Using analytics to trespass

In an earlier post, I wrote that big data systems with analytic algorithms have similar vulnerabilities to malicious behavior as we experienced in the earlier era of networking and computer operating systems. ┬áThis post describes an example that is analogous to trespassing into other people’s news-feeds on social networking sites. In that earlier era, we…