Data Mining | Consumer Risks & How to Protect Your ...

29 Apr.,2024

 

Data Mining | Consumer Risks & How to Protect Your ...

We only gather information from credible sources. This includes peer-reviewed medical journals, reputable media outlets, government reports, court records and interviews with qualified experts.

For more What Is Data Harvesting?information, please contact us. We will provide professional answers.

Data mining uses automated computer systems to sort through lots of information to identify trends and patterns. It is often used to look into people’s behavior based on past purchases, where they routinely travel or the events in their lives. The practice raises ethical issues for organizations that mine the data and privacy concerns for consumers.

Mining large collections of data can give big companies insight into where you shop, the products you buy and even your health. Just about everyone leaves a big enough data footprint worth mining. Business analysts predict that by 2020, there will be 5,200 gigabytes of information on every person on the planet, according to online learning company EDUCBA.

That’s a lot of information about you. Just one gigabyte can contain 1,000 short novels, according to the California Institute of Technology.

All this information helps businesses target you as a potential customer. And it may also make your personal information a target for unethical businesses or cybercriminals. But there are things you can do to guard your privacy and minimize your risks of unscrupulous data mining.

What Is Data Mining?

Companies in the United States are allowed to collect digital information about people from a variety of public and private sources. They use this data to try to create profiles of individuals or targeted groups of people to benefit their business.

Data mining digs through all this information to discover patterns and relationships. Results from analyzing past patterns can be used to make predictions about the future. This allows businesses to anticipate coming trends and behaviors.

Sources that Provide Information to Data Miners

  • Websites
  • Social media
  • Mobile devices
  • Apps
  • Internet of things

Source: InfoWorld

For example, data mining may show that a new model of car is selling extremely well in California but not selling at all in the Midwest. This can let the manufacturer refocus advertising and shipments to the West Coast and cut back in the heartland.

But data mining can also zoom in on your personal buying habits. If you buy a lot of birdseed online, you may see ads for bird watching supplies show up in your social media feed or while you’re visiting a website. Because you bought something in the past, data mining predicts what you might be willing to buy in the future.

Data Mining Is Different from Big Data and Data Breaches

People sometimes confuse data mining with big data or with data breaches. While all three may be related at times, each is distinctly different from the others.

Big data refers to large amounts of data, or information. Data mining refers to digging into collected data to come up with key information or patterns that businesses or government can use to predict future trends. Data breaches happen when sensitive information is copied, viewed, stolen or used by someone who was not supposed to have it or use it.

Consumer Profiles

A single consumer profile from data mining company Acxiom Corp. contained 750 individual fields of data about that one person. It included categories such as “Employment & Income” and “Lifestyle & Interests.” Acxiom has similar profiles for 700 million consumers.

Source: Reuters

Legitimate data mining examines and analyzes information the miner has legal access to. But you may not always realize you’ve given permission for your information to be used like this. And large treasure troves of information collected for data mining make tempting targets for hackers or cyber criminals.

How Does Data Mining Work?

Data mining collects, stores and analyzes massive amounts of information. To be useful for businesses, the data stored and mined may be narrowed down to a zip code or even a single street.

There are companies that specialize in collecting information for data mining. They gather it from public records like voting rolls or property tax files. These can show your age, address, how much you paid for your home and how much you owe on your mortgage.

Data mining companies also buy information from websites or other businesses that track customers’ or visitors’ activities. They create profiles of potential customers that they can sell to other businesses.

How Companies Use Data Mining

  • Online marketing
  • Training and support
  • Fraud detection
  • Computerized medical studies
  • Spam filtering

Profiles created by data miners may include information on millions of people. And there may be hundreds of pieces of data on each person.

Risks to Consumers

Storing a lot of information in one place can create risks for consumers. Mined data can sometimes be misused or even stolen. And just the potential for something to go wrong takes a toll on consumers.

A 2017 study from the University of Washington found that simply giving up personal information to big companies can create a rising sense of vulnerability in consumers. The researchers found when big data breaches happen, they make the feelings of vulnerability worse.

Cybersecurity Concerns

A 2017 survey by the United States Census Bureau found 73 percent of American households with internet are concerned about online privacy and cybersecurity. Almost 33 percent said this has made them cut back on their online activities.

Source: National Telecommunications and Information Administration

Data miners have to walk a line between creating highly useful information and protecting the privacy of the people whose data they gather. That line sometimes blurs.

Data mining has to be accurate and reliable to be useful. That means getting the most detailed information as possible. At the same time, data miners should keep the information anonymous so that you can’t be identified from the data they gather from you.

Large collections of detailed data are especially attractive to hackers. With enough information about a person, they can steal someone’s identity. The Identity Theft Resource Center reported more than 1,000 data breaches exposing more than 57 million personal records in 2018.

Experian, one of the three largest United States credit bureaus, predicts an increasing risk of identity theft in coming years as hackers target the cloud, gaming communities and wireless carriers. These are all entities where data is collected or stored.

Your Data Benefits Big Businesses

It can be difficult to keep your personal information out of cyberspace and away from data miners. Bank and medical records are digitized and can be moved around the world at the speed of light. Smart phones, apps, websites and social media can track your browsing habits, online purchases and even where you go or exactly where you are this very minute.

Data mining works partly because you agree to give up some of your privacy. It’s often a trade-off. For example, you may be willing to give up a bit of privacy in exchange for the convenience of using a debit card or credit card. But then, every time you swipe that card, the bank and sometimes the retailer collects a little more information on your behavior.

All this adds up. In 2017, one company alone, Cardlytics Inc., managed data collected from $1.5 trillion in credit card transactions. Roughly 2,000 banks sent Cardlytics purchase information stripped of customers’ personal identification.

The company sorts through the data looking for purchasing trends. Banks use this information to search for signs of fraud that could hurt their customers’ accounts. But banks also use the mined data to offer their customers coupons or improve services.

And consumers may never realize their purchases were monitored.

Online retailer Amazon uses a collaborative filtering engine, or CFE, that analyzes your purchases to predict what you’re likely to buy next. The CFE also recommends products similar to what you just added to your shopping cart. The choices are based on similar purchases by other customers.

All this mined data is turned into the power of suggestion, pushing you to make an impulse buy before you check out. Investing and financial education website Investopedia estimates these suggestions account for just over a third of Amazon’s total sales.

Facebook Shared Millions of Users’ Personal Information

Facebook raked in more than $40 billion in 2017, and user data plays a big role in the company’s profits.

Most of that money, 89 percent, came from advertising. But that advertising revenue is largely driven by your data. Advertisers can tap into Facebook’s data mining of user information to put ads in front of the people most likely to respond to them. Facebook says personal information is stripped from the process and that it keeps you anonymous.

But The New York Times reported in 2018 that Facebook gave several big tech companies, including Netflix, Microsoft and Amazon, access to various types of personal data belonging to Facebook users. This included users’ contact information, private messages and friend lists.

Your Information that Facebook Collects and Mines
  • All current and past Facebook friends
  • All posts or other Facebook activity (likes, shares, etc.)
  • Birthdate and age
  • Current city
  • Email address
  • Every ad you click on
  • Every IP address you log in from
  • Gender
  • Hometown
  • Maiden name
  • Mobile phone number
  • Name
  • Other social networks (Instagram, Twitter, etc.)
  • Schools you attended

Source: Fortune

The Times reported that at least two “prominent makers of smartphones and other devices” had gained access to personal information of “hundreds of millions” of Facebook’s users.

Facebook and the Cambridge Analytica Data Breach

At the same time Facebook was sharing user information with tech companies, a massive data breach of users’ personal information revealed gaping holes in the site’s security and privacy protections.

Cambridge Analytica was a political data company. In 2014, it set out to gather enough information on every American voter to create extensive personality profiles on them. The idea was that it could mine this data and target people with Facebook ads tailor made for them.

The now defunct company gathered information on up to 87 million users. The company got all this information by creating a personality quiz app on Facebook. Only about 270,000 people downloaded it and took the quiz. But what they didn’t know was that by downloading it, they gave Cambridge Analytica access to the personal information of every single one of their Facebook friends.

Consumer Resource

Facebook now lets you check online to see if any banned apps accessed your personal information.

This created a massive data set that included users’ names, ages, religion, political affiliation and both email and physical addresses.

If you are looking for more details, kindly visit Seismic Acquisition.

This violated Facebook’s terms of service, and the social media giant suspended Cambridge Analytica while it investigated the privacy breach. The data company shut down after details of the scandal became public in 2018. Cambridge Analytica reported that it had deleted the data.

“Facebook is not a social media company; it is the largest data mining operation in existence.”

State’s Attorney of Cook County, Illinois, Kimberly Foxx filed a consumer fraud lawsuit against both Facebook and Cambridge Analytica in 2018.

“Facebook is not a social media company; it is the largest data mining operation in existence,” Foxx wrote in her complaint.

Facebook also faces a mass litigation in a California federal court. As of May 2019, there were 36 lawsuits over the Cambridge Analytica breach pending in the litigation.

Your Smart Phone May Be Talking to Data Miners

The Washington Post conducted a privacy experiment in 2019 to see how much personal data apps and other features of a smart phone gleaned from its user. The newspaper reported that 5,400 hidden app trackers sent data from a single phone.

App trackers are buried within the apps you download. They are quick and easy tools companies can use to mine your data. Launch certain apps, and you may unknowingly be launching several different trackers at the same time.

Listening In

App developer Alphonso created more than 250 games, including some for kids, that turn on your smartphone’s microphone simply to gather marketing information from consumers.

Source: The New York Times

Is Your Fitness Tracker Tracking You?

Companies may use these trackers to improve service. But The Post investigation found some of the trackers gathered and stored data. One even collected the owner’s email address, phone number and exact GPS location in violation of the app’s own privacy policy.

Health apps on your phone or smartwatch may be sharing your health data with third parties. And in many cases, the app-maker doesn’t even warn you.

A 2019 study in JAMA Network Open found nine out of 10 depression and smoking cessation apps shared user’s data with companies like Facebook or Google, but only two out of three of the apps warned users they were doing it. The researchers found that simply sharing the name of the app with these companies was enough to disclose private medical conditions.

Fitness Tracker Apps

United States service members using Strava fitness tracker apps inadvertently created sensitive maps of military bases and patrol routes that were posted online.

Source: Wired

A 2019 Wall Street Journal report also found health apps sent sensitive information to Facebook, which could mine the data for targeted ads. The apps sent along information about users’ diet, exercise, heart rate and ovulation cycle.

While the data may be used to tailor ads to runners, dieters or women planning to become pregnant, privacy advocates see lots of room for abuse. Congress held hearings on the matter in February 2019.

“Right now, corporations are able to easily combine information about you that they’ve purchased, and create a profile of your vulnerabilities.”

Witnesses warned that health information could be sold to health care companies or even to potential employers looking for pre-existing conditions in job applicants. They also worried that insurance companies might charge consumers more if the insurers have information about poor fitness habits or unhealthy food choices.

“Right now corporations are able to easily combine information about you that they’ve purchased, and create a profile of your vulnerabilities,” Brandi Collins-Dexter from the advocacy group Color Of Change told Congress.

How to Protect Yourself From Data Mining Risks

It’s virtually impossible to avoid leaving a trail of at least some data. But you may be able to control how much information about yourself becomes available to data miners.

The first thing you should do is read over the terms of service before you sign up for any social media account, credit card or website. This will tell you about the information you’re giving up. Don’t click “Agree” unless you’re willing to agree with all the terms.

Also look at the privacy policy for any website or social media platform. This may be different from the terms of service. For instance, Facebook’s terms of service is more than 3,200 words long. It contains a two-word link to a separate data policy that is another 4,100 words long. That second page details how the company will use and share your information.

Privacy rules and laws vary by country. In most of Europe, anyone can ask any organization that collects data what information it’s gathered. The same is not true in the United States. The laws in the United States tend to give the company or group that collects the data a lot of leeway.

Check Settings on Apps, Social Media and Smartphones

Your smart phone can send a steady stream of information about you to the apps you’ve downloaded. You should ask yourself whether apps really need to know certain things about you, such as your location. Delete apps you no longer use and adjust the privacy settings on the ones you keep.

Adjust privacy settings for each of your apps to avoid sharing information with third parties.

Remove personal information from social media profiles. Things like your phone number, mother’s maiden name and where you went to school are often used as security questions for apps or websites. This info simply makes things easier for an identity thief.

Check Credit Reports and Data Breaches

You should check your credit reports once a year for unusual activity. Such activity could be a sign of identity theft. The Federal Trade Commission lets you request a free copy every year.

Credit bureau Experian also lets you monitor the so-called “dark web” for signs that your information has been stolen.

The website haveibeenpwned.com lets you check for free to see if your email or user name has been caught up in major data breaches.

Consider Privacy Tools

There are several free or inexpensive options to protect your privacy online.

DuckDuckGo.com is a search engine that doesn’t collect or mine your data. Google collects enormous amounts of data about you. This includes searches, websites you’ve visited and places you’ve been when using Google maps.

HTTPS Everywhere is an app you can download that secures your online connections. This prevents eavesdropping on your browsing habits and protects you from imposters masquerading as a trusted website.

Consumer Resource

Epic.org, the Electronic Privacy Information Center, has an extensive list of privacy tools for computers, mobile phones and other online connections.

There are also several free tracker blockers available. They are installed as an add-on to your browser. The companies that make them update the blockers with information about known data trackers at different websites. The blockers then prevent those trackers from connecting when you go to a website.

Some of the more popular ones include Ghostery, RedMorph, Disconnect and Privacy Badger.

These may have drawbacks. Some may also block parts of websites you visit. That means videos may not play or links to other recommended pages may not display.

Defend Your Data: Protect your privacy by limiting what ...

Everything you do online generates data, but you can help control how your personal information is collected, shared and used. 

In support of Data Privacy Week, Information Technology Services recommends five simple steps to protect your online story: 

1. Don’t overshare. Social media accounts with too much personal information make identity theft easier. Your high school, birth city or mother’s maiden name could help a criminal change your banking passwords, so choose tougher security questions and be careful what you post. Or make your profiles private on Instagram, Facebook and Twitter.

2. Collect only the essential. Employees can help keep student data private by only collecting or sharing information that is required for legitimate business reasons. It’s also University policy.

3. Use incognito or private browsing. Use incognito mode when browsing to prevent the storage of your search history, temporary internet files or cookies. Another alternative is an anonymous search engine like StartPage or DuckDuckGo. 

4. Limit app access to personal data. When an account or app asks for access to your personal information, consider whether the benefits are worth it. Be wary if the requested information is not relevant to the service being provided.

5. Change your privacy settings. Check and customize the privacy and security settings for your apps and websites, limiting what you share and with whom. The National Cybersecurity Alliance has a helpful Manage Your Privacy Settings page with links to dozens of popular services.

Learn more about protecting yourself at defendyourdata.wvu.edu.

If you want to learn more, please visit our website Difference Between Geophone and Hydrophone.