Welcome to the Machine: Privacy and Workplace Implications of Predictive Analytics

R. Sprague
{"title":"Welcome to the Machine: Privacy and Workplace Implications of Predictive Analytics","authors":"R. Sprague","doi":"10.2139/SSRN.2454818","DOIUrl":null,"url":null,"abstract":"Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing history of customers, but keeping track of communication dynamics and social interactions.Employers have long used various tools to monitor workers, whether to track productivity or guard against improper behavior in the workplace. But as individuals communicate and socialize more and more online, a whole new array of data is becoming available to employers to evaluate job candidates and monitor workers through predictive analytics. Current U.S. privacy law provides almost no protection from the type of “profile” that can be generated through predictive analytics, no matter how personal. It considers any information that is potentially publicly available to not be private — regardless of how that “public” information is collected and used. There is, however, one developing privacy theory that could potentially provide privacy protection from predictive analytics: the “mosaic” theory recognizes that continuous monitoring of publicly available information can reveal an intimate picture of an individual’s life.Predictive analytics have existed for some time, but have only recently “come of age” in employment situations. This article examines the use of predictive analytics in the workplace, threats to worker privacy arising from predictive analytics, and whether the mosaic theory offers a viable and needed method of privacy protection. This article concludes, however, that unless a new theory of privacy protection is adopted — and soon — everyone faces serious threats to their privacy.","PeriodicalId":297424,"journal":{"name":"Richmond Journal of Law and Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Richmond Journal of Law and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/SSRN.2454818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 24

Abstract

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing history of customers, but keeping track of communication dynamics and social interactions.Employers have long used various tools to monitor workers, whether to track productivity or guard against improper behavior in the workplace. But as individuals communicate and socialize more and more online, a whole new array of data is becoming available to employers to evaluate job candidates and monitor workers through predictive analytics. Current U.S. privacy law provides almost no protection from the type of “profile” that can be generated through predictive analytics, no matter how personal. It considers any information that is potentially publicly available to not be private — regardless of how that “public” information is collected and used. There is, however, one developing privacy theory that could potentially provide privacy protection from predictive analytics: the “mosaic” theory recognizes that continuous monitoring of publicly available information can reveal an intimate picture of an individual’s life.Predictive analytics have existed for some time, but have only recently “come of age” in employment situations. This article examines the use of predictive analytics in the workplace, threats to worker privacy arising from predictive analytics, and whether the mosaic theory offers a viable and needed method of privacy protection. This article concludes, however, that unless a new theory of privacy protection is adopted — and soon — everyone faces serious threats to their privacy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
欢迎来到机器:预测分析对隐私和工作场所的影响
预测分析使用一种称为数据挖掘的方法来识别数据之间的趋势、模式或关系,然后可以使用这些方法来开发预测模型。数据挖掘本身依赖于大数据,大数据之所以“大”,不仅仅是因为它的规模,还因为它的分析潜力在质量上是不同的。“大数据”分析允许包括政府和企业在内的组织组合不同的数字数据集,然后使用统计和其他数据挖掘技术从中提取隐藏的信息和惊人的相关性。这些数据不一定跟踪原子化行为的交易记录,比如客户的购买历史,而是跟踪通信动态和社会互动。长期以来,雇主一直使用各种工具来监控员工,无论是跟踪生产力还是防止工作场所的不当行为。但随着个人在网上的交流和社交越来越多,雇主可以获得一系列全新的数据来评估求职者,并通过预测分析来监控员工。目前的美国隐私法几乎没有对预测分析产生的“个人资料”提供任何保护,无论这些资料多么私人。它认为任何可能公开的信息都不是私有的——不管这些“公共”信息是如何收集和使用的。然而,有一种正在发展的隐私理论可能会提供隐私保护,使其免受预测分析的影响:“马赛克”理论认为,对公开信息的持续监控可以揭示个人生活的私密画面。预测分析已经存在了一段时间,但直到最近才在就业情况下“成熟”。本文研究了预测分析在工作场所的使用,预测分析对员工隐私的威胁,以及马赛克理论是否提供了一种可行和必要的隐私保护方法。然而,本文的结论是,除非采用一种新的隐私保护理论——而且很快就会采用——否则每个人的隐私都将面临严重的威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Welcome to the Machine: Privacy and Workplace Implications of Predictive Analytics Grounding Drones: Big Brother's Tool Box Needs Regulation Not Elimination Inviting Scrutiny: How Technologies are Eroding the Attorney-Client Privilege Plagiarism in Cyberspace: Learning the Rules of Recycling Content with a View Towards Nurturing Academic Trust in an Electronic World In Search of a Balance Between Police Power and Privacy in the Cybercrime Treaty
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1