2015
DOI: 10.1007/978-3-319-18781-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Personal Privacy Protection in Time of Big Data

Abstract: Personal privacy protection increasingly becomes a story of privacy protection in electronic data format. Personal privacy protection also becomes a showcase of advantages and challenges of Big Data phenomenon. Accumulation of massive data volumes combined with development of intelligent Data Mining algorithms allows more data being analysed and linked. Unintended consequences of Big Data analytics include increasing risks of discovery new information about individuals. There are several approaches to protect … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…The cutting-edge nature of Big Data and analytics has driven wide-scale uptake of related technologies that have significantly outpaced the regulatory frameworks, resulting in ad hoc approaches that differ from agency to agency (Rubinstein, 2013; Smith & O’Malley, 2017; Townsend, 2014). Furthermore, regulations that do exist generally extend from outmoded legislation that did not anticipate the rapid advancement and openness of digital technologies (Sokolova & Matwin, 2016). For example, the Canadian Personal Information Protection and Electronic Documents Act (PIPEDA) relies on a purpose-consent model that was not designed to account for the multiple modes of data collection undertaken in the current digital era.…”
Section: Introductionmentioning
confidence: 99%
“…The cutting-edge nature of Big Data and analytics has driven wide-scale uptake of related technologies that have significantly outpaced the regulatory frameworks, resulting in ad hoc approaches that differ from agency to agency (Rubinstein, 2013; Smith & O’Malley, 2017; Townsend, 2014). Furthermore, regulations that do exist generally extend from outmoded legislation that did not anticipate the rapid advancement and openness of digital technologies (Sokolova & Matwin, 2016). For example, the Canadian Personal Information Protection and Electronic Documents Act (PIPEDA) relies on a purpose-consent model that was not designed to account for the multiple modes of data collection undertaken in the current digital era.…”
Section: Introductionmentioning
confidence: 99%
“…Take the first 32 bits of the square root of the first 8 prime numbers (2,3,5,7,11,13,17,19) in the natural number to get 8 parameters.…”
Section: Store Data On-chain and Out-of-chainmentioning
confidence: 99%
“…Secondly, such information management systems as credit reporting systems and academic systems involve the interests of many people, so the risk of being tampered with is very high. The disadvantage of a centralized database is that if someone has the right to modify the information, any changes can be made to the information, although the modification log is saved, but it is still saved in the centralized database and can still be deleted and modified [5]. Therefore, the difficulty in personnel information management in the field of big data is how to ensure the security of information is not leaky, and cannot be tampered and traceable.…”
Section: Introductionmentioning
confidence: 99%
“…If the big data storage system is compromised, it can be exceptionally destructive as individuals' personal information can be disclosed [19]. In distributed environment, an application may need several datasets from various data centres and therefore confront the challenge of privacy protection.…”
Section: Big Data Privacy In Data Storage Phasementioning
confidence: 99%