THE IMPACT OF BIG DATA ON INDIVIDUAL PRIVACY: LEGAL ANALYSIS AND PROTECTION POLICIES
Keywords:
Impact, Big Data, Individual Privacy, Legal Analysis, Protection PolicyAbstract
The development of big data technology has had a significant impact on various aspects of life, including individual privacy. This phenomenon allows for the collection, analysis, and dissemination of large amounts of data, which often involves personal information. This impact poses serious challenges in protecting individual privacy rights due to the unauthorised use of data which can lead to the misuse of information. This study explores the dynamics and implications of big data on individual privacy, including an analysis of existing policies and legal regulations. Several regulations such as the GDPR in the European Union, the CCPA in the United States, and the Personal Data Protection Act in Indonesia have become an important foundation for the protection of individual rights in the management of personal data. However, the effective implementation of regulations remains a major challenge given the rapid pace of technological development and data growth. Thus, this study emphasises that privacy protection in the big data era requires a holistic approach that includes strict regulation, the application of security technologies such as encryption and anonymisation, and public education about the importance of data privacy. Only with global collaboration and continuous efforts can people enjoy the benefits of big data while maintaining the privacy rights of each individual.
References
Acquisti, A., Gritzalis, S., & Lambrinoudakis, C. (2019). Digital Privacy: Theory, Technologies, and Practices. ACM Computing Surveys, 51(1), 1–36. https://doi.org/10.1145/3318094
Boote, D. N., & Beile, P. (2005). Scholars Before Researchers: On the Centrality of the Dissertation Literature Review in Research Preparation. Educational Researcher, 34(6), 3–15.
Carnwell, R., & Daly, W. (2001). Strategies for the Construction of a Critical Review of the Literature. Nurse Education in Practice, 1(2), 57–63.
Christl, W. (2017). Corporate Surveillance in Everyday Life. Cracked Labs Research Report. https://doi.org/10.5281/zenodo.3243058
Contissa, G., Lagioia, F., & Sartor, G. (2017). The Ethical Knob: Ethically Customizable Automated Vehicles and the Law. Artificial Intelligence and Law, 25(3), 365–378. https://doi.org/10.1007/s10506-017-9211-z
Dwork, C. (2006). Differential Privacy. IEEE Symposium on Security and Privacy, 1–12. https://doi.org/10.1109/SP.2006.36
Felten, E. W., & Schneider, M. A. (2000). Timing Attacks on Web Privacy. ACM Conference on Computer and Communications Security, 25–32. https://doi.org/10.1145/352600.352606
Friedman, B. (2019). Value-Sensitive Design: Shaping Technology with Moral Imagination. MIT Press. https://doi.org/10.7551/mitpress/12088.001.0001
Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private Traits and Attributes are Predictable from Digital Records of Human Behavior. PNAS, 110(15), 5802–5805. https://doi.org/10.1073/pnas.1218772110
Kukar, M., & Kononenko, I. (1998). Cost-Sensitive Learning with Neural Networks. IEEE Transactions on Neural Networks, 10(1), 155–166. https://doi.org/10.1109/72.737491
Lepri, B., & Staiano, J. (2017). The Tyranny of Data? The Bright and Dark Sides of Data-Driven Decision-Making for Social Good. ACM Transactions on Management Information Systems, 8(4), 1–20. https://doi.org/10.1145/3093239
Lyon, D. (2007). Surveillance Studies: An Overview. Polity. https://doi.org/10.1111/j.1540-5931.2008.00382.x
Mayer-Schönberger, V. (2009). Delete: The Virtue of Forgetting in the Digital Age. Princeton University Press.
Narayanan, A., & Shmatikov, V. (2008). Robust De-anonymization of Large Sparse Datasets. IEEE Symposium on Security and Privacy, 111–125. https://doi.org/10.1109/SP.2008.33
Nissenbaum, H. (2004). Privacy as Contextual Integrity. Washington Law Review, 79, 119. https://doi.org/10.2307/1602638
Rost, M., & Bock, K. (2011). Privacy by Design and the New Protection Goals. DuD - Datenschutz Und Datensicherheit, 35(2), 68–72. https://doi.org/10.1007/s11623-011-0123-0
Solove, D. J. (2008). Understanding Privacy. Harvard University Press.
Spiekermann, S., & Korunovska, J. (2017). Towards a Value Theory for Personal Data. Journal of Information Technology, 32(1), 62–84. https://doi.org/10.1057/s41265-017-0047-7
Sweeney, L. (2002). k-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557–570. https://doi.org/10.1142/S0218488502001648
Tene, O., & Polonetsky, J. (2012). Privacy in the Age of Big Data: A Time for Big Decisions. Stanford Law Review Online, 64, 63. https://doi.org/10.2139/ssrn.2163735
World Economic Forum. (2011). Personal Data: The Emergence of a New Asset Class.
Zarsky, T. Z. (2017). Incompatible: The GDPR in the Age of Big Data. Seton Hall Law Review, 47(4), 995–1020.
Ziccardi, G. (2018). Data Protection and Compliance in Context of Big Data: The General Data Protection Regulation’s Principles. IEEE Transactions on Big Data, 4(1), 55–63. https://doi.org/10.1109/TBDATA.2018.2809941
Zuboff, S. (2015). Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology, 30(1), 75–89. https://doi.org/10.1057/jit.2015.5
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Jurnal Komunikasi

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.