Just The Tip Of The Iceberg Case Study

Improved Essays
Journal Assignment.
Privacy and Security - Preventing Theft is Just the Tip of the Iceberg.
The Internet has grown far beyond it 's humble academic beginnings, and become a worldwide tool used by 30% of the worlds population. As in it 's infancy, it is still largely free, and is used for viewing entertainment, socializing, research, and commerce. The benefits are many but there is also a much darker side to the story. As part of all the on-line activities large amounts of personal and behavioral data are being generated and stored. This data, or big data as it is called, is very valuable to many business who use it to identify customers and targeting their ads. Some people worry about thieves using this data for criminal activity, but
…show more content…
Employment and Analytics: Here is a particularly egregious and invasive use of big data. With the cost of health care rising, many employers are looking for ways to promote healthier lifestyles and penalize bad ones. By turning to data analytics they can evaluate their employees against the profile of healthy people. We aren 't talking about blood pressure and lean body mass here. We are talking about social media use, restaurants visited, and things purchased (Silverman, 2016). All these results could also be used to filter potential employees for medical reasons.
3. Credit score: Here is a strange and disturbing use of profiling. It seems that your credit score is a better predictor of your future driving habits than your actual driving record. Many car insurance companies are now using that score to determine your premiums (Federal Trade Commission, (2013).
4. Big Brother: Recently China has begun experimenting with a new form of social engineering using social credit scoring system. If a citizen behaves in a way deemed socially acceptable their score can go up. If they are critical of the government, like posting a comment on Ti-amen Square, their score will go down. Even the scores of the people you associate with will affect you. These scores will effect availability of travel visas, interest rates on loans, where you can work, and ultimately who will associate with you. This is a particularly clever and insidious form of Orwellian control. It is the people around
…show more content…
Under the current system, there is no option to opt out and still lead a normal life. You don 't own your own data and any truly private information derived through analytics is available on-line for a price (regardless of how private or inaccurate it is). The issues of social control are also very disturbing. I have no answers to these issues. It seems that no one out there really cares. At least they don 't care enough to give up free operating systems, free emails, free search engines or free social media sites. There is an old saying “There is nothing more expensive than something that is

Related Documents

  • Improved Essays

    To support this we look at Nicholas Thompson’s article “Bigger Brother: The Exponential Law of Privacy Loss.” Thompson argues that the internet is designed to collect information from people therefore, even with privacy laws in place, owners of sites will continue to find creative ways to socially connect people (Thompson 284). He continues by referencing software designed by carrier IQ that is specifically created to track searches, locations, and purchases. Thompson states that the purpose of this software is to better enhance the network as well as peoples average everyday lives (285). Nicholas later goes into detail explaining the exponential law of privacy loss.…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Its a well known fact that technology is becoming more embodied in our lives. The Pew Internet and American Life Project released a study stating the number of adults that own cellphones, laptops or tablets is rising. This increase in ownership of technology has revolutionized access to information through the internet. One notable case is O’Grady v. Superior Court of Santa Clara County (2006). Apple filed a case against an unnamed individual who allegedly leaked information on several online sites regarding new Apple products.…

    • 315 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Since the government is invading our privacy it’s like having them watching our every move and constantly looking through our photo’s, Facebook messages, and text messages. For example when the FBI wanted Apple to unlock a terrorist phone so that they could look at the text messages. Apple informed the FBI that if they unlock that phone then they would be forced to unlock all of the phones. If they did this then hackers or the government could get a hold of something they don't need to know about. The government need to stop invading our privacy because if something gets leaked it could cost the government a lot of money or ruin someone’s life.…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    This week I was thinking and reading about the massive Equifax data breach that took place this year. Equifax is one of America's 3 main credit reporting agencies. Big data is a threat in today's world. A lot of personal information is collected and stored nowadays, which is used for good reasons but could also be abused. Big data and all new technologies such as artificial intelligence, and machine learning are very powerful and can reform peoples lives in today's times.…

    • 233 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    There were many negative and positive effects that came from 9/11. Some of these effects only lasted for a short period of time to help protect and defend the American public. However, there were also many effects that have lasted for a long time. One of those effects is how the attacks have changed America's surveillance on their citizens. The Foreign Intelligence Surveillance Act (FISA), which was put into place in 1978 and allows the government to tap into citizen's electronics and monitor them for foreign intelligence information, has changed drastically since the events of 9/11.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    There’s A Reason Why Mama Wouldn’t Let You Take a Cookie from the Jar: A Rhetorical Analysis of “Six Provocations for Big Data” In their essay “Six Provocations for Big Data”, danah boyd and Kate Crawford argue if the use of Big Data is ethical based upon the fact that is easily accessible to all, especially in today’s society. boyd, a researcher “and [the] founder of Data & Society Research Institute”, and Kate Crawford, also a researcher and professor, attempt to reach an uninformed, nonbiased audience (754). Through their writings, they bring to light the definition of Big Data, where it comes from, how it is used, and how it will affect the future of technology and privacy. Respectively, boyd and Crawford’s effort to persuade the audience…

    • 846 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Google launched its fast Internet service in Kansas City in 2012, the Web giant said it wanted to spread broadband widely and close the "digital divide. " The survey, in six low-income Kansas City, Mo., neighborhoods, found that just 10% of residents subscribe to Google's Fiber service. The results suggest that the digital divide is less about where broadband service is offered -- the subject of fierce debate when Google first arrived in Kansas City -- and more about who finds it useful and can pay for it. For years people dint have the Internet, so now when it is available they question the need to have it. (124…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Digital Forensics

    • 988 Words
    • 4 Pages

    In today’s society as we all know the use of digital technology is evolving everyday because not only are we surrounded by internet activities, but now we’re surrounded by a huge cesspool of digital technology. Just to name a few, digital technology includes but not limited to computers, CD’s and DVD’s, portable storage media and cell phones. When it comes to examining digital technology it can include anything from photos, video’s, text documents, Internet activity logs along with phone numbers or any other data that can be stored electronically.(Knetzger&Muraski,2008). Consequently, with the use of the digital world it has caught the attention of many criminals who are committing crimes against people such as: Child enticement, child pornography,…

    • 988 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ringen, Stein. The Perfect Dictatorship: China in the 21st Century. Hong Kong: Hong Kong University Press, 2016. Liu Xia Economically, China has done a really great job in recent years.…

    • 792 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Data Mining Essay

    • 798 Words
    • 4 Pages

    The topic that I am interested in is Data Mining. This is interesting to me because it can help in various areas of society. This includes the medical field, elderly care, and commerce. This is controversial because of the amount and type of personal data that is being collected. We are living in the “Big Data” era where there are many ways to collect data.…

    • 798 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Computers are an integrated part of business operations; data security is an important factor for companies. Protecting the data that the companies generate is a necessity. One of the main targets for hackers is a company’s big data. Companies are utilizing big data to analyzed trends and patterns, that are then used to make strategic business moves.…

    • 999 Words
    • 4 Pages
    Improved Essays