Wednesday, March 4, 2015

Payton & Claypoole (2014) Privacy in the Age of Big Data

xiv - it's a tradeoff - privacy for convenience - could be softened by our behavior and legislation to control it

1 - the law cannot keep up with the advancing pace of technology

Privacy is about choice - people choose to expose themselves online...however when it's someone else's choice to expose you, it's a violation.  Being private does not indicate hiding bad behavior

3 - privacy protects freedom of choice - how and when to release personal info
-loss of privacy restricts freedoms to be ourselves and act freely
-allows us to be creative and make decisions outside the mainstream

"privacy is a sponsor and guardian to the creative and the subversive"
without privacy, the pace of invention slows b/c we would not be able to stay competitive - no initiative if someone else just steals your creativity (not everything can be transparent)

5 - "privacy allows us the dignity to present ourselves as we want the world to see us... without fear of judgment."

privacy allows us to behave as we like in seclusion, but still be treated with respect in society (it's about managing our reputations & brand)
when you control your information, you control privacy, which means you control your image

6 - Information collected can allow companies to control/influence your future decisions. (Which is a threat to our privacy - they want to control/influence your decision-making)

Big data "involved the prediction of trends" based on data that mined.
7 - "Using those facts to predict trends and develop better sales and marketing strategies"

11 Technology allows for data points to be recorded - where all parties collect data - the phone, software, apps, etc
data capturing companies then sell this information to other companies interested in particular data points.

35 - MIT study found that with just four data points, identities can be uncovered!
-cell phones passing towers & tracking - no real anonymity
STUDY called: "unique in the crowd: the privacy bounds of Human mobility" (2013)

14 - Personally Identifiable Information - (PII) - the more data collected from a device, the easier it is to identify you

15 - Behavior analysis data allows companies to more accurately predict behavior - but what is happening is that people are being classified into categories before they even act! (For instance, if you do this1 and this2, then you are probably going to do this3!  even if you've never done #3)

Social Media chapter
80 - in addition to cookies, online firms are using web bugs which give users no control to opt-out.  They are undetected and will collect information about you.

85 - the data Facebook collected about you and your friends is matched with third party databases.

"Marketing firms buy these bundles of social networking profiles to build out their product campaigns."  Hence, targeted advertising results from this

Authors throughout this chapter instruct users how to opt-out or find alternative software

Chapter 13 - The Future
212 - expect computers to exist in places where they are not currently
 Moore's law - Gordon Moore, the founder of Intel - wrote in 1965 that the "number of circuits on an affordable integrated computer chip would double every two years for at least a decade."  Authors claim it has been accurate.

213 - Trend is to more deeply integrate mobile computing in our lives  - which also means it will continue to intrude deeply into our private lives

219 - Business & government will benefit from this data
March 29, 2012 - Obama Admin. released the "Big Data Factsheet" which lists 85 examples of federal agency data mining.   Implication for this: 214 - "the data collected by government is public record that and will be used by others"

221 - eyeball capture technology to watch the eyes of TV viewers (Verizon box)
Forms of bio-capture technology (health monitoring, voice monitoring, etc)

222 - "The Internet of Things" - a term to describe the trend of Internet technology invading our everyday items (thermostat, coffee makers, cars, etc).  All to generate data about you and learn how you live.

223 - connectivity generates data about you and how you live - data that will be used by someone else

5-7 years (from 2014) expect TV and internet to merge

224 - authors call for better security measures for bio-capture technology and information collection.  Instead of fingerprints and iris recognition, we should use vein patterns under the skin or retina patterns - because not only are they unique, they indicate someone is alive (so it would be harder to steal and use).  Fingerprints can't be changed and yet, they can be stolen and used by others.  Then what?  How would you gain your identity back?

225 - Authors conclude with a bleak outlook: as technologies grow more sophisticated and invade more of our lives, "more aspects of our private lives stripped bare".  "To avoid this we can hide from the technology, or we can look to governments to set rules that protect our privacy."

(my thought - the more invasive technologies become, the more sophisticated hackers will become and the authors started off admitting that the gov can't keep up... so their final question is a bit disturbing)

  


No comments:

Post a Comment