A Pre-Dental Student's Portfolio

Tag: Big Data

Big Data iMovie

https://drive.google.com/file/d/1qcIKxFnIzYYFkfZFdpKwIbyLQkj_JB1y/view?usp=sharing

 

Works Cited

Anonymous. “Mining health data to cut down costs: Minnesota project isn’t a cure-all, but it deserves public support.” Star Tribune. Protest, https://search.proquest.com/docview/428047228?accountid=12756. Accessed 2 April 2018.

Batterham Marijka, Neale Elizabeth, Martin Allison, Tapsell Linda. “Data mining: Potential applications in research on nutrition and health.” DAA, 2017. Accessed 2 April 2018.

“Caution.” The Spirits Business, 2015. https://www.thespiritsbusiness.com/2015/07/cancer-figures-prompt-calls-for-warnings-on-alcohol-products/.

“Large Data Sets.” Scienticifcomputing. https://www.scientificcomputing.com/article/2015/12/how-simple-observation-1800s-about-patterns-big-data-sets-can-fight-fraud.

Leyens Lada, Reumann Matthias, Malats Nuria, Brand Angela. “Use of big data for drug development and for public and personal health and care.” Wiley Genetic Epidemiology, July 2016. Accessed 4 April 2018.

McFarland, Matt. “The incredible potential and dangers of data mining health records.” The Washington Post, 1 Oct. 2014. General OneFile, http://link.galegroup.com/apps/doc/A384253434/ITOF?u=bidd9756&sid=ITOF&xid=6008226e. Accessed 2 April 2018.

“MRI Brain Tumor.” ResearchGate, 2011. https://www.researchgate.net/figure/a-Original-MRI-brain-tumor-image-b-Colored-MRI-image_fig1_265477512.

Niu Bing, Harrington Peter, Li Guozheng, Li Jianxin, Poon Simon. “Analysis and Modeling for Big Data in Cancer Research.” BioMed Research International, 2017. Accessed 4 April 2018.

“Patients.” Penn Medicine. https://www.pennmedicine.org/for-patients-and-visitors.

“Privacy.” Thatstechnology, 2015. http://thatstechnology.com/congress-moves-forward-on-cyber-threat-sharing-bill-despite-privacy-concerns/

“Smartphone.” Pocketnow.http://pocketnow.com/2013/05/06/htc-one-update-critical-to-success.

Terry, Nicolas. “Health Privacy Is Difficult but Not Impossible in a Post-HIPAA Data-Driven World.” Chest, March 2014. Accessed 18 April 2018.

 

MLA Citation- Source 1

Work Cited:

Anonymous. “Mining health data to cut down costs: Minnesota project isn’t a cure-all, but it deserves public support.” Star Tribune. Protest, https://search.proquest.com/docview/428047228?accountid=12756. Accessed 2 April 2018.

I plan on using this article to discuss the Minnesota project’s privacy concerns and attempt to protect health care information to use for big data. The Minnesota project has been working on protecting a small collection of health records from hackers and criminals. The records have been successfully protected for a sufficient amount of time. The success in protecting these records may encourage others to trust health care organization with their personal data.

Big Data Resources

I have not decided my stance on the topic of “big data.” I never thought about the effects of big data on the criminal justice system until watching the TEDTalk, “Why statistics are the key to fighting crime,” by Anne Milgram. She, along with a team of statistical analytics, created a universal risk assessment tool to predict if someone may commit an act of violence if released. This is a positive example of where big data is useful. On the other hand, Glenn Greenwald pointed out the privacy concern with big data and using social media. He brings up the argument that only bad people have something to hide, and Greenwald contradicts this idea by saying all of us have something we want to hide. He states: “Their actions say otherwise… putting passwords on social media and emails, putting locks on the bedroom and bathroom doors…” (3:45). These are all examples where the majority of people prefer privacy. I do support the protection of our privacy. I found the TEDTalk “Your smartphone is a civil rights issue” by Christopher Soghoian very interesting. This source also backs the idea that security and privacy are essential. Soghoian brought up an important point, “everybody in our society … [should get] the same benefits of encryption and is equally able to protect themselves from surveillance by the state…” (6:06). It would be fair for everyone to have the choice to protect their privacy if they wanted to. I did not realize Apple smartphones were significantly more secure than Android smartphones. This gap is known as the Digital Security Divide. This could be problematic, especially since there has been an evident correlation between this gap and socioeconomic classes. I would like to spend time looking at academic articles about “big data” and privacy concerns.

Alessandro Acquisti’s TEDTalk “Future without Secrets”

In Alessandro Acquisti’s TEDTalk “Future without Secrets,” I agree with his proposition that privacy will become one of our greatest challenges. Acquisti is right that big data has benefits, but he seems on more dubious group when he claims technology users must “fight for the control over personal information” (14:14). Big data may lead to further technological advancements that could benefit humanity. However, there were many worrisome facts Acquisti pointed out. He provided the statistic that 27% of subjects in a study by using only social media information, such as Facebook, that the first 5 social security digits were identified within 4 attempts (3:50) This could be dangerous, especially living in a society where our social security numbers represent our personal identification that is connected with back accounts, employment, credit cards, education, etc. One thing I found interesting was the advancement in face recognition systems. Using just public Facebook accounts, it is possible to take a picture of a stranger and find 10 of the closest matches using face recognition. Typically, the photos were accurate and the strangers name was identified as done in a study explained in the TEDTalk (1:05). These face recognition improvements could be extremely beneficial in connecting crimes with individuals along with other gains. I still wonder how many people interpret big data and look at the information collected. Is there a specific qualification you need to access these technological features? All this data is extravagant. Eventually, the data may exceed the amount time which could be spent interpreting it suggesting too much data could be taken.

 

Diary of My iPhone

                                                                       March 26, 2018

Dear Diary,

My day starts when I make a loud noise as usual, which was the alarm that was set the night before. It is my job to wake up my user. Throughout the day, I get extremely tired since my battery dies multiple times a day. When I am not being used, I am plugged into the charger. I get breaks periodically throughout the day with my user is in her class. I have to update the weather daily, typically displaying the forecast in the morning. My camera has taken more pictures than I could count, typically on Snapchat. I tend to always be updating Snapchat for my user and displaying the most recent pictures and videos she receives. I also have to be quick as my user scrolls down through Instagram every night. I connect to a nightly call to my users home telephone.

 

This diary entry is not finished.

© 2024 Elise's Site

Theme by Anders NorenUp ↑

css.php