Roger Clarke's Web-Site

© Xamax Consultancy Pty Ltd,  1995-2024
Photo of Roger Clarke

Roger Clarke's 'Data Ethics and Protection'

ANU COMP2420 / COMP6420 - Introduction to Data Management, Analysis and Security
Topic Outline

Roger Clarke **

Version of 4 May 2021

© Xamax Consultancy Pty Ltd, 2020-21

Available under an AEShareNet Free
for Education licence or a Creative Commons 'Some
Rights Reserved' licence.

This document is at http://www.rogerclarke.com/DV/DEDP-21.html


Introduction

This 2-hour segment addresses important issues arising from data analysis. It comprises two lectures, delivered at two different stages of the semester-unit:


The Examinable Materials

The examinable materials comprise the following:

The Further Reading is not examinable. It's provided in order to enable you to 'drill down' on topics you're particularly interested in, or need to understand more about.


Lecture Outlines
Lecture 1: IT and Data Ethics

Week 6 - Wed 31 Mar 10:00-11:30 - Online

The slides are available in PDF for viewing, and PDF-4up for printing

The video-presentation is available in mp4 format

TOPIC OUTLINE

1. Introduction

2. Ethics in Data Science / Data Analysis

3. Applied Ethics


REQUIRED READING

The Power of IT

s.4.1 Information Infrastructure, at http://www.rogerclarke.com/II/IIC18.html#II18

Ethics

The Introduction section to 'Ethics', International Encyclopaedia of Philosophy, at https://www.iep.utm.edu/ethics/

Codes of Ethics

Australian Computer Society (ACS), at http://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf

Ethical Issues in Data Science

s.4.2 Data Harm, at http://www.rogerclarke.com/II/DRC.html#GH

Case Studies

Centrelink's Big Data 'Robo-Debt' Fiasco of 2016-20, at http://www.rogerclarke.com/DV/CRD17.html

s.2.5 Data Scrubbing, at http://www.rogerclarke.com/EC/BDQAS.html#ChDS

s.2.7 Decision Transparency (2016), at http://www.rogerclarke.com/EC/BDQAS.html#ChDS

Guidelines for Data Analytics

Guidelines for the responsible application of data analytics (2018), at http://www.rogerclarke.com/EC/GDA-Tab2E.pdf


FURTHER READING

The Power of IT

What Drones Inherit from Their Ancestors, at http://www.rogerclarke.com/SOS/Drones-I.html

Cyborgs Today (2017), at http://www.rogerclarke.com/SOS/Cyborgs17.html

Ethics

The remainder of 'Ethics', International Encyclopaedia of Philosophy, at https://www.iep.utm.edu/ethics/

Kinch N. (2019) 'Data Ethics in tech; Here's why it's so hard' Medium, 4 Jan 2019, at https://medium.com/greater-than-experience-design/data-ethics-in-tech-heres-why-it-s-so-hard-b3e0d8f0a108

Persons-at-Risk

s.4.3 Market Segmentation for Privacy-Enhancing Technologies (PETs), at http://www.rogerclarke.com/DV/UPETs-1405.html#MS

s.4.4 Risk Assessment for Whistleblowers, at http://www.rogerclarke.com/DV/UPETs-1405.html#RA

Codes of Ethics

Association for Computing Machinery (ACM), at https://www.acm.org/code-of-ethics

IEEE, at https://www.ieee.org/about/corporate/governance/p7-8.html

Engineers Australia, at https://www.engineersaustralia.org.au/sites/default/files/resource-files/2020-02/828145%20Code%20of%20Ethics%202020%20D.pdf

Ethical Issues in Data Science

Data Values harmed by Data Analytics (2016), at http://www.rogerclarke.com/EC/PBAR.html#Tab4

Big Data, Big Risks (2016), at http://www.rogerclarke.com/EC/BDBR.html

Case Studies

Doctorow C. (2017) 'Australia put an algorithm in charge of its benefits fraud detection and plunged the nation into chaos' BoingBoing, 1 Feb 2018, at https://boingboing.net/2018/02/01/dole-bludgers-under-beds.html

