The Use of Data Mining by Private Health Insurance Companies and Customers' Privacy An Ethical Analysis

被引:6
作者
Al-Saggaf, Yeslam [1 ,2 ]
机构
[1] Charles Sturt Univ, Informat Technol, Bathurst, NSW 2795, Australia
[2] Fac Business Res Eth Comm, Zurich, Switzerland
关键词
privacy; data mining; health insurance industry; private health insurance; INFORMATION;
D O I
10.1017/S0963180114000607
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
This article examines privacy threats arising from the use of data mining by private Australian health insurance companies. Qualitative interviews were conducted with key experts, and Australian governmental and nongovernmental websites relevant to private health insurance were searched. Using Rationale, a critical thinking tool, the themes and considerations elicited through this empirical approach were developed into an argument about the use of data mining by private health insurance companies. The argument is followed by an ethical analysis guided by classical philosophical theories-utilitarianism, Mill's harm principle, Kant's deontological theory, and Helen Nissenbaum's contextual integrity framework. Both the argument and the ethical analysis find the use of data mining by private health insurance companies in Australia to be unethical. Although private health insurance companies in Australia cannot use data mining for risk rating to cherry-pick customers and cannot use customers' personal information for unintended purposes, this article nonetheless concludes that the secondary use of customers' personal information and the absence of customers' consent still suggest that the use of data mining by private health insurance companies is wrong.
引用
收藏
页码:281 / 292
页数:12
相关论文
共 19 条
[1]  
Al-Saggaf Y, 2013, WORLD J COMPUTER APP, V1, P29
[2]  
Al-Saggaf Y., 2012, INFORM AGE, P46
[3]  
Al-Saggaf Y., 2012, ETHICAL SPACE INT J, V9, P32
[4]   Protect My Privacy or Support the Common-Good? Ethical Questions About Electronic Health Information Exchanges [J].
Angst, Corey M. .
JOURNAL OF BUSINESS ETHICS, 2009, 90 :169-178
[5]  
[Anonymous], 2013, Ethics and technology. Controversies, questions, and strategies for ethical computing
[6]   Genetic information: Consumers' right to privacy versus insurance companies' right to know a public opinion survey [J].
Borna, S ;
Avila, S .
JOURNAL OF BUSINESS ETHICS, 1999, 19 (04) :355-362
[7]   All that glitters is not gold: Digging beneath the surface of data mining [J].
Danna, A ;
Gandy, OH .
JOURNAL OF BUSINESS ETHICS, 2002, 40 (04) :373-386
[8]  
Hildebrandt M, 2009, REINVENTING DATA PROTECTION, P239, DOI 10.1007/978-1-4020-9498-9_14
[9]  
Mill J.S., 1975, LIBERTY ANNOTATED TE
[10]  
Moor J. H., 1997, Computers & Society, V27, P27, DOI 10.1145/270858.270866