Skip to main content

Rule Utilitarianism. Big data

The Utilitarianism theory defines what is write and what is wrong by assessing outcomes. No matter what bad consequences take place, the most ethical choice is always the one that has the greatest good.

Big data falls under this theory just fine. While it's hard to give any precise guidelines, the example can be considered in the abstract.
On the one hand it brings us economy boost by providing more specific information, on another hand it affects on the privacy of consumers.

Examples of The Good


  • Big data cuts business costs
  • Help government to track citizens and prevent unwanted events
  • Using big data improves company's pricing policy
  • Allow competition with bigger companies
  • Suggests to user more interest-related content 

Examples of The Bad


  • Ruins people's privacy
  • Add an advantage to those who have been shown as a more trustable person by doing nothing personal online
  • Uses tons of computational resources and not necessarily provides correct results


Here, the pros totally make up for cons and it's safe to say that big data makes world better place (according to the theory). However, we all miss times when we had old school internet and nobody even thought to add his real name to his profile. Still, it remains to be up to a person. If one is afraid of being "watched" all the time or he simply doesn't want to, there are bunches of software to make yourself anonymous but in this case he will face all sorts of issues and inconveniences which makes it ethically controversy.

Comments

Popular posts from this blog

The Hacker Culture In The Modern World The community of computer specialists has been changing the world since the creation of first computational device. The way development goes depends not only on technical skills of hackers, their ideals and views also take essential part of progress. There were several generations of hackers and each of them promoted different ideas. The hacker ethic of early days focused specifically on their interests and there were no such needs as communicative skills. The main ideology was "all information should be free" and I strongly disagree with this statement. Non-profit everything stops the progress and leaves no motivation to support "boring" software. In 90's next generation of the culture has started acknowledging a demand for well-supported communication in hackers groups. It led to more healthy relationships and lifestyle within the culture. Eric S. Raymond put attention to necessity of skills which set development as...
The Review of Paper "Computer vision in Security" Author: Fothul Karim Forhan The paper is the overview on a technology that helps us recognize different patterns and proceed it in a specific format. The focus is set on security field where CV helps to prevent attacks and massive resource looses. The introduction covers a bit of history as well as points to goals of the research. The main part is divided into: Types of CV technologies applied in security matters, security matters that require CV and other safety matters. For me the most fascinating part is CV in financial field. In the given example cv could identify fraudsters by emotional state, the way a fraudster behaves. After the thief is identified, the alarm is enabled automatically and the transaction is terminated. This is a direct example of how cv saves a companies' money. The only thing that missing is lack of illustrations. It'd be great to see face-recognition algorithms visualization. Overall...