/home/leansigm/public_html/components/com_easyblog/services

SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

reCaptcha V3: Boon or Curse?

Google’s internet bot detector has evolved over the years from Captcha to reCaptcha to reCaptcha V3. Now, no more boxes need to be checked, nor is identifying objects or alphabets required. Studying the way an individual navigates through a website, conclusions can be drawn on it being a bot or not. This improvement however comes in at the cost of the user’s privacy. According to a researcher, Google uses cookies to identify whether a user is a bot or not; the same cookies which enable us to open new tabs and open accounts without the need of logging in everytime. Another researcher however states that a browser connected with a Google account is more secure than the one which isn’t. Hence, although security is gained, more of the user’s data is also going into the hands of Google. Read more at: https://www.fastcompany.com/90369697/googles-new-recaptcha-has-a-dark-side

Rate this blog entry:
2766 Hits
0 Comments

Protection of information : A Study

Back in the 20's, technology used to be simple. Core functions of the system were not affected by the records management. Every organization has started getting connected to the internet in order to make the lives easier of their workers as well customers. Everyone wants to get access to basic information over the internet as it is an opportunity to learn more about everything which relates to good or bad performance. Even from the customer's side, access to internet helps business with floods of data which leads them to focused marketing. Such information is also spread to the hackers. Hackers then use such individual information to get through government entities or set up robbery attacks. As keepers of the information, companies should hence protect the data and make sure trust is not violated. The exposed information is generally customer information. Determined hackers cannot be stopped from entering into the system. Identities are stolen and more valuable information is lost other than just credit card numbers. Data should be protected by the organization as if it was their own personal information. Apps are a disaster these days as they are gateways to information which directly reach the hackers since consumers unknowingly take such things for granted and provide all their details. Security and privacy experts should be hired and organizations should be very careful with customer information. Read more at: http://www.cmswire.com/information-management/protect-information-as-if-it-was-your-own/?pageNum=2

 

 

Rate this blog entry:
3927 Hits
0 Comments

Big Data and privacy concerns

In the era of Big Data, the fight for protection has as of now been battled and lost. The personal data is routinely gathered and exchanged and there are few powerful controls over how it is utilized or secured. Data scientists and analysts are now saying that now is the right time for enactment to recover some of that protection and guarantee that any information that is gathered remains secure.

We have become the product and are being productised and sold to anyone. We’re being monetised and mobilized as products with inducement of the services of we use such as Facebook and Twitter. The dilemma that the regulators are facing is how they can regulate the collection, storage and trading of personal data on the on the internet, when all of these activities, and the corporations themselves, operate across multiple continents and jurisdictions.

The task of reclaiming some semblance of privacy is all the more urgent because the rate at which personal data is being collected is accelerating. The buzz around big data is attracting millions of dollars of from investors and brands hoping to turn a profit, while intelligence agencies are also furiously collecting information about our online activities for much different purposes.

And alongside these, there’s also the black market operators that make millions of dollars a year out of things like identity theft and matching disparate data sets across the web to help identify people who might be suitable targets for a scam. 

New privacy principles were recently passed into law which required all businesses earning more than $3m annually to disclose to customers how their information was being stored and used, however the new legislation stopped short of mandating compulsory data breach notifications for businesses who fall victim to security violations.

A bill that would make it illegal to hide security problems was set to pass into law last year, however it failed to make it through both houses of the Senate before the election. And since the Coalition took power, the legislation has stalled. 

Still, there are many privacy challenges ahead, and the problems have by no means been solved. Most methods of anonymizing do not scale well as p or n get large. Either they add so much noise that new analyses become nearly impossible or they weaken the privacy guarantee. Network-like data pose a special challenge for privacy because so much of the information has to do with relationships between individuals. In summary, there appears to be “no free lunch” in the trade-off between privacy and information. To read more: http://www.theguardian.com/technology/2014/jun/20/little-privacy-in-the-age-of-big-data

Rate this blog entry:
5532 Hits
0 Comments

Personalization Driven by Data

One of the most promising trends in IT is the use of data to deliver to individuals- the decade old promise of personalization, which includes delivering the individuals the exact product and services as and when they need them. Nowadays we have a rapidly growing number of choices. Companies and other providers can help us sort these choices by analyzing data on our personal tastes and circumstances combined with analysis of mass data. Personalization increases the prospect of customer loyalty. The time lag between product innovation and commoditization has become shorter.  It establishes a more personal and binding relationship with customers. There are of course dangers. Companies and other data manipulators can use information to harm and some of the information they are gathering is highly private. Although individuals are concerned about their privacy, they are willing to share the most intimate data, if they think that doing so will improve their lives. Many problems need to be sorted out before data driven personalization becomes the norm, but the long term impact of this trend will be better products and services for individuals. Read more at:

http://www.informationweek.in/informationweek/news-analysis/297140/-driven-personalization

Rate this blog entry:
4305 Hits
0 Comments

How to deal privacy and legal issues with Big Data?

It is of no doubt that Big Data is transforming businesses greatly. But, this advantage is compromising a big issue. Have you guessed it?

Well, as Big Data is growing day by day, privacy and legal concerns have cropped in. So, does that mean you will stop using Big Data? If you do, you will surely fall behind your competitors because this data is now a resource which any marketers can use to gain competitive advantage.

While handling Big Data, the fundamental thing you have to keep in mind is data anonymity that will help you to avoid and tackle privacy and legal problems with Big Data.

To manage risks associated with it, you can follow the guidelines from the Information Commissioner’s Office (ICO) which includes a Code of Practice on Anonymisation. Kim Walker, partner at law firm Thomas Eggar LLP, talks about them here: http://www.computerweekly.com/opinion/Big-data-big-legal-trouble .

Rate this blog entry:
6115 Hits
0 Comments

Increasing business risk of cloud cyber-attacks

An article by E-Commerce Times columnist, Peter S. Vogel, says that it is hard to detect which is growing at a faster pace - cloud or cybercrime. Cloud may be anywhere in the world which creates interesting and complex legal questions regarding privacy of data stored in the cloud. Nevertheless, more businesses are migrating to the cloud to host data, often without regard to the legal consequences.  Many companies are migrating to the cloud to reduce their IT costs but are creating new malware-based and cyber-crime risks to their businesses. If cybercrime and cloud-focused malware continue to grow along with the cloud, the predicted growth of cloud migration may not be realized.

 

To know more follow http://www.technewsworld.com/story/80107.html

Rate this blog entry:
7134 Hits
0 Comments
Sign up for our newsletter

Follow us