Josh Schmoldt The Data Mining Experts. My project is an investigation of data mining and Google. Hal Niedzviecki’s book “The Peep Diaries: How We’re Learning.

Slides:



Advertisements
Similar presentations
( · ). Unit 3 Welcome to the unit A world of connections.
Advertisements

CSC 101 Fall 2012 Felicia Furino December 13, 2012.
Data Mining and Text Analytics Advertising Laura Quinn.
“How Can Research Help Me?” Please make SURE your notes are similar to what I have written in mine.
StormingForce.com Motion. StormingForce.com StormingForce’s technology is significantly increasing productivity and quality of manual repetitive tasks.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Back to Table of Contents
By: Peyton Perkins & Sabrina Jefferson Pd.5 February 7 th 2012.
What kind of media institution might distribute your media product and why? Who would I pick? Click an image to find out more information Click here.
Chapter 7 The Search Economy. Google ’ s Algorithm Updates Google periodically updates its search algorithms, resulting in different websites returning.
Dell Rob Rochester. Dell Dell is the industry leader in direct sale of personal computers to consumers. Since its start Dell has looked to over simplify.
17 April Using Technology. Where Can You Use Technology? Product Sales Marketing Operations Finances Salaries Inventory Logistics Analysis Market Customer.
What are cookies? Cookies are text files stored on one’s computer after visiting a website Used for: -Storing information such as a unique visitor ID -Allowing.
How do Students Choose Which Websites to Utilize when Conducting an Internet Search? Jennifer Newman.
World Wide Web As the World Wide Web increased in popularity, it was difficult to keep track of all web addresses. Search engines were created to minimize.
Amount of daily searches on Google 150 million searches per day from 100 different countries 150 million searches per day from 100 different countries.
WHO WE ARE ●Website Development & Design ●Web Marketing Strategy, Training, and Analysis ●Web Applications, iOS apps, Android apps.
New Mexico State University Finding Useful Information The Internet can be Good and Defrag can be Worthless The League of Extraordinary Off-Campus Computer.
Click to change slide. Did you ever want to do something unique or different? Why not invent something? First of all, you should know that there is a.
Search Engine Optimization Andrew Steward Matthew Golling.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Thinking the unthinkable: a library without a catalogue Reconsidering the future of our discovery tools.
How It Applies In A Virtual World
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
Evaluating Web Sites The Internet is a great place to find information. But, has anyone ever told you not to believe everything you read? Web Sites are.
1. An Idea “In order to create wealth, you must be the first with an idea. Then, you must be first to tell the world about that idea” Warren Buffett “…probably.
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topic: Running a business online Name:
Reliability & Desirability of Data
Computer Ethics.
Computer Importance in Children Hundreds of schools in America are still not capable of supplying computer access to students. Was ZapMe a solution?
1 Direct Manipulation Proposal 17 Direct Manipulation is when physical actions are used instead of commands. E.g. In a word document when the user inputs.
 Much of the information needed by an organisation comes from within the organisation, and the organisation’s IT systems can be used to extract this.
Click Fraud Forensics Dean Qudah Pace University DPS 2010.
Day 2 – Marketing Research…
Criticism Of Google By: Kyle Singler. Privacy Policies One of the main concerns regarding online search is that an individual’s information is kept private.
Case Study Analysis Owen Hendershot, UMFK,  Introduction  Company Overview  History  Strategy  Issues  Customer Decisions  Attempted Solutions.
P ERSUASIVE WRITING Advertising. W HAT IS ADVERTISING ? Advertising is a tool used to get people to want to buy something. The main reason ads are created.
Audacity Audacity web address:
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Closing The Sale (When it seems hopeless) Chris Thornton Thornsoft Development, Inc.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By Elijah Redding CIS 150. A New Kind of Ad: Customized to Your Interests With the internet being one of the top choices for advertising, marketers are.
Adult Entertainment on the Internet By: Jason Jones MIS MWF-1:00pm.
Incorporation of Technology into the Classroom By: Jenna Snyder.
Regulation & Deregulation Government can make sure that one company does not dominate the market. How? Through antitrust laws starting with the 1890 Sherman.
Evaluating Websites: A Paul Cuffee Guide A URL is a Uniform Resource Locator, or the ADDRESS or the website. Each file on the Internet has a unique address.
Facebook Ad’s Reloaded Keep it Organized. To use Facebook Ad’s effectively in today’s market you must have Funnel Over the last week we have covered the.
Internet Privacy: What’s Yours and What Never Was 14 April 2011 Ms. Foster and Ms. McCabe Street Law.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Network technology: privacy implications Keunwoo Lee 590T (Society and Technology seminar) 8 May 2006.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
Juan Ortega 8/20/09 NTS300. Right now IPv4 dominates the Internet with some experts believing the need for IPv6 isn’t necessary because of NAT. But even.
 On a piece of paper, write down the three themes that we discussed in Of Mice and Men.  For each theme, write down one example from the novel.  You.
Chapter 8: Search, Privacy, Government, and Evil By: Marissa Gittelman Tuesday, March CPS 49:Google, the Computer Science within and its Impact.
Online Advertising You’ve seen millions of these! But you need to know some of the reasons why companies use them And some basic details of how.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
RESEARCH METHODS Josh Harris. TYPES OF RESEARCH QUALITATIVE RESEARCH Qualitative Research is research which is used to express people’s opinions and.
Benixion Technology Benixion Technology Design Company.E-commerce Development Company.Best SEO Service Provider.Responsive Website.
Identify and Meet a Market Need
FREE TRAFFIC STRATEGIES
FUSIONTOMO Presentation
Latest Updates on BlackHawk Mines Music : Privacy Policy
Web Mining Ref:
AOHT Hospitality Marketing
How to fix AOL related issue AOL is a type of digital media company that has developed and maintained many online services including service, search.
Unit 27 Web Server Scripting Extended Diploma in ICT
Spyware. By: Katheryn L. Gaston.
Privacy and Data Mining
My digital footprint By Ava Brouillette.
Presentation transcript:

Josh Schmoldt The Data Mining Experts

My project is an investigation of data mining and Google. Hal Niedzviecki’s book “The Peep Diaries: How We’re Learning to Love Watching Ourselves and Our Neighbors” is my main inspiration behind this project. His thinking that the information we share can and will be used against us in the future seemed like an interesting topic to research.

 The definition of data mining is the process of extracting patterns from data.  Data mining is seen in the internet by what you search and participate on the worldwide web.  All of this information is collected by the websites and if this information falls into the wrong hands some major problems might appear. 

From there I started looking into data mining and its history. Surprisingly the idea of “data mining” has been around for centuries. Some examples of data mining in the past are Bayes’ Theorem and regression analysis. Bayes’ Theorem (1700’s) shows how one conditional probability depends on its inverse. Regression analysis (1800’s) as we have learned is making a pattern for a set of information (bell curve).

 Ddfasdfadfasdfadfasdf The reason I decided to focus on Google instead of other search engines or websites is because they are home to 75 percent of all searches made on the internet. Because of that simple statistic they are also home to the most information/data than any other website.

 For every search you make on their website they record the cookie ID, your Internet IP address, the time and date, your search terms, and your browser configuration. Increasingly, Google is customizing results based on your IP number. This is referred to in the industry as "IP delivery based on geolocation."

 The main question I had after reading about their data collection is Why?  Why do they need to record all this information?  Should we be scared or worried about all of this data being collected?  Isn’t this breaking privacy laws?

 The main reason they record all of the searches is because it represents a huge money making opportunity.  As everyone in this class probably already knows, most ads you see on the internet are targeted towards you by what you search and what websites you visit.

 Since Google controls most of the search engine market companies are pretty much forced to go to Google and buy the information they have on all of us.  This is why it must be so enticing for Google since they are making a ridiculous amount of money by selling this information.  For the record Google made $1.65 billion in the third quarter of this year.

 After my research I have concluded that we shouldn’t be worried for now…  I believe that the information isn’t being used negatively for the most part. Mostly just advertisements as mentioned before.  The real worry is that if the government can get a hold of all of the information.  Even if this does happen it still might not necessarily be a bad thing.

 The worry behind the government having access to the information is that they might misinterpret the data.  They possibly could see curiosity as probable cause.  For example if you were to search “how to make a bomb” just because you were curious. The government could see it as a warning that you are trying to kill people.

 Google collecting your IP addresses isn’t illegal because it is just a computer address and doesn’t include your name or other personal things.  But if you have ever been curious and searched your name on Google then there is a linking between your searches and your IP Address that Google has.

 /0,1518,587546,00.html /0,1518,587546,00.html  oogle-profits-up-3q-200/ oogle-profits-up-3q-200/  ats-the-big-fuss-about-ip-addresses/ ats-the-big-fuss-about-ip-addresses/  ou_trust_google_to_resist_data_mining_acros s_services.php ou_trust_google_to_resist_data_mining_acros s_services.php 