The Facebook Data Leak And Is It Okay For Companies To Sell Our Data? - Management Information Systems - Essay

2444 words - 10 pages

The Facebook Data Leak and is it okay for Companies to Sell our Data?
Trevor Lineburg
West Virginia University
Table of Contents
Abstract……………………………………………………………….. page 3
Introduction…………………………………………………………… page 4-5
Review of Literature………………………………………………….. page 5-8
Discussion…………………………………………………………….. page 8-9
Conclusion…………………………………………………………….. page 9-10
References……………………………………………………………... page 11
In this article, I will be researching how often big data leaks occur and how much users value information security. I will be using peer-reviewed literature to get my results in order to come up with adequate information to support or reject my hypothesis, “big data leaks can happen and do happen, but I do not think people care as much as they should.” With these results I should be able to answer my research question, “How bad was the Facebook data leak and is it okay for apps, companies, etc. to sell our data?” From the research I determined that dig data leaks do occur, but also that it may not be an issue for some people who do not value their privacy. This information supported my hypothesis.
Keywords: big data, information security, Facebook, privacy
Many times I have been searching google and then 10 minutes later, I see an advertisement for what I was searching. This is possible because of big data. Companies take data that they derive from its users and sell it to advertisers. This is how applications and websites are able to users for free. Many users seem to have issues with this and when the data is leaked to the wrong company, there can be issues.
In 2018, Facebook stated that the data of over 87 million users was leaked to a political organization called Cambridge Analytica. This left a very bad taste in many Facebook users mouths as they do not feel it is right for Facebook to be allowed to share its user’s data. I have decided to research this topic and the question I will be trying to answer is: How bad was the Facebook data leak and is it okay for apps, companies, etc. to sell our data?
I feel that this is a very important question because of how big Facebook has gotten and many users put a lot of information out there. These users may not be aware of how much of their data is being shared to different companies. Also, users of various free apps are unaware that these applications are making their money off of advertisements.
This raises concern because the companies that can get their hands on user data can manipulate users. For example: Cambridge Analytica was a political organization that could determine our political affiliation via our Facebook data. They could then use this data to tamper with the 2016 election. The question is, is this okay considering Facebook users knowingly put this information out to the world.
If this issue were to be resolved, users would be able to have full information security while using Facebook and other applications. Without the ability for companies to sell user data, users would be able to share what they want without the fear of having their data shared to the world. Results from solving this issue would not just stop at information security. There would no longer be free applications because the ability to run ads would be no more. Running ads is how users are able to get applications for free. The question is, is information security worth the potential consequences of no longer having free apps?
While information security may sound very appealing, how much do users actually care about having their data shared to companies. I would expect users to understand their data is likely to be shared they sign up for applications. Lack of knowing this would the fault of the user considering they are sharing this information on the internet.
My hypothesis is that big data leaks can happen and do happen, but I do not think people care as much as they should. I hope to be able to determine this by researching various peer-reviewed sources to determine the best answer to my research question and support my hypothesis.
Review of the Literature
The first source I read was an article on the upsides of data privacy. This helps to explain how user privacy would be a good thing and something we should strive for as users. This article uses information derived from research literature to discuss how companies who value their customer relationships should consider meeting the customer expectations and demands regarding information security. For example: if Facebook users gained awareness on their data, they may feel that this is unfair to them and demand they have data privacy or they will not use the application. This would be an instance where data privacy would be good for a company. This article uses information from academic literature, legislative texts, practical recommendations, corporate privacy statements, and expert interviews to come up with 202 statements. These statements revealed customer concern of data privacy which led the author of the article the believe that these companies need to be aware of the customer concerns. The author of the article used the Kano Model and two surveys to analyze customer data.
Fig 1. Illustration of the Kano model factors and applied to the data privacy context. (Gimbel 2018)
The figure is showing the degree of addressing data privacy concerns in correlation with customer satisfaction. The quality of the service or application changes as it leans towards one or the other. This article helps me to understand concerns of the customers of these various companies. I feel as if I am at fault for not knowing this information when I use services such as: Google, Facebook, etc. This is information I feel we should all know, as users, before we sign up for a service.
My second source is an article on the politics of sharing personal data. This article looks at understanding the sharing of user data and understanding whether the data sharing is being purposefully shared or if it is unwillingly shared. This would help to understand the Facebook data leak and determine whether Facebooks Chief Executive, Mark Zuckerberg, purposefully shared millions of user data to Cambridge Analytica or if this data was derived unwillingly from Facebook. Results were derived from surveys and customer evaluations as well as various research articles and insinuated that problems with data privacy and information security need to be addressed to better adapt to user wants and needs. This article helps me to understand the differences in how data is shared from companies and how that doesn’t change the opinions of its users in that they still demand information security.
