SlideShare a Scribd company logo
1 of 26
Big data analytics: from
threatening privacy to
challenging democracy
Paola Mavriki, PhD Candidate, pmavriki@aegean.gr
Maria Karyda, Associate Professor, mka@aegean.gr
Department of Information and Communication Systems Engineering,
University of the Aegean
Focus of presentation
 What are the privacy threats stemming from
the use of big data for political purposes?
 What is their impact on democracy?
The research work
 Identifies and investigates privacy threats stemming from the use of
big data for political communication,
 argues that mechanisms are required to protect the privacy interests
of groups as in the case of the release of demographically
identifiable information (DDI) for example.
 Focusing on the European landscape and the democratic value of
privacy the research work shows that main features of democracy
such as election fairness and pluralism of views may be undermined
through big data techniques.
Background: The professionalization of
political communication
 The online dimension of election campaigning is the latest
phase in the professionalization of political communication.
 The Internet is changing the way campaigns strategize and
communicate with their constituents.
 Persuadable voters are identified by profiling and targeted
through various personalisation methods.
 Political branding is gaining increased attention.
The European digital political
landscape
 Despite the differences between the European countries and
US, there are common trends such as the intensive use of
new ICTs and a marketing-oriented strategy of campaigns.
 There are several examples proving the integration of the
Internet and marketing tools in the political communication in
European democracies:
 in the 2007 Finnish general election for instance, political marketing
procedures have been used for targeting young voters,
 in the 2003, 2006, 2010 and 2012 Catalan elections technological
advances were used by the political parties,
 in the 2016 Brexit referendum behavioral science, big data analysis and
ad targeting have been used by the “ Vote Leave” campaign.
The democratic value of privacy
(1/2)
 In political democracies, ‘privacy provides opportunities for
political expression and criticism, political choice, and
freedom from unreasonable police interference; it provides
opportunities for people and organizations to prepare and
discuss matters in private…’ (Westin, 1967).
 Privacy is a fundament of our democracy, because without
privacy people might exercise power to influence others
(Janssen and van den Hoven, 2015).
 Privacy allows us to form our political, democratic selves
(Voice, 2016).
The democratic value of privacy
(2/2)
 Privacy is essential to the maintenance of democracy
because it ensures that citizens are able to hold elected
governments to account and place limits on the expansion
of the state. Privacy’s public value also stems from its
importance to the exercise of political rights (Regan, 1995).
 Individuals need to be free to share those thoughts with
others without being subject to the watchful, possibly
critical, eye of the state (Goold, 2010).
Privacy threats related to
surveillance (1/3)
 Contemporary ubiquitous systems gather vast amounts of
information about people accumulating a large amount of
personal information in new ways with new technologies.
 Public transport smart cards, smartphones, digital payment
systems, smart wearable devices for tracking biometrics,
Wi-Fi providers having access to geolocation and internet
browsing practices, Facebook tracking users’ likes and
preferences, Google tracking browsing and searches, credit
card use, car GPS systems, are some examples of the new
ways of monitoring people’s activities.
Privacy threats related to
surveillance (2/3)
 For the observed, surveillance can lead to self-
censorship and inhibition.
 Surveillance ‘threatens not only to chill the expression of
eccentric individuality, but also, gradually, to dampen the
force of our aspirations to it’ (Solove, 2003).
 Surveillance inhibits freedom of choice, impinging upon
self-determination. It also creates a trail of information
about a person.
Privacy threats related to surveillance
(3/3)
 Surveillance impedes one’s anonymity, inhibits one’s
freedom to associate with others, and alters one’s
freedom of movement.
 Surveillance’s inhibitory effects are especially potent
when people are engaging in political protest or dissent.
 People can face persecution, public sanction, and blacklisting for
their unpopular political beliefs.
 Surveillance can make associating with disfavored groups and
causes all the more difficult and precarious.
Privacy threats related to predictions
(1/3)
 Machine learning technologies become increasingly
pervasive in behavioral prediction.
 Campaigns need accurate predictions about the
preferences of voters, their expected behaviors, and their
responses to campaign outreach.
 Big data technologies allows practitioners, researchers,
policy analysts, and others to predict the spread of
opinions, political trends, etc.
 Campaigns may use data to construct predictive models to
make targeting communication more efficient .
Privacy threats related to predictions
(2/3)
 Based on existing publicly available information, big data
analysis tools can generate a predictive model of what has
a high probability of being PII, essentially imagining an
individual’s data.
 Kosinski’s (2013) method for example, is able to predict
political party affiliation about 85 percent using only
Facebook “likes”.
Privacy threats related to
predictions (3/3)
 Deducing extensive information from digital footprints and the kinds
of predictions that can be made from this are far too vast and
complex, and are evolving too quickly, for people to fully assess the
involved risks.
