Protection Algorithm: The Other Side of Algorithm

323

1Introduction about Protection Algorithm

We are going to discuss protection algorithm today and how it affects our data? The concern about the protection of our data is well founded, but who can protect us from malevolent use is also the algorithm. An algorithm (protection algorithm) decides the proposals that Google offers you before a search, knowing from previous experience what really interests you; another selects the entries that appear on your Facebook wall and silences others and suggests possible friendships; a third party recommends books, music and products as soon as you check out the Amazon website. Tripadvisor knows what kind of vacation you like, e-dreams where you usually travel and the automatic corrector changes what you write because sometimes you know what you want to say, and your personal assistant reminds you that you have not called your mother for days . All that, and everything else, is ruled by his majesty the algorithm.

This ubiquitous word, which was born as a recognition of the Arabic mathematician Al-Khwarizmi, whose work came to the West through Spain, also evokes a threat. In the information age, we are increasingly aware of the importance of protecting our data. With some frequency, the media tell us some perverse uses of the information we accumulate through information technologies and their tools. Algorithms (protection algorithm) govern computer programs, search engines and social networks, smartphone apps and databases where we have signed. We suspect that with the algorithm in hand we are kept under close surveillance by anonymous centers of power, to the point of knowing ourselves better than ourselves. The concern is based, Beyond technology, with its face and its cross, the algorithms have a vast positive and unsuspected face, because it is behind the advances of medicine, weather forecasts, environmental management of nature, logistics that supplies us with the goods we need, the productive processes, traffic control, television programming and the ups and downs of the markets. 

The algorithms have allowed the appearance of striking applications such as virtual assistants such as Alexa, Cortana or Siri; those who suggest a possible partner, those who make animated films possible, help you invest in stock exchange, translate languages ​​in real time, advise you on all types of purchases, from trips to insurance, answer your phone calls, measure your physical activity or control the operation of household appliances in your home. And almost anything that comes to mind.

In fact, the algorithm (protection algorithm) is neutral, it is only the formalization of the different steps of a process to solve a mathematical problem that models a real event. They are orderly instructions waiting for you to insert an input to generate an answer. The question may be: what dose of this drug should a certain patient take? How should I regulate the exposure time of the scanner? Is it necessary to alert or even evacuate this area due to the risk of a natural disaster? How many minutes will the next bus arrive? The input can be any operation you do with your mobile, from sending a whatsApp, doing an operation with the calculator, turning a page in the document that I am reading, or telling Siri that I want to listen to a song. It is a tool such as a screwdriver or a knife.

Applied mathematics deals with all this, which converts data and algorithms into knowledge, in order to make appropriate decisions, in improvements and innovations in industrial or daily processes or in alerts of possible risks, from those affecting health. even those that derive from a natural catastrophe.

Back

LEAVE A REPLY

Please enter your comment!
Please enter your name here