Abstract
Data mining has captured the imagination as a tool which could potentially close the intelligence gap constantly deepening between governments and their new targets – terrorists and sophisticated criminals. It should therefore come as no surprise that data mining initiatives are popping up throughout the regulatory framework. The visceral feeling of many in response to the growing use of governmental data mining of personal data is that such practices are extremely problematic. Yet, framing the notions behind the visceral response in the form of legal theory is a difficult task.
This chapter strives to advance the theoretical discussion regarding the proper understanding of the problems data mining practices generate. It does so within the confines of privacy law and interests, which many sense are utterly compromised by the governmental data mining practices. Within this broader theoretical realm, the chapter focuses on examining the relevance of a related legal paradigm in privacy law – that of governmental searches. Data mining, the chapter explains, compromises some of same interests compromised by illegal governmental searches. Yet it does so in a unique and novel way. This chapter introduces three analytical paths for extending the well accepted notion of illegal searches into this novel setting. It also points to the important intricacies every path entails and the difficulties of applying the notion of search to this novel setting. Finally, the chapter briefly explains the policy implications of every theory. Indeed, the manner in which data mining practices are conceptualized directly effects the possible solutions which might be set in place to limit related concerns.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Cate, F.H.: Government, data mining: The need for a legal framework. Harvard Civil Rights-Civil Liberties Law Review 43(2), 435–489 (2008)
Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery: An overview. In: Fayyad, U., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R. (eds.) Advances in Knowledge Discovery and Data Mining. AAAI/MIT Press, Cambridge, Mass. (1996)
Henderson, S.: Nothing new under the sun?: A technologically rational doctrine of fourth amendment search. Mercer Law Review 56, 507–563, 544 (2005)
Jonas, J., Harper, J.: Effective counterterrorism and the limited role of predictive data mining. CATO Institute Policy Analysis 584, 1–12 (2006)
Kerr, O.: Four models of fourth amendment protection. Stanford Law Review 60, 503 (2007)
Kerr, O.: Applying the fourth amendment to the internet: a general approach. Stanford Law Review 62, 1005 (2010)
Schneier, B.: Why data mining won’t stop terror. Wired (September 3, 2006), http://www.wired.com/politics/security/commentary/securitymatters/2006/03/70357?currentPage=all (accessed December 30, 2011)
Slobogin, C., Schumacher, J.E.: Reasonable expectations of privacy and autonomy in fourth amendment cases: An empirical look at “understandings recognized and permitted by society.” Duke Law Journal 42(4), 727–775, 743–751 (1993)
Slobogin, C.: Privacy at risk: The new government surveillance and the fourth amendment, p. 194. The University of Chicago Press, Chicago and London (2007)
Solove, D.J.: Digital dossiers and the dissipation of fourth amendment privacy. Southern California Law Review 75, 1083–1167, 1106–1107 (2002)
Solove, D.J.: Data mining and the security-liberty debate. University of Chicago Law Review 74, 343–362 (2008)
Solove, D.J.: Fourth amendment pragmatism. Boston College Law Review 51, 1511–1538, 1522-1524 (2010)
Taipale, K.: Technology, security and privacy: The fear of frankenstein, the mythology of privacy, and the lessons of king ludd. Yale Journal of Law and Technology 7, 123–221, 134 (2004)
Tokson, M.: Automation and the fourth amendment. Iowa Law Review 96, 581–647, 602–609 (2011)
United States General Accounting Office. Data Mining: Federal Efforts over a Wide Range of Uses GAO-04-548, 1–64 (2004), http://www.gao.gov/new.items/d04548.pdf (accessed December 30, 2011)
Zarsky, T.Z.: Mine your own business!: Making the case for the implications of the data mining of personal information in the forum of public opinion. Yale Journal of Law & Technology 5, 1–56 (2002-2003)
Zarsky, T.Z.: Governmental data mining and its alternatives. Penn State Law Review 116(2), 285–330 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Zarsky, T. (2013). Data Mining as Search: Theoretical Insights and Policy Responses. In: Custers, B., Calders, T., Schermer, B., Zarsky, T. (eds) Discrimination and Privacy in the Information Society. Studies in Applied Philosophy, Epistemology and Rational Ethics, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30487-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-30487-3_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30486-6
Online ISBN: 978-3-642-30487-3
eBook Packages: EngineeringEngineering (R0)