The Shrinking of the Big Data Promise

 

Markets do not have much patience for a commitment to techniques that don’t deliver. 

“Regression to the mean” is one of the subtlest concepts in statistical literacy, and yet it’s terribly simple. In plain English, “regression to the mean” is the idea that normally, things are pretty normal. That is, if you observe something abnormal, a high fever, a high share price, a long, unseasonable stretch of sunny or rainy days, then chances are that all will soon fall back within normal range. 

Regression to the mean applies to commerce. An advertising technique that works very well today will probably work less well over time, as repetition and competition eat away at its novelty. Look at those “ghost ads” on the sides of faded Victorian buildings: apparently, it was once profitable to advertise soap with a slogan like “It makes you clean.”

Remember when Xynga’s “social games” like Farmville seemed to colonize the limbic systems of everyone you knew, stealing away their hours with a fiendishly addictive game-mechanic? In short order, most of Xynga’s players grew inured to the game’s temptations, leaving behind a rump of especially susceptible players who were not enough to sustain the game, nor its makers’ high-flying share price.

Likewise, the “surveillance business model” of building up detailed electronic dossiers on internet users in order to predict what they want to buy and how to sell it to them produced some genuinely impressive results in its early years. The serendipity of seeing an ad for something you had been thinking about proved very powerful in the early days of Facebook and the first generation of “retargeting” services.

But a look at Facebook’s ad-card rates shows that the novelty of this technique wears off fast. Facebook was founded on the premise that it could use its mounting dossier on your behavior to figure out how to sell you things faster than your natural defenses would repel its pitches. If that ideology was borne out, you’d expect to see the company’s cost-per-thousand ad rates climbing into the stratosphere. Instead, they’re damned close to the rate you’ll pay for regular, minimally targeted display advertising elsewhere.

The quarterly Facebook investor calls tell the story: Facebook’s is making good money from venture-backed games firms that pay “per acquisition” – from users actually installing their games. As Facebook doesn’t have to pay itself to advertise on its own service, it can simply wash its service in ads for games until the acquisitions take place. The cost per acquisition on Facebook is substantially in excess of what any game company could hope to earn from an average player, suggesting that this line of business is due for a crash. The other profitable line for Facebook is sneakier, and possibly longer-lived. The company can easily see which of the commercial/brand/business pages on its service are growing fastest. These correspond to the businesses that are exerting the most energy to get their customers to follow them on Facebook and making Facebook most integral to their daily business. When Facebook’s algorithms predict that a business is well and truly reliant upon Facebook to reach its customers, it simply switches off the business’s ability to reach those customers, so that new updates only go to a small fraction of the company’s followers. Thereafter, a Facebook salesperson gives the business a call and offer to turn the tap back on – for a price. That’s not the surveillance business-model. It’s a much older one: the drug-dealer business-model, where the first taste is free.

The Big Data success stories for predicting human behavior over long terms don’t bear scrutiny. It’s not a triumph of big data to predict that someone searching for “used cars” might respond to an ad for used cars. Neither is it sorcery to predict that a woman who buys folic acid is pregnant. It’s not big data to get paid when someone clicks on a loan application or installs a game.Markets don’t solve all our problems, but they do not have much patience for an irrational, ideological commitment to techniques that don’t deliver. Facebook doubtless has internal fiefdoms that will be threatened by the company backing off its surveillance commitment, but it is also growing non-surveillance-oriented tendrils as fast as it can.

Unfortunately, spy agencies aren’t subject to this kind of discipline. The fact that the billions spent spying on everyone, always, has spectacularly failed to catch any terrorists is taken as proof that they’re not doing enough surveillance – not that untargeted, mass surveillance without particularised suspicion is a waste of money. Of course, it helps that there are so many contractors and suppliers who lobby for spies to buy more of their gear and services.

Every technology is overhyped at its birth. The Gartner Hype Cycle has Big Data sliding into the long, deep “trough of disillusionment.” As the cycle astute observes, overpromising doesn’t mean there’s no there. As big data techniques stabilize into a few applications where it works well and long, more of the surveillance business model will blow away.
Guardian:http://http://bit.ly/1Ryrnyg

 

 

« 10 Extreme Hacks
The Dark Side of the Fourth Industrial Revolution – and How To Avoid It »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

tietoevry

tietoevry

Tietoevry creates digital advantage for businesses and society. We are a leading digital services and software company with local presence and global capabilities.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Excellium Services

Excellium Services

Excellium’s Professional Services team combines expertise and experience that complements your in-house security resources.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

enQase

enQase

enQase offers security beyond PQC; the only comprehensive, scalable solution that utilizes enhanced quantum technologies to protect data against current and future quantum threats.