The love and fear of the big data age

Source: Internet
Author: User
Keywords We big data times big data maybe

Economic observer commentator Zhang Bongsong Alipay massive information leaks, for people immersed in large data carnival, is a shrill alarm.

As one of the achievements of the Internet to transform the world, the big data is changing the cognitive patterns and behavioral trends of human beings, and the data that Internet companies generate and accumulate in their day-to-day operations, in business, economics, and other areas, profoundly influence our decision-making patterns, and experience and intuition are increasingly being analyzed in rigorous data. As long as the data is comprehensive enough, we can even earlier and more accurately judge the bones or decent standing before you than the Monkey King. Data creates a data mirror for each of us, and it may describe your face more accurately than what you see in the mirror.

When we say that big data changes our lives, most people just see it to make us more comprehensive, more dimensional understanding of the world, but in fact, it also allows us to live in a world of almost no hiding, the boundaries of privacy because of the information you input in the keyboard, began to become blurred, this will bring about the consequences, At least there are not many people who can think clearly.

Alipay 20G User Information leaked, we can not convert 20G contains how many users of information, and can not measure its user's life will bring what impact. Perhaps you will be more frequently to receive a variety of sales calls, perhaps your mailbox will appear you have visited some of the sex products ads, perhaps some diligent salesman will be on a weekend morning to knock your door ... You don't know what's going to happen, maybe that's the scariest thing. When your data mirror is being spied on by others, it can be said that your control over life is largely weakened. This may be the hidden danger of big data.

In recent years, Internet information leaks have become increasingly frequent. January 2, hackers use photo-sharing Snapchat vulnerabilities to obtain 4.6 million account username and telephone number; At the end of last year, an illegal invasion of the European Union to provide real-time full settlement of the Tar-get pan-European real-time full automatic clearing system user database, and stole 40 million customer information , including credit card numbers, credit card expiration dates, and security codes that have been brushed at Target; Of course, it has made many people uneasy, such as home, Han Court open room information leakage is one of the ...

A 2012-year survey by China Internet Network Information Center shows that more than 80% of Chinese internet users have experienced information security incidents, of which 77.7% of netizens have suffered different forms of loss. In the event of economic loss, the average loss is 553.1 yuan and the total loss is 19.4 billion yuan. The report noted, in particular, that "very private health care information, financial property information leakage ratio reached 11.2% and 7.3% respectively." This shows that stealing personal information is more and more profit-seeking, has not satisfied with the traditional personal contact information, attributes, but the pursuit of more accurate marketing of housing, automotive, health, medical, financial property information. ”

The British Victor Maire Schoenberg in his work, "delete" said, if one day the information processing people sitting in the mountains of personal information to do whatever they want, then what is the meaning of the right to privacy? The importance of the issue of information security has been seriously underestimated, and our awareness, regulatory norms and legislative preparations , are far behind the needs of reality.

With the rapid development of electricity merchants, internet finance and various internet-based services, the data will grow exponentially and the front of information security will become even longer. An internet boss has said it has no interest in selling information about users because it is nothing compared to the benefits they gain from data mining. We have no doubt about that. But when the value of the data is more and more valued, how many pairs of eyes from inside and outside really peep at these intangible assets, and those companies that have big data, are you really ready?

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.