Article ID: CBB326485886

Caveat Emptor: The Risks of Using Big Data for Human Development (September 2019)

unapi

"Big Data" has the potential to facilitate sustainable development in many sectors of life such as education, health, agriculture, and in combating humanitarian crises and violent conflicts. However, lurking beneath the immense promises of Big Data are some significant risks such as 1) the potential use of Big Data for unethical ends; 2) its ability to mislead through reliance on unrepresentative and biased data; and 3) the various privacy and security challenges associated with data (including the danger of an adversary tampering with the data to harm people). These risks can have severe consequences and a better understanding of these risks is the first step towards their mitigation of these risks. In this article, we highlight the potential dangers associated with using Big Data, particularly for human development. [Peer reviewed]

...More
Citation URI
https://data.isiscb.org/isis/citation/CBB326485886/

Similar Citations

Article Alexander Trauth-Goik; (December 2019)
"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System (/isis/citation/CBB323886145/)

Article Jeremy Pitt; Agnieszka Rychwalska; Magdalena Roszczynska-Kurasinska; Andrzej Nowak; (March 2019)
Democratizing Platforms for Social Coordination (/isis/citation/CBB485378597/)

Article Ons Al-Shamaileh; (June 2018)
I Have Issues with Facebook: But I Will Keep Using It (/isis/citation/CBB503279988/)

Article Roesner, Franziska; (Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering (/isis/citation/CBB605988846/)

Book Duane C. Wilson; (2021)
Cybersecurity (/isis/citation/CBB201310866/)

Article Kasperson, Roger E.; (Fall 2012)
A Perspective on the Social Amplifications of Risk (/isis/citation/CBB771024272/)

Article Peter M. Asaro; (June 2019)
AI Ethics in Predictive Policing: From Models of Threat to an Ethics of Care (/isis/citation/CBB655687648/)

Article Fang, Xiang; (2014)
Local People's Understanding of Risk from Civil Nuclear Power in the Chinese Context (/isis/citation/CBB001420063/)

Thesis Williams, Lambert; (2012)
Modeling, Building, Writing: A History of Nonlinear Dynamics and Complex Systems (/isis/citation/CBB001561027/)

Article Sugiman, Toshio; (2014)
Lessons Learned from the 2011 Debacle of the Fukushima Nuclear Power Plant (/isis/citation/CBB001420061/)

Article Watts, Duncan J.; (Winter 2013)
Computational Social Science: Exciting Progress and Future Directions (/isis/citation/CBB953214411/)

Article Moa Carlsson; (April 2022)
Computing views, remodeling environments (/isis/citation/CBB726932342/)

Book Ashley Sweetman; (2022)
Cyber and the City: Securing London’s Banks in the Computer Age (/isis/citation/CBB340774234/)

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB758382142/)

Book James B. McSwain; (2018)
Petroleum and Public Safety: Risk Management in the Gulf South, 1901-2015 (/isis/citation/CBB127804806/)

Book Colin Koopman; (2019)
How We Became Our Data: A Genealogy of the Informational Person (/isis/citation/CBB981384434/)

Article Linda F Hogle; (August 2019)
Accounting for accountable care: Value-based population health management (/isis/citation/CBB281463388/)

Article Yoshiyasu Takefuji; (March 2018)
Connected Vehicle Security Vulnerabilities (/isis/citation/CBB280716653/)

Authors & Contributors
Ashley Sweetman
Kasperson, Roger E.
Alexander Trauth-Goik
Agnieszka Rychwalska
Roesner, Franziska
McSwain, James B.
Journals
IEEE Technology and Society Magazine
The Bridge: Journal of the National Academy of Engineering
Social Studies of Science
Public Understanding of Science
Science, Technology and Human Values
Centaurus: International Magazine of the History of Mathematics, Science, and Technology
Publishers
Springer Nature
University of Chicago Press
MIT Press
Louisiana State University Press
Cornell University Press
Harvard University
Concepts
Privacy
Computers and computing
Computer security; cyber security
Technology and government
Information technology
Social sciences
Time Periods
21st century
20th century, late
20th century
Places
United States
China
Great Britain
Middle and Near East
Gulf of Mexico
Southern states (U.S.)
Institutions
Facebook (firm)
Accountable Care Organizations (Medical care)
Santa Fe Institute
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment