Welcome!

Enterprise IT Context for the CTO

Bob Gourley

Subscribe to Bob Gourley: eMailAlertsEmail Alerts
Get Bob Gourley via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Related Topics: SEO Journal, Consumer Electronics, Digital Signage on Ulitzer, Advertising on New Media, The Role of Business, Big Data on Ulitzer

Article

How Big Data Exposes Your Values

Since people buy their mobile devices, does data generated by the use of those devices belong to the individual device owner?

Editor’s note: The following was written by Kord Davis from a post originally at KordIndex. Kord is the author of a forthcoming book on Ethics of Big Data.  - bg

At AT&T Labs in Florham Park, New Jersey, big data is being used to analyze the traffic and movement patterns of people through data generated by their mobile phones to help improve policymaking and urban and traffic planning. The research team realized they could understand deep patterns of how people moved through urban environments by analyzing the flow of mobile devices from cell tower to cell tower. And they wanted to use those insights to help improve traffic flow and to inform better urban planning, not to improve their marketing.

But, of course, AT&T along with Verizon, Google, Tom Tom, Navteq, and several companies who help retail malls track the traffic patterns of shoppers want very much to use that information to generate new streams of revenue. The question of privacy is top of mind (especially as the distinction between anonymized and personally identifying information becomes more difficult to maintain) but the question of ownership is equally compelling.

Since people buy their mobile devices, does the data generated by the use of those devices belong to the individual device owners—or to the company who owns and maintains the technological infrastructure which makes that usage possible?

The Electronic Frontier Foundation offers an interesting metaphor in response to this question:.

“ ‘Big data’ is the mantra right now. Everyone wants to go there, and everyone has these stories about how it might benefit us,” said Lee Tien, senior staff attorney with the Electronic Frontier Foundation, a San Francisco-based nonprofit organization specializing in free speech, privacy and consumer rights.

“One of the things you learn in kindergarten is that if you want to play with somebody else’s toys, you ask them,” Tien said. “What is distressing, and I think sad, about the big data appetite is so often it is essentially saying, ‘Hey, we don’t have to ask.’ ”  For more see nj.com

Google explicitly states that they “don’t sell [their] user’s personal information.” However, they make no statement about who owns the information in the first place. Which leaves the door wide open to allow them to utilize that information in their business model (notably the sale of online advertising) without denying or rejecting your claim to it. And while Google very visibly provides information about how to “liberate” your data (www.dataliberation.org), it has become common knowledge that the vast services Google provides millions of people every day is paid for, at least in part, by the result of the tacit agreement that Google can use some of the data created by your use of their products to generate revenue in their business model. The question remains open, however, what exactly is the distinction between “personal information” and the set of all information that Google knows about you which, when combined in the right way, could potentially expose enormous amounts of personal information.

In many ways, an organization’s business processes, technical infrastructure configuration, and data handling procedures can be interpreted as a manifestation of their values. (Thanks to Dion Hinchliffe for this intriguing insight)

Seen this way, values are inherently expressed by these data handling practices. While it might not be completely possible to reverse-engineer a company’s values by deconstructing their data handling practices, it certainly is possible to learn more about what has been considered important enough to include by simply reading the policy statement.

And it is fair to assume that, the absence of any particular consideration being expressly included in the policy statement, that consideration was deemed not important enough to include. Without additional information, it’s impossible to know exactly what was considered but ultimately not included or even what those conversations were like. But we can know what ultimately did and did not make it into those statements, and infer some reasonable understanding of what the originating organization deems important.

And in this age of increasing scrutiny and understanding on the part of consumers and users of information technology, what your organization values is inherently being demonstrated by your data handling practices.

This post is excerpted from Ethics of Big Data .

This post by was first published at CTOvision.com.

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.