Introduction
Communication companies have access to an extraordinary amount of information on individual activities. These businesses used this data to gain additional revenue. Verizon one of the largest communication carriers with over 144.8 million customers, have a vast suppository of customer information. This data is aggregated and analyzed to create statical data on how people go about their daily activities.
Meta data have become the catalysts that help business grow and attain new customers based. This data is a valuable resource to an organization current and future endeavors. Verizon Corporation is one such company that has learned how to market this data to become one of the largest and most profitable companies in the 21st century. The personal data nor the amount captured by Verizon and other communication carriers are anonymous to consumers.
Meta data is attainable through a process called data-mining. Data mining is a “set of automated techniques used to extract buried or previously unknown pieces of information from large databases” (Cavoukian, 1998). The data is examined and renewed in a structure that companies used for business processes and customer behavior. Big-Data's goal is to connect individuals with data specifically designed for them. However, concerns over customer privacy and the legitimate use of meta data has drawn debate from lawmakers and advocacy groups.
In this paper I will give a brief history on Verizon’s corporation, their business goals and the reasoning for using metadata in their business model. Secondly, I will explain why the use of meta-data by business may not be good for customers. Thirdly, I will explain some possible alternatives that lawmakers...
... middle of paper ...
...ifecycle guide.
Shared Success | Verizon Corporate Responsibility. (n.d.). Retrieved March 2014, from
http://responsibility.verizon.com/shared-success
Verizon Communications Company Statistics | Statistic Brain. (2012, September). Retrieved March 2014, from http://www.statisticbrain.com/verizon-communications-company-statistics/
Vijayan, J. (2013, May). Bill would put mobile app vendors on the hook for privacy - Computerworld. Retrieved from http://www.computerworld.com/s/article/9239076/Bill_would_put_mobile_app_vendors_on_the_hook_for_privacy
Hanging indent for all references. To keep this format, simply place the cursor at the front of this line and paste or type your reference material. Then press enter. Remember to organize your references alphabetically. Remember to delete this line of text and any other template text before submitting your paper.
Verizon is predominantly a cellular service provider; however, they are involved in many more industries like search engines, news outlet, and emails with the acquisitions Yahoo and AOL. Thus, the supply chain Verizon utilizes involves many inputs were there are always many choices, because of the high rivalry and cost cutting demands from consumers. According to Verizon, “Verizon is a charter member of the Billion Dollar Roundtable, a coalition of corporations that spend more than $1 billion each year with diverse suppliers.” (www.verizon.com/about/our-company/supplier-diversity). The primary supplier for Verizon would be their phone providers, which include Apple, Google Android phones, Microsoft, Blackberry, etc. The
Imagine if nobody had a cellphone in today’s world. That’s why today everybody has some form of a cellphone contract with the four major companies (AT&T, Sprint, Verizon or T-Mobile) or a less know cellphone provider. AT&T and Verizon Wireless provide more than the other two major companies.
The personal connection Americans have with their phones, tablets, and computers; and the rising popularity of online shopping and social websites due to the massive influence the social media has on Americans, it is clear why this generation is called the Information Age, also known as Digital Age. With the Internet being a huge part of our lives, more and more personal data is being made available, because of our ever-increasing dependence and use of the Internet on our phones, tablets, and computers. Some corporations such as Google, Amazon, and Facebook; governments, and other third parties have been tracking our internet use and acquiring data in order to provide personalized services and advertisements for consumers. Many American such as Nicholas Carr who wrote the article “Tracking Is an Assault on Liberty, With Real Dangers,” Anil Dagar who wrote the article “Internet, Economy and Privacy,” and Grace Nasri who wrote the article “Why Consumers are Increasingly Willing to Trade Data for Personalization,” believe that the continuing loss of personal privacy may lead us as a society to devalue the concept of privacy and see privacy as outdated and unimportant. Privacy is dead and corporations, governments, and third parties murdered it for their personal gain not for the interest of the public as they claim. There are more disadvantages than advantages on letting corporations, governments, and third parties track and acquire data to personalized services and advertisements for us.
Many people in today’s society rely on technology to help us with our daily lives and help us stay connected to family, friends, and other people. The advancements in today’s cell phone technology is very complex and made to be efficient for their owners, allowing them to surf the net and IM message people instantly. Cellphones in particular have developed very fast in the past 15 years. From my childhood, cell phones have evolved from the old school Nokia bricks that allowed texts, calls, and simple graphic games, to todays I-Phones that have higher computable capabilities than some computers. In the United States alone, there is an estimated population of around 297 million people, and 197 million people are subscribed to cell phone companies (Starr). With so many people in today’s society with so much power and opportunity in the palm of their hands, we shouldn’t forget that “With great power comes great responsibility” –Voltaire.
