Verified Document

Bigger Data Annotated Bibliography

¶ … component graded. The amassing of data has become an integral process of life in the 21st century (Nunan and Di Domenico, 2013, p. 2). This fact is partially reflected by the fact that in contemporary times, people are generating much more data than they previously did. Every time someone goes shopping and makes a purchase with a credit card, receives a call or sends a text message, or visits a web site on a computer or downloads information to a mobile phone application, they are generating data. This data is stored and, through sophisticated processes of analytics that involve data mining and even predictive capabilities, is analyzed to determine aspects of consumer, individual, and collective behavior. The generation of these massive quantities of data in the myriad forms such data takes at the rapidity of real-time access is known as big data, which government representatives claim they are analyzing to prevent terrorist acts. Nonetheless, a look at some of the most pertinent issues regarding the storage and analytics of big data reveals that in a quite subtle way, the amassing and analysis of this data is slowly eroding basic rights to privacy afforded to citizens in the United States.

Most people did not become aware of the term Big Data and its implications until the Edward Snowden Security breach of the National Security Agency (NSA). Snowden revealed some little known facts to Americans, namely that records from their phone calls, emails, and internet activity was being stored, analyzed, and monitored by the government (Hackett, 2013, p. 27). Moreover, he posed his elucidation of these facts within the context in which he viewed himself as a patriot and was helping Americans to realize that there was a possible abuse of these technologies -- mobile, telephone, and the internet -- and that their privacy might be suffering as a result. However, within the wake of these revelations...

Parts of this document are hidden

View Full Document
svg-one

This defense of the storage of Big Data, however, is insufficient in light of the following warrants regarding its deployment as an invasion of privacy.
One of the most effective means of proving the fact that government storage of big data about the lives of private citizens is invading their privacy is in utilizing an analogy of this electronic surveillance with typical video camera surveillance. It is critical to understand that the reason citizen's rights to privacy is being invaded by governmental big data practices is because these technologies monitor communication. Without the telephone and internet-based communication, it is virtually impossible to communicate with someone when they are not within one's physical proximity. Therefore, the governmental agencies effectively have a monopoly to access every thing any one conveys to someone else. The analogy that proves the violation of privacy taking place with this occurrence relates to video camera surveillance. Such cameras are found fairly frequently in the public, and they record the actions of people. However, in many states, it is illegal to record audio and the conversations people have largely due to the Federal Electronic Communications Privacy ACT of 1986 (Pepper, 2005). The law pertains to actions, not to thoughts. However, the amassing of big data effectively makes all thoughts transparent, and is a privacy violation in the "debate…over the tradeoffs… between national security and civil liberty" (Byman and Wittes, 2014, p. 127).

The typical counterargument posed in the face of issues of privacy related to big data is that storing email and phone conversations for the majority of…

Sources used in this document:
References

Byman, D., Wittes, B. (2014). Reforming the NSA. Foreign Affairs. 93(3), 127-138.

This source considers a number of possibilities for reforming the NSA which are viable in the wake of Snowden's security breach. It examines other country's approaches to espionage as well. In provides an in-depth read into the considerations the NSA must make for securing the country

Hackett, K. (2013). Edward Snowden: the new brand of whistle blower. Quill. 101(5), 26-31. This source examines the ramifications of the actions of whistle blowers, and attempts to deconstruct the privacy issues associated with security concerns in the U.S. It details the actions of Snowden.

Nuna, D., Di Domenica, M. (2013). Market research and the ethics of big data. International Journal of Market Research. 55(4), 2-13. This source considers the practice of amassing and analyzing big data largely from a marketing research perspective. It details the wide scope of data that is regularly stored and scrutinized regarding the lives of citizens.
Pepper, A. (2005). Do audio/video surveillance security systems violate privacy laws? www.msk.com. Retrieved from http://www.msk.com/news/article.cfm?id=847&type=Alert&aid=56
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now