Who will manage the security of personal information in the era of big data
In the era of big data, data will be better analyzed and utilized. Data that originally seemed meaningless may produce extremely harmful results. Big business value, this is the big pie that big data advocates have been painting for us. However, for us ordinary individuals, the benefits brought by big data in the short term may be limited, and the risks will greatly increase. At present, it seems that there are no effective measures for individuals to deal with the risks brought by big data. Apart from being an ostrich and reducing the release of private information on social media and other media, they can only focus on their character.
When privacy leakage becomes a habit, where is the bottom line?
In the era of big data that is about to develop rapidly, how to ensure personal safety? This is a problem that many people are not aware of. The reason is probably that the current situation of domestic information security and privacy protection is very frustrating. It also has to be said that we Chinese people have a strong tolerance for privacy leaks, so much so that we have formed the habit of turning a blind eye, and businesses are also accustomed to an indifferent attitude towards privacy protection.
As the Internet moves further towards the next period of disruption, the entire industry is also shouting that the era from IT to DT has arrived. This is the category of big data that has been hotly debated. No one can tell how big big data is. Some people may know about 4V or 5V, and some people understand the correlation and other characteristics brought by big data.
However, although the public is already familiar with the term "big data", they have no idea of ??the changes and risks it will bring, and they always feel that it is still far away from people's lives. Therefore, this article will focus on how the big data era will affect our personal information security and personal safety in the near future.
This article does not want to preach or explain big data itself. A purely academic discussion will not be of much use in clarifying the security issues it brings and helping everyone understand it. So regarding the risk part, I will use a few personal experiences and examples encountered by friends to introduce to you
The current situation of the development of big data applications
Big data technology and applications themselves are not It is mysterious and very close to us. Even many of the services provided by Google and the data cube provided by Taobao that we use every day are supported by big data technology and applications.
Many big data books regard Google as a major contributor to the development of big data technology. Compared with the hidden big data technology applications, several common big data application types include:
l Data analysis based on user location, such as maps, traffic information, etc.
l Precision marketing based on user behavioral characteristics, many advertising recommendations on the Internet are based on this method
l Analysis and recommendations based on user social relationships, public opinion monitoring, etc.
l Other uses Fields such as the public security system, macro data analysis, and financial risk analysis are a bit far away from us personally, and we generally have no direct experience.
Generally speaking, the technology and application types of big data analysis still need to be enriched. From the perspective of the imagination that big data brings to us, the current development and application promotion of big data technology has just begun. stage.
Key changes brought about by the application of big data
Big data was born out of the original business analysis BI (Business Intelligence). BI is to solve people's multi-dimensional analysis and analysis of enterprise business data. insights to support business leaders in decision-making.
What problems does big data solve? First of all, it is an upgraded version of BI. In addition to analyzing the internal business information of the enterprise, it can also integrate a large amount of data that previously seemed irrelevant and unavailable. Pictures, logs, social media, and other data are all in its scope. within. Of course, this kind of analysis is not yet very mature, and the value it brings is still relatively rudimentary. Currently, there are very few big data companies that can achieve a mature level of data analysis.
Secondly, big data can discover and deeply mine the value of data, and its value can be opened up as new businesses. This is also an important reason why many companies currently attach great importance to big data. Of course, big data is so popular due to the praise of the IT industry and the large-scale publicity of some big data-related companies.
Finally, a very important feature of big data is the analysis of correlations between objects. This is different from many previous data analyses.
From the pursuit of causality to correlation, this is in line with the current development trend of "hyper-connectivity" in the world.
At this point, we will introduce a very important part for our personal privacy and security.
When "human flesh search" changes from manual to automatic
Although some of our personal information has been leaked, the relationships between people have not been easily disclosed in the past. Strangers obtain it, but with the development and popularization of the Internet, we have exposed a large amount of information intentionally or unintentionally on the Internet, so that interested people can obtain a lot of personal information about us. Through the correlation of this information, many personal characteristics can be restored.
The "human flesh search" incident that caused quite a stir a few years ago is to manually retrieve personal information and trace more personal information and relationships through small clues. The "mistress incident" in the Yuanyang real estate and the heroine's suicide diary left a deep impression on many people.
Through the manual search and information collection of a large number of netizens, everyone knows the relationship between the hero, heroine, and mistress, as well as many personal characteristics: work unit, residence, contact information, parents, etc.
The entire incident can be regarded as artificial big data analysis. Today's big data analysis can make this process automated and more efficient through machine learning, algorithms, distributed clusters and other technologies.
Imagine that every move you make online can be monitored, and your "personality portrait" can be restored. What's even more terrifying is that all kinds of relationships between you and your family, friends, classmates, etc. The relationship between people can be recognized and analyzed by the machine.
What potential risks will you and I face?
The widespread use of big data and the leakage of private information will inevitably bring more personal risks, and will escalate on top of existing risks, and new fraud and other means will also appear. Next, let’s briefly analyze several potential risk types, focusing only on the situations that individuals are most likely to encounter.
At present, criminals and telemarketing companies mainly control our personal information, including personal phone number and name. Of course, it does not rule out that other personal information is also controlled, such as work and home address. wait. With the popularity of online shopping, home and work delivery addresses are controlled by many express companies. Any leakage at any point will lead to the loss of everything.
Generally speaking, this information is independent for individuals, or at most it is a restoration of personal characteristic information. A term commonly used in the IT field: "information island". I think describing this situation has the same effect but different approaches. However, with the upgrade of big data technology applications, our personal information islands will be connected and associated to form a "personal information network", mainly related to your personal relationship information. At this time, we may face the following escalating threats.
1. Fraud and harassment
The harassment and fraud we currently encounter are mainly through telephone channels, which may include: sales promotion, telecommunications fraud, acquaintance fraud, etc. If our personal and family, friends, classmates and other related information is used by someone with malicious intentions, the situation of being accurately deceived, defrauded, and harassed (marketed) will be greatly increased.
For example, based on my personal experience, I have been on the verge of being defrauded several times, but in the end, the goddess of luck saved me from losing money. If someone with ulterior motives in the future can clearly know my location, the location of my family, and what I am doing, they can connect this information and tell me that a friend or family member of mine is on a business trip somewhere and what accident happened at what location. , then the credibility is much higher in this case, and it is often difficult to verify the authenticity, which also increases the chance of being deceived.
2. Financial risks and financial losses
At present, online shopping, online payment and other methods are very popular, which has led to an increase in fraud, account theft and other phenomena. . I believe that as more of our personal information is connected and analyzed in the future, our accounts, passwords, mobile phone numbers, and ID numbers will be relatively easy to obtain by criminals, causing us financial losses.
3. Loss of personal reputation
The “human flesh search” a few years ago had a great impact on us. So in the future, if personal information cannot be well protected, it will be really easy to restore a person's real information and social relationship information online.
If you are upright in your behavior and actions, you may feel that there is nothing to worry about, and your reputation will not be affected even if the information is leaked. However, please note that people’s interpretation of information is biased, incomplete, and misunderstood, especially public opinion on the Internet. If someone or a company on the Internet adds fuel to the fire, you can imagine that you will not be confused. Suffering from reputational loss? Especially by describing your personal information and relevant relationship information completely accurately, with only 1% of fake and shady information mixed in. At this time, the audience is unable to distinguish and unwilling to distinguish the authenticity of the information, and choose to believe it. Unusual information, dissemination, fun watching and herd mentality are the most popular things among people online.
I will just give you a few examples. I don’t want to go into too much detail. You can experience the impact of the popularization of big data applications for yourself. Let’s talk about how we should reduce and avoid this personal risk.
What to do? It really can only rely on individuals and their character!
For information security and the risks it brings, we usually blame three parties for being responsible:
l Relevant national departments
l Data-related companies
l Individuals who contribute and retain data
But currently, it seems that only the third one is reliable. Let’s put it this way, relying on corporate self-discipline? It's probably better to believe that a sow can climb a tree. Companies always intentionally or unintentionally, passively or actively, leak our information or use it for commercial purposes.
Rely on supervision by relevant government departments? The government will indeed do it, but I don’t know if when God 20 goes to heaven, there will be specific regulatory measures to deal with it and they can be well implemented.
Isn’t there such a famous saying on the Internet: The busiest department of our government is the “relevant department”. This department is very busy. I don’t know when the relevant departments will be able to truly solve the problem of privacy leaks and increased personal risks caused by big data.
So in the end we have to rely on ourselves, try our best to protect personal privacy in the following matters, and pray that our character and luck will not be too bad.
1. Do not publish too much personal privacy information on social media such as Weibo and WeChat. These places are the focus of big data analysis. Avoid making personal and family photos and videos public as much as possible to nip problems in the bud.
2. Do not write diaries, journals and other real-life real-name information online, as these are too easy to be leaked and searched
3. Apply financial-related security measures as much as possible On the Internet, passwords are changed regularly and have a certain level of complexity.
4. Do not use your important personal account numbers and passwords casually in the registration information of other websites, forums, and services. Many sites cannot protect your information. Even large websites such as CSDN, JD.com, Ctrip, and Amazon cannot effectively protect your account, password, credit card and other information, so never use the same account and password to register on all websites.
5. Always be aware of safety and caution, don’t be greedy for petty gains, and seek verification from multiple sources and solicit opinions from bystanders when encountering problems.
6. Educate and manage your “teammates” well. Don't be afraid of opponents who are like gods, but be afraid of teammates who are like pigs. This is definitely a wise saying.
Finally, use one sentence to summarize this article. When privacy leaks become a habit, when new technologies such as big data enhance the value of personal leaked information, and when no one or department can take responsibility for this in the short term, Then it's up to us. Hide more information below the surface and always be aware of the risks hidden beneath the iceberg.
The above is the relevant content shared by the editor about who is in charge of personal information security in the era of big data. For more information, you can follow Global Ivy to share more useful information