The "Data Runaway" crisis in the big data age

Source: Internet
Author: User
Keywords We runaway the big data age these

  

&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp;

Professor Alex Pentland of MIT said that "It is not the treatment that people should get under the naked Digital Spotlight", which sounds both resolute in the awkward situation of improving the current digital life of mankind and the helplessness of people losing control of personal data. The frequent occurrence of data leaks has heralded the arrival of the "Runaway Data" era.

Over the past more than 10 years or so, we have unreservedly given personal information to the Internet, which is stored in an intangible space in digital form, yet we lose control of personal information as the creator and owner of information. Your age, sex, interest, whereabouts, life status, consumption record and even health status, sexual orientation, under the internet magnifying glass. The situation is like entering a toilet with transparent glass, and all privacy is seen by others.

The scary thing about the problem is that we lose control of the information, and we don't know where the information is going, or what the people who get the information will do with it. If you're not aware of the seriousness of the problem, maybe you should put yourself in the feeling of someone who has been exposed to personal privacy. For example, victims of the break-up of their marriages as a result of leaked records, such as the recent Hollywood actress nude photo leaks. Before the event, presumably they did not attach enough importance to data security, as we all ordinary people.

One of my working partners had an unfortunate incident soon before, his bank account in a few days, inexplicably several transactions, was transferred to the form of online transfer of more than 10,000 yuan, this thing is not new today, the culprit is the personal identity information and bank account information leakage. In this respect, we do not know when these extremely private personal information is leaked to the network, and do not know the identity of the other party, we can do is to alarm, but apparently the police are powerless for most of the similar incidents.

Similar misfortunes are unfolding in different forms. If you're shopping online, your consumer records and grocery listings will be exposed on the web and your spending power will be exposed, and you may not be aware that some fraudsters or robbers are eyeing you. If you are a young mother who likes to use social software to bask in your photos and mark your place, you may not expect a child-abduction criminal gang to stare at you. The above two examples are not purely hypothetical, but are already staged in reality.

What is even more resentful is that all of your personal information that has been exposed to the Internet has been or is becoming a means of profit for all kinds of businesses. They hide in the office discussing how to use this information to achieve more accurate marketing, and they analyze your shopping habits to recommend similar items to you. You provide them with the most valuable information, but you don't get any benefit from it. While you enjoy the convenience of intelligent recommendation, whether it will be because of the pervasive sense of access to information to feel a little uneasy.

With the trust of machines and technology, we deliver personal information, and it is the trust that leads to tragedy. In fact, a machine that does not have the ability to think and emotionally is neither good nor bad to us, yet trustworthy, but in the presence of an ulterior motive, the machine is defenseless and, in a sense, the machine is the victim. People's insufficient attention to the problem of information security to the criminals to take the opportunity, but also led to a large data era of "data out of control" crisis.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.