On the Internet, everyone leaks certain fragments of information more or less, either actively or passively. This information is mined by big data, there is a risk of privacy leakage, raising the issue of information security. So, your privacy, how does big data know about it? And how should we protect ourselves?
"known, unknown" big data know
Big Data era, no matter what you have said, done, or the disease you have suffered, or your hobbies, etc., you know, it almost knows, at least, it will know sooner or later!
Even what you don't know, Big Data may know. Further, it is still possible for Big Data to know what will happen in the future. For example, big data has successfully predicted the results of World Cup matches, stock fluctuations, price trends, user behavior, traffic conditions, etc.
data mining is like "garbage disposal"
What is big data? Figuratively speaking, it is a lot of strange data, jumbled together. Each person, each communication and control equipment, whether it is software or hardware, in fact, are the source of big data.
Big Data uses a technique called "Big Data Mining", which mines information using methods such as neural networks, genetic algorithms, decision trees, rough sets, overlaying positive exclusion counterexamples, statistical analysis, fuzzy sets, and so on.
The process of big data mining can be divided into eight steps: data collection, data integration, data statute, data cleaning, data transformation, mining analysis, pattern evaluation, and knowledge representation. These high-sounding big data industries are almost equivalent to garbage disposal and scrap recycling.
Look at the raw material structure again. Big data is heterogeneous in nature. If you have to find out the essential difference between garbage and big data, it lies in the fact that garbage is physical and has limited reuse; while big data is virtual and can be processed and used repeatedly.
There is no end to big data mining
Big data mining, although it can create value in a positive way, but also has its negative impact, that is, there is the risk of leaking privacy. How is privacy leaked?
In a sense, big data mining is a special "human search" done automatically by the machine. The purpose of this search, however, is no longer limited to discrediting or glorifying someone, but has a broader purpose, such as finding the best buyer for a seller of a product, finding patterns in certain types of data, finding connections between certain things, and so on.
The iterative process continues as usual, except that the machine iterates more often and faster, and each iteration is actually a "learning" process for the machine. The final "satisfactory portrait" of the users is replaced by a temporary mining result. The reason why it is temporary is that there is no end to big data mining, the results will become more and more accurate, the degree of intelligence will become higher and higher, the user only needs to choose the satisfactory results according to their own criteria, at any time on the line.
privacy protection and data mining dangers and opportunities coexist
It must be admitted that in front of big data mining, the current human is a bit overwhelmed, which is indeed an accident. Since the birth of the Internet, in the past few decades, people have spared no effort to keep fragments of information online forever. Each of these fragments, although completely harmless, could not be realized by anyone, or at least not deliberately concerned, when the many harmless fragments fused together, surprisingly the consequences are endless!
However, there is no need to worry too much. On the whole, human beings are in an advantageous position in terms of their own privacy protection, and "privacy leakage" was not a prominent issue before the network of big data mining. However, now humans need to face a difficult problem - how to protect the privacy of the huge amount of fragmented information left online in the past?
A multi-pronged approach is needed. From a management perspective, malicious big data search practices are detected, and the necessary supervision and control are exercised. In addition, when necessary, the concept of "privacy" needs to be reshaped, after all, "privacy" itself is an agreed concept related to time, place, nationality, culture and so on.
For personal online behavior, how to not leave too much personal information on the Internet as much as possible? The answer is two words: anonymity! As long as you do a good job of anonymity, you can, to a certain extent, protect your privacy.