In fact, in an August 2013 survey conducted by statistical software company Revolution Analytics, 80% of the respondents said they agreed that there should be an ethical framework for collecting and using data. And more than half of data scientists surveyed agreed that ethics already play a big part in their research.
"My solution is to have some sort of code of professional conduct that data scientists would voluntarily agree to follow to protect people's private data," says Walker. By creating a kind of Hippocratic Oath for analytics professionals, Walker says data scientists will have both the moral and legal grounds for refusing to slice and dice numbers in ways that threaten to violate consumer privacy rights.
Walker isn't the first to conceive of a code of ethics for analysts. Earlier this year, the Institute for Operations Research and the Management Sciences (INFORMS) drafted a code of ethics to accompany the launch of its Certified Analytics Professional (CAP) certification program.
Yet Davis believes that despite lofty intentions, it's far too easy for a code of ethics to wind up "written on a piece of paper and put in a drawer." The challenge, he says, "is that you have to get real about understanding what you actually do with your data and whether or not that aligns with the shared values in your organization." Unfortunately, he says, determining what your values are as an organization, and whether or not your data practices reflect these priorities, "is a very different conversation than what we're used to having in a business setting."
And then there are IT professionals who maintain that it's simply not a data scientist's job to protect privacy. Instead, "their job is to extract interesting insights from the data," says Ryan Kalember, chief product officer at WatchDox, a Palo Alto, Calif.-based vendor of security tools.
Market will drive answers
Whether privacy is the purview of consumers, corporate executives or data scientists, one thing is certain: Data privacy is a hot-button issue. Even the U.S. government is investigating organizations that collect and manage big data and pressuring them to provide consumers with appropriate control over their personal data. But industry observers aren't holding their breath for sweeping governmental action. "It's not like the Founding Fathers are getting together in Philadelphia," says Davis.
The ongoing revelations about the NSA's Prism data-collection program have, if anything, further eroded the public's confidence that the government will do anything to protect consumers' privacy. Indeed, Tawakol says that shifts in consumer awareness about data privacy (or lack thereof) are more likely than federal investigations to drive reforms in data collection practices.
"The market will provide a mechanism quicker than legislation will," he says. "There is going to be more and more control of your data, and more clarity on what you're getting in return. Companies that insist on not being transparent are going to look outdated."
Walker shares that vision of the future. "There are lots of benefits to having data analyzed and having companies narrowly tailor specific products and services to customer preferences. But it's actually in a company's best interest to respect people's private data," he says, adding that companies are going to lose customers "if consumers find out that a company has been spying on them and using data in a way that's unethical."
Waxer is a Toronto-based freelance journalist. She has written articles for various publications and news sites, including The Economist, MIT Technology Review and CNNMoney.com.
Read more about Applications in Computerworld's Applications Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts