欢迎来到51Due,请先 | 注册
关注我们: 51due论文代写二维码 51due论文代写平台微博
英国论文代写,英国essay代写知名品牌微信

Paper代写范文

为您解决留学中生活、学习、工作的困难、疑惑
释放自我

英国paper代写-Privacy Protection in the Times of Big Data

2017-06-16 | 来源:51due教员组 | 类别:Paper代写范文

本篇英国paper代写-Privacy Protection in the Times of Big Data讲了隐私保护一直是我们每一个人的重要组成部分,因为它会直接影响到我们在各个方面的日常生活。此外,绝大多数人对私隐的高度重视,在一定程度上决定要求采取有效措施保护每个人的隐私,使他们都能很好地保护他们的隐私免受别人的侵犯,这里的隐私保护意味着保护个人信息不被其他人侵犯。本篇英国paper代写由51due英国论文代写平台整理,供大家参考阅读。


Introduction

Privacy protection has always been a quite significant part for each and every one of us because it will directly influence our daily life in various aspects. Also, the great majority of human beings’ high emphasis on privacy has, to a certain degree, determined that there asks for effective measures for the protection of every person’s privacy so that they can all well protect their privacy from being violated by others. Here the privacy protection means protecting one’s personal information from being violated by others. Mayer-Schonberger and Cukier has mentioned that one of the potential risks of big data is the violation of privacy so that it calls for privacy protection in the times of big data. As far as I am concerned, I am also one of the victims of privacy violation in the times of big data and I am in favor of Mayer-Schonberger and Cukier’s opinion that privacy protection is called for. All kinds of effective methods for privacy protection are urgently needed in the times of big data and these effective methods can be seen as the precautionary methods for privacy violation. 

Privacy Protection in the Times of Big Data

The rationale why it calls for effective methods for privacy protection in the times of big data lies in that this times is really quite easy for people’s privacy to be violated by others. And the importance of privacy protection results from the fact that there are many victims in this world due to privacy violation and some of them have even got a tragic fate as a result. In Big Data: A Revolution That Will Transform How We Live, Work and Think, Mayer-Schonberger and Cukier has mentioned that one of the potential risks of big data is the violation of privacy and people’s privacy can be easily got access to by others when they do a series of activities, like using the credit card to pay, using the cellphones to communicate and other similar activities like that. So we can have a fair knowledge that people’s privacy can be easily revealed to other people and they may unconsciously be hurt by due to the revealing of their personal information. For example, people will frequently be disturbed by all kinds of harassing phone calls while they even may not know how their personal information has been obtained by others and how they might do in order to save themselves from being hurt. On one hand, these harassing phone calls will disturb the daily activities of people more or less and they may, on the other hand, influence people’s mood to a great extent. Just as what has been stated by Mayer-Schonberger and Cukier that “We’re under constant surveillance: when we use our credit cards to pay, our cellphones to communicate, or our Social Security numbers to identify ourselves” (150), from which we can easily detect a fact that the times of big data has actually led people to live a life that is under constant surveillance and supervision so that people are rather hard to live as freely as before. Also, people’s privacy is really what is hard to be guaranteed in the times of big data. Due to big data’s possibility to lead to leakage of privacy, there has been a lot of hype about big data and it is important not to inflate our expectations about what is can do (Cesar A. Hidalgo. 2014).

In the mind of most people, the Internet has always been a deadly threat for the leakage of privacy in that so many people have participated in the large crowd of people that have surfed on the Internet for their own purposes. And it is quite necessary for people to fill in some personal information during their process of surfing on the Internet in order to get access to more resources from the Internet. So with the increasing popularity of the Internet, it can be readily predicted that privacy leakage will definitely be a common phenomenon in human beings’ life. Mayer-Schonberger and Cukier puts it in this way that “The internet has made tracking easier, cheaper, and more useful” (150), from which we can soon get that the Internet can be used to account for the high incidence of the leakage of privacy. But what is much to our surprise to say is that big data has actually posed greater threat for the leakage of privacy and most people have already become a victim of it. It is stated in this way that “The big data threatens privacy more than the Internet” (151), which can be justified for why it calls for countless privacy protection measures in the times of big data. Or maybe it can be put in another way that because this times of big data is one that will, to a large extent, violate people’s privacy so as to influence people’s life in various ways, contributing to its necessity to put forward a series of privacy protection means. Moreover, big data’s risk toward privacy can also be shown in this sentence that “With big data, the value of information no longer resides solely in its primary purpose. As we’ve argued, it is now in secondary uses” (153), from which we can understand why some people will refer to the benefits of small data when they are confronted with the disadvantages of big data. 

   Then what exactly should people do in order to protect their own privacy in one way or another and how they can protect their privacy to the utmost so as not to be detrimentally influenced out of the privacy leakage? Personally speaking, each and every one of people should firstly cultivate an awareness that they should try not to expose their personal information on some online websites or tell others about their personal information when it is unnecessary under some situations. In this way, it can, to some degree, decrease the possibility of revealing people’s personal information to others so as to help protect people’s privacy more or less in turn. The sentence in the reading chapters that “We’ll consider ways that we can control big data, lest we be controlled by it” (170) also raises that people should figure out possible measures to protect their privacy so as not to let themselves be controlled by big data. That is to say, what people should do is try their best to become the controllers of big data rather than become the slaves or victims of big data. And the possible way to help people really become the controllers of big data is that people should familiarize themselves with how the times of big data operate and they should, in the meantime, try to adjust themselves to fit in with the times of big data. Only when they have kept in time with the times of big data can they develop the chance to really become the controllers of big data in the end.

   Apart from personal efforts to guarantee people’s privacy, the government should make its own bit for the protection of privacy, like the setting up of some crucial laws as well as other necessary measures taken to help protect people’s privacy. But the precondition is that the government should firstly realize the significance of protecting people’s privacy so that it will later practice it in the reality. Detailed speaking, the government can establish a specific law that has clearly specified the necessity of each and every one to protect their own and others’ privacy and it should severely enforce the punishment toward people’s behaviors of violating others’ privacy. The same case goes to what has been depicted by Mayer-Schonberger and Cukier that “For decades an essential principle of privacy laws around the world has been to put individuals in control by letting them decide whether, how, and by whom their personal information may be processed” (173), from which we can easily know that the strict implementation of laws can really help prevent people’s privacy from being violated to a certain degree. And the realization of protecting people’s privacy calls for the participation of all the people in that it is actually a matter that concerns everyone. Or maybe it can be put in another way that the joint efforts of each and every one can contribute to the final success in protecting people’s privacy. 

   Moreover, the methods we have to take regarding privacy protection should also keep up pace with the times so that we can fit in with the revolution and transformation of big data. That is to say, we human beings’ beliefs, practices and values all need to be changed more or less and only in that way can we be able to control the big data rather than be controlled by it to a large extent. It is quite obvious that big data erodes people’s privacy for one part and for another it threatens people’s freedom to completely enjoy the fun of surfing the Internet or plenty of benefits as can be brought by the times of big data. But what has to be pointed out is that big data is now experiencing revolution and transformation and it might violate people’s privacy in brand-new ways. 

   In addition, some new strategies for big data governance regarding privacy can be effective for people’s making efforts to protect their own privacy. People have to get themselves familiar with those new strategies if they would like to actually protect their privacy in the due time using those strategies. Just as what has been described in the reading content that “Three fundamental new strategies for big-data governance, regarding privacy, propensity and algorithm auditing. We’re confident that with these in place the dark side of big data will be contained” (183), we can say that here the new strategies mentioned can be regarded as another powerful method to cope with human beings’ privacy protection and they can save people from being hurt due to the leakage of privacy. And the best way for people to guarantee their privacy in the times of big data is to use big data as a tool with a generous degree of humility and humanity, contributing to our taking fully advantage of the benefits of big data while bypassing its risks at the same time. 

Conclusion

To sum up, the possible methods for effective privacy protection mainly include the following ones: shaping personal awareness, the governments’ establishing some relevant laws, the proposition of some new strategies as well as our correct attitude toward big data as a tool. But what is bad news to say is that even though we have done a lot for privacy protection, our privacy may still be violated under some unexpected circumstances. Such truth can be indicated from the reading content that “There are no foolproof ways to fully prepare for the world of big data; it will require that we establish new principles by which we govern ourselves” (193). Therefore what we can do is to try our best to reduce the rate of the leakage of privacy so as not to let it largely influence our daily life.

Works Cited

1. Cesar A. Hidalgo. April 29, 2014. Saving Big Data from Big Mouths. Scientific American.

2. Viktor Mayer-Schonberger and Kenneth Cukier. Mar 4, 2014. Big Data: A Revolution That Will Transform How We Live, Work and Think. Eamon Dolan/Mariner Books.


要想成绩好,英国论文得写好,51due英国论文代写平台为你提供英国留学资讯,专业辅导,还为你提供专业英国essay代写,paper代写,report代写,需要找论文代写的话快来联系我们51due工作客服QQ:800020041或者wechat:Abby0900吧。—Ace

我们的优势

  • 05年成立,已帮助上万人
  • 24小时专业客服
  • 团队成员都毕业于全球著名高校
  • 保证原创,支持检测

英国站