Classifying Socially Sensitive Data Without Discrimination: An Analysis of a Crime Suspect Dataset

被引:9
作者
Kamiran, Faisal [1 ]
Karim, Asim [1 ]
Verwer, Sicco [1 ]
Goudriaan, Heike [1 ]
机构
[1] King Abdullah Univ Sci & Technol, Thuwal, Saudi Arabia
来源
12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2012) | 2012年
关键词
discrimination; classification;
D O I
10.1109/ICDMW.2012.117
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Social discrimination against certain sensitive groups within society (e.g., females, blacks, minorities) is prohibited by law in many countries. To prevent discrimination arising from the use of discriminatory data, recent data mining research has focused on methods for making classifiers learned over discriminatory data discrimination-aware. Most of these methods have been tested on standard classification datasets that have been tweaked for discrimination analysis rather than over actual discriminatory data. In this paper, we study discrimination-aware classification when applied to a real-world dataset of Statistics Netherlands, which is a census body in the Netherlands. Specifically, we consider the use of classifiers for predicting whether an individual is a crime suspect, or not, to support law enforcement and security agencies' decision making. Our results show that discrimination does exist in real world datasets and blind use of classifiers learned over such datasets can exacerbate the discrimination problem. We demonstrate that discrimination-aware classification methods can mitigate the discriminatory effects and that they lead to rational and legally acceptable decisions.
引用
收藏
页码:370 / 377
页数:8
相关论文
共 18 条
[1]   Three naive Bayes approaches for discrimination-free classification [J].
Calders, Toon ;
Verwer, Sicco .
DATA MINING AND KNOWLEDGE DISCOVERY, 2010, 21 (02) :277-292
[2]   Building Classifiers with Independency Constraints [J].
Calders, Toon ;
Kamiran, Faisal ;
Pechenizkiy, Mykola .
2009 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2009), 2009, :13-18
[3]   Privacy and the regulation of 2012 [J].
Costa, Luiz ;
Poullet, Yves .
COMPUTER LAW & SECURITY REVIEW, 2012, 28 (03) :254-262
[4]   The proposed data protection Regulation replacing Directive 95/46/EC: A sound system for the protection of individuals [J].
De Hert, Paul ;
Papakonstantinou, Vagelis .
COMPUTER LAW & SECURITY REVIEW, 2012, 28 (02) :130-142
[5]  
Hajian S., 2011, 2011 IEEE SSCI Symposium on Computational Intelligence In Cyber Security (CICS 2011), P47, DOI 10.1109/CICYBS.2011.5949405
[6]  
Hajian S., 2012, IEEE T KNOW IN PRESS
[7]  
Hajian S, 2011, LECT NOTES ARTIF INT, V6820, P211, DOI 10.1007/978-3-642-22589-5_20
[8]  
Kamiran Faisal, 2010, Proceedings 2010 10th IEEE International Conference on Data Mining (ICDM 2010), P869, DOI 10.1109/ICDM.2010.50
[9]  
Kamiran F., 2009, 2009 2 INT C COMPUTE, P1, DOI [10.1109/IC4.2009.4909197, DOI 10.1109/IC4.2009.4909197]
[10]  
Kamiran F., 2013, KNOWLEDGE I IN PRESS, P1