SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
www.ijmit.com                                  International Journal of Management & Information Technology
ISSN: 2278-5612                                                              Volume 2, No 1, November, 2012


            Data Ownership: Who Owns 'My Data'?
                                           Ali M. Al-Khouri
           Director General, Emirates Identity Authority, Abu Dhabi, United Arab Emirates
                                   Professor, Identity and Security,
                 The British Institute of Technology and E-Commerce, London, UK

ABSTRACT                                                   The subject of who actually 'owns' the data or, in
                                                           other words, the term 'data ownership' has
The amount of data in our world today is                   attracted the attention of researchers in the past
substantially outsized. Many of the personal and           few years. Data transmitted or generated on digital
non-personal aspects of our day-to-day activities          communication channels become a potential for
are aggregated and stored as data by both                  surveillance. Data ownership issues are thus likely
businesses and governments. The increasing data            to proliferate. For instance, Facebook’s famous
captured through multimedia, social media, and             announcement that users cannot delete their data
the Internet are a phenomenon that needs to be             from Facebook caused a furor, and Mark
properly examined. In this article, we explore this        Zuckerberg (one of five co-founders of Facebook)
topic and analyse the term data ownership. We              was equally famous in his response,"…It’s
aim to raise awareness and trigger a debate for            complicated".
policy makers with regard to data ownership and            Indeed it is! In today’s interconnected world
the need to improve existing data protection,              driven by the Internet, powered by the gigabyte
privacy laws, and legislation at both national and         network operators, we leave a significant and by
international levels.                                      no means subtle scatter of data trail. The often-
                                                           asked question, and the issue of discussion today,
Keywords                                                   is- who owns this data? In order to answer this
Data ownership; big data; data protection, privacy         question, it is important for us to step back to
                                                           examine the very nature of what we call 'data'.
1. INTRODUCTION
Organizations today have more data than they
                                                           2. DATA: A MATTER OF
have ever had previously. Advancements in                  INTERPRETATION
technology play a critical role in generating large
                                                           There much confusion about what 'data' really is
volumes of data. According to a study published
                                                           in today's world. The truth is that data are no more
by Information Week, the average company’s data
                                                           than a set of characters, which—unless seen in the
volumes nearly double every 12 to 18 months
                                                           context of usage—have no meaning (Wigan,
(Babcock, 2006). Databases are not only getting
                                                           1992). Data are what one uses to provide some
bigger, but they also are becoming real time
                                                           information. The context and the usage provide a
(Anderson, 2011; Sing et al., 2010).
                                                           meaning to the data that constitute information.
Evolving integration technologies and processing
                                                           Thus, data in the stand-alone mode have no
power have provided organisations the ability to
                                                           relevance and therefore no value. When there is
create more sophisticated and in-depth individual
                                                           no value in data, then one would surmise that
profiles based on one's online and offline
                                                           ownership is not an issue. That is the paradox of
behaviours. The data generated from such systems
                                                           data ownership. Figure 1 illustrates a data value
are increasingly monitored, recorded, and stored
                                                           pyramid developed by Accenture. The pyramid
in various forms, in the name of enabling a more
                                                           has three levels, starting from raw data, up to the
seamless customer experience (Banerjee et al.,
                                                           insights and then the transactions levels. The base
2011; Halevi and Moed, 2012; Rajagopal, 2011).
                                                           of the pyramid features raw, less differentiated,



©
    Council for Innovative Research                                                            1|Page
www.ijmit.com                                    International Journal of Management & Information Technology
ISSN: 2278-5612                                                                Volume 2, No 1, November, 2012

and thus less valuable data. Moving up the                   Data'? Would the financial statement sent by a
pyramid creates larger value and revenue                     company to me as a shareholder qualify as 'My
opportunities.                                               Data'?
                                                             We would argue no. 'My Data', in its strict sense,
                                                             comprise just our personal attributes—no more.
                                                             This is the data that I own. I use 'My Data' as
                                                             information to identify myself for my personal
                                                             gains, whether physical, logical, or emotional. 'My
                                                             Data' are thus in the open and either implicitly or
                                                             explicitly shared. When I share the data, I delegate
                                                             the ownership. Thus, my data have multiple
                                                             owners, and the number of owners increases with
                                                             each share. Figure 2 provides an illustration of this
                                                             viewpoint.

             Fig 1: Data value pyramid.
            Source: Banerjee et al., 2011
As such, governments and public sector
institutions consider data a public utility (WEF,
2011). They tend to label our personal data as
'corporate data' and argue that without data, they
cannot function (Holloway, 1988). It is no wonder
that the volume of stored data in today's
organisations has increased exponentially.
It is in this context that ownership of data needs to
be considered. As data are generated, then data are
stored. When we speak about data ownership, we
refer to the storage process. If so, then the
ownership of data storage resides with the owner
of the storage. Thus, we as individuals, the
government as our governing agent, law
enforcement agencies and the courts, security
agencies, our service providers, and our network                   Fig. 2: Potential owners of 'My Data'
operators who enable us to move our data are all             As the number of transactions increases with 'My
our data owners. They own the storage systems                Attributes', 'My Data' grow and, in turn, increase
and thereby the data held within such systems. In            the number of data owners. What essentially is
addition, the emergence of customer data                     happening is that with every transaction,
integration (CDI) and of master data management              information is shared as data. Each time
(MDM) technologies has enabled the integration               information is shared, new data are generated. As
of disparate data from across multiple silos into            new data are generated, new ownership is created.
commonly defined, reconciled information                     The diagram (Figure 2) illustrates just a tip of the
accessible by a range of systems and business                proverbial iceberg of data generation from 'My
users (Dyché, 2007).                                         Data'!
We would like to pause here and examine the                  3. PERSONAL DATA
concept of 'My Data'. Just what is 'My Data'? Do
we consider information of friends and family that
                                                             ECOSYSTEM AND OWNERSHIP
                                                             Typically, organisations can capture different
we hold to be ‘My Data’? Do bank statements and
                                                             personal data in a variety of ways (Marc et al.,
credit statements sent by banks qualify as 'My
                                                             2010):


©
    Council for Innovative Research                                                              2|Page
www.ijmit.com                                    International Journal of Management & Information Technology
ISSN: 2278-5612                                                                Volume 2, No 1, November, 2012

