1 / 25

Privacy, Profits and Security in the Age of Big Data

Privacy, Profits and Security in the Age of Big Data. Professor Shumow. Tensions of the digital age . Will we use these new technologies to their full potential? Or will they use us? There has always been great promise in a networked world

nathan
Download Presentation

Privacy, Profits and Security in the Age of Big Data

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy, Profits and Security in the Age of Big Data Professor Shumow

  2. Tensions of the digital age Will we use these new technologies to their full potential? Or will they use us? There has always been great promise in a networked world The actual outcomes have not always lived up to that promise

  3. Start at the beginning: Web 2.0. • Uh, what’s Web 2.0? • The convergence of a number of techniques, technologies and usage patterns. • Based on developments in: • Web applications and protocols • Technologies (hardware and software) • User participation and contribution

  4. Components of Web 2.0 • Search engines • Wikis • Web Feeds (RSS) • Blogs • Social Media

  5. Social Network vs Email: Which is more popular?

  6. Global Internet Penetration

  7. Web 2.0 and Mobile phones 7+ billion people on Earth 4 billion have access to mobile phones 1+ billion more will after 2 years Only one-fifth of the world has web access But time spent on the net via phone is exploding

  8. Location-Based Services: “Geolocators”

  9. Monitoring illegal forestry… Zimbabwe

  10. disaster… Haiti Earthquake and protests.

  11. But be careful

  12. So, our ideas about privacy have changed. How?

  13. Private/Public divide is now blurred.

  14. But what do we even mean by privacy? Did these people have an expectation of privacy? No, probably not. Expectations of privacy are an outcome of modernity.

  15. The Fourth Amendment of the U.S Constitution “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

  16. Three facets of privacy in the digital age • TMI (Too Much Information) • Data Tracking and Gathering (Commercial) • Data Tracking and Gathering (Government)

  17. TMI • Silly – does anyone really care what you had for breakfast? • Serious – cyber bullying, risk to minors, stupid/criminal behavior • Unthinking, uncritical: Example of Facebook graph search

  18. Data Tracking and Gathering (Commercial) • First, a question: What is the primary goal of Facebook? • Right. The number one goal is making money. • So, how do they make money? • Selling data – your data. • And you are the one who helps them do that. • Claims of differences between what is anonymous and what is personal start to lose their credibility in this data rich environment

  19. Data Tracking and Gathering (Government Surveillance) • All of this data production/collection has been great for governments worldwide. • In the U.S., the National Security Agency (NSA) leaks are BIG news. • Globally, government surveillance is on the rise. • We can find examples in Russia, Iran, China, Syria, Germany, Brazil…and everywhere else.

  20. Data Tracking and Gathering (Government Surveillance) Data requests received by Google

  21. Data Tracking and Gathering (Government Surveillance) Data requests received by Google (by country)

  22. Privacy, Profits, and Security Spend 15 minutes researching your subject and decide what his/her view on the proper balance between these three might be. Pick a presenter from your team. Each team will have two minutes to make there case.

More Related