Crowdsourced Data Analysis

Improved Essays
Crowdsourcing is one of the most significant and controversial developments in Web 2.0 (Hakley, M., 2009). Crowdsourcing pulls data from many sources such as social media, personal geographic data, or surveys (Goranson, C, et al and Sui D. Z. et al, 2011). The new use of crowdsourced data, the rise of social networking, and use of GIS has transformed rapid responses to political unrest and natural disasters has shaped how data privacy and ethical uses of data is used (Raymond, N, et al, 2012). With the use of volunteered geographic information, the privacy of individual, locational, and groups of data is under scrutiny such that the data is being collected, also known as data scooping, based on personal or industrial motives (e.g., google street view) (Streitfield, D. et al, 2012). Along with privacy of data collection, the ethics of collecting data and information requires to have standards and safety of people due to that data that is collected can be used against them (e.g. terrorism or …show more content…
This can lead to privacy issues such that as technology grows and harnessing larger datasets that has spatial data, new data sources can further exploit personal information (Goranson, C. et al, 2013). To manage data that is collected for research, crisis mapping, or other purposes should be configured using the model of data stewardship. According to Hartter, J. et al, 2013, data stewardship is done by effectively and efficiently to record, curate, and be able to facilitate large volumes of data which is needed for good data management. Good data management is needed for ethical practices such that data that is collected needs to followed using a set of guidelines and standards set by the IRB (Goranson, C. at al,

Related Documents

  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Question 1 -Legal Issue In this discussion, the legal issue is in regards to privacy rights. Currently, policies allow researchers to input information in a database that all organizations and/or researchers can gain access. Therefore, the privacy of the original donors becomes jeopardized because his/ her permission to release his/her information goes beyond the scope of the permission granted by the donors. By having a database that other researchers have entree to violate the donors’ right of privacy.…

    • 1480 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    The world has registered huge technological intricacies concerning about social media. There are no contentions that the thrilling defect elevated to an extent that created the ethical issues governing social media. With increased usage of the social media for purposes other than personal affections, the question of privacy and confidentiality has been much highlighted by experts. Whereas the social media gives individuals the platform to publish and or share whatever they have in mind, there are expectations of limitations as to the extent to which personal information could be shared within these platforms.…

    • 284 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Through a vast majority of the services we utilize daily, most of which often appear innocuous, data about users is collected and distributed to third parties. In the article “A Day in the Life of Big Brother”, Sherman guides the reader through the daily routine of an individual, referred to as J. Doe, and their interactions with a plethora of services that most individuals utilize daily. First, J. Doe wakes up and reads the news through Google. Google, and his Internet Service Provider, use analytical tools, such as cookies, to follow Doe’s reading habits online and use that information to analyze his preferences. Following this, Doe commutes to work through a state that utilizes electronic toll ways, which follow and record his path.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Evergreen The Internet is a powerful tool providing various information, including personal data. Also, the Internet can make any person famous worldwide in a short period. However, the fame received by the Internet is not always positive. That is to say, the large audience can see and share some content that can ruin one’s life literally.…

    • 564 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cookie-Cutter Strategies

    • 384 Words
    • 2 Pages

    There is no silver bullet that will transform student retention rates in a few days. Student success will happen over time, not overnight. We cannot dismiss the urgency of the moment. We must be fully committed to perform every function, take advantage of every opportunity, and be accountable for every responsibility so that student success becomes a reality. Academic institutions have developed best practices that we can follow.…

    • 384 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Today, more and more Americans communicate and work online (Shamshi, n.d.). People use the internet for banking, emailing, making doctors appointments, going to school, and using social media. Telecommunication companies and cable companies have developed a new business model relies on collecting and selling information from their users. Email providers and social media websites store chat logs of users, and mine information from them.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The article I chose alluded the implications of Amazon Mechanical Turk (AMT) and other similar platforms. AMT's goal is to "break jobs into smaller tasks and offer them to people across the globe" (Inside Amazon's clickworker platform, Reese and Heath). Conversely, Hope Reese and Nick Heath attempt to challenge the intent behind AMT. In the title of their article, Reese and Heath ask the following question: Does AMT and its' peers " democratize work or exploit the disempowered?" The article delves into the lives of AMT workers, several of which are: diverse, protracted working hours, low pay, difficulty in being paid, moral hazards, unclear job requirements, and the limited availability of these jobs.…

    • 1101 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Body Worn Police Cameras

    • 1430 Words
    • 6 Pages

    C. Perceived Risks of Body-Worn Camera Programs Body-worn cameras are a very new technology. With every new technology, there are risks that threaten the success and effectiveness of the technology. The use of body-worn cameras has produced concerns of citizen’s privacy, officer privacy, and investments and costs of creating and maintaining programs. Citizen privacy is the biggest concern regarding body-worn camera programs. Body- worn cameras have the potential to infringe on citizens’ expectation of privacy.…

    • 1430 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The 21st century is often referred to as the era of information. This is due to the radical amount of social networking that takes place on a day to day basis. This includes everything from Facebooking your close friends to googling answers for that last minute history assignment. Information is constantly being streamed onto the internet and it only takes a matter of seconds to go viral. The question is then raised, are privacy rights being violated and if so who is to blame?…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As a result of social networking and involuntarily giving out our personal data, we have mostly agreed and consented to our invasion of privacy. Throughout the essay,…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction The most powerful and prominent force in the world has without a doubt has been, the rapid advancement of technology following the industrial revolution. From the introduction of the steam engine by James Watt to the mass expansion of railway lines, technological advancement has increased productivity and globalization exponentially. By breakthroughs in communication, transportation, and information technology, the world in which we reside has become unrecognizable to what it was 200 years ago. This essay encompasses these three ways in which technological advancement has completely restructured and revamped the world of as we know it. Cementing itself as the most powerful force on the planet.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Social Media How hard is to tell who murdered privacy and common sense when you can see social media’s has machete on its hand? Internet is one of the most powerful technologies we have in this generation, and we are using it in our daily activities as part of our life. Social media such as Facebook, MySpace, Twitter, YouTube, and Instagram are some of the popular social media sites where people interact.…

    • 1117 Words
    • 4 Pages
    Improved Essays