In issue 08, we examine the crucial nature and value of social data and why it has become essential for brands to perform all functions of branding, marketing and selling to their customers.
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
This document summarizes issues related to privacy and emerging technologies. It discusses how technologies like body cameras, big data, and the internet of things impact privacy based on international human rights standards. Specific concerns addressed include behavioral marketing, data aggregation, metadata collection, and government surveillance partnerships with private companies. The document advocates that any reforms around these issues must consider the close relationship between companies and governments when it comes to accessing people's personal information.
There has been very little analysis of big data ethics from an Ignatian or Catholic Social Thought point of view. The Jesuit tradition, with its focus on persons and community, as well as the CST tradition, certainly provides some direction for navigating these difficult Big Data questions.
1) The document discusses the moral challenges posed by information technology, including issues around privacy, ownership and control of personal data, and security of data.
2) As technology advances, it generates vast amounts of data about people's online activities and behaviors without their full knowledge or consent.
3) Questions arise around who should have access to personal data and how it is collected, stored, and used. Individuals want control over their private information but corporations seek to commodify user data.
The document provides an overview of legislation and privacy issues related to big data. It discusses the General Data Protection Regulation (GDPR), the new European Union legislation that gives individuals more control over their personal data and how it is used. The GDPR was drafted to update old data protection laws that did not account for how data is currently collected and used. It introduces stricter rules and penalties to improve privacy as data collection and use increases. The document explains key aspects of the GDPR such as its goals, when it will apply, who it applies to, and consequences for non-compliance.
This document discusses cognitive security, which involves defending against attempts to intentionally or unintentionally manipulate cognition and sensemaking at scale. It covers various topics related to cognitive security including actors, channels, influencers, groups, messaging, and tools used in disinformation campaigns. Frameworks are presented for analyzing disinformation incidents, adapting concepts from information security like the cyber kill chain. Response strategies are discussed, drawing from fields like information operations, crisis management, and risk management. The need for a common language and ongoing monitoring and evaluation is emphasized.
In issue 08, we examine the crucial nature and value of social data and why it has become essential for brands to perform all functions of branding, marketing and selling to their customers.
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
This document summarizes issues related to privacy and emerging technologies. It discusses how technologies like body cameras, big data, and the internet of things impact privacy based on international human rights standards. Specific concerns addressed include behavioral marketing, data aggregation, metadata collection, and government surveillance partnerships with private companies. The document advocates that any reforms around these issues must consider the close relationship between companies and governments when it comes to accessing people's personal information.
There has been very little analysis of big data ethics from an Ignatian or Catholic Social Thought point of view. The Jesuit tradition, with its focus on persons and community, as well as the CST tradition, certainly provides some direction for navigating these difficult Big Data questions.
1) The document discusses the moral challenges posed by information technology, including issues around privacy, ownership and control of personal data, and security of data.
2) As technology advances, it generates vast amounts of data about people's online activities and behaviors without their full knowledge or consent.
3) Questions arise around who should have access to personal data and how it is collected, stored, and used. Individuals want control over their private information but corporations seek to commodify user data.
The document provides an overview of legislation and privacy issues related to big data. It discusses the General Data Protection Regulation (GDPR), the new European Union legislation that gives individuals more control over their personal data and how it is used. The GDPR was drafted to update old data protection laws that did not account for how data is currently collected and used. It introduces stricter rules and penalties to improve privacy as data collection and use increases. The document explains key aspects of the GDPR such as its goals, when it will apply, who it applies to, and consequences for non-compliance.
This document discusses cognitive security, which involves defending against attempts to intentionally or unintentionally manipulate cognition and sensemaking at scale. It covers various topics related to cognitive security including actors, channels, influencers, groups, messaging, and tools used in disinformation campaigns. Frameworks are presented for analyzing disinformation incidents, adapting concepts from information security like the cyber kill chain. Response strategies are discussed, drawing from fields like information operations, crisis management, and risk management. The need for a common language and ongoing monitoring and evaluation is emphasized.
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
Running Head: SOCIAL NETWORKS DATA PRIVACY POLICIES 1
Social networking data privacy policies
Information Governance
Summer 2020
Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., & Rodriguez, J. P. (2018). Privacy and Security Issues in Online Social Networks
Social media are networks used for communication between data owners and viewers in virtual communities. The world has hence become a small global village; as a result, accordingly, information is shared seamlessly regardless of the geographical distance between people. There are, therefore, numerous social networks such as Facebook, LinkedIn, and Twitter, just to name a few, and with the help of the internet, people can link and communicate in real-time. When connecting with people from mobile devices, there is data that could be retrieved, indicating the location information and metadata embedded in the machines. Malicious users can hence retrieve this information and leverage it against other users.
The author makes it clear that with the new technology, presently, there is a lot more information available with the growth of online virtual communication platforms. Virtual networking platforms have changed the way people interact. People are always on their mobile devices browsing through social media sites, which is progressively attracting hackers and other cybercriminals. Due to this high usage, there are serious data security and privacy threats are facing social media users. The author is affirmative that the majority of the users are always sharing a lot of their personal information online, putting them at significant risks of the numerous methods of attacks.
This article is rather informative as the author is rather vocal about the reasons why people are continually being targeted by cybercriminals and made victims of attacks. It, therefore, clear on specific policies and strategies which one may implement to prevent them from falling victim to cyberattacks. One should refrain from sharing too much information on social networks, using real names when creating online profiles, and accepting friend requests from suspiciously looking accounts. Social network users must be keen and take the time to read the privacy statement before agreeing to the network's terms and conditions when creating reports.
Sarikakis, K., & Winter, L. (2017). Social Media Users’ Legal Consciousness About Privacy. Social Media + Society
Social network sites are on the upward trajectory, and they are still continuously growing with every mobile user in the world having been connected to an average of more that one social network. Social networks are mainly common among young adults aged between 18 years and 29 years. Users are becoming more comfortable sharing most of their personal details, which significantly challenges the social norm of privacy. The social model has hence become somewhat obsolete. According to the Electronic Frontier Foundation (EFF), which is a non-profit or.
CBSE open book exam plan evokes mixed reactions.
Students will be forced to think beyond narrow definitions of what they learn from books, making learning more experiential.
Rote learning a closed chapter, CBSE to begin open book era.
Teachers brace for open book challenge.
Open Book Exam System by CBSE
Sometime back there was a news that CBSE is planning to introduce Open Book Exam system for the current session "CBSE is all set to introduce the “OPEN BOOK EXAM “ for classes IX, X, XI in 2013 -2014 session and in Class XII from next academic session, reports some section of the media"
The Video and the Post here explains what exactly is an Open Book Exam
Some Facts about the Open Book Exam System
Open book tests are not easy tests.
Open book tests teach you how to find information when you need it.
The questions are designed to teach you how to use your brain
The CBSE open book system will be for 15-20% of the marks. The schools will be supplied with the text material in few months before the commencement of Summative Assessment – 2. (It will start from 2014).
The document provides an overview of two themes related to open text assessments: 1) Information Technology and Values, and 2) The Future is Now: A Zest for Living.
The section on Information Technology and Values discusses how information technology has become ubiquitous and how it leaves extensive digital trails of people's activities and information. It raises questions about who owns this data and how to balance privacy with businesses' use of personal information. The text also examines the role of moral values in recording, communicating, and accessing information in the digital era.
Social networking sites have become major targets for cybercrime due to the large amounts of personal user information they collect. Criminals are able to use details from profiles to craft convincing phishing emails and social engineer victims. While anonymity online enables some criminal behavior, removing anonymity also poses risks to privacy and freedom of expression. As more data is aggregated about individuals, it will become easier over time to identify users and develop detailed profiles about their lives, habits, and relationships, even if they try to remain anonymous. This aggregated data could then potentially be used for surveillance and other strategic purposes beyond just marketing. Strong privacy laws and regulations are needed to curb these emerging threats to privacy.
The document discusses the debate between individual privacy rights and government surveillance efforts aimed at national security. It notes that while increased surveillance can help protect citizens from security threats like terrorism, it may infringe on citizens' privacy rights. The debate centers around finding a balance between these competing interests. The document also mentions how technology has led to more personal information being stored digitally, making it accessible to authorities, and how this issue deeply affects many people given modern technology usage.
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...Marcus Leaning
Social media platforms collect vast amounts of personal data through user activities and interactions, which is then analyzed and integrated with other data sources to build detailed profiles of individuals. These profiles can accurately predict personal attributes and behaviors. Marketers and political groups utilize these insights to micro-target advertising and fake news stories meant to influence opinions. The 2016 US election saw the effective use of social media data and fake news to sway voters through methods developed by firms like Cambridge Analytica.
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future Agenda
An initial perspective on the future of data by Stephan Shakespeare, CEO and Co-Founder, YouGov. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
Lee Rainie, Director of Internet and Technology Research at the Pew Research Center, presented this material on October 29, 2020 to scholars, policy makers and civil society advocates convened by New York University’s Governance Lab (GovLab). He described findings from two canvassings of hundreds of technology and democracy experts that captured their views about the future of democracy and the future of social and civic innovation by the year 2030. Among other subjects, the experts looked at the impact of misinformation, “techlash” and trust in government institutions.
The emerging field of computational social science (CSS) is devoted to the pursuit of interdisciplinary social science research from an information processing perspective, through the medium of advanced computing and information technologies.
Social media platforms allow for widespread sharing of information but also enable the spread of criminal and unethical ideas. This document proposes a social media analysis tool to detect crime and suspicious profiles on platforms like Twitter. The tool would extract tweet data using APIs, analyze features to identify concerning behaviors, perform topic modeling to detect tweets related to crime, and suggest profiles for suspension. The goal is to prevent the spread of criminal content and activities online through monitoring social media data and flagging problematic accounts.
1. Every decision made about information is a filter that shapes reality. When classifying or structuring information, professionals are asserting power over what information is organized and how.
2. No information filter is neutral - they all reflect biases and choices about what to include or exclude. Indigenous communities have suffered from biased filters in colonial archives, so tools like Mukurtu are being developed through community partnerships.
3. Professionals have a responsibility over the power of information filters and must ensure biases are not amplified to disempower groups. While machines can help, humans cannot outsource accountability for information outcomes and consequences.
This article written Diarmaid Byrne, Editor, STQ, was published in issue 08 of the Social Technology Quarterly.
Summary: In the face of rising demand for data, privacy and ownership become a critical concern as vast amounts of data are accessed and bartered without the knowledge of people. In such scenarios, it is crucial to determine practices towards maintaining privacy.
The Authority of Government in Clearing Hatefull and Hostilities Electronic I...IJECEIAES
The Act Number 19 of 2016 concerning the amendment of The Act Number 11 of 2008 concerning Information and Electronic Transaction governing the authority of government in clearing hateful and hostilities electronic information based on tribe, religion, race and intergroup. On the one hand, the government authority aims to protect the public interest and the integrity of the nation, but on the other hand, termination of access to information would restrict the right to freedom of opinion and the right to privacy of Internet users. This study was a normative legal research, which examined the basic authority for the government to shut down negative content in cyberspace. Legal materials were collected through library research. The analysis was conducted qualitatively. This study examined three issues, namely; spreading hatred and hostility in cyberspace, legality government to close the spreading hatred and hostility and electronic evidence in spreading hatred and hostility. Spreading hatred and hostility were criminal acts that used the Internet as facilities. Internet was used by extremists to disseminate his teachings, even being used to commit acts of terrorism (cyber terrorism). In maintaining the unity and integrity, then the government had the authority to shut down access to the unlawful electronic system. The closure should be accompanied by proof of electronic information that contains hatred and hostility based on tribe, religion, race and intergroup.
This document discusses how social media and technology have changed personal privacy and information security. It explores how businesses and governments now collect vast amounts of personal data from social media sites and online activities. This data collection often happens without users' knowledge or authorization. The document also examines how social media has changed communication behaviors. It recommends that privacy organizations educate the public on online privacy risks and lobby for laws to better protect individuals' information privacy.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
Running Head: SOCIAL NETWORKS DATA PRIVACY POLICIES 1
Social networking data privacy policies
Information Governance
Summer 2020
Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., & Rodriguez, J. P. (2018). Privacy and Security Issues in Online Social Networks
Social media are networks used for communication between data owners and viewers in virtual communities. The world has hence become a small global village; as a result, accordingly, information is shared seamlessly regardless of the geographical distance between people. There are, therefore, numerous social networks such as Facebook, LinkedIn, and Twitter, just to name a few, and with the help of the internet, people can link and communicate in real-time. When connecting with people from mobile devices, there is data that could be retrieved, indicating the location information and metadata embedded in the machines. Malicious users can hence retrieve this information and leverage it against other users.
The author makes it clear that with the new technology, presently, there is a lot more information available with the growth of online virtual communication platforms. Virtual networking platforms have changed the way people interact. People are always on their mobile devices browsing through social media sites, which is progressively attracting hackers and other cybercriminals. Due to this high usage, there are serious data security and privacy threats are facing social media users. The author is affirmative that the majority of the users are always sharing a lot of their personal information online, putting them at significant risks of the numerous methods of attacks.
This article is rather informative as the author is rather vocal about the reasons why people are continually being targeted by cybercriminals and made victims of attacks. It, therefore, clear on specific policies and strategies which one may implement to prevent them from falling victim to cyberattacks. One should refrain from sharing too much information on social networks, using real names when creating online profiles, and accepting friend requests from suspiciously looking accounts. Social network users must be keen and take the time to read the privacy statement before agreeing to the network's terms and conditions when creating reports.
Sarikakis, K., & Winter, L. (2017). Social Media Users’ Legal Consciousness About Privacy. Social Media + Society
Social network sites are on the upward trajectory, and they are still continuously growing with every mobile user in the world having been connected to an average of more that one social network. Social networks are mainly common among young adults aged between 18 years and 29 years. Users are becoming more comfortable sharing most of their personal details, which significantly challenges the social norm of privacy. The social model has hence become somewhat obsolete. According to the Electronic Frontier Foundation (EFF), which is a non-profit or.
CBSE open book exam plan evokes mixed reactions.
Students will be forced to think beyond narrow definitions of what they learn from books, making learning more experiential.
Rote learning a closed chapter, CBSE to begin open book era.
Teachers brace for open book challenge.
Open Book Exam System by CBSE
Sometime back there was a news that CBSE is planning to introduce Open Book Exam system for the current session "CBSE is all set to introduce the “OPEN BOOK EXAM “ for classes IX, X, XI in 2013 -2014 session and in Class XII from next academic session, reports some section of the media"
The Video and the Post here explains what exactly is an Open Book Exam
Some Facts about the Open Book Exam System
Open book tests are not easy tests.
Open book tests teach you how to find information when you need it.
The questions are designed to teach you how to use your brain
The CBSE open book system will be for 15-20% of the marks. The schools will be supplied with the text material in few months before the commencement of Summative Assessment – 2. (It will start from 2014).
The document provides an overview of two themes related to open text assessments: 1) Information Technology and Values, and 2) The Future is Now: A Zest for Living.
The section on Information Technology and Values discusses how information technology has become ubiquitous and how it leaves extensive digital trails of people's activities and information. It raises questions about who owns this data and how to balance privacy with businesses' use of personal information. The text also examines the role of moral values in recording, communicating, and accessing information in the digital era.
Social networking sites have become major targets for cybercrime due to the large amounts of personal user information they collect. Criminals are able to use details from profiles to craft convincing phishing emails and social engineer victims. While anonymity online enables some criminal behavior, removing anonymity also poses risks to privacy and freedom of expression. As more data is aggregated about individuals, it will become easier over time to identify users and develop detailed profiles about their lives, habits, and relationships, even if they try to remain anonymous. This aggregated data could then potentially be used for surveillance and other strategic purposes beyond just marketing. Strong privacy laws and regulations are needed to curb these emerging threats to privacy.
The document discusses the debate between individual privacy rights and government surveillance efforts aimed at national security. It notes that while increased surveillance can help protect citizens from security threats like terrorism, it may infringe on citizens' privacy rights. The debate centers around finding a balance between these competing interests. The document also mentions how technology has led to more personal information being stored digitally, making it accessible to authorities, and how this issue deeply affects many people given modern technology usage.
Lecture 10 Inferential Data Analysis, Personality Quizes and Fake News...Marcus Leaning
Social media platforms collect vast amounts of personal data through user activities and interactions, which is then analyzed and integrated with other data sources to build detailed profiles of individuals. These profiles can accurately predict personal attributes and behaviors. Marketers and political groups utilize these insights to micro-target advertising and fake news stories meant to influence opinions. The 2016 US election saw the effective use of social media data and fake news to sway voters through methods developed by firms like Cambridge Analytica.
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future Agenda
An initial perspective on the future of data by Stephan Shakespeare, CEO and Co-Founder, YouGov. This is the starting point for the global future agenda discussions taking place through 2015 as part of the the futureagenda2.0 programme. www.futureagenda.org
Lee Rainie, Director of Internet and Technology Research at the Pew Research Center, presented this material on October 29, 2020 to scholars, policy makers and civil society advocates convened by New York University’s Governance Lab (GovLab). He described findings from two canvassings of hundreds of technology and democracy experts that captured their views about the future of democracy and the future of social and civic innovation by the year 2030. Among other subjects, the experts looked at the impact of misinformation, “techlash” and trust in government institutions.
The emerging field of computational social science (CSS) is devoted to the pursuit of interdisciplinary social science research from an information processing perspective, through the medium of advanced computing and information technologies.
Social media platforms allow for widespread sharing of information but also enable the spread of criminal and unethical ideas. This document proposes a social media analysis tool to detect crime and suspicious profiles on platforms like Twitter. The tool would extract tweet data using APIs, analyze features to identify concerning behaviors, perform topic modeling to detect tweets related to crime, and suggest profiles for suspension. The goal is to prevent the spread of criminal content and activities online through monitoring social media data and flagging problematic accounts.
1. Every decision made about information is a filter that shapes reality. When classifying or structuring information, professionals are asserting power over what information is organized and how.
2. No information filter is neutral - they all reflect biases and choices about what to include or exclude. Indigenous communities have suffered from biased filters in colonial archives, so tools like Mukurtu are being developed through community partnerships.
3. Professionals have a responsibility over the power of information filters and must ensure biases are not amplified to disempower groups. While machines can help, humans cannot outsource accountability for information outcomes and consequences.
This article written Diarmaid Byrne, Editor, STQ, was published in issue 08 of the Social Technology Quarterly.
Summary: In the face of rising demand for data, privacy and ownership become a critical concern as vast amounts of data are accessed and bartered without the knowledge of people. In such scenarios, it is crucial to determine practices towards maintaining privacy.
The Authority of Government in Clearing Hatefull and Hostilities Electronic I...IJECEIAES
The Act Number 19 of 2016 concerning the amendment of The Act Number 11 of 2008 concerning Information and Electronic Transaction governing the authority of government in clearing hateful and hostilities electronic information based on tribe, religion, race and intergroup. On the one hand, the government authority aims to protect the public interest and the integrity of the nation, but on the other hand, termination of access to information would restrict the right to freedom of opinion and the right to privacy of Internet users. This study was a normative legal research, which examined the basic authority for the government to shut down negative content in cyberspace. Legal materials were collected through library research. The analysis was conducted qualitatively. This study examined three issues, namely; spreading hatred and hostility in cyberspace, legality government to close the spreading hatred and hostility and electronic evidence in spreading hatred and hostility. Spreading hatred and hostility were criminal acts that used the Internet as facilities. Internet was used by extremists to disseminate his teachings, even being used to commit acts of terrorism (cyber terrorism). In maintaining the unity and integrity, then the government had the authority to shut down access to the unlawful electronic system. The closure should be accompanied by proof of electronic information that contains hatred and hostility based on tribe, religion, race and intergroup.
This document discusses how social media and technology have changed personal privacy and information security. It explores how businesses and governments now collect vast amounts of personal data from social media sites and online activities. This data collection often happens without users' knowledge or authorization. The document also examines how social media has changed communication behaviors. It recommends that privacy organizations educate the public on online privacy risks and lobby for laws to better protect individuals' information privacy.
Similar to Political Implications of Data Doubles.pdf (16)
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
2. What makes data have political qualities
01
The concept of data doubles
02
Checklist
03
What makes data a social and political issue?
04
Example from literature
05
Example from today's world
06
"...you are the sum total of your data" - Outro
07
"...you are the sum total of your data" - Intro
00
A digital duplicate of our lives
captured in data and spread across
assemblages of information systems
Data Double?
3. "you are the sum total of
your data"
Dataveillance
Dataveillance
Dataveillance
and
and
and
Countervailance
Countervailance
Countervailance
Is raw data
sufficient to be
'consumed'
directly?
Dataveillance: the practice of monitoring digital data
relating to personal details or online activities.
Countervailance: offsetting an effect by countering it
with something of equal force
4. One that allows for some flexibility
in design which is leveraged
various interest groups to design
artifacts that shape the social order
in a particular way, that maintain,
change, or redistribute power
arrangements in a community.
Two ways in which artifacts may have political qualities:
When you have a choice in whether
you wish to design/deploy it, or not.
But once you commit to that choice,
a particular social and political
order will follow.
Various interest groups (major
organsisations, governments,
international bodies vie for quality
data to mould the world in their
preferred way.
Many policies are formed using
collected data, predictions and
even narratives are based off of it.
5.
6. Surveillance technologies do not monitor people qua individuals but instead
operate through processes of disassembling and reassembling. People are broken
down into a series of discrete informational flows which are stabilized and captured
according to pre-established classificatory criteria. They are then transported to
centralized locations to be reassembled and combined in ways that serve
institutional agendas. Cumulatively, such information constitutes our “data double,”
our virtual/informational profiles that circulate in various computers and contexts of
practical application.
Google
Announcement-
Dec 2009
personalized according
to fifty-seven signals,
among them location,
machine and browser
information, and prior
search history
7. The structure so far
1) Who is making the decision?
2) Who is designing?
3) What is it designed for?
4) How it arranges/rearranges (existing) social relations?
5) What are possible and actual use cases?
8. Why data is a
social and
political issue?
Because not only it concerns anyone who is connected
to the Internet but also because it reconfigures
relationships between states and citizens.
I will let them collect my data as it will be
used for my customised internet experience
Oh my sweet summer child
9. "Data enacts that which it represents"
There has never been a state that had command over such
granular, immediate, varied, and detailed data about
subjects and objects that concern them
#cambridgeanalytica #uselections #ukreferendum
Data is not only shaping our social relations, preferences,
and life chances but our very democracies
Focus on
politics of data
Atomism
Immediacy
3 Shortcomings:
1.
2.
3.
10. "Your genetics, your personals, your medicals, your psychologicals, your police-and-
hospitals. It comes back pulsing stars. This doesn’t mean anything is going to happen
to you as such, at least not today or tomorrow. It just means you are the sum total of
your data. No man escapes that"
White Noise (1985)
11. (1) Even established democracies might decay. There is a risk that surveillance capacities that are used
for democratically legitimated purposes today will be used for poorly legitimated purposes in the future.
(2) Surveillance may be used to enforce laws that lack legitimacy due to the disproportionate
punishment attached to their violation.
12. Anti-hijab protests in Iran
Actions taken by Iran's so called"Moral Police"
Tracking protesters by their faces and detaining their families and other suspected friends (they had
their social network data), banning their mobile numbers, diservicing utilities etc.
Blanket ban on Internet usage.
Punching school girls trying to peacefully organize by tracking their locations and
'Pushing' fake videos & photos of people attacking mosques to counter the traction of people joining
protests, etc (Changing the narrative in their favour)
1.
2.
3.
4.
13. Google decides what news I read,
and in the long term it would have
made a tremendous effect on
what my beliefs and personality
are.
My contact number is sold out to spammers
14. Apparetly, I am a millionare
Goodmorning sunshine,
its time for your daily spam messages
15. Credit card fraud (stealing of credit
card numbers)
Selling email addresses to
advertisers / other services
Auto-spam of email contacts
Sharing/selling personal information
to advertisers
Selling personal information to 3rd
parties for aggregate data collection
.......and so on
16. "you are the sum total of
your data"
Is raw data
sufficient to be
'consumed'
directly?
It is, and it is
being done as we
speak.
Dataveillance
Dataveillance
Dataveillance
and
and
and
Countervailance
Countervailance
Countervailance
This means your data double may not be the
exact replica of who you are, but, it sure is
enough to put you into the space where you can
be influenced across all dimensions, which in
effect, is actually what counts after all.
Therefore, you are the sum total of your data.