SlideShare ist ein Scribd-Unternehmen logo
1 von 60
2016 Ontario Connections.
Presented by Louise Spiteri
Your organization and Big Data:
Managing, access, privacy, & security
Defining Big Data
2016 Ontario Connections.
Big data is high-volume, high-velocity and
high-variety information assets that demand
cost-effective, innovative forms of information
processing for enhanced insight and decision
making. http://www.gartner.com/it-glossary/big-data/
Big data is a term that describes large volumes
of high velocity, complex, and variable data
that require advanced techniques and
technologies to enable the capture, storage,
distribution, management, and analysis of the
information.
http://www.techamerica.org/Docs/fileManager.cfm?f=techamerica-
bigdatareport-final.pdf
Defining
Big Data
2016 Ontario Connections.
“Insights from Big Data can enable you to
make better decisions. They can help you
facilitate growth and organizational
transformation, reduce costs and manage
volatility and risk. This enables you to
capitalize on new sources of revenue and
generate more value for your organization.”
Financial Accounting Advisory Services (n.d.). Big data strategy to support the CFO and
governance agenda
The
value of
Big Data
2016 Ontario Connections.
The 4 Vs
of Big
Data
2016 Ontario Connections.
How much
data does
your
organization
generate?
2016 Ontario Connections.
Big Data tends to be measured in terms of
terabytes and petabytes (1024 terabytes).
Definitions of “big” are relative, and fluctuate,
especially as storage capacities increase over
time.
Data is generated by every computerized
system in the organization, including human
resources solutions, supply-chain management
software, and social media tools for marketing.
Volume
2016 Ontario Connections.
Google indexes 20 billion pages per day.
Twitter has more than 500 million users and 400
million tweets per day.
Facebook generates 2.7 million
‘Likes’, 500 TB processed, and 300 million photos
that are uploaded per day.
http://bit.ly/1SVxPwp; http://bit.ly/1SVy76j; http://bloom.bg/1SVyldK
Examples
of volume
2016 Ontario Connections.
What types
of data do
you collect
& manage?
2016 Ontario Connections.
Organizations generate various types of structured,
semi-structured, and unstructured data.
Structured data is the tabular type found in
spreadsheets or relational databases (about 10% of
most data).
Text, images, audio, and video are examples of
unstructured data, which sometimes lacks the
structural organization required by machines for
analysis
Variety
2016 Ontario Connections.
How
quickly
does your
data grow
& change?
2016 Ontario Connections.
Velocity refers to the rate at which data is
generated and the speed at which it should be
analyzed and acted upon.
The proliferation of digital devices such as
smartphones has led to an unprecedented rate
of data creation and is driving a growing need
for real-time analytics and evidence-based
planning
Velocity
2016 Ontario Connections.
How
accurate
& reliable
is your
data?
2016 Ontario Connections.
Some data is inherently unreliable; for
example, customer comments in social media,
as they entail judgment.
We need to deal with imprecise and uncertain
data. Is the data that is being stored, and
mined meaningful to the problem being
analyzed?
Veracity
2016 Ontario Connections.
Big Data is often characterized by relatively
“low value density”. That is, the data received
in the original form usually has a low value
relative to its volume. However, a high value
can be obtained by analyzing large volumes of
such data.
Value
2016 Ontario Connections.
Value is any application of big data
that:
• Drives revenue increases (e.g. customer
loyalty analytics)
• Identifies new revenue opportunities,
improves quality and customer satisfaction
(e.g., Predictive Maintenance),
• Saves costs (e.g., fraud analytics)
• Drives better outcomes (e.g., patient care).
Value
What Big Data looks
like
2016 Ontario Connections.
An example
of how Big
Data can be
used
2016 Ontario Connections.
Blogs, tweets, social networking sites (such as
LinkedIn and Facebook), blogs, news feeds,
discussion boards, and video sites all fall under
Big Data.
Social
media
2016 Ontario Connections.
Machine-generated data constitutes a wide variety
of devices, from RFIDs to sensors, such as optical,
acoustic, seismic, thermal, chemical, scientific, and
medical devices, and even the weather.
Machine-
generated
data
2016 Ontario Connections.
From the GPS systems in our cars, in planes, and ships, to
GPS apps on smartphones, we use GPS to guide our
movements.
GPS is used to track our movements, such as emergency
beacons, and retailers who use in-store WiFi networks to
access shoppers’ smartphones and track their shopping
habits.
Location Based Services (LBS) allow us to deliver services
based on the location of moving objects such as cars or
people with mobile phones.
GPS
and
spatial
data
Mining Big Data
2016 Ontario Connections.
It is generally thought that the true value of Big Data is
seen only when it is used to drive decision making.
You need efficient processes to turn high volumes of
fast-moving and varied data into meaningful insights.
As information managers, you might not be doing the
analysis, but you have a crucial role to play in
managing this data to enable this analysis.
Big Data
analytics:
How do
we mine
our data?
2016 Ontario Connections.
Text analytics extract information from textual
data.
• Social network feeds, emails, blogs, online forums, survey
responses, corporate documents, news, and call centre
logs are examples of textual data held by organizations.
Text analytics enable organizations to convert
large volumes of human generated text into
meaningful summaries, which support
evidence-based decision-making.
Text
analytics
2016 Ontario Connections.
Audio analytics analyze and extract information
from unstructured audio data. Customer call
centres and healthcare are the primary
application areas of audio analytics.
• Call centres use audio analytics for efficient analysis
of recorded calls to improve customer experience,
evaluate agent performance, and so forth.
• In healthcare, audio analytics support diagnosis and
treatment of certain medical conditions that affect the
patient’s communication patterns
(e.g.,schizophrenia), or analyze an infant’s cries to
learn about the infant’s health and emotional status.
Audio
analytics
2016 Ontario Connections.
Video analytics involves a variety of techniques to
monitor, analyze, and extract meaningful information
from video streams.
The increasing prevalence of closed-circuit television
(CCTV) cameras and of video-sharing websites are
the two leading contributors to the growth of
computerized video analysis. A key challenge,
however, is the sheer size of video data.
Video
analytics
2016 Ontario Connections.
Social media analytics refer to the analysis of
structured and unstructured data from social
media channels.
• Social networks (e.g., Facebookand LinkedIn)
• Blogs (e.g., Blogger and WordPress)
• Microblogs (e.g.,Twitter and Tumblr)
• Social news (e.g., Digg and Reddit)
• Socia bookmarking (e.g., Delicious and StumbleUpon)
• Media sharing (e.g., Instagram and YouTube)
• Wikis (e.g., Wikipedia and Wikihow)
• Question-and-answer sites (e.g., Yahoo! Answers and
Ask.com)
• Review sites (e.g., Yelp, TripAdvisor)
Social
media
analytics
2016 Ontario Connections.
Predictive analytics comprise a variety of
techniques that predict future outcomes based
on historical and current data, e.g., predicting
customers’ travel plans based on what they
buy, when they buy, and even what they say on
social media.
Predictive
analytics
Privacy and security of
Big Data
2016 Ontario Connections.
Canadian federal institutions reported 256 data breaches
in 2014-2015, up from 228 the year before. The main
culprit was identified as the use portable storage
devices:
• More than two-thirds of the agencies had not formally
assessed the risks surrounding the use of all types of
portable storage devices;
• More than 90 per cent did not track all devices
throughout their life cycle;
• One-quarter did not enforce the use of encrypted
storage devices.
http://bit.ly/27Say7c
Security
concerns
2016 Ontario Connections.
• More data translates = higher risk of exposure in the event of a
breach.
• More experimental usage = the organization's governance and
security protocol is less likely to be in place
• New types of data are uncovering new privacy implications, with
few privacy laws or guidelines to protect that information (e.g.,
cell phone beacons that broadcast physical location, & health
devices such as medical, fitness and lifestyle trackers).
• Data linkage and combined sensitive data. The act of combining
multiple data sources can create unanticipated sensitive data
exposure.
Considerations
for Big Data
2016 Ontario Connections.
“The protection of information and
information systems from unauthorized
access, use, disclosure, disruption,
modification, or destruction in order to
provide confidentiality, integrity, and
availability.” National Institutes of Standards and Technology
Information
security:
Definition
2016 Ontario Connections.
“The claim of individuals, groups
or institutions to determine for
themselves when, how and to
what extent, information about
them is communicated to others.”
International Association of Privacy Professionals
Data
privacy:
Definition
2016 Ontario Connections.
Under the federal Personal Information Protection and
Electronic Documents Act (PIPEDA), “personal
information” is “information about an identifiable
individual, but does not include the name, title or
business address or telephone number of an
employee of an organization.”
Regulatory
framework
for big
data
2016 Ontario Connections.
The protection of personal information in
Canada rests on three fundamental goals:.
• Transparency – providing people with a basic understanding of
how their personal information will be used in order to gain
informed consent
• Limiting use plus consent – the use of that information only for
the declared purpose for which it was initially collected, or
purposes consistent with that use; and,
• Minimization – limiting the personal information collected to what
is directly relevant and necessary to accomplish the declared
purpose and the discarding of the data once the original purpose
has been served.
PIPEDA
and Big
Data
2016 Ontario Connections.
Organizations that attempt to implement Big Data
initiatives without a strong governance regime in place,
risk placing themselves in ethical dilemmas without set
processes or guidelines to follow.
A strong ethical code, along with process, training,
people, and metrics, is imperative to govern what
organizations can do within a Big Data program.
Big Data
governance
2016 Ontario Connections.
Data used for Big Data analytics can be gathered
combined from different sources, and create new data
sets.
Organizations must make sure that all security and
privacy requirements that are applied to their original
data sets are tracked and maintained across Big Data
processes throughout the information life cycle, from
data collection to disclosure or retention/destruction.
Respecting
the original
intent of the
information
gathered
2016 Ontario Connections.
Data that has been processed, enhanced, or changed
by Big Data should be anonymized to protect the
privacy of the original data source, such as customers
or vendors.
Data that is not properly anonymized prior to external
release (or in some cases, internal as well) may result
in the compromise of data privacy, as the data is
combined with previously collected, complex data
sets.
Re-
Identification
2016 Ontario Connections.
Matching data sets from third parties may provide
valuable insights that could not be obtained with
