Elise's Site

A Pre-Dental Student's Portfolio

Big Data iMovie

https://drive.google.com/file/d/1qcIKxFnIzYYFkfZFdpKwIbyLQkj_JB1y/view?usp=sharing

 

Works Cited

Anonymous. “Mining health data to cut down costs: Minnesota project isn’t a cure-all, but it deserves public support.” Star Tribune. Protest, https://search.proquest.com/docview/428047228?accountid=12756. Accessed 2 April 2018.

Batterham Marijka, Neale Elizabeth, Martin Allison, Tapsell Linda. “Data mining: Potential applications in research on nutrition and health.” DAA, 2017. Accessed 2 April 2018.

“Caution.” The Spirits Business, 2015. https://www.thespiritsbusiness.com/2015/07/cancer-figures-prompt-calls-for-warnings-on-alcohol-products/.

“Large Data Sets.” Scienticifcomputing. https://www.scientificcomputing.com/article/2015/12/how-simple-observation-1800s-about-patterns-big-data-sets-can-fight-fraud.

Leyens Lada, Reumann Matthias, Malats Nuria, Brand Angela. “Use of big data for drug development and for public and personal health and care.” Wiley Genetic Epidemiology, July 2016. Accessed 4 April 2018.

McFarland, Matt. “The incredible potential and dangers of data mining health records.” The Washington Post, 1 Oct. 2014. General OneFile, http://link.galegroup.com/apps/doc/A384253434/ITOF?u=bidd9756&sid=ITOF&xid=6008226e. Accessed 2 April 2018.

“MRI Brain Tumor.” ResearchGate, 2011. https://www.researchgate.net/figure/a-Original-MRI-brain-tumor-image-b-Colored-MRI-image_fig1_265477512.

Niu Bing, Harrington Peter, Li Guozheng, Li Jianxin, Poon Simon. “Analysis and Modeling for Big Data in Cancer Research.” BioMed Research International, 2017. Accessed 4 April 2018.

“Patients.” Penn Medicine. https://www.pennmedicine.org/for-patients-and-visitors.

“Privacy.” Thatstechnology, 2015. http://thatstechnology.com/congress-moves-forward-on-cyber-threat-sharing-bill-despite-privacy-concerns/

“Smartphone.” Pocketnow.http://pocketnow.com/2013/05/06/htc-one-update-critical-to-success.

Terry, Nicolas. “Health Privacy Is Difficult but Not Impossible in a Post-HIPAA Data-Driven World.” Chest, March 2014. Accessed 18 April 2018.

 

MLA Citation- Source 1

Work Cited:

Anonymous. “Mining health data to cut down costs: Minnesota project isn’t a cure-all, but it deserves public support.” Star Tribune. Protest, https://search.proquest.com/docview/428047228?accountid=12756. Accessed 2 April 2018.

I plan on using this article to discuss the Minnesota project’s privacy concerns and attempt to protect health care information to use for big data. The Minnesota project has been working on protecting a small collection of health records from hackers and criminals. The records have been successfully protected for a sufficient amount of time. The success in protecting these records may encourage others to trust health care organization with their personal data.

Big Data Resources

I have not decided my stance on the topic of “big data.” I never thought about the effects of big data on the criminal justice system until watching the TEDTalk, “Why statistics are the key to fighting crime,” by Anne Milgram. She, along with a team of statistical analytics, created a universal risk assessment tool to predict if someone may commit an act of violence if released. This is a positive example of where big data is useful. On the other hand, Glenn Greenwald pointed out the privacy concern with big data and using social media. He brings up the argument that only bad people have something to hide, and Greenwald contradicts this idea by saying all of us have something we want to hide. He states: “Their actions say otherwise… putting passwords on social media and emails, putting locks on the bedroom and bathroom doors…” (3:45). These are all examples where the majority of people prefer privacy. I do support the protection of our privacy. I found the TEDTalk “Your smartphone is a civil rights issue” by Christopher Soghoian very interesting. This source also backs the idea that security and privacy are essential. Soghoian brought up an important point, “everybody in our society … [should get] the same benefits of encryption and is equally able to protect themselves from surveillance by the state…” (6:06). It would be fair for everyone to have the choice to protect their privacy if they wanted to. I did not realize Apple smartphones were significantly more secure than Android smartphones. This gap is known as the Digital Security Divide. This could be problematic, especially since there has been an evident correlation between this gap and socioeconomic classes. I would like to spend time looking at academic articles about “big data” and privacy concerns.

Alessandro Acquisti’s TEDTalk “Future without Secrets”

In Alessandro Acquisti’s TEDTalk “Future without Secrets,” I agree with his proposition that privacy will become one of our greatest challenges. Acquisti is right that big data has benefits, but he seems on more dubious group when he claims technology users must “fight for the control over personal information” (14:14). Big data may lead to further technological advancements that could benefit humanity. However, there were many worrisome facts Acquisti pointed out. He provided the statistic that 27% of subjects in a study by using only social media information, such as Facebook, that the first 5 social security digits were identified within 4 attempts (3:50) This could be dangerous, especially living in a society where our social security numbers represent our personal identification that is connected with back accounts, employment, credit cards, education, etc. One thing I found interesting was the advancement in face recognition systems. Using just public Facebook accounts, it is possible to take a picture of a stranger and find 10 of the closest matches using face recognition. Typically, the photos were accurate and the strangers name was identified as done in a study explained in the TEDTalk (1:05). These face recognition improvements could be extremely beneficial in connecting crimes with individuals along with other gains. I still wonder how many people interpret big data and look at the information collected. Is there a specific qualification you need to access these technological features? All this data is extravagant. Eventually, the data may exceed the amount time which could be spent interpreting it suggesting too much data could be taken.

 

Diary of My iPhone

                                                                       March 26, 2018

Dear Diary,

My day starts when I make a loud noise as usual, which was the alarm that was set the night before. It is my job to wake up my user. Throughout the day, I get extremely tired since my battery dies multiple times a day. When I am not being used, I am plugged into the charger. I get breaks periodically throughout the day with my user is in her class. I have to update the weather daily, typically displaying the forecast in the morning. My camera has taken more pictures than I could count, typically on Snapchat. I tend to always be updating Snapchat for my user and displaying the most recent pictures and videos she receives. I also have to be quick as my user scrolls down through Instagram every night. I connect to a nightly call to my users home telephone.

 

This diary entry is not finished.

Response to Greenfield

I agree that on social media someone is more likely to promote their identity as the best possible version of themselves, a point that needs emphasizing since so many people delete information, such as comments or pictures, which do not show a specific vision or characteristic of themselves. Sometimes online identities are an exaggeration of their real self where it does not represent themselves as Greenfield referred to two separate selves: “front stage” self and “backstage” self.

 

Pages 116-117

Informal Prewriting

In Jean M. Twenge’s article, “Have Smartphones Destroyed a Generation?”, she discussed the effects of technology, specifically smartphones, on the population. One claim Twenge makes is that while children are spending more time in their parents’ house they are not close to their mother or father. Children do not have a stronger bond after spending countless hours within a close proximity from each other. Twenge herself writes, “… today’s teens can hardly be said to be closer to their mothers and fathers than their predecessors were.” In other words, Twenge believes even though more time is spent at home, their time at home is not building a stronger relationship. What are the children spending there time doing? The children along with parents spend more time interacting with their smartphone. There were countless examples where the children tried to interact with their parents, yet they were too distracted by their phones and did not pay attention. Children, on the other hand, could do the same things their parents do.

These children could spend hours on end in their bed scrolling through Instagram or Facebook. Time is spent connecting to their phone instead of face-to-face interactions with their family. I find this trend occurs in my household. There have been countless dinners where we sit together but are all on our phone not talking. Also, I find myself so intrigued by something on my phone that I block out what other people are saying to me. Obviously, phones have taken too much of attention. Twenge agrees when she writes, “In my conversations with teens, I saw hopeful signs that kids themselves are beginning to link some of their troubles to their ever-present phone.” The essence of Twenge’s argument is that phones have become problematic and is affecting interactions at home.

Boyd Chapter 1 Key Quotes

“ When teens interact with social media, they must regularly contend with collapsed contexts and invisible audiences as a part of everyday life” (31).

“Without a shared sense of context, hanging out online becomes burdensome” (36).

“… he provides just enough information that his friends can find him without increasing his visibility to adults” (47).

“… people make decisions about what to share in order to act appropriately for the situation and to be perceived in the best light” (48).

 

I thought it was interesting how Boyd discussed the importance of audience on social media pages. Whether it is your intended audience or not, people will see your post and other posts about yourself which is a self-reflection. I agree with Boyd in her argument about social media not being in context could be burdensome for individuals. Certain topics may seem acceptable and humorous to a certain group of people and at the moment, but it could also be offensive or confusing to others. Social media tends to be very active in many people’s lives.

Eulogy Tweet

My first post on Instagram was a random picture of my dog with no caption in middle school. My Instagram followers did not see a picture of me for awhile but random images that looking back no one would care about.

« Older posts

© 2024 Elise's Site

Theme by Anders NorenUp ↑

css.php