Final answer:
Big data is collected through internet cookies, mobile app permissions, and field research in physical stores. The data is used for personalizing experiences and targeted marketing, but there are concerns about privacy and data breaches. The access by others ranges from high in the case of internet cookies to variable based on security measures for mobile apps and field research data.
Step-by-step explanation:
Data Collection on the Internet
One method of collecting big data on the internet is through cookies and tracking pixels. These tools collect data about user behavior, preferences, and demographics. The data is collected to personalize user experiences, target advertisements, and understand consumer behavior. The benefit of this data collection includes providing tailored content and improving online services. However, it can compromise privacy and may lead to data breaches. The likelihood of this data being accessed by others is relatively high, considering the number of data-sharing agreements between companies.
Digital Data Collection from a Source Other than the Internet
Mobile applications often collect big data through user permissions granted to access location, contacts, and other phone features. This data is collected for app functionality, personalized experiences, and marketing insights. The benefits include enhanced user experiences and better app services, but at the risk of privacy invasion and unwanted data sharing. The probability of this data being accessed by others depends on the app developer's security measures and data policies.
Analog (Non-digital) Data Collection in Physical Places
Field research involves observing and collecting data in the subject's natural environment. For instance, retail stores may collect shopper behavior data through surveys or by tracking the movement of customers using cameras. This data provides insights on consumer habits and preferences, helping to improve products and services. Benefits include enhanced shopping experiences and operational efficiency. Harm could arise from misuse of personal information or intrusive surveillance practices. The potential for others to access this data varies depending on the security protocols of the data-collecting entity.