         Data can be “volunteered” by individuals                   analysis of personal data. For instance,
          when they explicitly share information                     credit scores can be calculated based on a
          about themselves through electronic                        number of factors relevant to an
          media, for example, when someone creates                   individual’s financial history.
          a social network profile or enters credit          Each type of personal data (see Figure 3)—
          card information for online purchases;             volunteered, observed, or inferred—can be created
         “Observed” data are captured by recording          by multiple sources (devices, software
          users’ activities (in contrast to data they        applications), stored, and aggregated by various
          volunteer). Examples include Internet-             providers (Web retailers, Internet search engines,
          browsing preferences, location data when           or utility companies), and then analysed for a
          using cell phones, or telephone usage              variety of purposes for many different users (end
          behaviour;                                         users,     businesses,    public      organisations).
         Organisations can also discern “inferred”
          data from individuals, based on the




        Fig. 3: The Personal data Ecosystem: A complex WEB from data creation to data consumption.
                                    Source: Bain & Company. WEF, 2011
So, in all this chaos of data generation and                 source    of    truth    and     data    ownership.
delegated ownership, where does true ownership
lie? The answer to this question is found in truth,
veracity, and therefore verifiability. Each time
information is generated, a set of data related to
this information is created. This data, when
relayed further, should stand up to scrutiny and
verification. The contention is that the source that
can verify this data and confirm the veracity of the
information is the 'True Owner' of the data. Figure
4 presents a conceptual model to illustrate the                 Fig. 4: Source of Truth of Data Ownership
                                                             Even in the context of complex Web transactions,
                                                             this statement would remain valid. Intimately
                                                             linked to the growth of 'Big Data' are such



©
    Council for Innovative Research                                                              3|Page
www.ijmit.com                                  International Journal of Management & Information Technology
ISSN: 2278-5612                                                              Volume 2, No 1, November, 2012

technology trends as the growth of mobile                  analysis based on these search patterns can be
technology and wireless devices, the emergence of          traced back to Google’s search data.
self-service channels, the broad adoption of cloud-        As depicted in Figure 5, “Big Data” companies
based services, and the expansion of social                collect and analyse massive amounts of data under
networking and remote collaboration (SAP, 2012).           the argument that they can spot trends and offer
For instance, Google is synonymous with its                users niche insights that help create value and
search engine and provides a host of services that         innovation much more rapidly than conventional
require a user to login. When a logged-in user             methods. This generates more data, the analysis of
searches the Web, data are generated related to the        which is—more often than not—as useful as the
user’s search patterns. While the search                   original information. This analytical information
information itself does not belong to Google, the          now belongs to the person and/or the organization
data collected on the search patterns do. Any              that performed the analysis. This brings up the
                                                           critical issue of data usage and information usage.




         Fig. 5: Big Data. Source: http://www.brainflash.com/2012/10/18/big-data-is-that-a-career/
For example, in a well-publicized incident that            search history to other public data, such as the
occurred in August 2006, America Online                    phonebook (Barbaro and Zeller, 2006).
published a dataset of search results. These data
were collected from the searches conducted by              4. THE NEED TO REDEFINE
users and were intended to provide analytical              THE ECOSYSTEM
material to researchers. The data published were
anonymous, without any reference to the users              So who possesses the right to use the information
who carried out the searches. The searchers’               and data that truly do not belong to one’s self?
identities were distinguished as numbers. Five             This is an issue that transcends borders of
days later, however, The New York Times was able           commerce, ethics, and morals, leading to privacy
to locate one of those searchers by linking her            issues and the protection of privacy. It is trivial


©
    Council for Innovative Research                                                           4|Page
www.ijmit.com                                      International Journal of Management & Information Technology
ISSN: 2278-5612                                                                  Volume 2, No 1, November, 2012

that the current personal data ecosystem is                       the unlawful processing of any data (Robinson et
fragmented and inefficient (WEF, 2011). For                       al., 2009). The government should move away
many participants, the risks and liabilities exceed               from a regulatory framework that measures the
the economic returns. On the other hand, personal                 adequacy of data processing by measuring
privacy concerns are inadequately addressed, and                  compliance with certain formalities, and towards a
current technologies and laws fall short of                       framework that instead requires certain
providing the legal and technical infrastructure                  fundamental principles to be respected, and that
needed to support a well-functioning digital                      has the ability, legal authority, and conviction to
infrastructure (ibid.). Instead, they represent a                 impose harsh sanctions when these principles are
patchwork of solutions for collecting and using                   violated (ibid.).
personal data in support of different institutional               A recent report published by the World Economic
aims, and subject to different jurisdictional rules               Forum recommended that the personal data
and regulatory contexts (e.g., personal data                      ecosystem be debated and redefined (WEF, 2012).
systems related to banking have different purposes                This prompts all stakeholders to come to a
and applicable laws than those developed for the                  consensus on some key areas, including the
telecom and healthcare sectors).                                  security and protection of data, development of
It is of importance that governments play a more                  accountability, and agreements on principles or
active regulatory role in modernising their existing              rules for the trusted and allowed flow of data in
policy frameworks to protect personal data from                   different contexts. See           also Table 1
              .Table 1. Key principles to guide the development of the personal data ecosystem.
Guiding Principle                                                 Description
Accountability       Organizations need to be held accountable for appropriate security mechanisms designed to prevent
                     theft and unauthorized access of personal data, as well as for using data in a way that is consistent
                     with agreed upon rules and permissions. They need to have the benefit of “safe harbour” treatment
                     and insulation from open-ended liability, when they can demonstrate compliance with objectively
                     testable rules that hold them to account.
Enforcement:         Mechanisms need to be established to ensure organizations are held accountable for these obligations
                     through a combination of incentives, and where appropriate, financial and other penalties, in addition
                     to legislative, regulatory, judicial, or other enforcement mechanisms.
Data permissions:    Permissions for usage need to be flexible and dynamic to reflect the necessary context and to enable
                     value-creating uses, while weeding out harmful uses. Permissions also need to reflect that many
                     stakeholders— including but not limited to individuals—have certain rights to use data.
Balanced             Principles need to reflect the importance of rights and responsibilities for the usage of personal data
stakeholder roles:   and strike a balance between the different stakeholders—the individual, the organization, and society.
                     They also need to reflect the changing role of the individual from a passive data subject to an active
                     stakeholder and creator of data. One perspective that is gathering momentum, though it is far from
                     being universally accepted, is that a new balance needs to be struck that features the individual at the
                     centre of the flow of personal data, with other stakeholders adapting to positions of interacting with
                     people in a much more consensual, fulfilling manner.
Anonymity and        The principles need to reflect the importance of individuals being able to engage in activities online
identity:            anonymously, while at the same time establishing mechanisms for individuals to effectively
                     authenticate their identity in different contexts, so as to facilitate trust and commerce online.
Shared data          The principles should reflect and preserve the value to society from the sharing and analysis of
commons:             anonymised datasets as a collective resource.

