Abstract
This perspective paper discusses challenges and risks of the information age, and the implications for the information and communication technologies that need to be built and operated. It addresses ethical and policy issues related with Big Data and how procedures for privacy-preserving data analyses can be established. It further proposes a concept for a future, self-organizing and trusted Web and discusses recommended legal regulations as well as the infrastructure and institutions needed.
This is second part of the paper: D. Helbing and S. Balietti , From social data mining to forecasting socio-economic crises, EPJ Special Topics 195 , 3–68 (2011), see http://link.springer.com/content/pdf/10.1140%2Fepjst%2Fe2011-01401-8.pdf © EDP Sciences, Springer-Verlag 2011. It is reprinted here with kind permission and with minor stylistic improvements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Note that taking the wrong decision occurred here even without social pressure, while it is known since the famous Asch experiment that individuals give predominantly wrong answers (against their own judgement), if the people before them do so [14].
- 2.
For example, willingness to allow collection of personal data only for scientific purposes.
References
L. Backstrom, C. Dwork, J. Kleinberg, Wherefore Art Thou R3579X? Anonymized Social Networks, Hidden Patterns, and Structural Steganography. Proc. 16th Int. World Wide Web Conference (2007)
Apple confirms $1 bn data center, http://www.theregister.co.uk/2009/06/04/apple_1bn_north_carolina_data_center/. Accessed 10 Sept 2010
NSA plans massive, 65 MW, $2 bn data center in Utah, http://www.theregister.co.uk/2009/07/03/new_nsa_data_center/. Accessed 10 Sept 2010
Microsoft consumes Chicago data center, http://www.theregister.co.uk/2009/05/20/ascent_ch2_datacenter/. Accessed 10 Sept 2010
Google admits Scandinavian data center landing, http://www.theregister.co.uk/2009/03/05/google_finland_data_center/. Accessed 10 Sept 2010
Google pays $ 51.7 m for newspaper destruction metaphor, http://www.theregister.co.uk/2009/02/12/google_buys_defunct_paper_mill/. Accessed 10 Sept 2010
Intel sees future in Mega Data Center, http://www.theregister.co.uk/2009/02/18/the_intel_cloud/. Accessed 10 Sept 2010
D. Helbing, S. Balietti, From social simulation to integrative system design. Visioneer White Paper (2010), see http://www.visioneer.ethz.ch. Accessed 10 Sept 2010
C. Cattuto, W. Van den Broeck, A. Barrat, V. Colizza, J.-F. Pinton, A. Vespignani, Dynamics of person-to-person interactions from distributed RFID sensor networks. PLoS ONE 5(7), e11596 (2010). Accessed 10 Sept 2010
123 People, http://www.123people.com. Accessed 10 Sept 2010
A. Mazlouimian, D. Helbing, Y.-H. Eom, S. Lozano, S. Fortunato, How citation boosts trigger scientific paradigm shifts. (in preparation) (2010)
D. Helbing, M. Treiber, N.J. Saam, Analytical investigation of innovation dynamics considering stochasticity in the evaluation of fitness. Phys. Rev. E 71, 067101 (2005)
J. Lorenz, H. Rauhut, F. Schweitzer, D. Helbing, How social influence undermines the wisdom of crowds (2010) (Submitted)
S.E. Asch, Studies of independence and conformity: a minority of one against a unanimous majority. Psychol. Monogr. 70(9) (1956)
R. Axelrod, The Evolution of Cooperation, (Basic Books, 1984), pp. 169–170
D. Helbing, W. Yu, K.-D. Opp, H. Rauhut, The emergence of homogeneous norms in heterogeneous populations. Am. J. Sociol. (2010) (submitted)
Oakland Crimespotting is an interactive map of crimes in Oakland and a tool for understanding crime in cities, http://oakland.crimespotting.org. Accessed 10 Sept 2010
Data, data everywhere. Econ. (25 February 2010)
Internet Reputation Management: neutralize negative publicity, http://www.internet-reputation-management.com/. Accessed 10 Sept 2010
Reputation Management Consultants, http://www.reputationmanagementconsultants.com/. Accessed 10 Sept 2010
Reputation Defender, http://www.reputationdefender.com/. Accessed 10 Sept 2010
Squidoo: internet reputation management, http://www.squidoo.com/internet-reputation-management. Accessed 10 Sept 2010
Micro Payment: professional payment provider, http://micropayment.de. Accessed 10 Sept 2010
Privatsphäre als Luxusgut, http://www.nzz.ch/blogs/nzz_blogs/betablog/privatsphaere_als_luxusgut_1.7266824.html. Accessed 10 Sept 2010
It seems it not so easy to clear ones name on-line, even when trying hard. This is specially true for traces left on social network Web sites, for which specific applications, such as http://suicidemachine.org/, have been created in order to accomplish this task. For a discussion based on a true story see http://ask.slashdot.org/story/09/12/10/2115238/Best-Way-To-Clear-Your-Name-Online. Accessed 10 Sept 2010
F. Winter, H. Rauhut, D. Helbing, How norms can generate conflict. Jena Econ. Res. Papers (2009)
D. Helbing, A. Johansson, Cooperation, norms, and conflict: a unified approach. SFI Working Paper #09-09-040 (2009)
D. Helbing, W. Yu, The outbreak of cooperation among success-driven individuals under noisy conditions. Proc Nat Acad Sci USA (PNAS) 106(8), 3680–3685 (2009)
D. Helbing, W. Yu, H. Rauhut, Self-organization and emergence in social systems. Modeling the coevolution of social environments and cooperative behavior. SFI Working Paper #09-07-026 (2009)
L. Lessig, Against Transparency, The New Republic, 9th Oct, 2009, http://www.tnr.com/article/books-and-arts/against-transparency. Accessed 10 Sept 2010
D. Helbing et al., Dynamic decision behavior and optimal guidance through information services: models and experiments, in Human Behaviour and Traffic Networks, ed. by M. Schreckenberg, R. Selten (Springer, Berlin, 2004), pp. 47–95
D. Helbing, M. Christen, Mit Rauschen und Reibung gegen finanzielle Blasen, submitted to Wirtschaftswoche (2010)
P. Bajaria, J. Yeo, Auction design and tacit collusion in FCC spectrum auctions. Inf. Econ. Policy 21(2) 90–100 (2009)
C. Schultz, Transparency and Tacit Collusion (2001), http://www.econ.ku.dk/ansatte/phd/?pure=files%2F23184032%2F2001-04.pdf
B. Kluger, S.B. Wyatt, Preferencing, internalization of order flow, and tacit collusion: evidence from experiments. J. Financ. Quant. Anal. 37(3), 449 (2002)
M. Mäs, A. Flache, D. Helbing, Individualization as driving force of clustering phenomena in humans. PLoS Comput. Biol. (2010) (in print)
Four million British identities are up for sale on the internet, http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article6718560.ece. Accessed 10 Sept 2010
Symantec Internet Security Threat Report, http://www.symantec.com/business/theme.jsp?themeid=threatreport. Accessed 10 Sept 2010
RottenNeighbor.com was a website created to post information about neighbors and find information about new potential neighbors before moving. Launched in July 2007, it was discontinued in July 2009
D. Sally, I. Ron, H. Ursula, An EU Code of Ethics for Socio-Economic Research, The Institute of Employment Studies, 2004
E. Diener, R. Crandall, Ethics in social and behavioral research (University of Chicago Press, Chicago, 1978)
