Big Data Privacy: Balancing Personalization and Data Protection

Verified

Added on  2023/06/05

|19
|4957
|121
Report
AI Summary
This report addresses the critical issue of privacy in the context of big data, exploring the tension between the increasing demand for personalized online experiences and the need to protect sensitive user data. It highlights vulnerabilities that lead to data leaks, often resulting from misconfigured applications or unforeseen side effects rather than malicious intent. The report discusses the role of database management systems in mitigating cyber threats and ensuring national security, and also examines the evolution of database technologies, contrasting traditional relational models with NoSQL and NewSQL databases. Furthermore, it touches on the impact of computers on modern society, the rise of cybercrime, and measures for users to protect themselves against cyberbullying and other online threats. The report concludes by emphasizing the importance of balancing technological advancements with robust privacy and security measures to safeguard individuals and national infrastructure.
Document Page
BIG DATA
PRIVACY 1 1
Big data privacy: Privacy versus personalization, customers want more customization when
frequently visiting their favorite online store but that comes at a price of privacy.
Name of student
Institution
Date of submission
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BIG DATA PRIVACY 2
Table of Contents
Framing the problem........................................................................................................................3
Framing the solution........................................................................................................................4
Concept development......................................................................................................................8
Invention of computes and their effects to the modern society.................................................8
Commercialization Plan.................................................................................................................15
Bank fraud detection system..........................................................................................................17
References......................................................................................................................................18
Document Page
BIG DATA PRIVACY 3
Framing the problem
Privacy vulnerabilities are regularly reported by media and research whereby sensitive
data leaks to the public domain. Most of these incidences occur as a result of data being
infiltrated maliciously by specific malware. Leaks in most cases do not happen because of
malicious intent by the application’s author but rather as a result of mis-configuration of these
particular applications or side effects that are unexpected. The problem is that applications can
have the ability to exfiltrate the private data of a user and supply or send it out to some different
server.
In the current world, smartphones have grown to be an integral part of most people's
daily lives, most if not all people use their smartphones on a regular basis. Heightened
technology use, therefore, has facilitated the efficiency with which primary and recurrent tasks
are carried out. Essential among these essential functions and necessities is security. More
specifically, personal protection at homes and private property is an imperative need (Oulasvirta,
2012). Most people have endeavored to acquire the best security mechanisms to safeguard their
properties. Principal among these security measures is locked. These locks are operated by keys
which have proven to be quite exhaustive, prone to break-ins and even misplacement hence the
significant need for more efficient locks.
Cyber risks are threats that come from a globally connected network like the internet.
Cybersecurity, therefore, can mitigate cyber risk to acceptable levels and limit the impact. The
safety of a nation is of great concern to the government and its citizens (Maillart, 2010). Threats
such as wars, terrorism, cyber attacks or espionage can significantly affect national security.
Document Page
BIG DATA PRIVACY 4
It is the responsibility of the government to protect the state and citizens against all forms
threats or attacks. Governments employ some measures to ensure national security: use of the
armed forces, diplomacy, intelligence services to avoid risk and resilience of critical
infrastructure. The safety of a country is very vital to the peace, stability and economic growth of
a nation.
Cyber terrorism and attacks have negative implications for the security of the national
infrastructure. Cyber terrorism refers to use of computer networks to crumple critical
infrastructures such as transport, energy and government functions. High dependence on the
computer networks poses vulnerabilities to nations. The vulnerabilities can be exploited by
hostile groups to disrupt critical services (Taylor R. F., 2014). Cyber warfare against
infrastructure may be targeted to cause power outages, flight delays, and communication
disruptions.
Framing the solution
Computer attacks result to different effect on the computer. Physical attacks affect the
reliability of the machine and availability of data. The electronic attack erases the electronic
memory, upsets the software and permanently disables the electronic components. The computer
network attack disrupts the integrity of data through a malicious code.
The database management system offers solutions to cyber and national security in many
ways. A data management system is comprised of team members’ assigned different tasks. A
data collector collects different sets of data and stores data collected in a management data
storehouse. Data analyzer inspects, cleanses, models and transforms data to determine useful
information. Project director manages and oversees both the information technology project and
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BIG DATA PRIVACY 5
project team members. Database designer is responsible for designing of a logical and physical
design of the database management system (O'Brien, 2015). The computing staff is responsible
for storing and backup of data.
The fundamental role of big data integration in Big Data has conceived the need for an
intensive research on some factors that may come as a challenge for this integration. One of
these factors is the Schema mapping where Schema mapping can be briefly described as a data
integration structure that aids in the establishment of a universal schema while assisting in the
location of the mappings that exist in between the universal schemas and the limited schemas
(Tankard, 2012). Thus determining which of the schemas mentioned above contain the same data
or information. A schema can be defined generally as a system that allows the user to structure
any piece of data received even the most unstructured amount of data which is a requirement
before one is able to use this data. There are two types of schemas, the "schema on read" and the
schema on write which is the most popular and efficient type of schema that is used.
The NoSQL which is an abbreviation of Not Only SQL database is advancement to a
database design that accommodates a wide array of information models that may include
columnar, document, key-value and graph formats (McCreary, 2014). This term can also be used
as a general depiction of almost all non-relational technologies adopted and used for data
management. The NoSQL is usually seen as a substitute for the traditionally interrelated
databases due to their differing approaches in some sectors. The traditional relational databases
involve a tabular placement of data, and a vigilant designing of data schema prior to the
construction of a database (Okman, 2011)
Document Page
BIG DATA PRIVACY 6
The most current innovation that is seen to be intimidating this dominance is the NoSQL
database which has raised a rather controversial subject with many researchers quoting the
decline and a possible end in an era of relational models. Relational models in their development,
their initial function were the administration of structured data which required additional systems
that would first structure these unstructured tracts of data. This simplicity has been a source of
criticism for the whole model with critics advocating for the development of a model that will
eliminate this need of structuring data something that the NoSQL provides for the user (Zaki,
2014). These criticisms are one of the few reasons that some programmers are said to have
foreseen the abandonment of these relational database systems, which leads us to the NoSQL. A
brief insight into the NoSQL and how the system functions will help us to find out what edge it
has over the relational database systems.
.
The human resource sector is the other area that may be vastly affected by the proposed
change in the database management system. This is due to the fact that most of these companies
have based their present and intended skill set on these systems and thus an overhaul would
cause stagnation in the day to day activities, of most of these companies for a long time as they
look to change these systems.
In relation to this, there is also the NewSQL that has cemented the relational database
management systems in the modern field of technology. The NewSQL can be defined as a rank
of up to date relational database management systems whose primary function is the provision of
performance models that level up to those of the NoSQL systems. The NewSQL developers
aimed to achieve this by incorporating online transaction processing read and write workloads
Document Page
BIG DATA PRIVACY 7
similar to those of the NoSQL while still involving the Atomicity, consistency, isolation and
durability guarantees that were offered in the traditional relational database models. The term
New SQL was first coined in 2011 where it was used to describe the modern class of database
systems that were said to challenge to the then established vendors Oracle, IBM, and Microsoft.
The figure below shows how Oracle’s NoSQL Database fits into a data-cycle ecosystem.
Source (McCreary, 2014)
To understand the improvements that have been done to the system and how the
system is different from the previous SQL the improvements have to be analyzed in three
categories. First is the novel system which majorly incorporates new architecture in the sense
that these novel systems which are the new DBMS models are built from scratch. A clear insight
on this reveals that developers opted to come up with new code bases which are very
distinguished from the ones used in the NoSQL systems and the SQL systems. This kind of
innovation has proved to have one core advantage over the other Database management systems;
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BIG DATA PRIVACY 8
one of the very few features that distinguish NewSQL systems from the others is the fact that all
the segments of the model can be optimized for multi-node environments.
Concept development
Invention of computes and their effects to the modern society
Computers have evolved in functionality and design for the past 19th century. Since the
invention of the computer, there have been various uses that it has helped human beings to
perform better. For instance, the early supercomputers were used in the manipulation and storage
of data. They were mostly used by scientists to record relevant data and analyse it using
sophisticated algorithms. In the 21st century, there has been a tremendous growth of the
technology sector. Computers have continued to be redesigned and better programs designed to
TypesofDataScalingDatabases&the2PCProtocolTheCAPTheoremandtheBASEPropertiesNoSQLDatabases
Document Page
BIG DATA PRIVACY 9
be installed on the computers. Concerning the design, it is clear that there has been a great
evolution in the size of computers availed for personal or commercial use. The use of Android
phones, tablets and laptop computers has gained popularity in the mid-90s and the entire 21st
century. The availability of computer gadgets in the society has helped many people to perform
tasks efficiently and effectively easily. However, there are various drawbacks that ace computer
developers and users. According to Carr “The Net’s interactivity gives us powerful new tools for
finding information, expressing ourselves, and conversing with others (Carr, 2010, p. 117). It
also turns us into lab rats constantly pressing levers to get tiny pellets of social or intellectual
nourishment.
Cybercrime is a primary problem that affects computer users globally. The rise of hackers
in the 21st century can be attributed to the high level of coding abilities by malicious individuals.
There are those individuals that only work on their computers to harass other computer users
(Taylor, 2014). Sometimes, users may be held ransom when a hacker accesses their important
information. The United States of America, Russia, Japan, and China are some of the major
countries that harbor a large number of professional hackers. Cybercrime is gaining popularity,
and some computer hackers have turned to online crimes as a way of making their daily
earnings. This paper will focus on discussing some of the cyber crimes that are existent in the
world of technology today. Also, the paper will give an insight into the various methods that
users can use to protect themselves from cyber crimes in the long run.
Cyberbullying: According to statistics presented by technological researchers, it is
indicated that most computer users in the world are subjected to cyberbullying. Usually, this is a
type of crime that involves one person who might present himself as being anonymous
continually harasses another computer user. The primary motive of cyberbullying is cited as to
Document Page
BIG DATA PRIVACY 10
instill fear into the victim. Cyberbullying may be executed in for of sending texts to the user that
make them feel embarrassed or creates fear within them. Also, it could involve sharing
incriminating pictures of an individual (Slonje, 2009). This is an occurrence that has been
witnessed over the years. This is when the hackers threaten an individual that they would share
the important information about them in the form of pictures, texts or emails if they do not do
what they are requested to do. Cyberbullying is rampant among new computer users. The main
attributive facto to this is that the new computer users do not have the required skills to protect
their networks from hackers. This means that such users are prone to be harassed many times by
malicious hackers. Cyberbullying has also been cited as causing trauma and stress to many of the
victims.
Phishing: This is another major cybercrime that affects computer users. According to
research, it is indicated that phishing involves the use of fake emails with particular links aimed
at collecting personal information of a victim. The personal information collected through this
criminal act may include usernames and passwords (Wu, 2014). The hackers are smart in
creating catchy emails and sending them to victims. The unaware victims sometimes may get
tempted to open the malicious emails and to click on the links attached. Through this way, the
hackers are then able to collect information about the user in two shakes of a lamb’s tail. The
hackers may then use the information to ask for ransom from the victim’s failure to which the
information may be misused for other criminal activities.
Hacking: this is the most common of all types of cybercrimes. Hacking involves
unauthorized access to other people's computers and using them as one's own. Also, it may
include the stealing of websites and computer networks. When conducting hacking, it requires
that the hacker to be an expert in creating an algorithm that would surpass the security measures
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BIG DATA PRIVACY 11
installed by the victims. Through this way, the hacker can secretly access the computers remotely
and operate them as they wish. This crime could lead to loss of finance among other important
contents of business of personal content.
Spreading hate and terrorism; In most countries, incitement is considered as being a
criminal act. There are well laid down rules and regulations by which every citizen of a country
is required to abide by. For this reason, any person that is found violating the constitution
through the spread of hate speech and promoting terrorist activities is considered as a cyber-
criminal. In some states, I may be punishable by the death sentence. The victims are presented
with information on hatred against a particular individual or a group of people.
Grooming: when children are still below the majority age, they are not allowed to access
appropriate materials. However, there are cyber criminals that introduce young children below
the majority age to sexual activities. They make sexual advances towards the children which may
make them feel embarrassed or violate their peace. This crime is rampant among the USA
citizens, and it calls for the government to work tirelessly in trying to curb such criminals.
Various methods may be used to protect one from cyber-crimes. Being a victim of cyber-
crime may be traumatizing, and thus, it would be important to be careful about it through the
implementation of mitigative measures in the long run.
Use of antivirus software: There exists much software designed to detect and eliminate
any external threats referred to as viruses. When a virus is sent to a person’s computer by a
malicious person, it could lead to loss of massive databases in the long run. Therefore, it is
important to have an up to date antivirus software on a computer, phone or tablet. Using this
would always make it easy to be protected from eminent cyber-attacks (Ross,2016).
Document Page
BIG DATA PRIVACY 12
Another most recommended method of avoiding cyber-attacks is to be careful about what
we click. When one does not expect an email, it is important just to delete such emails to prevent
opening them accidentally. Also, before opening any emails, it is important to analyze the level
of security of the emails. This can be done by scanning any attachments within the emails.
Use different passwords: Hackers have the notion that, most people use passwords that are
almost similar to their online accounts. For this reason, it would be recommended that individual
use of a different unique password for every account online. Through this, it will make it difficult
for the cybercriminals to hack the passwords and usernames of the various online accounts.
Avoidance of public networks: Cybercriminals have specialized in getting personal
information of individuals through the use of public hotspots. It is cited that most public WIFI
networks do not guarantee security for personal information. When the data being shared in a
public network is not encrypted, packet sniffers may intercept the data and allow the hackers to
have access to it. In this case, it would be recommendable if individuals avoided the use of
public WIFI in sharing personal information.
Use two-step verifications: Emails are a main target for cybercriminals. When they hack
an individual's email, they could also gain access to other important information about an
individual such as the date of birth, residential address among others. With two-step
verifications, one is notified whenever there is an attempt to login. Usually, the notification
requires one to input a particular secret code that is not accessible to third parties. This means
that without the code, the hacker cannot access the emails or other online accounts. It is therefore
recommended that every individual should have two-step verifications on accounts that have
critical information.
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon