In the era of big data, data will be better analyzed and utilized, and seemingly meaningless data may have great commercial value. This is a big pie that big data advocates have been painting for us. But for us ordinary individuals, the benefits brought by big data may be limited in the short term, but the risks are greatly increased. At present, individuals seem to have no effective measures to deal with the risks brought by big data. In addition to being ostriches and reducing the release of private information on social media, they can only fight for character.
When privacy disclosure becomes a habit, where is the bottom line?
In the fast-developing era of big data, how to ensure personal safety? This is a problem that many people don't realize. The reason is probably that the current situation of information security and privacy protection in China is very helpless. We also have to say that China people are so tolerant of privacy disclosure that we have formed the habit of turning a blind eye, and businesses are accustomed to the indifferent attitude towards privacy protection.
As the Internet goes further to the next subversive period, the whole industry is also shouting that the era from IT to DT has arrived, which is the category of big data that has been hotly debated. No one can tell how big big big data is. Some people may know about 4V or 5V, and some people understand the characteristics such as association brought by big data.
However, although the public is familiar with the word "big data", they have no idea about the changes and risks it will bring, and always feel that it is still far away from people's lives. So this paper focuses on how it will affect our personal information security and personal safety in the era of big data in the near future.
This article does not want to lecture and explain big data itself. Pure academic discussion is of little help to clarify the security problems it brings and help everyone understand. Then, regarding the risk part, I will introduce it to you with a few examples of personal experience and friends.
Development Status of Big Data Applications
Big data technology and applications are not mysterious and close to us. Even many services provided by Google and the data cube provided by Taobao are supported by big data technology and applications.
Many big data books regard Google as a major contributor to the development of big data technology. Compared with this hidden application of big data technology, several common types of big data applications now include:
L Data analysis based on user location, such as maps and traffic information.
Precision marketing based on user behavior characteristics is behind many online advertising recommendations.
L Analyze and recommend based on users' social relationships and public opinion monitoring.
L Public security system, macro data analysis, financial risk analysis and other fields. It is a little far from us personally, and there is generally no direct contact.
In general, the technologies and application types of big data analysis need to be enriched. Judging from the imagination brought by big data, the development and application of big data technology are only in its infancy.
Major changes brought by the application of big data
Big data is born out of the original BI (Business Intelligence), which aims to solve people's multi-dimensional analysis and insight into business data, thus supporting business leaders to make decisions.
What problem does big data solve? First of all, it is an upgraded version of BI. In addition to analyzing the business information within the enterprise, a large number of previously seemingly irrelevant and useless data can be incorporated. Pictures, logs, social contacts, their data are all within his scope. Of course, this analysis is not very mature, and the value it brings is still relatively primary. At present, there are few big data companies that can reach the mature level of data analysis.
Secondly, the discovery and deep mining of data value by big data can be opened as a new business, which is also an important reason why many enterprises attach importance to big data at present. Of course, the popularity of big data is also caused by the touting of the IT industry and the super-large-scale publicity of some big data-related companies.
Finally, a very important feature of big data is to analyze the correlation between objects. This is different from many previous data analysis. From the pursuit of causality to correlation, this is to adapt to the current development trend of "super connection" in the world.
At this point, it is necessary to draw out the parts that are very important to our personal privacy and security.
When "human flesh search" changes from manual to automatic
Although some of our personal information was leaked, the relationship between people was not easy to be obtained by strangers in the past. However, with the development and popularization of the network, we have exposed a lot of information on the network intentionally or unintentionally, so that people with a heart can get a lot of information about us. Through the correlation of these information, many characteristics of individuals can be restored.
A few years ago, the "human flesh search" incident was a manual search for personal information, tracing more personal information and relationships through small clues. Many people are deeply impressed by the "Little Three Incident" and the heroine's suicide diary in Ocean Building.
Through the manual search and information collection of a large number of netizens, we know the relationship between the hero and heroine and the mistress, as well as many personal characteristics: unit, residence, contact information, parents and so on.
The whole event can be regarded as artificial big data analysis. Now big data analysis can make this process automatic and more efficient through machine learning, algorithms, distributed clustering and other technologies.
Imagine that your every move on the Internet can be monitored and your "portrait" can be restored. What is even more frightening is that your relationship with family, friends, classmates and other related people can be recognized and analyzed by machines.
What kind of potential risks will you and I face?
The widespread use of big data and the disclosure of private information will inevitably bring more personal risks, upgrade existing risks, and new means such as fraud will also appear. Next, it briefly analyzes several potential risk types, only aiming at the situation that individuals are most likely to encounter.