Cossins D. (2018) 'Discriminating algorithms: 5 times AI showed prejudice' New Scientist, 12 April 2018, at https://www.newscientist.com/article/2166207-discriminating-algorithms-5-times-ai-showed-prejudice/#ixzz6oZVXfgpw

s.2.2 The Rationale Underlying a Decision (2014), at http://www.rogerclarke.com/SOS/Drones-I.html#CRD

s.4 The Digital Surveillance Economy, at http://www.rogerclarke.com/EC/DSE.html#DSE

Codes for Data Analytics

'Data Science Association Code Of Professional Conduct' (2016), at http://www.datascienceassn.org/sites/default/files/datasciencecodeofprofessionalconduct.pdf

'American Statistical Association Ethical Guidelines for Statistical Practice' (2016), at https://www.amstat.org/ASA/Your-Career/Ethical-Guidelines-for-Statistical-Practice.aspx

Guidelines for Data Analytics

Article on 'Guidelines for the Responsible Application of Data Analytics' (2018), at http://www.rogerclarke.com/EC/GDA.html

Business Processes

'Towards Responsible Data Analytics: A Process Approach' (2019), at http://www.rogerclarke.com/EC/BDBP.html

Anonymisation / De-Identification

s.3, at http://www.rogerclarke.com/DV/RFED.html#DId


Lecture 1 - DISCUSSION QUESTIONS

Slide 5: Some Ethical Issues

How does IT generally, and Data Analytics in particular, contribute to:

  1. Climate change
  2. The political impacts of location and tracking
  3. Unfair discrimination against lower economic demographics
  4. Continuous disruption of organisations and occupations
  5. The casualisation of labour

Slide 11: Ethical Issues in Data Science

What are your expectations about the results you are awarded by the ANU for the courses you do? In particular, what do you think about the ideas of:

  1. Transparency of decision-rationale
  2. Automated decision-making
  3. Due process / procedural fairness

Slide 14: Case Study #1 - Robodebt

What ethical issues arise from the Robo-Debt case?

Surely Centrelink should have discovered in advance that the design of the new system was highly unreasonable. But how should they have discovered that?

Slides 21-26: Case Study #5 - The Digital Surveillance Economy

Companies that you deal with on the Web do the following things, in order to maximise their revenue or profit. As a shareholder, are you happy that they do these things? As a consumer, are you happy that they do these things?

  1. They gather a lot of data about you
  2. They share that data with many other companies
  3. They use that data to categorise you
  4. They apply ad targeting, i.e. select ads to display to you that appear most likely to influence your purchasing decisions
  5. They make offers to you at the highest price your profile suggests you're prepared to pay

Lecture 2: Data Protection & Data Privacy

Week 10 - Wed 12 May 10:00-11:30 - Online

The slides are available in PDF for viewing, and PDF-4up for printing

The video-presentation is available in mp4 format

TOPIC OUTLINE

  1. Introduction
  2. Data Security
  3. Privacy
  4. Data Privacy
  5. Safeguards

REQUIRED READING

Data and Information

Fundamentals of Information Systems, at http://www.rogerclarke.com/SOS/ISFundas.html

Knowledge, at http://www.rogerclarke.com/SOS/Know.html

Data Quality and Information Quality Factors, at http://www.rogerclarke.com/EC/BDBR.html#Tab1

The Conventional Security Model

Appendix 1, at http://www.rogerclarke.com/EC/SSACS.html#App1

Privacy

Introduction to Privacy, at http://www.rogerclarke.com/DV/Intro.html

Persons-at-Risk

Categories of Persons-at-Risk, at http://www.rogerclarke.com/DV/UPETs-1405.html#MS

Privacy Law

The Australian Privacy Principles (APPs), at https://www.oaic.gov.au/privacy/australian-privacy-principles/australian-privacy-principles-quick-reference/

(Make sure you understand what each Principle is about. Where what's on that page isn't clear enough, dive down into the links provided).

