Privacy:

  • Is this an invasion of our privacy?
  • There is an understanding that a limiting factor of web mining is the privacy issues it raises, and the moral obligation to protect the privacy rights of the user whose data is used

Verghese et al (2010)

 

  • Van Wel and Royakkers take an informal approach to the topic, looking at informational privacy and our ability to protect this information
  • Threats to this sort of privacy often stem from web data mining

Van Wel and Royakkers (2004)

 

  • Velasquez identifies the debate over the definition of private information
  • A further debate discusses weather or not a persons IP address constitutes personal information
  • Identifies that there is little consensus over the definition of personal information
  • Recognises that, nonetheless many web user sees web mining tools as a form of surveillance over them, particularly in the realm of Government mining

Velasquez (2013)

 

  • Twitter ‘tweets,’ along with other social media posts could be used in creating a personal profile
  • Immediately our privacy and personal information is at risk of exploitation, be it moral or immoral

Mckee (2011)

 

Consent:

  • Are we able to give consent to our data being stored and used?
  • Do we even know what data is being stored and when it is being recorded?
  • Could it be argued that we consent to our data being stored by accessing the site in the first place, but again how are we too know?
  • Do the recent cookie laws support this argument even further?

Information Commissioner's Office (2015)

 

 Information Usage:

  • How do we know what our data is being used for and do we have control over this?

 

  • McKee believes that our online presence is almost certainly being used in ways beyond our control
  • Cites big firms terminology:
    • Google – ‘interest based ads’
    • Facebook – ‘Instant personalization’
  • Predicts that under current trends, our entire online presence on any digital platform will be mined and served with ‘personalised content’

McKee (2011)

 

What do we know?:

  • Advertisers can target their advertisements towards particular users
  • Online retailers can target their products towards those deemed most likely to buy
  • The government has the capacity to monitor our internet activity
  • However, it is what we don't know that poses the greatest issues

 

Data Safety:

  • How can we ensure our data is being kept safe, particularly if we don’t even know it has been taken?
  • Are firms obligated to protect the data they collect?
  • There are a number of infamous data breaches, such as the Sony PlayStation Network breach of 2011

Tech World (2015)

 

But is it all Bad?:

  • Are all the applications of the process negative?
  • Businesses can benefit in a number of ways, such as:

-         More targeted online marketing activities

-         Can help identify the more popular products or product style on e- commerce sites, allowing these areas to be developed

-         Companies can analyse the data they hold on their consumers to create a more effective online presence

 

  • This could in turn lead to greater sales and profits for the firms, which could indirectly impact the price consumers pay for their products

Web Data Mining.net (2015)

 

  • Governments can also benefit from an increased ability to fight crime and terrorism
  • For example the Director of the NSA has claimed that up to 50 different terror plots have claimed to be foiled as a result of web mining

abc News (2013)

 

  • The International Business Times reports on the disclosure of 4 different examples, including a plan to bomb the New York Stock Exchange and another plot to bomb a Danish newspaper office.

International Business Times (2013)