privacy final
DESCRIPTION
ÂTRANSCRIPT
21% 86%of internet users have had an
email or social networking account compromised.
of internet users have taken steps online to remove or
mask their digital footprints.
68%of internet users believe
current laws are not good enough in protecting people’s
privacy online.
In 2013,
We expose ourselves.LOCATION PHOTOS
When we tweet, facebook or post something on social media with the
tracker on, everyone will know where you are at exactly what time.
Every uploaded photo willbe flowing on the internet space forever. Even when you think you
deleted it.
Big data is a term used to describe any voluminous amount of data, is being generated by everything around us at all times. Every digital process and social media exchange produces data. Systems, sensors and mobile devices transmit it. Big data is arriving from multiple sources at an alarming velocity, volume and variety and it is now changing the way companies and organizations work.
Knowledge Discoveries in Databases is the broad process of finding knowledge in a collection of data that involves several steps including data mining. It is what we do with big data. Data mining, a step within KDD, is the process of analyzing data to find unsuspected relationships and relevant patterns to summarize into useful insight. For example, it is often used to explore consumer behavior.
Sometimes without even knowing it.
Target collects data on every person who walks into their store. The instant you walk in, you’re assigned a Guest ID number that keeps tabs on everything you do.
“If you use a credit card or a coupon, or fill out a survey, or mail in a refund, or call the customer help line, or open an e-mail we’ve
sent you or visit our web site, we’ll record it and link it to your Guest ID. We want to know everything we can.”
— Andrew Pole, Target Statistician
VISITED WEBSITES PURCHASES ONLINE
Visit a website and cookies are automatically collected and a
monitored session starts. Your every move is tracked the instant you enter a website. Your IP address and binary digits assigned to your computer by
your internet provider can also provide website owners your exact location.
Once you purchase something online with your credit card, it is forever in
the database. Credit card information is often sold or stolen when hackers manage to get into the databases in websites that you have purchased in.
“We trade privacy for convenience.”The digital revolution has changed the way the current generation carries out everyday tasks. Technology has made it easier and that convenience has come at a price of our privacy.
We need to give a notice for consent, telling customers what you are planning to do with their data and getting their consent to use it.
“Notice and consent.”
Some say:
How can we strike a balance to ensure we take advantage of the
benefits of technology and innovation yet still have privacy?
We need to find and shape a path that puts people first by ensuring privacy
and technology remain in balance.
Referenceshttp://wlfi.com/2014/09/18/improving-technology-but-diminishing-privacy/http://www.cnn.com/2010/TECH/04/14/oppmann.off.the.grid/http://blogs.microsoft.com/on-the-issues/2012/10/26/privacy-and-technology-in-balance/http://insights.wired.com/profiles/blogs/the-convenience-privacy-trade-off-on-the-internet-of-thingshttp://www.ibm.com/big-data/us/en/http://www.fastcoexist.com/3032977/when-technologies-combine-amazing-innovation-happenshttp://thefuturescompany.com/free-thinking/privacy/http://web.simmons.edu/~chen/nit/NIT%2796/96-025-Britz.html