Skip to main content

Home/ WomensLearningStudio/ Group items tagged big_data

Rss Feed Group items tagged

Doris Reeves-Lipscomb

Sticky data: Why even 'anonymized' information can still identify you - The Globe and Mail - 0 views

  • This isn’t the first time this has happened, that big data sets full of personal information – supposedly obscured, or de-identified, as the process is called – have been reverse engineered to reveal some or even all of the identities contained within. It makes you wonder: Is there really such a thing as a truly anonymous data set in the age of big data?
  • That might sound like a bore, but think about it this way: there’s more than taxi cab data at stake here. Pretty much everything you do on the Internet these days is a potential data set. And data has value. The posts you like on Facebook, your spending habits as tracked by Mint, the searches you make on Google – the argument goes that the social, economic and academic potential of sharing these immensely detailed so-called “high dimensional” data sets with third parties is too great to ignore.
  • University of Colorado Law School associate professor Paul Ohm’s 2009 paper on the topic made the bold claim that “data can be either useful or perfectly anonymous but never both.”
  • ...1 more annotation...
  • A similar situation was cited by Princeton University researchers Arvind Narayanan and Edward W. Felten in a recent response to Cavoukian and Castro. The pair wrote that, in one data set where location data had supposedly been anonymized, it was still possible in 95 per cent of test cases to re-identify users “given four random spatio-temporal points” – and 50 per cent if the researchers only had two. In other words, de-identifying location data is moot if you know where a target lives, where they work and have two other co-ordinates they visit with regularity.
  •  
    post by Matthew Braga as special to The Globe and Mail, 8/6/14 on how deidentified data can be hacked to reveal identities of users.
Doris Reeves-Lipscomb

OfficeMax executive apologizes over 'daughter killed' mailer - LA Times - 0 views

  • In a world where bits of personal data are mined from customers and silently sold off and shuffled among corporations, Seay, 46, appears to be the victim of marketing gone horribly wrong.
  • World Privacy Forum, a nonprofit public interest research group based in San Diego, noting that this is just one example of the information such companies probably hold.
  • "This is the tip of the iceberg. This happens all the time," said Pam Dixon, executive director of World Privacy Forum, a nonprofit public interest research group based in San Diego, noting that this is just one example of the information such companies probably hold.
  • ...2 more annotations...
  • "Why do they have that?" Seay said of the information about his daughter's death. "What do they need that for? How she died, when she died? It's not really personal, but looking at them, it is. That's not something they would ever need."
  • Dixon's group has found companies selling data on rape victims, seniors suffering from dementia and people diagnosed with HIV and AIDS. She said companies created powerful data sets by combining personal information available from public records, census information and social media."All of us are on these lists, and right now we don't even have the right to find out what list we're on or what they say about us," Dixon said. "And I think it's becoming increasingly important for us to see this information and have some rights so we can get off these lists. For this father and mother, I can't think of a worse thing."
  •  
    LA Times article by Matt Pearce, January 20, 2013 on infrequent Office MAx customer who received a solicitation from Office Max with his name on it followed, by "Daughter Killed in Car Crash." How did the company get the information and why did it appear on the envelope because the recipient had lost his daughter in a car crash a year before?
Doris Reeves-Lipscomb

Living by the Numbers: The Algorithm Builder - SPIEGEL ONLINE - 0 views

  • Computer Grading The approach led him to his biggest triumph to date. The challenge was to write a program that could automatically and reliably evaluate student essays -- essentially a grading machine.
  •  
    part of a series in Spiegel Online--this one focuses on building algorithms
Doris Reeves-Lipscomb

Living by the Numbers: The End of Inspector Chance - SPIEGEL ONLINE - 0 views

  • Two professors, computer scientist George Mohler and anthropologist Jeffrey Brantingham, who specializes in crime scenarios, were instrumental in developing the predictive method of fighting crime. Their program is based on models for predicting the aftershocks of earthquakes.
  • The two data experts, Mohler and Brantingham, have since started a company and are marketing their product, Predictive Policing, worldwide
  • "Security is one of the biggest growth areas for Big Data applications," says Schröder. In addition to crime and terrorism, Splunk focuses on the growing number of attacks in, and by means of, the Internet and its software can detect hacker attacks or other cyber attacks. "We are positioning ourselves for an expanding cyber war," Schröder says. But the data hunters' new war also has many civilian aspects.
  •  
    part of a series on Big Data, Spiegel
Doris Reeves-Lipscomb

Big Data should not be a faith-based initiative - Boing Boing - 0 views

  • Princeton's Arvind Narayanan and Ed Felten have published a stinging rebuttal, pointing out the massive holes in Cavoukian and Castro's arguments -- cherry picking studies, improperly generalizing, ignoring the existence of multiple re-identification techniques, and so on.
  • Cavoukian and Castro are rightly excited by Big Data and the new ways that scientists are discovering to make use of data collected for one purpose in the service of another. But they do not admit that the same theoretical advances that unlock new meaning in big datasets also unlock new ways of re-identifying the people whose data is collected in the set.
  • Re-identification is part of the Big Data revolution: among the new meanings we are learning to extract from huge corpuses of data is the identity of the people in that dataset. And since we're commodifying and sharing these huge datasets, they will still be around in ten, twenty and fifty years, when those same Big Data advancements open up new ways of re-identifying -- and harming -- their subjects.
  •  
    Incisive post by Cory Doctorow citing various studies by computer scientists on how claims to successfully "de-identification" of large sets of data do not hold up on closer examination and actual incidence. Cites Arvind Narayanan and Ed Felten's studies.
Doris Reeves-Lipscomb