                                                                                                      Source: WEF, 2012




©
    Council for Innovative Research                                                                        5|Page
www.ijmit.com                                    International Journal of Management & Information Technology
ISSN: 2278-5612                                                                Volume 2, No 1, November, 2012

These principles should be global in scope, but              interconnected online environments. Governments
also applicable across sectors and focused beyond            will need to help the public to understand where
merely minimizing data collection, storage, and              they should position themselves within this
usage of data to protect privacy. The principles             spectrum. It will be challenging times for
need to be built on the understanding that to create         governments to keep up with the pace of
value, data must move, and moving data requires              technology development, and those lagging will
the trust of all stakeholders. Organisations will            have a hard time indeed.
need to develop and implement a comprehensive
data governance program that should be based on              6. REFERENCES
these guiding principles. This should help
                                                             [1] Alstyne, M.V., Brynjolfsson, E. and
organisations to design and implement more
                                                                 Madnick, S.E. 1994. Why not One Big
comprehensive structures and to put in place solid
                                                                 Database? Principles for Data Ownership.
accountability that altogether establishes a
                                                                 http://dspace.mit.edu/bitstream/handle/1721.
coordinated response to key issues of trust,
                                                                 1/2516/SWP-3695-31204002-CISL-94-
transparency, control, and value.
                                                                 03.pdf?sequence=1 [Accessed October 2,
5. CONCLUSION                                                    2012].
                                                             [2] Anderson, J.H. 2011. Real Time Systems
The term 'data ownership' is likely to attract more              Resource Management. Real Time Systems.
attention from both practice and research fields.                Vol. 47. No.5. pp.387-388.
The private sector will continue to use data as a            [3] Anderson, R. and Roberts, D. 2012. Big
source of competition and growth. Advocators                     Data: Strategic Risks and Opportunities:
will always justify their practices that this                    Looking Beyond the Technology Issues.
contributes to productivity, innovation, and                     http://www.crowehorwath.net/uploadedFiles/
competitiveness of entire sectors and economies                  Crowe-Horwath-
(Manyika et al., 2011). Governments will need to                 Global/tabbed_content/Big%20Data%20Strat
play a more active role to protect citizens’ privacy             egic%20Risks%20and%20Opportunities%20
rights, in light of the evolving world we live in                White%20Paper_RISK13905.pdf [Accessed
today.                                                           October 2, 2012].
Governments will inevitably need to redesign and             [4] Babcock, C. 2006. Data, Data, Everywhere.
enforce data protection privacy laws and                         Information                            Week.
legislations. This will require establishing policies            http://www.informationweek.com/data-data-
at both the national and international levels. As                everywhere/175801775 [Accessed October 3,
such, governments will need to open up dialogue                  2012].
to establish comprehensive data protection and               [5] Banerjee, S., Bolze, J.D., McNamara, J.M.
privacy laws that could be implemented globally.                 and O’Reilly, K.T. (2011) How Big Data Can
This should be followed by a clearly articulated                 Fuel      Bigger      Growth.       Accenture.
set of standards, policies, procedures, and                      http://www.accenture.com/SiteCollectionDoc
responsibilities regarding data ownership and                    uments/PDF/Accenture-Outlook-How-Big-
data-related activities that may minimize any                    Data-can-fuel-bigger-growth-Strategy.pdf
detrimental outcomes in an event of a data breach                [Accessed October 12, 2012].
(PTACT, 2010). Governments should also focus                 [6] Barbaro, M. and Zeller, T. 2006. A Face Is
on enforcing transparency. Public education                      Exposed for AOL Searcher No. 4417749.
programs might be a good initiative to support                   http://www.nytimes.com/2006/08/09/technol
understanding of how individuals can protect their               ogy/09aol.html?pagewanted=all&_r=2&
personal data, and how such data are being stored                [Accessed October 15, 2012].
and used (Manyika et al., 2011).                             [7] Davenport, T.H., Eccles, R.G. and Prusak, L.
As time passes, we are likely to see increasing                  1992.      Information      Politics.   Sloan
public concerns about privacy and trust in today’s               Management Review, pp. 53-65.


©
    Council for Innovative Research                                                            6|Page
www.ijmit.com                                    International Journal of Management & Information Technology
ISSN: 2278-5612                                                                Volume 2, No 1, November, 2012

[8] Dyché, J. 2007. A Data Governance                               Data/MGI_big_data_full_report.ashx
     Manifesto: Designing and Deploying                             [Accessed October 11, 2012].
     Sustainable           Data        Governance.           [17]   Marc, D., Martinez, R., and Kalaboukis, C.
     http://www.siperian.com/documents/WP_Jill                      2010. “Rethinking Personal Information –
     Dyche_DataGovernance_June07.pdf                                Workshop Pre-read.” Invention Arts and
     [Accessed October 7, 2012].                                    World Economic Forum.
[9] Evans, B.J. (2011) MUCH ADO ABOUT                        [18]   PTACT.2010.Data         Governance       and
     DATA OWNERSHIP. Harvard Journal of                             Stewardship. e Privacy Technical Assistance
     Law & Technology, Volume 25, Number 1.                         Center.
     pp. 70-130.                                                    http://www2.ed.gov/policy/gen/guid/ptac/pdf
[10] Grant, J. and Kirchmaier, T. 2004.Corporate                    /issue-brief-data-governance-and-
     Ownership Structure and Performance in                         stewardship.pdf [Accessed October 13,
     Europe. London School of Economics.                            2012].
     http://eprints.lse.ac.uk/19960/1/Corporate_O            [19]   Rajagopal, S. 2011. Customer Data
     wnership_Structure_and_Performance_in_Eu                       Clustering Using Data Mining Technique.
     rope.pdf [Accessed October 12, 2012].                          International     Journal    of     Database
[11] Halevi, G. and Moed, H. 2012. The                              Management Systems. Vol.3, No.4, pp. 1-11.
     Evolution of Big Data as a Research and                 [20]   Robinson, N., Graux, H., Botterman, M. and
     Scientific Topic. Research Trends: Special                     Valeri, L. 2009. Review of the European
     Issue     on      Big     Data,   Issue     30.                Data Protection Directive.
     http://www.researchtrends.com/wp-                       [21]   SAP.2012.Harnessing the Power of Big Data
     content/uploads/2012/09/Research_Trends_Is                     in Real Time through In-Memory
     sue30.pdf [Accessed October 12, 2012].                         Technology            and          Analytics.
[12] Hart, D. 2000. Data Ownership and                              http://www3.weforum.org/docs/GITR/2012/
     Semiotics in Organisations, or Why "They're                    GITR_Chapter1.7_2012.pdf           [Accessed
     Not Getting Their Hand on My Data!.                            October 13, 2012].
     http://www.pacis-net.org/file/2000/377-                 [22]   Schnarch, B. 2004. Ownership, Control,
     388.pdf [Accessed October 14, 2012].                           Access, and Possession (OCAP) or Self-
[13] Holloway, S. 1988. Data Administration,                        Determination Applied to Research: A
     Gower, Aldershot.                                              Critical Analysis of Contemporary First
[14] Khan, S.M. and Hamlen, K.W. 2012.                              Nations Research and Some Options for
     Anonymous Cloud: A Data Ownership                              First          Nations         Communities.
     Privacy Provider Framework in Cloud                            http://www.research.utoronto.ca/ethics/pdf/h
     Computing.                                                     uman/nonspecific/OCAP%20principles.pdf
     http://www.utdallas.edu/~hamlen/khan12trus                     [Accessed October 12, 2012].
     tcom.pdf [Accessed October 21, 2012].                   [23]   Shields, G. 2010. Addressing Security and
[15] Loshin, D. 2001. Enterprise Knowledge                          Data Ownership Issues when Choosing a
     Management: The Data Quality Approach                          SaaS                                Provider.
     (The Morgan Kaufmann Series in Data                            http://www.quest.com/quest_site_assets/whit
     Management Systems. Morgan Kaufmann.                           epapers/wpw_saas_shields_us_mj.pdf
[16] Manyika, J., Chui, M., Brown, B., Bughin, J.,                  [Accessed October 11, 2012].
     Dobbs, R., Roxburgh, C. and Byers, A.H.                 [24]   Singh, Y.J., Singh, Y.S., Gaikwad, A. and
     2011 Big data: The next frontier for                           Mehrotra, S.C. 2010. Dynamic management
     innovation, competition, and productivity.                     of transactions in distributed real-time
     McKinsey               Global         Institute.               processing system. International Journal of
     http://www.mckinsey.com/~/media/McKinse                        Database Management Systems, vol. 2, no.2.
     y/dotcom/Insights                           and                pp.161-170.
     pubs/MGI/Research/Technology                and         [25]   WEF.2011. Personal Data: The Emergence
     Innovation/Big                                                 of a New Asset Class. World Economic