your data alone.
You need to consider and evaluate the adequacy of
the security and privacy data protections in place at
the third-party organizations.
Third-
party
use
2016 Ontario Connections.
Big data’s potential for predictive analysis raises
particular concerns for data security and privacy.
• Think of the famous case of Target, which sent
coupons to a teenage girl, based upon her
shopping preferences, which suggested she
was pregnant, as well as her due date (Target
was accurate). The girl’s family found out
about her pregnancy through these coupons.
• Did the girl know that her shopping information
would be used for this purpose?
• Was she informed of Target’s privacy policy?
The risks of
predictive
analytics
2016 Ontario Connections.
There are growing concerns that Big Data is
straining the privacy principles of identifying
purposes and limited use.
Consumers are called upon to agree to privacy
policies and consent forms that no one has the
time to read. The burden is increasingly placed
on the consumers, as these policies take the
form of disclaimers for the orgnizations.
Increasing
burden on
the
consumer
2016 Ontario Connections.
“Just because commercial
organizations can collect
personal information and run it
through the revealing algorithms
of predictive analytics, doesn’t
mean that they should.”
Jennifer Stoddard
Can we
vs.
should
we?
2016 Ontario Connections.
A useful tool is the Privacy Maturity Model
designed by the American Institute of Certified
Public Accountants (AICPA) or the Canadian
Institute of Chartered Accountants (CICA).
These sections are particularly relevant:
• 1.2.3: Personal information identification and classification
• 1.2.4: Risk assessment
• 1.2.6: Infrastructure and systems management
• 3.2.2: Consent for new purposes and uses
• 4.2.4: Information developed about individuals
• 8.2.1: Information security program.
http://bit.ly/1R3VcQZ
Privacy
assessment
2016 Ontario Connections.
Privacy Life cycle (from Maturity Model)
Information governance
life cycle for Big Data
2016 Ontario Connections.
Strong data governance policies
and procedures are important:
• Who owns the data?
• Who is responsible for protecting the
data?
• How is data collected?
• What data is collected?
• How is the data retained?
Handling
&
retaining
data
2016 Ontario Connections.
What security & privacy regulations apply to your
data?
What are the compliance provisions of your
agreements with any third parties or service providers.
What are their privacy and security policies?
Developing a solid compliance framework with a risk-
based map for implementation and maintenance.
Compliance
2016 Ontario Connections.
Develop case scenarios where you would use Big
Data.
Identify what data will be used and how.
Identify possible risks
In this way, you are prepared for when you actually
use the Big Data, rather than be in a position to react
if something goes wrong.
Data
use
cases
2016 Ontario Connections.
Tell your customers what personal data you
collect and how you use it.
Provide consistent consent mechanisms
across all products
Ensure that customers have the means to
withdraw their consent at the individual device
level.
Manage
consent
2016 Ontario Connections.
Have rigorous controls over who has access to
the data.
Have periodic review of who has access rights,
and ensure that rights are removed
immediately, as and when required.
Access
management
2016 Ontario Connections.
Remove all Personally Identifiable
Information (PII) from a data set and turn it into non-
identifying data.
Monitor anonymization requirements and analyze
the risks of re-identification.
Anonymization
2016 Ontario Connections.
Maintain your responsibility to your customers
when you share data with third parties.
Include specific Big Data provisions within
contractual agreements.
Monitor third parties for compliance with data-
sharing agreements.
Data
sharing
Examples of data
breaches
2016 Ontario Connections.
Information is Beautiful
http://bit.ly/1SrCghQ
Interactive
view of big
data
breaches
2016 Ontario Connections.
Big data
breaches,
1
2016 Ontario Connections.
Database of 191 million U.S. voters exposed
on Internet
• An independent computer security researcher uncovered a database of
information on 191 million voters that is exposed on the open Internet.
The database includes names, addresses, birth dates, party affiliations,
phone numbers and emails of voters in all 50 U.S. states.
• A representative with the U.S. Federal Elections Commission, which
regulates campaign financing, said the agency does not have
jurisdiction over protecting voter records.
• Regulations on protecting voter data vary from state to state, with many
states imposing no restrictions. California, for example, requires that
voter data be used for political purposes only and not be available to
persons outside of the United States.
Government
breach
2016 Ontario Connections.
Anthem
• Health insurer Anthem’s database was hacked
into. The personal information of 78.8 million
people was potentially stolen.
• The data breach extended into multiple brands
Anthem, Inc. uses to market its healthcare plans,
including, Anthem Blue Cross, Anthem Blue Cross
and Blue Shield, Blue Cross and Blue Shield of
Georgia, Empire Blue Cross and Blue Shield,
Amerigroup, Caremore, and UniCare.
Corporate
breach
2016 Ontario Connections.
2016 Ontario Connections.
Louise.Spiteri@dal.ca
• @Cleese6
• LinkedIn
• AboutMe
• ResearchGate
• School of Information Management
Contact
information
2016 Ontario Connections.
http://www.looiconsulting.com/home/enterprise-big-data/
http://www.ibmbigdatahub.com/sites/default/files/infographic
_file/4-Vs-of-big-data.jpg
http://www.kscpa.org/writable/files/AICPADocuments/10-
229_aicpa_cica_privacy_maturity_model_finalebook.pdf
http://blog.templatemonster.com/2013/04/30/thank-you-
pages-optimization/
Image
sources

