Big Data Analysis – Now Used For Politics…

Big data analysis has been contributing not only to decision making in the business, health, and defense realms but also in politics. 

Computer experts have been helping politicians understand the public’s behavior during election campaigns. In fact, big data insights played a crucial role in the recent US elections. 

New details show Donald Trump’s victory was due to an innate understanding of what the American people wanted, on the basis of big data, rather than polls.

Cambridge Analytica uses machine-learning techniques to identify personality traits and was created specifically to work on US politics. They use data modeling and psychographic profiling to grow audiences, identify key influencers, and connect with people in ways that move them to action. The company is the US affiliate of the private British behavioral research and strategy communication company SCL Group.

The company’s head of product Matthew Oczkowski, who ran the Trump data campaign, told IBTimes UK

“We were hired to understand how a Trump voter is different from a generic Republican voter. Most modelling is done on a typical Republican versus a typical Democrat, but we knew going into the race that Trump was anything but a typical Republican nominee. 

“He brings a very unique style and stance on issues, a different bravado and name ID, so we built all our modelling on who we should talk to and how we should talk to them specifically for his campaign.”

“A typical Republican is concerned about jobs and economy, national security and then the size of the government tied with taxes. But if you look at a Trump-specific voter and you isolate the ‘Trump effect’, the issue is quite different. 

“The big issues are law and order, respect for law enforcement, immigration, and trade and wages… Once you start to understand some basic things like this, you then understand the effect it will have on the electorate.”

He added that they understood “this election was far different from 2012. The Democrats weren’t speaking to the right people. Hillary Clinton employed a very ‘Obama 2012’-like strategy, where all she had to do was turn out her own people and then she’d win the election…”

Working with the Trump campaign team, Cambridge Analytica’s approach became focused on how to get the disenfranchised voter to want to vote, and the data collected became honed into very specific, targeted mini-campaigns.

The company focused on paid ads on Facebook, because the social network had a huge reservoir of data on millions of users, making it possible to target ads at potential voters who were angry about certain issues.

The data firm told Trump to travel out to hold “town hall” rally speeches in various states that catered specifically to the top concern of the group he was speaking to. Even emails and door-to-door canvassing were tailored to suit the individual concerns of voters. 

Oczkowski argues that this approach enabled Trump’s campaign to reach people, rather than trying to rely on instinct and previous experience.

I-HLS:      Was Donald Trump's Surprise Victory Hidden In The Data?:

Wise After The Event, Or Why Big Data Failed To Predict President-Elect Trump:

 

« Why Are Hackers After Healthcare Records?
'Locked-in' Patients Enabled To Communicate »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

SynerLeap

SynerLeap

SynerLeap is ABB's innovation growth hub. Our aim is to help startups accelerate and expand across industries, ranging from industrial automation and robotics to grid technologies and smart cities.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Verisign

Verisign

Verisign is a Global Leader in Domain Names & Internet Security, providing protection for websites and enterprises around the world.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

Atumcell

Atumcell

Atumcell’s targeted risk assessment exposes emerging threats before they cause harm.