Advertisement

Introduction to Big Data

  • William RaffertyEmail author
  • Laura Rafferty
  • Patrick C. K. Hung
Chapter
Part of the International Series on Computer Entertainment and Media Technology book series (ISCEMT)

Abstract

Big data is a term that has been gaining considerable attention in recent years. Big data is essentially a massive amount of data that can be analyzed and used to make decisions. There are three main characteristics associated with big data: volume, variety and velocity. There are many motivations for the adoption of big data; this data has remarkable potential to drive innovation, the economy, productivity and future growth. Big data analytics has become very popular in the area of marketing, driving up value by understanding and engaging customers more effectively. There are many industries that have adopted the use of big data analytics and are experiencing fantastic results; the healthcare, retail, insurance and telecommunications industries have all displayed the endless possibilities of implemented big data into their operations. However, as more information is collected through big data, there becomes more concern for individuals’ privacy. To mitigate these potential risks, policies have been put into place such as the Personal Information Protection and Electronic Documents Act (PIPEDA). Furthermore, due to the nature of the technologies within the Internet of Things (IoT), there are security concerns. These systems are very resource-constrained which results in a large amount of attention in cryptography and security engineering. This paper provides an introduction to the concepts of big data, motivations, some case studies, and a brief discussion on privacy.

Keywords

Big data Privacy Pervasive computing Internet of things 

References

  1. 1.
    MongoDB. Big data explained. (2015). Retrieved from Mongodb.com: http://www.mongodb.com/big-data-explained
  2. 2.
    P. Dave, What is big data - 3 Vs of big data. (2013, 10 2). Retrieved from SQL Authority Blog: http://blog.sqlauthority.com/2013/10/02/big-data-what-is-big-data-3-vs-of-big-data-volume-velocity-and-variety-day-2-of-21/
  3. 3.
    K. Bottles, E. Begoli, B. Worley. Understanding the pros and cons of big data analytics. (2014). Retrieved from http://go.galegroup.com.uproxy.library.dc-uoit.ca/ps/i.do?p=AONE&u=ko_acd_uoo&id=GALE|A377410232&v=2.1&it=r&userGroup=ko_acd_uoo&authCount=1
  4. 4.
    O. Tene, J. Polenetsky. Data, privacy in the age of big data. (2012, February 2). Retrieved from Stanford Law Review: https://www.stanfordlawreview.org/online/privacy-paradox/big-data
  5. 5.
  6. 6.
    L. Arthur, in Big Data Marketing, ed. by L. Arthur (John Wiley & Sons, 2013). Retrieved Aug 2015, from http://library.books24x7.com.uproxy.library.dc-uoit.ca/assetviewer.aspx?bookid=58128&chunkid=174813851&rowid=235
  7. 7.
    M. V. Rijmenam, Why 360-degrees customer profiles created with big data are nothing new. (2015). Retrieved from DATAFLOQ: https://datafloq.com/read/360-degrees-customer-profiles-created-big-data-not/109
  8. 8.
    Techopedia. (n.d.). Pervasive computing. Retrieved from Techopedia: http://www.techopedia.com/definition/667/pervasive-computing
  9. 9.
    Datamation. Why big data and the internet of things are a perfect match. (2015). Retrieved from Datamation: http://www.datamation.com/applications/why-big-data-and-the-internet-of-things-are-a-perfect-match.html
  10. 10.
    A. S. Moreno. Internet of Things Security, Privacy and Trust Considerations. (2014)Google Scholar
  11. 11.
    K. B. Ahmed, M. Bouhorma, M. Ahmed, Age of big data and smart cities: privacy trade-off. (2014, October). Retrieved from arXiv: http://arxiv.org/ftp/arxiv/papers/1411/1411.0087.pdf
  12. 12.
  13. 13.
    Data Science Series. (n.d.). Examples of what you can accomplish with big data. Retrieved from Data Science Series: http://datascienceseries.com/stories/ten-practical-big-data-benefits
  14. 14.
    Google. Google Flu Trends. (2014). Retrieved from Google.org: https://www.google.org/flutrends/about/how.html
  15. 15.
    B. Walsh, Google’s flu project shows failings of big data (2014). Retrieved from Time: http://time.com/23782/google-flu-trends-big-data-problems/
  16. 16.
    M. V. Rijmenam, T-Mobile USA cuts down churn rates by 50% with big data. Retrieved from DATAFLOQ: https://datafloq.com/read/t-mobile-usa-cuts-downs-churn-rate-with-big-data/512
  17. 17.
    M. Goldberg. Cloud computing experts detail big data security and privacy risks. (2013). Retrieved from Data Informed: http://datainformed.com/cloud-computing-experts-detailbig-data-security-and-privacy-risks
  18. 18.
    J. Crampton, Collect it all: National Security, Big Data and Governance (2014). Retrieved from SSRN: http://poseidon01.ssrn.com/delivery.php?ID=482106013031117031067120096090003111052032042016084026027093126022114105102031026109096023059100025126046118024078119029025068024015069044007119073083087122127114100052018084084121071090025016025013076098015110022119065027005015007076104030109093069025&EXT=pdfGoogle Scholar
  19. 19.
    E. Kovacs, Researchers Find 1PB of Data Exposed by Misconfigured Databases (2015, August). Retrieved from SecurityWeek: http://www.securityweek.com/researchers-find-1pb-data-exposed-misconfigured-databases
  20. 20.
    Ontario’s Privacy Legislation. (2015). Retrieved from http://www.privacysense.net/privacylegislation/canadian/ontario/
  21. 21.
    Office of The Privacy Commissioner of Canada. The Personal Information Protection and Electric Documents Act (PIPEDA). (2013). Retrieved from Office of The Privacy Commissioner of Canada: https://www.priv.gc.ca/leg_c/leg_c_p_e.asp
  22. 22.
    Government of Canada. Personal Information Protection and Electric Documents Act. (2015). Retrieved from Justice Laws Website: http://laws-lois.justice.gc.ca/eng/acts/P-8.6/FullText.html
  23. 23.
    Office of The Privacy Commissioner of Ontario. Privacy Legislation in Canada. (2014). Retrieved from Office of The Privacy Commissioner of Ontario: https://www.priv.gc.ca/resource/fs-fi/02_05_d_15_e.asp
  24. 24.
    Privacy Protection in Canada. (2015). Retrieved from Office of the Privacy Commissioner of Canada: https://www.priv.gc.ca/resource/tooloutil/infographic/leg_info_201405_e.pdf
  25. 25.
    Mondaq. (2014). Canada’s digital privacy rethink: fines, enforceable compliance agreements. Retrieved from Mondaq: http://www.mondaq.com/canada/x/305856/data+protection/Canadas+Digital+Privacy+Reth ink+Fines+Enforceable+Compliance+Agreement s+And+More
  26. 26.
    Incident Summary #4. (2014). Retrieved from Priv.gc.ca: https://www.priv.gc.ca/cfdc/incidents/2014/004_140919_e.asp
  27. 27.
    A. Cavoukian. A Guide to the Personal Health Information Protection Act. (2004, December). Retrieved from Information and Privacy Commissioner: https://www.ipc.on.ca/images/resources/hguide-e.pdf
  28. 28.
    Ontario.ca. Personal Health Information Protection Act, 2004. (2010). Retrieved from Ontario.ca: http://www.ontario.ca/laws/statute/04p03
  29. 29.
    A. Cavoukian. Frequently Asked Questions: Personal Health Information Protection Act. (2005, Febuary). Retrieved from Information and Privacy Commissioner: https://www.ipc.on.ca/images/Resources/hfaq-e.pdf

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • William Rafferty
    • 1
    Email author
  • Laura Rafferty
    • 1
  • Patrick C. K. Hung
    • 1
    • 2
  1. 1.Faculty of Business and ITUniversity of Ontario Institute of TechnologyOshawaCanada
  2. 2.Department of Electronic EngineeringNational Taipei University of TechnologyTaipeiTaiwan

Personalised recommendations