Big Data
A term to describe the ubiquitous collection of data about individuals from a multitude of sources, coupled with new storage, data mining, and predictive techniques.
It is challenging to apply the FIPPs to Big Data because…
There may not be a clear understanding of how the data is used, and advanced analytics may fall outside the scope of the original purpose of collection.
Moore’s Law (1975)
The notion that the number of transistors on a circuit board doubles every 18 to 24 months.
Translates to big data which, as of 2025, doubles by 12 hours.
Three problematic characteristics of Big Data
“Friends and Family” Test
When creating a big data base, would data managers want themselves or their loved ones information in it?
Which two Fair Information Practice Principles are particularly important to Big Data?
“Data Minimization” and “De- Identification”
Direct Identifiers
Data that identifies an individual with little or no additional effort.
Indirect Identifiers
Data (such as gender or age) that can increase the likelihood of identifying an individual.
Pseudonymous Data
When direct identifiers have been eliminated, but indirect identifiers remain in tact.
De-Identified Data
When direct and known indirect identifiers have been removed.
Anonymous Data
When direct and indirect identifiers have been removed for technically manipulated to prevent re-identification.
Blurring
This technique reduces the precision of disclosed data to reduce the certainty of individual identification.
Masking
Replacing the original values in a data set.
(ex. perturbation)
Differential Privacy
Uses a mathematical approach to ensure the risk to an individuals privacy is not substantially increased as a result of being part of a data base.
3 products offered by data brokers, according to the FTC:
FTC suggestions to data brokers:
Internet of Things
FTC definition of “Internet of Things”
Devices or sensors (other than computers, smartphones, or tablets) that connect, communicate, or transmit information with or between each other through the internet.
Notable “Internet of Things” Characteristics
Internet of Things Cybersecurity Concerns
1.) Limited used interfaces in products
2.) Lack of industry experience with privacy and cybersecurity
3.) Lack of industry incentives to deploy updates after the product has been purchased
4.) Limitation of the devices, like hardware security
Privacy concerns regarding wearables:
2017 FTC advice to smart watch consumers
Which federal agencies have all considered regulating connected cars?
Smart Cities
Municipalities and other government entities using sensors to monitor functions and improve government functions.