Did you ever wonder how Facebook’s and Google’s ads are right on target – they are mining the other cookies on your system that reveal where you have been. We know that cookies enable session management but companies are mining cookies from user’s computers for profiling. To illustrate this, I recommend you have a look at your personal profile on Google (e.g. Google Ads Preferences). Now there are even emergent blackmailers that are mining user’s cookies and then blackmailing them by threatening disclosure of the sites the users have been to (See Ransomware). They then extend this with machine learning and predictive analytics and this will worsen as the IoT matures and reveals and adds “Dark Data” to the Big Data equation.
First, a few emergent IoT, AI, emergent technology surveillance applications to set the table.
Profiling & Predictive Analytics Example
From the Colbert Report: Target’s marketing and predictive analytics which broke in a New York Times article… I apologize for his satirical humor as it is not for everyone but it is a very good presentation. Note the video is dated (e.g. 2012) and predictive analytics based on previously dark data and machine learning is advancing at a staggering rate.
Now let’s recall what we have learned to date:
We have spoken about the fiscal benefits of the “Long Term Value or LTV” of consumers as it is is better to keep your existing customers than to continually seek new customers. Target clearly embraces this.
There are also ethics involved but recall ethical perspectives can be based on “Stockholder Theory”, “Stakeholder Theory” or “Social Contract Theory” so while we may not agree with Target’s or any organization’s use of publicly available information and predictive analytics they are simply doing what’s best for their stockholders… and on that note let’s continue.
Big Data & Predictive Analytics
Dr. Alessandro Acquisti of Carnegie Mellon University and brace yourself as its a new world… please consider both the positive and negative effects of this emergent information technology and also please keep in mind the business – IT – society triangle.
Now on this note, I highly recommend everyone take BADM 220 Statistics as this is the basis of both operational analytics (for everyday business efficiency) and predictive analytics for understanding and assessing trends, future events and risk assessment.
Now having watched this do you see any benefits of facial recognition… how about facial recognition at airports? Now, what about negative effects… what about the ability to see someone in a club, take their picture and immediately have their address and phone number or even facebook data like their previous relationships?
But it doesn’t end with pictures, what if someone posts something less than flattering on social media… this too will be available to prospective employers as they review your resume or even when the sit in front of you and interview you and ask questions. Also, know that employers increasingly use personality testing in the interview/hiring process. Have you or has anyone written anything about you on Facebook or Twitter or their like that can reveal personality traits… and remember it is a computer and its’ analytic algorithms that are doing the evaluation and profiling.
Now consider merging your social network data (that even includes what other people have written about you) and publicly available information as in the Ted Talks video above and the tracking and analytical profiling presented in the above Colbert “Surrendering to a Buyer Power) above and you have an even better understanding of individuals (if you haven’t done so, please Google “Google Ads Preferences” and see how well Google already profiles you).
Now recall my statement that if something is free, you or we are the product. Now let’s use our Business-IT-Society awareness and consider Windows 10… with its free upgrade… and facial recognition… and it cloud computing basis… and we can conclude that Microsoft is about to enter this arena… should we be worried about privacy?
Government Internet Surveillance
Generational change and information sharing. Consider our use of cloud-based email providers (gmail, hotmail, yahoo, etc.)
Now one of the previous videos presented cited Ed Snowden so let’s listen to Ed and hopefully heed his advice
What to do:
Well, Facebook, Twitter and the like are your choice. Beyond that, Chrome offers anonymous browsing by opening a “New Incognito Tab” and we know that another option is to use a distributed/anonymous network like TOR but the NSA can track either of these regardless. Other options as presented in class (or in videos) exist in the form of Chrome Plugins. As presented, I use Ghostery, DoNotTrack, and Disconnect to stop setting and mining of cookies. If a general user (like my mom) has to choose just one, I recommend disconnect as it also forces your browser to access the Secure https versions of Facebook, Google, etc. I also recommend the Do Not Track Plug-in as it may be the best as well (I have never performed the analysis).