Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-t5tsf Total loading time: 0 Render date: 2024-11-06T03:48:16.730Z Has data issue: false hasContentIssue false

10 - Big Data Privacy, Ethics, and Enterprise Continuous Monitoring Systems

from Part II - Business Enterprises

Published online by Cambridge University Press:  18 October 2019

Ali E. Abbas
Affiliation:
University of Southern California
Get access

Summary

There is a delicate balance associated with ethics and privacy in “enterprise continuous monitoring systems.” On the one hand, it can be critical to enterprises to continuously monitor the ethical behavior of different agents, and thus, facilitate enterprise risk management, as noted in the KPMG quote. In particular, continuous monitoring systems help firms monitor related internal and external agents to make sure that the agents hired by or engaged by the enterprise are behaving ethically. However, on the other hand, such continuous monitoring systems can pose ethical and privacy risks to those being monitored and provide risks and costs to the company doing the monitoring. For example, inappropriate information can be assembled, stored, and inferred about a range of individuals. Thus, information obtained by continuous monitoring generally should follow privacy principles that require that the data be up-to-date and conform to the purpose for which the data was originally gathered, and other constraints.

Type
Chapter
Information
Next-Generation Ethics
Engineering a Better Society
, pp. 129 - 142
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Alles, M., Brennan, G., Kogan, A., & Vasarhelyi, M. A. (2006). Continuous monitoring of business process controls: A pilot implementation of a continuous auditing system at Siemens. International Journal of Accounting Information Systems, 7(2), 137161.Google Scholar
Appek, K. (2010, November). Comparing Pharmaceutical Continuous Monitoring Systems: Part 1. Retrieved from www.qualitydigest.com/inside/metrology-article/comparing-pharmaceutical-continuous-monitoring-systems-part-1.html#Google Scholar
Chan, D. Y., & Vasarhelyi, M. A. (2011). Innovation and practice of continuous auditing. International Journal of Accounting Information Systems, 12(2), 152160.Google Scholar
DOT. (2015). Department of Transportation, Office of Inspector General, Audit Report, FISMA 2015: DOT has major success in PIV implementation, but problems persist in other cybersecurity areas (November 5) (Redacted Version). Retrieved from www.oig.dot.gov/sites/default/files/FISMA%20FY%202015%20FOUO%20Redacted.pdfGoogle Scholar
KPMG. (2014). Astrus: A web-enabled integrity due diligence solution. Retrieved from https://assets.kpmg.com/content/dam/kpmg/pdf/2014/08/astrus-due-diligence-solution-v2.pdfGoogle Scholar
KPMG. (2016). Astrus Enhanced due diligence reporting and monitoring. Retrieved from www.youtube.com/watch?v=OgMNFsWBZc4Google Scholar
Moor, J. (1985). What is computer ethics? Metaphilosophy, 16(4), 266275.Google Scholar
Nice, Atimize, (2016). Watch list filtering. Retrieved from www.niceactimize.com/Lists/Brochures/AML_Brochure_WatchListFiltering.pdfGoogle Scholar
OECD. (2013). OECD guidelines on the protection of privacy and transborder flows of personal data. Retrieved from www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htmGoogle Scholar
O’Leary, D. E. (1995). Some privacy issues in knowledge discovery: The OECD personal privacy guidelines. IEEE Expert, 10(2), 4859.Google Scholar
O’Leary, D. E. (2011). Blog mining-review and extensions: From each according to his opinion. Decision Support Systems, 51(4), 821830.Google Scholar
O’Leary, D. E. (2012). The virtual close and continuous monitoring at Cisco. Journal of Emerging Technologies in Accounting, 9(1), 111126.Google Scholar
O’Leary, D. E. (2013). Knowledge discovery for continuous financial assurance using multiple types of digital information. In Lawrence, K. (Ed.) Contemporary perspectives in data mining (pp. 103122). Charlotte, NC: Information Age Publishing.Google Scholar
O’Leary, D. E. (2015). Big data and privacy: Emerging issues. IEEE Intelligent Systems, 30(6), 9296.Google Scholar
O’Leary, D. E. (2016). Ethics for big data and analytics. IEEE Intelligent Systems, 31(4), 8184.Google Scholar
O’Leary, D. E. (2017). Configuring blockchain architectures for transaction information in blockchain consortiums: The case of accounting and supply chain systems. Intelligent Systems in Accounting, Finance and Management, 24(4), 138147.Google Scholar
O’Leary, D., & Spangler, S. (2016). “Monitoring and Mining Digital Media for Brand and Reputation Information.” Paper presented at the International Conference on Information Systems (Dublin 2016). Retrieved from http://aisel.aisnet.org/icis2016/ISCurriculum/Presentations/3/Google Scholar
O’Leary, D., & Spangler, S. (2018). Continuously monitoring bank risk, Reputation and opportunity, Journal of Emerging Technologies in Accounting, forthcoming.Google Scholar
PwC. (2016). Needle in the haystack: Monitoring vendor networks through supply chain risk analytics (July). Retrieved from www.pwc.com/us/en/risk-assurance/publications/supply-chain-risk-analytics.pdfGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×