 A person may leave behind in several years thousands of pieces of
data which does not affect her/him negatively. As time passes, data
analytic techniques improve, and a newly created algorithm may
process the previously harmless digital footprints and deduce
harmful information.
Privacy threats related to automated
profiling (1/2)
 stem from the accumulation of personal data: fragments
of data regarding an individual user may be linked peace
by peace until an individual profile is entirely expose,
 aggregation:
 may cause dignitary harms because of how it unsettles
expectations.
 can lead to power asymmetries, as it can increase the power that
others have over individuals.
 moreover, data compilations may be both telling and
incomplete.
Privacy threats related to automated
profiling (2/2)
 In the case decisions are taken based on data mining
and profiling, undesirable discrimination may occur,
 In political context, a person may be profiled inaccurately
as an extremist movement or party adherent or
supporter.
Group Privacy threats related to
automated profiling (3/3)
 New technologies and powerful analytics collect and analyse large
amounts of data in order to identify patterns in the behaviour of
groups, communities and even entire countries.
 Some are concerned about the privacy of specific groups such as
non-governmental organisations (NGOs) or journalists. For example,
they argue that activists are not just individual targets, but, because
of their work, they have been targeted as a group.
 In the case of the release of demographically identifiable information
(DII) group privacy risks may occur.
Group Privacy
 Group privacy may be defined broadly as the interest a
group has in controlling the information privacy related to
the group.
 P. Mavriki, M. Karyda, Big Data analysis in political
communication: Implications for Group Privacy ,
International Journal of Electronic Governance, 2018.
Long-term implications for democracy:
obstructing the free flow of communication
 The “filter bubbles” which personalization tools induce,
obstruct the free flow of information, ideas, debates and
the communication between citizens and the power
holders of society.
 Consequently, the own opinion is reinforced, while the
ability to handle different points of view is reduced
facilitating in this way the polarization of society.
Long-term implications for democracy:
manipulation
 Content is selected for citizens on the basis of criteria unknown to
them and is calibrated not to their proximate selection decisions, but
to big data–generated assumptions about where those citizens
would want to focus their attention or where marketers need those
citizens’ attention to be focused.
 The “filter bubbles” and financial means of potent influencers
facilitates the spread of inaccurate, misleading or even wrong
information. They become increasingly personalized, manipulative,
and deceptive, spreading oversimplified messages or
misinformation.
Long-term implications for democracy:
fragmented political messages
 A party may highlight a different issue for each voter, so
each voter sees a different one-issue party. In this way,
microtargeting could lead to a biased perception
regarding the priorities of that party.
 Online political microtargeting could lead to a lack of
transparency about the party’s promises. Voters may not
even know a party’s views on many topics.
Long-term implications for democracy:
surveillance (1/2)
 Political rights are embodied in the unlimited validity of
the right to freedom of speech and opinion and freedom
of speech, expression, of association, etc.
 Privacy’s public value stems also from its importance to
the exercise of these political rights.
 Surveillance, may disrupt this structural dimension of a
democratic public sphere.
Long-term implications for
democracy: surveillance (2/2)
 One of the greatest harms occurring from mass
surveillance is the potential chilling effect on political
discourse, on the ability of both individuals and groups to
express their views and on the possibilities for
whistle‐blowing and democratic activism.
 New surveillance technologies can lead to “social
sorting,” where discrimination and privilege are
entrenched through the unplanned consequences of
data gathering and analysis.
Long-term implications for
democracy: power asymmetries
 The current ecosystem around big data creates a new kind of
digital divide: the big data rich and the big data poor.
 This environment favours incumbents who already are in the
possession of valuable data, also entrenched and moneyed
candidates within parties, as well as the data–rich among
existing parties.
 Data-driven campaigning might even be a form of
“cartelization” where large parties erect barriers to protect
their dominance from new entrants. The high expense of new
campaigning techniques is a significant disadvantage for
smaller and newer parties.
Overall conclusions
 Overall, parties and politicians try to discover, reach and
target influenceable potential supporters and voters.
 Consequently, the big data technologies they use, pose
new types of threats to voters’ privacy with multilevel
consequences such as the potential impact on
democracy.
Further research
 It seems that predictive analytics and automated decision-making
entail unique privacy risks and implications which need further
research.
 In addition, since big data analytics is blurring the boundaries
between individual and group data, there is a need for further
research related to the nature and the types of groups as entities.
 As personal data is the fuel of processes such as manipulation and
discrimination] there is a need for a broader and somewhat different
notion of data protection which might counter asymmetries brought
about by technology.
Thank you for your attention!

