This learning experience helps students gain experience and proficiency with issues regarding the ethical collection and use of data. Students will gain an appreciation for the risks associated with record-level identification, where data attributes, however innocently collected, can and have been used to violate privacy and lead to discrimination against individuals and protected classes of individuals.
Educational-resources Downloads
This zip contains the supplemental materials for this article.
- Darrow, J. & Lichtenstein, S. (2008). Do You Really Need My Social Security Number - Data Collection Practices in the Digital Age, 10 N.C. J.L. & Tech. 1. Available at: https://scholarship.law.unc.edu/ncjolt/vol10/iss1/2Google Scholar
- Hunt, D. B,2005. Redlining, Encyclopedia of Chicago, http://www.encyclopedia.chicagohistory.org/pages/1050.htmlGoogle Scholar
- Bopp, C., Benjamin, L. M., & Voida, A. (2019). The coerciveness of the primary key: Infrastructure problems in human services work. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW), 1--26.Google ScholarDigital Library
- Clark, J., Cormack, L., & Wang, S. (2021). Privacy Concerns in New York City Elections. Technical Report, Princeton University.Google Scholar
- Young, C., Martin, D., & Skinner, C. (2009). Geographically intelligent disclosure control for flexible aggregation of census data. International Journal of Geographical Information Science, 23(4), 457--482.Google ScholarDigital Library
- Tschantz, M. C., (2022). What is Proxy Discrimination? In 2022 ACM Conference on Fairness, Accountability, and Transparency (FAccT '22). Association for Computing Machinery, New York, NY, USA, 1993--2003. Google ScholarDigital Library
- Egenhofer, M., and Dube, M. 2009. Topological Relations from Metric Refinements. Proceedings of the 17th ACM SIGSPATIAL 2009, 158--167.Google Scholar
- Dube, M., Barrett, J., and Egenhofer, M. 2015. From Metric to Topology: Determining Relations in Discrete Space. Proceedings of the 2015 International Conference on Spatial Information Theory, 151--171.Google Scholar
- Colloff, M. F., Wade, K. A., & Strange, D. (2016). Unfair lineups make witnesses more likely to confuse innocent and guilty suspects. Psychological Science, 27(9), 1227--1239.Google ScholarCross Ref
- Steblay, N. K., & Wells, G. L. (2020). Assessment of bias in police lineups. Psychology, Public Policy, and Law, 26(4), 393--412. Google ScholarCross Ref
- Longfield, J (2009). Discrepant Teaching Events: Using an Inquiry Stance to Address Students' Misconceptions. International Journal of Teaching and Learning in Higher Education, v21 n2 p266--271.Google Scholar
- Kapil, G., Agrawal, A., & Khan, R. A. (2016, October). A study of big data characteristics. In 2016 International Conference on Communication and Electronics Systems (ICCES) (pp. 1--4). IEEE.Google ScholarCross Ref
- Denning, D. E., Akl, S. G., Heckman, M., Lunt, T. F., Morgenstern, M., Neumann, P. G., & Schell, R. R. (1987). Views for multilevel database security. IEEE Transactions on Software Engineering, (2), 129--140.Google ScholarDigital Library
- De Groot, J. (2022). The History of Data Breaches [Online]. Available: https://www.digitalguardian.com/blog/history-data-breaches.Google Scholar
- Throne, R. (2022). Adverse Trends in Data Ethics: The AI Bill of Rights and Human Subjects Protections. Available at SSRN: https://ssrn.com/abstract=4279922 or Google ScholarCross Ref
- Angwin, Larson, Mattu, Kirchner (2016). Machine Bias, ProPublica. https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencingGoogle Scholar
- Mangasarian, O., Street W., and Wolberg, W. 1995. Breast cancer diagnosis and prognosis via linear programming. Operations research 43.4, 570--577.Google Scholar
Index Terms
- Identification: A Teaching Moment for Privacy and Databases
Recommendations
The cost of privacy: destruction of data-mining utility in anonymized data publishing
KDD '08: Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data miningRe-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "quasi-identifier" attributes such as ZIP code and birthdate. Their objective is ...
Covert channels in privacy-preserving identification systems
CCS '07: Proceedings of the 14th ACM conference on Computer and communications securityWe examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags) are increasingly commonplace in hospitals and many other environments. ...
Pricing and disseminating customer data with privacy awareness
Organizations today regularly share their customer data with their partners to gain competitive advantages. They are also often requested or even required by a third party to provide customer data that are deemed sensitive. In these circumstances, ...