SlideShare a Scribd company logo
YourModerator
Karen Lopez
Sr. Project Manager / Architect
Infoadvisors
@datachick
#BCDModeling
YourPanelist
Len Silverston
President, Universal Data
Models, LLC
@lensilverston
Denny Cherry
Founder and Principal
Consultant, Denny Cherry
and Associates Consulting
@mrdenny
Kerry Tyler
Senior BI Engineer, Aptera
Software
@airbornegeek
Tamera Clark
Principal Consultant, T & K
Creative Solutions Group
@tameraclark
©2014 Universal Data Models, LLC - All Rights Reserved 1
Ethics in Data Modeling
©2014 Universal Data Models, LLC - All Rights Reserved 2
•Ethics
•Morality
•Rules
•Laws
©2014 Universal Data Models, LLC - All Rights Reserved 3
Ethics
‘rules of behavior based on ideas about what is morally good and bad’ *
– do what is good – do no harm?
* From Mirriam Webster’s online dictionary
©2014 Universal Data Models, LLC - All Rights Reserved 4
Morality
‘beliefs about what is right behavior and what is wrong behavior’ *
– Synonym? Do the right thing?
– culturally and perspective based?
– E.g., in some cultures, you can share homework and copy work, in other
cultures, this is a no-no.
* From Mirriam Webster’s online dictionary
©2014 Universal Data Models, LLC - All Rights Reserved 5
Rules
‘a statement that tells you what is allowed or what will happen within a
particular system’ *
– Very specific
* From Mirriam Webster’s online dictionary
©2014 Universal Data Models, LLC - All Rights Reserved 6
Law
‘the whole system or set of rules made by the government of a town, state,
country, etc.’ *
– May be ethical, but not legal, and vice versa
* From Mirriam Webster’s online dictionary
©2014 Universal Data Models, LLC - All Rights Reserved 7
Code of Ethics of ACM
(Association of Computer Machinery)
• Contribute to society and human well-being.
• Avoid harm to others.
• Be honest and trustworthy.
• Be fair and take action not to discriminate.
• Honor property rights including copyrights and patent.
• Give proper credit for intellectual property.
• Respect the privacy of others.
©2014 Universal Data Models, LLC - All Rights Reserved 8
Data Modeling Ethics Topics
• Intentions
• Righteousness
• Speak/model the truth
–Respect, trust, transparency
• Confidentiality
• Stealing/plagiarism
• Designing protection, security, privacy
©2014 Universal Data Models, LLC - All Rights Reserved 9
Ethics Topic Opposite
Perspective
Dilemma Data Modeling Application
Righteousness
(do the ‘right’
thing)
There is no
‘right’ thing or
do it the right
way. Infinite
perspectives.
- What if asked to do
something that you think is
wrong?
- Do no harm – who defines
harm or what the ‘right’
way is?
- What if your way is the
‘right’ way but others
disagree?
- Is it better to look out for
the ‘greater good’ or is it
sometimes OK to look after
oneself?
- How to be of the best service?
- Is there one right way to model
something? Is there a right or wrong in
data modeling? Or is it a case of what is
most useful in the situation?
- Big data – do we need a data model? Or is
it a waste of time?
- A normalized model is the ‘right’ way for
this application but others disagree.
- This level of flexibility is correct!
- Business has requirements, but this is
correct technology wise.
- The DBA wants to ignore model and
provide performance.
©2014 Universal Data Models, LLC - All Rights Reserved 10
Ethics Topic Opposite
Perspective
Dilemma Data Modeling Application
Speak/model
the truth and
act on it.
What is the
truth?
- What are the facts
versus opinions?
- How can we speak with
the greatest amount of
integrity?
- How can we provide
models with integrity?
- Should we always do
what we say?
- What are the real facts in the model
and what is
opinion/judgment/perspectives? (need
the most flexible model – is that a
fact?)
- What if we are asked to model
something that is not true? (e.g., a
person can only play one role, only 2
lines for an invoice)
- Model the truth? Can we only
approximate and get closer to the
truth?
- What is the single version of the truth –
who is right?
- Be transparent with mistakes?
©2014 Universal Data Models, LLC - All Rights Reserved 11
Ethics Topic Opposite
Perspective
Dilemma Data Modeling Application
Confidentiality Whistle
Blowing
- Honor
confidentiality
agreement if you
discover something
illegal or unethical?
(E.g., Snowden,
Assange/WikiLeaks)
- Disclose use of data for unethical purpose?
E.g., Using personal data such as social media,
genome data, or private information for
understanding behavior?
- What if asked to model something you
shouldn’t? e.g., credit card information which is
illegal to store?
©2014 Universal Data Models, LLC - All Rights Reserved 12
Ethics Topic Opposite
Perspective
Dilemma Data Modeling Application
Stealing,
plagiarism,
taking without
permission
Re-use When can you
take and when do
you need
permission?
When is
something your
own?
- What if your data model was taken from a ‘re-
usable model’ and you didn’t get permission or
you didn’t disclose and have full transparency?
- Who owns the intellectual property of a model?
When is it yours?
- When do you need permission to re-use models
or modeling ideas?
©2014 Universal Data Models, LLC - All Rights Reserved 13
Ethics Topic Opposite
Perspective
Dilemma Data Modeling Application
Responsible for
designing
protection/privacy/
security/encryption
Is this the
data
modeler’s
job?
How much to
design and
what is in
scope?
- What is in scope for modeling security/privacy
and in which model (conceptual, logical,
physical?)
- What about storing data in the cloud? Less
control over security/privacy?

More Related Content

What's hot

Miranda Marcus – Data and ethics
Miranda Marcus – Data and ethicsMiranda Marcus – Data and ethics
Miranda Marcus – Data and ethics
NEXTConference
 
#iot and marketing
#iot and marketing#iot and marketing
#iot and marketing
Alexandra Deschamps-Sonsino
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
Kielentot Martinez
 
For the Love of Big Data
For the Love of Big DataFor the Love of Big Data
For the Love of Big Data
Robert Sutor
 
Designing Trustworthy AI: A User Experience Framework at RSA 2020
Designing Trustworthy AI: A User Experience Framework at RSA 2020Designing Trustworthy AI: A User Experience Framework at RSA 2020
Designing Trustworthy AI: A User Experience Framework at RSA 2020
Carol Smith
 
AI for Finance
AI for FinanceAI for Finance
Dynamic UXR: Ethical Responsibilities and AI. Carol Smith at Strive in Toronto
Dynamic UXR: Ethical Responsibilities and AI. Carol Smith at Strive in TorontoDynamic UXR: Ethical Responsibilities and AI. Carol Smith at Strive in Toronto
Dynamic UXR: Ethical Responsibilities and AI. Carol Smith at Strive in Toronto
Carol Smith
 
Five social media issues for employers lawyers
Five social media issues for employers lawyersFive social media issues for employers lawyers
Five social media issues for employers lawyersDan Michaluk
 
2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young
Frederick Lane
 
The Ethics of AI
The Ethics of AIThe Ethics of AI
The Ethics of AI
Mark S. Steed
 
Introduction to the ethics of machine learning
Introduction to the ethics of machine learningIntroduction to the ethics of machine learning
Introduction to the ethics of machine learning
Daniel Wilson
 
Junie's Journey through Procurement
Junie's Journey through ProcurementJunie's Journey through Procurement
Junie's Journey through Procurement
elianna james
 
Information ethics
Information ethicsInformation ethics
Information ethics
omercomail
 
IA is Elemental: People are Fundamental at World IA Day 2020 Pittsburgh
IA is Elemental: People are Fundamental at World IA Day 2020 PittsburghIA is Elemental: People are Fundamental at World IA Day 2020 Pittsburgh
IA is Elemental: People are Fundamental at World IA Day 2020 Pittsburgh
Carol Smith
 
