SlideShare a Scribd company logo
CHAPTER 8
BIG DATA AND PRIVACY
Sarah Pearson, Danny Kelly,
Danielle Voelkel, Renny
Chutiangtrong & Ope Atilola
Intro:
Do you think Government should have control on our privacy?
Apple Vs FBI
Privacy Development
-The concept of privacy was conceived by Cooley (1888).
-Then theorized by Warren and Brandeis (1890)
-Later developed in law by Brandeis as a right.
-The Electronic Communications Privacy Act of 1986
Top Social Media Site Privacy Policies
Twitter
Facebook
Google +
Instagram
Top Social Media Site Privacy Policies
LinkedIn
Tumblr
Vine
Snapchat
https://www.youtube.com/watch?v=sIFfYxgDpRo
Big Data is an extremely large data sets that may be analyzed
computationally to reveal patterns, trends, and associations,
especially relating to human behavior and interactions.
Big Data and Privacy
-Personal data as a currency
-Identity theft
-Search history is targeted on Facebook
-What you buy, where you go using GPS, this is all tracked
-”Big Brother”
FTC Regulation
-Federal Trade Commision (FTC)
-Strongest privacy protections
-Privacy by Design
-consumer privacy protection
-limit data collection
-Greater transparency
Privacy & Legal Implications
Social Media Communication Privacy
-Pressure on Large social media Platform
Commercialization of social media
-Present ongoing privacy.
Blogger & Traditional Journalist
-Private stories & Attracting reader
Privacy & legal Implication
Tracy Solomon-Blogger
Social Norm Of privacy WILL evolve
-Data Protection
-NO anonymity
-User Must Rely on Business & Government
Discussion Questions
1. How have your expectations for personal privacy changed if at all in the age of social
media?
2. What are your most concerns?
3. What are the significant implications for privacy based upon use of mobile
smartphone and tablet access to social media sites
4. What areas might lead to Litigation (resolving a dispute in court) or changes in law.

More Related Content

What's hot

Cyber law
Cyber lawCyber law
Cyber law
Azmawati Lazim
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the Cloud
Jim Adler
 
Ap comparative brazil privacy
Ap comparative brazil privacyAp comparative brazil privacy
Ap comparative brazil privacy
MariaElenaGB
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
amitmitkar
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
Lilian Edwards
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
Brian Rowe
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
Azmawati Lazim
 
Pecha Kucha Script
Pecha Kucha ScriptPecha Kucha Script
Pecha Kucha Script
panayimedia
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
Adam Thierer
 
Trending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingTrending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted Marketing
cdasLLP
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
Brian Rowe
 
The internet
The internetThe internet
The internet
Reginawal
 
Regulating code
Regulating codeRegulating code
Regulating code
blogzilla
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
Nicholas Davis
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
lilianedwards
 

What's hot (15)

Cyber law
Cyber lawCyber law
Cyber law
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the Cloud
 
Ap comparative brazil privacy
Ap comparative brazil privacyAp comparative brazil privacy
Ap comparative brazil privacy
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...Police surveillance of social media - do you have a reasonable expectation of...
Police surveillance of social media - do you have a reasonable expectation of...
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
 
Pecha Kucha Script
Pecha Kucha ScriptPecha Kucha Script
Pecha Kucha Script
 
Privacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key IssuesPrivacy & the Internet: An Overview of Key Issues
Privacy & the Internet: An Overview of Key Issues
 
Trending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted MarketingTrending Topics in Data Collection & Targeted Marketing
Trending Topics in Data Collection & Targeted Marketing
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
The internet
The internetThe internet
The internet
 
Regulating code
Regulating codeRegulating code
Regulating code
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 

Viewers also liked

Chapter 3 presentation
Chapter 3 presentation Chapter 3 presentation
Chapter 3 presentation
voelkeld
 
Sejarah penyiaran
Sejarah penyiaranSejarah penyiaran
Sejarah penyiaran
ANNAM YES
 
Principios de química
Principios de químicaPrincipios de química
Principios de química
candela matheu
 
Introducción
IntroducciónIntroducción
Introducción
Mary Gonrobles
 
Syntheseconclusies dossier Santens/AG
Syntheseconclusies dossier Santens/AGSyntheseconclusies dossier Santens/AG
Syntheseconclusies dossier Santens/AG
stopmisbruikverzekeringen
 
manigandan Resume
manigandan Resumemanigandan Resume
manigandan Resume
MANIGANDAN SAGADEVAN
 
Bioquimica eddy
Bioquimica eddyBioquimica eddy
Guerra civil y franquismo
Guerra civil y franquismoGuerra civil y franquismo
Guerra civil y franquismo
AleMar1815
 
Training methods
Training methodsTraining methods
Training methods
Jerome Princy
 
Wikihow howtomakespaghetti
Wikihow   howtomakespaghettiWikihow   howtomakespaghetti
Wikihow howtomakespaghetti
voelkeld
 
