Home
Business Guide
 
simplicable technology guide   »  big data   »  3 big data bullies

3 Big Data Bullies

        posted by , February 17, 2013

Nearly all men can stand adversity, but if you want to test a man's character, give him power.
~ Abraham Lincoln
Big data is a powerful tool.

Like any powerful new tool, it can be used to improve life or to make things worse.

Concepts such as "improving life" or "making life worse" are completely subjective.

These 3 big data practices can be perceived as "making life worse" by customers, governments and the media.

Engaging in these practices can put you at risk of customer disenchantment, bad press and future regulatory compliance issues.


1. Privacy Policy Bait and Switch

It's common for new services to begin with a strong privacy policy. When the user base grows and the service captures large amounts of personal data — the privacy policy changes to reduce the privacy rights of the customer.

The privacy policy may change slowly over time to reduce privacy in small chunks.


2. Data Markets

Buying and selling of personal data leads to capabilities that may be disturbing to customers.

For example, selling copyrighted user photos for use in advertisements without permission and compensation.


3. We Know You Better Than You Know Yourself

Restricting customer choice with the assumption that you know them better than they know themselves.

Customers are known to rebel against perceived restrictions on choice and freedom (a well known social behavior known as reactance).




Related Articles



Enterprise Architecture
How to architect an organization.




In the real world, SOA often fails.

Take a few minutes to learn about the Zachman Framework — a framework for Enterprise Architecture.

The 90 second version of TOGAF — a popular enterprise architecture framework.

Everything you ever wanted to know about solution architecture but were afraid to ask.


Recently on Simplicable


Physical Security Explained

posted by Anna Mar
Physical security is real world security. The type of security that existed long before the information revolution.

Canary Trap Explained

posted by Anna Mar
A digital signature embedded in information that can be tied to a source such as an individual or an IP address.

Honeypot Explained (Security)

posted by Anna Mar
A honeypot is decoy designed to distract attackers from your information infrastructure.

Security Techniques

posted by Anna Mar
A list of information security strategies and techniques.

about     contact     sitemap     privacy     terms of service     copyright