The next article I read focused on the movement of personal data, specifically on smartphones. It discussed that while the convenience of having a smartphone is impressive, it comes at a cost and that cost is data leaks. People seem unaware of this because they are too focused on smart devices and what they can do. The author explains this as being a result of our current design trend and that is bigger and better, essentially meaning people prefer innovation at all costs. Take iPhone for example. Every time a new iPhone comes out, people rush to stores to purchase them meanwhile the costs of the phones are increasing each year. This is an example of why people love innovation and are willing to sacrifice a lot to achieve innovation. After reading this article, I understand that the issue may not be that the customers may or may not like their information being shared, but that they are unaware of it happening to begin with. With that being said, it makes me wonder how bad data leaks could be if they are happening without users knowing. It must not be that bad after all.
The fourth article I chose to research was on the uses of big data and how the may lead to efficiency. The author of this article discusses how big data is used for innovation and efficiency, but also mentions how big data may be an accident waiting to happen. Data accidents have occurred in the past and are a potential accident for any organization that uses big data. “What seems certain… is that the problem of technological determinism—that is, of the impact of machines on history-will remain germane until there is forged a degree of public control over technology far greater than anything that now exists.” (Heilbroner 1967). Facebook uses big data and our data was leaked to various organizations, whether it was accidental or purposeful does not matter. All that matters in these types of scenarios are likely to happen when dealing with big data. The question is: is the increased innovation and efficiency worth the increased chance of our data being leaked? This article demonstrates ways that accidents can be prevented or controlled and I think this is very important. This leads me to believe this issue is solvable in ways that would be beneficial for the company and its users.
The last source I researched was an article on Facebook privacy management. While this article did not focus on data itself, it is very important for my research because it discusses how much users care about privacy to begin with. The article brought to my attention that men care less about their privacy than women do. The author of the article found an algorithm to determine which gender is more concerned about having privacy on social media. This may also be true for different scenarios such as: do people of different ages, geographic location, and race all care about privacy the same. This would give the companies great insight on who values their privacy the most and if anyone values their privacy so much that they are willing to sacrifice the advantages of having big data. While this is vital information for anyone wanting to know how much users value their privacy, I don’t know if there is a way for companies to give different amounts of privacy to different users. Potentially, companies could give options on whether users get the maximum amount of privacy or little to none. This article answered my question of whether users care if their information is shared to different companies and helps me to get an idea of how bad the Cambridge Analytica leak really was in the eyes of Facebook users.
After researching various peer-reviewed articles, I am now able to understand a lot more about information security. Big data is something that is being used by many companies and it has its perks, such as: innovation and efficiency. While these are great things to have in a company, it comes with the potential risk of data accidents occurring. Data leaks can happen and it can often be unknown whether they occur purposefully or unknowingly. Facebook leaked data to Cambridge Analytica and this may have been an accident or intentional.
Also, while researching I learned that not everyone is concerned with privacy. This information I have derived from these articles are available for everyone. Therefore, if someone still does not understand the risk of using these applications, then they are at fault for whatever may occur with their data.
With all that being said, I believe the proper answer for my research question is that while data leaks are wrong and invasion of user privacy, they should be aware of this and are at fault for sharing such information. Each of my sources provided me with crucial information on data privacy and lead to make this assumption. However, while I gained a lot of information from these sources, I would still like to better understand how users can be unaware of their data being shared and then be distraught when it happens. I think it is the user’s responsibility to understand such information when they sign up for the application. This is something I would have to research myself as I could not find any previous research done on this.
In conclusion, I have come to the understanding that dig data leaks do occur, but also that it may not be an issue for some people who do not value their privacy. If I had the ability to do my own experiment, I would try to research how much people actually care that their information is being shared with other companies. I myself do not see a problem with anyone having my data because I make sure to not share anything I would not want someone to see. I would not consider the IoT to be a place where people can even have privacy. Each of the sources I selected were peer reviewed articles with methods for testing my hypothesis. Each source gave me information that helped me to support my hypothesis of, “big data leaks can happen and do happen, but I do not think people care as much as they should.” This implies that people do not generally care enough about their information being cared that they are willing to sacrifice the applications such as Facebook. It implies that not enough people would be willing to give up Facebook for information security. These implications come with consequences. Companies recognize this and they are continuing to share user data which is inconvenient to the minority of users. This may not seem like a bad thing, but the few users that do value their security will be upset. However, they will always have the option to not use services that share their data. The fact is, the Internet of Things (IoT) plays a major role in our everyday lives. It influences our lives. It is in our houses, our cars, and even our appliances.
Fig 2. How the IoT and the cloud play a role in our everyday lives.
Child, J. T., & Starcher, S. C. (2016). Fuzzy Facebook privacy boundaries: Exploring mediated lurking, vague-booking, and Facebook privacy management. Computers in Human Behavior, 54, 483-490. doi:10.1016/j.chb.2015.08.035
Dai, W., Qiu, M., Qiu, L., Chen, L., & Wu, A. (2017). Who Moved My Data? Privacy Protection in Smartphones. IEEE Communications Magazine, 55(1), 20-25. doi:10.1109/mcom.2017.1600349cm
Gimpel, H., Kleindienst, D., Nüske, N., Rau, D., & Schmied, F. (2018). The upside of data privacy – delighting customers by implementing data privacy measures. Electronic Markets, 28(4), 437-452. doi:10.1007/s12525-018-0296-3
Nunan, D., & Domenico, M. D. (2015). Big Data: A Normal Accident Waiting to Happen? Journal of Business Ethics, 145(3), 481-491. doi:10.1007/s10551-015-2904-x
Tolmie, P., & Crabtree, A. (2017). The practical politics of sharing personal data. Personal and Ubiquitous Computing, 22(2), 293-315. doi:10.1007/s00779-017-1071-8

