The Scary Facts of Data Aggregation
One of the biggest problems that affect everyone is data aggregation. The more the technology develop, the powerful and dangerous it gets. Today there are many companies that aggregate a lot of information about us. Those companies gathering our data from different sources, which create a detailed record about us. Since all services have been computerized whether it is handled directly or indirectly through computers, there is no way to hide your information. We used computers, because they are faster, better, and accurate more that any human being. It solved many problems; however, it created new ones. Data does not means anything if it stands alone, because it is only recoded facts and figure, yet when it organized and sorted, it become information. These transformed information. Data aggregation raises many questions such as, who is benefiting from data aggregation? What is the impact on us (the users)? In this paper I will discuses data aggregation and the ethics and legal issues that affect us.
Data aggregation is a type of data mining and/or processing of data that is not meaningful in its form, where it can be transformed into meaningful information that can be related to a specific person or thing. Another definition of data aggregation is “data aggregation is a type of data and information mining process where data is searched, gathered and presented in a report-based, summarized format to achieve specific business objectives or processes and/or conduct human analysis.” Data aggregation is a double sword edge that can be devoted for good or bad proposes. After attack of September 11,2001 a private company that owned by Hank Asher, has developed a complex algorithm that search and s...
... middle of paper ...
...oth of software and hardware that analyze different data and transformed them to information about people.
When our information is exposed to any one, we are in danger of who possess it. The problem data aggregation is that it do not give us the privecy that is I think it is one of the basic rights. No one should look to our information unless it become it used in important matters there are many information that can allow anyone to know how to use it to mailblack us or even know how to convence us to do what they want. today some websites can exposes our information by a few dollars to anyone who intersted to do so. At the end there is nothing hiding in the Internet, and we become like open books that everyone can use it against us. In this world there is no ethics anymore. It is so desapointeing that Money and power determines what is legal and what is not legal.
Edward Snowden is America’s most recent controversial figure. People can’t decide if he is their hero or traitor. Nevertheless, his leaks on the U.S. government surveillance program, PRISM, demand an explanation. Many American citizens have been enraged by the thought of the government tracing their telecommunication systems. According to factbrowser.com 54% of internet users would rather have more online privacy, even at the risk of security (Facts Tagged with Privacy). They say it is an infringement on their privacy rights of the constitution. However, some of them don’t mind; they believe it will help thwart the acts of terrorists. Both sides make a good point, but the inevitable future is one where the government is adapting as technology is changing. In order for us to continue living in the new digital decade, we must accept the government’s ability to surveil us.
We now accept the sharing and digital storage of our personal information as a necessary evil. We continue to incorporate, into our lives, technology that uses this data. Microsoft and Google are envisioning and developing ways to commercialize the use of even more of our stored personal information.
With the advent of new computer technologies, the ease with which new information can be discovered from aggregating data sources is astounding. This technique is called computer matching. When it comes to doing research this can be an incredible source of new ideas and correlations between sets of data. However, this same technique can be applied to information about individual people. Suddenly, by pulling together disparate sources of data, private information can be learned about an individual without their knowledge or consent. If the organization that is capable of computer matching is a government, it places a lot of information in the hands of a powerful entity. A question of whether the government should have this new information is a significant one.
Personal data are regulated by United Nations and urges States to implement effective measures to ensure t...
The personal connection Americans have with their phones, tablets, and computers; and the rising popularity of online shopping and social websites due to the massive influence the social media has on Americans, it is clear why this generation is called the Information Age, also known as Digital Age. With the Internet being a huge part of our lives, more and more personal data is being made available, because of our ever-increasing dependence and use of the Internet on our phones, tablets, and computers. Some corporations such as Google, Amazon, and Facebook; governments, and other third parties have been tracking our internet use and acquiring data in order to provide personalized services and advertisements for consumers. Many American such as Nicholas Carr who wrote the article “Tracking Is an Assault on Liberty, With Real Dangers,” Anil Dagar who wrote the article “Internet, Economy and Privacy,” and Grace Nasri who wrote the article “Why Consumers are Increasingly Willing to Trade Data for Personalization,” believe that the continuing loss of personal privacy may lead us as a society to devalue the concept of privacy and see privacy as outdated and unimportant. Privacy is dead and corporations, governments, and third parties murdered it for their personal gain not for the interest of the public as they claim. There are more disadvantages than advantages on letting corporations, governments, and third parties track and acquire data to personalized services and advertisements for us.
The United States government is up to its ears in the personal information it has collected from its citizens. Americans are becoming increasingly “aware of these slowly eroding walls of privacy,”(Hirsh) and more than half polled admit concern “about the overall accumulation of personal information about them “by […] law enforcement, government, […] and other groups,” though “they accept it as an unavoidable modern phenomenon” (Hirsh). The question is, how far is too far to trust the government with the collection, proper storage, and usage of this information? Studies show that “Americans believe that business, government, social-media sites, and other groups are accessing their most personal information without their consent” (Hirsh). People should be given the ability to admit or deny access to their personal information. The government does not have a right to use whatever information it wants for any purpose it wishes. Michael Hayden, once the NSA director for seven years, says, “Even I recognize that it's one thing for Google to know too much, because they aren't putting me in jail. It's another thing for government, because they can coerce me” (Hirsh). The United States government's ability to collect information about its citizens and residents should be restricted by what kind of information it can take, how it can acquire it, and what it can use it for.
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
The world erupted in outrage following revelations by Edward Snowden regarding the extent of surveillance perform by the National Security Agency. Privacy becomes one of the hottest topic of 2013 and was chosen by the world’s most popular online dictionary, Dictionary.com, as the Word of the Year. However, the government is not the only one that conduct data gathering and surveillance. Employers often monitor their employees, and businesses collect data on theirs customer. The morality of these practices is a topic that generates heated debate.
There are various kinds of definitions about what data mining is. The authors in [1] define data mining as “the process of extracting previously unknown information from (usually large quantities of) data, which can, in the right context, lead to knowledge”. Data mining is widely used in areas such as business analysis, bioinformatics analysis, medical analysis, etc. Data mining techniques bring us a lot of benefits. Business companies can use data mining tools to search potential customers and increase their profits; medical diagnosis can use data mining to predict potential disease. Although the term “data mining” itself is neutral and has no ethical implications, it is often related to the analysis of information associated with individuals. “The ethical dilemmas arise when data mining is executed over the data of an individual” [2]. For example, using a user’s data to do data mining and classifying the user into some group may result in a variety of ethical issues. In this paper, we deal with two kinds of ethical issues caused by data mining techniques: informational privacy issues in web-data mining and database security issues in data mining. We also look at these ethical issues in a societal level and a global level.
A data warehouse comprised of disparate data sources enables the “single version of truth” through shared data repositories and standards and also provides access to the data that will expand frequency and depth of data analysis. Due to these reasons, data warehouse is the foundation for business intelligence.
In this new era of the Internet, most people use the Internet to acquire information of one kind or other. But what these people are not aware of is that the Internet is collecting information about them. Every time we get onto the Internet there might be a compromise of privacy of our personal information. The information flows both ways. With every clock of the mouse on a hyperlink, or an addition to the mailing list, someone out there might be gathering information about us. This raises the seriousness of privacy of our information on the Internet.
Computers can also tie information together in an impersonal and systematic way that can lead to invasions of privacy. Take for example the situation wh...
Prior to the start of the Information Age in the late 20th century, businesses had to collect data from non-automated sources. Businesses then lacked the computing resources necessary to properly analyze the data, and as a result, companies often made business d...
Surveillance cannot be an advantage if it breaches civil rights to a high degree. In addition, allowing surreptitious surveillance of one form, even in limited scope and for a particular contingency, encourages government to expand such surveillance programs in the future. When data is collected, whether such data remains used for its stated purpose or not after its collection has been called into question, even by government officials. The European Data Protection Supervisor has acknowledged that even when two databases of information are created for specific and distinct purposes, they could be combined with one another to form a third with a purpose for which the first two were not. This immutability of information provides great potential for abuse by individuals and
The consistent use of information and communication technology (ICT) in modern world enables us for countless opportunities for individuals, institutions, business organisations and scientists, but it also raises difficult ethical and legal problems. In particular, ICT helped to make societies more complex and thus even harder to understand. The use of ICT has led to changes in concepts: ownership, buying and selling, right to possession, theft, justice in the distribution of resources and access rights. During the nineties, the internet has grown into all business segments resulting in a large number of questions running. It has been noted that during those time period there has been merging of computers, telecommunications, and media which is further emphasized by the emergence of new issues and strengthening old ones.