Learn more about cybersecurity with this collection
Understanding machine learning models
Improving data analysis and decision-making
How Google uses logic in machine learning
Firms that provide personalised services to users based on how other users behave puts users' personal information at risk, even if hackers don't directly gain access to the database. Hackers might get access to an algorithms' output for real users, then reverse-engineer the information to gain insight into a person's characteristics.
One strategy to combat this is to add some noise to an algorithm's output.
10
46 reads
MORE IDEAS ON THIS
A user's decision to participate in an online platform activity depends partly on how many people are using it. This concept is known as "network effects."
Negative network effects often drive privacy risk. The more users, the bigger the company's database, the more attract...
10
72 reads
Consumers in the digital world give away a large part of their personal data. For example, we enter our age and credit card numbers, allow companies to track our behaviour, and often display our geographical location.
However, customers are also becoming aware of the risks of their...
11
157 reads
Research showed that companies would gather more personal information than they need unless policymakers set requirements for data protection. However, if regulators restricted data collection but ignored data protection, companies did no...
10
51 reads
Read & Learn
20x Faster
without
deepstash
with
deepstash
with
deepstash
Access to 200,000+ ideas
—
Access to the mobile app
—
Unlimited idea saving & library
—
—
Unlimited history
—
—
Unlimited listening to ideas
—
—
Downloading & offline access
—
—
Personalized recommendations
—
—
Supercharge your mind with one idea per day
Enter your email and spend 1 minute every day to learn something new.
I agree to receive email updates