Big Data Analysis – Now Used For Politics…

Big data analysis has been contributing not only to decision making in the business, health, and defense realms but also in politics. 

Computer experts have been helping politicians understand the public’s behavior during election campaigns. In fact, big data insights played a crucial role in the recent US elections. 

New details show Donald Trump’s victory was due to an innate understanding of what the American people wanted, on the basis of big data, rather than polls.

Cambridge Analytica uses machine-learning techniques to identify personality traits and was created specifically to work on US politics. They use data modeling and psychographic profiling to grow audiences, identify key influencers, and connect with people in ways that move them to action. The company is the US affiliate of the private British behavioral research and strategy communication company SCL Group.

The company’s head of product Matthew Oczkowski, who ran the Trump data campaign, told IBTimes UK

“We were hired to understand how a Trump voter is different from a generic Republican voter. Most modelling is done on a typical Republican versus a typical Democrat, but we knew going into the race that Trump was anything but a typical Republican nominee. 

“He brings a very unique style and stance on issues, a different bravado and name ID, so we built all our modelling on who we should talk to and how we should talk to them specifically for his campaign.”

“A typical Republican is concerned about jobs and economy, national security and then the size of the government tied with taxes. But if you look at a Trump-specific voter and you isolate the ‘Trump effect’, the issue is quite different. 

“The big issues are law and order, respect for law enforcement, immigration, and trade and wages… Once you start to understand some basic things like this, you then understand the effect it will have on the electorate.”

He added that they understood “this election was far different from 2012. The Democrats weren’t speaking to the right people. Hillary Clinton employed a very ‘Obama 2012’-like strategy, where all she had to do was turn out her own people and then she’d win the election…”

Working with the Trump campaign team, Cambridge Analytica’s approach became focused on how to get the disenfranchised voter to want to vote, and the data collected became honed into very specific, targeted mini-campaigns.

The company focused on paid ads on Facebook, because the social network had a huge reservoir of data on millions of users, making it possible to target ads at potential voters who were angry about certain issues.

The data firm told Trump to travel out to hold “town hall” rally speeches in various states that catered specifically to the top concern of the group he was speaking to. Even emails and door-to-door canvassing were tailored to suit the individual concerns of voters. 

Oczkowski argues that this approach enabled Trump’s campaign to reach people, rather than trying to rely on instinct and previous experience.

I-HLS:      Was Donald Trump's Surprise Victory Hidden In The Data?:

Wise After The Event, Or Why Big Data Failed To Predict President-Elect Trump:

 

« Why Are Hackers After Healthcare Records?
'Locked-in' Patients Enabled To Communicate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

Rapid7

Rapid7

Rapid7 unites cloud risk management and threat detection to deliver results that secure your business and ensure you’re always ready for what comes next.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Telspace Systems

Telspace Systems

Telspace Systems provides penetration testing, vulnerability assessment and training services.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

NetNordic Group

NetNordic Group

NetNordic is a Nordic system integrator focusing on solutions and services in the area of networking, smart data centers, cybersecurity, and unified communication.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Barikat Cyber Security

Barikat Cyber Security

Barikat is a provider of information security solution and services including security analysis and compliance, security testing, managed security services, incident response and training.

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Xcede

Xcede

Xcede are global technology recruitment specialists. We connect companies with exceptional professionals who empower growth.