Telecommunications gained mainstream attention in the early 90’s; however the initial key market was business men and women, who used their phones whilst being on the move and so allowing them to communicate with their companies with ease. Though in the modern era, telecommunication went through segmentation in the market trends, and now in this day and age it would be difficult to find someone who does not own some form of mobile technology. Many phone providers battle to provide the best service for their customers (Figure 1).
After understanding the possible outcomes and usages of Big Data Mining and Analytics, the study of the process is necessary to identify the real possibilities behind this techniques and how this can improve a business performance. To do this; we should comprehend the basics about data mining and the process that leads from pure data to insights.
Each day, billions of people worldwide depend on the security of digital systems. From medical history and test results at a hospital, to financial information and account statements at a bank, or social connections and personal messages on a smart phone, nearly every facet of a person’s life has some component of personal data associated with it that is stored on a computer. Furthermore, new forms of personal data to collect are being identified, gathered, analyzed, and stored all the time. This growth in the collection of personal data is so immense that the amount of digital data in existence approximately doubles every two years, and large companies are responsible for creating about 80% of this data increase (Gantz & Reinsel, 2011).
One common torment of companies is that they are not renowned. Consumer personal information, including email addresses and telephone numbers, is a panacea for the companies- it provides a way for them to promote themselves by sending junk email or making phone calls.... ... middle of paper ...
Employees are not the only people whose information interest companies. To a far greater extent, businesses are looking to gather data on their users and the market in general. User data collection has become one of the most important components of market research. For example, online retailers can use data collected from a consumer’s purchase to target advertising on products that the consumer is most likely to buy....
...e same time, the time has come to raise consciousness, support research and standard-setting, and prepare model codes for those systems that do employ privacy-enhancing technologies. The opportunities for individuals to customize privacy preferences, research should be conducted to evaluate alternative arrangements should be generated. On top of that, the digital applications should provide transparent criteria, including ease of understanding, adequacy of notification, compliance with standards, contractual fairness and enforceability, appropriate choice of defaults, efficiency relative to the potential benefits, and integration with other means of privacy protection. Particular attention should be paid to uniformity of protocols across different industries and applications, so that consumers are not overwhelmed by a pointless diversity of interfaces and contracts.
"Although fully searchable text could, in theory, be retrieved without much metadata in the future, it is hard to imagine how a complex or multimedia digital object that goes into storage of any kind could ever survive, let alone be discovered and used, if it were not accompanied by good metadata" (Abby Smith). Discuss Smith's assertion in the context of the contemporary information environment
Myhre, Julie. "Technology Is Invading Our Privacy." Direct Marketing News. N.p., 20 Sept. 2013. Web. 14 Apr. 2014.
For the past couple of decades the majority of businesses have wanted to construct a data-driven organization or company. Furthermore, companies around the world are considering harnessing data as a basis of competitive advantage over other companies. As a result, business intelligence and data science use are popular in many organizations today. The increase in adoption of these data systems is in response to the heavy rise in communications abilities the world over. Which, in turn ,has increased the need for data products. Indeed, the Data Scientist profession is emerging to be one of the better-paying professions due to the urgent need of their labor. This paper is going to discuss what business intelligence is all about and explain data science that is usually confused to be similar to business intelligence. I will tackle a brief overview of data scientists and their role in organizations.
In recent times we might consider that the right for privacy in one of our major achievements in our society. Unfortunately the same does not apply for the Internet. The Internet once considered a place for free information exchange and sharing, has the potential has becoming the biggest threat to its users. The commercialization of the Internet is one of the major reasons why the chances of a compromise of our privacy have increased. Customer profiling, address trading or simple lack of care with sensitive customer information are just some of the threats that this commercialization has bought to our ‘free’ Internet. Another reason being that with the increase of threats there is a regular change in technology to counter these threats. These changes make it harder for the already overstrained users to cope with the ever changing technology.
Privacy is the condition where someone personal information can not be documented and be used by others (Parent, 1983). Privacy has been and continues to be a significant issue of concern for both current and prospective electronic commerce customers. The foll...