Informationand PrivacyUpdate for College Administrators
Informationand PrivacyUpdate for College AdministratorsInformationand PrivacyUpdate for College Administrators
Informationand PrivacyUpdate for College Administrators
Dan Michaluk
 
Data Mining & Engineering
Data Mining & EngineeringData Mining & Engineering
Data Mining & Engineering
Visible Technologies
 
[Datanest] AI startup in Indonesia - March 2018
[Datanest] AI startup in Indonesia - March 2018[Datanest] AI startup in Indonesia - March 2018
[Datanest] AI startup in Indonesia - March 2018
Thibaud Plaquet
 
Implementing Ethics: Developing Trustworthy AI PyCon 2020
Implementing Ethics: Developing Trustworthy AI PyCon 2020Implementing Ethics: Developing Trustworthy AI PyCon 2020
Implementing Ethics: Developing Trustworthy AI PyCon 2020
Carol Smith
 

What's hot (20)

Miranda Marcus – Data and ethics
Miranda Marcus – Data and ethicsMiranda Marcus – Data and ethics
Miranda Marcus – Data and ethics
 
Safety and Responsibilty Online
Safety and Responsibilty OnlineSafety and Responsibilty Online
Safety and Responsibilty Online
 
#iot and marketing
#iot and marketing#iot and marketing
#iot and marketing
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
Responsible Use
Responsible UseResponsible Use
Responsible Use
 
For the Love of Big Data
For the Love of Big DataFor the Love of Big Data
For the Love of Big Data
 
Designing Trustworthy AI: A User Experience Framework at RSA 2020
Designing Trustworthy AI: A User Experience Framework at RSA 2020Designing Trustworthy AI: A User Experience Framework at RSA 2020
Designing Trustworthy AI: A User Experience Framework at RSA 2020
 
AI for Finance
AI for FinanceAI for Finance
AI for Finance
 
Dynamic UXR: Ethical Responsibilities and AI. Carol Smith at Strive in Toronto
Dynamic UXR: Ethical Responsibilities and AI. Carol Smith at Strive in TorontoDynamic UXR: Ethical Responsibilities and AI. Carol Smith at Strive in Toronto
Dynamic UXR: Ethical Responsibilities and AI. Carol Smith at Strive in Toronto
 
Five social media issues for employers lawyers
Five social media issues for employers lawyersFive social media issues for employers lawyers
Five social media issues for employers lawyers
 
2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young2014-08-27 Cybertraps for the Young
2014-08-27 Cybertraps for the Young
 
The Ethics of AI
The Ethics of AIThe Ethics of AI
The Ethics of AI
 
Introduction to the ethics of machine learning
Introduction to the ethics of machine learningIntroduction to the ethics of machine learning
Introduction to the ethics of machine learning
 
Junie's Journey through Procurement
Junie's Journey through ProcurementJunie's Journey through Procurement
Junie's Journey through Procurement
 
Information ethics
Information ethicsInformation ethics
Information ethics
 
IA is Elemental: People are Fundamental at World IA Day 2020 Pittsburgh
IA is Elemental: People are Fundamental at World IA Day 2020 PittsburghIA is Elemental: People are Fundamental at World IA Day 2020 Pittsburgh
IA is Elemental: People are Fundamental at World IA Day 2020 Pittsburgh
 
Informationand PrivacyUpdate for College Administrators
Informationand PrivacyUpdate for College AdministratorsInformationand PrivacyUpdate for College Administrators
Informationand PrivacyUpdate for College Administrators
 
Data Mining & Engineering
Data Mining & EngineeringData Mining & Engineering
Data Mining & Engineering
 
[Datanest] AI startup in Indonesia - March 2018
[Datanest] AI startup in Indonesia - March 2018[Datanest] AI startup in Indonesia - March 2018
[Datanest] AI startup in Indonesia - March 2018
 
