We Are Data: LJ2

    After reading parts of this book by John Cheney, it is clear that there is data collection in every aspect of our lives. The title quite literally says it all; we are data, and we are the ever-increasing information that is gathered and analyzed to create more automated systems in our society. The google automated "Celebrity Filter" is an example of how google used an automated function to determine what names were popular and what names are to be removed from the search results. With all machine learning, this comes with its downsides. For example, Cheney explained how Rhianna of course shows as a celebrity but her real name Robyn Rhianna Fenty does not meet the criteria. As Cheney states "The distinction is intriguing because it shows a gap, a separation that exists primarily at the level of knowledge. In this case, google isn't really assessing "fame". Google is creating its own, proprietary version of it." (Cheney, Preface 11).

    Any operating systems you are on, browser, network, and location are all bits of data that will be passively collected upon browsing the internet and performing searches. This is another example of how information is constantly being collected for the use of convenience, security, and advancing our technological system. The data is of use for convenience because our browsers are regularly taking note of what we search and 9/10 you get ads reflecting your recent search history. Or for example, the government tracks search history and location for actively seeking out terrorist criteria, and this helps the Central Intelligence Agency for pointing out potential suspicious behaviors. 

    The constant looming thought of being tracked is not a very settling thought. However, most people do not have anything to hide and mostly use the internet for the purpose of learning, school, interaction, etc. For those who use the internet in more devious ways, the knowledge of how involved other parties are in your searches and activity can create a deterrent. The ethics of this can be seen from both sides, while it is mostly with good intention that this data is tracked and used, it can also be a breach of privacy and sometimes the data can be used for less than essential means can possibly be involved in a data leak. 


Reference:

Cheney-Lippold, John (2017), We Are Data, "New York University Press," 978-1-4798-5759-3

Comments

  1. Hi Tate, I think that our data being out in the open is definitely a looming and uncomfortable thought. However, you're right that most people have nothing to worry about, and if anything it can prevent people from posting harmful or hurtful things about others. Ethics is a big component I think, and I hope the good intentions outweigh the bad.

    ReplyDelete
  2. Hello, Tate!
    The same quote about Google creating its own manufactured version of fame stood out to me as well. This is interesting when you consider the possibility that other search engines are probably executing their own type of algorithm. This could lead to an almost infinite amount of online personas generated by algorithms, all slightly different, without any real input or reflection from the user.

    ReplyDelete
    Replies
    1. Most search engines are executing their own algorithms. I am sure these algorithms are stemmed off one another with little adjustment. These false identities drive factual data, data that the normal individual may question.

      Delete
  3. Hi Tate, I loved your analysis! I didn’t realize that for users, the gathering of data can be a deterrent for bad behavior. The article explains that “In a diagram of web surveillance, we encounter the metaphor of "one-way mirrors," in which Internet users remain ignorant of how their data is used while site owners are privileged with near-universal access to that data” (Cheney-Lippold, 2019). In this analogy, one thinks of the interaction between user and site. However, you explain the interaction between different users being facilitated by a site. This incredibly more complex as the information provided by the individual may be enough for another user to take action with malicious intent, but organizations like you mentioned the CIA would take action. Instead of the collection of data being a security risk, it may actually help save those who put dangerously personal information on social media. In turn, this saves a lot of people and protects their security.

    ReplyDelete
  4. Hi Tate,

    I really enjoyed reading your blog post. I like how you touched on the thought of constantly being tracked. In essence, that is exactly what is going on with this data that is being stored, recorded, and analyzed based off or our digital footprint. You followed this up discussing how most people have nothing to hide, and that is why I will continue to use social media and the internet in the capacity I do now. However, having something to hide or not, what is going on is not okay.

    Really good post thanks for the read!

    ReplyDelete
  5. What we see and consume on the internet (surface web) is roughly 4% of the entirety of the internet. The internet is used in more devious ways than we can even fathom to think of. I would like to assume the government keeps track of actions in the rest of the world, watching for fraud, terrorists, drugs, and trafficking. However, our privacy as normal citizens suffers from such.

    https://techjury.net/blog/how-much-of-the-internet-is-the-dark-web/

    ReplyDelete
  6. Hey Tate,
    This was an amazing blog post, the thought of constantly being tracked can possibly weigh a lot on the mind, especially the fact that there isn't much you can do to go "incognito". I also like how you pointed the significance of machine learning. Machine learning plays a large role in what public information is relevant, and what information isn't.

    ReplyDelete

Post a Comment

Popular posts from this blog

Third Learning Journal

Assignment 3