The Ethics of BI with Private and Public Entities

By Demilia, Brian; Peded, Michael et al. | Communications of the IIMA, April 2012 | Go to article overview

The Ethics of BI with Private and Public Entities


Demilia, Brian, Peded, Michael, Jorgensen, Kenneth, Subramanian, Ramesh, Communications of the IIMA


INTRODUCTION

Business Intelligence (BI) involves the collection of data; translation of the data into information; and interpretation of the information to help in decision-making. The goal of Business Intelligence is to make more informed decisions within an organization. For private businesses, these decisions translate to reducing waste and increasing profit. For governmental (public) agencies, these decisions translate to increased transparency and enhanced citizens' services.

However, while the goal of BI might be to make better decisions, it can also come at the expense of violating ethics - especially the ethics of privacy. Ethics is defined as a system of moral principles, based on which common laws are created in society. However, an unethical act does not necessarily make it illegal. Businesses seek to gain an advantage by sometimes using information unethically, though not necessarily illegally. Even government agencies have at times exposed private information under the guise of transparency - an act of questionable ethics.

Given the Internet's pre-eminent status as a premier communications tool, Internet privacy is of great concern in today's world. Average Internet users do not want their personal information to be exposed, especially if it is likely to cause financial or physical harm to them. Yet every Internet user has a different ethical notion of what sorts of information are considered private, and what are not. Because of this lack of clarity, businesses and governments need to explain to their users what their privacy policies are, and allow people to make choices on whether to use a particular service. Problems usually arise when businesses and governmental units assume that they have a legal right to information from users, and thus disregard privacy concerns.

In this paper we show how businesses and governments gather information, set rules as to how this information is used and accessed, and how that converges to or diverges from current ethics-based laws. We discuss laws that have been or are being created to handle the ethical and privacy concerns resulting from BI. We discuss cases where the allure of profits, or the reliance on BI was so great that businesses chose to violate their own terms of their privacy policies. We cite examples where businesses and governments gather information from the unknowing public. We compare federal laws and regulations with State laws and compare US laws with that of neighboring Canada. We conclude by providing an analysis of BI and privacy, and provide some suggestions on how to harmonize the two.

BI, ETHICS AND THE INTERNET

Internet Data Collection for Commercial Purposes: Who Collects it and Why?

The Internet has changed the way businesses target their marketing efforts. Instead of running billboard ads, print ads, and commercials on radio and TV, businesses can now market directly to users' computer screens as they navigate the Internet. Users, through their navigation patterns, leave behind a "trail of cookies" that marketers then collect and study. It is through these patterns that businesses develop strategies to tailor advertisement to users.

Internet browser "cookies" were in vented in 1994 by Lou Montulli for the Netscape browser. They were intended to be the "eyes and ears" of digital store fronts, similar to an attentive shop keeper in a brick and mortar store (Singleton, 2000). Other methods that web based businesses use to track users include: click-tracking logs of all user navigation, form data submissions, and server requests logs that track information such as the IP addresses of users, date and time stamps of their actions, as well as the name of their operating system and Internet browser.

A variety of cookies called third party cookies are often used by businesses to track user behaviors, but their usage remains extremely controversial. These cookies are placed on a user's computer by a Web page they've visited, but not by the company that created the Web page. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • A full archive of books and articles related to this one
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

The Ethics of BI with Private and Public Entities
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

    Already a member? Log in now.