Privacy Part 1: Corporate Data Gathering: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
Line 23: Line 23:
; Privacy and data
; Privacy and data


* [http://www.wired.com/science/discoveries/magazine/16-07/pb_theory Chris Anderson, The End of Theory] (Wired appears to be having some troubles with their links this week, so if that doesn't work, try this [http://webcache.googleusercontent.com/search?q=cache:XkYbG5I9RtkJ:www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213+&cd=1&hl=en&ct=clnk&gl=us cached version].)
* [http://www.wired.com/science/discoveries/magazine/16-07/pb_theory Chris Anderson, The End of Theory] (Wired appears to be having some troubles with their links this week, so if that doesn't work, try this [http://webcache.googleusercontent.com/search?q=cache:ZTLbNugcikUJ:www.wired.com/science/discoveries/magazine/16-07/pb_theory+&cd=1&hl=en&ct=clnk&gl=us cached version].)


* [http://www.foreignaffairs.com/articles/139104/kenneth-neil-cukier-and-viktor-mayer-schoenberger/the-rise-of-big-data Viktor Mayer-Shoenberger, The Rise of Big Data]
* [http://www.foreignaffairs.com/articles/139104/kenneth-neil-cukier-and-viktor-mayer-schoenberger/the-rise-of-big-data Viktor Mayer-Shoenberger, The Rise of Big Data]

Revision as of 15:58, 1 April 2014

April 1

A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet governance. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online, our interests may fall to the interests of profitability, online behavior regulation, and cybersecurity.

Over the next two weeks we'll look at privacy, beginning with general concepts of privacy, how data is measured and gathered on the web, and some specific legal responses to privacy concerns. Next week we'll build on these concepts with an eye toward government surveillance and law enforcement.

Our own David O'Brien will be leading the class discussion this week.

Assignments

The deadline for Assignment 3 moved from March 25th to today, April 1st. Please upload your assignment prior to class today.


Readings

Conceptualizing privacy
Privacy and data
Corporate data practices

Optional Readings


Videos Watched in Class

Links

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 15:12, 7 November 2013 (EST)


This week's readings on privacy have been really thought provoking. Whether we have a 'right' to internet privacy is a tough subject to ponder, as we have no obligation to use the internet, thus making our use subject to a company's terms, yet there are also a number of other factors to consider. Some of the biggest concerns are that the "data collection" isn't merely studied but disseminated, and also that that collection doesn't end at internet usage. It infiltrates every aspect of our lives, with surveillance footage being taken unbeknownst to those being viewed. I'm not sure if it was in this class or in another discussion, but supposedly we're not far away from a kind of optical monitoring whereby stores can track what a shopper looks at most intently to cater advertising to them specifically. Where does this invasion of privacy end?

Adding to the links above, I found this article linked in one of the above articles. It's very informative and interesting.

http://query.nytimes.com/gst/fullpage.html?res=9E0CE3DD1F3FF93AA3575BC0A9609C8B63

Sidebar- loved the article by Veldt on LinkedIn... I, too, have always wondered HOW they can suggest people who I know in real life but with whom I haven't had any connection with via social networks or even e-mail.

Castille 16:33, 29 March 2014 (EDT)

Great questions on privacy, Castille, just to piggy-back on what you've brought up….
Data gathering will become more intrusive, especially as we advance technologically. This will impede on personal privacy to a point where it becomes a major issue. For example, Google glasses will open many avenues for companies to gather personal data.
But where do ethics come in?
Companies don't have moral ethics if it means they can convert personal data into potential profits. It may already be too late to legislate laws and then how do we enforce them? Its actually quite alarming how much personal information is available digitally and more to come as new devices (such as wearables) make it easier for companies (and other individuals) to exploit. Marissa1989 02:09, 31 March 2014 (EDT)
I agree, Castille, that thinking about online privacy is complicated by the fact that users agree to certain terms of use and are not truly compelled to use the Internet, though it is undoubtedly next to impossible for some of us to avoid. I think that in spite of this (in spite of the fact that we automatically check the box agreeing to these terms of use), people will always feel that they have the right to privacy at least in the sense of having the right to be left alone. The mentality may be that if I'm not doing something wrong, if my behavior doesn't effect other people, then I shouldn't be bothered, shouldn't be observed without very explicit consent, and shouldn't have to feel like I'm being watched. Jkelly 23:11, 31 March 2014 (EDT)

The data we can gather through automation is undoubtedly incredible. The weakness with big data lies in the quality - relying too much on the results spit out from the tools could lead to numerous mistakes. That’s when human intellect comes into play; real-time observation and analysis will be critical for spotting errors. Human ingenuity is the source of progress. Any company can better leverage the data available to them and generate a competitive advantage, as long as they’re equipped with inquisitive minds and critical thinkers who can best apply the data presented. Marissa1989 02:01, 31 March 2014 (EDT)


I too enjoyed the article by Veldt on LinkedIn. I am an active LinkedIn user but like Castille have been troubled by the connection- generating ability of a site that I have not linked to other social networks or connected to my email. LinkedIn use has led many friends and colleagues of mine to tangible professional benefits and opportunities- headhunters and recruiters rely increasingly on the LinkedIn pool for scouting talent. In the contexts of other readings this week, and the question of whether it is truly possible to "opt-out"- LinkedIn is one platform that I feel is worth the privacy trade-off. Indeed, as a recent college graduate, in the early stages of my career, I often find myself faced with the unsettling truth that limiting my internet presence and enhancing security features on social media platforms with an aim to preserve my privacy is actually detrimental to my professional, educational and personal goals. In the name of upward mobility and maximizing exposure to opportunities, we choose not too think to hard about just how LinkedIn knows "People You May Know." Indeed, as highlighted in an NYT article late last year [1], opting not to include a photo, complete a full profile and maximize the public reach of your profile in many ways defeats the purpose of being on LinkedIn in the first place. --Akk22 10:25, 1 April 2014 (EDT)

Not related to this week's lecture, but for those interested, a major revamp is in the works for copyright law in the UK, including the addition of a US-like fair use clause - Modernising Copyright: A modern, robust and flexible framework --Seifip 17:43, 31 March 2014 (EDT)



I ran across an article shared through Reddit this week and I think it relates somewhat to the topic this week. It describes how Dropbox is able to know when copyrighted content is being shared, without infringing on a person's privacy. It is able to do this by "file hashing against a blacklist." It's an interesting read, especially for someone like me who isn't too familiar with computer technicalities. You can find the article here: http://techcrunch.com/2014/03/30/how-dropbox-knows-when-youre-sharing-copyrighted-stuff-without-actually-looking-at-your-stuff/

Lpereira 19:58, 31 March 2014 (EDT)

I also saw a write up about this on Slate. What's interesting to me is this snippet: "It's almost impossible to find a service that stores your data but doesn't have a way to look at it with either human eyes or algorithms." People have concerns about actual employees at Dropbox looking at their stuff, but even the idea of algorithms "looking" can be unsettling. I wonder how much of this has to do with being uncomfortable with the idea that someone out there is rifling through your files and how much has to do with concern about computer programs, algorithms, etc. being presented as an impersonal solution to privacy problems. But even if there's not a who looking at your stuff, there's still a what, and the principle doesn't seem too different if you think of it abstractly. Jkelly 07:43, 1 April 2014 (EDT)

I can't say I was surprised by anything in Schneier piece ("Why 'Anonymous' Data Sometimes Isn't") about how easy it is to take "anonymous" information and attach it to a specific individual. The ease with which I can find someone online (on Twitter, Facebook, or other social media) with just two or three pieces of identifying information-- name, college he/she graduated from, workplace, username, etc.-- long ago left me assuming that anyone could do the same. When you factor in huge amounts of data and more sophisticated techniques to leverage that data, I wouldn't imagine anything would remain hidden. A few seemingly trivial bits of information can certainly add up very quickly. Jkelly 23:01, 31 March 2014 (EDT)


I really enjoyed the chapter from Daniel Solove's book in which he tries to develop a new understanding of privacy. One of the bits that resonated the most with me is where he writes "Instead of attempting to locate the common denominator of these activities [that are disrupted by violations of privacy], we should conceptualize privacy by focusing on the specific types of disruption." It's interesting to approach privacy based on the problems violations cause rather than the type of information or behavior associated with those violations. So, it's not about whether or not giving out my phone number violates my privacy but whether that generates an innocuous or malicious outcome. I think this dovetails nicely with the idea (from the article about variable online pricing, I think) that there's not one answer to the privacy problem because there isn't one reason it's happening. Conceptualizing privacy in such a way that it can apply to all situations and problems could easily abstract it to a point that the theories are vague to a point of meaninglessness. Jkelly 23:17, 31 March 2014 (EDT)


I really love the article "LINKEDIN: THE CREEPIEST SOCIAL NETWORK" that's written by David Veldt. I always wonder how social networks like facebook or linkedin know that I in fact know that person. And the advertisements that are on the right side of the facebook page are things that I am interested in. It is interesting how Linkedin is trying not to disclose to the users that they are tracking our search histories and might even our emails. Frankly speaking, I am not surprised that Facebook, Linkedin or even Google are tracking our personal information, as this is how their business work. Data gathering is a very important part for them to make money.


Is anything done or seen today on the Internet really private? With the introduction of “N=ALL” data and the “datafication” of various parts of life, information previously never even thought of being capable of quantification is now not only being able to be studied but also put into good use. The usefulness and practicality of Big Data is beyond what people can even imagine, from translating languages, fire prevention, to new ways of security, and even making it easier to rent a bicycle. Quantifying or the "datafication" of information can transform the way we operate as a society. Big Data can be described in terms of Petabytes. Then you have the different ways that Big data is collected; logging information such as mouse clicks (as Dataium does), analyzing census data, or CSS history sniffing are all methods of collection. Then you have companies like LinkedIn, Staples, and Amazon who provide different services or prices by utilizing peoples various “browsing history, geolocation" and other personal information.


While big data is extremely useful, one for the biggest downsides is the almost complete lost of privacy when searching on the web. But how does one define privacy? Its’ strewed across vague lines as when one uploads all their personal information, pictures, videos and what they are thinking are on Facebook, Twitter, and Google’s servers for them to survey and classify. Emmanuelsurillo 14:52, 1 April 2014 (EDT)


Bruce Schneier has another great piece that may be of interest: The Public-Private Surveillance Partnership. http://www.bloombergview.com/articles/2013-07-31/the-public-private-surveillance-partnership I'm always amazed at the level of detail you can gather about an individual from freely given information in exchange for grocery or gas discounts. The reality of today certainly seems to demonstrate that we value our privacy and data much less than we claim. VACYBER 14:59, 1 April 2014 (EDT)