22. デュープロセス導入
• 点数化と利用の段階( Citron and Pasqual
2014)
① 点数化される個人についてのデータを収集.
② 収集されたデータを計算し点数化.
③ 点数を意思決定者(雇用主など)に伝達.
④ 意思決定において点数を使用.
• 各段階において、透明性と訂正のための
デュープロセスの導入が期待される。
38. 参考文献
• Bertrand, Marianne and Mullainathan, Sendhil (2004) “Are Emily
and Greg More Employable than Lakisha and Jamal? A Field
Experiment on Labor Market Discrimination, “ American Economic
Review, vol. 94, pp. 991-1013, Sep. 2004.
• Brey, Philip (2004) “Disclosive Computer Ethics, “ in Readings in
CyberEthics. (2nd ed.) Eds. R. A. Spinello and H. T. Tavani, Jones and
Bartlett, Sudbury, MA, pp. 55–66.2004.
• Carter, Caroline et al. (2006) “The Credit Card Market and
Regulation: In Need of Repair,“ North Carolina Banking Institute
Journal, Vol. 10, No. 23, pp.23-56.
• Citron, Danielle K. and Pasquale, Frank (2014) “The Scored Society:
Due Process for Automated Predictions,” Washington Law Review,
vol.89,pp.1-33.
• Eggers Dave (2013) The Circle: a Novel, Penguin, London. = (2014)吉
田恭子訳, ザ・サークル, 早川書房, 東京.
39. 参考文献
• Enríquez, Juan (2013) “Your Online Life, Permanent as a Tattoo,” at TED
presentation. https://www.youtube.com/watch?v=pRXmEPZNkpY
• Fertik, Michael and Thompson, David C. (2015) The Reputation Economy:
How to Optimize Your Digital Footprint in a World Where Your Reputation
Is Your Most Valuable Asset, Piatkus Books, London = (2015)中里京子訳
『 勝手に選別される世界 ネットの「評判」がリアルを支配するとき,あな
たの人生はどう変わるか』 ダイヤモンド社, 東京.
• Fried, Charles (1968) “Privacy[A moral analysis], “ The Yalre Law Journal,
vol. , pp.475-493.
• Friedman, Batya, and Nissenbaum, Helen (1996) “Bias in Computger
Systems, “ ACM Transactions on Information Systems, vol. 14, no. 3, pp.
330-347, July 1996.
• Lewis, Michael (2004) Moneyball : the Art of Winning an Unfair Game,
W.W. Norton, New York. = (2013) 中山宥訳, マネーボール 完全版, 早川
書房, 東京.
40. 参考文献
• Levy, Steven (2011) In the Plex: How Google Thinks, Works, and
Shapes Our Lives, Simon & Schuster, New York
• Marwick, Alice E. (2014) How Your Data Are Being Deeply Mined,
The New York Review of Books, Jan. 9, 2014.
http://www.nybooks.com/articles/2014/01/09/how-your-data-are-
being-deeply-mined/
• Pasquale, Frank (2015) The Black Box Society : The Secret
Algorithms That Control Money and Information, Harvard University
Press, Cambridge: MA.
• Prosser, William (1960) “Privacy[A legal analysis], “ California Law
Review, Vol. 48, pp. 338-423.
• Rachels, James (1975) “Why Privacy is Important, “ Philosophy &
Public Affairs, vol. 4, no.4, pp.323-333. Sen, Amartya (1984) “Well-
being, Agency and Freedom: The Dewey Lectures 1984, “ Journal of
Philosophy 82, 169-221.
41. 参考文献
• Sen, Amartya (1985) “Well-being, Agency and Freedom: The Dewey
Lectures 1984, “ Journal of Philosophy, vol. 82, 169-221.
• Solove, Daniel (2007) The Future of Reputation: Gossip, Rumor, and
Privacy on the Internet, Yale University Press, New Haven and
London.
• Tavani, Herman (2012) “Search Engines and Ethics, “ Stanford
Encyclopedia of Philosophy.
http://plato.stanford.edu/entries/ethics-search/
• Trottier, Daniel (2014) Identity Problems in the Facebook Era,
Routledge, Abington.
• van den Hoven, Jeroen (2008) “Information technology, privacy, and
the protection of personal data, in Information technology and
moral philosophy, “ in Information technology and moral philosophy,
J. Van Den Hoven and J. Weckert eds., Cambridge University Press,
Cambridge, pp. 301–322.
42. 参考文献
• 佐伯仁志 (1984)「プライヴァシーと名誉の保護(1)~(4・完)」『法学協会
雑誌』, vol. 101, no. 7-9, 11.
• 阪本俊生(1999)『プライバシーのドラマトゥルギー フィクション・秘密・個
人の神話』世界思想社, 東京.
• 阪本昌成 (1986)『プライヴァシー権論』日本評論社, 東京.
• 総務省 (n.d.) 「個人データ保護規則」案仮訳.
http://www.soumu.go.jp/main_content/000196316.pdf (原著 Europe
Union, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND
OF THE COUNCIL on the protection of individuals with regard to the
processing of personal data and on the free movement of such data
(General Data Protection Regulation, 2012)
• 曽我部真裕, 反論権と表現の自由, 有斐閣, 東京, 2013.