THE IMPACT OF BIG DATA ON INDIVIDUAL PRIVACY: LEGAL ANALYSIS AND PROTECTION POLICIES

Authors

  • Gunawan Widjaja Faculty of Law Universitas 17 Agustus 1946 Jakarta
  • Hotmaria Hertawaty Sijabat Doctoral Student Faculty of Law Universitas 17 Agustus 1945 Jakarta

Keywords:

Impact, Big Data, Individual Privacy, Legal Analysis, Protection Policy

Abstract

The development of big data technology has had a significant impact on various aspects of life, including individual privacy. This phenomenon allows for the collection, analysis, and dissemination of large amounts of data, which often involves personal information. This impact poses serious challenges in protecting individual privacy rights due to the unauthorised use of data which can lead to the misuse of information. This study explores the dynamics and implications of big data on individual privacy, including an analysis of existing policies and legal regulations. Several regulations such as the GDPR in the European Union, the CCPA in the United States, and the Personal Data Protection Act in Indonesia have become an important foundation for the protection of individual rights in the management of personal data. However, the effective implementation of regulations remains a major challenge given the rapid pace of technological development and data growth. Thus, this study emphasises that privacy protection in the big data era requires a holistic approach that includes strict regulation, the application of security technologies such as encryption and anonymisation, and public education about the importance of data privacy. Only with global collaboration and continuous efforts can people enjoy the benefits of big data while maintaining the privacy rights of each individual.

References

Acquisti, A., Gritzalis, S., & Lambrinoudakis, C. (2019). Digital Privacy: Theory, Technologies, and Practices. ACM Computing Surveys, 51(1), 1–36. https://doi.org/10.1145/3318094

Boote, D. N., & Beile, P. (2005). Scholars Before Researchers: On the Centrality of the Dissertation Literature Review in Research Preparation. Educational Researcher, 34(6), 3–15.

Carnwell, R., & Daly, W. (2001). Strategies for the Construction of a Critical Review of the Literature. Nurse Education in Practice, 1(2), 57–63.

Christl, W. (2017). Corporate Surveillance in Everyday Life. Cracked Labs Research Report. https://doi.org/10.5281/zenodo.3243058

Contissa, G., Lagioia, F., & Sartor, G. (2017). The Ethical Knob: Ethically Customizable Automated Vehicles and the Law. Artificial Intelligence and Law, 25(3), 365–378. https://doi.org/10.1007/s10506-017-9211-z

Dwork, C. (2006). Differential Privacy. IEEE Symposium on Security and Privacy, 1–12. https://doi.org/10.1109/SP.2006.36

Felten, E. W., & Schneider, M. A. (2000). Timing Attacks on Web Privacy. ACM Conference on Computer and Communications Security, 25–32. https://doi.org/10.1145/352600.352606

Friedman, B. (2019). Value-Sensitive Design: Shaping Technology with Moral Imagination. MIT Press. https://doi.org/10.7551/mitpress/12088.001.0001

Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private Traits and Attributes are Predictable from Digital Records of Human Behavior. PNAS, 110(15), 5802–5805. https://doi.org/10.1073/pnas.1218772110

Kukar, M., & Kononenko, I. (1998). Cost-Sensitive Learning with Neural Networks. IEEE Transactions on Neural Networks, 10(1), 155–166. https://doi.org/10.1109/72.737491

Lepri, B., & Staiano, J. (2017). The Tyranny of Data? The Bright and Dark Sides of Data-Driven Decision-Making for Social Good. ACM Transactions on Management Information Systems, 8(4), 1–20. https://doi.org/10.1145/3093239

Lyon, D. (2007). Surveillance Studies: An Overview. Polity. https://doi.org/10.1111/j.1540-5931.2008.00382.x

Mayer-Schönberger, V. (2009). Delete: The Virtue of Forgetting in the Digital Age. Princeton University Press.

Narayanan, A., & Shmatikov, V. (2008). Robust De-anonymization of Large Sparse Datasets. IEEE Symposium on Security and Privacy, 111–125. https://doi.org/10.1109/SP.2008.33

Nissenbaum, H. (2004). Privacy as Contextual Integrity. Washington Law Review, 79, 119. https://doi.org/10.2307/1602638

Rost, M., & Bock, K. (2011). Privacy by Design and the New Protection Goals. DuD - Datenschutz Und Datensicherheit, 35(2), 68–72. https://doi.org/10.1007/s11623-011-0123-0

Solove, D. J. (2008). Understanding Privacy. Harvard University Press.

Spiekermann, S., & Korunovska, J. (2017). Towards a Value Theory for Personal Data. Journal of Information Technology, 32(1), 62–84. https://doi.org/10.1057/s41265-017-0047-7

Sweeney, L. (2002). k-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5), 557–570. https://doi.org/10.1142/S0218488502001648

Tene, O., & Polonetsky, J. (2012). Privacy in the Age of Big Data: A Time for Big Decisions. Stanford Law Review Online, 64, 63. https://doi.org/10.2139/ssrn.2163735

World Economic Forum. (2011). Personal Data: The Emergence of a New Asset Class.

Zarsky, T. Z. (2017). Incompatible: The GDPR in the Age of Big Data. Seton Hall Law Review, 47(4), 995–1020.

Ziccardi, G. (2018). Data Protection and Compliance in Context of Big Data: The General Data Protection Regulation’s Principles. IEEE Transactions on Big Data, 4(1), 55–63. https://doi.org/10.1109/TBDATA.2018.2809941

Zuboff, S. (2015). Big Other: Surveillance Capitalism and the Prospects of an Information Civilization. Journal of Information Technology, 30(1), 75–89. https://doi.org/10.1057/jit.2015.5

Downloads

Published

2025-03-22

Issue

Section

Articles