Roger Clarke's Web-Site© Xamax Consultancy Pty Ltd, 1995-2024 |
||||||
HOME | eBusiness |
Information Infrastructure |
Dataveillance & Privacy |
Identity Matters | Other Topics | |
What's New |
Waltzing Matilda | Advanced Site-Search |
Version of 4 May 2021
© Xamax Consultancy Pty Ltd, 2020-21
Available under an AEShareNet licence or a Creative Commons licence.
This document is at http://www.rogerclarke.com/DV/DEDP-21.html
This 2-hour segment addresses important issues arising from data analysis. It comprises two lectures, delivered at two different stages of the semester-unit:
The examinable materials comprise the following:
The Further Reading is not examinable. It's provided in order to enable you to 'drill down' on topics you're particularly interested in, or need to understand more about.
Week 6 - Wed 31 Mar 10:00-11:30 - Online
The slides are available in PDF for viewing, and PDF-4up for printing
The video-presentation is available in mp4 format
TOPIC OUTLINE
1. Introduction
2. Ethics in Data Science / Data Analysis
3. Applied Ethics
s.4.1 Information Infrastructure, at http://www.rogerclarke.com/II/IIC18.html#II18
The Introduction section to 'Ethics', International Encyclopaedia of Philosophy, at https://www.iep.utm.edu/ethics/
Australian Computer Society (ACS), at http://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf
s.4.2 Data Harm, at http://www.rogerclarke.com/II/DRC.html#GH
Centrelink's Big Data 'Robo-Debt' Fiasco of 2016-20, at http://www.rogerclarke.com/DV/CRD17.html
s.2.5 Data Scrubbing, at http://www.rogerclarke.com/EC/BDQAS.html#ChDS
s.2.7 Decision Transparency (2016), at http://www.rogerclarke.com/EC/BDQAS.html#ChDS
Guidelines for the responsible application of data analytics (2018), at http://www.rogerclarke.com/EC/GDA-Tab2E.pdf
What Drones Inherit from Their Ancestors, at http://www.rogerclarke.com/SOS/Drones-I.html
Cyborgs Today (2017), at http://www.rogerclarke.com/SOS/Cyborgs17.html
The remainder of 'Ethics', International Encyclopaedia of Philosophy, at https://www.iep.utm.edu/ethics/
Kinch N. (2019) 'Data Ethics in tech; Here's why it's so hard' Medium, 4 Jan 2019, at https://medium.com/greater-than-experience-design/data-ethics-in-tech-heres-why-it-s-so-hard-b3e0d8f0a108
s.4.3 Market Segmentation for Privacy-Enhancing Technologies (PETs), at http://www.rogerclarke.com/DV/UPETs-1405.html#MS
s.4.4 Risk Assessment for Whistleblowers, at http://www.rogerclarke.com/DV/UPETs-1405.html#RA
Association for Computing Machinery (ACM), at https://www.acm.org/code-of-ethics
IEEE, at https://www.ieee.org/about/corporate/governance/p7-8.html
Engineers Australia, at https://www.engineersaustralia.org.au/sites/default/files/resource-files/2020-02/828145%20Code%20of%20Ethics%202020%20D.pdf
Data Values harmed by Data Analytics (2016), at http://www.rogerclarke.com/EC/PBAR.html#Tab4
Big Data, Big Risks (2016), at http://www.rogerclarke.com/EC/BDBR.html
Doctorow C. (2017) 'Australia put an algorithm in charge of its benefits fraud detection and plunged the nation into chaos' BoingBoing, 1 Feb 2018, at https://boingboing.net/2018/02/01/dole-bludgers-under-beds.html
Cossins D. (2018) 'Discriminating algorithms: 5 times AI showed prejudice' New Scientist, 12 April 2018, at https://www.newscientist.com/article/2166207-discriminating-algorithms-5-times-ai-showed-prejudice/#ixzz6oZVXfgpw
s.2.2 The Rationale Underlying a Decision (2014), at http://www.rogerclarke.com/SOS/Drones-I.html#CRD
s.4 The Digital Surveillance Economy, at http://www.rogerclarke.com/EC/DSE.html#DSE
'Data Science Association Code Of Professional Conduct' (2016), at http://www.datascienceassn.org/sites/default/files/datasciencecodeofprofessionalconduct.pdf
'American Statistical Association Ethical Guidelines for Statistical Practice' (2016), at https://www.amstat.org/ASA/Your-Career/Ethical-Guidelines-for-Statistical-Practice.aspx
Article on 'Guidelines for the Responsible Application of Data Analytics' (2018), at http://www.rogerclarke.com/EC/GDA.html
'Towards Responsible Data Analytics: A Process Approach' (2019), at http://www.rogerclarke.com/EC/BDBP.html
s.3, at http://www.rogerclarke.com/DV/RFED.html#DId
Lecture 1 - DISCUSSION QUESTIONS
How does IT generally, and Data Analytics in particular, contribute to:
What are your expectations about the results you are awarded by the ANU for the courses you do? In particular, what do you think about the ideas of:
What ethical issues arise from the Robo-Debt case?
Surely Centrelink should have discovered in advance that the design of the new system was highly unreasonable. But how should they have discovered that?