Local Energy & Microgrids Conference 2016
Local Energy & Microgrids Conference  2016 Local Energy & Microgrids Conference  2016
Local Energy & Microgrids Conference 2016
TransGrid AU
 
Final High Springs Development Plan-1 (1)
Final High Springs Development Plan-1 (1)Final High Springs Development Plan-1 (1)
Final High Springs Development Plan-1 (1)
Erin Dinkel
 
Slidesharetest
SlidesharetestSlidesharetest
Slidesharetest
voelkeld
 
How to give students control of their data
How to give students control of their dataHow to give students control of their data
How to give students control of their data
Erwin Bomas
 
Query Processing with k-Anonymity
Query Processing with k-AnonymityQuery Processing with k-Anonymity
Query Processing with k-Anonymity
Waqas Tariq
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Tore Hoel
 
Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...
Tore Hoel
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
Malinka Ivanova
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
Danno320
 
Wikihow howtomakespaghetti
Wikihow   howtomakespaghettiWikihow   howtomakespaghetti
Wikihow howtomakespaghetti
Danno320
 

Viewers also liked (20)

Chapter 3 presentation
Chapter 3 presentation Chapter 3 presentation
Chapter 3 presentation
 
Sejarah penyiaran
Sejarah penyiaranSejarah penyiaran
Sejarah penyiaran
 
Principios de química
Principios de químicaPrincipios de química
Principios de química
 
Introducción
IntroducciónIntroducción
Introducción
 
Syntheseconclusies dossier Santens/AG
Syntheseconclusies dossier Santens/AGSyntheseconclusies dossier Santens/AG
Syntheseconclusies dossier Santens/AG
 
manigandan Resume
manigandan Resumemanigandan Resume
manigandan Resume
 
Bioquimica eddy
Bioquimica eddyBioquimica eddy
Bioquimica eddy
 
Guerra civil y franquismo
Guerra civil y franquismoGuerra civil y franquismo
Guerra civil y franquismo
 
Training methods
Training methodsTraining methods
Training methods
 
Wikihow howtomakespaghetti
Wikihow   howtomakespaghettiWikihow   howtomakespaghetti
Wikihow howtomakespaghetti
 
Local Energy & Microgrids Conference 2016
Local Energy & Microgrids Conference  2016 Local Energy & Microgrids Conference  2016
Local Energy & Microgrids Conference 2016
 
Final High Springs Development Plan-1 (1)
Final High Springs Development Plan-1 (1)Final High Springs Development Plan-1 (1)
Final High Springs Development Plan-1 (1)
 
Slidesharetest
SlidesharetestSlidesharetest
Slidesharetest
 
How to give students control of their data
How to give students control of their dataHow to give students control of their data
How to give students control of their data
 
Query Processing with k-Anonymity
Query Processing with k-AnonymityQuery Processing with k-Anonymity
Query Processing with k-Anonymity
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...
 
Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Wikihow howtomakespaghetti
Wikihow   howtomakespaghettiWikihow   howtomakespaghetti
Wikihow howtomakespaghetti
 

Similar to Chapter 8 big data and privacy

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
Carolina Rossini
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
College Papers Writing Service
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
Emerson Bryan
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulation
cjw119
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
caniceconsulting
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
Bradley Buchanan
 
Internet Privacy
Internet PrivacyInternet Privacy
The #BigData Dilemna
The #BigData Dilemna The #BigData Dilemna
The #BigData Dilemna
Vivendi Content
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Christina Gagnier
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
Kimberly Gonzalez
 
Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?
FLUZO
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
Chris Marsden
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
NANDI AYANA
 
Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?
ANSItunCERT
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
caniceconsulting
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
Lilian Edwards
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
Lilian Edwards
 

Similar to Chapter 8 big data and privacy (19)

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Big data privacy security regulation
 Big data privacy security regulation Big data privacy security regulation
Big data privacy security regulation
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Data Mining: Privacy and Concerns
Data Mining: Privacy and ConcernsData Mining: Privacy and Concerns
Data Mining: Privacy and Concerns
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
The #BigData Dilemna
The #BigData Dilemna The #BigData Dilemna
The #BigData Dilemna
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?Access now : Data Protection: What you should know about it?
Access now : Data Protection: What you should know about it?
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
The death of data protection sans obama
The death of data protection sans obamaThe death of data protection sans obama
The death of data protection sans obama
 
The death of data protection
The death of data protection The death of data protection
The death of data protection
 

Recently uploaded

On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
AJHSSR Journal
 
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
exqfuhe
 
Facebook Fan Page Profits to boost your profits today!
Facebook Fan Page Profits  to boost your profits today!Facebook Fan Page Profits  to boost your profits today!
Facebook Fan Page Profits to boost your profits today!
Rohit Gupta
 
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGESTACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
AJHSSR Journal
 
SOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and serviceSOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and service
viralbusinessmarketi
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
Elysian Digital Services Pvt. Ltd.
 