The Notifiable Data Breaches scheme, at https://www.oaic.gov.au/privacy/notifiable-data-breaches/about-the-notifiable-data-breaches-scheme/

Privacy-Enhancing Technologies

Categories of PETs, at http://www.rogerclarke.com/DV/Biel15-DuD.html#P

'Privacy in a pandemic: Keep calm, and remember first principles' (Johnston, 2020), at https://www.salingerprivacy.com.au/2020/03/31/privacy-in-a-pandemic/


FURTHER READING

The Conventional Security Model

User-Friendly Security Solutions, ss.3 and 3.1 and Table 1, at http://www.rogerclarke.com/EC/SSACS.html#SS

Appendix 2: Baseline Security Features, at http://www.rogerclarke.com/EC/SSACS.html#App2

Data Values harmed by Data Analytics (2016), at http://www.rogerclarke.com/EC/PBAR.html#Tab4

Privacy

'What's Privacy?', at http://www.rogerclarke.com/DV/Privacy.html

The EU's General Data Protection Regulation

'What is the GDPR?', at https://gdpr.eu/what-is-gdpr/

(Compare the European Principles with the Australian Privacy Principles, and work out which offer better privacy protections).

Privacy-Enhancing Technologies

'Introducing PITs and PETs: Technologies Affecting Privacy', at http://www.rogerclarke.com/DV/PITsPETs.html


Lecture 2 - DISCUSSION QUESTIONS

Slides 3-4: Data and Information

Think about what you're learning in this unit, COMP2420/6420. Now give some examples from this unit of data, information, knowledge and wisdom.

Slides 5-6: Data and Information Quality

The ANU gathers data about your performance in this unit of study. It makes most of it available to you. It publishes some of it on your transcript. Various people will use that data for various purposes.

Consider each of the 7 data quality and 6 information quality factors, and give examples of good quality and bad quality data and information about your performance.

Slides 8-15: The Conventional Security Model

Apply the concepts of threat, vulnerability, security incident, harm, asset, stakeholder and safeguard to a day-care centre that looks after children under 5 years of age while their parents are at work.

Apply the concepts of threat, vulnerability, security incident, harm, asset, stakeholder and safeguard to the personal data that the ANU holds about you.

Slides 17-19: Privacy Needs, Harm, and Risk Categories

What kinds of data are most likely to be privacy-sensitive for:

Identify a couple of examples of privacy concerns that you have. (If you don't think you have any, use examples of concerns your friends or relatives have).

Which needs, harms and risk categories are relevant to those privacy concerns?

What circumstances might arise that would increase the levels of concern that people feel about those particular privacy issues?

Slide 23: The Lifecycle of Personal Data

Why is it likely that Disclosure of Personal Data may be subject to even more risks than Use of Personal Data?

Do any privacy concerns arise in relation to the Access and Correction rights that each of us has (in Australia under Australian Privacy Principles 12 and 13)?

Slides 25-28: Privacy Protections

In relation to the privacy concerns you've just discussed, to what extent do you think that the law provides adequate protections?

Slides 29-38: Privacy-Enhancing Technologies

What PETs do you use?

What extra PETs should people use who face more serious risks than you do?


Author Affiliations

Roger Clarke is Principal of Xamax Consultancy Pty Ltd, Canberra. He is also a Visiting Professor in the Research School of Computer Science at the Australian National University,, and in the Cyberspace Law & Policy Centre at the University of N.S.W.



xamaxsmall.gif missing
The content and infrastructure for these community service pages are provided by Roger Clarke through his consultancy company, Xamax.

From the site's beginnings in August 1994 until February 2009, the infrastructure was provided by the Australian National University. During that time, the site accumulated close to 30 million hits. It passed 65 million in early 2021.

Sponsored by the Gallery, Bunhybee Grasslands, the extended Clarke Family, Knights of the Spatchcock and their drummer
Xamax Consultancy Pty Ltd
ACN: 002 360 456
78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Tel: +61 2 6288 6916

Created: 9 March 2020 - Last Amended: 4 May 2021 by Roger Clarke - Site Last Verified: 15 February 2009
This document is at www.rogerclarke.com/DV/DEDP-21.html
Mail to Webmaster   -    © Xamax Consultancy Pty Ltd, 1995-2022   -    Privacy Policy