MISUSE OF PERSONAL DATA IN PUBLIC OPINION POLLS - NEW EXAMPLES IN THE FORM OF INTERNET OF THINGS DEVICES AND APPLICATIONS

Authors

  • Vera Arežina
  • Nenad Spasojević
  • Aleksandar Peković

Keywords:

analyze data, public opinion polls, data misuse, internet security, Internet of Things, devices and applications

Abstract

This paper will analyze the importance of quantitative and qualitative research, but also their impact on the security of citizens who participate in them. Although they are of great importance both for science and for commercial purposes, personal data collected through research can be misused. During the pandemic caused by the COVID-19 virus, there was a rapid growth of online research, due to restrictions on movement and gatherings. This method of data collection is an example of how additional interests can motivate researchers to misuse personal data of respondents in different ways.

Beside, much bigger problem can be created by Internet of Things applications and devices that collect and analyze data using their software. Therefore, this paper will also offer solutions to limit and prevent potential misuse of personal data of users of these applications and devices.

References

Adamović, Ž, Ivić, M, & Vukvović, V. (2017). Metodologija i tehnologija izrade naučnih radova. Banja Luka: Univerzitet za poslovni inženjering i menadžment Banja Luka.
Arežina, V. (2021). Metodologija istraživanja u političkim naukama. Srpska politička misao. XXVIII, vol. 71, 273-292.
Arežina, V. (2018). Research Design in Methodology of Political Science. Proceedings of ADVED 2018 – 4th International Conference on Advances in Education and Social Sciences. Istanbul: АDVED.
California Consumer Privacy Act , 1798.100 - 1798.199.100 (State of California 2018).
Cisco Systems. (2019). Consumer Privacy Survey. San Jose: Cisco Systems.
Creswell, John W. (2014). Research design: qualitative, quantitative, and mixed methods approaches. Los Angeles: SAGE. Fourth edition.
Freedman, M. (2020, Jun 17). How Businesses Are Collecting Data (And What They're Doing With It). Retrieved from Business News Daily: https://www.businessnewsdaily.com/10625-businesses-collecting-data.html.
Gaćinović, R. (2017). Prikupljanje podataka u procesu naučnog istraživanja. Politička revija. XVI, vol. 52, 137-156.
Devine, F. (2005). Kvalitativne metode. In: D. Marsh & G. Stoker (Ed.), Teorije i metode političke znanosti, Zagreb, Hrvatska: Fakultet političkih znanosti.
Đorđević, M. (2012). Istraživanje politike: Bihejvioralni pristup. Belgrade: Službeni glasnik.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qui, D. (2014). Security of the Internet of Things: perspectives and challenges. New Jork: Springer Science+Business Media.
Kirk, J. (2019, April 15). Australian Child-Tracking Smartwatch Vulnerable to Hackers. Retrieved from Bank Info Security: https://www.bankinfosecurity.com/australian-child-tracking-smartwatch-vulnerable-to-hackers-a-12376.
Kotler, P. & Keller, K. J. (2006). Marketing menadžment, Belgrade: Data status.
Marczyk Geogrey, DeMatteo David, and David Festinger. (2005). Essentials of Research Design and Methodology. New Jersey: John Wiley & Sons, Inc. p. 29.
Mitrović, M. (2020). Sloboda izražavanja i zaštita podataka o ličnosti na internetu: Perspektiva internet korisnika u Srbiji. CM : Communication and Media, XV(47) 5–34.
Milosavljević, S, & Radosavljević I. (2003). Osnovi metodologije političkih nauka. Belgrade: Službeni glasnik.
Mozer, C. A. (1962). Metodi anketiranja u istraživanju društvenih pojava. Belgrade: Kultura.
Pavlovic, N. (2021). Metodološki problemi u sprovođenju kvantitativnih istraživanja posredstvom interneta u sociologiji. Niš: Univerzitet u Nišu – Filozofski fakultet.
Spasojevic, N. (2020). Aerozagađenje u Republici Srbiji kao posledica energetske efikasnosti. Belgrade: Fakultet političkih nauka, Univerziteta u Beogradu.
Starr, D. (2020, Avgust 10). Here’s Why You Should Be Concerned About Cameras in Robot Vacuums. Retrieved from Safety: https://www.safety.com/heres-why-you-should-be-concerned-about-cameras-in-robot-vacuums.
Sućeska, M, & Hanić A. (2014). Zaštita ličnih podataka u BiH i Srbiji. Sinteza - Međunarodna naučna konferencija Univerziteta Singidunim. Belgrade: Univerzitet Singidunum.
Škare, V. (2006). Internet kao novi kanal komunikacije, prodaje i distribucije za segment mladih potrošača. CROMAR (Hrvatska zajednica udruga za marketing) i Ekonomski fakultet Zagreb, 18 (1–2) 29–40.
Termiz, Dž. (2006). Statističke tehnike i postupci u politikološkim istraživanjima. Lukavac: NIK Grafit.
Unit 42. (2020). 2020 Unit 42 IoT Threath Report. Santa Clara: Palo Alto Networks.
Wiens, K., & Chamberlain, E. (2018‚, septembar 19). John Deere Just Swindled Farmers out of Their Right to Repair. Retrieved from Wired: https://www.wired.com/story/john-deere-farmers-right-to-repair/

Downloads

Published

2021-11-26