What's cookies?

In big data area, the definition of cookies has changed dramatically.

#“Brain Hacking” and “Programming people”  
#Cookies and Trackers  
#Data Breachs 
#Cybersecurity and Open Data


Smartphones addiction of is no news to hear now. But have you ever wondered the reason for overusing mobile phones is some engineers who design the phone, apps and social media are trying to get you hooked?

“This thing(smartphone) is a slot machine. Every time I check my phone, I’m playing the slot machine to see, ‘What did I get?’ This is one way to hijack people’s minds and create a habit, to form a habit.”
--Tristan Harris, a former Google product manager, said in an interview with 60 Minutes.

He is one of the few tech insiders to publicly acknowledge that the companies responsible for programming your phones are working hard to get you and your family to feel the need to check in constantly. Some programmers call it “brain hacking” and the tech world would probably prefer you didn’t hear about it.
Inadvertently, whether they(developers) want to or not, they are shaping the thoughts and feelings and actions of people. They are programming people. There’s always this narrative that technology’s neutral. And it’s up to us to choose how we use it. This is just not true. -- Tristan Harris

cookies and trackers

Websites are remembering our habits by using cookies. With every click of the mouse and every touch of the screen, we are leaving our personal information everywhere in the digital world. We are leaving our birthdays, our places of residence, our interests and preferences, our relationships, our financial histories, and on and on it goes.

“I want some sites to understand my habits. It helps them suggest books for me to read or movies for my family to watch or friends for us to connect with.” Gary Kovacs, who is a technologist and the former CEO of the Mozilla Corporation, said in a TED talk“But when I don't know and when I haven't been asked, that's when the problem arises.”

He did an experiment on himself by visualizing where his Web data is going and who's tracking him by using Collusion, a browser add-on. The red dots are sites following him without navigation, blue dots are those he navigated directly, grey dots are sites also tracking him, but “I have no idea who they are”.
And that’s how data leaks, these unintentional information disclosure causes organized crimes, political scandals, and privacy issues of personal information of public.
Data Breachs

Big Data genie is out of the bottle.

Facebook has said that they believe up to 87 million user’s data have improperly shared with Cambridge Analytica.
Cambridge Analytica is a data marketing firm. It uses an algorithm capable of creating micro targeted content. And it claims its data and research helped Donald Trump win the US presidency.

But how?

By analyzing the users from their Facebook interactions, Cambridge Analytica classifying users into different personality types psychologically by “Big Five”categories(openness, conscientiousness, extroversion, agreeableness, neuroticism). Former CEO of Cambridge Analytica, Alexander Nix said that they have predicted the big five score of every adult in America before the election. And then, there will be adverts posted targets at personality types, tailoring people’s deepest emotions.

Like Gary Kovacs’s collusion map of his daily life, the data have breached.

Take a look at the World’s Biggest Data Breachs graphic on the background. The graphic (interactive format) shows a timeline of some of the biggest data breaches on record. Each bubble represents the number of records lost in any given breach, with the most sensitive data clustered toward the right side.

cybersecurity and open data

The issue of cybersecurity is in the spotlight with super-sized data breaches taken place.
But first of all, how these data are leaked?
The chart below shows a overview of the proportion of data leak methods in a sum of year 2004-2018.

By analyzing World’s Biggest Data Breachs, we could see that the main reason of data leak is hacking.
Then what is the possible solution? How should we prevent our data?

democratize threat intelligence data

Security expert Caleb Barlow on a TED talk calls out the insufficiency of safeguarding strategy strategies to protect our data. His solution? We need to respond to cybercrime with the same collective effort as we apply to a health care crisis, sharing timely information on who is infected and how the disease is spreading. If we're not sharing, he says, then we're part of the problem.

The bad guys are moving fast; we've got to move faster. And the best way to do that is to open up and share data on what's happening. -- Caleb Barlow