POST 1: Creating a data set using secondary sources

Article 1: New data retention laws begin today, this is what you need to know

The author of this article is Harry Tucker, a technology reporter in news.com.au. He does not an expert on the field but generally passionate about any technological topic. The motivation of this article is to inform Australians about the introduction of the new data retention scheme and how does it affecting the audience. The article states mostly fact as it builds up a background story before discussing about its impact. The standpoint of this article remains unbiased but instead provoking the audience’s awareness to the topic. The author sits in a neutral attitude towards the effect of the scheme. Instead he addresses quotes from different public figures and organisations such as Tony Abbott and Edward Snowden. The information was listed and allow audience to decide their own voice.

 

Article 2: How your phone tracks your every move

The reporter for this article is Will Ockenden, who is a general reporter works in ABC interested in technology, cyber-security and science. The author was motivated by the effectiveness of tracking digital footprint after the announcement of the new data retention law in Australia. The author had written in total of 44 articles mainly revolve around cyber-security issues. This article has positioned themselves as a test subject and visualise the experience of being tracked in victim’s perspective. The analysis is written based on real life data of the author and visualising the data through data mining technique like pattern recognition into diagrams. Compare to other articles with similar topic, instead of generally provide information and quotes from professionals about it, this article implies the power of the data retention law by recording a footage of experiment with the given context (the author in this case).

 

Article 3: As surveillance gets smart, hackers get smarter

This article is written by Monqiue Mann, who is a lecturer of School of Justice in Queensland University of Technology and also a member of Australian Privacy Foundation. The injustice side of the data retention law motivated the author to write the article comparing the surveillance system and the hackers. This article is appear to be biased towards the injustice issue of accessibility of the privacy and go against the data retention law. The articles lacks of solid facts to support the argument on either side. The effectiveness of the new data retention law is doubted in the author’s position.

 

Article 4: How Do Advertisers Track You Online? We Found Out

Simon Hill, the author for this article, is a freelance technology journalist and editor passionate about technology. Most of his article contributions are about tips and recommendations on mobile technology with minor articles discussing about issues on online privacy. Through those articles, I believe he is motivated on how to improve life satisfaction through mobile technology. Hill is no expert himself but in this article he uses lots of quotes from different experts to support his statement. This article is factual as it uses and defines new terminology along the way and provides audience sufficient knowledge about the topic before moving on. Hill is positioned himself with the expert’s point of view and wants people to become aware of the existance of online tracking. Similarly to other articles, it aims to point out things and emphasis it if people not already aware of the issue.

 

Article 5: The IoT threat to privacy

Christine Bannan is a third year student at University of Notre Dame Law School and she posted an article about the relation between IoT(internet of things) and privacy. Though she is not a professional editor, she has proven her ability as the winner of the 2016 Edelson PC Consumer Privacy Scholarship. Her motivation for this article is driven by the concern of the IoT privacy issue after revealing one of the Samsung privacy policy – warn consumers do not discuss sensitive topics near the device. There is no reference or quote from other professional body on this article, so this article is only see as a opinion based. Unlike other articles where they uses a lot of different reference to support their statement in order to increase to integrity. She positioned herself as an advisor where suggest a concern that would eventually causes greater issue based on her knowledge. I agree with her statements but I believe more fundamental information is required to create a more structured and deep discussion.

Reference

Tucker, H. 2015, New data retention laws begin today, this is what you need to know, News.com.au, viewed 16 August 2016, <http://www.news.com.au/technology/online/new-data-retention-laws-begin-today-this-is-what-you-need-to-know/news-story/28ea2dc1b01d15e53f474e21b6d68501>

Ockenden, W. 2015, How your phone tracks your every move, ABC, viewed 16 August 2016, <http://www.abc.net.au/news/2015-08-16/metadata-retention-privacy-phone-will-ockenden/6694152>

Mann, M. 2016, As surveillance gets smart, hackes get smarter, The Conversation, viewed 16 August 2016, <http://theconversation.com/as-surveillance-gets-smart-hackers-get-smarter-62773>

Hill, S. 2015, How Do Advertisers Track You Online? We Found Out, Digital Trends, viewed 18 August 2016, <http://www.digitaltrends.com/computing/how-do-advertisers-track-you-online-we-found-out/>

Bannan, C. 2016, The IoT threat to privacy, TechCrunch, viewed 18 August 2016, <https://techcrunch.com/2016/08/14/the-iot-threat-to-privacy/>