©
    Council for Innovative Research                                                              7|Page
www.ijmit.com                              International Journal of Management & Information Technology
ISSN: 2278-5612                                                          Volume 2, No 1, November, 2012

     Forum.                                            [27] Wigan, M.R. 1992. 'Data Ownership' in
     http://www3.weforum.org/docs/WEF_ITTC_                 Clarke R.A. & Cameron J. (Eds.) 'Managing
     PersonalDataNewAsset_Report_2011.pdf                   the     Organisational    Implications    of
     [Accessed October 16, 2012].                           Information Technology, II' Elsevier / North
[26] WEF.2012. Rethinking Personal Data:                    Holland, Amsterdam.
     Strengthening                       Trust.        [28] Woodbury, C. 2007. The Importance of Data
     http://www3.weforum.org/docs/WEF_IT_Ret                Classification        and        Ownership.
     hinkingPersonalData_Report_2012.pdf                    http://www.srcsecuresolutions.eu/pdf/Data_C
     [Accessed October 21, 2012].                           lassification_Ownership.pdf        [Accessed
                                                            October 9, 2012].




©
    Council for Innovative Research                                                      8|Page

Weitere ähnliche Inhalte

Was ist angesagt?

HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
Rebecca Norman
 

Was ist angesagt? (20)

Introduction to data protection
Introduction to data protectionIntroduction to data protection
Introduction to data protection
 
GDPR
GDPRGDPR
GDPR
 
HIPPA Security Presentation
HIPPA Security PresentationHIPPA Security Presentation
HIPPA Security Presentation
 
UAE-Personal-Data-Protection-Law.pdf
UAE-Personal-Data-Protection-Law.pdfUAE-Personal-Data-Protection-Law.pdf
UAE-Personal-Data-Protection-Law.pdf
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
Data Ownership and Privacy
Data Ownership and PrivacyData Ownership and Privacy
Data Ownership and Privacy
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
Introduction To Analytics
Introduction To AnalyticsIntroduction To Analytics
Introduction To Analytics
 
What about GDPR?
What about GDPR?What about GDPR?
What about GDPR?
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
The 8 Best Examples Of Real-Time Data Analytics
The 8 Best Examples Of Real-Time Data AnalyticsThe 8 Best Examples Of Real-Time Data Analytics
The 8 Best Examples Of Real-Time Data Analytics
 
Confidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health CareConfidentiality and Data Protection in Health Care
Confidentiality and Data Protection in Health Care
 
GDPR infographic
GDPR infographicGDPR infographic
GDPR infographic
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Overview of the Egyptian Personal Data Protection Law
Overview of the Egyptian Personal Data Protection LawOverview of the Egyptian Personal Data Protection Law
Overview of the Egyptian Personal Data Protection Law
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 

Andere mochten auch

Liberating your data - Data ownership in the Internet of Things
Liberating your data - Data ownership in the Internet of ThingsLiberating your data - Data ownership in the Internet of Things
Liberating your data - Data ownership in the Internet of Things
3scale
 
Energy Consumption in Mid to High-rise Residential Buildings both Before and ...
Energy Consumption in Mid to High-rise Residential Buildings both Before and ...Energy Consumption in Mid to High-rise Residential Buildings both Before and ...
Energy Consumption in Mid to High-rise Residential Buildings both Before and ...
RDH Building Science
 

Andere mochten auch (8)

Online privacy
Online privacyOnline privacy
Online privacy
 
Cloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issuesCloud computing : legal , privacy and contract issues
Cloud computing : legal , privacy and contract issues
 
Liberating your data - Data ownership in the Internet of Things
Liberating your data - Data ownership in the Internet of ThingsLiberating your data - Data ownership in the Internet of Things
Liberating your data - Data ownership in the Internet of Things
 
Data Access, Ownership and Control in Social Web Services: Issues for Twitter...
Data Access, Ownership and Control in Social Web Services: Issues for Twitter...Data Access, Ownership and Control in Social Web Services: Issues for Twitter...
Data Access, Ownership and Control in Social Web Services: Issues for Twitter...
 
Energy Consumption in Mid to High-rise Residential Buildings both Before and ...
Energy Consumption in Mid to High-rise Residential Buildings both Before and ...Energy Consumption in Mid to High-rise Residential Buildings both Before and ...
Energy Consumption in Mid to High-rise Residential Buildings both Before and ...
 
