Data Mining and Its Paradoxical Relationship to the Purpose Limitation Principle

作者: Liana Colonna

DOI: 10.1007/978-94-007-7540-4_14

关键词:

摘要: European Union data protection law aims to protect individuals from privacy intrusions through a myriad of procedural tools that reflect code fair information principles. These empower the individual by giving him/her rights control processing his/her data. One problems, however, with Union’s current reliance on principles is these are increasingly challenged technological reality. And, perhaps nowhere this more evident than when it comes mining, which puts ultimate test. As early as 1998, commentators have noted there quite paradoxical relation between mining and some principles.This paper seeks explore so-called relationship further specifically examine how calls into question purpose limitation principle. Particular attention will be paid defies principle in way analysis recent past do not.

参考文章(58)
Colin J Bennett, In Defense of Privacy: The Concept and the Regime surveillance and society. ,vol. 8, pp. 485- 496 ,(2011) , 10.24908/SS.V8I4.4184
M. Hanumanthappa, B. R. Prakash, Manish Kumar, Applications of Data Mining in e-Governance: A Case Study of Bhoomi Project Lecture Notes in Computer Science. pp. 208- 218 ,(2012) , 10.1007/978-3-642-27872-3_31
Paul Rosenzweig, Privacy and Counter-Terrorism: The Pervasiveness of Data Social Science Research Network. ,(2010)
Jonathan Steele, Data Protection: An Opening Door? The Liverpool Law Review. ,vol. 24, pp. 19- 39 ,(2002) , 10.1023/A:1021379613748
Michael Lloyd-Williams, Discovering the Hidden Secrets in Your Data - the Data Mining Approach to Information. Information Research. ,vol. 3, ,(1997)
Bart Custers, Data Dilemmas in the Information Society: Introduction and Overview Studies in Applied Philosophy, Epistemology and Rational Ethics. pp. 3- 26 ,(2013) , 10.1007/978-3-642-30487-3_1
James H. Moor, The ethics of privacy protection Library Trends. ,vol. 39, pp. 69- 82 ,(1990)
David Wright, Paul De Hert, None, Introduction to Privacy Impact Assessment Springer, Dordrecht. pp. 3- 32 ,(2012) , 10.1007/978-94-007-2543-0_1