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
aoxfo
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
anubug
 
Satta Matka Dpboss Kalyan Fix Game matka
Satta Matka Dpboss Kalyan Fix Game matkaSatta Matka Dpboss Kalyan Fix Game matka
Using Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch TimeUsing Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch Time
SocioCosmos
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
AJHSSR Journal
 
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
tohufue
 
TSF - Task 1 - Digital Marketing : Social Media
TSF - Task 1 - Digital Marketing  : Social MediaTSF - Task 1 - Digital Marketing  : Social Media
TSF - Task 1 - Digital Marketing : Social Media
JayaBharne2
 
ChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdfChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdf
almutabbil
 
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
wozek1
 

Recently uploaded (15)

On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
On Storytelling & Magic Realism in Rushdie’s Midnight’s Children, Shame, and ...
 
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
一比一原版(CSULB毕业证)加州州立大学长滩分校毕业证如何办理
 
Facebook Fan Page Profits to boost your profits today!
Facebook Fan Page Profits  to boost your profits today!Facebook Fan Page Profits  to boost your profits today!
Facebook Fan Page Profits to boost your profits today!
 
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGESTACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
TACKLING ILLEGAL LOGGING: PROBLEMS AND CHALLENGES
 
SOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and serviceSOCIAL MEDIA MARKETING agency and service
SOCIAL MEDIA MARKETING agency and service
 
Top Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's PerformanceTop Google Tools for SEO: Enhance Your Website's Performance
Top Google Tools for SEO: Enhance Your Website's Performance
 
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)拉夫堡大学毕业证如何办理
 
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
一比一原版(AU毕业证)英国阿伯丁大学毕业证如何办理
 
Satta Matka Dpboss Kalyan Fix Game matka
Satta Matka Dpboss Kalyan Fix Game matkaSatta Matka Dpboss Kalyan Fix Game matka
Satta Matka Dpboss Kalyan Fix Game matka
 
Using Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch TimeUsing Playlists to Increase YouTube Watch Time
Using Playlists to Increase YouTube Watch Time
 
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
CYBER SECURITY ENHANCEMENT IN NIGERIA. A CASE STUDY OF SIX STATES IN THE NORT...
 
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
一比一原版(uon毕业证书)澳洲纽卡斯尔大学毕业证如何办理
 
TSF - Task 1 - Digital Marketing : Social Media
TSF - Task 1 - Digital Marketing  : Social MediaTSF - Task 1 - Digital Marketing  : Social Media
TSF - Task 1 - Digital Marketing : Social Media
 
ChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdfChatGPT 4o for social media step by step Guide.pdf
ChatGPT 4o for social media step by step Guide.pdf
 
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
一比一原版(UCSD毕业证)加利福尼亚大学圣迭戈分校毕业证如何办理
 

Chapter 8 big data and privacy

  • 1. CHAPTER 8 BIG DATA AND PRIVACY Sarah Pearson, Danny Kelly, Danielle Voelkel, Renny Chutiangtrong & Ope Atilola
  • 2. Intro: Do you think Government should have control on our privacy? Apple Vs FBI
  • 3. Privacy Development -The concept of privacy was conceived by Cooley (1888). -Then theorized by Warren and Brandeis (1890) -Later developed in law by Brandeis as a right. -The Electronic Communications Privacy Act of 1986
  • 4. Top Social Media Site Privacy Policies Twitter Facebook Google + Instagram
  • 5. Top Social Media Site Privacy Policies LinkedIn Tumblr Vine Snapchat
  • 7. Big Data is an extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.
  • 8. Big Data and Privacy -Personal data as a currency -Identity theft -Search history is targeted on Facebook -What you buy, where you go using GPS, this is all tracked -”Big Brother”
  • 9. FTC Regulation -Federal Trade Commision (FTC) -Strongest privacy protections -Privacy by Design -consumer privacy protection -limit data collection -Greater transparency
  • 10. Privacy & Legal Implications Social Media Communication Privacy -Pressure on Large social media Platform Commercialization of social media -Present ongoing privacy. Blogger & Traditional Journalist -Private stories & Attracting reader
  • 11. Privacy & legal Implication Tracy Solomon-Blogger Social Norm Of privacy WILL evolve -Data Protection -NO anonymity -User Must Rely on Business & Government
  • 12. Discussion Questions 1. How have your expectations for personal privacy changed if at all in the age of social media? 2. What are your most concerns? 3. What are the significant implications for privacy based upon use of mobile smartphone and tablet access to social media sites 4. What areas might lead to Litigation (resolving a dispute in court) or changes in law.

Editor's Notes

  1. Renny
  2. Renny
  3. Sarah
  4. Danielle
  5. Renny
  6. Danny
  7. Danny
  8. Ope
  9. Ope