Skip to main content

Embedding Privacy and Ethical Values in Big Data Technology

  • Chapter

Part of the book series: Computational Social Sciences ((CSS))

Abstract

The phenomenon now commonly referred to as “Big Data” holds great promise and opportunity as a potential source of solutions to many societal ills ranging from cancer to terrorism; but it might also end up as “…a troubling manifestation of Big Brother, enabling invasions of privacy, decreased civil freedoms (and) increased state and corporate control” (Boyd & Crawford, 2012, p. 664). Discussions about the use of Big Data are widespread as “(d)iverse groups argue about the potential benefits and costs of analyzing genetic sequences, social media interactions, health records, phone logs, government records, and other digital traces left by people” (Boyd & Crawford, 2012, p. 662). This chapter attempts to establish guidelines for the discussion and analysis of ethical issues related to Big Data in research, particularly with respect to privacy. In doing so, it adds new dimensions to the agenda setting goal of this volume. It is intended to help researchers in all fields, as well as policy-makers, to articulate their concerns in an organized way, and to specify relevant issues for discussion, policy-making and action with respect to the ethics of Big Data. On the basis of our review of scholarly literature and our own investigations with big and small data, we have come to recognize that privacy and the great potential for privacy violations constitute major concerns in the debate about Big Data. Furthermore, our approach and our recommendations are generalizable to other ethical considerations inherent in Big Data as we illustrate in the final section of the chapter.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Ball, M. P., Bobe, J. R., Chou, M. F., Clegg, T., Estep, P. W., Lunshof, J. E., et al. (2014). Harvard Personal Genome Project: Lessons from participatory public research. Genome Medicine, 6(2), 10.

    Article  Google Scholar 

  • Boyd, D. (2014, July 1) What does the Facebook Experiment teach us? The Medium. Online.

    Google Scholar 

  • Boyd, D., & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, Communication & Society, 15(5), 662–679.

    Article  Google Scholar 

  • Cohen, J. (2000). Examined lives: Informational privacy and the subject as object. Stanford Law Review, 52, 1373–1438.

    Article  Google Scholar 

  • Cohen, J. (2012). Configuring the networked citizen. In A. Sarat, L. Douglas, & M. M. Umphrey (Eds.), Imagining new legalities: Privacy and its possibilities in the 21st century (pp. 129–153). Stanford, CA: Stanford University Press.

    Chapter  Google Scholar 

  • Collmann, J., & Robinson, A. (2010). Designing ethical practice in biosurveillance: The project Argus doctrine. In D. Zeng, H. Chen, C. Castillo-Chavez, B. Lober, & M. Thurmond (Eds.), Infectious disease informatics and biosurveillance: Research, systems, and case studies. New York: Springer.

    Google Scholar 

  • Cooper, T., & Collmann, J. (2005). Managing information security and privacy in health care data mining. In H. Chen, S. Fuller, C. Friedman, & W. Hersh (Eds.), Advances in medical informatics: Knowledge management and data mining in biomedicine (Springer’s integrated series in information systems, Vol. 8). New York: Springer.

    Google Scholar 

  • Cooper, T., Collmann, J., & Neidermeier, H. (2008). Organizational repertoires and rites in health information security. Cambridge Quarterly of Healthcare Ethics, 17(4), 441–452.

    Article  Google Scholar 

  • Crews, C. W., Jr. (2002). The Pentagon’s total information awareness project: Americans under the microscope? Cato Institute. Retrieved 2014, November 4, from http://www.cato.org/publications/techknowledge/pentagons-total-information-awareness-project-americans-under-microscope

  • Department of Defense, Office of the Inspector General, Information Technology Management. (2003). Terrorist Information Awareness Program (D-2004-033). Arlington, VA.

    Google Scholar 

  • Dittrich, D., Kenneally, E. (2012). The Menlo report: Ethical principles guiding information and communication technology research. US Department of Homeland Security. Retrieved 2014, November 4, from http://www.dhs.gov/sites/default/files/publications/CSD-MenloPrinciplesCORE-20120803.pdf

  • Dumbill, E. (2012, January 12). What is big data? O’Reilly Radar. Online.

    Google Scholar 

  • Einav, L., & Levin, J. D. (2013). The data revolution and economic analysis. In J. Lerner & S. Stern (Eds.), Innovation policy and the economy. Cambridge, MA: MIT Press. doi:10.3386/w19035.

    Google Scholar 

  • Executive Office of the President. (2014). Big Data: Seizing opportunities preserving values. Retrieved 2014, November 4, from http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf

  • Friedman, B., Kahn, P. H., Jr., & Borning, A. (2001). Value sensitive design: Theory and methods (UW CSE Technical Report 02-12-01). Retrieved 2014, November 2, from http://www.urbansim.org/pub/Research/ResearchPapers/vsd-theory-methods-tr.pdf

  • Fung, B. (2014, February 27). Why civil rights groups are warning against ‘big data’. The Washington Post. Online

    Google Scholar 

  • Future of Privacy Forum. (2013). Big data and privacy. Making ends meet. Retrieved 2014, November 4, from http://www.futureofprivacy.org/big-data-privacy-workshop-paper-collection/

  • Häyrinen, K., Saranto, K., & Nykänen, P. (2008). Definition, structure, content, use and impacts of electronic health records: A review of the research literature. International Journal of Medical Informatics, 77(5), 291–304.

