particular mobile phone without knowing the identity of the user of the phone.
May 9, 2020, the Norwegian Broadcasting Corporation showed how easy it is to
use the anonymized data from Tamoco to identify a person: determine where the
mobile is usually located during the night and during the day, and the owner is eas-
ily identified (
7
https://www. nrk. no/norge/xl/avslort- av- mobilen- 1. 14911685
).
20.4.4
Violation of Personal Integrity
The users of social media and other services offered over the Internet usually do
not know what data the provider of the service collects about them and for what
purposes the provider is using this information. Most of the revenues of the appli-
cation service providers are, in fact, generated by the information the provider has
been able to collect about their customers. One particular problem is that if the
user does not allow that data is collected and used for other commercial purposes,
they will be denied receiving the service. One case where regulations help is the use
of cookies. The service provider must show the content even if you do not accept
the use of cookies, though there are still providers who deny access if you do not
return the cookie, let you only view part of the content, or do not remove the text
of the request so that it masks three quarter of the screen making it difficult to read
the content.
One of the most quoted examples of misuse of personal data is the Cambridge
Analytica scandal in 2018, where Cambridge Analytica collected information from
Facebook which they attempted to sell to the Republican presidential campaign.
20.5
Conclusions
Nobel Laureate Ronald Coase once said: “if you torture the data long enough, it
will confess to anything” (Wiktionary). This is indeed a truism for big data analyt-
ics. Treated without caution and skepticism, big data analytics may lead to wrong—
Do'stlaringiz bilan baham: |