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationiWriteEssays
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Big Data and Classification
Big Data and ClassificationBig Data and Classification
Big Data and Classification303Computing
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHellmuth Broda
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, securityRoman Chanclor
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Khaled El Emam
 
Introduction to big data
Introduction to big dataIntroduction to big data
Introduction to big dataHari Priya
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloudsornalathaNatarajan
 
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...Edureka!
 
Accenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-MotionAccenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-MotionSteven Tiell
 
Big Data & Analytics for Government - Case Studies
Big Data & Analytics for Government - Case StudiesBig Data & Analytics for Government - Case Studies
Big Data & Analytics for Government - Case StudiesJohn Palfreyman
 
Mphasi s agil_analytics_life_cycle_business_style_for_big_data_services[1]
Mphasi s agil_analytics_life_cycle_business_style_for_big_data_services[1]Mphasi s agil_analytics_life_cycle_business_style_for_big_data_services[1]
Mphasi s agil_analytics_life_cycle_business_style_for_big_data_services[1]balvis_ms
 
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...Booz Allen Hamilton
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?John D. Johnson
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 

Was ist angesagt? (20)

Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
 
data mining privacy concerns ppt presentation
data mining privacy concerns ppt presentationdata mining privacy concerns ppt presentation
data mining privacy concerns ppt presentation
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Big Data and Classification
Big Data and ClassificationBig Data and Classification
Big Data and Classification
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
ebook.driving decision-making, security
ebook.driving decision-making, securityebook.driving decision-making, security
ebook.driving decision-making, security
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Introduction to big data
Introduction to big dataIntroduction to big data
Introduction to big data
 
Security issues associated with big data in cloud
Security issues associated  with big data in cloudSecurity issues associated  with big data in cloud
Security issues associated with big data in cloud
 
Big data
Big dataBig data
Big data
 
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
Big Data Applications | Big Data Analytics Use-Cases | Big Data Tutorial for ...
 
Accenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-MotionAccenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-Motion
 
Big Data & Analytics for Government - Case Studies
Big Data & Analytics for Government - Case StudiesBig Data & Analytics for Government - Case Studies
Big Data & Analytics for Government - Case Studies
 
Mphasi s agil_analytics_life_cycle_business_style_for_big_data_services[1]
Mphasi s agil_analytics_life_cycle_business_style_for_big_data_services[1]Mphasi s agil_analytics_life_cycle_business_style_for_big_data_services[1]
Mphasi s agil_analytics_life_cycle_business_style_for_big_data_services[1]
 
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 

Andere mochten auch

Big Data Content Organization, Discovery, and Management
Big Data Content Organization, Discovery, and ManagementBig Data Content Organization, Discovery, and Management
Big Data Content Organization, Discovery, and ManagementAccess Innovations, Inc.
 
Using Big Data to create a data drive organization
Using Big Data to create a data drive organizationUsing Big Data to create a data drive organization
Using Big Data to create a data drive organizationEdward Chenard
 
How to hack into the big data team
How to hack into the big data teamHow to hack into the big data team
How to hack into the big data teamData Science Thailand
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10Ulf Mattsson
 
Privacy, Permissions and the Evolution of Big Data
Privacy, Permissions and the Evolution of Big DataPrivacy, Permissions and the Evolution of Big Data
Privacy, Permissions and the Evolution of Big DataVision Critical
 
Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013 Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013 IBM Sverige
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Miningwanani181
 
Panel SXSW : The Internet of Me : Impact of biometrics and machine learning o...
Panel SXSW : The Internet of Me : Impact of biometrics and machine learning o...Panel SXSW : The Internet of Me : Impact of biometrics and machine learning o...
Panel SXSW : The Internet of Me : Impact of biometrics and machine learning o...Pierre-Majorique LĂŠger
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security pptVenkatesh Chary
 
What is big data?
What is big data?What is big data?
What is big data?David Wellman
 
Building a Big Data Team
Building a Big Data TeamBuilding a Big Data Team
Building a Big Data Teamelephantscale
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

Andere mochten auch (19)

Big Data Content Organization, Discovery, and Management
Big Data Content Organization, Discovery, and ManagementBig Data Content Organization, Discovery, and Management
Big Data Content Organization, Discovery, and Management
 
Big Data Easy BI
Big Data Easy BI Big Data Easy BI
Big Data Easy BI
 
Using Big Data to create a data drive organization
Using Big Data to create a data drive organizationUsing Big Data to create a data drive organization
Using Big Data to create a data drive organization
 
How to hack into the big data team
How to hack into the big data teamHow to hack into the big data team
How to hack into the big data team
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
 
Privacy, Permissions and the Evolution of Big Data
Privacy, Permissions and the Evolution of Big DataPrivacy, Permissions and the Evolution of Big Data
Privacy, Permissions and the Evolution of Big Data
 
Privacy in the Age of Big Data
Privacy in the Age of Big DataPrivacy in the Age of Big Data
Privacy in the Age of Big Data
 
Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013 Building Confidence in Big Data - IBM Smarter Business 2013
Building Confidence in Big Data - IBM Smarter Business 2013
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
Big data security
Big data securityBig data security
Big data security
 
Panel SXSW : The Internet of Me : Impact of biometrics and machine learning o...
Panel SXSW : The Internet of Me : Impact of biometrics and machine learning o...Panel SXSW : The Internet of Me : Impact of biometrics and machine learning o...
Panel SXSW : The Internet of Me : Impact of biometrics and machine learning o...
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
What is big data?
What is big data?What is big data?
What is big data?
 
