logo

Big Data Privacy

   

Added on  2023-01-23

16 Pages4236 Words78 Views
Running head: BIG DATA PRIVACY
Big Data Privacy
Name of the Student
Name of the University
Author’s Note:
Big Data Privacy_1
1
BIG DATA PRIVACY
Table of Contents
1. Introduction...............................................................................................................2
2. Discussion................................................................................................................2
2.1 Importance of Big Data Privacy in Social Media.................................................4
2.2 Advantages of Big Data Technologies and Privacy in Social Media..................6
2.3 Issues faced due to Big Data Privacy in Social Media Technology...................8
3. Conclusion..............................................................................................................10
4. Recommendations for Future Issues related to Big Data Privacy.........................11
References.................................................................................................................13
Big Data Privacy_2
2
BIG DATA PRIVACY
1. Introduction
Big data is stated as a field that mainly treats several methods for better
analysis, systematic extraction of information and even dealing with those data sets,
which are extremely complex and large in size and could not be dealt with the
traditional application software of data processing (Constantiou & Kallinikos, 2015).
These big data is also categorised by 3V or data volume, variety and velocity. The
first V or volume refers to the extreme or huge volume of data and it is measured
that how big is the respective data set.
The second V or variety discusses about wide or broad distinctive data variety
types and finally the third V or velocity refers to the significant velocity at which the
data would be managed by subsequent user. Big data is extremely safe and secured
and hence it is being used by several organizations and businesses for effectively
dealing with their data set complexity (Chen, Chiang & Storey, 2012). The following
research report outlines a brief discussion on the application of big data privacy in
social media. The importance, advantages and disadvantages of big data privacy
would be described in this research report. Moreover, suitable recommendations will
also be provided here.
2. Discussion
Definition of Big Data Privacy
Big data is termed as the proper utilization of user behaviour analytics,
predictive analytics as well as any other advanced methodologies of data analytics,
which can easily extract value from data for any particular size of data set. A proper
analysis of these data sets could easily search for new correlations for spotting the
business trends, prevention of diseases, combating crime and many more (Sagiroglu
Big Data Privacy_3
3
BIG DATA PRIVACY
& Sinanc, 2013). The data sets majorly grow rapidly as they are gradually and
increasingly gathered with the help of cheap as well as numerous information
sensing IoT or internet of things like wireless sensor network, RFID or radio
frequency identification reader, software log, mobile device, microphone, camera
and remote sensor.
Voluminous data could come from several sources like mobile applications,
business transaction system, medical record, social network, customer database,
internet click stream log, machine generated data, real time data sensor utilized in
the environments of IoT or internet of things. Since big data can deal with large data
sets, which comprise of more complex and varied structure, it is required to consider
the privacy and security aspects of this particular technology as well (Kallinikos &
Constantiou, 2015). The incrementing big data amount even increments a high
breaching chance for individual privacy and security. Numerous parties are
eventually included in such distributed systems and hence the threat for privacy
violation is highly incremented (Sharma, Mithas & Kankanhalli, 2014).
There are several mechanisms for privacy preservation that are developed for
privacy protection at various stages such as generation of data, storage of data and
finally processing of data within the entire life cycle of big data (Wu et al., 2014). As
this particular technology of big data easily and promptly reveals the hidden patterns
and even identifies secret correlations, privacy issues are required to be considered
majorly. Due to the recent development in technology, the amount of generated data
by health care applications, internet connection, sensor network, social networking
site and several others are incrementing on a regular basis (Xu et al., 2014). The
potential privacy breach is also increased in this sector and with subsequent power
Big Data Privacy_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Big Data Privacy
|20
|2146
|67

Big Data Privacy
|13
|1019
|49

Big Data Privacy
|16
|4547
|78

Big Data for Healthcare
|16
|3961
|2

Big Data Analysis: Characteristics, Challenges, Techniques, and Business Support
|10
|2028
|297

Communication Network Security | Assignment
|13
|2909
|158