Cloud Computing Legal Issues
Cloud Computing Legal IssuesCloud Computing Legal Issues
Cloud Computing Legal Issues
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Implementing Effective Data Governance
Implementing Effective Data GovernanceImplementing Effective Data Governance
Implementing Effective Data Governance
 

Ähnlich wie Data Ownership: Who Owns 'My Data'?

Future of value of data asia iot-asia presentation - 22 march 2018
Future of value of data asia   iot-asia presentation - 22 march 2018Future of value of data asia   iot-asia presentation - 22 march 2018
Future of value of data asia iot-asia presentation - 22 march 2018
Future Agenda
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
olambel
 

Ähnlich wie Data Ownership: Who Owns 'My Data'? (20)

Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
Unlocking Value in the Fragmented World of Big Data Analytics (POV Paper)
 
Big data Paper
Big data PaperBig data Paper
Big data Paper
 
23 ijcse-01238-1indhunisha
23 ijcse-01238-1indhunisha23 ijcse-01238-1indhunisha
23 ijcse-01238-1indhunisha
 
Unit No2 Introduction to big data.pdf
Unit No2 Introduction to big data.pdfUnit No2 Introduction to big data.pdf
Unit No2 Introduction to big data.pdf
 
Data and Information.docx
Data and Information.docxData and Information.docx
Data and Information.docx
 
Future of value of data singapore.compressed
Future of value of data   singapore.compressedFuture of value of data   singapore.compressed
Future of value of data singapore.compressed
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentals
 
Big Data Ethics
Big Data EthicsBig Data Ethics
Big Data Ethics
 
Big data privacy and inconsistency issues
Big data privacy and inconsistency issuesBig data privacy and inconsistency issues
Big data privacy and inconsistency issues
 
Understanding The Big Data Opportunity Final
Understanding The Big Data Opportunity FinalUnderstanding The Big Data Opportunity Final
Understanding The Big Data Opportunity Final
 
Unit 2
Unit 2Unit 2
Unit 2
 
Future of value of data asia iot-asia presentation - 22 march 2018
Future of value of data asia   iot-asia presentation - 22 march 2018Future of value of data asia   iot-asia presentation - 22 march 2018
Future of value of data asia iot-asia presentation - 22 march 2018
 
Big Data has Big Problems
Big Data has Big ProblemsBig Data has Big Problems
Big Data has Big Problems
 
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
Privacy in the Age of Big Data: Exploring the Role of Modern Identity Managem...
 
(Big) Data infographic - EnjoyDigitAll by BNP Paribas
(Big) Data infographic - EnjoyDigitAll by BNP Paribas(Big) Data infographic - EnjoyDigitAll by BNP Paribas
(Big) Data infographic - EnjoyDigitAll by BNP Paribas
 
Unit III.pdf
Unit III.pdfUnit III.pdf
Unit III.pdf
 
Privacy in the Age of Big Data
Privacy in the Age of Big DataPrivacy in the Age of Big Data
Privacy in the Age of Big Data
 
The state of the Big Data market
The state of the Big Data marketThe state of the Big Data market
The state of the Big Data market
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata PrivacyTwo-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
Two-Phase TDS Approach for Data Anonymization To Preserving Bigdata Privacy
 

Mehr von Arab Federation for Digital Economy

المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
Arab Federation for Digital Economy
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
Arab Federation for Digital Economy
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
Arab Federation for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
Arab Federation for Digital Economy
 

Mehr von Arab Federation for Digital Economy (20)

اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربيةاقتصاد البيانات  ودوره في تعزيز الأنظمة الاقتصادية العربية
اقتصاد البيانات ودوره في تعزيز الأنظمة الاقتصادية العربية
 
Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19Foundations of the UAE and GCC Economies with Covid-19
Foundations of the UAE and GCC Economies with Covid-19
 
سلطة العقل
سلطة العقلسلطة العقل
سلطة العقل
 
الحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارساتالحكومة الرقمية: مفاهيم وممارسات
الحكومة الرقمية: مفاهيم وممارسات
 
المدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقميةالمدفوعات الإلكترونية والعملات الرقمية
المدفوعات الإلكترونية والعملات الرقمية
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
القمة في العمل المؤسسي
القمة في العمل المؤسسيالقمة في العمل المؤسسي
القمة في العمل المؤسسي
 
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
Challenges and Opportunities in Africa: A case of a Digital Economy Blueprint...
 
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزماتالاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
الاقتصاد العالمي بين مطرقة كورونا وسندان الأزمات
 
Digital economy and national security
Digital economy and national securityDigital economy and national security
Digital economy and national security
 
New World Economy
New World EconomyNew World Economy
New World Economy
 
كوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئةكوفيد 19 والآثار الاقتصادية للأوبئة
كوفيد 19 والآثار الاقتصادية للأوبئة
 
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجيكيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
كيف يمكننا بناء الاقتصاد الرقمي: نحو مخطط استراتيجي
 
Digital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital TransformationDigital Economy and Policy Needs for Digital Transformation
Digital Economy and Policy Needs for Digital Transformation
 
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint ActionReconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
Reconstruction: A Gateway to Promote Arab Economic Integration and Joint Action
 
Conflicts in Organisations
Conflicts in OrganisationsConflicts in Organisations
Conflicts in Organisations
 
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبةمستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
مستقبل الاقتصاد العربي تحت وطأة الأزمات المُركّبة
 
Policy Needs for Digital Economy
Policy Needs for Digital EconomyPolicy Needs for Digital Economy
Policy Needs for Digital Economy
 
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
بعد الميزانيات الهائلة، هل حققت مشاريع التحول الرقمي أهدافها؟
 
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
التطور التكنولوجي وضروة أجندات العمل المشتركة لمواجهة التهديدات الاقتصادية وا...
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Data Ownership: Who Owns 'My Data'?

