Post 3: Online privacy stakeholder mapping

Written by Jiahui Li (nancy)

Screen Shot 2016-08-28 at 8.36.31 PM
(group 28 2016)
IMG_7011
(group 28 2016)

 

These are the stakeholder maps we develop in our group. In terms of the mindmap section, we still working on online privacy and data security issue, the maps help us clean up all the possible stakeholders we can look at in the next few stages, as well as the value share between some of the stakeholders.

  • For users (no matter public or private) they have the same position feel scared and against hackers
  • For some technology companies and the government they are one the same boat for business and management
  • Users and Government/Business are opposite; they don’t want share their personal information

 

  1. The Search Giant

    bc83389394911.5602de2e7b63d
    (Fisher 2011) “The Search Giant”

    This illustration is called The Search Giant. Julie Fisher came out this illustration that information can be tracked and people can be found through the internet. When you look at the image, it makes you feel creepy and paranoid, as well as present the idea and connecting the man to being followed on the internet. The idea of the spider comes from the ideas of internet, which already very popular in everyone’s life.

    On the other hand, you can become stuck in the world wide web, the predatory nature of some giant corporations, can be perceived as an ominous presence, the fact that they are useful but potentially dangerous as a spider in the center of a web knows exactly where the ‘flies’ are – alluding to a notion of being tracked and finally spiders don’t blink and have many eyes in which the word google is reflected.

    The image reflected the serious problem on how information online are easily accessible and controllable involved personal and business. In my pervious research, I have shown few articles that can confirm online privacy and data security already too common to exist in current society.

 

2.Lies, damned lies, and statistics.

45facf5e71eb8ad3f0eaa1f5de30f68d
(Levin 2016)

“Lies, damned lies, and statistics.” — Mark Twain

Why you should lie as much as possible on your Facebook profile? We all know the purpose is prevent the identity thief online. This image is created by Vincent Mahé and used in Adam Levin’s article “ Scared of identity theft? Tell lies on Facebook.”

In this image, the man is Selfie at home with the family plant, cool drink and the naked upper body. He is trying to show others he was enjoying his holiday outside, obviously he lied.

Had Facebook existed then, people’s rights (ie. identity privacy information) have been violated. So people like to puff up their egos on social-networking sites to protect their own information, they believe this is the most expedient way.  People lie on Facebook to not only make themselves look good, but to feel better about themselves. A 2014 study found that a fifth of young Facebook users admitted to lying on the site about things such as relationship status and job promotions.

This is a powerful data to explain how people feel with online privacy.

3. Eyephone

9446d89396599.5602db893cb86
(Fisher 2011) “Eyephone”

This illustration is from the same illustrator I had before – Julie Fisher. She looked into the issues surrounding the development of new technologies and their effects on social life and generation divides. This piece called “EyePhone”, which be named with the homophonic word of “iphone”.

The inspiration of this illustration is come from the radio news. The radio has told “Iphones+Ipad’s that track your location and updates when synced to a computer.”

Besides, she has done some research and the basic problem is if someone steals your mobile they could find out exactly where you have been using a simple computer program. This will put you in danger such as stalking, blackmail and jealous spouses following you. As you can feel the technology and current situation are a bit fearful which is shown through the graphics (ie. arrow, eyes in mobile, colour and hands) out the places where the man has walked.

I’ve watched a video before which is shown “how wifi tracking a smartphone can be used by retailers to covertly learn about their visitors,” but this illustration looks more effective.

4. lPRISM surveillance

Digital privacy, Internet Surveillance and The PRISM - Enemies of the Internet
(Kumar 2013)

Digital privacy, Internet surveillance and the prism-enemies of the Internet are presented in this image.  In this image the man is afraid of all the technology devices he own. He try to close the door to avoid internet surveillance. These huge eyes are staring at his life and his actions. Online surveillance is a growing danger for journalists, bloggers, citizen-journalists and human rights defenders.

On the other hand, the text in the images: “ you can trust government” made the man more afraid. In the article, which the image belong to has pointed out that lPRISM surveillance scandal has consumed the Internet as the implications of massive scale U.S.

The most serious situation is the NSA got direct access Google, Facebook, Apple, Yahoo and Microsoft servers which allowed it to harvest internet usage details of millions of unsuspecting American citizens. All public knows about it, and they are outraged like what shows in the image.

5. Delete cookies?

privacy-cookies
(Abu 2015)

Same with the image, many people think if they clear their cookies and browsing history and delete their history will protect their identification data, however there are still have many technologies that allow companies to identify you even after doing that.

Some big companies are dedicated to collect as much data as possible on users which they later sell. Even the information you think not important to you, they will collected to analysis your other personal information.

On the other hand, I also mentioned in my research before, many companies are losing credibility which caused by their own attitude for online privacy.