Implementing Ethics: Developing Trustworthy AI PyCon 2020
Implementing Ethics: Developing Trustworthy AI PyCon 2020Implementing Ethics: Developing Trustworthy AI PyCon 2020
Implementing Ethics: Developing Trustworthy AI PyCon 2020
 

Similar to Big Challenges in Data Modeling: Ethical Data Modeling

Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
Jason Hong
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
Jason Hong
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big Data
Matti Vesala
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Jennifer Polack
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
Ravindra Babu
 
Common ethical issues
Common ethical issuesCommon ethical issues
Data science and ethics in fundraising
Data science and ethics in fundraisingData science and ethics in fundraising
Data science and ethics in fundraising
James Orton
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
Adam Thierer
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
briancrawford30935
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
Steve Mckee
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
TargetX
 
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
PHIGs Information Management Consulting Inc.
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
Data-Set
 
Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!
DATAVERSITY
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
Data-Set
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
university of education,Lahore
 

Similar to Big Challenges in Data Modeling: Ethical Data Modeling (20)

Fostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone PrivacyFostering an Ecosystem for Smartphone Privacy
Fostering an Ecosystem for Smartphone Privacy
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Ethics of Big Data
Ethics of Big DataEthics of Big Data
Ethics of Big Data
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Data science and ethics in fundraising
Data science and ethics in fundraisingData science and ethics in fundraising
Data science and ethics in fundraising
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
 
Ethics Half Day
Ethics Half DayEthics Half Day
Ethics Half Day
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
 
Data set module 4
Data set   module 4Data set   module 4
Data set module 4
 
Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Data set Legislation
Data set LegislationData set Legislation
Data set Legislation
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 

More from DATAVERSITY

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
DATAVERSITY
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
DATAVERSITY
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
DATAVERSITY
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
DATAVERSITY
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
DATAVERSITY
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
DATAVERSITY
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
DATAVERSITY
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
DATAVERSITY
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
DATAVERSITY
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
DATAVERSITY
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
DATAVERSITY
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
DATAVERSITY
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
DATAVERSITY
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
DATAVERSITY
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
DATAVERSITY
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
DATAVERSITY
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
DATAVERSITY
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
DATAVERSITY
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
DATAVERSITY
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
DATAVERSITY
 

More from DATAVERSITY (20)

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Big Challenges in Data Modeling: Ethical Data Modeling

