processes, these Big Data are used in a limited way;
for example, as comparative data (Paripurna, Indriani
& Widiati, 2018). In terms of gathering, storing and
sharing biometric data, the recent study has shown
that there are indications of violations of personal
data and privacy (Paripurna, Indriani, & Widiati,
2018). The violations include the absence of a
mechanism for data retention, consent, processing,
notification, and disclosure (Paripurna, Indriani, &
Widiati, 2018).
An example of the use of Big Data in some
countries as described above has shown that law
enforcement may be a powerful weapon in predicting
and preventing crime. However, civilians should
remain critical and concerned about Big Data in terms
of how it is being used. With the easy accessibility of
Big Data, it is necessary to ask, if it is a threat to the
daily lives of the people. What limits should be
imposed on its use?
As previously discussed, with the amount of Big
Data, Big Data can offer public safety. Officials have
an obligation to protect the wider community.
Furthermore, when law enforcement agencies and the
private sector are working together, it can enable
companies, shareholders, customers, and the public to
prevent future crime, reduce costs and prosecute
criminals. Furthermore, collection and analysis of Big
Data are crucial to law enforcement, business and
government in order for them to be sustainable and
efficient in conducting their tasks. The use of Big
Data is beneficial in many respects, but not without
some merit. One of the weaknesses is the
vulnerability to violate the right of privacy.
Principally, any steps to collect, store, analyze, access
and share Big Data require certain principles to
guarantee protection of the right to privacy.
Therefore, the following section discusses certain
challenges in the utilization of Big Data under the
framework of the right to privacy.
2.2 How Big Data Works and
Challenges Privacy
In general, Big Data represents the information assets
characterized by its high volume, velocity and variety
to require specific technology and analytical methods
for its transformation into value (De Mauro, Greco, &
Grimaldi, 2016) In order to get advanced analytics of
Big Data, there are, at least, some elements to be
fulfilled, such as: data management, data mining,
software, in-memory analytics, predictive analytics,
and text mining (Institute, 2018). Data management
represents the capability of an organization or
authority to guarantee that the data are well-governed
before they can be reliably used, and this should also
apply in the maintenance process. Data mining will
help the organization to gather and examine large
amounts of data; furthermore, this collection data will
be analyzed to help answer some apparent patterns.
Software will be the main tool to process such data
and the issue of the storage process is then examined.
In memory analytics, technology has the capability to
remove data and undergo n analytical process for a
new scenario and also, it is able to make a new model;
this may influence the organization to make some
business or other decision.
Yet, predictive analytics technology uses data,
algorithms, and statistics and machine learning
techniques to identify future outcomes based on
historical data. This means that the technology
provides an assessment of what will happen in the
future, so the organization is quite confident in
business decision-making. Lastly, text mining is used
to analyze data from the web, books, or other text-
based sources to uncover insight that the organization
had not noticed before. Also, this technology uses a
social media platform, feed and an online survey to
help the organization to analyze more of large
amounts of information and find new topics and
discover their relationships.
What we know about Big Data as mentioned
above is that Big Data entails three elements: volume,
velocity and variety (Laney, 2001). Moreover, Big
Data is merely used to describe certain predictive
analytics or certain methods to gather the value of
data (Boyd & Crawford, 2011). In conclusion, the
data gathered, processed and analyzed originate from
any data including personal data. Therefore, in its
application, Big Data cannot be separated from
various issues related to personal data and
information as well as the right to privacy.
Big Data works with certain systems that collect
various user interaction data and sensor
infrastructures, not only generating large amounts of
data, but also containing individual information on a
person. also known as Personally Identifiable
Information (PII) (Aryani, 2017). Specifically, PII is
any data that can potentially distinguish one
individual from another, so they can be used to reveal
the data that should remain anonymous.
Privacy is firstly defined as a legal concept in
terms of the right to be left alone (Warren & Brandeis,
1890). It also has been part of a long debate and
became broader in interpretation as the right of a
person to choose seclusion from the attention of the
other, the right to be immune from being watched in
a private setting (Solove, 2008). In the context of Big
Data, privacy which remains in the private area might
Do We Have Privacy in the Big Data Era?
239