Melting of Privacy with Machine Learning, Big Data, and Social Media

被引:0
作者
Canbay, Pelin [1 ]
Demircioglu, Zubeyde [2 ]
机构
[1] Kahramanmaras Sutcu Imam Univ, Dept Comp Engn, Kahramanmaras, Turkiye
[2] Istanbul Medeniyet Univ, Fac Arts & Humanities, Dept Sociol, Istanbul, Turkiye
来源
ACTA INFOLOGICA | 2023年 / 7卷 / 01期
关键词
Privacy; social media; big data; machine Learning;
D O I
10.26650/acin.1231944
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Every individual has the right to keep their information private. However, there is a big question: is this possible in the digital era? While social media attracts people to share personal data, most advanced technologies are continually developing in the area of how to exploit information from this personal data. Is it possible to talk about keeping personal data private? This study aims to investigate whether it is possible both to connect to the cyber-world and remain private in the digital era, where intensive studies have been conducted to protect privacy. This study discusses: (1) the social perception of privacy, (2) the contradiction between privacy expectations and behaviors, and (3) the current state of both disclosure and protection efforts of privacy with machine learning and big data techniques. As a result of our research, it was concluded that it is almost impossible to exist in the cyber/digital world and remain private, that most users are not uncomfortable with the current situation, and that institutions and technology developers should take more responsibility in this regard
引用
收藏
页数:12
相关论文
共 62 条
[1]   The Web Never Forgets: Persistent Tracking Mechanisms in the Wild [J].
Acar, Gunes ;
Eubank, Christian ;
Englehardt, Steven ;
Juarez, Marc ;
Narayanan, Arvind ;
Diaz, Claudia .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :674-689
[2]   Privacy and rationality in individual decision making [J].
Acquisti, A ;
Grossklags, J .
IEEE SECURITY & PRIVACY, 2005, 3 (01) :26-33
[3]   Privacy and human behavior in the age of information [J].
Acquisti, Alessandro ;
Brandimarte, Laura ;
Loewenstein, George .
SCIENCE, 2015, 347 (6221) :509-514
[4]  
Ali D., 2015, Journal of Information Privacy and Security,, V11, DOI [10.1080/15536548.2015.1046287, DOI 10.1080/15536548.2015.1046287]
[5]  
[Anonymous], 2012, Hadoop: The Definitive Guide
[6]   Machine learning algorithms for social media analysis: A survey [J].
Balaji, T. K. ;
Annavarapu, Chandra Sekhara Rao ;
Bablani, Annushree .
COMPUTER SCIENCE REVIEW, 2021, 40
[7]  
Balci E., 2019, Acta Infol, V3, P22, DOI [10.26650/acin.571303, DOI 10.26650/ACIN.571303]
[8]  
Bauman Z., 2013, Statewide Agricultural Land Use Baseline 2015, V1
[9]   Social big data: Recent achievements and new challenges [J].
Bello-Orgaz, Gema ;
Jung, Jason J. ;
Camacho, David .
INFORMATION FUSION, 2016, 28 :45-59
[10]   Reflections on privacy, identity and consent in on-line services [J].
Bennett, Louise .
Information Security Technical Report, 2009, 14 (03) :119-123