IT PARK
    Most Popular

    What is the difference between cloud computing and virtualization?

    May 30, 2023

    Uncover 10 big data myths

    May 24, 2023

    Four advantages are highlighted, and cloud computing is the trend

    May 28, 2023

    IT PARK IT PARK

    • Home
    • Encyclopedia

      Why does the phone turn off when the remaining battery is not zero

      Jun 05, 2023

      Internet era! How to prevent personal information leakage

      Jun 04, 2023

      Which one to choose for mobile power? Analysis of the three major types of battery cells

      Jun 03, 2023

      What is IMEI code

      Jun 02, 2023

      Mobile phone battery is not durable? 14 tips to extend battery life

      Jun 01, 2023
    • AI

      What is the core issue of AI technology?

      Jun 05, 2023

      How to prove you're human in the AI jungle?

      Jun 04, 2023

      What is AI?

      Jun 03, 2023

      Microsoft for ChatGPT self-research AI chip, TSMC 5nm, as early as next year to open with

      Jun 02, 2023

      Will the latest AI "kill" programming

      Jun 02, 2023
    • Big Data

      Talking about data lake and data warehouse

      Jun 05, 2023

      To read big data, you have to master these core technologies first

      Jun 04, 2023

      Your privacy, how does big data know

      Jun 03, 2023

      Accurate data is more important than more data in the healthcare industry

      Jun 02, 2023

      Has the development of big data come to an end?

      Jun 01, 2023
    • CLO

      Major Cloud Computing Service Providers

      Jun 05, 2023

      On the Importance of Cloud Access Security Agent CASB

      Jun 04, 2023

      The importance of cloud technology for agile supply chain

      Jun 03, 2023

      The importance of financial governance in cloud computing

      Jun 02, 2023

      Building a Smart City: The Importance of Cloud Storage

      Jun 01, 2023
    • IoT

      Seven ways for the Internet of Things to play a role in e-commerce

      Jun 05, 2023

      The role of IoT devices in intelligent workplace technology

      Jun 04, 2023

      What is the Internet of Things

      Jun 03, 2023

      How does the Internet of Things affect business?

      Jun 02, 2023

      What are the key factors that enterprises need to consider when designing IoT devices?

      Jun 01, 2023
    • Blockchain

      Explanation of the consensus mechanism of blockchain

      Jun 05, 2023

      Introduction to Blockchain 4.0

      Jun 04, 2023

      Blockchain insulation, the universe is open

      Jun 03, 2023

      Blockchain technology helps track new crown virus

      Jun 02, 2023

      Blockchain Foundation - What is Blockchain Technology

      Jun 02, 2023
    IT PARK
    Home » Big Data » Your privacy, how does big data know
    Big Data

    Your privacy, how does big data know

    On the Internet, everyone leaks certain fragments of information more or less, either actively or passively. When this information is mined by big data, there is a risk of privacy leakage and raises information security issues.
    Updated: Jun 03, 2023
    Your privacy, how does big data know

    On the Internet, everyone leaks certain fragments of information more or less, either actively or passively. This information is mined by big data, there is a risk of privacy leakage, raising the issue of information security. So, your privacy, how does big data know about it? And how should we protect ourselves?

      "known, unknown" big data know

    Big Data era, no matter what you have said, done, or the disease you have suffered, or your hobbies, etc., you know, it almost knows, at least, it will know sooner or later!

    Even what you don't know, Big Data may know. Further, it is still possible for Big Data to know what will happen in the future. For example, big data has successfully predicted the results of World Cup matches, stock fluctuations, price trends, user behavior, traffic conditions, etc.

      data mining is like "garbage disposal"

    What is big data? Figuratively speaking, it is a lot of strange data, jumbled together. Each person, each communication and control equipment, whether it is software or hardware, in fact, are the source of big data.

    Big Data uses a technique called "Big Data Mining", which mines information using methods such as neural networks, genetic algorithms, decision trees, rough sets, overlaying positive exclusion counterexamples, statistical analysis, fuzzy sets, and so on.

    The process of big data mining can be divided into eight steps: data collection, data integration, data statute, data cleaning, data transformation, mining analysis, pattern evaluation, and knowledge representation. These high-sounding big data industries are almost equivalent to garbage disposal and scrap recycling.

    Look at the raw material structure again. Big data is heterogeneous in nature. If you have to find out the essential difference between garbage and big data, it lies in the fact that garbage is physical and has limited reuse; while big data is virtual and can be processed and used repeatedly.

      There is no end to big data mining

    Big data mining, although it can create value in a positive way, but also has its negative impact, that is, there is the risk of leaking privacy. How is privacy leaked?

    In a sense, big data mining is a special "human search" done automatically by the machine. The purpose of this search, however, is no longer limited to discrediting or glorifying someone, but has a broader purpose, such as finding the best buyer for a seller of a product, finding patterns in certain types of data, finding connections between certain things, and so on.

    The iterative process continues as usual, except that the machine iterates more often and faster, and each iteration is actually a "learning" process for the machine. The final "satisfactory portrait" of the users is replaced by a temporary mining result. The reason why it is temporary is that there is no end to big data mining, the results will become more and more accurate, the degree of intelligence will become higher and higher, the user only needs to choose the satisfactory results according to their own criteria, at any time on the line.

      privacy protection and data mining dangers and opportunities coexist

    It must be admitted that in front of big data mining, the current human is a bit overwhelmed, which is indeed an accident. Since the birth of the Internet, in the past few decades, people have spared no effort to keep fragments of information online forever. Each of these fragments, although completely harmless, could not be realized by anyone, or at least not deliberately concerned, when the many harmless fragments fused together, surprisingly the consequences are endless!

    However, there is no need to worry too much. On the whole, human beings are in an advantageous position in terms of their own privacy protection, and "privacy leakage" was not a prominent issue before the network of big data mining. However, now humans need to face a difficult problem - how to protect the privacy of the huge amount of fragmented information left online in the past?

    A multi-pronged approach is needed. From a management perspective, malicious big data search practices are detected, and the necessary supervision and control are exercised. In addition, when necessary, the concept of "privacy" needs to be reshaped, after all, "privacy" itself is an agreed concept related to time, place, nationality, culture and so on.

    For personal online behavior, how to not leave too much personal information on the Internet as much as possible? The answer is two words: anonymity! As long as you do a good job of anonymity, you can, to a certain extent, protect your privacy.

    big data privacy Breach
    Previous Article Who owns the copyright of the paintings created by AI for you?
    Next Article What is Qualcomm three carrier aggregation

    Related Articles

    Big Data

    Benefits of big data analysis and how to analyze big data

    May 28, 2023
    IoT

    IoT success story: deriving value from sensor data

    May 30, 2023
    Big Data

    Types of Big Data Analytics Data

    May 25, 2023
    Most Popular

    What is the difference between cloud computing and virtualization?

    May 30, 2023

    Uncover 10 big data myths

    May 24, 2023

    Four advantages are highlighted, and cloud computing is the trend

    May 28, 2023
    Copyright © 2023 itheroe.com. All rights reserved. | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.