  • 1. www.ijmit.com International Journal of Management & Information Technology ISSN: 2278-5612 Volume 2, No 1, November, 2012 Data Ownership: Who Owns 'My Data'? Ali M. Al-Khouri Director General, Emirates Identity Authority, Abu Dhabi, United Arab Emirates Professor, Identity and Security, The British Institute of Technology and E-Commerce, London, UK ABSTRACT The subject of who actually 'owns' the data or, in other words, the term 'data ownership' has The amount of data in our world today is attracted the attention of researchers in the past substantially outsized. Many of the personal and few years. Data transmitted or generated on digital non-personal aspects of our day-to-day activities communication channels become a potential for are aggregated and stored as data by both surveillance. Data ownership issues are thus likely businesses and governments. The increasing data to proliferate. For instance, Facebook’s famous captured through multimedia, social media, and announcement that users cannot delete their data the Internet are a phenomenon that needs to be from Facebook caused a furor, and Mark properly examined. In this article, we explore this Zuckerberg (one of five co-founders of Facebook) topic and analyse the term data ownership. We was equally famous in his response,"…It’s aim to raise awareness and trigger a debate for complicated". policy makers with regard to data ownership and Indeed it is! In today’s interconnected world the need to improve existing data protection, driven by the Internet, powered by the gigabyte privacy laws, and legislation at both national and network operators, we leave a significant and by international levels. no means subtle scatter of data trail. The often- asked question, and the issue of discussion today, Keywords is- who owns this data? In order to answer this Data ownership; big data; data protection, privacy question, it is important for us to step back to examine the very nature of what we call 'data'. 1. INTRODUCTION Organizations today have more data than they 2. DATA: A MATTER OF have ever had previously. Advancements in INTERPRETATION technology play a critical role in generating large There much confusion about what 'data' really is volumes of data. According to a study published in today's world. The truth is that data are no more by Information Week, the average company’s data than a set of characters, which—unless seen in the volumes nearly double every 12 to 18 months context of usage—have no meaning (Wigan, (Babcock, 2006). Databases are not only getting 1992). Data are what one uses to provide some bigger, but they also are becoming real time information. The context and the usage provide a (Anderson, 2011; Sing et al., 2010). meaning to the data that constitute information. Evolving integration technologies and processing Thus, data in the stand-alone mode have no power have provided organisations the ability to relevance and therefore no value. When there is create more sophisticated and in-depth individual no value in data, then one would surmise that profiles based on one's online and offline ownership is not an issue. That is the paradox of behaviours. The data generated from such systems data ownership. Figure 1 illustrates a data value are increasingly monitored, recorded, and stored pyramid developed by Accenture. The pyramid in various forms, in the name of enabling a more has three levels, starting from raw data, up to the seamless customer experience (Banerjee et al., insights and then the transactions levels. The base 2011; Halevi and Moed, 2012; Rajagopal, 2011). of the pyramid features raw, less differentiated, © Council for Innovative Research 1|Page
  • 2. www.ijmit.com International Journal of Management & Information Technology ISSN: 2278-5612 Volume 2, No 1, November, 2012 and thus less valuable data. Moving up the Data'? Would the financial statement sent by a pyramid creates larger value and revenue company to me as a shareholder qualify as 'My opportunities. Data'? We would argue no. 'My Data', in its strict sense, comprise just our personal attributes—no more. This is the data that I own. I use 'My Data' as information to identify myself for my personal gains, whether physical, logical, or emotional. 'My Data' are thus in the open and either implicitly or explicitly shared. When I share the data, I delegate the ownership. Thus, my data have multiple owners, and the number of owners increases with each share. Figure 2 provides an illustration of this viewpoint. Fig 1: Data value pyramid. Source: Banerjee et al., 2011 As such, governments and public sector institutions consider data a public utility (WEF, 2011). They tend to label our personal data as 'corporate data' and argue that without data, they cannot function (Holloway, 1988). It is no wonder that the volume of stored data in today's organisations has increased exponentially. It is in this context that ownership of data needs to be considered. As data are generated, then data are stored. When we speak about data ownership, we refer to the storage process. If so, then the ownership of data storage resides with the owner of the storage. Thus, we as individuals, the government as our governing agent, law enforcement agencies and the courts, security agencies, our service providers, and our network Fig. 2: Potential owners of 'My Data' operators who enable us to move our data are all As the number of transactions increases with 'My our data owners. They own the storage systems Attributes', 'My Data' grow and, in turn, increase and thereby the data held within such systems. In the number of data owners. What essentially is addition, the emergence of customer data happening is that with every transaction, integration (CDI) and of master data management information is shared as data. Each time (MDM) technologies has enabled the integration information is shared, new data are generated. As of disparate data from across multiple silos into new data are generated, new ownership is created. commonly defined, reconciled information The diagram (Figure 2) illustrates just a tip of the accessible by a range of systems and business proverbial iceberg of data generation from 'My users (Dyché, 2007). Data'! We would like to pause here and examine the 3. PERSONAL DATA concept of 'My Data'. Just what is 'My Data'? Do we consider information of friends and family that ECOSYSTEM AND OWNERSHIP Typically, organisations can capture different we hold to be ‘My Data’? Do bank statements and personal data in a variety of ways (Marc et al., credit statements sent by banks qualify as 'My 2010): © Council for Innovative Research 2|Page
  • 3. www.ijmit.com International Journal of Management & Information Technology ISSN: 2278-5612 Volume 2, No 1, November, 2012  Data can be “volunteered” by individuals analysis of personal data. For instance, when they explicitly share information credit scores can be calculated based on a about themselves through electronic number of factors relevant to an media, for example, when someone creates individual’s financial history. a social network profile or enters credit Each type of personal data (see Figure 3)— card information for online purchases; volunteered, observed, or inferred—can be created  “Observed” data are captured by recording by multiple sources (devices, software users’ activities (in contrast to data they applications), stored, and aggregated by various volunteer). Examples include Internet- providers (Web retailers, Internet search engines, browsing preferences, location data when or utility companies), and then analysed for a using cell phones, or telephone usage variety of purposes for many different users (end behaviour; users, businesses, public organisations).  Organisations can also discern “inferred” data from individuals, based on the Fig. 3: The Personal data Ecosystem: A complex WEB from data creation to data consumption. Source: Bain & Company. WEF, 2011 So, in all this chaos of data generation and source of truth and data ownership. delegated ownership, where does true ownership lie? The answer to this question is found in truth, veracity, and therefore verifiability. Each time information is generated, a set of data related to this information is created. This data, when relayed further, should stand up to scrutiny and verification. The contention is that the source that can verify this data and confirm the veracity of the information is the 'True Owner' of the data. Figure 4 presents a conceptual model to illustrate the Fig. 4: Source of Truth of Data Ownership Even in the context of complex Web transactions, this statement would remain valid. Intimately linked to the growth of 'Big Data' are such © Council for Innovative Research 3|Page
