Post 3: Mapping the participants (human and non-human) and constructing an image archive

Class Exercise: Mapping the participants (Human and Non-Human)

In the class, we developed and produced a map of data stakeholder by classified human and non-human issues. Before we undertook a deep analysis and focused on a particular issue, we first divided data into major categories such as social media, online, law enforcement, hackers, finance, government agencies etc. It was a very beneficial exercise to categorise first so we can start seeing patterns and by dividing them into subcategories it helped us to understand the major and minor issues of data in each category.

At the initial stages, we were concerned about our social media privacy and found it interesting how each of us has our own privacy concerns on social media but we are not concerned about how third party Government Agencies or Bank, Medicare or opal require personal information. After researching, we discussed our data privacy in groups and shared our insights and knowledge about data privacy.

We are happy to share our moments and memories on social media, even with the government overlooking. Police and Law Enforcement track everyone on social media, using the information they’ve gathered from Medicare, our finance history, and emails, to catch the criminal or terrorists – and informing the public that it is a necessary measure, despite we all knowing data has both positive and negative sides. Maybe it is too literal to talk about this issue but it is one of the major issues. Some experts strongly believe we are actually very helpless in front of government because there is nothing we can do it or control it.

For the next step, we got really interested in categorising political proximity issues and branching out more critically to find out the real branch and how the government controls data. A paradox is we are generally critical of hackers who can steal our data, but the government is similarly saving and storing our data. To look at the census issue where the government forced us to give him all our personal detail to them and at the same time system was hacked.

So our question to the government is:

WHERE THEY ARE SAVING OUR DATA AND WHY THEY ARE NOT EXPLAINING TO US PROPELRY AND HOW GOVERNMENT SAVING OUR DATA? IS THIS DATA ONLY FOR NATIONAL SECIRTY OR WHAT ELSE IS IT USED FOR?

This was a key insight for us and enabled us to dive straight into our next step. We found an in the USA called Area 51 where no one knows what is happening there. It is a very critical issue to think about especially now after the census attack as the government is saying to us they are saving our all data and looking at our own personal stuff for national security. The media, many of data experts, social experts who are fighting and arguing the way the government is controlling us and we should have at the certain level of privacy. The people who are very aware of data are trying to defending, fighting our human and civil rights.


10 Images Archive:

Figure 1: (Terms of Service:Understanding Our Role in the World of Big Data, Michael Keller & Josh Neufeld 2014)

Big data is controlling us. Especially in this world, we are controlled in our life by social media such as Facebook, Twitter, LinkedIn, and Instagram. Google or Icloud is one of the huge part of data storages, where we keep and store our personal data. Big companies like insurances, Medicare and financial banks -keep our very personal data. As we know it does have good and bad effects. We tend to use our online bank instead of cash. Maybe it is time for us to be concerned about the terms and condition with those social media platform. This is a very engaging and funny comic where Cartoonist Josh Neufeld and reporter Michael Keller create a comic and tried to make a concern in our society what we are achieving with big data what we are not. Because pretty soon we will all have the same sickness, which is already growing with a human being.

63190b4492559c5f6e05ad7ac2b0490f

Figure 2: (Intercepting Communications of Americans, n.d)

This graph, which was published by the NSA, illustrates their secret transition in 2001, called ‘TRANSITION 2001’. This report shows the strategy of data in 21st Century, showing that it is owned by governments – our data is no longer owned by us.

NSA technician installed their system through the whole country including main key junction points and big and major telecommunications, traffic control. Those two image shows how NSA set up their system through the entire country (image 2) and also (image 1) shows the general public passing through their entire system, which is a threat to our personal data ownership.

 

1540ce5a959521c33ace6428ba0b3e5a

Figure 3: (Prism Collection Details, Dan Seifert 2013)

The US National Security Agency and Federal Bureau have been controlling and keeping our data via our email, social media, online documents, youtube etc.

