Database Data Mining: the Silent Invasion of Privacy

Topics: Privacy, Law, Privacy Act of 1974 Pages: 4 (1324 words) Published: May 4, 2013
Database Data Mining: The Silent Invasion of Privacy

Database Data Mining: The Silent Invasion of Privacy
Dustin Johnson
University of Maryland University College

As coined in an article in the St. Louis Post-Dispatch by Aisha Sultan, “Data is the new world currency.” Data mining is the process of analyzing data from different perspectives and then summarizing it into useful information. In essence is it applying all different types of what if scenarios on large swaths of data to get possible results to aid in better decision making. This sort of decision making isn’t something new, it’s the technology aiding the decision making that is new. This has reduced the amount of time it takes in the decision making process and given the decision makers more confidence in their decisions. Unfortunately with this technology personal privacy is no longer being kept private, since anything can be data mined. The reason for this is the vast data bases of information ranging from private companies to government agencies. Anyone who has access to that information can data mine it. My plan for this paper is to investigate if there is any government, non-governmental or private agency in charge of ensuring personal privacy is being kept by data mining companies. Bring to light who or what is ensuring that the analyzation of data is being used in an ethical manner. And finally highlight any national/international standards for data mining and what are the repercussions for violating those standards.

To start with let’s look at the government, non-governmental, or private agencies that are in charge of ensuring personal privacy is being kept private during the analyzation of data in the data mining process. There are quite a few agencies that have been designated officially or non-officially to protect the privacy of consumer data. One of the biggest is the Federal Trade Commission. The FTC’s main purpose according to its website is to, “prevent business practices that...

References: Danna, A., & Gandy Jr., O. H. (2002). All That Glitters is Not Gold: Digging Beneath the Surface of Data Mining. Journal Of Business Ethics, 40(4), 373-386
FTC. (2012, Aug 10). FTC Approves Final Settlement With Facebook. Retrieved from
FTC. (2012, Aug 09). Google Will Pay $22.5 Million to Settle FTC Charges it Misrepresented Privacy Assurances to Users of Apple 's Safari Internet Browser. Retrieved from
Payne, D., & Trumbach, C. (2009). Data mining: proprietary rights, people and proposals. Business Ethics: A European Review, 18(3), 241-252. doi:10.1111/j.1467-8608.2009.01560.x
Schermer, B. W. (2011). The limits of privacy in automated profiling and data mining. Computer Law & Security Review, 27(1), 45-52. doi:10.1016/j.clsr.2010.11.009
Sultan, Aisha. (2012, September 23). Digital data mining spurs efforts to curb use without permission. St. Louis Post-Dispatch. Retrieved from
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • data mining Essay
  • Invasion of privacy Essay
  • Invasion of Privacy Essay
  • Invasion of Privacy Essay
  • Data Mining The Mushroom Database Essay
  • Data mining Essay
  • Data Mining Essay
  • Privacy and Personal Data Essay

Become a StudyMode Member

Sign Up - It's Free