Abstract
The phenomenon now commonly referred to as “Big Data” holds great promise and opportunity as a potential source of solutions to many societal ills ranging from cancer to terrorism; but it might also end up as “…a troubling manifestation of Big Brother, enabling invasions of privacy, decreased civil freedoms (and) increased state and corporate control” (Boyd & Crawford, 2012, p. 664). Discussions about the use of Big Data are widespread as “(d)iverse groups argue about the potential benefits and costs of analyzing genetic sequences, social media interactions, health records, phone logs, government records, and other digital traces left by people” (Boyd & Crawford, 2012, p. 662). This chapter attempts to establish guidelines for the discussion and analysis of ethical issues related to Big Data in research, particularly with respect to privacy. In doing so, it adds new dimensions to the agenda setting goal of this volume. It is intended to help researchers in all fields, as well as policy-makers, to articulate their concerns in an organized way, and to specify relevant issues for discussion, policy-making and action with respect to the ethics of Big Data. On the basis of our review of scholarly literature and our own investigations with big and small data, we have come to recognize that privacy and the great potential for privacy violations constitute major concerns in the debate about Big Data. Furthermore, our approach and our recommendations are generalizable to other ethical considerations inherent in Big Data as we illustrate in the final section of the chapter.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ball, M. P., Bobe, J. R., Chou, M. F., Clegg, T., Estep, P. W., Lunshof, J. E., et al. (2014). Harvard Personal Genome Project: Lessons from participatory public research. Genome Medicine, 6(2), 10.
Boyd, D. (2014, July 1) What does the Facebook Experiment teach us? The Medium. Online.
Boyd, D., & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662–679.
Cohen, J. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 52, 1373–1438.
Cohen, J. (2012). Configuring the networked citizen. In A. Sarat, L. Douglas, & M. M. Umphrey (Eds.), Imagining new legalities: Privacy and its possibilities in the 21st century (pp. 129–153). Stanford, CA: Stanford University Press.
Collmann, J., & Robinson, A. (2010). Designing ethical practice in biosurveillance: The project Argus doctrine. In D. Zeng, H. Chen, C. Castillo-Chavez, B. Lober, & M. Thurmond (Eds.), Infectious disease informatics and biosurveillance: Research, systems, and case studies. New York: Springer.
Cooper, T., & Collmann, J. (2005). Managing information security and privacy in health care data mining. In H. Chen, S. Fuller, C. Friedman, & W. Hersh (Eds.), Advances in medical informatics: Knowledge management and data mining in biomedicine (Springer’s integrated series in information systems, Vol. 8). New York: Springer.
Cooper, T., Collmann, J., & Neidermeier, H. (2008). Organizational repertoires and rites in health information security. Cambridge Quarterly of Healthcare Ethics, 17(4), 441–452.
Crews, C. W., Jr. (2002). The Pentagon’s total information awareness project: Americans under the microscope? Cato Institute. Retrieved 2014, November 4, from http://www.cato.org/publications/techknowledge/pentagons-total-information-awareness-project-americans-under-microscope
Department of Defense, Office of the Inspector General, Information Technology Management. (2003). Terrorist Information Awareness Program (D-2004-033). Arlington, VA.
Dittrich, D., Kenneally, E. (2012). The Menlo report: Ethical principles guiding information and communication technology research. US Department of Homeland Security. Retrieved 2014, November 4, from http://www.dhs.gov/sites/default/files/publications/CSD-MenloPrinciplesCORE-20120803.pdf
Dumbill, E. (2012, January 12). What is big data? O’Reilly Radar. Online.
Einav, L., & Levin, J. D. (2013). The data revolution and economic analysis. In J. Lerner & S. Stern (Eds.), Innovation policy and the economy. Cambridge, MA: MIT Press. doi:10.3386/w19035.
Executive Office of the President. (2014). Big Data: Seizing opportunities preserving values. Retrieved 2014, November 4, from http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf
Friedman, B., Kahn, P. H., Jr., & Borning, A. (2001). Value sensitive design: Theory and methods (UW CSE Technical Report 02-12-01). Retrieved 2014, November 2, from http://www.urbansim.org/pub/Research/ResearchPapers/vsd-theory-methods-tr.pdf
Fung, B. (2014, February 27). Why civil rights groups are warning against ‘big data’. The Washington Post. Online
Future of Privacy Forum. (2013). Big data and privacy. Making ends meet. Retrieved 2014, November 4, from http://www.futureofprivacy.org/big-data-privacy-workshop-paper-collection/
Häyrinen, K., Saranto, K., & Nykänen, P. (2008). Definition, structure, content, use and impacts of electronic health records: A review of the research literature. International Journal of Medical Informatics, 77(5), 291–304.
Hildebrandt, M. (2011). Who needs stories if you can get the data? ISPs in the era of big data crunching. Philosophy of Technology, 24, 371–390.
IBM. (2014). What is big data? Retrieved 2014, November 4, from http://www.ibm.com/big-data/us/en/
Kaisler, S., Armour, F., Espinosa, J.A., & Money, W. (2013) Big data: Issues and challenges moving forward. In System Sciences (HICSS). 46th Hawaii International Conference, Maui, 2013.
Knewton Inc. (2014). About Knewton. Retrieved 2014, November 4, from http://www.knewton.com/about/
Kroft, S. (2014, August 24) The data brokers: Selling your personal information. 60 Minutes. Online.
Lazarus, D. (2014, April 24) Verizon wireless sells out customers with creepy new tactic. Los Angeles Times. Online.
Marwick, A. (2014). How your data are being deeply mined. New York Review of Books. Retrieved 2014, November 4, from http://www.nybooks.com/articles/archives/2014/jan/09/how-your-data-are-being-deeply-mined/?pagination=false
Matei, S. (2014). Email correspondence 2014.
Meyer, R. (2014, June 28). Everything we know about Facebook’s secret mood manipulation experiment. The Atlantic. Online.
Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27–32.
Moyer, M. (2014). Twitter to release all tweets to scientists. Scientific American, 310(6).
Musgrave, S. (2014, May 3). A vast hidden surveillance network runs across America, powered by the repo industry. The Boston Globe. Online.
National Science Foundation. (2012). Directorate for computer science & information science & engineering, critical techniques and technologies for advancing big data science &engineering (BIGDATA). Retrieved 2014, November 4, from http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=504767
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 101–139.
Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford Law Books.
Ramirez, E. (2014). Protecting consumer privacy in the big data age. Washington, DC: Federal Trade Commission.
Safire, W. (2002, November 14). You are a suspect. New York Times. Online.
Simon, S. (2014, May 15). Data mining your children. Politico. Online.
Simons, B., & Spafford, E. H. (2003, January 23). Co-chairs, US ACM Policy Committee, Association for Computing Machinery, Letter to Honorable John Warner, Chairman, Senate Committee on Armed Forces.
Singer, N. (2014, April 21). InBloom student data repository to close. New York Times. Online.
Solove, D. J. (2008). Understanding privacy. Boston: Harvard University Press.
Stanley, J., & Steinhardt, B. (2003). Bigger monster, weaker chains: The growth of an American Surveillance Society. American Civil Liberties Union, Technology and Liberty Program. Retrieved 2014, November 4, from https://www.aclu.org/technology-and-liberty/bigger-monster-weaker-chains-growth-american-surveillance-society
Stoové, M. A., & Pedrana, A. E. (2014). Making the most of a brave new world: Opportunities and considerations for using Twitter as a public health monitoring tool. Preventive Medicine, 63, 109–111.
Sullivan, G. (2014, July 3). Sheryl Sandberg not sorry for Facebook mood manipulation study. Washington Post. Online.
Tavani, H. (2008). Informational privacy: Concepts, theories, and controversies. In K. E. Himma & H. Tavani (Eds.), The handbook of information and computer ethics (pp. 131–164). Hoboken, NJ: Wiley.
Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5, 199–210.
Wittgenstein, L. (2001). Philosophical investigations. The German text, with a revised English translation (3rd ed., pp. 27–28). Malden, MA: Blackwell.
Washington Post (2002, November 16). Total information awareness. Washington Post, Saturday.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Steinmann, M. et al. (2015). Embedding Privacy and Ethical Values in Big Data Technology. In: Matei, S., Russell, M., Bertino, E. (eds) Transparency in Social Media. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-18552-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-18552-1_15
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18551-4
Online ISBN: 978-3-319-18552-1
eBook Packages: Computer ScienceComputer Science (R0)