recommended reading

Is Google's Problem 'Big Data Hubris' or Insufficient Data?

Jeff Chiu/AP file photo

The trouble with Google Flu Trends might not be “big data hubris” as charged by a recent analysis in the journal Science, but rather that Google’s data simply wasn’t big enough to be sufficiently predictive, a program director at the Intelligence Advanced Research Projects Activity said on Tuesday.

The Science analysis (paywall) found Google’s much touted Flu Trends tool was less adept at predicting future flu activity than simply extrapolating from past activity based on Centers for Disease Control and Prevention reports. It also found that Google routinely overestimated the number of U.S. flu cases to expect in a year.

Jason Matheny directs IARPA’s Open Source Indicators program, which uses automated analysis of open source data streams to predict events ranging from political unrest to disease outbreaks, including flu.

Unlike Flu Trends, which relies exclusively on Google search data to spot changes in the prevalence of flu symptoms, IARPA’s program aggregates data from numerous streams including Web searches, social media, crowding in hospital parking lots and canceled online restaurant reservations, Matheny said. He described the project during a conference presentation on big data, the life sciences and national security hosted by the American Association for the Advancement of Science.

“The goal is to take a bunch of very noisy, weak signals and combine them in a way that gives a stronger signal,” he said. “If you think of Google Flu Trend, that’s one data stream, a data stream that has problems, a lot of noise…With OSI, the goal is to combine various data streams in order to corroborate a signal.”

The OSI system has outperformed Google Flu Trends in testing, though still has a number of false positives, Matheny said.

Another big data tool IARPA is developing is called Foresight and Understanding from Scientific Exposition, or FUSE, Matheny said. FUSE pores through scientific and patent literature for indicators that suggest an innovation or field is about to break out.

“[We’ve] been looking for the past three years for these kind of indicators and there are a surprisingly large number of them,” Matheny said. “One that is quirky is when communities start using more and more acronyms that is a sign of maturity.”

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.