ARCHIVES
Original Article
Data Privacy and Ethical Consideration in Data Science
Leena Moundekar1
Vaishnavi Shreekhande2
Yamini Kanekar3
Bhagyashree Kumbhare4
12Students, MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India. 3Professor, MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India. 4HOD, MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India.
Published Online: January-April 2025
Pages: 139-144
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250401022References
1. Braun, A., & Garriga, G. (2018). Consumer journey analytics in the context of data privacy and ethics. In C. Linnhoff-Popien, R. Schneider
& M. Zaddach (Eds.), Digital marketplaces unleashed. Berlin: Springer.
2. Beagrie and Houghten (2014), The Value of Data Sharing and Curation, Charles Beagrie Ltd, Victoria University, and JISC
2013.(http://repository.jisc.ac.uk/5568/1/iDF308_- _Digital_Infrastructure_Directions_Report%2C_Jan14_v1-04.pdf).
3. Barbosa, M. W., A. D. L. C. Vicente, M. B. Ladeira, and M. P. V. D. Oliveira. 2018. “Managing Supply Chain Resources with Big Data
Analytics: A Systematic Review.” International Journal of Logistics Research and Applications 21(open in a new window) (3(open in a
new window)): 177–200. doi:https://doi.org/10.1080/13675567.2017.1369501(open in a new window).
4. Bumblauskas, D., H. Nold, P. Bumblauskas, and A. Igou. 2017. “Big Data Analytics: transforming Data to Action.” Business Process
Management Journal 23(open in a new window) (3(open in a new window)): 703–720. doi:https://doi.org/10.1108/BPMJ-03-2016-
0056(open in a new window).
5. Attewell, P., Monaghan, D. B., & Kwong, D. (2015). Data mining for the social sciences: An introduction. University of California
Press. https://www.jstor.org/stable/10.1525/j.ctt13 × 1gcg
6. Cass, S. (1999). Researcher charged with data theft. Nature Medicine, 5(5), 474– 474. https://doi.org/10.1038/8350
7. Choudhury, S., J.R. Fishman, M.L. McGowan, and E.T. Juengst. 2014. Big data, open science and the brain: Lessons learned from genomics.
Frontiers in Human Neuroscience 8: 239. doi:10.3389/fnhum.2014.00239.
& M. Zaddach (Eds.), Digital marketplaces unleashed. Berlin: Springer.
2. Beagrie and Houghten (2014), The Value of Data Sharing and Curation, Charles Beagrie Ltd, Victoria University, and JISC
2013.(http://repository.jisc.ac.uk/5568/1/iDF308_- _Digital_Infrastructure_Directions_Report%2C_Jan14_v1-04.pdf).
3. Barbosa, M. W., A. D. L. C. Vicente, M. B. Ladeira, and M. P. V. D. Oliveira. 2018. “Managing Supply Chain Resources with Big Data
Analytics: A Systematic Review.” International Journal of Logistics Research and Applications 21(open in a new window) (3(open in a
new window)): 177–200. doi:https://doi.org/10.1080/13675567.2017.1369501(open in a new window).
4. Bumblauskas, D., H. Nold, P. Bumblauskas, and A. Igou. 2017. “Big Data Analytics: transforming Data to Action.” Business Process
Management Journal 23(open in a new window) (3(open in a new window)): 703–720. doi:https://doi.org/10.1108/BPMJ-03-2016-
0056(open in a new window).
5. Attewell, P., Monaghan, D. B., & Kwong, D. (2015). Data mining for the social sciences: An introduction. University of California
Press. https://www.jstor.org/stable/10.1525/j.ctt13 × 1gcg
6. Cass, S. (1999). Researcher charged with data theft. Nature Medicine, 5(5), 474– 474. https://doi.org/10.1038/8350
7. Choudhury, S., J.R. Fishman, M.L. McGowan, and E.T. Juengst. 2014. Big data, open science and the brain: Lessons learned from genomics.
Frontiers in Human Neuroscience 8: 239. doi:10.3389/fnhum.2014.00239.
Related Articles
2025
Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions
2025
Exploring AI Techniques for Quantum Threat Detection and Prevention
2025
Maturity Models for Business Intelligence: An Overview
2025
INSPIRO: An AI Driven Institution Auditor
2025
Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems
2025