When Big Data Marketing Becomes Stalking - Scientific American - 0 views

  • but we do know that third-party data brokers sell all manner of information to businesses, including “police officers’ home addresses, rape sufferers, and genetic disease sufferers” as well as suspected alcoholics and cancer and HIV/AIDS patients.
  • The first is that almost everything is personal. In the words of computer scientists Arvind Narayanan (Princeton
  • this model simply doesn’t reflect the reality of the deeply unequal situation we now face. Those who wield the tools of data tracking and analytics have far more power than those who don’t.
  • ...2 more annotations...
  • narrow focus on individual responsibility is not enough. The scale of the problem far exceeds the individual: it is systemic. We are now faced with large-scale experiments on city streets where people are in a state of forced participation, without any real ability to negotiate the terms, and often without the knowledge their data is being collected.
  • We need a sweeping debate about ethics, boundaries and regulation for location data technologies.
  •  
    Great article on inability of big data marketing brokers failing to regulate themselves by Kate Crawford, January 28, 2014. Individuals can do little to protect themselves or opt-out.
Doris Reeves-Lipscomb

Living by the Numbers: The Database - SPIEGEL ONLINE - 0 views

  • The self-confident founders of Kreditech lend money through the Internet: short-term mini-loans of up to €500, with the average customer receiving €109. Instead of requiring credit information from their customers, they determine the probability of default on their own, using a social scoring method that consists of high-speed data analysis. "Ideally, the money should be in customers' accounts within 15 minutes of approval.
  • Kreditech also requires access to Facebook profiles, so that it can verify whether a user's photo and location match information on other social networking sites, like Xing and LinkedIn -- and whether his or her friends include many with similar education levels or many colleagues working in the same company.
  • All of this increases the likelihood that Kreditech is dealing with a real person.
  • ...1 more annotation...
  • Their real goal is to develop an international, self-updating creditworthiness database for other companies, such as online retailers.
  •  
    #6 in a series on Big Data in Spiegel Online
Doris Reeves-Lipscomb

Twitter Is in Trouble, But Tonight's Debate Is Its Moment | WIRED - 0 views

  • he campaigns can also embed code on their websites that allows Twitter to find people later on, so someone who visits Scott Walker’s donate page may later see ads on Twitter about donating to the campaign, regardless of whether that user ever mentioned Scott Walker on Twitter. Using Tailored Audiences, the Walker aide said the campaign has been able to draw donors, volunteers, petition signers, and others.
  •  
    How Twitter proves its value to political campaigns, journalists, and others required to respond in the moment to issues gathering momentum. Yet another example of how we become the product with our participation on Twitter being tracked by advertisers, campaigns, TV executives, etc.
Doris Reeves-Lipscomb

A Q&A with Professor Felix Wu: Privacy in the Digital Age | Cardozo Law - 0 views

  •  
    great interview in 2013 with Felix Wu in Cardozo Law School publication on privacy in the digital age.
Doris Reeves-Lipscomb

Wu-Big-Data-Threats.pdf - 0 views

  •  
    perfect exploration by Felix Wu of how big data threats come down to three concerns: surveillance, disclosure, and discrimination.
Doris Reeves-Lipscomb

The Data That Turned the World Upside Down - Motherboard - 0 views

  •  
    story of how algorithms and big data sealed the deal for Trump
Doris Reeves-Lipscomb

The FCC Seems Unlikely to Stop Internet Providers from Selling Your Data | WIRED - 0 views

  •  
    explains how FCC and FTC are disagreeing on privacy protection on internet with ISPs and Facebook, Google. Upshot is less protection for all of us.
Doris Reeves-Lipscomb

How the Republicans Sold Your Privacy to Internet Providers - The New York Times - 0 views

  • The bill not only gives cable companies and wireless providers free rein to do what they like with your browsing history, shopping habits, your location and other information gleaned from your online activity, but it would also prevent the Federal Communications Commission from ever again establishing similar consumer privacy protections.
  • When you make a voice call on your smartphone, the information is protected: Your phone company can’t sell the fact that you are calling car dealerships to others who want to sell you a car. But if the same device and the same network are used to contact car dealers through the internet, that information — the same information, in fact — can be captured and sold by the network. To add insult to injury, you pay the network a monthly fee for the privilege of having your information sold to the highest bidder.
  •  
    article by Tom Wheeler, March 29, 2017, on federal legislation to allow the sale of information about consumers' internet inquiries internet providers.
1 - 13 of 13
Showing 20 items per page