C. Frankfort-Nachmias, D. Nachmias, Research Methods in the Social Sciences (Worth Publishers, New York, 2008), Chap. 4: “Ethics in Social Research”
The British Psychological Society, Report of the Working Party on Conducting Research on the Internet, http://www.bps.org.uk/the-society/code-of-conduct/ (2007). Accessed 10 Sept 2010
Ethical Guidelines, Social Research Association (2003), http://www.the-sra.org.uk/ethical.htm. Accessed 10 Sept 2010
Statement of Ethical Practice for the British Sociological Association, BSA, the British Sociological Society (2002), http://www.britsoc.co.uk/equality/Statement+Ethical+Practice.htm. Accessed 10 Sept 2010
Recommendations of the Association of Internet Researchers (AoIR) Ethics Working Committee, http://www.aoir.org/reports/ethics.pdf. Accessed 10 Sept 2010
Google chief: only miscreants worry about net privacy, http://www.theregister.co.uk/2009/12/07/schmidt_on_privacy/. Accessed 10 Sept 2010
Google admits it accidentally gathered WiFi data, http://www.ft.com/cms/s/2/8a23b394-5fab-11df-a670-00144feab49a.html. Accessed 10 Sept 2010
Google to hand over intercepted data, http://www.ft.com/cms/s/2/db664044-6f43-11df-9f43-00144feabdc0.html. Accessed 10 Sept 2010
Lawyers Claim Google Wi-Fi Sniffing “Is Not an Accident”, http://gizmodo.com/5554960/lawyers-claim-google-wi+fi-sniffing-is-not-an-accident. Accessed 10 Sept 2010
Wi-Fi Data Captured By Google Street View Cars Included Passwords, http://gizmodo.com/5567460/wi+fi-data-captured-by-google-street-view-cars-included-passwords. Accessed 10 Sept 2010
Security Focus, http://www.securityfocus.com. Accessed 10 Sept 2010
Did you watch porn? http://www.didyouwatchporn.com. Accessed 10 Sept 2010
What the Internet knows about you. This page checks your browser history and determines which of the 5000 most popular Internet websites you’ve recently visited, http://www.whattheinternetknowsaboutyou.com. Accessed 10 Sept 2010
A. Janc, L. Olejnik, Feasibility and Real-World Implications of Web Browser History Detection, http://w2spconf.com/2010/papers/p26.pdf. Accessed 10 Sept 2010
P. Eckersley, How unique is your web browser? Electronic Frontier Foundation (2009). Accessed 10 Sept 2010
Panopticlick: how unique and trackable is your browser? https://panopticlick.eff.org. Accessed 10 Sept 2010
The Electronic Frontier Foundation published a timeline of Facebook’s privacy policy modifications over the years, http://www.eff.org/deeplinks/2010/04/facebook-timeline. Accessed 10 Sept 2010
Watchdog files complaint over Facebook ‘privacy’ settings, http://www.theregister.co.uk/2009/12/17/epic_facebook_privacy_complain/. Accessed 10 Sept 2010
Senator calls on FTC to tackle social-net privacy, http://news.cnet.com/8301-13577_3-20003415-36.html. Accessed 10 Sept 2010
EU warns on Facebook privacy, http://www.nytimes.com/2009/01/27/technology/27iht-facebook.4-417144.html. Accessed 10 Sept 2010
German minister warns Facebook over privacy rules, http://blog.foreignpolicy.com/posts/2010/04/05/german_minister_warns_facebook_over_privacy_rules. Accessed 10 Sept 2010
Details of 100 m Facebook users collected and published, http://www.bbc.co.uk/news/technology-10796584. Accessed 10 Sept 2010
G. Wondracek, T. Holz, E. Kirda, C Kruegel, A Practical Attack to De-Anonymize Social Network Users. Technical Report TR-iSecLab-0110-001
X. Su, T.M. Khoshgoftaar, A survey of collaborative filtering techniques. Adv. Artif. Intell., Article ID 421425 (2009), http://dx.doi.org/10.1155/2009/421425. Accessed 10 Sept 2010
E.J. Candes, T. Tao, The power of convex relaxation: near-optimal matrix completion. IEEE Trans. Inform. Theory 56, 2053–2080 (2009)
M. Bezzi et al. (eds.), Privacy and Identity Management for Life. (Springer, Berlin, 2010) (5th IFIP Advances in Information and Communication Technology [Book 320])
G. Ziegler, C. Farkas, A. Lörincz, A framework for anonymous but accountable self-organizing communities. Inform. Softw. Technol. 48, 726–744 (2006)
Government requests directed to Google and YouTube, http://www.google.com/governmentrequests/. Accessed 10 Sept 2010
Exclusive: Google, CIA Invest in ‘Future’ of Web Monitoring, http://www.wired.com/dangerroom/2010/07/exclusive-googlecia/. Accessed 10 Sept 2010
Apple’s Worst Security Breach: 114,000 iPad Owners Exposed, http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed. Accessed 10 Sept 2010
T-Mobile confirms biggest phone customer data breach, http://www.guardian.co.uk/uk/2009/nov/17/t-mobile-phonedata-privacy. Accessed 10 Sept 2010
Soziale Netzwerke verraten künftiges Käuferverhalten, http://www.tagesanzeiger.ch/digital/internet/Soziale-Netzwerke-verraten-kuenftiges-Kaeuferverhalten/story/19928880. Accessed 10 Sept 2010
WUALA, Backup. Store. Share. Access everywhere, http://www.wuala.com/. Accessed 10 Sept 2010
Tor: anonymity online, http://www.torproject.org/. Accessed 10 Sept 2010
Freenet, the free network, http://freenetproject.org/. Accessed 10 Sept 2010
Project Gaydar, http://www.boston.com/bostonglobe/ideas/articles/2009/09/20/project_gaydar_an_mit_experiment_raises_new_questions_about_online_privacy/. Accessed 10 Sept 2010
R. Agrawal, R. Srikant, Privacy-preserving data mining. Proceedings of the 2000 ACM SIGMOD international conference on Management of data (2000), pp. 439–450
P. Samarati, L. Sweeney, Generalizing Data to Provide Anonymity when Disclosing Information. Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (ACM Press 1998)
C.C. Aggarwal, P.S. Yu, Privacy-Preserving Data Mining: Models and Algorithms (Springer, 2008), p. 530
M. Atzori, F. Bonchi, F. Giannotti, D. Pedreschi, Anonymity preserving pattern discovery. VLDB J. 17(4), 703–727 (2006)
B.-C. Chen, D. Kifer, K. LeFevre, A. Machanavajjhala, Privacy-preserving data publishing (Survey). Found. Trends Databases 2(1–2), 1–167 (2009)
F. Giannotti, D. Pedreschi, Mobility, Data Mining and Privacy: Geographic Knowledge Discovery (Springer, 2008), p. 410
A. Monreale, G. Andrienko, N. Andrienko, F. Giannotti, D. Pedreschi, S. Rinzivillo, S. Wrobel, Movement Data Anonymity through Generalization. Trans. Data Priv. 3(2), 1–121 (2010), http://www.tdp.cat/issues/abs.a045a10.php. Accessed 10 Sept 2010
J. Krumm, A survey of computational location privacy. Pers. Ubiquitous Comput. 13(6), 391–399 (2009). Accessed 10 Sept 2010
D. Helbing, W. Yu, The future of social experimenting. PNAS 107(12), 5265–5266 (2010)
The Future of Social Experimenting: The Full Story, http://www.soms.ethz.ch/research/socialexperimenting
Mechanical Turk is a market place for work, https://www.mturk.com/mturk/welcome. Accessed 10 Sept 2010
EFF: Forget cookies, your browser has fingerprints, http://www.computerworld.com/s/article/9176904/EFF_Forget_cookies_your_browser_has_fingerprints. Accessed 10 Sept 2010
R. Geambasu, T. Kohno, A. Levy, H.M. Levy, Vanish: Increasing Data Privacy with Self-Destructing Data. Proceedings of the USENIX Security Symposium, Montreal, Canada, August 2009
Vanish: self-destructing digital data, http://vanish.cs.washington.edu. Accessed 10 Sept 2010
QLectives (Quality Collectives), http://www.qlectives.eu. Accessed 10 Sept 2010
European privacy seals for IT products and IT-based services, https://www.european-privacy-seal.eu/. Accessed 10 Sept 2010
Ixquick: the world’s most private search engine, http://ixquick.com/. Accessed 10 Sept 2010
Datenschutz fr iPhone-Apps, http://www.ethlife.ethz.ch/archive_articles/100930_MBusiness_Apps_sch/index. Accessed 10 Sept 2010
DIASPORA, The privacy aware, personally controlled, do-it-all, open source social network, http://www.joindiaspora.com/. Accessed 10 Sept 2010
EU Commission plans more harmonisation of data protection law, http://www.out-law.com/default.aspx?page=11228. Accessed 10 Sept 2010
K.P. Smith, N.A. Christakis, Social networks and health. Annu. Rev. Sociol. 34, 405–429 (2008)
Further Reading
M. Michael, J.E. Moreira, D. Shiloach, R.W. Wisniewski, Scale-up x Scale-out: A Case Study using Nutch/Lucene. Parallel and Distributed Processing Symposium, IEEE International, 2007
L. A. Barroso, Hölzle, The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines. (Morgan & Claypool Publishers, 2009)
A. Jacobs, The pathologies of big data. ACM Queue, 7(6) (2009)
SSD Myths and Legends—“write endurance”, http://www.storagesearch.com/ssdmyths-endurance.html. Accessed 10 Sept 2010
Digging into Data, http://www.diggingintodata.org/. Accessed 10 Sept 2010
Transparency is at the heart of this Government. Data.gov.uk is home to national & local data for free re-use, http://data.gov.uk. Accessed 10 Sept 2010
Data.Gov Empowering people, http://www.data.gov. Accessed 10 Sept 2010
Dataverse Project: an open-source application for publishing, citing and discovering research data, http://thedata.org/. Accessed 10 Sept 2010
Apache WSIF: Web Service Invocation Framework, http://ws.apache.org/wsif/. Accessed 10 Sept 2010
ETH Financial Crisis Observatory, http://www.er.ethz.ch/fco/index. Accessed 10 Sept 2010
ICKN Galaxy Advisors, http://ickn.org. Accessed 10 Sept 2010
PostRank: intelligence from the social web, http://www.postrank.com/
M.M. Gaber, A. Zaslavsky, S. Krishnaswamy, Mining data streams: a review. ACM SIGMOD Rec. Arch. 34(2), 18–26 (2005)
A. Bifet, R.K. August, Data Stream Mining: A Practical Approach. The University of Waikato (2009)
J. Leskovec, L. Backstrom, J. Kleinberg, Meme-tracking and the dynamics of the news cycle. Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (2009), pp. 497–506
A. Narayanan, V. Shmatikov, Robust De-anonymization of Large Sparse Datasets. IEEE Symposium on In Security and Privacy SP 2008. IEEE Symposium (2008), pp. 111–125
R.Jones, R. Kumar, B. Pang, A.Tomkins, Vanity fair: privacy in querylog bundles. CIKM ’08: Proceeding of the 17th ACM conference on Information and knowledge management (2008), pp. 853–862
Acknowledgements
The authors of this White Paper are grateful to Karl Aberer, Andras Lörincz, Panos Argyrakis, Endre Bangerter, Andrea Bassi, Stefan Bechtold, Bernd Carsten Stahl, Rui Carvalho, Markus Christen, Mario J. Gaspar da Silva, Fosca Giannotti, Aki-Hiro Sato, David-Olivier Jaquet-Chiffelle, Daniel Roggen, Themis Palpanas, Elia Palme, Jürgen Scheffran, David Sumpter and Peter Wagner.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Helbing, D. (2015). Big Data, Privacy, and Trusted Web: What Needs to Be Done. In: Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society. Springer, Cham. https://doi.org/10.1007/978-3-319-15078-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-15078-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15077-2
Online ISBN: 978-3-319-15078-9
eBook Packages: Computer ScienceComputer Science (R0)