More Related Content

What's hot

Kim, M.J., & Park, H. W. (2012). Measuring Twitter-Based Political Participat...
Kim, M.J., & Park, H. W. (2012). Measuring Twitter-Based Political Participat...Kim, M.J., & Park, H. W. (2012). Measuring Twitter-Based Political Participat...
Kim, M.J., & Park, H. W. (2012). Measuring Twitter-Based Political Participat...Han Woo PARK
 
Foye 2015 THESIS
Foye 2015 THESISFoye 2015 THESIS
Foye 2015 THESISJohn Foye
 
Congressmen in the age of social network sites: Brazilian representatives and...
Congressmen in the age of social network sites: Brazilian representatives and...Congressmen in the age of social network sites: Brazilian representatives and...
Congressmen in the age of social network sites: Brazilian representatives and...Universidade Federal do Paraná
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataAnsgar Koene
 
Communication's Next Top Model
Communication's Next Top ModelCommunication's Next Top Model
Communication's Next Top ModelRachel Reis Mourao
 
Privacy and Personal Data Protection in Electronic Voting: Factors and Measures
Privacy and Personal Data Protection in Electronic Voting: Factors and MeasuresPrivacy and Personal Data Protection in Electronic Voting: Factors and Measures
Privacy and Personal Data Protection in Electronic Voting: Factors and MeasuresTELKOMNIKA JOURNAL
 
Government and e participation programs: A study of the challenges faced by i...
Government and e participation programs: A study of the challenges faced by i...Government and e participation programs: A study of the challenges faced by i...
Government and e participation programs: A study of the challenges faced by i...Universidade Federal do Paraná
 
From Broadcast to Netcast - PhD Thesis - Bonchek - 1997
From Broadcast to Netcast - PhD Thesis - Bonchek - 1997From Broadcast to Netcast - PhD Thesis - Bonchek - 1997
From Broadcast to Netcast - PhD Thesis - Bonchek - 1997Mark Bonchek
 
Social media and political campaigns
Social media and political campaignsSocial media and political campaigns
Social media and political campaignsJakeTucker10
 
The Intelligence Community
The Intelligence CommunityThe Intelligence Community
The Intelligence CommunityNicolae Sfetcu
 
Facebook ideologically diverse
Facebook ideologically diverseFacebook ideologically diverse
Facebook ideologically diverseNikki Usher
 
"Binders full of Tweets:" Twitter, gender and the 2012 elections
"Binders full of Tweets:" Twitter, gender and the 2012 elections"Binders full of Tweets:" Twitter, gender and the 2012 elections
"Binders full of Tweets:" Twitter, gender and the 2012 electionsRachel Reis Mourao
 

What's hot (20)

Asymmetric polarization
Asymmetric polarizationAsymmetric polarization
Asymmetric polarization
 
Monitoring of the Last US Presidential Elections
Monitoring of the Last US Presidential ElectionsMonitoring of the Last US Presidential Elections
Monitoring of the Last US Presidential Elections
 
Kim, M.J., & Park, H. W. (2012). Measuring Twitter-Based Political Participat...
Kim, M.J., & Park, H. W. (2012). Measuring Twitter-Based Political Participat...Kim, M.J., & Park, H. W. (2012). Measuring Twitter-Based Political Participat...
Kim, M.J., & Park, H. W. (2012). Measuring Twitter-Based Political Participat...
 
Foye 2015 THESIS
Foye 2015 THESISFoye 2015 THESIS
Foye 2015 THESIS
 
Congressmen in the age of social network sites: Brazilian representatives and...
Congressmen in the age of social network sites: Brazilian representatives and...Congressmen in the age of social network sites: Brazilian representatives and...
Congressmen in the age of social network sites: Brazilian representatives and...
 
Participant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived dataParticipant Consent and Withdrawal when using publicly archived data
Participant Consent and Withdrawal when using publicly archived data
 
Communication's Next Top Model
Communication's Next Top ModelCommunication's Next Top Model
Communication's Next Top Model
 
I love Big Bird
I love Big Bird I love Big Bird
I love Big Bird
 
Framing #VemPraRua
Framing #VemPraRuaFraming #VemPraRua
Framing #VemPraRua
 
Michael Brown as a news icon
Michael Brown as a news iconMichael Brown as a news icon
Michael Brown as a news icon
 
Senior Thesis
Senior Thesis Senior Thesis
Senior Thesis
 
Privacy and Personal Data Protection in Electronic Voting: Factors and Measures
Privacy and Personal Data Protection in Electronic Voting: Factors and MeasuresPrivacy and Personal Data Protection in Electronic Voting: Factors and Measures
Privacy and Personal Data Protection in Electronic Voting: Factors and Measures
 
Government and e participation programs: A study of the challenges faced by i...
Government and e participation programs: A study of the challenges faced by i...Government and e participation programs: A study of the challenges faced by i...
Government and e participation programs: A study of the challenges faced by i...
 
From Broadcast to Netcast - PhD Thesis - Bonchek - 1997
From Broadcast to Netcast - PhD Thesis - Bonchek - 1997From Broadcast to Netcast - PhD Thesis - Bonchek - 1997
From Broadcast to Netcast - PhD Thesis - Bonchek - 1997
 
IDIS399RoughDraft copy
IDIS399RoughDraft copyIDIS399RoughDraft copy
IDIS399RoughDraft copy
 
Social media and political campaigns
Social media and political campaignsSocial media and political campaigns
Social media and political campaigns
 
The Intelligence Community
The Intelligence CommunityThe Intelligence Community
The Intelligence Community
 
Facebook ideologically diverse
Facebook ideologically diverseFacebook ideologically diverse
Facebook ideologically diverse
 
"Binders full of Tweets:" Twitter, gender and the 2012 elections
"Binders full of Tweets:" Twitter, gender and the 2012 elections"Binders full of Tweets:" Twitter, gender and the 2012 elections
"Binders full of Tweets:" Twitter, gender and the 2012 elections
 
Judith Schossböck & Christina Neumayer - POLITICAL LURKERS? Young people in...
Judith Schossböck & Christina Neumayer  - POLITICAL LURKERS?  Young people in...Judith Schossböck & Christina Neumayer  - POLITICAL LURKERS?  Young people in...
Judith Schossböck & Christina Neumayer - POLITICAL LURKERS? Young people in...
 

