{"id":3822,"date":"2015-06-08T11:37:37","date_gmt":"2015-06-08T15:37:37","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/mediaberkman\/?p=3822"},"modified":"2015-06-08T11:38:08","modified_gmt":"2015-06-08T15:38:08","slug":"radio-berkman-218-the-threats-and-tradeoffs-of-big-data","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/2015\/06\/08\/radio-berkman-218-the-threats-and-tradeoffs-of-big-data\/","title":{"rendered":"Radio Berkman 218: The Threats and Tradeoffs of Big Data"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.law.harvard.edu\/mediaberkman\/files\/2015\/06\/3720845144_7798f0b25c_o.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-3823\" src=\"https:\/\/blogs.law.harvard.edu\/mediaberkman\/files\/2015\/06\/3720845144_7798f0b25c_o-300x300.jpg\" alt=\"3720845144_7798f0b25c_o\" width=\"128\" height=\"177\" \/><\/a>Listen:<a href=\"http:\/\/wilkins.law.harvard.edu\/podcasts\/mediaberkman\/radioberkman\/2015-06-08_schneier_wolff.mp3\"><strong>or download<\/strong><\/a><strong> | &#8230;also in <\/strong><strong><a href=\"http:\/\/wilkins.law.harvard.edu\/podcasts\/mediaberkman\/radioberkman\/2015-06-08_schneier_wolff.ogg\">Ogg<\/a><\/strong><br \/>\nA lot of personal information about you is completely invisible, intangible, and racing around cyberspace on a mission to pay your bills and geolocate your Facebook status. And, of course, this is useful and in a lot of ways really cool.<\/p>\n<p>But today on Radio Berkman we\u2019re going to talk about the obstacles presented by a data-driven society. How can we keep mountains of information out of the wrong hands without compromising all the great benefits we get everyday?<\/p>\n<p>First, we talk to <a href=\"https:\/\/www.schneier.com\/\">Bruce Schneier<\/a>, a fellow at the Berkman Center and the author of <a href=\"https:\/\/www.schneier.com\/books\/data_and_goliath\/\">Data and Goliath, The Hidden Battles to Capture Your Data and Control Your World<\/a>. In this book, Schneier notes that the bulk collection of data isn\u2019t going away, but changes in policy and public perception could allow citizens to have more control over how this information gets used.<\/p>\n<p>And in the second half of the show we talk to <a href=\"https:\/\/twitter.com\/josephinecwolff\">Josephine Wolff<\/a>, who is also a Berkman Fellow and PhD candidate in the Engineering Systems Division at MIT studying cybersecurity and Internet policy. If you were concerned by the major credit card or email breaches of the last few years, you\u2019ll want to hear this.<\/p>\n<p>Reference Section:<br \/>\n<a href=\"https:\/\/www.schneier.com\/\">Schneier on Security<\/a><br \/>\n<a href=\"http:\/\/www.ted.com\/talks\/bruce_schneier?language=en\">Bruce Schneier&#8217;s TED talk <\/a>(20 min.)<br \/>\n<a href=\"http:\/\/www.slate.com\/authors.josephine_wolff.html\">Josephine Wolff on Slate<\/a><\/p>\n<p>This episode features Creative Commons licensed\u00a0content\u00a0from:<br \/>\n<a href=\"http:\/\/ccmixter.org\/people\/Neurowaxx\">Neurowaxx<\/a><br \/>\n<a href=\"http:\/\/ccmixter.org\/people\/morgantj\">MorganTJ<\/a><br \/>\n<a href=\"https:\/\/www.flickr.com\/photos\/hersenspinsels\/3720845144\/in\/photolist-6ENiCu-bENB5c-6nSnCa-6ASSrh-cyXWLJ-9MEADQ-9MEALq-9MBPuR-9MEB5f-9MBPjz-9MBNFa-9MBPP6-9MEAmQ-9MBPWD-9MBQ7P-9MBP3i-9MEBoQ-9MBPCV-9MEBEQ-9MEB7Q-9MBQ66-9MEABU-9MEBfs-dZNdQm-9MUsqn-r3qMhL-21Ee22-DUFMb-4fZHfp-4uwyQL-awpvY1-5w9hLD-kidXen-dWFy4y-7TN4Ld-7TJPmR-NsY8U-rbCTk1-haEKs-8STegH-rBdf76-7TN4iq-52ZAMB-66GSXW-3b5Lhd-7gth8o-dRcW6z-6qNkYJ-3NvEBX-p86Sgv\">Mark van Laera<\/a><\/p>\n<p><em>Listen up! Comment on the show! <a href=\"http:\/\/twitter.com\/radioberkman\">Tweet<\/a> us! Find us on <a href=\"https:\/\/soundcloud.com\/radioberkman\">Soundcloud<\/a>!<\/em><br \/>\n<a href=\"http:\/\/phobos.apple.com\/WebObjects\/MZStore.woa\/wa\/viewPodcast?id=298096088&amp;s=143441\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/media-cyber.law.harvard.edu\/AudioBerkman\/Files\/iTunes_iClick.png\" alt=\"\" width=\"22\" height=\"22\" \/><\/a>\u00a0<a href=\"http:\/\/feeds.feedburner.com\/radioberkman\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/media-cyber.law.harvard.edu\/AudioBerkman\/Files\/feed-icon32x32.png\" alt=\"\" width=\"22\" height=\"22\" \/><\/a>\u00a0Subscribe to Radio Berkman<\/p>\n<p>This week&#8217;s episode produced and edited by <a href=\"http:\/\/twitter.com\/blanket\">Daniel Dennis Jones<\/a>, with Sara Marie Watson, Elizabeth Gillis, Carrie Tian, and Gretchen Weber.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Listen:or download | &#8230;also in Ogg A lot of personal information about you is completely invisible, intangible, and racing around cyberspace on a mission to pay your bills and geolocate your Facebook status. And, of course, this is useful and in a lot of ways really cool. But today on Radio Berkman we\u2019re going to [&hellip;]<\/p>\n","protected":false},"author":1977,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[956,3742],"tags":[],"class_list":["post-3822","post","type-post","status-publish","format-standard","hentry","category-audio","category-radioberkman"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/wp-json\/wp\/v2\/posts\/3822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/wp-json\/wp\/v2\/users\/1977"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/wp-json\/wp\/v2\/comments?post=3822"}],"version-history":[{"count":2,"href":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/wp-json\/wp\/v2\/posts\/3822\/revisions"}],"predecessor-version":[{"id":3825,"href":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/wp-json\/wp\/v2\/posts\/3822\/revisions\/3825"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/wp-json\/wp\/v2\/media?parent=3822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/wp-json\/wp\/v2\/categories?post=3822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/mediaberkman\/wp-json\/wp\/v2\/tags?post=3822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}