scholarly journals Monetizing your personal data

2022 ◽  
Vol 65 (1) ◽  
pp. 17-19
Author(s):  
Keith Kirkpatrick

What is your private data worth, to you and to the companies willing to pay you for it?

2017 ◽  
Vol 5 (1) ◽  
pp. 57-71
Author(s):  
Jędrzej Wieczorkowski ◽  
Przemysław Polak

The phenomenon of big data includes technological (new opportunities), business (application), and social aspect. The social aspect applies to the social consequences of the use of big data methods, in particular, those related to the processing of personal and other private data , as well as the danger of privacy violation. In the context of the big data phenomenon, this study presents the results of a survey on the level of acceptance of privacy violation resulting from mass data processing. The different objectives of processing were taken into account, including general, social and commercial. This study helps to draw conclusions concerning commercial and non-commercial use of private data, as well as the legal regulations on personal data processing.


2020 ◽  
Vol III (I) ◽  
pp. 11-18
Author(s):  
Javeria Nazeer ◽  
Muhammad Farooq

In recent era, Social networking sites (SNSs) have become an important source of communication and also became a matter of interest for researchers in several disciplines such as communications, technology and sociology. These Social networking sites including Facebook, Twitter etc. often reveal private data through the enclosure of public profiles, photographs, videos and messages send to the family, friends and general public. As it was not possible to conduct a survey in complete population, therefore sample of 250 respondents (50% males & 50% females) was selected from different universities and colleges of Lahore, city of Pakistan. In the process of survey, questionnaire technique has been used to obtain the quantitative data. The findings revealed that Social Networking Sites significantly violate the human basic privacy rights. Majority of the respondents were of the view that privacy rights are harmed by SNSs. 10.4% respondents were strongly disagreeing about the statement that Facebook privacy is a real problem, 18.0% were disagree, 20.4% were neutral about the problem while 38.4% said they are agreed and 12.8% were strongly agree. The results also suggested that social networking sites leak personal data and also become a reason for disclosure of personal information.


FIAT JUSTISIA ◽  
2018 ◽  
Vol 12 (3) ◽  
pp. 206
Author(s):  
Rudi Natamiharja

The rights to privacy as an individual fundamental right should be protected. Ironically, this right is deliberately delivered publicly in social media. And Facebook, the largest social media, keep more than 2.2 billion privacies data in the whole world. In early April 2018, one million personal data of Indonesian Facebook users was stolen by other parties. Mark Zuckerberg, as a founder and CEO, acknowledged that the Facebook data consisting of customer personal data had been stolen and used by other parties. It is one of the weaknesses and negligence of Facebook that needs to be addressed in the future. Indonesia government issued a warning letter to Facebook and required formal explanation concerning those recent cases. However, the Government's seriousness on the protection of personal data of its citizens is still questioned. How Indonesian regulations cover private data protection on their citizen and what steps should be taken to protect personal data in Indonesia? By using the International instrument and Indonesia legal instruments on the protection of privacy right, this article would give the answer what government Indonesian should do to undertake this situation. The research found that the regulation of privacy protection is sufficient yet the government has no determination to take account seriously on protecting the privacy right, and no sanction to the parties was involved. Socialization on the importance of personal data toward Indonesian society in Indonesia should be done, from the basic to the top level. Keyword: Right Privacy, International Law, Fundamental Rights


2016 ◽  
Vol 6 (2) ◽  
Author(s):  
Klaus Solberg Søilen

In this study, 190 market intelligence (MI), competitive intelligence (CI) andbusiness intelligence (BI) professionals and experts were asked about Data as a Service (DaaS). Findings show there were few limits or restrictions on what kind of data users could imagine buying or renting, if all types of data were available. Data that is more sensitive—personal data and private data—will be difficult to buy, users think. Company secrets and most data for business-to-business (B2B) industries is especially difficult to obtain. The major concerns forDaaS from a user perspective are confidentiality, quality, reliability, security and accessibility. Besides, it is often pointed out by users that when everyone has much of the same data competition will increase. Users want to see more on company metrics, less expensive, more secure and more flexible data solutions. The analysis reveals that the ethical dimension are a major concern as DaaS develops. An extensive discussion follows, which also addresses newpoints.