More like The Facebook Data Leak And Is It Okay For Companies To Sell Our Data? - Management Information Systems - Essay

Use Of Big Data Is A Positive Step For Humankind - Computers In Society - Essay

2716 words - 11 pages ... practical solutions. However, the big question comes – is it all a positive step forward, or is there potential for some negative impacts as well? Context Before we answer that question, we first need to explore the definition of Big Data. This has been defined by many in various ways, one of them being that Big Data is a large volume of information – both structured and unstructured – which overwhelms a business on a day to day basis. Some of the ...

The Problems With Data Mining Paper - CSC 485 - Essay

3033 words - 13 pages ... such pricing results in consumers in lower income neighbors being required to pay more for online products than higher wage communities, the value of online shopping is decreased significantly. We know this and yet we as consumers continue to shop frequently at these retail locations. In our new digital age, it online seems to make perfect sense that companies choose to practice the art of Data Mining. Why wouldn’t they? The resources are there ...

Data Analysis Skills And Thinking - BUS 307 - Essay

1169 words - 5 pages ... correct level of unit level detail necessary for the analysis and management of the commodity. It should be accumulated at an aggregate level on each element of our expenditure. The outcome is a mutual understanding of the history of expenditure relative to the demand from each end user in a firm founded on the accurate information collected via distinct and automated procure-to-pay system. I spend analysis, one has to drive all spend a unit of ...

Bureaucracy In Data Analytics Industry - Leadership And Organisational Behaviour - Essay

1602 words - 7 pages ... employees to constantly be innovative and invent new ideas. Having researched the top companies in data analytics, efficiency certainly does not bring competitive edge for players anymore but definitely innovation and creativity do. This early finding raises a question that: is bureaucratic management style relevant in data analytics field today? The first characteristics of bureaucracy is specialisation of task and division of labour. Specialisation ...

Data-driven Design For Intelligent Dynamic Facades

1179 words - 5 pages ... thermal and lighting analysis. This process of testing allows for the basis of an iterative design process where one is able to evolve and adjust a scheme up until an acceptable form is achieved that still maintains the initial goal of achieving an optimal outcome for the building's occupants. The use of an algorithmic problem-solver such as Galapogos can also help to determine the structural form of a facade by programming it to optimize viewing ...

This A Data Assignment On An Invention I Created - Data Management - Research Paper

978 words - 4 pages ... of our data management class we dealt a lot with spinner wheels and even more with the dice concept. This is why I chose to combine the two probability platforms into one game. The information that we learned throughout the course gave me enough knowledge on both spinners and dice to create a good probability game with decent odds for both player and game, as well as a large house edge so that the game will make more profit than it loses over 80 ...

