meta data for this page
  •  

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
courses:ct60a7000:spring2015:1:batanienrique [2015/02/27 00:35]
k5432
courses:ct60a7000:spring2015:1:batanienrique [2015/05/19 16:41] (current)
k5432
Line 1: Line 1:
 +====== Group'​s questionnaire answered ======
 +
 +{{:​courses:​ct60a7000:​spring2015:​1:​killerappsquestionnaire.pdf|}}
 +
 +====== Course questions ======
 +
 +**1. Why is Big Data a tool that is here to stay and not be replaced by others?**
 +
 +//This questions is important because it remarks the trends and technologies behind Big data, the person able to relate trends, technology and future of Big Data shows good understanding of the topic.//
 +
 +**2. As an internet user, under which terms would you agree to have your data re-utilized by companies?​**
 +
 +//This question is relevant since enables independent thinking to cover a gap that on my eyes the author of the book was not able to address correctly, given acceptance by the users for granted to re-use of data.//
 +
 +**3. After knowing the downsides of entrepreneurship and the odds against it, what reasons would convince you to be an entrepreneur?​**
 +
 +//If the student is able to justify its answer with sounded facts rather than emotional reasons he shows a deep understanding of the upsides and downsides of entrepreneurship.//​
 +
 +**4. Are there benefits of working for a SME in comparison than with a Large enterprise?​**
 +
 +//The book discusses two possible paths, either large corporations or startups, but there are still a wide range of companies that do not fit in the description,​ the Small and Medium Enterprises,​ that in a developing economy normally constitute between 40% and 60% of the GDP.//
 +
 +
 +====== Coursera Critical Thinking Statement of Accomplishment ======
 +
 +{{:​courses:​ct60a7000:​spring2015:​1:​batani_certificate_-_coursera_criticalthinking_2015.pdf|}}
 +
 +
 +====== Homeworks ======
 +
 +
 +**Ethics in/of big data**
 +
 +Big data offers a wide variety of possibilities but most of the cases it will be based in customers'​ data. The data could be personal or public nature. The risk that Big data represent is the disclosure of this private data to non-authorized public or private sites. The use that these third party institutions could do with the data compromise the privacy of the customers.
 +
 +One of the biggest threats with Big Data is the barrier of anonymity that can be broken as it was discussed with several examples in the book. I think the role of ethics in Big Data consist in the usage of the customers information for purposes that can't harm them. However, this is a complicated parameter since the risk of usage might be relative from company to company, or even from Data analyst to Data analyst. After the discussion raised in class I consider that the best practices for Ethics in Big data would be to establish guidelines for the use and re-use of data depending on the nature of this data, the most personal or revealing that the data is, the more restricted the possibilities of usage for the data should be. Nevertheless,​ relativity is the problem again, since these guidelines should be enforce by the government and each government could have more or less priority on this regard.
 +
 +In conclusion I think that the level of ethics that companies or governmental institutions will use with data depend on the response of the people to the disclosure of the data on the go.
 +
 +
 **My Own Definition of Big Data** **My Own Definition of Big Data**
  
Line 123: Line 163:
 Based on the examples provided in this chapter human kind has been able to profit and safe lives through the datafication. Nonetheless,​ it’s still an open question what would be the best practices on how to manage all the information that every cellphone and other devices tell the manufacturers about our preferences and habits since this information in the wrong hands can also harm our security. Based on the examples provided in this chapter human kind has been able to profit and safe lives through the datafication. Nonetheless,​ it’s still an open question what would be the best practices on how to manage all the information that every cellphone and other devices tell the manufacturers about our preferences and habits since this information in the wrong hands can also harm our security.
  
 +**Chapter 6 – VALUE**
 +
 +This chapter mainly discusses how we can benefit from data as an asset, regardless of the business model behind or after it. Recently discussion started with Facebook’s IPO of 104B USD while it reported about 6B in physical assets, but this didn’t include all the strategic information that they have gathered during years and was worth significantly more than about 100B USD.
 +
 +Data can be used by different entities but gathered by one, therefore there should be profitable paths to monetize from the information collected. One way to achieve this is Open data, which takes mainly information possessed by the government and opens it to the public for use since presumably private companies and individuals could give a more innovative use than Government itself, who’s task is to guard it.
 +
 +Another way to profit from data is to re-use it, combining different sets of data for different purposes can create different insights and new knowledge. Therefore, the information that big companies have stored could be given a second purpose and be mixed with other sources of information to create new insights.
 +
 +Nowadays, storage of data is cheaper and easier to gather than ever before. Thereby, taking the opportunity to use it and profit from it has become a nearer opportunity. Value of data can increase and even the governments have though on reform the legislation on how companies are valued by their assets in order to include their data too.
 +
 +A clear example provided in the chapter was Google gathering information for many sources simultaneously with the Streetview cars, grasping information about the GPS locations, taking pictures, improving the maps, mapping location with the local WIFI networks and might even navigate the open WIFIs for data. Although it was a great expense to collect it, add new streams of data to collect is relatively cheap once the major expense has been done.
 +
 +Lastly, the opportunity of using data has a price too since data can lose its value as it loses their recentness. Data can expire and become of less value unless can be re-used by other entities.
 +
 +====== Presentation about Big Data Book ======
 +
 +The chapter that I presented about Big Data was #9, titled "​Control"​.
 +
 +The presentation can be found here:
 +
 +Additional information about information security can be found in the following link:
 +{{:​courses:​ct60a7000:​spring2015:​1:​big_data_control_chapter_9.pptx|}}
 +
 +https://​www.youtube.com/​watch?​v=fZqjSBw1JT0
 +-> Suggestions for data privacy.
 +
 +https://​www.youtube.com/​watch?​v=RUBzvatQwL8
 +-> Company that protects data.
 +
 +https://​aboutthedata.com/​
 +-> Platform to verify wich personal information is already public (US Only).
 +
 +**Question about the chapter**
  
 +How would you behave knowing you are under surveillance 24/7? Would you accept it just by knowing who knows you?