Therefore,tracking is all over the place and very hard to stay far away.

6. The cloud

0a835e9392865.5602dda5690f2
(Fisher 2011) “The cloud”

 

The image “The Cloud” has communicated the idea behind is showing a potential conflict in power and privacy. Perhaps it is easier for him to connect to his work than his children. In this image a man is on holiday in north east England with his children, but he is caught up in the cloud and his work in London which takes a greater precedence in his life.

As soon as he is on the internet, no matter his location, he’s location is at his office. Different with before, in this piece, if his location been tracking, will help him hide his current location and left more time with his family.

That’s what technology do sometimes with good effect.

7. Ads with Eyes

6ba6089396337.5602de438f29b
(Fisher 2011) “Ads with Eyes”

This illustration is called “Ads with Eyes”. The illustrator has been reading about computers that can scan your face when you walk into a building or shopping centre and analyze your information such as your age, your mood and then (although this is in development) deduce what kind of advert would be best suited to your tastes and thus be more effective as a campaign. As you can see, the tech is trying to analysis the man: he is herather harried, stressed and the camera suggested him to the coffee shop. This is similar with one of the video I have watched on vimeo is shown “how wifi tracking a smartphone can be used by retailers to covertly learn about their visitors,” when you shopping in the shopping centre, they know where you have been.

8. a new balancing of privacy

f76bb477699e2abc376157a065ffd4bb
(Liu 2016)

 

The image is created by Thomas Leuthard, it been published in the article The Wearable Revolution: Drawing the Line Between Exciting New Tech and Privacy. The huge face are watching peoples action and where are they going.

The author of the article aims to find the great deal of discourse about balancing tech revolutions and personal rights and boundaries. According to that, the perspectives are listed on three different sections: 

  • Start with the issue of Google Glass and similar wearables has raised serious privacy concerns among consumers and business owners.
  • Introduced eyewear cameras.
  • Balancing innovation and invasion: Wherever people land on issues about privacy, it is exciting to be surrounded by so many innovative devices and watch how they are transforming the world.

We cant live without technology. The idea of wearable technology is represented a new balancing of privacy issue and new tech.

9. The things you revealing online is much more than you think

fe1da2bb1516315c5b18d65794cebbfa
(Ha 2015)

This illustration shows the meaning of “The things you revealing online is much more than you think.” The inspiration of the image is from a TED video talk. When you working online, how little you know? and how much others know.

Also they have discussed what the web knows about you, and what we can do about the things we’d rather it forgot. If go back to my pervious blog post, I have discussed people’s attitude on online privacy. Business and people not pay attention to data protection led to Privacy disclosure: correct business operations and data protection method.

10. Clues in the Cloud

illo5-half-L
(Clues in the Cloud 2015)

This artwork is from “Clues in the Cloud” — a multi-media art piece that combines visual illustrations, audio recordings and poetic prose. They have seven sections to explores a different aspect of privacy in the digital age.  It has stated that the benefits of technology are not always clear, so the studio use illustrations to explain “what is privacy and how does it affect our lives?”

In this image, a female nude is exposed public with a huge number of eyes as the background. When we are texting all the powers that may be are surveilling our action at day and night.

Because of most of people cannot stop data surveillance, the girl in the image is praying privacy could be here to stay.

REFERENCES

Abu, L. 2015, Stands’ Stand on Privacy, Stands, viewed 28 August 2016, <http://blog.standsapp.org/why-privacy-matters/>

Clues in the Cloud, 2015, viewed 21 August 2016, <http://cluesinthecloud.com>

Fisher, J. 2011, Exploring the way technology in the UK is changing social interaction, Bechance, viewed 28 August 2016, < https://www.behance.net/gallery/1341063/A-Visual-exploration-of-social-Techonogies>

Ha, TH. 2014, What are you revealing online? Much more than you think, viewed 20 August 2016, <http://ideas.ted.com/do-you-know-what-youre-revealing-online-much-more-than-you-think/?utm_campaign=social&utm_medium=referral&utm_source=facebook.com&utm_content=ideas-blog&utm_term=technology>

Kumar, M. 2013, Digital privacy, Internet surveillance and the prism-enemies of the Internet, The Hacker News, viewed 20 August 2016, <http://thehackernews.com/2013/06/digital-privacy-internet-surveillance.html>

Levin, A. 2016, Scared of identity theft? Tell lies on Facebook, wired, viewed 20 August 2016, <http://www.wired.co.uk/article/facebook-privacy-adam-levin-social-media>

Liu, Z. 2016, The Wearable Revolution: Drawing the Line Between Exciting New Tech and Privacy, wired, viewed 28 August 2016, <http://www.wired.com/insights/2014/01/wearable-revolution-drawing-line-exciting-new-tech-privacy/>

Advertisements