Building a Big Data Team
Building a Big Data TeamBuilding a Big Data Team
Building a Big Data Team
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Web Security
Web SecurityWeb Security
Web Security
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 

Ähnlich wie Your organization and Big Data: Managing access, privacy, and security

Your organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and securityYour organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and securityLouise Spiteri
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart datacaniceconsulting
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET Journal
 
Big Data Analytics (1).ppt
Big Data Analytics (1).pptBig Data Analytics (1).ppt
Big Data Analytics (1).pptkrishnapalrajput132
 
Bigdata Hadoop introduction
Bigdata Hadoop introductionBigdata Hadoop introduction
Bigdata Hadoop introductionSunitha Mutchintala
 
Introduction to big data – convergences.
Introduction to big data – convergences.Introduction to big data – convergences.
Introduction to big data – convergences.saranya270513
 
Big Data World
Big Data WorldBig Data World
Big Data WorldHossein Zahed
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 
What exactly is big data? What exactly is big data? .pptx
What exactly is big data? What exactly is big data? .pptxWhat exactly is big data? What exactly is big data? .pptx
What exactly is big data? What exactly is big data? .pptxTusharSengar6
 
Big data march2016 ipsos mori
Big data march2016 ipsos moriBig data march2016 ipsos mori
Big data march2016 ipsos moriChris Guthrie
 
Big data assignment
Big data assignmentBig data assignment
Big data assignmentAnujaChatterjee
 
data, big data, open data
data, big data, open datadata, big data, open data
data, big data, open dataVincenzo Patruno
 
Big Data Analytics: Challenges And Applications For Text, Audio, Video, And S...
Big Data Analytics: Challenges And Applications For Text, Audio, Video, And S...Big Data Analytics: Challenges And Applications For Text, Audio, Video, And S...
Big Data Analytics: Challenges And Applications For Text, Audio, Video, And S...IJSCAI Journal
 
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...gerogepatton
 
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...ijscai
 
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...gerogepatton
 
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...gerogepatton
 
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...gerogepatton
 

Ähnlich wie Your organization and Big Data: Managing access, privacy, and security (20)

Your organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and securityYour organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and security
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart data
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth Enhancement
 
Big Data Analytics (1).ppt
Big Data Analytics (1).pptBig Data Analytics (1).ppt
Big Data Analytics (1).ppt
 
Bigdata Hadoop introduction
Bigdata Hadoop introductionBigdata Hadoop introduction
Bigdata Hadoop introduction
 
Introduction to big data – convergences.
Introduction to big data – convergences.Introduction to big data – convergences.
Introduction to big data – convergences.
 
Big Data World
Big Data WorldBig Data World
Big Data World
 
new.pptx
new.pptxnew.pptx
new.pptx
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
What exactly is big data? What exactly is big data? .pptx
What exactly is big data? What exactly is big data? .pptxWhat exactly is big data? What exactly is big data? .pptx
What exactly is big data? What exactly is big data? .pptx
 
Big data march2016 ipsos mori
Big data march2016 ipsos moriBig data march2016 ipsos mori
Big data march2016 ipsos mori
 
Applications of Big Data
Applications of Big DataApplications of Big Data
Applications of Big Data
 
Big data assignment
Big data assignmentBig data assignment
Big data assignment
 
data, big data, open data
data, big data, open datadata, big data, open data
data, big data, open data
 
Big Data Analytics: Challenges And Applications For Text, Audio, Video, And S...
Big Data Analytics: Challenges And Applications For Text, Audio, Video, And S...Big Data Analytics: Challenges And Applications For Text, Audio, Video, And S...
Big Data Analytics: Challenges And Applications For Text, Audio, Video, And S...
 
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
 
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
 
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
 
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
 
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND S...
 

Mehr von Centre for Advanced Management Education

Mehr von Centre for Advanced Management Education (8)

Exploring how user-generated content in Canadian public libraries can impact ...
Exploring how user-generated content in Canadian public libraries can impact ...Exploring how user-generated content in Canadian public libraries can impact ...
Exploring how user-generated content in Canadian public libraries can impact ...
 
Measuring recombinatorial innovation and its diffusion
Measuring recombinatorial innovation and its diffusionMeasuring recombinatorial innovation and its diffusion
Measuring recombinatorial innovation and its diffusion
 
Selected Thoughts on Modern Discovery and Access
Selected Thoughts on Modern Discovery and AccessSelected Thoughts on Modern Discovery and Access
Selected Thoughts on Modern Discovery and Access
 
Literacy in the Age of Big Data
Literacy in the Age of Big DataLiteracy in the Age of Big Data
Literacy in the Age of Big Data
 
Privacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information ProfessionalsPrivacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information Professionals
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Governance and e-discovery
Governance and e-discoveryGovernance and e-discovery
Governance and e-discovery
 
Records Continuum Model
Records Continuum ModelRecords Continuum Model
Records Continuum Model
 

KĂźrzlich hochgeladen

Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentNimot Muili
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siligurimeghakumariji156
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.aruny7087
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxAaron Stannard
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxssuserf63bd7
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNitya salvi
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamraAllTops
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownSandaliGurusinghe2
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdfAlejandromexEspino
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxssuserf63bd7
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalWilliam (Bill) H. Bender, FCSI
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field ArtilleryKennethSwanberg
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdfArtiSrivastava23
 

KĂźrzlich hochgeladen (14)

Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 
Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docx
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdf
 

Your organization and Big Data: Managing access, privacy, and security

  • 1. 2016 Ontario Connections. Presented by Louise Spiteri Your organization and Big Data: Managing, access, privacy, & security
  • 3. 2016 Ontario Connections. Big data is high-volume, high-velocity and high-variety information assets that demand cost-effective, innovative forms of information processing for enhanced insight and decision making. http://www.gartner.com/it-glossary/big-data/ Big data is a term that describes large volumes of high velocity, complex, and variable data that require advanced techniques and technologies to enable the capture, storage, distribution, management, and analysis of the information. http://www.techamerica.org/Docs/fileManager.cfm?f=techamerica- bigdatareport-final.pdf Defining Big Data
  • 4. 2016 Ontario Connections. “Insights from Big Data can enable you to make better decisions. They can help you facilitate growth and organizational transformation, reduce costs and manage volatility and risk. This enables you to capitalize on new sources of revenue and generate more value for your organization.” Financial Accounting Advisory Services (n.d.). Big data strategy to support the CFO and governance agenda The value of Big Data
  • 5. 2016 Ontario Connections. The 4 Vs of Big Data
  • 6. 2016 Ontario Connections. How much data does your organization generate?
  • 7. 2016 Ontario Connections. Big Data tends to be measured in terms of terabytes and petabytes (1024 terabytes). Definitions of “big” are relative, and fluctuate, especially as storage capacities increase over time. Data is generated by every computerized system in the organization, including human resources solutions, supply-chain management software, and social media tools for marketing. Volume
  • 8. 2016 Ontario Connections. Google indexes 20 billion pages per day. Twitter has more than 500 million users and 400 million tweets per day. Facebook generates 2.7 million ‘Likes’, 500 TB processed, and 300 million photos that are uploaded per day. http://bit.ly/1SVxPwp; http://bit.ly/1SVy76j; http://bloom.bg/1SVyldK Examples of volume
  • 9. 2016 Ontario Connections. What types of data do you collect & manage?
  • 10. 2016 Ontario Connections. Organizations generate various types of structured, semi-structured, and unstructured data. Structured data is the tabular type found in spreadsheets or relational databases (about 10% of most data). Text, images, audio, and video are examples of unstructured data, which sometimes lacks the structural organization required by machines for analysis Variety
  • 11. 2016 Ontario Connections. How quickly does your data grow & change?
  • 12. 2016 Ontario Connections. Velocity refers to the rate at which data is generated and the speed at which it should be analyzed and acted upon. The proliferation of digital devices such as smartphones has led to an unprecedented rate of data creation and is driving a growing need for real-time analytics and evidence-based planning Velocity
  • 14. 2016 Ontario Connections. Some data is inherently unreliable; for example, customer comments in social media, as they entail judgment. We need to deal with imprecise and uncertain data. Is the data that is being stored, and mined meaningful to the problem being analyzed? Veracity
  • 15. 2016 Ontario Connections. Big Data is often characterized by relatively “low value density”. That is, the data received in the original form usually has a low value relative to its volume. However, a high value can be obtained by analyzing large volumes of such data. Value
  • 16. 2016 Ontario Connections. Value is any application of big data that: • Drives revenue increases (e.g. customer loyalty analytics) • Identifies new revenue opportunities, improves quality and customer satisfaction (e.g., Predictive Maintenance), • Saves costs (e.g., fraud analytics) • Drives better outcomes (e.g., patient care). Value
  • 17. What Big Data looks like
  • 18. 2016 Ontario Connections. An example of how Big Data can be used
  • 19. 2016 Ontario Connections. Blogs, tweets, social networking sites (such as LinkedIn and Facebook), blogs, news feeds, discussion boards, and video sites all fall under Big Data. Social media
  • 20. 2016 Ontario Connections. Machine-generated data constitutes a wide variety of devices, from RFIDs to sensors, such as optical, acoustic, seismic, thermal, chemical, scientific, and medical devices, and even the weather. Machine- generated data
  • 21. 2016 Ontario Connections. From the GPS systems in our cars, in planes, and ships, to GPS apps on smartphones, we use GPS to guide our movements. GPS is used to track our movements, such as emergency beacons, and retailers who use in-store WiFi networks to access shoppers’ smartphones and track their shopping habits. Location Based Services (LBS) allow us to deliver services based on the location of moving objects such as cars or people with mobile phones. GPS and spatial data
  • 23. 2016 Ontario Connections. It is generally thought that the true value of Big Data is seen only when it is used to drive decision making. You need efficient processes to turn high volumes of fast-moving and varied data into meaningful insights. As information managers, you might not be doing the analysis, but you have a crucial role to play in managing this data to enable this analysis. Big Data analytics: How do we mine our data?
  • 24. 2016 Ontario Connections. Text analytics extract information from textual data. • Social network feeds, emails, blogs, online forums, survey responses, corporate documents, news, and call centre logs are examples of textual data held by organizations. Text analytics enable organizations to convert large volumes of human generated text into meaningful summaries, which support evidence-based decision-making. Text analytics
  • 25. 2016 Ontario Connections. Audio analytics analyze and extract information from unstructured audio data. Customer call centres and healthcare are the primary application areas of audio analytics. • Call centres use audio analytics for efficient analysis of recorded calls to improve customer experience, evaluate agent performance, and so forth. • In healthcare, audio analytics support diagnosis and treatment of certain medical conditions that affect the patient’s communication patterns (e.g.,schizophrenia), or analyze an infant’s cries to learn about the infant’s health and emotional status. Audio analytics
  • 26. 2016 Ontario Connections. Video analytics involves a variety of techniques to monitor, analyze, and extract meaningful information from video streams. The increasing prevalence of closed-circuit television (CCTV) cameras and of video-sharing websites are the two leading contributors to the growth of computerized video analysis. A key challenge, however, is the sheer size of video data. Video analytics
  • 27. 2016 Ontario Connections. Social media analytics refer to the analysis of structured and unstructured data from social media channels. • Social networks (e.g., Facebookand LinkedIn) • Blogs (e.g., Blogger and WordPress) • Microblogs (e.g.,Twitter and Tumblr) • Social news (e.g., Digg and Reddit) • Socia bookmarking (e.g., Delicious and StumbleUpon) • Media sharing (e.g., Instagram and YouTube) • Wikis (e.g., Wikipedia and Wikihow) • Question-and-answer sites (e.g., Yahoo! Answers and Ask.com) • Review sites (e.g., Yelp, TripAdvisor) Social media analytics
  • 28. 2016 Ontario Connections. Predictive analytics comprise a variety of techniques that predict future outcomes based on historical and current data, e.g., predicting customers’ travel plans based on what they buy, when they buy, and even what they say on social media. Predictive analytics
  • 29. Privacy and security of Big Data
  • 30. 2016 Ontario Connections. Canadian federal institutions reported 256 data breaches in 2014-2015, up from 228 the year before. The main culprit was identified as the use portable storage devices: • More than two-thirds of the agencies had not formally assessed the risks surrounding the use of all types of portable storage devices; • More than 90 per cent did not track all devices throughout their life cycle; • One-quarter did not enforce the use of encrypted storage devices. http://bit.ly/27Say7c Security concerns
  • 31. 2016 Ontario Connections. • More data translates = higher risk of exposure in the event of a breach. • More experimental usage = the organization's governance and security protocol is less likely to be in place • New types of data are uncovering new privacy implications, with few privacy laws or guidelines to protect that information (e.g., cell phone beacons that broadcast physical location, & health devices such as medical, fitness and lifestyle trackers). • Data linkage and combined sensitive data. The act of combining multiple data sources can create unanticipated sensitive data exposure. Considerations for Big Data
