Premium Partner