Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-wg55d Total loading time: 0 Render date: 2024-06-12T11:36:06.602Z Has data issue: false hasContentIssue false

9 - The New Deal on Data: A Framework for Institutional Controls

Published online by Cambridge University Press:  05 July 2014

Daniel Greenwood
Affiliation:
Massachusetts Institute of Technology
Arkadiusz Stopczynski
Affiliation:
Technical University of Denmark
Brian Sweatt
Affiliation:
Massachusetts Institute of Technology
Thomas Hardjono
Affiliation:
MIT Kerberos & Internet Trust Consortium
Alex Pentland
Affiliation:
Massachusetts Institute of Technology
Julia Lane
Affiliation:
American Institutes for Research, Washington DC
Victoria Stodden
Affiliation:
Columbia University, New York
Stefan Bender
Affiliation:
Institute for Employment Research of the German Federal Employment Agency
Helen Nissenbaum
Affiliation:
New York University
Get access

Summary

Introduction

In order to realize the promise of a Big Data society and to reduce the potential risk to individuals, institutions are updating the operational frameworks which govern the business, legal, and technical dimensions of their internal organizations. In this chapter we outline ways to support the emergence of such a society within the framework of the New Deal on Data, and describe future directions for research and development.

In our view, the traditional control points relied on as part of corporate governance, management oversight, legal compliance, and enterprise architecture must evolve and expand to match operational frameworks for big data. These controls must support and reflect greater user control over personal data, as well as large-scale interoperability for data sharing between and among institutions. The core capabilities of these controls should include responsive rule-based systems governance and fine-grained authorizations for distributed rights management.

The New Realities of Living in a Big Data Society

Building an infrastructure that sustains a healthy, safe, and efficient society is, in part, a scientific and engineering challenge which dates back to the 1800s when the Industrial Revolution spurred rapid urban growth. That growth created new social and environmental problems. The remedy then was to build centralized networks that delivered clean water and safe food, enabled commerce, removed waste, provided energy, facilitated transportation, and offered access to centralized health care, police, and educational services. These networks formed the backbone of society as we know it today.

Type
Chapter
Information
Privacy, Big Data, and the Public Good
Frameworks for Engagement
, pp. 192 - 210
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Lazer, David, Pentland, Alex Sandy, Adamic, Lada, Aral, Sinan, Barabasi, Albert Laszlo, Brewer, Devon, Christakis, Nicholas, Contractor, Noshir, Fowler, James, and Gutmann, Myron, “Life in the Network: The Coming Age of Computational Social Science,” Science 323 (2009): 721–723CrossRefGoogle Scholar
Aral, Sinan and Walker, Dylan, “Identifying Influential And Susceptible Members Of Social Networks,” Science 337 (2012): 337–341CrossRefGoogle ScholarPubMed
Mislove, Alan, Lehmann, Sune, Ahn, Yong-Yeol, Onnela, Jukka-Pekka, and Rosenquist, J. Niels, Pulse of the Nation: U.S. Mood throughout the Day Inferred from Twitter (website), (accessed November 22, 2013)
Vitak, Jessica, Zube, Paul, Smock, Andrew, Carr, Caleb T., Ellison, Nicole, and Lampe, Cliff, “It’s Complicated: Facebook Users’ Political Participation in the 2008 Election,” Cyberpsychology, Behavior, and Social Networking 14 (2011): 107–114CrossRefGoogle ScholarPubMed
Madrigal, Alexis, “Dark Social: We Have the Whole History of the Web Wrong,” The Atlantic, October 12, 2013
Eagle, Nathan and Pentland, Alex, “Reality Mining: Sensing Complex Social Systems,” Personal and Ubiquitous Computing 10 (2006): 255–268CrossRefGoogle Scholar
Pentland, Alex, “Reality Mining of Mobile Communications: Toward a New Deal on Data,” The Global Information Technology Report 2008–2009 (Geneva: World Economic Forum, 2009), 75–80Google Scholar
Pentland, Alex, Lazer, David, Brewer, Devon, and Heibeck, Tracy, “Using Reality Mining to Improve Public Health and Medicine,” Studies in Health Technology and Informatics 149 (2009): 93–102Google Scholar
Singh, Vivek K., Freeman, Laura, Lepri, Bruno, and Pentland, Alex Sandy, “Classifying Spending Behavior using Socio-Mobile Data,” HUMAN 2 (2013): 99–111Google Scholar
Greene, Kate, “Reality Mining,” MIT Technology Review, March/April 2008
Kuneva, Meglena, European Consumer Commissioner, “Keynote Speech,” in Roundtable on Online Data Collection, Targeting and Profiling, March 31, 2009
Gittleson, Kim, “How Big Data Is Changing The Cost Of Insurance,” BBC News, November 14, 2013
Pan, Wei, Ghoshal, Gourab, Krumme, Coco, Cebrian, Manuel, and Pentland, Alex, “Urban Characteristics Attributable to Density-Driven Tie Formation,” Nature Communications 4 (2013): article 1961CrossRefGoogle ScholarPubMed
Grossman, Lev, “Iran Protests: Twitter, the Medium of the Movement,” Time Magazine, June 17, 2009
Barry, Ellen, “Protests in Moldova Explode, with Help of Twitter,” The New York Times, April 8, 2009
“Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data,” Official Journal L281 (November 23, 1995): 31–50
de Montjoye, Yves-Alexandre, Wang, Samuel S., Pentland, Alex, “On the Trusted Use of Large-Scale Personal Data,” IEEE Data Engineering Bulletin 35, no. 4 (2012): 5–8Google Scholar
Song, Chaoming, Qu, Zehui, Blumm, Nicholas, and Barabasi, Albert-Laszlo, “Limits of Predictability in Human Mobility,” Science 327 (2010): 1018–1021CrossRefGoogle ScholarPubMed
Bilton, Nick, “Girls around Me: An App Takes Creepy to a New Level,” The New York Times, Bits (blog), March 30, 2012
DeMeo, Ralph A. and Doar, Sarah Meyer, “Restrictive Covenants as Institutional Controls for Remediated Sites: Worth the Effort?The Florida Bar Journal 85, no. 2 (February 2011)Google Scholar
Hardjono, Thomas, Greenwood, Daniel, and Pentland, Alex, “Towards a Trustworthy Digital Infrastructure for Core Identities and Personal Data Stores,” in Proc. ID360 Conference on Identity, 2013

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×