Big Data Analysis – Now Used For Politics…

Big data analysis has been contributing not only to decision making in the business, health, and defense realms but also in politics. 

Computer experts have been helping politicians understand the public’s behavior during election campaigns. In fact, big data insights played a crucial role in the recent US elections. 

New details show Donald Trump’s victory was due to an innate understanding of what the American people wanted, on the basis of big data, rather than polls.

Cambridge Analytica uses machine-learning techniques to identify personality traits and was created specifically to work on US politics. They use data modeling and psychographic profiling to grow audiences, identify key influencers, and connect with people in ways that move them to action. The company is the US affiliate of the private British behavioral research and strategy communication company SCL Group.

The company’s head of product Matthew Oczkowski, who ran the Trump data campaign, told IBTimes UK

“We were hired to understand how a Trump voter is different from a generic Republican voter. Most modelling is done on a typical Republican versus a typical Democrat, but we knew going into the race that Trump was anything but a typical Republican nominee. 

“He brings a very unique style and stance on issues, a different bravado and name ID, so we built all our modelling on who we should talk to and how we should talk to them specifically for his campaign.”

“A typical Republican is concerned about jobs and economy, national security and then the size of the government tied with taxes. But if you look at a Trump-specific voter and you isolate the ‘Trump effect’, the issue is quite different. 

“The big issues are law and order, respect for law enforcement, immigration, and trade and wages… Once you start to understand some basic things like this, you then understand the effect it will have on the electorate.”

He added that they understood “this election was far different from 2012. The Democrats weren’t speaking to the right people. Hillary Clinton employed a very ‘Obama 2012’-like strategy, where all she had to do was turn out her own people and then she’d win the election…”

Working with the Trump campaign team, Cambridge Analytica’s approach became focused on how to get the disenfranchised voter to want to vote, and the data collected became honed into very specific, targeted mini-campaigns.

The company focused on paid ads on Facebook, because the social network had a huge reservoir of data on millions of users, making it possible to target ads at potential voters who were angry about certain issues.

The data firm told Trump to travel out to hold “town hall” rally speeches in various states that catered specifically to the top concern of the group he was speaking to. Even emails and door-to-door canvassing were tailored to suit the individual concerns of voters. 

Oczkowski argues that this approach enabled Trump’s campaign to reach people, rather than trying to rely on instinct and previous experience.

I-HLS:      Was Donald Trump's Surprise Victory Hidden In The Data?:

Wise After The Event, Or Why Big Data Failed To Predict President-Elect Trump:

 

« Why Are Hackers After Healthcare Records?
'Locked-in' Patients Enabled To Communicate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

MENAInfoSecurity

MENAInfoSecurity

MENAInfoSecurity is a regional leader in information security solutions, assurance services and managed services.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

CertiK

CertiK

CertiK uses rigorous Formal Verification technology to provide hacker-resistant smart contract and blockchain audits, thorough penetration testing, and customized security integrations.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

DTS Systeme

DTS Systeme

DTS Systeme is an IT service provider with a focus on the core areas of datacenter, technologies and IT security.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

GreenPages Technology Solutions

GreenPages Technology Solutions

GreenPages provide expert strategic guidance and proven cloud-era solutions for our clients. Every day we help organizations leverage the cloud securely with less risk and cost.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.