ARCHIVES

Original Article

Data Privacy and Ethical Consideration in Data Science

Leena Moundekar1 Vaishnavi Shreekhande2 Yamini Kanekar3 Bhagyashree Kumbhare4
12Students, MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India. 3Professor, MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India. 4HOD, MCA, Smt. Radhikatai Pandav College of Engineering, Nagpur, Maharashtra, India.

Published Online: January-April 2025

Pages: 139-144

References

1. Braun, A., & Garriga, G. (2018). Consumer journey analytics in the context of data privacy and ethics. In C. Linnhoff-Popien, R. Schneider
& M. Zaddach (Eds.), Digital marketplaces unleashed. Berlin: Springer.
2. Beagrie and Houghten (2014), The Value of Data Sharing and Curation, Charles Beagrie Ltd, Victoria University, and JISC
2013.(http://repository.jisc.ac.uk/5568/1/iDF308_- _Digital_Infrastructure_Directions_Report%2C_Jan14_v1-04.pdf).
3. Barbosa, M. W., A. D. L. C. Vicente, M. B. Ladeira, and M. P. V. D. Oliveira. 2018. “Managing Supply Chain Resources with Big Data
Analytics: A Systematic Review.” International Journal of Logistics Research and Applications 21(open in a new window) (3(open in a
new window)): 177–200. doi:https://doi.org/10.1080/13675567.2017.1369501(open in a new window).
4. Bumblauskas, D., H. Nold, P. Bumblauskas, and A. Igou. 2017. “Big Data Analytics: transforming Data to Action.” Business Process
Management Journal 23(open in a new window) (3(open in a new window)): 703–720. doi:https://doi.org/10.1108/BPMJ-03-2016-
0056(open in a new window).
5. Attewell, P., Monaghan, D. B., & Kwong, D. (2015). Data mining for the social sciences: An introduction. University of California
Press. https://www.jstor.org/stable/10.1525/j.ctt13 × 1gcg
6. Cass, S. (1999). Researcher charged with data theft. Nature Medicine, 5(5), 474– 474. https://doi.org/10.1038/8350
7. Choudhury, S., J.R. Fishman, M.L. McGowan, and E.T. Juengst. 2014. Big data, open science and the brain: Lessons learned from genomics.
Frontiers in Human Neuroscience 8: 239. doi:10.3389/fnhum.2014.00239.

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

Maturity Models for Business Intelligence: An Overview

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250401022

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.