Framework for handling personal data: analysis of buying information by questionnaire

With the development of the latest telecommunication technologies and their pervading applications, the harvesting of personal information that we call 'big data' has recently exploded and is being dispersed throughout society. While companies make use of these data for marketing purposes and governments also discuss their application to social systems, individuals not only find them difficult to access, but also do not have any means of benefiting from their own data, even though they generate the data themselves. In this paper, we propose a framework that enables individuals to use their personal data and to receive a proper reward from companies that have access to it. In particular, we focus on buying information ands how the results of a questionnaire survey on handling buying information that was conducted to investigate the resistance that users feel to allowing companies to use the data to obtain more rewards within this framework.

[1]  Chin-Jui Chang,et al.  Retracted: Ergonomic Techniques for a Mobile E-Invoice System: Operational Requirements of an Information Management System , 2013 .

[2]  Kiyoharu Aizawa,et al.  Capture and Efficient Retrieval of Life Log , 2004 .

[3]  Jennie Duggan The Case for Personal Data-Driven Decision Making , 2014, Proc. VLDB Endow..

[4]  Ig-Jae Kim,et al.  Automatic Lifelog media annotation based on heterogeneous sensor fusion , 2008, 2008 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems.

[5]  Steve Mann,et al.  'WearCam' (The wearable camera): personal imaging systems for long-term use in wearable tetherless computer-mediated reality and personal photo/videographic memory prosthesis , 1998, Digest of Papers. Second International Symposium on Wearable Computers (Cat. No.98EX215).

[6]  Dongsong Zhang,et al.  Mobile personal information management agent: Supporting natural language interface and application integration , 2012, Inf. Process. Manag..

[7]  Mudhakar Srivatsa,et al.  Fine-grained access control of personal data , 2012, SACMAT '12.

[8]  Elena Mugellini,et al.  Personal information management based on semantic technologies , 2013, J. Ambient Intell. Humaniz. Comput..

[9]  Alex Pentland,et al.  On the Trusted Use of Large-Scale Personal Data , 2012, IEEE Data Eng. Bull..

[10]  Nadezhda Purtova,et al.  Property rights in personal data: Learning from the American discourse , 2009, Comput. Law Secur. Rev..