  • 32. 2016 Ontario Connections. “The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.” National Institutes of Standards and Technology Information security: Definition
  • 33. 2016 Ontario Connections. “The claim of individuals, groups or institutions to determine for themselves when, how and to what extent, information about them is communicated to others.” International Association of Privacy Professionals Data privacy: Definition
  • 34. 2016 Ontario Connections. Under the federal Personal Information Protection and Electronic Documents Act (PIPEDA), “personal information” is “information about an identifiable individual, but does not include the name, title or business address or telephone number of an employee of an organization.” Regulatory framework for big data
  • 35. 2016 Ontario Connections. The protection of personal information in Canada rests on three fundamental goals:. • Transparency – providing people with a basic understanding of how their personal information will be used in order to gain informed consent • Limiting use plus consent – the use of that information only for the declared purpose for which it was initially collected, or purposes consistent with that use; and, • Minimization – limiting the personal information collected to what is directly relevant and necessary to accomplish the declared purpose and the discarding of the data once the original purpose has been served. PIPEDA and Big Data
  • 36. 2016 Ontario Connections. Organizations that attempt to implement Big Data initiatives without a strong governance regime in place, risk placing themselves in ethical dilemmas without set processes or guidelines to follow. A strong ethical code, along with process, training, people, and metrics, is imperative to govern what organizations can do within a Big Data program. Big Data governance
  • 37. 2016 Ontario Connections. Data used for Big Data analytics can be gathered combined from different sources, and create new data sets. Organizations must make sure that all security and privacy requirements that are applied to their original data sets are tracked and maintained across Big Data processes throughout the information life cycle, from data collection to disclosure or retention/destruction. Respecting the original intent of the information gathered
  • 38. 2016 Ontario Connections. Data that has been processed, enhanced, or changed by Big Data should be anonymized to protect the privacy of the original data source, such as customers or vendors. Data that is not properly anonymized prior to external release (or in some cases, internal as well) may result in the compromise of data privacy, as the data is combined with previously collected, complex data sets. Re- Identification
  • 39. 2016 Ontario Connections. Matching data sets from third parties may provide valuable insights that could not be obtained with your data alone. You need to consider and evaluate the adequacy of the security and privacy data protections in place at the third-party organizations. Third- party use
  • 40. 2016 Ontario Connections. Big data’s potential for predictive analysis raises particular concerns for data security and privacy. • Think of the famous case of Target, which sent coupons to a teenage girl, based upon her shopping preferences, which suggested she was pregnant, as well as her due date (Target was accurate). The girl’s family found out about her pregnancy through these coupons. • Did the girl know that her shopping information would be used for this purpose? • Was she informed of Target’s privacy policy? The risks of predictive analytics
  • 41. 2016 Ontario Connections. There are growing concerns that Big Data is straining the privacy principles of identifying purposes and limited use. Consumers are called upon to agree to privacy policies and consent forms that no one has the time to read. The burden is increasingly placed on the consumers, as these policies take the form of disclaimers for the orgnizations. Increasing burden on the consumer
  • 42. 2016 Ontario Connections. “Just because commercial organizations can collect personal information and run it through the revealing algorithms of predictive analytics, doesn’t mean that they should.” Jennifer Stoddard Can we vs. should we?
  • 43. 2016 Ontario Connections. A useful tool is the Privacy Maturity Model designed by the American Institute of Certified Public Accountants (AICPA) or the Canadian Institute of Chartered Accountants (CICA). These sections are particularly relevant: • 1.2.3: Personal information identification and classification • 1.2.4: Risk assessment • 1.2.6: Infrastructure and systems management • 3.2.2: Consent for new purposes and uses • 4.2.4: Information developed about individuals • 8.2.1: Information security program. http://bit.ly/1R3VcQZ Privacy assessment
  • 44. 2016 Ontario Connections. Privacy Life cycle (from Maturity Model)
  • 46. 2016 Ontario Connections. Strong data governance policies and procedures are important: • Who owns the data? • Who is responsible for protecting the data? • How is data collected? • What data is collected? • How is the data retained? Handling & retaining data
  • 47. 2016 Ontario Connections. What security & privacy regulations apply to your data? What are the compliance provisions of your agreements with any third parties or service providers. What are their privacy and security policies? Developing a solid compliance framework with a risk- based map for implementation and maintenance. Compliance
  • 48. 2016 Ontario Connections. Develop case scenarios where you would use Big Data. Identify what data will be used and how. Identify possible risks In this way, you are prepared for when you actually use the Big Data, rather than be in a position to react if something goes wrong. Data use cases
  • 49. 2016 Ontario Connections. Tell your customers what personal data you collect and how you use it. Provide consistent consent mechanisms across all products Ensure that customers have the means to withdraw their consent at the individual device level. Manage consent
  • 50. 2016 Ontario Connections. Have rigorous controls over who has access to the data. Have periodic review of who has access rights, and ensure that rights are removed immediately, as and when required. Access management
  • 51. 2016 Ontario Connections. Remove all Personally Identifiable Information (PII) from a data set and turn it into non- identifying data. Monitor anonymization requirements and analyze the risks of re-identification. Anonymization
  • 52. 2016 Ontario Connections. Maintain your responsibility to your customers when you share data with third parties. Include specific Big Data provisions within contractual agreements. Monitor third parties for compliance with data- sharing agreements. Data sharing
  • 54. 2016 Ontario Connections. Information is Beautiful http://bit.ly/1SrCghQ Interactive view of big data breaches
  • 55. 2016 Ontario Connections. Big data breaches, 1
  • 56. 2016 Ontario Connections. Database of 191 million U.S. voters exposed on Internet • An independent computer security researcher uncovered a database of information on 191 million voters that is exposed on the open Internet. The database includes names, addresses, birth dates, party affiliations, phone numbers and emails of voters in all 50 U.S. states. • A representative with the U.S. Federal Elections Commission, which regulates campaign financing, said the agency does not have jurisdiction over protecting voter records. • Regulations on protecting voter data vary from state to state, with many states imposing no restrictions. California, for example, requires that voter data be used for political purposes only and not be available to persons outside of the United States. Government breach
  • 57. 2016 Ontario Connections. Anthem • Health insurer Anthem’s database was hacked into. The personal information of 78.8 million people was potentially stolen. • The data breach extended into multiple brands Anthem, Inc. uses to market its healthcare plans, including, Anthem Blue Cross, Anthem Blue Cross and Blue Shield, Blue Cross and Blue Shield of Georgia, Empire Blue Cross and Blue Shield, Amerigroup, Caremore, and UniCare. Corporate breach
  • 59. 2016 Ontario Connections. Louise.Spiteri@dal.ca • @Cleese6 • LinkedIn • AboutMe • ResearchGate • School of Information Management Contact information