Big data privacy: The datafication of personal information

  title={Big data privacy: The datafication of personal information},
  author={Jens-Erik Mai},
  journal={The Information Society},
  pages={192 - 199}
  • J. Mai
  • Published 1 May 2016
  • Computer Science
  • The Information Society
ABSTRACT In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These… 

Profiling with Big Data: Identifying Privacy Implication for Individuals, Groups and Society

This paper identifies and investigates privacy threats that stem from data-driven profiling using a multi-level approach: individual, group and society, to analyze the privacy implications stemming from the generation of new knowledge used for automated predictions and decisions.

Situating Personal Information : Privacy in the Algorithmic

This chapter discusses and problematize the notion of personal information as it is formed in the age of algorithms, datafication, and big data and explores the basic assumption that informational privacy is about the protection ofpersonal information.

Privacy attitudes and behaviors in the age of post-privacy:

The aim is to determine whether and to what extent the recorded concerns about the violation of privacy intersects with a growing acceptance of its very absence.

Three Models of Privacy: New Perspectives on Informational Privacy

The title of this panel suggests that perspective is important and it is proposed that a different model of privacy is needed when it comes to big data and digital media, namely a datafication model of informational privacy.

Can the obstacles to privacy self-management be overcome? Exploring the consent intermediary approach

It is argued that simply bringing consent decisions under one interface offers limited help, but that the potential of this approach lies in leveraging the intermediary position to provide aides for privacy management, and it is found that some of the more practical obstacles can become solvable, while others remain fundamentally insuperable within the individuated privacy self-management model.

Online Personalization in the Age of Big Data

This research updates the personalization privacy trade-off for consumers to the era of Big Data, where personalization is becoming more sophisticated and concerns for manipulation and discrimination

Big Data's Impact on Privacy for Librarians and Information Professionals

Big data can be beneficial to libraries in many ways, and if pointed at library systems, rather than the habits of patrons, can also keep privacy intact.

Between Privacy Protection and Data Progression - The GDPR in the Context of People Analytics

New analytical capabilities have revolutionized the field of Human Resources (HR). With the incessant creation of data and data sources, a new field of practice has developed: people

Big Data in Public Health: Terminology, Machine Learning, and Privacy.

The ethical implications of the big data revolution with particular emphasis on maintaining appropriate care for privacy in a world in which technology is rapidly changing social norms regarding the need for (and even the meaning of) privacy are considered.

Pedigree-ing Your Big Data: Data-Driven Big Data Privacy in Distributed Environments

  • A. CuzzocreaE. Damiani
  • Computer Science
    2018 18th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID)
  • 2018
This paper introduces a general framework for supporting data-driven privacy-preserving big data management in distributed environments, such as emerging Cloud settings, and provides a relevant realization of the framework above, the so-called Data-dRIven aggregate-PROvenance privacy Preserving big Multidimensional data (DRIPROM) framework, which specifically considers multiddimensional data as the case of interest.



Privacy Self-Management and the Consent Dilemma

In this Article, several ways privacy law can grapple with the consent dilemma and move beyond relying too heavily on privacy self-management are proposed.

Introduction: Privacy Self-Management and the Consent Dilemma

The goal of this bundle of rights is to provide people with control over their personal data, and through this control people can decide for themselves how to weigh the costs and benefits of the collection, use, or disclosure of their information.

“But the data is already public”: on the ethics of research in Facebook

  • M. Zimmer
  • Computer Science
    Ethics and Information Technology
  • 2010
Ethical concerns that must be addressed before embarking on future research in social networking sites are addressed, including the nature of consent, properly identifying and respecting expectations of privacy on social network sites, strategies for data anonymization prior to public release, and the relative expertise of institutional review boards when confronted with research projects based on data gleaned from social media.

Privacy in Context - Technology, Policy, and the Integrity of Social Life

Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social context, be it workplace, health care, schools, or among family and friends.

The Ontological Interpretation of Informational Privacy

  • L. Floridi
  • Computer Science
    Ethics and Information Technology
  • 2006
A change in the authors' ontological perspective, brought about by digital ICTs, suggests considering each person as being constituted by his or her information and hence regarding a breach of one's informational privacy as a form of aggression towards one’s personal identity.

An Ethical Duty to Protect One's Own Information Privacy?

People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical)

The crisis of consent: how stronger legal protection may lead to weaker consent in data protection

The effectiveness of consent in data protection legislation is examined and stricter legal requirements for giving and obtaining consent (explicit consent) as proposed in the European Data protection regulation will further weaken the effectiveness of the consent mechanism.

Surveillance and Capture: Two Models of Privacy

  • P. Agre
  • Computer Science
    Inf. Soc.
  • 1994
Two models of privacy issues are contrasted: the surveillance model employs visual metaphors and derives from historical experiences of secret police surveillance and the less familiar capture model employs linguistic metaphors.

Subjectivity and information ethics

This paper proposes some answers by investigating the meaning and role of subjectivity in information ethics, and proposes a triangular model of self, organization, and context (or environment) to capture the three facets of most ethical situations.

In Pursuit of Privacy: Law, Ethics, and the Rise of Technology

I would recommend this book as a valuable resource for teachers of management ethics and those seeking ethical management knowledge and applications for use in a wider variety of management teaching