preview

Preventing Theft Is Just The Tip Of The Iceberg

Decent Essays

Data Privacy - Preventing Theft is Just the Tip of the Iceberg.
Many people have started to become aware of the issues of data security and identity theft, but what they should really be worried about is the way data is used legally. The following talks about data gathering and gives 5 examples of how this data can be used for, or against you. Although the examples are local in nature, they are being replicated on a global scale. If you live in the modern world, then you will eventually be impacted.
Big Brother: Chinese social credit score
China has always been known to keep tight control over its population through media control, and the judicious application of social pressure. A dossier is maintained for every citizen, which …show more content…

This is a particularly clever and insidious form of Orwellian control. It is the people around you who willingly help by apply the pressure to make you conform (Hatton, 2015 & Stanley. 2015 & Yap, Wong,. 2015).
Data Gathering: You are the Product.
Google: Most people have no clue as to the sheer scope and volume of data being collected. Mention you are having money problems in your Google mail account and you might get credit counseling ads. Visit medical site and you might start getting medical ads. All this information is available for sale. Where you shop, what you buy, everything you have ever written and perhaps read. This data can be used to extrapolate personal information you would never expose directly. I would never allow anyone to open my mail. Why is it legal for them to open my email.
Other sources: Everyone it seems is into the data gathering business, banks, credit cards, search engines, operation systems etc.. It 's big money and everyone wants in on the action.
Data Analytics: Profiling Customer
Data analytics involves the study of data for a group of people. They extract historic patterns in the computer data like purchases, web sites, credit scores, social media posts etc. This data comes from a myriad of sources as listed above. Using these patterns they can create profiles for these groups and identify new members and predict their

Get Access