2018 ◽  
Vol 2 (2) ◽  
pp. 158
Author(s):  
Zulfa Ul Hazanah ◽  
Putu Ari Sara Deviyanti ◽  
Descamvri Intan Zams Pettalolo ◽  
Merlyn Lucia ◽  
Terecia Wenas

<p>Personal data in electronic mail needs to be protected. Any collection and dissemination of personal data is classified into violation against individual’s privacy, as personal right involves the rights of determining, providing, or not providing personal data. Private data is a high-valued economy asset or commodity. This far, however, the protection on individual’s personal data in Indonesia is not set under a specific regulation, and thus evoking various issues against private right, in particular to personal data. The personal data discussed in this study is related to electronic one, especially electronic mail, and this refers to Act No. 19 Year 2016 about the Amendment of Act No. 11 Year 2008 about Electronic Transaction and Information. Nevertheless, it solely has restricted regulation on personal data, while the issue of utilizing individual’s personal data is increasing. This paper discusses the concept of personal data in terms of electronic mail along with the regulation of its utilization. The result shows that the concept of personal data in electronic mail is specifically extensive, involving the scope of private information and communication.</p>


Author(s):  
Gary Smith

The Democratic Party’s 2008 presidential nomination was supposed to be the inevitable coronation of Hillary Clinton. She was the most well-known candidate; had the most support from the party establishment, and had, by far, the most financial resources. Two big names (Al Gore and John Kerry) considered running, but decided they had no hope of defeating the Clinton machine. That left an unlikely assortment of lesser-knowns: a U.S. Representative from Ohio (Dennis Kucinich), the Governor of New Mexico (Bill Richardson), and several U.S. Senators: Joe Biden (Delaware), John Edwards (North Carolina), Chris Dodd (Connecticut), Mike Gravel (Alaska), and Barack Obama (Illinois). The nomination went off script. Obama was a first-term senator, a black man with an unhelpful name, but he excited voters. He raised enough money to be competitive in the Iowa caucuses and he persuaded Oprah Winfrey to campaign for him. Obama defeated Clinton by eight percentage points in Iowa and the race was on. Obama won the Democratic nomination and, then, the presidential election against Republican John McCain because the Obama campaign had a lot more going for it than Obama’s eloquence and charisma: Big Data. The Obama campaign tried to put every potential voter into its data base, along with hundreds of tidbits of personal information: age, gender, marital status, race, religion, address, occupation, income, car registrations, home value, donation history, magazine subscriptions, leisure activities, Facebook friends, and anything else they could find that seemed relevant. Some data were collected from public data bases, some from e-mail exchanges or campaign workers knocking on front doors. Some data were purchased from private data vendors. Layered on top were weekly telephone surveys of thousands of potential voters which not only gathered personal data, but also attempted to gauge each person’s likelihood of voting—and voting for Obama. These voter likelihoods were correlated statistically with personal characteristics and extrapolated to other potential voters based on their personal characteristics. The campaign’s computer software predicted how likely each person its data base was to vote and the probability that the vote would be for Obama. This data-driven model allowed the campaign to microtarget individuals through e-mails, snail mail, personal visits, and television ads asking for donations and votes.


ZBORNIK MES ◽  
2018 ◽  
Vol 1 (4) ◽  
Author(s):  
Jasna Čošabić

This paper shall analyze the impact of General Data Protection Regulation (‘GDPR’) to concept of business of digital media, having in mind their overwhelming presence and especially their impact to private data of their clients or customers. Special features that are going to be dealt with in this paper relate to processing of personal data by digital media under the GDPR, which include teritorrial scope of GDPR and its global applicability, type of personal data processed by digital media, profiling and behavioral advertising, options for consent, the use of cookies and geographical location. Purpose of their processing shall be analysed as well, with reflection to some important cases and examples. It relies on widely understood concept of digital media, including social media, online news portals, blog websites and shall pursue to point out to some crucial changes that that digital media are facing now, and that will affect their way of doing business, after the GDPR became operative on 25 May 2018.


