scholarly journals Big data and privacy: The study of privacy invasion acceptance in the world of big data

2017 ◽  
Vol 5 (1) ◽  
pp. 57-71
Author(s):  
Jędrzej Wieczorkowski ◽  
Przemysław Polak

The phenomenon of big data includes technological (new opportunities), business (application), and social aspect. The social aspect applies to the social consequences of the use of big data methods, in particular, those related to the processing of personal and other private data , as well as the danger of privacy violation. In the context of the big data phenomenon, this study presents the results of a survey on the level of acceptance of privacy violation resulting from mass data processing. The different objectives of processing were taken into account, including general, social and commercial. This study helps to draw conclusions concerning commercial and non-commercial use of private data, as well as the legal regulations on personal data processing.

2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
J Doetsch ◽  
I Lopes ◽  
R Redinha ◽  
H Barros

Abstract The usage and exchange of “big data” is at the forefront of the data science agenda where Record Linkage plays a prominent role in biomedical research. In an era of ubiquitous data exchange and big data, Record Linkage is almost inevitable, but raises ethical and legal problems, namely personal data and privacy protection. Record Linkage refers to the general merging of data information to consolidate facts about an individual or an event that are not available in a separate record. This article provides an overview of ethical challenges and research opportunities in linking routine data on health and education with cohort data from very preterm (VPT) infants in Portugal. Portuguese, European and International law has been reviewed on data processing, protection and privacy. A three-stage analysis was carried out: i) interplay of threefold law-levelling for Record Linkage at different levels; ii) impact of data protection and privacy rights for data processing, iii) data linkage process' challenges and opportunities for research. A framework to discuss the process and its implications for data protection and privacy was created. The GDPR functions as utmost substantial legal basis for the protection of personal data in Record Linkage, and explicit written consent is considered the appropriate basis for the processing sensitive data. In Portugal, retrospective access to routine data is permitted if anonymised; for health data if it meets data processing requirements declared with an explicit consent; for education data if the data processing rules are complied. Routine health and education data can be linked to cohort data if rights of the data subject and requirements and duties of processors and controllers are respected. A strong ethical context through the application of the GDPR in all phases of research need to be established to achieve Record Linkage between cohort and routine collected records for health and education data of VPT infants in Portugal. Key messages GDPR is the most important legal framework for the protection of personal data, however, its uniform approach granting freedom to its Member states hampers Record Linkage processes among EU countries. The question remains whether the gap between data protection and privacy is adequately balanced at three legal levels to guarantee freedom for research and the improvement of health of data subjects.


2020 ◽  
Vol 11 (2) ◽  
pp. 101-113
Author(s):  
Iveta Kepule ◽  
AINA STRODE

Aim. The aim of the research is to study the usage of primary school pupils’ self-expression skills acquired within music education in various social contexts. Methods. Theoretical research method – the analysis of literature, empirical data acquisition method – questionnaire. Statistical data processing has been carried out in IBM SPSS 23 programme, using the following data processing methods: frequency analysis; Mann-Whitney U test for the comparison of two independent groups; Kruskal-Wallis test for the comparison of three or more independent groups; Kendall rank correlation coefficient for the assessment of associations between two variables. Results. In the development of self-expression skills, an important aspect is the social performance criterion that is based on pupils’ need for self-expression in a social environment of practising music. Age and gender-based correlations in the assessment of a self-expression skill criterion "Social performance" indicate that with age pupils become more independent and engaged in music-related social activities. Girls are socially more active and emotional and engage in artistic activities more often. The research confirms the role of teachers in the development of pupils’ self-expression skills, promoting integration of formal and informal learning process and transformation in formal and informal learning environment. Conclusions. The dynamics and interactions of self-expression skills’ development factors (social, emotional and intellectual) defines pupils’ individual self-expression skills and development tendencies. Self-expression is important for pupils in social aspect, as it is related to socialisation in microenvironment (family) and macroenvironment (friends) and affects cooperation and communication.


Big data offers various services like storing sensitive, private data and maintaining the data. Big data users may upload encrypted data rather than raw data for preserving data. Processing and analyzing the encrypted data is the primary target for attackers and hackers. Homomorphic Re-Encryption to supports access control, processed cipher-text on encrypted data and ensure data confidentiality. However, the limitation of Homomorphic Re-Encryption is the single-user system, which means it allows the party that owns a homomorphic decryption key to decrypt processed cipher-texts. Original Homomorphic Re-Encryption cannot support multiple users to access the processed cipher texts flexibly. In this paper, propose a Privacy-Preserving Big Data Processing system which support of a Homomorphic Re-Encryption using laplacian phase that extends partially from a single-group user system by offering cipher text re-encryption that allows accessing processed cipher-texts. Through the cooperation of a Data Provider, to increase the flexibility and security of our system, However apply multiple Services to take in charge of the data from their users and design computing operations over cipher-texts belonging to multiple Service. The analysis completed on proves that our Preserving the Privacy of Big Data Processing method’s to performance in terms of security is good on some datasets, inefficiency this also ensures the security and user privacy.


2019 ◽  
Vol 11 (18) ◽  
pp. 5067 ◽  
Author(s):  
Miltiades D. Lytras ◽  
Anna Visvizi

Big data is the buzz-word of today, and yet their specific impact on individuals and societies remains assumed rather than fully understood. Clearly, big data and their use have already given rise to a number of questions, including those of how data can be collected and used in ethical and socially sensitive ways. Building on these points, the objective of this study was to explore how precisely big data and big data based services influence individuals and societies. This paper elaborates on individuals’ perceptions of data, especially on how they perceive the actual sharing of their data. In this way, this paper defines a value space for the social impact of big data relevant to three factors, namely the intention to share personal data, individual’s concerns, and social impact of big data.The main contribution of this study consists of the insights into the still nascent area of research that unfolds at the cross-section of social science and computer science. We expect that in the next years this area of research will gain prominence.


2017 ◽  
Vol 10 (2) ◽  
pp. 76-106 ◽  
Author(s):  
Seili Suder ◽  
Andra Siibak

Abstract The aim of this interdisciplinary paper is to study the social reality surrounding the data processing practices employers and employees engage in on social networking sites (SNS). Considering the lack of empirical studies, as well as the considerable uncertainty in the way personal data protection is implemented across the European Union (EU), the paper offers insights on the topic. Qualitative text analysis of semi-structured interviews with employers from the service sector (N=10) and the field of media and communication (N=15), as well as employers from organisations which had experienced various problems due to things their employees had posted on social media (N=14), and employees from the financial sector (N=15) were carried out to explore whether the data protection principles, which can be viewed as the most important guidelines for employers in the EU, are actually followed in their everyday SNS data processing practices. Even though the data protection principles emphasise the need for fair, purposeful, transparent, minimal and accurate processing of personal data, our interviews with employers and employees reveal that the actual SNS processing practices rarely live up to the standards. Our findings indicate that there is a growing mismatch between the social reality and legal requirements regarding data subjects.


2020 ◽  
Vol 16 (3) ◽  
pp. 347-365
Author(s):  
Cemre Bedir

AbstractIn data-driven business models, users’ personal data is collected in order to determine the preferences of consumers and to the tailor production and advertising to these preferences. In these business models, consumers do not pay a price but provide their data, such as IP numbers, locations, and email addresses to benefit from the digital service or content. Contracts facilitate interactions between these providers and users. Their transactions are regulated by contracts in which their agreement on data use and data processing are stipulated. Data is always collected and processed through a contractual relationship and in this paper, I will argue that there are problems arising from contracts involving data to which contract law applies and that contract law can map these problems and offer insights. The scope of this study will be limited to issues where data is provided as counter-performance and where data is provided in addition to a monetary payment.


2019 ◽  
Vol 20 (1) ◽  
pp. 257-290 ◽  
Author(s):  
Michael Birnhack

Abstract Data protection law has a linear logic, in that it purports to trace the lifecycle of personal data from creation to collection, processing, transfer, and ultimately its demise, and to regulate each step so as to promote the data subject’s control thereof. Big data defies this linear logic, in that it decontextualizes data from its original environment and conducts an algorithmic nonlinear mix, match, and mine analysis. Applying data protection law to the processing of big data does not work well, to say the least. This Article examines the case of big medical data. A survey of emerging research practices indicates that studies either ignore data protection law altogether or assume an ex post position, namely that because they are conducted after the data has already been created in the course of providing medical care, and they use de-identified data, they go under the radar of data protection law. These studies focus on the end-point of the lifecycle of big data: if sufficiently anonymous at publication, the previous steps are overlooked, on the claim that they enjoy immunity. I argue that this answer is too crude. To portray data protection law in its best light, we should view it as a process-based attempt to equip data subjects with some power to control personal data about them, in all phases of data processing. Such control reflects the underlying justification of data protection law as an implementation of human dignity. The process-based approach fits current legal practices and is justified by reflecting dignitarian conceptions of informational privacy.


2019 ◽  
Vol 13 (1) ◽  
pp. 1070-1078
Author(s):  
Corina Pelau ◽  
Mihaela Stanescu ◽  
Daniela Serban

Abstract The development and increased popularity of the social media networks has changed the way consumers communicate and interact with each other. But besides the positive aspects regarding socializing, real-time communication and information sharing, the social media networks have also several disadvantages. Private data security, invasion of privacy, misuse of information are just some of the negative aspects associated to social media networks, of which many of the consumers are not aware. This paper gives an overview of the different methods in which private consumer data and consumer profiles are created with the help of social media networks. The paper focuses on three main components, namely the data provided by the consumers, the technologies that have the ability to collect data in an aware or unaware manner and the contribution and advantages of business in this process. The results show that some of the data are given by the consumer, while other are just gathered with the help of automated and intelligent systems or applications.


2020 ◽  
Vol 3 (2) ◽  
pp. 188
Author(s):  
Dian Kristyanto

Industrialization 4.0 brought many changes to the community, especially in terms of sustainable internet usage. Data literacy arises because of the large amount of data and information spread on the internet. This objective study to provide knowledge about data literacy in coastal society, another purpose is to explain the challenges that arise as a result of the birth industrialization 4.0 which certainly also felt by the coastal community. This methodology uses a literature review approach. Data collection techniques are carried out through studies of reference sources that are used as references. This study discussion is that data literacy in coastal society is devoted to basic knowledge in protecting personal data when conducting activities using the internet. Public-private data that needs to be kept secret include; identity number, account number, full name, telephone number, password, address, and others. While the challenges faced by coastal society in the industrialization 4.0 cover many aspects, three main challenges can be felt directly by coastal society such as big data, internet objects, and robotization.Keyword: coastal communities; data literacy; industrialization 4.0; information technologyABSTRAKIndustrialisasi 4.0 membawa banyak perubahan bagi masyarakat terutama dalam hal pemanfaatan internet secara terus-menerus. Literasi data muncul karena banyaknya data dan informasi yang tersebar di internet. Penelitian ini bertujuan untuk memberikan pengetahuan mengenai literasi data pada masyarakat pesisir, tujuan lain adalah untuk menjelaskan tantangan yang muncul akibat dari lahirnya era industrialisasi 4.0 yang pastinya dirasakan juga oleh masyarakat pesisir (nelayan). Metodologi menggunakan pendekatan riset pustaka. Proses pengumpulan data dilakukan dengan cara telaah terhadap sumber referensi yang digunakan sebagai rujukan. Kajian ini menghasilkan pembahasan bahwa literasi data pada masyarakat pesisir dikhususkan pada pengetahuan dasar dalam menjaga data pribadi pada saat melakukan aktifitas menggunakan internet. Data pribadi masyarakat yang perlu dijaga kerahasiaannya meliputi: nomor identitas, nomor rekening, nama lengkap, nomor telepon, password, alamat tinggal dan sebagainya. Sedangkan tantangan yang dihadapi masyarakat pesisir di era industrialisasi 4.0 meliputi banyak aspek, namun terdapat tiga tantangan utama yang dapat dirasakan secara langsung oleh masyarakat pesisir seperti big data, internet of thing dan robotization. 


Sign in / Sign up

Export Citation Format

Share Document