Abstract
Big Data is currently a hot topic in the field of technology, and many campuses are considering the addition of this topic into their undergraduate courses. Big Data tools are not just playing an increasingly important role in many commercial enterprises; they are also combining with new digital devices to dramatically change privacy. This article will argue that it is absurd to teach about Big Data in our classes without discussing its effect on privacy in our society.
Get full access to this article
View all access options for this article.
References
1.American Civil Liberties Union. (2015). Stingray tracking devices: Who’s got them? Retrieved from https://www.aclu.org/maps/stingray-tracking-devices-whos-got-them .
2.
Andrews
L.
(2011 ) I know who you are and I saw what you did , New York, NY : Free Press .
3.Beckett, L. (2014). Everything we know about what data brokers know about you. Retrieved from http://www.propublica.org/article/everything-we-know-about-what-data-brokers-know-about-you .
4.Bennett, W. (2014). Civilian drones, privacy, and the federal-state balance. Retrieved from http://www.brookings.edu/research/reports2/2014/09/civilian-drones-and-privacy .
5.Bob in accounting is going to fix currency rates, I’ll tell Jamie Dimon. (2015, April 13). Bloomberg Business Week , pp. 34–35 .
6.Conroy, P., Milano, F., Narula, A., & Singhal, R. (2014). Building consumer trust. Retrieved from http://d2mtr37y39tpbu.cloudfront.net/wp-content/uploads/2014/11/DUP_970-Building-consumer-trust_MASTER.pdf .
7.Cook, J. (2014). FBI director: China has hacked every big US company. Retrieved from http://www.businessinsider.com/fbi-director-china-has-hacked-every-big-us-company-2014-10 .
8.
de Montjoye
Y.
Radaelli
L.
Singh
V. K.
Pentland
A.
(2015 ) Unique in the shopping mall: On the reidentifiability of credit card metadata . Science 347 (6221 ): 536 –539 .
9.Dixon, H. (2015). Managing your online identity. Retrieved from http://www.slideshare.net/HelenDixon1/managing-your-online-reputation-advice-for-school .
10.Ellis, B. (2014). Identity fraud hits a new victim every two seconds. Retrieved from http://money.cnn.com/2014/02/06/pf/identity-fraud/ .
11.Fact Sheet on the “right-to ‘be’ forgotten” ruling. (2014). Retrieved from http://ec.europa.eu/justice/data-protection/files/factsheets/factsheet_data_protection_en.pdf .
12.
Garfinkel
S.
(2001 ) Database nation: The death of privacy in the 21st century , Sebastopol, CA : O’Reilly & Associates .
13.Grasz, J. (2014). Number of employers passing on applicants due to social media posts continues to rise. Retrieved from http://www.careerbuilder.com/share/aboutus/pressreleasesdetail.aspx?sd=6%2F26%2F2014&id=pr829&ed=12%2F31%2F2014 .
14.Greenberg, A. (2015). Court rules cellphone data belongs to your phone carrier, not you. Retrieved from http://www.slate.com/blogs/future_tense/2015/05/06/blow_to_cellphone_privacy_flip_flop_court_case_says_data_belongs_to_your.html .
15.
Gymrek
M.
McGuire
A. L.
Golan
D.
Halperin
E.
Yaniv Erlich
Y.
(2013 ) Identifying personal genomes by surname inference . Science 339 : 321 –324 .
16.Hachman, M. (2015). You’ll pay more for privacy with AT&T’s gigabit broadband. Retrieved from http://www.pcworld.com/article/2885163/youll-pay-more-for-privacy-with-atandts-gigabit-broadband.html .
17.Heller, M. (2014). Spokeo decision may expand consumer FCRA rights. Retrieved from http://www.consumereagle.com/2014/03/06/spokeo-decision-may-expand-consumer-fcra-rights/ .
18.Jolie, A. (2013). My medical choice. Retrieved from http://www.nytimes.com/2013/05/14/opinion/my-medical-choice.html .
19.Krotoski, A. (2012). Online identity: Is authenticity or anonymity more important? Retrieved from http://www.theguardian.com/technology/2012/apr/19/online-identity-authenticity-anonymity .
20.
Landau
S.
(2013 ) Control use of data to protect privacy . Science 347 (6221 ): 504 –506 .
21.Lewis, P. (2013). Snowden documents show NSA gathering 5bn cell phone records daily. Retrieved from http://www.theguardian.com/world/2013/dec/04/nsa-storing-cell-phone-records-daily-snowden .