    Article  Google Scholar 

  • Hildebrandt, M. (2011). Who needs stories if you can get the data? ISPs in the era of big data crunching. Philosophy of Technology, 24, 371–390.

    Article  Google Scholar 

  • IBM. (2014). What is big data? Retrieved 2014, November 4, from http://www.ibm.com/big-data/us/en/

  • Kaisler, S., Armour, F., Espinosa, J.A., & Money, W. (2013) Big data: Issues and challenges moving forward. In System Sciences (HICSS). 46th Hawaii International Conference, Maui, 2013.

    Google Scholar 

  • Knewton Inc. (2014). About Knewton. Retrieved 2014, November 4, from http://www.knewton.com/about/

  • Kroft, S. (2014, August 24) The data brokers: Selling your personal information. 60 Minutes. Online.

    Google Scholar 

  • Lazarus, D. (2014, April 24) Verizon wireless sells out customers with creepy new tactic. Los Angeles Times. Online.

    Google Scholar 

  • Marwick, A. (2014). How your data are being deeply mined. New York Review of Books. Retrieved 2014, November 4, from http://www.nybooks.com/articles/archives/2014/jan/09/how-your-data-are-being-deeply-mined/?pagination=false

  • Matei, S. (2014). Email correspondence 2014.

    Google Scholar 

  • Meyer, R. (2014, June 28). Everything we know about Facebook’s secret mood manipulation experiment. The Atlantic. Online.

    Google Scholar 

  • Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27–32.

    Article  Google Scholar 

  • Moyer, M. (2014). Twitter to release all tweets to scientists. Scientific American, 310(6).

    Google Scholar 

  • Musgrave, S. (2014, May 3). A vast hidden surveillance network runs across America, powered by the repo industry. The Boston Globe. Online.

    Google Scholar 

  • National Science Foundation. (2012). Directorate for computer science & information science & engineering, critical techniques and technologies for advancing big data science &engineering (BIGDATA). Retrieved 2014, November 4, from http://www.nsf.gov/funding/pgm_summ.jsp?pims_id=504767

  • Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79, 101–139.

    Google Scholar 

  • Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford Law Books.

    Google Scholar 

  • Ramirez, E. (2014). Protecting consumer privacy in the big data age. Washington, DC: Federal Trade Commission.

    Google Scholar 

  • Safire, W. (2002, November 14). You are a suspect. New York Times. Online.

    Google Scholar 

  • Simon, S. (2014, May 15). Data mining your children. Politico. Online.

    Google Scholar 

  • Simons, B., & Spafford, E. H. (2003, January 23). Co-chairs, US ACM Policy Committee, Association for Computing Machinery, Letter to Honorable John Warner, Chairman, Senate Committee on Armed Forces.

    Google Scholar 

  • Singer, N. (2014, April 21). InBloom student data repository to close. New York Times. Online.

    Google Scholar 

  • Solove, D. J. (2008). Understanding privacy. Boston: Harvard University Press.

    Google Scholar 

  • Stanley, J., & Steinhardt, B. (2003). Bigger monster, weaker chains: The growth of an American Surveillance Society. American Civil Liberties Union, Technology and Liberty Program. Retrieved 2014, November 4, from https://www.aclu.org/technology-and-liberty/bigger-monster-weaker-chains-growth-american-surveillance-society

  • Stoové, M. A., & Pedrana, A. E. (2014). Making the most of a brave new world: Opportunities and considerations for using Twitter as a public health monitoring tool. Preventive Medicine, 63, 109–111.

    Article  Google Scholar 

  • Sullivan, G. (2014, July 3). Sheryl Sandberg not sorry for Facebook mood manipulation study. Washington Post. Online.

    Google Scholar 

  • Tavani, H. (2008). Informational privacy: Concepts, theories, and controversies. In K. E. Himma & H. Tavani (Eds.), The handbook of information and computer ethics (pp. 131–164). Hoboken, NJ: Wiley.

    Chapter  Google Scholar 

  • Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5, 199–210.

    Article  Google Scholar 

  • Wittgenstein, L. (2001). Philosophical investigations. The German text, with a revised English translation (3rd ed., pp. 27–28). Malden, MA: Blackwell.

    Google Scholar 

  • Washington Post (2002, November 16). Total information awareness. Washington Post, Saturday.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Steinmann .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Steinmann, M. et al. (2015). Embedding Privacy and Ethical Values in Big Data Technology. In: Matei, S., Russell, M., Bertino, E. (eds) Transparency in Social Media. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-18552-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18552-1_15

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18551-4

  • Online ISBN: 978-3-319-18552-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics