Big technology and data privacy

被引:2
|
作者
Conyon, Martin J. [1 ,2 ,3 ]
机构
[1] Bentley Univ, Waltham, MA USA
[2] Univ Penn Wharton Sch, Philadelphia, PA USA
[3] Bentley Univ, Waltham, MA 02453 USA
关键词
G3; L10; L12; SURVEILLANCE CAPITALISM; FACEBOOK; ECONOMICS; MARKETS;
D O I
10.1093/cje/beac052
中图分类号
F [经济];
学科分类号
02 ;
摘要
This paper discusses big technology and data privacy. First, we show the rapid rise in technology firms since the millennium. Using Facebook as a case study (the most popular social network in 2022), we show its reliance on personally identifiable data collection and advertising. Second, we investigate the Cambridge Analytica data breach. We show that stock prices fall in response to the data breach using event study methods. Cumulative abnormal returns decline by about 9.8% in the event window. Third, we discuss policy options in response to data privacy concerns. The GDPR provides a legislative model for protecting individually identifiable data.
引用
收藏
页码:1369 / 1385
页数:17
相关论文
共 50 条
  • [1] Big Technology and Data Privacy
    Yang, Kwangmo
    [J]. HEALTHCARE INFORMATICS RESEARCH, 2020, 26 (03) : 163 - 165
  • [2] A Review of Big Data Security and Privacy Protection Technology
    Lv, Denglong
    Zhu, Shibing
    Xu, Huazheng
    Liu, Ran
    [J]. 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 1082 - 1091
  • [3] Research on the Privacy Protection Technology of Blockchain Spatiotemporal Big Data
    Zhou, Bao
    Zhao, Junsan
    Yin, Ying
    Chen, Guoping
    [J]. IEEE ACCESS, 2024, 12 : 111187 - 111195
  • [4] The Key Technology Research on Privacy Protection Based on Big Data
    Li, Xueguo
    Shen, Yinglan
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT), 2016, 57 : 204 - 209
  • [5] Big Data Privacy Based On Differential Privacy a Hope for Big Data
    Shrivastva, Krishna Mohan Pd
    Rizvi, M. A.
    Singh, Shailendra
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 776 - 781
  • [6] Privacy and Big Data
    Gaff, Brian M.
    Sussman, Heather Egan
    Geetter, Jennifer
    [J]. COMPUTER, 2014, 47 (06) : 7 - 9
  • [7] Privacy and Big Data
    Magzoub, Abubakr
    [J]. INFORMATION SECURITY JOURNAL, 2012, 21 (06): : 353 - 354
  • [8] Big Data or Big (Privacy) Problem?
    Scotti, Veronica
    [J]. IEEE INSTRUMENTATION & MEASUREMENT MAGAZINE, 2017, 20 (05) : 23 - 26
  • [9] Based on the Technological Analysis of Big Data Security and Privacy Protection Technology
    Wang, Lei
    [J]. PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY (EMCS 2017), 2017, 61 : 603 - 606
  • [10] Differential privacy protection technology and its application in big data environment
    Fu, Yu
    Yu, Yihan
    Wu, Xiaoping
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (10): : 157 - 168