How Climate Change Affects Our Earth And How It Is Related To The Book Oryx And Crake - Spokane Community College English - Essay

1063 words - 5 pages ... time of wet weather when she stated in her book, “The ceremony used to take place in June; the weather then used to be sunny and moderate. But June was now the wet season all the way up the east coast, and you couldn’t have held an outdoor event then, what with the thunderstorms. Even early February was pushing it: they’d ducked a twister by only one day” (173). Over the past few years and now, it is no secret that atmospheric circulation patterns ...

Data Breach At Equifax The Challenges And The New Cyber Threats - UNB - Assignment

2763 words - 12 pages Free ... jobs. (Srinivasan, S. &Pitcher Q., 2018) This incident is a stark reminder to all custodian of sensitive data that hackers are thinking big when it comes to targets and should rise up to this challenge. Other companies that hold lots of sensitive information will be in their sights in 2018 and beyond “Marc Goodman, a security expert and the author of Future Crimes, thinks data brokers who hold information about things such as people’s personal Web ...

Veterans Affair Data Theft Issue - Universoty Of The Cumberlands ,legal Regulations - Essay

521 words - 3 pages ... information was stolen need to be provided with free credit monitoring and, they should stop using SSN’s and other sensitive information. This case is a classic example of mismanagement and not thinking about consequences a data theft can cause. The company lacked preparedness and disaster management policy. They had no idea the kind of data they were dealing with and its sensitivity. ...

It Is Okay, Review That Person’s Content Without His Or Her Permission - ESL - Essay

602 words - 3 pages ... Internet there are thousands of fake news, misinformation and scammers. In addition, hackers or criminals getting into person’s account of social media, and they use people personal information to borrow money from bank or create fake account under other people’s data. If the school admission or employee as a fact, it is difficult to change or erase that irresponsible mistake. “Colleges might erroneously identify the profile of person with the ...

19th Century European Imperialism Data Based Essay; Identify And Explain The Political, Economic, And Social Causes Of European Imperialism In The 19th Century

406 words - 2 pages Free ... contributed to the need to pull ahead of other nations in the technological field. In Document one, "Imperialism and World Politics," Parker T. Moon argues that above political leaders, economic powerhouses were most interested in imperialism because of the need for raw materials. He continues to discuss the urgency of European companies to invest in the colonies in order to make new profit. Then, in Document two, Senator A. J. Beveridge debates how it ...

Trademark Is A Common Problems Between Companies. Wherefore Asda Will Be Taken To The High Court Because Of The Claiming Which Specsavers Make It Against It.

572 words - 3 pages ... Untitled summary trademark is a common problems between companies. wherefore Asda will be taken to the high court because of the claiming which Specsavers make it against it. The problem start when Azda ran an online and in-store advertisement claiming: "Be a real specs saver at Asda." Which considered by Specsavers as distortion of the company's reputation. The other object was the elliptical shapes which Azda use it ...

VO2 & Blood Lactate Data Obtained From A Cycle Ergometry Test As A Guide For Physical Capacity - Loughborough - Essay

1583 words - 7 pages Free ... VO2 & blood lactate data obtained from a cycle ergometry test as a guide for physical capacity Introduction In the past, it was commonly believed that lactic acid was a waste product brought about by the process of glycolysis, involving the inadequate supply of oxygen to working muscles (Hill and Lupton 1923). This view has been greatly debated since then, with claims of anaerobic glycolysis and lactate processes ongoing even during resting ...

Facebook Pre-mortem For IT Managers - CSUF ISDS 551 - Paper

791 words - 4 pages ... money on research and development. Facebook will need to take a similar business strategy to compete with these companies. The Internet of Things (IoT) presents many new ways to interact with technology in our daily lives and Facebook needs to take a strong position in the market. Facebook is aware that it needed to branch out of just social networking and as evidence, they bought Oculus VR in 2014 to compete in the virtual reality market ...

IT & Management (subject) 1st Year College Risks And Responses Associated With IT Systems

933 words - 4 pages ... area of IT. Research being an important factor in it's own right to help prevent poor integration of systems, promoting flexibility and future compatibility as far as is possible, and preventing bad predictions regarding time-frames and budgets.Management also needs to be able to carefully consider who should be in on the brainstorming preceding any new development. Making special consideration for various heads of departments, IT representatives ...