22.Lomas, N. (2015). What happens to privacy when the internet is in everything? Retrieved from http://techcrunch.com/2015/01/25/what-happens-to-privacy-when-the-internet-is-in-everything/ .
23.Madden, M. (2014). Public perceptions of privacy and security in the Post-Snowden Era. Retrieved from http://www.pewinternet.org/files/2014/11/PI_PublicPerceptionsofPrivacy_111214.pdf .
24.Narayanan, A., & Shmatikov, V. (2008) Robust de-anonymization of large sparse datasets. Retrieved from https://www.cs.utexas.edu/∼shmat/shmat_oak08netflix.pdf .
25.
Pence
H. E.
(2015 ) What is big data and why is it important? Journal of Educational Technology Systems 43 (2 ): 159 –171 .
26.Quick, M., Hollowood, E., Miles, C., & Hampson, D. (2015). World’s biggest data breaches. Retrieved from http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ .
27.
Richards
N.
(2015 ) Intellectual privacy: Rethinking civil liberties in the digital age , New York, NY : Oxford University Press .
28.Risk and reward. (2015, March 14). The Economist , pp. 71–73 .
29.Savage, C., & Weisman, J. (2015). N.S.A. Collection of bulk call data is ruled illegal. Retrieved from http://www.nytimes.com/2015/05/08/us/nsa-phone-records-collection-ruled-illegal-by-appeals-court.html?_r=0 .
30.Sengupta, S. (2013). No U.S. action, so states move on privacy law. Retrieved from http://www.nytimes.com/2013/10/31/technology/no-us-action-so-states-move-on-privacy-law.html?_r=1 .
31.Singer, N. (2012). Mapping and sharing, the consumer genome. Retrieved from http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?ref=natashasinger&_r=1 .
32.Smith, S. (2014). Google approves 41.6% of right to be forgotten requests. Retrieved from http://www.imediaethics.org/google-approves-41-6-of-right-to-be-forgotten-requests/ .
33.
Sofge
E.
Coburn
D.
(2012 ) Who’s spying on you? , New York, NY : Hearst Books .
34.Stetler, B. (2011). Upending anonymity, these days the web unmasks everyone. Retrieved from http://www.nytimes.com/2011/06/21/us/21anonymity.html?_r=1 .
35.Stock, M. (2015). Microchips implanted under the skin of office workers. Retrieved from https://www.youtube.com/watch?v=NBTK8cFajYE&utm_content=buffer9c3ef&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer .
36.Suellentrop, C. (2014). Can video games survive? Retrieved from http://www.nytimes.com/2014/10/26/opinion/sunday/the-disheartening-gamergate-campaign.html?_r=1 .
37.Swinhoe, D. (2013). Data, cloud, government: The dangers of data sovereignty. Retrieved from http://www.idgconnect.com/blog-abstract/856/dan-swinhoe-global-data-cloud-government-the-dangers-of-data-sovereignty .
38.The truth about smartphone apps that secretly connect to user tracking and ad sites. (2015). Retrieved from http://www.technologyreview.com/view/537186/the-truth-about-smartphone-apps-that-secretly-connect-to-user-tracking-and-ad-sites/ .
39.Tufekoi, Z. (2015). The machines are coming. Retrieved from http://www.nytimes.com/2015/04/19/opinion/sunday/the-machines-are-coming.html?_r=1 .
40.Wilshusen, G. C. (2013). Cybersecurity: A better defined and implemented national strategy is needed to address persistent challenges. Retrieved from http://www.gao.gov/assets/660/652817.pdf .
41.Wolf, R. (2014). Justices’ cellphone privacy ruling may have broad impact. Retrieved from http://www.usatoday.com/story/news/nation/2014/07/20/supreme-court-cellphone-privacy-nsa-terrorism/12779997/?siteID=je6NUbpObpQ-ss5nFDWp.CsIOYPY84xTmw .
42.Zernike, K. (2012). Jury finds spying in Rutgers Dorm was a hate crime. New York Times . Retrieved from http://www.nytimes.com/2012/03/17/nyregion/defendant-guilty-in-rutgers-case.html?_r=0 .
43.Zimmer, M. (2010). Facebook’s Zuckerberg: “Having two identities for yourself is an example of a lack of integrity.” Retrieved from http://www.michaelzimmer.org/2010/05/14/facebooks-zuckerberg-having-two-identities-for-yourself-is-an-example-of-a-lack-of-integrity/ .
