Analytic surveillanceBig data business models in the time of privacy awareness

  1. Eva-Patricia Fernández-Manzano 1
  2. María-Isabel González-Vasco 1
  1. 1 Universidad Rey Juan Carlos
    info

    Universidad Rey Juan Carlos

    Madrid, España

    ROR https://ror.org/01v5cv687

Revista:
El profesional de la información

ISSN: 1386-6710 1699-2407

Año de publicación: 2018

Título del ejemplar: Indicadores I

Volumen: 27

Número: 2

Páginas: 402-409

Tipo: Artículo

DOI: 10.3145/EPI.2018.MAR.19 DIALNET GOOGLE SCHOLAR lock_openAcceso abierto editor

Otras publicaciones en: El profesional de la información

Resumen

Massive data collection and analysis is at the heart of many business models today. New technologies allow for fine-grained recommendation systems that help companies make accurate market predictions while also providing clients with highly personalized services. Because of this, extreme care must be taken when it comes to storing and managing personal (often highly sensitive) information. In this paper we focus on the influence of big data management in media business content platforms, mainly in well-known OTT (Over the Top) services. In addition, we comment on the implications of data management in social networks. We discuss the privacy and security risks associated with this novel scenario, and briefly comment on tools that aid in securing the privacy of business intelligence within this context.

Referencias bibliográficas

  • Biesmans, Wouter; Balash, Josep; Rial, Alfredo; Preneel, Bart; Verbauwhede, Ingrid (in press). “Private mobile payTV from priced oblivious transfer”. In: IEEE transactions on information forensics and security. https://doi.org/10.1109/TIFS.2017.2746058
  • Brookman, Justin; Hans, Gautam S. (2013) “Why collection matters: surveillance as a de facto privacy harm”. In: Big data and privacy: making ends meet. The Center for Internet and Society. Stanford Law School, September 10. https://fpf.org/wp-content/uploads/Brookman-WhyCollection-Matters.pdf
  • CNMC (2017). “El teléfono móvil, el dispositivo más utilizado para conectarse a internet por los españoles”. Estudio panel de hogares CNMC. https://www.cnmc.es/node/365629
  • Cramer, Ronald; Damgaard, Ivan-Bjerre; Nielsen, Jesper-Buus (2015). Secure multiparty computation and secret sharing. Cambridge University Press. ISBN: 978 1316371404
  • Danezis, George; Domingo-Ferrer, Josep; Hansen, Marit; Hoepman, Jaap-Henk; Le-Métayer, Daniel; Tirtea, Rodica; Schiffner, Stefan (2015). Privacy and data protection by design—from policy to engineering. Technical report, Enisa 7. https://www.enisa.europa.eu/publications/privacy-anddata-protection-by-design
  • D’Arco, Paolo; González-Vasco, María-Isabel; Pérez-del-Pozo, Ángel; Soriente, Claudio; Steinwandt, Rainer (2017). “Private set intersection: New generic constructions and feasibility results”. Advances in mathematics of communications, v. 11, n. 4, pp. 481-502. https://doi.org/10.3934/amc.2017040
  • Del-Castillo, Ignacio (2017). “Telefónica prevé lanzar 14 series propias en dos años”. Expansión, 17 January. https://goo.gl/qzfHBb
  • Dorard, Louis (2014). Bootstrapping machine learning. Create Space Independent Publishing Platform. ISBN: 1500789240
  • Fernández-Manzano, Eva-Patricia (coord.) (2016). Big data. Eje estratégico en la industria audiovisual. Barcelona: Editorial UOC. ISBN: 978 84 9116 380 0
  • Fernández-Manzano, Eva-Patricia; Clares-Gavilán, Judith; Neira, Elena (2016). “Data management in audiovisual business: Netflix as a case study”. El profesional de la información, v. 25, n. 4, pp. 568-576. https://doi.org/10.3145/epi.2016.jul.06
  • Gómez-Uribe, Carlos A.; Hunt, Neil (2016). “The Netflix recommender system: Algorithms, business value, and innovation”. AMC Transactions on management information systems (TMIS), v. 6, n. 4. https://doi.org/10.1145/2843948
  • Herold, Rebecca (2010). Managing an information security and privacy awareness training program, 2nd ed., CRC Press. ISBN: 978 1 420031256
  • Liu, O.; Man, K. L.; Chong, W.; Chan C. O. (2016). “Social network analysis using big data”. In: Procs of the Intl multiconf of engineers and computer scientists 2016, v. II, Imecs 2016, March, 16-18, Hong Kong. ISBN: 978 988 14047 6 3 http://www.iaeng.org/WCE2014/publications.html
  • Madrigal, Alexis (2014). “How Netflix reverse engineered Hollywood”. The Atlantic, 2 January. https://goo.gl/Gy6miE
  • Meis, Rene; Heisel, Maritta (2016). “Understanding the privacy goal intervenability”. Lecture notes in computer science, v. 9830, pp. 79-94. https://goo.gl/HofxL3 https://doi.org/10.1007/978-3-319-44341-6_6
  • Ortiz-López, Paula (2016). “Aspectos legales de la gestión de datos en la publicidad digital”. En: Martínez-Pastor, Esther; Nicolás-Ojeda, Miguel-Ángel. Publicidad digital. Madrid: Esic Editorial, pp. 187-202. ISBN: 978 84 16701 13 1
  • Perlich, Claudia (2016). “The Super Bowl ads and moments that best caught -and keptviewers’ attention”. Dstillery. com, 18 February. https://goo.gl/P1izP6
  • Preibusch, Sören (2015). “Privacy behaviors after Snowden”. Communications of the ACM, v. 58, n. 5, pp. 48-55. https://doi.org/10.1145/2663341
  • Prieto, M. (2017) “En Telefónica tenemos datos más valiosos que los que atesoran los actores digitales”. Expansión, 22 June. https://goo.gl/HWb53W
  • Sáiz, Carlos-Alberto (coord.) (2017). Código de buenas prácticas en protección de datos para proyectos big data. Agencia Española de Protección de Datos (AEPD); Asociación Española para el Fomento de la Seguridad de la Información, ISMS Forum Spain. https://goo.gl/k4vR5W
  • Soria-Comas, Jordi; Domingo-Ferrer, Josep (2016). “Big data privacy: Challenges to privacy principles and models”. Data science and engineering, v. 1, n. 1, pp. 21-28. https://doi.org/10.1007/s41019-015-0001-x
  • Tang, Qiang; Wang, Husen (2017). “Privacy preserving hybrid recommender system”. In: Procs of the 5th ACM Intl workshop on security in cloud computing, pp. 59-66. https://doi.org/10.1145/3055259.3055268
  • Warwik, Ashford (2016). “UK firms could face £122bn in data breach fines in 2018”. ComputerWeekly.com, 17 October. https://goo.gl/i63FSP
  • Wolk, Alan (2015). Over the top, how the internet is (slowly but surely) changing the television industry. CreateSpace Independent Publishing Platform. ISBN: 978 1 514139011
  • Yao, Andrew C. (1982). “Protocols for secure computations” In: 23rd Annual symposium on foundations of computer science (FOCS 1982), pp. 160-164. https://doi.org/10.1109/SFCS.1982.88