Similar to Big data analytics: from threatening privacy to challenging democracy

Protecting elections from social media manipulationscience.s
Protecting elections from social media manipulationscience.sProtecting elections from social media manipulationscience.s
Protecting elections from social media manipulationscience.sjanekahananbw
 
Media in Authoritarian and Populist Times: Post Covid-19 scenario
Media in Authoritarian and Populist Times: Post Covid-19 scenarioMedia in Authoritarian and Populist Times: Post Covid-19 scenario
Media in Authoritarian and Populist Times: Post Covid-19 scenarioAI Publications
 
Impact of the Internet on politics.pdf
Impact of the Internet on politics.pdfImpact of the Internet on politics.pdf
Impact of the Internet on politics.pdfWajidKhanMP
 
Impact of the Internet on politics.pdf
Impact of the Internet on politics.pdfImpact of the Internet on politics.pdf
Impact of the Internet on politics.pdfWajid Khan MP
 
Impact of the Internet on politics.pdf
Impact of the Internet on politics.pdfImpact of the Internet on politics.pdf
Impact of the Internet on politics.pdfWajid Khan MP
 
The Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsThe Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsMSL
 
The Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsThe Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsMSL Germany
 
Running head EFFECT OF THE MEDIA ON POLITICS1EFFECT OF THE .docx
Running head EFFECT OF THE MEDIA ON POLITICS1EFFECT OF THE .docxRunning head EFFECT OF THE MEDIA ON POLITICS1EFFECT OF THE .docx
Running head EFFECT OF THE MEDIA ON POLITICS1EFFECT OF THE .docxtodd271
 
Week 3Rational and Expressive Choice Rational Choice The.docx
Week 3Rational and Expressive Choice  Rational Choice The.docxWeek 3Rational and Expressive Choice  Rational Choice The.docx
Week 3Rational and Expressive Choice Rational Choice The.docxmelbruce90096
 
The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...WindaDwiAstutiZebua
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and TerrorismAmanda Tapp
 
funding-of-political-parties-and-election-campaigns.pdf
funding-of-political-parties-and-election-campaigns.pdffunding-of-political-parties-and-election-campaigns.pdf
funding-of-political-parties-and-election-campaigns.pdfSwastariHaz
 
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...REVULN
 
1ESSAY 3 ASSIGNMENTFredrick Abimbola-petersProf. M
1ESSAY 3 ASSIGNMENTFredrick Abimbola-petersProf. M1ESSAY 3 ASSIGNMENTFredrick Abimbola-petersProf. M
1ESSAY 3 ASSIGNMENTFredrick Abimbola-petersProf. MAnastaciaShadelb
 
Fys debate research paper
Fys  debate research paper Fys  debate research paper
Fys debate research paper kdub970
 
Fys debate research paper
Fys  debate research paper Fys  debate research paper
Fys debate research paper kdub970
 
Ethical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docxEthical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docxtheodorelove43763
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts arearchiejones4
 
Digitizing the Social Contract
Digitizing the Social ContractDigitizing the Social Contract
Digitizing the Social Contractsailorv
 

Similar to Big data analytics: from threatening privacy to challenging democracy (20)

Protecting elections from social media manipulationscience.s
Protecting elections from social media manipulationscience.sProtecting elections from social media manipulationscience.s
Protecting elections from social media manipulationscience.s
 
Media in Authoritarian and Populist Times: Post Covid-19 scenario
Media in Authoritarian and Populist Times: Post Covid-19 scenarioMedia in Authoritarian and Populist Times: Post Covid-19 scenario
Media in Authoritarian and Populist Times: Post Covid-19 scenario
 
Impact of the Internet on politics.pdf
Impact of the Internet on politics.pdfImpact of the Internet on politics.pdf
Impact of the Internet on politics.pdf
 
Impact of the Internet on politics.pdf
Impact of the Internet on politics.pdfImpact of the Internet on politics.pdf
Impact of the Internet on politics.pdf
 
Impact of the Internet on politics.pdf
Impact of the Internet on politics.pdfImpact of the Internet on politics.pdf
Impact of the Internet on politics.pdf
 
The Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsThe Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public Affairs
 
The Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public AffairsThe Digital and Social Media Revolution in Public Affairs
The Digital and Social Media Revolution in Public Affairs
 
Running head EFFECT OF THE MEDIA ON POLITICS1EFFECT OF THE .docx
Running head EFFECT OF THE MEDIA ON POLITICS1EFFECT OF THE .docxRunning head EFFECT OF THE MEDIA ON POLITICS1EFFECT OF THE .docx
Running head EFFECT OF THE MEDIA ON POLITICS1EFFECT OF THE .docx
 
Week 3Rational and Expressive Choice Rational Choice The.docx
Week 3Rational and Expressive Choice  Rational Choice The.docxWeek 3Rational and Expressive Choice  Rational Choice The.docx
Week 3Rational and Expressive Choice Rational Choice The.docx
 
The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...
 
