Mary is a promising biotechnologist, a career she has held since her graduation with first class honors undergraduate degree over sever seven years ago. A role earning her the respect of family, friends and peers constituting the international scientific community. In spite of all these achievements and recognition she however seems unsettled – which is not surprising for scientists- but her demeanor speaks of a woman whose spirits are on free fall. Strikingly beautiful in a crimson red figure hugging dress she is a sight to behold and it is her hope that on this third attempt she will finally attract the attention of the data analyst sitting across at her favorite restaurant; Geek. Frustration once gain sets in on this occasion as had been the case in the previous two occasions and as now customary she reaches out and grabs her smartphone, a constant always responding and ever faithful companion; perhaps also the only tangible assurance that she is not as lonely as the situation makes her seem. Unlocking the screen lock she momentarily gets back into a steamy chat she has been having with a gentleman whose bio pricked her curiosity while browsing through the profiles of eligible bachelors on a dating site. A process which is rudely interrupted by a pop a message requesting her to back up her chat data. She subconsciously checks on the box [Include videos and other media files] and clicks on the back up icon oblivious just as millions of other Kenyans are on the exact location of storage of her chat data, what it entails to store such data or the guarantee that such data will remain safe private and confidential.
Her Data is part of the 8.6 Zettabytes of data transferred via the internet in the year 2017, an almost twin fold increase from the 4.7 Zettabytes of data transferred two years previously; a figure that is expected to rise to 10.7 Zettabytes by the end of 2018 (Cisco Global Cloud Index 2015-2020). Mary is also not aware of that part of this data was recently analysed by her crush, the data analyst whose name is Joseph a few weeks ago at the request of the Head of the Human Resource Department in effort to curb the high staff turnover through the development of employee satisfaction retention initiatives tailor made from what the employees frequently browsed privately on the internet. An I.P address and access to the server housing the information transferred via the office wireless network suffice to say is all that is required and apart from the few employees who use mobile operator data for personal internet use, no employee is spared.
While many concur that data is fundamental to the digital economy and for various economic reasons needs to be kept flowing, concerns continue to mount on what quantity of that data should be allowed to flow freely.
The flooding of internet traffic has washed to the shore various challenges and opportunities, these to include shoring up the capsized wreckage caused by tides altering the traditional methods of doing research, the weak legal framework governing the transparency of how data is analyzed, processed and shared, other challenges to include those related to business to business trade in personal information as well as appropriate fines leveled against telecommunications companies which occasionally fail to protect consumer data from cyber-attacks.
A new agreement between leading telecommunications company Liquid Telecomm subsidiary East Africa Data Centre and Strathmore Business School a few days ago which will see the Centre; the region’s largest and only tier 3 data Centre company furnish the newly launched
Africa Analytics Centre with dedicated rack space and colocation services; the deal will also see establishment of a direct fiber link between the Data Centre and the Business School, a conduit that will provide nourishment and offer impetus for the growth of various s data analytic services employing the use of data mining techniques, exploratory data analysis and other emerging big Data analysis techniques geared towards helping business unlock the full potential from the benefits derived from big data.
The Business Schools dive into the murky not fully appreciated and understood depths of opaque data processing will however soon elicit the backlash of various consumer rights protection groups and lobbies, a factor that will soon force the repeal of various existing local laws, regional conventions governing the cyber space and data Protection of Data privacy to conform to internationally approved and accepted steps involved in data management in addition to creating easy avenues for legal redress in case of private data breaches and is the case with Mary.
You must be logged in to post a comment.