2010 ◽  
pp. 1706-1717
Author(s):  
Barbara Carminati ◽  
Elena Ferrari ◽  
Andrea Perego

Web-based social networks (WBSNs) are online communities that allow users to publish resources (e.g., personal data, annotations, blogs) and to establish relationships, possibly of a different type (“friend,” “colleague,” etc.) for purposes that may concern business, entertainment, religion, dating, and so forth. In the last few years, the usage and diffusion of WBSNs has been increasing, with about 300 Web sites collecting the information of more than 400 million registered users. As a result, the “net model” is today used more and more to communicate, share information, make decisions, and ‘do business’ by companies and organizations (Staab et al., 2005). Regardless of the purpose of a WBSN, one of the main reasons for participating in social networking is to share and exchange information with other users. Recently, thanks to the adoption of Semantic Web technologies such as FOAF and other RDF-based vocabularies (Brickley & Miller, 2005; Davis & Vitiello, 2005; Golbeck, 2004), accessing and disseminating information over multiple WBSNs has been made simpler (Ding, Zhou, Finin, & Joshi, 2005). If this has been quite a relevant improvement towards an easier sharing of information, it makes more urgent that content owners have control over information access. In fact, making available possibly sensitive and private data and resources implies that they can be used by third parties for purposes different from the intended ones. As a matter of fact, users’ personal data and resources are regularly exploited not only by companies for marketing purposes, but also by governments and institutions for tracking persons’ behaviors and opinions, and in the worst case, by online predators (Barnes, 2006).


Author(s):  
Andriyanto Adhi Nugroho ◽  
Atik Winanti ◽  
Surahmad Surahmad

The arrangement of personal data protection in national law is stipulated explicitly in the regulation of the Minister of the Ministry of communication and  Informasi  No. 20 of 2016 on the protection of personal data. In Indonesia, there are no rules that accommodate the protection of personal data on financial technology. That can be hazardous when the economic response of technology is not limited to its use. The case of personal data is not contained in the case of a Such hazard that may arise. The case from the theft of personal data, damage to the system that may allow the occurrence of data breaches, misuse of personal data that has been the business ruled itself, or other parties who may access personal consumer data (such as government). The need to set this up is important because private data is a person's privacy right. Still, it can fundamentally be economically valuable for a third party who is about to take advantage of it.


2017 ◽  
Vol 3 (1) ◽  
pp. 205630511769532 ◽  
Author(s):  
Katharine Sarikakis ◽  
Lisa Winter

This article explores the ways in which the concept of privacy is understood in the context of social media and with regard to users’ awareness of privacy policies and laws in the ‘Post-Snowden’ era. In the light of presumably increased public exposure to privacy debates, generated partly due to the European “Right to be Forgotten” ruling and the Snowden revelations on mass surveillance, this article explores users’ meaning-making of privacy as a matter of legal dimension in terms of its violations and threats online and users’ ways of negotiating their Internet use, in particular social networking sites. Drawing on the concept of legal consciousness, this article explores through focus group interviews the ways in which social media users negotiate privacy violations and what role their understanding of privacy laws (or lack thereof) might play in their strategies of negotiation. The findings are threefold: first, privacy is understood almost universally as a matter of controlling one’s own data, including information disclosure even to friends, and is strongly connected to issues about personal autonomy; second, a form of resignation with respect to control over personal data appears to coexist with a recognized need to protect one’s private data, while respondents describe conscious attempts to circumvent systems of monitoring or violation of privacy, and third, despite widespread coverage of privacy legal issues in the press, respondents’ concerns about and engagement in “self-protecting” tactics derive largely from being personally affected by violations of law and privacy.


Sign in / Sign up

Export Citation Format

Share Document