Big Data Analysis and Terrorism
Big Data Analysis and TerrorismBig Data Analysis and Terrorism
Big Data Analysis and Terrorism
 
funding-of-political-parties-and-election-campaigns.pdf
funding-of-political-parties-and-election-campaigns.pdffunding-of-political-parties-and-election-campaigns.pdf
funding-of-political-parties-and-election-campaigns.pdf
 
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...Yono REKSOPRODJO,  Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
Yono REKSOPRODJO, Fahmy YUSUF - Information Warfare in Cyberspace: The Sprea...
 
1ESSAY 3 ASSIGNMENTFredrick Abimbola-petersProf. M
1ESSAY 3 ASSIGNMENTFredrick Abimbola-petersProf. M1ESSAY 3 ASSIGNMENTFredrick Abimbola-petersProf. M
1ESSAY 3 ASSIGNMENTFredrick Abimbola-petersProf. M
 
Fys debate research paper
Fys  debate research paper Fys  debate research paper
Fys debate research paper
 
Fys debate research paper
Fys  debate research paper Fys  debate research paper
Fys debate research paper
 
Ethical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docxEthical Implications of Social Media Data Mining by Police.docx
Ethical Implications of Social Media Data Mining by Police.docx
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts are
 
Digitizing the Social Contract
Digitizing the Social ContractDigitizing the Social Contract
Digitizing the Social Contract
 
Science and society
Science and society Science and society
Science and society
 

More from Samos2019Summit

A Cross-Border Perspective in Data Exchange
A Cross-Border Perspective in Data ExchangeA Cross-Border Perspective in Data Exchange
A Cross-Border Perspective in Data ExchangeSamos2019Summit
 
Electronic Health (eHealth) Interoperability Challenges
Electronic Health (eHealth) Interoperability ChallengesElectronic Health (eHealth) Interoperability Challenges
Electronic Health (eHealth) Interoperability ChallengesSamos2019Summit
 
A Framework for eHealth Interoperability Management in Greece
A Framework for eHealth Interoperability Management in GreeceA Framework for eHealth Interoperability Management in Greece
A Framework for eHealth Interoperability Management in GreeceSamos2019Summit
 
Digital Government Assessment Methods
Digital Government Assessment MethodsDigital Government Assessment Methods
Digital Government Assessment MethodsSamos2019Summit
 
Ε-Democracy as Humanistic Communication
Ε-Democracy as Humanistic CommunicationΕ-Democracy as Humanistic Communication
Ε-Democracy as Humanistic CommunicationSamos2019Summit
 
Drafting Reports for Bill Voting using ManyLaws Platform
Drafting Reports for Bill Voting using ManyLaws PlatformDrafting Reports for Bill Voting using ManyLaws Platform
Drafting Reports for Bill Voting using ManyLaws PlatformSamos2019Summit
 
Legal Implications of data-driven decision making
Legal Implications of data-driven decision makingLegal Implications of data-driven decision making
Legal Implications of data-driven decision makingSamos2019Summit
 
Open Government Data for transparency, innovation and public engagement in so...
Open Government Data for transparency, innovation and public engagement in so...Open Government Data for transparency, innovation and public engagement in so...
Open Government Data for transparency, innovation and public engagement in so...Samos2019Summit
 
Digital Transformation of Public Administration
Digital Transformation of Public AdministrationDigital Transformation of Public Administration
Digital Transformation of Public AdministrationSamos2019Summit
 
Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Samos2019Summit
 
Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Samos2019Summit
 
Empowering Digital Direct Democracy: Policy making via Stance Classification
Empowering Digital Direct Democracy: Policy making via Stance ClassificationEmpowering Digital Direct Democracy: Policy making via Stance Classification
Empowering Digital Direct Democracy: Policy making via Stance ClassificationSamos2019Summit
 
Ethical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AIEthical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AISamos2019Summit
 
9th Session: Workshop IV on Science Base Creation in Digital Governance
9th Session: Workshop IV on Science Base Creation in Digital Governance9th Session: Workshop IV on Science Base Creation in Digital Governance
9th Session: Workshop IV on Science Base Creation in Digital GovernanceSamos2019Summit
 
TOOP project: Once Only Principle
TOOP project: Once Only PrincipleTOOP project: Once Only Principle
TOOP project: Once Only PrincipleSamos2019Summit
 
U4SSC: Blockchain for cities
U4SSC: Blockchain for citiesU4SSC: Blockchain for cities
U4SSC: Blockchain for citiesSamos2019Summit
 
Discussion on Training Needs about Entrepreneurship in digital government
Discussion on Training Needs about Entrepreneurship in digital governmentDiscussion on Training Needs about Entrepreneurship in digital government
Discussion on Training Needs about Entrepreneurship in digital governmentSamos2019Summit
 
Workshop II on a Roadmap to Future Government
Workshop II on a Roadmap to Future GovernmentWorkshop II on a Roadmap to Future Government
Workshop II on a Roadmap to Future GovernmentSamos2019Summit
 

More from Samos2019Summit (20)

A Cross-Border Perspective in Data Exchange
A Cross-Border Perspective in Data ExchangeA Cross-Border Perspective in Data Exchange
A Cross-Border Perspective in Data Exchange
 
Electronic Health (eHealth) Interoperability Challenges
Electronic Health (eHealth) Interoperability ChallengesElectronic Health (eHealth) Interoperability Challenges
Electronic Health (eHealth) Interoperability Challenges
 
A Framework for eHealth Interoperability Management in Greece
A Framework for eHealth Interoperability Management in GreeceA Framework for eHealth Interoperability Management in Greece
A Framework for eHealth Interoperability Management in Greece
 
Digital Government Assessment Methods
Digital Government Assessment MethodsDigital Government Assessment Methods
Digital Government Assessment Methods
 
Ε-Democracy as Humanistic Communication
Ε-Democracy as Humanistic CommunicationΕ-Democracy as Humanistic Communication
Ε-Democracy as Humanistic Communication
 
Drafting Reports for Bill Voting using ManyLaws Platform
Drafting Reports for Bill Voting using ManyLaws PlatformDrafting Reports for Bill Voting using ManyLaws Platform
Drafting Reports for Bill Voting using ManyLaws Platform
 
Legal Implications of data-driven decision making
Legal Implications of data-driven decision makingLegal Implications of data-driven decision making
Legal Implications of data-driven decision making
 
Open Government Data for transparency, innovation and public engagement in so...
Open Government Data for transparency, innovation and public engagement in so...Open Government Data for transparency, innovation and public engagement in so...
Open Government Data for transparency, innovation and public engagement in so...
 
Digital Transformation of Public Administration
Digital Transformation of Public AdministrationDigital Transformation of Public Administration
Digital Transformation of Public Administration
 
Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction
 
Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction Electronic Open and Collaborative Governance - An Introduction
Electronic Open and Collaborative Governance - An Introduction
 
Empowering Digital Direct Democracy: Policy making via Stance Classification
Empowering Digital Direct Democracy: Policy making via Stance ClassificationEmpowering Digital Direct Democracy: Policy making via Stance Classification
Empowering Digital Direct Democracy: Policy making via Stance Classification
 
Ethical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AIEthical Issues on eGovernment 3.0: Big Data and AI
Ethical Issues on eGovernment 3.0: Big Data and AI
 
9th Session: Workshop IV on Science Base Creation in Digital Governance
9th Session: Workshop IV on Science Base Creation in Digital Governance9th Session: Workshop IV on Science Base Creation in Digital Governance
9th Session: Workshop IV on Science Base Creation in Digital Governance
 
TOOP project: Once Only Principle
TOOP project: Once Only PrincipleTOOP project: Once Only Principle
TOOP project: Once Only Principle
 
U4SSC: Blockchain for cities
U4SSC: Blockchain for citiesU4SSC: Blockchain for cities
U4SSC: Blockchain for cities
 
Discussion on Training Needs about Entrepreneurship in digital government
Discussion on Training Needs about Entrepreneurship in digital governmentDiscussion on Training Needs about Entrepreneurship in digital government
Discussion on Training Needs about Entrepreneurship in digital government
 
Workshop II on a Roadmap to Future Government
Workshop II on a Roadmap to Future GovernmentWorkshop II on a Roadmap to Future Government
Workshop II on a Roadmap to Future Government
 
Government 3.0 Roadmap
Government 3.0 RoadmapGovernment 3.0 Roadmap
Government 3.0 Roadmap
 
Big Policy Canvas
Big Policy CanvasBig Policy Canvas
Big Policy Canvas
 

Recently uploaded

User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationColumbia Weather Systems
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubaikojalkojal131
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptArshadWarsi13
 
Bioteknologi kelas 10 kumer smapsa .pptx
Bioteknologi kelas 10 kumer smapsa .pptxBioteknologi kelas 10 kumer smapsa .pptx
Bioteknologi kelas 10 kumer smapsa .pptx023NiWayanAnggiSriWa
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPirithiRaju
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPirithiRaju
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...Universidade Federal de Sergipe - UFS
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayupadhyaymani499
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingNetHelix
 
Functional group interconversions(oxidation reduction)
Functional group interconversions(oxidation reduction)Functional group interconversions(oxidation reduction)
Functional group interconversions(oxidation reduction)itwameryclare
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Four Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptFour Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptJoemSTuliba
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxJorenAcuavera1
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringPrajakta Shinde
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 

Recently uploaded (20)

Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
User Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather StationUser Guide: Magellan MX™ Weather Station
User Guide: Magellan MX™ Weather Station
 
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In DubaiDubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
Dubai Calls Girl Lisa O525547819 Lexi Call Girls In Dubai
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
 
Bioteknologi kelas 10 kumer smapsa .pptx
Bioteknologi kelas 10 kumer smapsa .pptxBioteknologi kelas 10 kumer smapsa .pptx
Bioteknologi kelas 10 kumer smapsa .pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyay
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editingBase editing, prime editing, Cas13 & RNA editing and organelle base editing
Base editing, prime editing, Cas13 & RNA editing and organelle base editing
 
Functional group interconversions(oxidation reduction)
Functional group interconversions(oxidation reduction)Functional group interconversions(oxidation reduction)
Functional group interconversions(oxidation reduction)
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
 
Four Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptFour Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.ppt
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptx
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical Engineering
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 

Big data analytics: from threatening privacy to challenging democracy

  • 1. Big data analytics: from threatening privacy to challenging democracy Paola Mavriki, PhD Candidate, pmavriki@aegean.gr Maria Karyda, Associate Professor, mka@aegean.gr Department of Information and Communication Systems Engineering, University of the Aegean
  • 2. Focus of presentation  What are the privacy threats stemming from the use of big data for political purposes?  What is their impact on democracy?
  • 3. The research work  Identifies and investigates privacy threats stemming from the use of big data for political communication,  argues that mechanisms are required to protect the privacy interests of groups as in the case of the release of demographically identifiable information (DDI) for example.  Focusing on the European landscape and the democratic value of privacy the research work shows that main features of democracy such as election fairness and pluralism of views may be undermined through big data techniques.
  • 4. Background: The professionalization of political communication  The online dimension of election campaigning is the latest phase in the professionalization of political communication.  The Internet is changing the way campaigns strategize and communicate with their constituents.  Persuadable voters are identified by profiling and targeted through various personalisation methods.  Political branding is gaining increased attention.
  • 5. The European digital political landscape  Despite the differences between the European countries and US, there are common trends such as the intensive use of new ICTs and a marketing-oriented strategy of campaigns.  There are several examples proving the integration of the Internet and marketing tools in the political communication in European democracies:  in the 2007 Finnish general election for instance, political marketing procedures have been used for targeting young voters,  in the 2003, 2006, 2010 and 2012 Catalan elections technological advances were used by the political parties,  in the 2016 Brexit referendum behavioral science, big data analysis and ad targeting have been used by the “ Vote Leave” campaign.
  • 6. The democratic value of privacy (1/2)  In political democracies, ‘privacy provides opportunities for political expression and criticism, political choice, and freedom from unreasonable police interference; it provides opportunities for people and organizations to prepare and discuss matters in private…’ (Westin, 1967).  Privacy is a fundament of our democracy, because without privacy people might exercise power to influence others (Janssen and van den Hoven, 2015).  Privacy allows us to form our political, democratic selves (Voice, 2016).
  • 7. The democratic value of privacy (2/2)  Privacy is essential to the maintenance of democracy because it ensures that citizens are able to hold elected governments to account and place limits on the expansion of the state. Privacy’s public value also stems from its importance to the exercise of political rights (Regan, 1995).  Individuals need to be free to share those thoughts with others without being subject to the watchful, possibly critical, eye of the state (Goold, 2010).
  • 8. Privacy threats related to surveillance (1/3)  Contemporary ubiquitous systems gather vast amounts of information about people accumulating a large amount of personal information in new ways with new technologies.  Public transport smart cards, smartphones, digital payment systems, smart wearable devices for tracking biometrics, Wi-Fi providers having access to geolocation and internet browsing practices, Facebook tracking users’ likes and preferences, Google tracking browsing and searches, credit card use, car GPS systems, are some examples of the new ways of monitoring people’s activities.
  • 9. Privacy threats related to surveillance (2/3)  For the observed, surveillance can lead to self- censorship and inhibition.  Surveillance ‘threatens not only to chill the expression of eccentric individuality, but also, gradually, to dampen the force of our aspirations to it’ (Solove, 2003).  Surveillance inhibits freedom of choice, impinging upon self-determination. It also creates a trail of information about a person.
  • 10. Privacy threats related to surveillance (3/3)  Surveillance impedes one’s anonymity, inhibits one’s freedom to associate with others, and alters one’s freedom of movement.  Surveillance’s inhibitory effects are especially potent when people are engaging in political protest or dissent.  People can face persecution, public sanction, and blacklisting for their unpopular political beliefs.  Surveillance can make associating with disfavored groups and causes all the more difficult and precarious.
  • 11. Privacy threats related to predictions (1/3)  Machine learning technologies become increasingly pervasive in behavioral prediction.  Campaigns need accurate predictions about the preferences of voters, their expected behaviors, and their responses to campaign outreach.  Big data technologies allows practitioners, researchers, policy analysts, and others to predict the spread of opinions, political trends, etc.  Campaigns may use data to construct predictive models to make targeting communication more efficient .
