How Companies Can Do Data Privacy Better - Deepstash
How Companies Can Do Data Privacy Better

How Companies Can Do Data Privacy Better

Curated from: insight.kellogg.northwestern.edu

Ideas, facts & insights covering these topics:

4 ideas

·

326 reads

6

Explore the World's Best Ideas

Join today and uncover 100+ curated journeys from 50+ topics. Unlock access to our mobile app with extensive features.

Privacy data in the digital world

Privacy data in the digital world

Consumers in the digital world give away a large part of their personal data. For example, we enter our age and credit card numbers, allow companies to track our behaviour, and often display our geographical location. 

However, customers are also becoming aware of the risks of their information being stolen, misused, or sold to third parties and are looking for privacy protections. A 2019 survey showed that 81 per cent of participants felt the risk of data collection outweighed the benefits.

11

157 reads

Network effects can cause privacy risk

A user's decision to participate in an online platform activity depends partly on how many people are using it. This concept is known as "network effects."

Negative network effects often drive privacy risk. The more users, the bigger the company's database, the more attractive it becomes to attack.

10

72 reads

Regulations to protect consumers

Research showed that companies would gather more personal information than they need unless policymakers set requirements for data protection. However, if regulators restricted data collection but ignored data protection, companies did not guard customers' data enough.

Data collection can be restricted:

  • Regulators could impose fines on companies whose data were leaked.
  • Policymakers could tax data collection and discourage firms from gathering optional personal information.

10

51 reads

Personalised services

Firms that provide personalised services to users based on how other users behave puts users' personal information at risk, even if hackers don't directly gain access to the database. Hackers might get access to an algorithms' output for real users, then reverse-engineer the information to gain insight into a person's characteristics.

One strategy to combat this is to add some noise to an algorithm's output.

10

46 reads

IDEAS CURATED BY

suzannefree

Mining engineer

Suzanne Freeman's ideas are part of this journey:

Machine Learning With Google

Learn more about cybersecurity with this collection

Understanding machine learning models

Improving data analysis and decision-making

How Google uses logic in machine learning

Related collections

Read & Learn

20x Faster

without
deepstash

with
deepstash

with

deepstash

Personalized microlearning

100+ Learning Journeys

Access to 200,000+ ideas

Access to the mobile app

Unlimited idea saving

Unlimited history

Unlimited listening to ideas

Downloading & offline access

Supercharge your mind with one idea per day

Enter your email and spend 1 minute every day to learn something new.

Email

I agree to receive email updates