Companies that you deal with on the Web do the following things, in order to maximise their revenue or profit. As a shareholder, are you happy that they do these things? As a consumer, are you happy that they do these things?
Week 10 - Wed 12 May 10:00-11:30 - Online
The slides are available in PDF for viewing, and PDF-4up for printing
The video-presentation is available in mp4 format
TOPIC OUTLINE
Data and Information
Fundamentals of Information Systems, at http://www.rogerclarke.com/SOS/ISFundas.html
Knowledge, at http://www.rogerclarke.com/SOS/Know.html
Data Quality and Information Quality Factors, at http://www.rogerclarke.com/EC/BDBR.html#Tab1
Appendix 1, at http://www.rogerclarke.com/EC/SSACS.html#App1
Privacy
Introduction to Privacy, at http://www.rogerclarke.com/DV/Intro.html
Persons-at-Risk
Categories of Persons-at-Risk, at http://www.rogerclarke.com/DV/UPETs-1405.html#MS
The Australian Privacy Principles (APPs), at https://www.oaic.gov.au/privacy/australian-privacy-principles/australian-privacy-principles-quick-reference/
(Make sure you understand what each Principle is about. Where what's on that page isn't clear enough, dive down into the links provided).
The Notifiable Data Breaches scheme, at https://www.oaic.gov.au/privacy/notifiable-data-breaches/about-the-notifiable-data-breaches-scheme/
Privacy-Enhancing Technologies
Categories of PETs, at http://www.rogerclarke.com/DV/Biel15-DuD.html#P
'Privacy in a pandemic: Keep calm, and remember first principles' (Johnston, 2020), at https://www.salingerprivacy.com.au/2020/03/31/privacy-in-a-pandemic/
User-Friendly Security Solutions, ss.3 and 3.1 and Table 1, at http://www.rogerclarke.com/EC/SSACS.html#SS
Appendix 2: Baseline Security Features, at http://www.rogerclarke.com/EC/SSACS.html#App2
Data Values harmed by Data Analytics (2016), at http://www.rogerclarke.com/EC/PBAR.html#Tab4
Privacy
'What's Privacy?', at http://www.rogerclarke.com/DV/Privacy.html
The EU's General Data Protection Regulation
'What is the GDPR?', at https://gdpr.eu/what-is-gdpr/
(Compare the European Principles with the Australian Privacy Principles, and work out which offer better privacy protections).
Privacy-Enhancing Technologies
'Introducing PITs and PETs: Technologies Affecting Privacy', at http://www.rogerclarke.com/DV/PITsPETs.html
Lecture 2 - DISCUSSION QUESTIONS
Think about what you're learning in this unit, COMP2420/6420. Now give some examples from this unit of data, information, knowledge and wisdom.
The ANU gathers data about your performance in this unit of study. It makes most of it available to you. It publishes some of it on your transcript. Various people will use that data for various purposes.
Consider each of the 7 data quality and 6 information quality factors, and give examples of good quality and bad quality data and information about your performance.
Apply the concepts of threat, vulnerability, security incident, harm, asset, stakeholder and safeguard to a day-care centre that looks after children under 5 years of age while their parents are at work.
Apply the concepts of threat, vulnerability, security incident, harm, asset, stakeholder and safeguard to the personal data that the ANU holds about you.
What kinds of data are most likely to be privacy-sensitive for:
Identify a couple of examples of privacy concerns that you have. (If you don't think you have any, use examples of concerns your friends or relatives have).
Which needs, harms and risk categories are relevant to those privacy concerns?
What circumstances might arise that would increase the levels of concern that people feel about those particular privacy issues?
Why is it likely that Disclosure of Personal Data may be subject to even more risks than Use of Personal Data?
Do any privacy concerns arise in relation to the Access and Correction rights that each of us has (in Australia under Australian Privacy Principles 12 and 13)?
In relation to the privacy concerns you've just discussed, to what extent do you think that the law provides adequate protections?
What PETs do you use?
What extra PETs should people use who face more serious risks than you do?
Roger Clarke is Principal of Xamax Consultancy Pty Ltd, Canberra. He is also a Visiting Professor in the Research School of Computer Science at the Australian National University,, and in the Cyberspace Law & Policy Centre at the University of N.S.W.
Personalia |
Photographs Presentations Videos |
Access Statistics |
The content and infrastructure for these community service pages are provided by Roger Clarke through his consultancy company, Xamax. From the site's beginnings in August 1994 until February 2009, the infrastructure was provided by the Australian National University. During that time, the site accumulated close to 30 million hits. It passed 75 million in late 2024. Sponsored by the Gallery, Bunhybee Grasslands, the extended Clarke Family, Knights of the Spatchcock and their drummer |
Xamax Consultancy Pty Ltd ACN: 002 360 456 78 Sidaway St, Chapman ACT 2611 AUSTRALIA Tel: +61 2 6288 6916 |
Created: 9 March 2020 - Last Amended: 4 May 2021 by Roger Clarke - Site Last Verified: 15 February 2009
This document is at www.rogerclarke.com/DV/DEDP-21.html
Mail to Webmaster - © Xamax Consultancy Pty Ltd, 1995-2024 - Privacy Policy