  • 4. www.ijmit.com International Journal of Management & Information Technology ISSN: 2278-5612 Volume 2, No 1, November, 2012 technology trends as the growth of mobile analysis based on these search patterns can be technology and wireless devices, the emergence of traced back to Google’s search data. self-service channels, the broad adoption of cloud- As depicted in Figure 5, “Big Data” companies based services, and the expansion of social collect and analyse massive amounts of data under networking and remote collaboration (SAP, 2012). the argument that they can spot trends and offer For instance, Google is synonymous with its users niche insights that help create value and search engine and provides a host of services that innovation much more rapidly than conventional require a user to login. When a logged-in user methods. This generates more data, the analysis of searches the Web, data are generated related to the which is—more often than not—as useful as the user’s search patterns. While the search original information. This analytical information information itself does not belong to Google, the now belongs to the person and/or the organization data collected on the search patterns do. Any that performed the analysis. This brings up the critical issue of data usage and information usage. Fig. 5: Big Data. Source: http://www.brainflash.com/2012/10/18/big-data-is-that-a-career/ For example, in a well-publicized incident that search history to other public data, such as the occurred in August 2006, America Online phonebook (Barbaro and Zeller, 2006). published a dataset of search results. These data were collected from the searches conducted by 4. THE NEED TO REDEFINE users and were intended to provide analytical THE ECOSYSTEM material to researchers. The data published were anonymous, without any reference to the users So who possesses the right to use the information who carried out the searches. The searchers’ and data that truly do not belong to one’s self? identities were distinguished as numbers. Five This is an issue that transcends borders of days later, however, The New York Times was able commerce, ethics, and morals, leading to privacy to locate one of those searchers by linking her issues and the protection of privacy. It is trivial © Council for Innovative Research 4|Page
  • 5. www.ijmit.com International Journal of Management & Information Technology ISSN: 2278-5612 Volume 2, No 1, November, 2012 that the current personal data ecosystem is the unlawful processing of any data (Robinson et fragmented and inefficient (WEF, 2011). For al., 2009). The government should move away many participants, the risks and liabilities exceed from a regulatory framework that measures the the economic returns. On the other hand, personal adequacy of data processing by measuring privacy concerns are inadequately addressed, and compliance with certain formalities, and towards a current technologies and laws fall short of framework that instead requires certain providing the legal and technical infrastructure fundamental principles to be respected, and that needed to support a well-functioning digital has the ability, legal authority, and conviction to infrastructure (ibid.). Instead, they represent a impose harsh sanctions when these principles are patchwork of solutions for collecting and using violated (ibid.). personal data in support of different institutional A recent report published by the World Economic aims, and subject to different jurisdictional rules Forum recommended that the personal data and regulatory contexts (e.g., personal data ecosystem be debated and redefined (WEF, 2012). systems related to banking have different purposes This prompts all stakeholders to come to a and applicable laws than those developed for the consensus on some key areas, including the telecom and healthcare sectors). security and protection of data, development of It is of importance that governments play a more accountability, and agreements on principles or active regulatory role in modernising their existing rules for the trusted and allowed flow of data in policy frameworks to protect personal data from different contexts. See also Table 1 .Table 1. Key principles to guide the development of the personal data ecosystem. Guiding Principle Description Accountability Organizations need to be held accountable for appropriate security mechanisms designed to prevent theft and unauthorized access of personal data, as well as for using data in a way that is consistent with agreed upon rules and permissions. They need to have the benefit of “safe harbour” treatment and insulation from open-ended liability, when they can demonstrate compliance with objectively testable rules that hold them to account. Enforcement: Mechanisms need to be established to ensure organizations are held accountable for these obligations through a combination of incentives, and where appropriate, financial and other penalties, in addition to legislative, regulatory, judicial, or other enforcement mechanisms. Data permissions: Permissions for usage need to be flexible and dynamic to reflect the necessary context and to enable value-creating uses, while weeding out harmful uses. Permissions also need to reflect that many stakeholders— including but not limited to individuals—have certain rights to use data. Balanced Principles need to reflect the importance of rights and responsibilities for the usage of personal data stakeholder roles: and strike a balance between the different stakeholders—the individual, the organization, and society. They also need to reflect the changing role of the individual from a passive data subject to an active stakeholder and creator of data. One perspective that is gathering momentum, though it is far from being universally accepted, is that a new balance needs to be struck that features the individual at the centre of the flow of personal data, with other stakeholders adapting to positions of interacting with people in a much more consensual, fulfilling manner. Anonymity and The principles need to reflect the importance of individuals being able to engage in activities online identity: anonymously, while at the same time establishing mechanisms for individuals to effectively authenticate their identity in different contexts, so as to facilitate trust and commerce online. Shared data The principles should reflect and preserve the value to society from the sharing and analysis of commons: anonymised datasets as a collective resource. Source: WEF, 2012 © Council for Innovative Research 5|Page
