Big Data Analysis – Now Used For Politics…

Big data analysis has been contributing not only to decision making in the business, health, and defense realms but also in politics. 

Computer experts have been helping politicians understand the public’s behavior during election campaigns. In fact, big data insights played a crucial role in the recent US elections. 

New details show Donald Trump’s victory was due to an innate understanding of what the American people wanted, on the basis of big data, rather than polls.

Cambridge Analytica uses machine-learning techniques to identify personality traits and was created specifically to work on US politics. They use data modeling and psychographic profiling to grow audiences, identify key influencers, and connect with people in ways that move them to action. The company is the US affiliate of the private British behavioral research and strategy communication company SCL Group.

The company’s head of product Matthew Oczkowski, who ran the Trump data campaign, told IBTimes UK

“We were hired to understand how a Trump voter is different from a generic Republican voter. Most modelling is done on a typical Republican versus a typical Democrat, but we knew going into the race that Trump was anything but a typical Republican nominee. 

“He brings a very unique style and stance on issues, a different bravado and name ID, so we built all our modelling on who we should talk to and how we should talk to them specifically for his campaign.”

“A typical Republican is concerned about jobs and economy, national security and then the size of the government tied with taxes. But if you look at a Trump-specific voter and you isolate the ‘Trump effect’, the issue is quite different. 

“The big issues are law and order, respect for law enforcement, immigration, and trade and wages… Once you start to understand some basic things like this, you then understand the effect it will have on the electorate.”

He added that they understood “this election was far different from 2012. The Democrats weren’t speaking to the right people. Hillary Clinton employed a very ‘Obama 2012’-like strategy, where all she had to do was turn out her own people and then she’d win the election…”

Working with the Trump campaign team, Cambridge Analytica’s approach became focused on how to get the disenfranchised voter to want to vote, and the data collected became honed into very specific, targeted mini-campaigns.

The company focused on paid ads on Facebook, because the social network had a huge reservoir of data on millions of users, making it possible to target ads at potential voters who were angry about certain issues.

The data firm told Trump to travel out to hold “town hall” rally speeches in various states that catered specifically to the top concern of the group he was speaking to. Even emails and door-to-door canvassing were tailored to suit the individual concerns of voters. 

Oczkowski argues that this approach enabled Trump’s campaign to reach people, rather than trying to rely on instinct and previous experience.

I-HLS:      Was Donald Trump's Surprise Victory Hidden In The Data?:

Wise After The Event, Or Why Big Data Failed To Predict President-Elect Trump:

 

« Why Are Hackers After Healthcare Records?
'Locked-in' Patients Enabled To Communicate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CyTech Services

CyTech Services

CyTech provides unique services and solutions complemented with professional subject matter experts to both the Federal and Commercial sectors.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Cyber Defense Labs

Cyber Defense Labs

Cyber Defense Labs helps companies identify, mitigate and reduce risk as a trusted, reliable partner for cyber risk management.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

Actelis Networks

Actelis Networks

Actelis Networks is a market leader in cyber-hardened, rapid deployment networking solutions for wide-area IoT applications.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.