scholarly journals Research on Personal Information Protection System of Network Information Platform under the Background of Big Data

2021 ◽  
Vol 235 ◽  
pp. 03033
Author(s):  
Yijun Xue ◽  
Zhide Zhou

The core of an Internet enterprise is the data of the network platform, which usually includes a large amount of personal data and personal information. Big data refers to the massive, high growth rate and diversified information assets that require new processing models to have stronger decision-making power, insight, and process optimization capabilities. It is characterized by a large number, high speed, variety, value density, and authenticity. There are ways and legal risks of leaking personal information everywhere on the network information platform. To effectively prevent and completely eliminate the leakage of personal privacy, the government should be taken as the leading factor and rely on all levels of society to deal with this issue from multiple angles.

2019 ◽  
Vol 3 (1) ◽  
pp. 22
Author(s):  
Jiexin Zang

Privacy and the protection of privacy is a common topic studied by many scholars. From the very beginning of human culture, people have personal privacy, which is not willing for them to be unveiled by others. With the development of information technology, especially the internet, knowledge and information are dealt by internet users in conscious or unconscious way, and personal information has been rapidly and quickly distributed and disseminated all over the world. Personal data can be collected by hackers or interlinks from the website, internet not only provides people an era with internet links, but also an age with information collections, a big data age. With the background of big data, this essay tries to put forward the correlative relationship between the protection of information privacy and the privacy law in Australia. It first has an overview of the concepts of information privacy and data surveillance under the background of big data, then highlights the importance of data security in the age of big data; with a literature review on the development of Australian privacy acts, it further claims that privacy acts or regulations by the federal or states provided strong support for the protection of personal data. Then relationship between the protection information privacy and the need of judicial guarantee is further studied for thorough methods or regimes in data protection. With these points studied, this essay aims to highlight the importance of data protection and information privacy. On the other hand, it aims to provide awareness for readers the vital role privacy laws can play in the protection of people’s personal information and emphases the importance of a continuous evolution for privacy law system in the age of big data.


2021 ◽  
pp. 1-30
Author(s):  
Lisa Grace S. Bersales ◽  
Josefina V. Almeda ◽  
Sabrina O. Romasoc ◽  
Marie Nadeen R. Martinez ◽  
Dannela Jann B. Galias

With the advancement of technology, digitalization, and the internet of things, large amounts of complex data are being produced daily. This vast quantity of various data produced at high speed is referred to as Big Data. The utilization of Big Data is being implemented with success in the private sector, yet the public sector seems to be falling behind despite the many potentials Big Data has already presented. In this regard, this paper explores ways in which the government can recognize the use of Big Data for official statistics. It begins by gathering and presenting Big Data-related initiatives and projects across the globe for various types and sources of Big Data implemented. Further, this paper discusses the opportunities, challenges, and risks associated with using Big Data, particularly in official statistics. This paper also aims to assess the current utilization of Big Data in the country through focus group discussions and key informant interviews. Based on desk review, discussions, and interviews, the paper then concludes with a proposed framework that provides ways in which Big Data may be utilized by the government to augment official statistics.


Author(s):  
Anna Aleksandrovna Bakulina

This article explores the vulnerabilities of Russia in the digital environment, as well as such phenomena of modern digital economy as cryptocurrencies, blockchain, big data, artificial intelligence, and robotics. The question is raised on the risks that humanity faces in the digital space, which entail the implementation of the latest technologies in society. The author offers the ways for their minimization. The article covers the project “Digital Economy” developed by the Government of the Russian Federation, which is intended for creation of sustainable and secure information and telecommunications infrastructure for high-speed transmission, processing and storage of data bulk, accessible to all organizations and households. Analysis is conducted on the modern enterprise in the sphere of information and communication technologies and the concept on the protection against personal data theft. The crucial role of the IT specialists in digitalization is highlighted. The conclusion is made that in digital space, the major threat to national security is the hacker attacks aimed at the theft of personal data, intellectual property, etc. The author believes that the minimization of risks detected in the course of research requires providing technology opportunity for the Russian Federation to store the collected data locally, rather than abroad. The all-round government influence on the research and legislative sphere, legislative orientation towards stimulating the development of innovation technologies would ensure safe and effective integration of socioeconomic sphere into the digital space.


2021 ◽  
Vol 4 ◽  
Author(s):  
Vibhushinie Bentotahewa ◽  
Chaminda Hewage ◽  
Jason Williams

The growing dependency on digital technologies is becoming a way of life, and at the same time, the collection of data using them for surveillance operations has raised concerns. Notably, some countries use digital surveillance technologies for tracking and monitoring individuals and populations to prevent the transmission of the new coronavirus. The technology has the capacity to contribute towards tackling the pandemic effectively, but the success also comes at the expense of privacy rights. The crucial point to make is regardless of who uses and which mechanism, in one way another will infringe personal privacy. Therefore, when considering the use of technologies to combat the pandemic, the focus should also be on the impact of facial recognition cameras, police surveillance drones, and other digital surveillance devices on the privacy rights of those under surveillance. The GDPR was established to ensure that information could be shared without causing any infringement on personal data and businesses; therefore, in generating Big Data, it is important to ensure that the information is securely collected, processed, transmitted, stored, and accessed in accordance with established rules. This paper focuses on Big Data challenges associated with surveillance methods used within the COVID-19 parameters. The aim of this research is to propose practical solutions to Big Data challenges associated with COVID-19 pandemic surveillance approaches. To that end, the researcher will identify the surveillance measures being used by countries in different regions, the sensitivity of generated data, and the issues associated with the collection of large volumes of data and finally propose feasible solutions to protect the privacy rights of the people, during the post-COVID-19 era.


Author(s):  
Muhammad Mazhar Ullah Rathore ◽  
Awais Ahmad ◽  
Anand Paul

Geosocial network data provides the full information on current trends in human, their behaviors, their living style, the incidents and events, the disasters, current medical infection, and much more with respect to locations. Hence, the current geosocial media can work as a data asset for facilitating the national and the government itself by analyzing the geosocial data at real-time. However, there are millions of geosocial network users, who generates terabytes of heterogeneous data with a variety of information every day with high-speed, termed as Big Data. Analyzing such big amount of data and making real-time decisions is an inspiring task. Therefore, this book chapter discusses the exploration of geosocial networks. A system architecture is discussed and implemented in a real-time environment in order to process the abundant amount of various social network data to monitor the earth events, incidents, medical diseases, user trends and thoughts to make future real-time decisions as well as future planning.


2011 ◽  
pp. 133-148
Author(s):  
Patrick R. Mullen

The growth of the Internet and digital government has dramatically increased the Federal government’s ability to collect, analyze, and disclose personal information about many private aspects of citizens’ lives. Personal information once available only on paper to a limited number of people is now instantly retrievable anywhere in the world by anyone with a computer and an Internet connection. Over time, there has also been a declining level of trust by Americans in government, and currently, many perceive the government as a potential threat to their privacy. Given these forces at work in our society, one should not be surprised to read the results of surveys that show privacy as a top concern of citizens in the 21st century. If citizens do not believe that the government is adequately protecting the privacy of their individual information, they may be less willing to provide this information. Such reluctance could compromise the ability of government to collect important information necessary to develop, administer and evaluate the impact of various policies and programs. Privacy issues discussed in this chapter include challenges regarding (1) protecting personal privacy; (2) ensuring confidentiality of data collected; and (3) implementing appropriate security controls. Perspectives on privacy and stewardship responsibilities of agencies are also discussed.


2018 ◽  
Vol 10 (4) ◽  
pp. 16
Author(s):  
George Bouchagiar

After having shifted from Web 1.0 to Web 2.0, scientists welcome the advent of Web 3.0, an environment where meaning is added to data. While in the Semantic Web people are no longer users, but part of the emerging applications, producers, subjects and beneficiaries of the Big Data, however, opaque processing of personal data poses tremendous risks and dangers for individuals. Given the new era of Big Data this paper studies firms’ purposes and practices to detect some emerging privacy risks. Moreover, theories that deal with social networks are examined to conclude that, even if people state that they value their privacy, however, they often disclose a huge volume of personal information. Taking into account that today’s European concept of privacy is conceptualized in negative terms this paper also proposes the implementation of trust and loyalty into the privacy concept through flexible fiduciary laws. Furthermore, data portability is discussed to detect its potential as a strategic feature, a key tool that will enhance trust. Finally, further scenarios and proposals are submitted, in our attempt to answer the question whether the European concept of privacy could be re-shaped for the benefit of individuals.


Author(s):  
A. Denker

Abstract. The project of smart cities has emerged as a response to the challenges of twenty-first- century urbanization. Solutions to the fundamental conundrum of cities revolving around efficiency, convenience and security keep being sought by leveraging technology. Notwithstanding all the conveniences furnished by a smart city to all the citizens, privacy of a citizen is intertwined with the benefits of a smart city. The development processes which overlook privacy and security issues have left many of the smart city applications vulnerable to non-conventional security threats and susceptible to numerous privacy and personal data spillage risks. Among the challenges the smart city initiatives encounter, the emergence of the smartphone-big data-the cloud coalescence is perhaps the greatest, from the viewpoint of privacy and personal data protection. As our cities are getting digitalized, information comprising citizens' behavior, choices, and mobility, as well as their personal assets are shared over smartphone-big data-the cloud coalescences, thereby expanding cyber-threat surface and creating different security concerns. This coalescence refers to the practices of creating and analyzing vast sets of data, which comprise personal information. In this paper, the protection of privacy and personal data issues in the big data environment of smart cities are viewed through bifocal lenses, focusing on social and technical aspects. The protection of personal data and privacy in smart city enterprises is treated as a socio-technological operation where various actors and factors undertake different tasks. The article concludes by calling for novel developments, conceptual and practical changes both in technological and social realms.


2020 ◽  
Author(s):  
Rock Liu

BACKGROUND The Diamond Princess Cruise outbreak of new corona virus (COVID-19) infection on 2nd February, and more than 2,000 passengers have entered Taiwan, causing concern. The government uses a lot of information to complete the electronic map of cruise passengers within a day, and sends a cell message to the 620,000 people who have contacted the cruise passengers, followed by more than one tracking, if there are respiratory symptoms or pneumonia; then go for an inspection. Chen [1] et al.’s paper has two main points. One is to use the online signal between the mobile phone and the base station to find out the people who have contacted the Princess Diamond passenger. The second is to the 620,000 people who have contacted the Princess Diamond passenger. Use the health insurance database for follow-up health tracking. OBJECTIVE Disease control and prevention sometimes conflict with personal data protection and privacy [6-7, 10]. Science and technology and law always come from human nature [8-9]. How make the balances of both, we needs people's wisdom [11]. METHODS Although the effectiveness of Taiwan’s control against the new coronavirus epidemic is very good, it has taken the lead in violating the law in this practice. The paper by Chen et al. claimed that in the face of new epidemic diseases such as the new coronavirus, it is possible to directly access personal data without obtaining personal consent. According to the investigation, there are currently three laws in Taiwan: 1) Communicable Disease Control Act [3]. 2) The Communication Security and Surveillance Act [4]. 3) Personal Data Protection Act [5]. Those are not mentioned that the government directly calls individuals without personal authorization under special circumstances, such as the new coronavirus epidemic. Therefore, the government violated the law in this case. On the other hand, the paper also emulates South Korea’s policies [2] and practices in the new coronavirus epidemic, such as cell phone positioning, electronic medical records, swipe records, and monitors. South Korea’s laws do not satisfy to Taiwan. Here is another wrong example. RESULTS We know that the world is fighting against the new coronavirus, but this cannot allow the Taiwan government to use it as a reasonable excuse for infringing on personal privacy. Although the other countries have serious new coronavirus epidemics, they seal the city or limit the people’s social distance, and do not violate personal privacy. How to strike a balance between controlling the epidemic situation and protecting personal data and privacy, it is the direction we need to work hard in the future. CONCLUSIONS How to strike a balance between controlling the epidemic situation and protecting personal data and privacy, it is the direction we need to work hard in the future.


2020 ◽  
Vol 89 (4) ◽  
pp. 55-72
Author(s):  
Nermin Varmaz

Summary: This article addresses the compliance of the use of Big Data and Artificial Intelligence (AI) by FinTechs with European data protection principles. FinTechs are increasingly replacing traditional credit institutions and are becoming more important in the provision of financial services, especially by using AI and Big Data. The ability to analyze a large amount of different personal data at high speed can provide insights into customer spending patterns, enable a better understanding of customers, or help predict investments and market changes. However, once personal data is involved, a collision with all basic data protection principles stipulated in the European General Data Protection Regulation (GDPR) arises, mostly due to the fact that Big Data and AI meet their overall objectives by processing vast data that lies beyond their initial processing purposes. The author shows that within this ratio, pseudonymization can prove to be a privacy-compliant and thus preferable alternative for the use of AI and Big Data while still enabling FinTechs to identify customer needs. Zusammenfassung: Dieser Artikel befasst sich mit der Vereinbarkeit der Nutzung von Big Data und Künstlicher Intelligenz (KI) durch FinTechs mit den europäischen Datenschutzgrundsätzen. FinTechs ersetzen zunehmend traditionelle Kreditinstitute und gewinnen bei der Bereitstellung von Finanzdienstleistungen an Bedeutung, insbesondere durch die Nutzung von KI und Big Data. Die Fähigkeit, eine große Menge unterschiedlicher personenbezogener Daten in hoher Geschwindigkeit zu analysieren, kann Einblicke in das Ausgabeverhalten der Kunden geben, ein besseres Verständnis der Kunden ermöglichen oder helfen, Investitionen und Marktveränderungen vorherzusagen. Sobald jedoch personenbezogene Daten involviert sind, kommt es zu einer Kollision mit allen grundlegenden Datenschutzprinzipien, die in der europäischen Datenschutzgrundverordnung (DS-GVO) festgelegt sind, vor allem aufgrund der Tatsache, dass Big Data und KI ihre übergeordneten Ziele durch die Verarbeitung großer Datenmengen erreichen, die über ihre ursprünglichen Verarbeitungszwecke hinausgehen. Der Autor zeigt, dass sich in diesem Verhältnis die Pseudonymisierung als datenschutzkonforme und damit vorzugswürdige Alternative für den Einsatz von KI und Big Data erweisen kann, die FinTechs dennoch in die Lage versetzt, Kundenbedürfnisse zu erkennen.


Sign in / Sign up

Export Citation Format

Share Document