  • 6. www.ijmit.com International Journal of Management & Information Technology ISSN: 2278-5612 Volume 2, No 1, November, 2012 These principles should be global in scope, but interconnected online environments. Governments also applicable across sectors and focused beyond will need to help the public to understand where merely minimizing data collection, storage, and they should position themselves within this usage of data to protect privacy. The principles spectrum. It will be challenging times for need to be built on the understanding that to create governments to keep up with the pace of value, data must move, and moving data requires technology development, and those lagging will the trust of all stakeholders. Organisations will have a hard time indeed. need to develop and implement a comprehensive data governance program that should be based on 6. REFERENCES these guiding principles. This should help [1] Alstyne, M.V., Brynjolfsson, E. and organisations to design and implement more Madnick, S.E. 1994. Why not One Big comprehensive structures and to put in place solid Database? Principles for Data Ownership. accountability that altogether establishes a http://dspace.mit.edu/bitstream/handle/1721. coordinated response to key issues of trust, 1/2516/SWP-3695-31204002-CISL-94- transparency, control, and value. 03.pdf?sequence=1 [Accessed October 2, 5. CONCLUSION 2012]. [2] Anderson, J.H. 2011. Real Time Systems The term 'data ownership' is likely to attract more Resource Management. Real Time Systems. attention from both practice and research fields. Vol. 47. No.5. pp.387-388. The private sector will continue to use data as a [3] Anderson, R. and Roberts, D. 2012. Big source of competition and growth. Advocators Data: Strategic Risks and Opportunities: will always justify their practices that this Looking Beyond the Technology Issues. contributes to productivity, innovation, and http://www.crowehorwath.net/uploadedFiles/ competitiveness of entire sectors and economies Crowe-Horwath- (Manyika et al., 2011). Governments will need to Global/tabbed_content/Big%20Data%20Strat play a more active role to protect citizens’ privacy egic%20Risks%20and%20Opportunities%20 rights, in light of the evolving world we live in White%20Paper_RISK13905.pdf [Accessed today. October 2, 2012]. Governments will inevitably need to redesign and [4] Babcock, C. 2006. Data, Data, Everywhere. enforce data protection privacy laws and Information Week. legislations. This will require establishing policies http://www.informationweek.com/data-data- at both the national and international levels. As everywhere/175801775 [Accessed October 3, such, governments will need to open up dialogue 2012]. to establish comprehensive data protection and [5] Banerjee, S., Bolze, J.D., McNamara, J.M. privacy laws that could be implemented globally. and O’Reilly, K.T. (2011) How Big Data Can This should be followed by a clearly articulated Fuel Bigger Growth. Accenture. set of standards, policies, procedures, and http://www.accenture.com/SiteCollectionDoc responsibilities regarding data ownership and uments/PDF/Accenture-Outlook-How-Big- data-related activities that may minimize any Data-can-fuel-bigger-growth-Strategy.pdf detrimental outcomes in an event of a data breach [Accessed October 12, 2012]. (PTACT, 2010). Governments should also focus [6] Barbaro, M. and Zeller, T. 2006. A Face Is on enforcing transparency. Public education Exposed for AOL Searcher No. 4417749. programs might be a good initiative to support http://www.nytimes.com/2006/08/09/technol understanding of how individuals can protect their ogy/09aol.html?pagewanted=all&_r=2& personal data, and how such data are being stored [Accessed October 15, 2012]. and used (Manyika et al., 2011). [7] Davenport, T.H., Eccles, R.G. and Prusak, L. As time passes, we are likely to see increasing 1992. Information Politics. Sloan public concerns about privacy and trust in today’s Management Review, pp. 53-65. © Council for Innovative Research 6|Page
  • 7. www.ijmit.com International Journal of Management & Information Technology ISSN: 2278-5612 Volume 2, No 1, November, 2012 [8] Dyché, J. 2007. A Data Governance Data/MGI_big_data_full_report.ashx Manifesto: Designing and Deploying [Accessed October 11, 2012]. Sustainable Data Governance. [17] Marc, D., Martinez, R., and Kalaboukis, C. http://www.siperian.com/documents/WP_Jill 2010. “Rethinking Personal Information – Dyche_DataGovernance_June07.pdf Workshop Pre-read.” Invention Arts and [Accessed October 7, 2012]. World Economic Forum. [9] Evans, B.J. (2011) MUCH ADO ABOUT [18] PTACT.2010.Data Governance and DATA OWNERSHIP. Harvard Journal of Stewardship. e Privacy Technical Assistance Law & Technology, Volume 25, Number 1. Center. pp. 70-130. http://www2.ed.gov/policy/gen/guid/ptac/pdf [10] Grant, J. and Kirchmaier, T. 2004.Corporate /issue-brief-data-governance-and- Ownership Structure and Performance in stewardship.pdf [Accessed October 13, Europe. London School of Economics. 2012]. http://eprints.lse.ac.uk/19960/1/Corporate_O [19] Rajagopal, S. 2011. Customer Data wnership_Structure_and_Performance_in_Eu Clustering Using Data Mining Technique. rope.pdf [Accessed October 12, 2012]. International Journal of Database [11] Halevi, G. and Moed, H. 2012. The Management Systems. Vol.3, No.4, pp. 1-11. Evolution of Big Data as a Research and [20] Robinson, N., Graux, H., Botterman, M. and Scientific Topic. Research Trends: Special Valeri, L. 2009. Review of the European Issue on Big Data, Issue 30. Data Protection Directive. http://www.researchtrends.com/wp- [21] SAP.2012.Harnessing the Power of Big Data content/uploads/2012/09/Research_Trends_Is in Real Time through In-Memory sue30.pdf [Accessed October 12, 2012]. Technology and Analytics. [12] Hart, D. 2000. Data Ownership and http://www3.weforum.org/docs/GITR/2012/ Semiotics in Organisations, or Why "They're GITR_Chapter1.7_2012.pdf [Accessed Not Getting Their Hand on My Data!. October 13, 2012]. http://www.pacis-net.org/file/2000/377- [22] Schnarch, B. 2004. Ownership, Control, 388.pdf [Accessed October 14, 2012]. Access, and Possession (OCAP) or Self- [13] Holloway, S. 1988. Data Administration, Determination Applied to Research: A Gower, Aldershot. Critical Analysis of Contemporary First [14] Khan, S.M. and Hamlen, K.W. 2012. Nations Research and Some Options for Anonymous Cloud: A Data Ownership First Nations Communities. Privacy Provider Framework in Cloud http://www.research.utoronto.ca/ethics/pdf/h Computing. uman/nonspecific/OCAP%20principles.pdf http://www.utdallas.edu/~hamlen/khan12trus [Accessed October 12, 2012]. tcom.pdf [Accessed October 21, 2012]. [23] Shields, G. 2010. Addressing Security and [15] Loshin, D. 2001. Enterprise Knowledge Data Ownership Issues when Choosing a Management: The Data Quality Approach SaaS Provider. (The Morgan Kaufmann Series in Data http://www.quest.com/quest_site_assets/whit Management Systems. Morgan Kaufmann. epapers/wpw_saas_shields_us_mj.pdf [16] Manyika, J., Chui, M., Brown, B., Bughin, J., [Accessed October 11, 2012]. Dobbs, R., Roxburgh, C. and Byers, A.H. [24] Singh, Y.J., Singh, Y.S., Gaikwad, A. and 2011 Big data: The next frontier for Mehrotra, S.C. 2010. Dynamic management innovation, competition, and productivity. of transactions in distributed real-time McKinsey Global Institute. processing system. International Journal of http://www.mckinsey.com/~/media/McKinse Database Management Systems, vol. 2, no.2. y/dotcom/Insights and pp.161-170. pubs/MGI/Research/Technology and [25] WEF.2011. Personal Data: The Emergence Innovation/Big of a New Asset Class. World Economic © Council for Innovative Research 7|Page
  • 8. www.ijmit.com International Journal of Management & Information Technology ISSN: 2278-5612 Volume 2, No 1, November, 2012 Forum. [27] Wigan, M.R. 1992. 'Data Ownership' in http://www3.weforum.org/docs/WEF_ITTC_ Clarke R.A. & Cameron J. (Eds.) 'Managing PersonalDataNewAsset_Report_2011.pdf the Organisational Implications of [Accessed October 16, 2012]. Information Technology, II' Elsevier / North [26] WEF.2012. Rethinking Personal Data: Holland, Amsterdam. Strengthening Trust. [28] Woodbury, C. 2007. The Importance of Data http://www3.weforum.org/docs/WEF_IT_Ret Classification and Ownership. hinkingPersonalData_Report_2012.pdf http://www.srcsecuresolutions.eu/pdf/Data_C [Accessed October 21, 2012]. lassification_Ownership.pdf [Accessed October 9, 2012]. © Council for Innovative Research 8|Page