At present, criminals and telemarketing companies mainly grasp our personal information through personal phone numbers and names. Of course, it is not excluded that other personal information is also mastered, such as company and home address. With the popularity of online shopping, the delivery addresses of families and units are mastered by many courier companies, and any leakage will lead to total loss.
Generally speaking, this information is aimed at individual independence, at most, it is the restoration of personal characteristic information. A commonly used word in IT field: "information island". I think describing this situation has the same effect. However, with the upgrading of the application of big data technology, our personal information islands will be connected and associated to form a "personal information network", which mainly involves your personal relationship information. At this point, we may face the following upgrade threats.
1. Fraud and harassment
At present, the main harassment and fraud we encounter are mainly through telephone channels, which may include: sales promotion, telecom fraud, acquaintance fraud and so on. If our personal and family, friends, classmates and other related information is used by those who are willing, it will greatly increase the situation of being deceived and defrauded by precision and being harassed (marketed) by precision.
For example, as far as my personal experience is concerned, I was on the verge of being cheated several times, and finally the goddess of luck spared me my loss. If people with ulterior motives can clearly know my location, my family's location, and what they are doing in the future, connect these information and tell me what happened to a friend or family member in a business trip somewhere, then the credibility will be much higher in this case, and it is often difficult to verify the authenticity and increase the chance of being cheated.
2. Financial risks and financial losses
At present, online shopping, online payment and other means are very popular, and the phenomenon of stealing brushes and accounts has also increased. I believe that in the future, as our personal information is more connected and analyzed, our account number, password, mobile phone number and ID number will be relatively easy to be obtained by criminals, resulting in our economic losses.
3. Loss of personal reputation
A few years ago, "human flesh search" touched us a lot. So in the future, if personal information can't be well protected, it's really easy to restore a person's real information and social relationship information online.
If you do things honestly, you may feel that there is nothing to worry about. Even if the information is leaked, it will not affect your reputation. But please note that people's interpretation of information is biased, incomplete and misunderstood, especially the public opinion on the Internet. If someone or a company on the internet adds fuel to the fire, can you imagine that you really won't be reversed and won't be affected by the loss of reputation? Especially by describing your personal information and related information completely and accurately, only 1% false and dark information is mixed. At this time, listeners and viewers can't tell whether the information is true or false. It is the hottest thing for online people to choose to believe unusual information, spread it out, watch the excitement and look at it from the heart of the public.
I'll just give you a few examples, and I don't want to be too detailed. Let's experience the impact of the popularity of big data applications. Let's talk about how to reduce and avoid this personal risk.
What can we do? It really depends on individuals and personalities!
For information security and the risks it brings, we usually blame it on three parties:
L relevant state departments
L holding data related enterprises
L individuals who contribute and save data
But at present, only the third one is more reliable. Let's just say, by corporate self-discipline? I guess it's better to believe that sows can climb trees. Enterprises always intentionally or unintentionally, passively take the initiative to disclose our information or use it for commercial purposes.
Supervised by relevant government departments? The government will do it, but I don't know whether there will be specific regulatory measures to deal with it when it goes to heaven on the 20 th, and whether it will be implemented well.
Isn't there a famous saying on the Internet that the busiest department in our government is the "related department"? This department is very busy. I don't know when the relevant departments can really solve the problem of privacy leakage and personal risk increase caused by this big data.
So in the end, you should rely on yourself, try to protect your privacy in the following things, and pray that your character and luck are not too bad.
1. Don't post too much personal privacy information on social media such as Weibo and WeChat, which are the focus of big data analysis. Personal and family photos, videos and so on. It should be avoided as much as possible to prevent problems before they happen.
2. Don't write diaries, running accounts and other real-life real-name information online, which is too easy to be leaked and searched.
3. Financial-related security measures should be applied as much as possible, and passwords should be modified regularly, which has certain complexity.
4. Important personal accounts and passwords should not be used casually in the registration information of other websites, forums and services. Many websites can't protect your information. Even large websites such as JD.COM, CSDN, Ctrip and Amazon can't effectively protect your account number, password, credit card and other information, so don't use the same account number and password to register on all websites.
5. Always have safety awareness and warning awareness, don't be greedy and cheap, and ask the onlookers for evidence and advice when something happens.
6. Educate and manage your teammates. It is absolutely a wise saying that you are not afraid of opponents like gods, but of teammates like pigs.
Finally, to sum up this article in one sentence, when privacy disclosure becomes a habit, when new technologies such as big data enhance the value of personal information disclosure, and when no one or department can be responsible for it in the short term, then it's up to us. Hide more information underwater and always pay attention to the hidden risks under the iceberg.
The above is what Bian Xiao shared with you about who will manage the personal information security in the era of big data. For more information, you can pay attention to Global Ivy and share more dry goods.