You are on page 1of 9

College of Business and Economics

Department of Management Information System


Course title data science
Course code
Group project. Group 2
Name. ID
1. Chala merga.....................................3208
2. Ismael Mudasir................................
3. Lalisa Girma ....................................
4. Hirut Kefelegn..................................
5. Fraol Worku......................................
6. Adinan yasin..................................
chapter 6
Introduction PRIVACY and ETHICS of Data Science

 The biggest unknown facing data science today is how societies will
choose to answer a new version of the old question regarding how
best to balance the freedoms and privacy of individuals and
minorities against the security and interests of society.
 The promise of data science is that it provides a way to understand
the world through data.
 In the current
6.1. Commercial Interests versus
Individual Privacy
 Data science can be framed as making the world a more prosperous
and secure place to live.
6.2 Ethical Implications of Data
Science
6.2.1 Profiling and Discrimination
 The story about Target identifying a pregnant
high school student without her consent or
knowledge highlights how data science can be
used for social profiling not only of individuals
but also of minority groups in society.
 These profiles are constructed by integrating
data from a number of different noisy and
partial data sources, so the profiles can often be
misleading about an individual.
6.2.2 Creating a Panopticon
 If you spend time absorbing some of the commercial boosterism
that surrounds data science, you get a sense that any problem can
be solved using data science technology given enough of the right
data.
 When this argument is accepted, two processes are often
intensified.
 This marketing of the power of data science feeds into a view that a
data-driven approach to governance is the best way to address
complex social problems, such as crime, poverty, poor education,
and poor public health:
 all we need to do to solve these
6.3 Computational Approaches to
Preserving Privacy
 Differential privacy uses
Reference

1. The EU Privacy and Electronic Communications Directive


(2002/58/EC).
2. For example, some expectant women explicitly tell retailers that they
are pregnant by registering for promotional new-mother programs at
the stores.
3. For more on PredPol, see http://www.predpol.com
End.

Thank you!!

You might also like