  • 12. Privacy threats related to predictions (2/3)  Based on existing publicly available information, big data analysis tools can generate a predictive model of what has a high probability of being PII, essentially imagining an individual’s data.  Kosinski’s (2013) method for example, is able to predict political party affiliation about 85 percent using only Facebook “likes”.
  • 13. Privacy threats related to predictions (3/3)  Deducing extensive information from digital footprints and the kinds of predictions that can be made from this are far too vast and complex, and are evolving too quickly, for people to fully assess the involved risks.  A person may leave behind in several years thousands of pieces of data which does not affect her/him negatively. As time passes, data analytic techniques improve, and a newly created algorithm may process the previously harmless digital footprints and deduce harmful information.
  • 14. Privacy threats related to automated profiling (1/2)  stem from the accumulation of personal data: fragments of data regarding an individual user may be linked peace by peace until an individual profile is entirely expose,  aggregation:  may cause dignitary harms because of how it unsettles expectations.  can lead to power asymmetries, as it can increase the power that others have over individuals.  moreover, data compilations may be both telling and incomplete.
  • 15. Privacy threats related to automated profiling (2/2)  In the case decisions are taken based on data mining and profiling, undesirable discrimination may occur,  In political context, a person may be profiled inaccurately as an extremist movement or party adherent or supporter.
  • 16. Group Privacy threats related to automated profiling (3/3)  New technologies and powerful analytics collect and analyse large amounts of data in order to identify patterns in the behaviour of groups, communities and even entire countries.  Some are concerned about the privacy of specific groups such as non-governmental organisations (NGOs) or journalists. For example, they argue that activists are not just individual targets, but, because of their work, they have been targeted as a group.  In the case of the release of demographically identifiable information (DII) group privacy risks may occur.
  • 17. Group Privacy  Group privacy may be defined broadly as the interest a group has in controlling the information privacy related to the group.  P. Mavriki, M. Karyda, Big Data analysis in political communication: Implications for Group Privacy , International Journal of Electronic Governance, 2018.
  • 18. Long-term implications for democracy: obstructing the free flow of communication  The “filter bubbles” which personalization tools induce, obstruct the free flow of information, ideas, debates and the communication between citizens and the power holders of society.  Consequently, the own opinion is reinforced, while the ability to handle different points of view is reduced facilitating in this way the polarization of society.
  • 19. Long-term implications for democracy: manipulation  Content is selected for citizens on the basis of criteria unknown to them and is calibrated not to their proximate selection decisions, but to big data–generated assumptions about where those citizens would want to focus their attention or where marketers need those citizens’ attention to be focused.  The “filter bubbles” and financial means of potent influencers facilitates the spread of inaccurate, misleading or even wrong information. They become increasingly personalized, manipulative, and deceptive, spreading oversimplified messages or misinformation.
  • 20. Long-term implications for democracy: fragmented political messages  A party may highlight a different issue for each voter, so each voter sees a different one-issue party. In this way, microtargeting could lead to a biased perception regarding the priorities of that party.  Online political microtargeting could lead to a lack of transparency about the party’s promises. Voters may not even know a party’s views on many topics.
  • 21. Long-term implications for democracy: surveillance (1/2)  Political rights are embodied in the unlimited validity of the right to freedom of speech and opinion and freedom of speech, expression, of association, etc.  Privacy’s public value stems also from its importance to the exercise of these political rights.  Surveillance, may disrupt this structural dimension of a democratic public sphere.
  • 22. Long-term implications for democracy: surveillance (2/2)  One of the greatest harms occurring from mass surveillance is the potential chilling effect on political discourse, on the ability of both individuals and groups to express their views and on the possibilities for whistle‐blowing and democratic activism.  New surveillance technologies can lead to “social sorting,” where discrimination and privilege are entrenched through the unplanned consequences of data gathering and analysis.
  • 23. Long-term implications for democracy: power asymmetries  The current ecosystem around big data creates a new kind of digital divide: the big data rich and the big data poor.  This environment favours incumbents who already are in the possession of valuable data, also entrenched and moneyed candidates within parties, as well as the data–rich among existing parties.  Data-driven campaigning might even be a form of “cartelization” where large parties erect barriers to protect their dominance from new entrants. The high expense of new campaigning techniques is a significant disadvantage for smaller and newer parties.
  • 24. Overall conclusions  Overall, parties and politicians try to discover, reach and target influenceable potential supporters and voters.  Consequently, the big data technologies they use, pose new types of threats to voters’ privacy with multilevel consequences such as the potential impact on democracy.
  • 25. Further research  It seems that predictive analytics and automated decision-making entail unique privacy risks and implications which need further research.  In addition, since big data analytics is blurring the boundaries between individual and group data, there is a need for further research related to the nature and the types of groups as entities.  As personal data is the fuel of processes such as manipulation and discrimination] there is a need for a broader and somewhat different notion of data protection which might counter asymmetries brought about by technology.
  • 26. Thank you for your attention!