  • 1. YourModerator Karen Lopez Sr. Project Manager / Architect Infoadvisors @datachick #BCDModeling YourPanelist Len Silverston President, Universal Data Models, LLC @lensilverston Denny Cherry Founder and Principal Consultant, Denny Cherry and Associates Consulting @mrdenny Kerry Tyler Senior BI Engineer, Aptera Software @airbornegeek Tamera Clark Principal Consultant, T & K Creative Solutions Group @tameraclark
  • 2. ©2014 Universal Data Models, LLC - All Rights Reserved 1 Ethics in Data Modeling
  • 3. ©2014 Universal Data Models, LLC - All Rights Reserved 2 •Ethics •Morality •Rules •Laws
  • 4. ©2014 Universal Data Models, LLC - All Rights Reserved 3 Ethics ‘rules of behavior based on ideas about what is morally good and bad’ * – do what is good – do no harm? * From Mirriam Webster’s online dictionary
  • 5. ©2014 Universal Data Models, LLC - All Rights Reserved 4 Morality ‘beliefs about what is right behavior and what is wrong behavior’ * – Synonym? Do the right thing? – culturally and perspective based? – E.g., in some cultures, you can share homework and copy work, in other cultures, this is a no-no. * From Mirriam Webster’s online dictionary
  • 6. ©2014 Universal Data Models, LLC - All Rights Reserved 5 Rules ‘a statement that tells you what is allowed or what will happen within a particular system’ * – Very specific * From Mirriam Webster’s online dictionary
  • 7. ©2014 Universal Data Models, LLC - All Rights Reserved 6 Law ‘the whole system or set of rules made by the government of a town, state, country, etc.’ * – May be ethical, but not legal, and vice versa * From Mirriam Webster’s online dictionary
  • 8. ©2014 Universal Data Models, LLC - All Rights Reserved 7 Code of Ethics of ACM (Association of Computer Machinery) • Contribute to society and human well-being. • Avoid harm to others. • Be honest and trustworthy. • Be fair and take action not to discriminate. • Honor property rights including copyrights and patent. • Give proper credit for intellectual property. • Respect the privacy of others.
  • 9. ©2014 Universal Data Models, LLC - All Rights Reserved 8 Data Modeling Ethics Topics • Intentions • Righteousness • Speak/model the truth –Respect, trust, transparency • Confidentiality • Stealing/plagiarism • Designing protection, security, privacy
  • 10. ©2014 Universal Data Models, LLC - All Rights Reserved 9 Ethics Topic Opposite Perspective Dilemma Data Modeling Application Righteousness (do the ‘right’ thing) There is no ‘right’ thing or do it the right way. Infinite perspectives. - What if asked to do something that you think is wrong? - Do no harm – who defines harm or what the ‘right’ way is? - What if your way is the ‘right’ way but others disagree? - Is it better to look out for the ‘greater good’ or is it sometimes OK to look after oneself? - How to be of the best service? - Is there one right way to model something? Is there a right or wrong in data modeling? Or is it a case of what is most useful in the situation? - Big data – do we need a data model? Or is it a waste of time? - A normalized model is the ‘right’ way for this application but others disagree. - This level of flexibility is correct! - Business has requirements, but this is correct technology wise. - The DBA wants to ignore model and provide performance.
  • 11. ©2014 Universal Data Models, LLC - All Rights Reserved 10 Ethics Topic Opposite Perspective Dilemma Data Modeling Application Speak/model the truth and act on it. What is the truth? - What are the facts versus opinions? - How can we speak with the greatest amount of integrity? - How can we provide models with integrity? - Should we always do what we say? - What are the real facts in the model and what is opinion/judgment/perspectives? (need the most flexible model – is that a fact?) - What if we are asked to model something that is not true? (e.g., a person can only play one role, only 2 lines for an invoice) - Model the truth? Can we only approximate and get closer to the truth? - What is the single version of the truth – who is right? - Be transparent with mistakes?
  • 12. ©2014 Universal Data Models, LLC - All Rights Reserved 11 Ethics Topic Opposite Perspective Dilemma Data Modeling Application Confidentiality Whistle Blowing - Honor confidentiality agreement if you discover something illegal or unethical? (E.g., Snowden, Assange/WikiLeaks) - Disclose use of data for unethical purpose? E.g., Using personal data such as social media, genome data, or private information for understanding behavior? - What if asked to model something you shouldn’t? e.g., credit card information which is illegal to store?
  • 13. ©2014 Universal Data Models, LLC - All Rights Reserved 12 Ethics Topic Opposite Perspective Dilemma Data Modeling Application Stealing, plagiarism, taking without permission Re-use When can you take and when do you need permission? When is something your own? - What if your data model was taken from a ‘re- usable model’ and you didn’t get permission or you didn’t disclose and have full transparency? - Who owns the intellectual property of a model? When is it yours? - When do you need permission to re-use models or modeling ideas?
  • 14. ©2014 Universal Data Models, LLC - All Rights Reserved 13 Ethics Topic Opposite Perspective Dilemma Data Modeling Application Responsible for designing protection/privacy/ security/encryption Is this the data modeler’s job? How much to design and what is in scope? - What is in scope for modeling security/privacy and in which model (conceptual, logical, physical?) - What about storing data in the cloud? Less control over security/privacy?