According to The Guardian and The Washington Post, this programme was delivered by ‘career intelligent officer’ which is an intrusion into our private life. It also shows the list of blog company who is part of this such as Google, Microsoft, Yahoo, Facebook, Paltalk, YouTube, Skype, AOL and Apple.

Prism programme is providing the biggest data to the government, around 1477 last year. NSA is going beyond and above all the laws and collecting data including all the big companies including Microsoft who joined with the government in 2007 but where Apple held out for 5 years. Google declined to take part of this prism programme with government and to show their care about users data.

Figure 4: (Online Surveillance Mood Board & Constructivist Posters,TearKnee 2013)

This is very interesting how this Russian thought process highlights the true picture of online data surveillance. He made a mind map for online surveillance and created an outline for the major issue of how we been followed by every major company and government. He used three colours red, white and black to make it very clean, simple, bold, strong and eye-catching to symbolise ‘THE EYE’ of the nation. He tends to use a very striking and sharp typography which also enhances old-style Russian propaganda.

bbea6ec2672f623f2269bc0e45f1f898

Figure 5: (Customer Data: Designing for Transparency and Trust, Timothy Morey, Theodore “Theo” Forbath and Allison Schoop 2015)

This survey conducted United States, China, India, Great Britain and Germany shows surprisingly how citizens do have their privacy concerns and are willing to pay to protect their privacy. This survey shows how much they are willing to pay approximately per person US$ 2014. This surveys data designed to show the customer transparency and trust and value of their data as well.

anti-nsa-protest-calls-for-end-to-us-spying

Figure 6: (Demanding and securing online privacy,Zachary Wolfe 2014)

Census, which creates a big awareness in our society, shows how the government are officially collecting our data. This image shows how people are concerned and created awareness to the government to inform them stop watching us all the time. The government, Google, Apple including all the big companies also make dramatic statements against government surveillance which also shows a threat to a government as well. However, government or any agencies can store our data for national security but there should be certain limits for citizen where we should have some privacy and humans rights as in citizen in the world.

ccccdda50b167e2418d0efb21d570c73

Figure 7: (Native-Intelligence: Awareness and Humor, Charles A. Filius 2011)

Charles A. Filius who is extraordinary cartoonist represent the data awareness to the people in a humorous way and how we should be concerned to protect our data on a daily basis. Data is a big word but it is so complicated to understand the depth and complexity of it. The purpose of the poster is to bring attention to the people using very simple and bright colour visual approach. It is true for most of us that we never clear our history or want to know where our email is saved. It is a very engaging and clever approach to people to create a very perspective challenge in our modern life.

 

Figure 8: (Customer value: medium. BA thesis, Yves (Khay Redd) Krähenbühl 2016)

The designer Yves completed a thesis to show how much researching Google, engaging with our financial company bank, our daily activities like groceries, and shopping has been collected and so on. He creates a very high and clever visual approach to people to understand the depth of data. He has been collecting his own data from 30.10.1999 to 02.04.16 and branch out all the detail of his data which create 432 thick pocket book.

It is another very intelligent approach to show people amount of data been collected from years to years and it is a big threat to us. We still don’t know how to prevent this because it is impossible to live without it but still if we take one step at one time we still can protect our privacy.

725913c7c7c2ee0a20d185a225b34e90

Figure 9: (Awareness Poster: Cyber Wars Are Coming, Vigilize 2014)

This poster has been created to increase social awareness of cyber crime. It brings a perspective that we have already been hacked by our bank, our social media, Medicare or opal travel card but for hackers, the school is next. They are trying to hack students, parents, teachers, faculty and so on. It is not that far in the distant future that we are going have cyber attacks soon and we need to have a solution now to fight this future situation.

ap_privacy_f2

Figure 10: (Why Privacy Is Actually Thriving Online, Nathan Jurgenson 2014)

This image shows how our privacy is getting lost through using social media. It is dead and it is not only government or NSA it is part of human fault as well. When we are travelling, going to concert or even when someone posts a delicious meal on Facebook, we tend to hit the like button, and when taking our own photos and sharing those in public without any hesitation. Some of our lives we want to keep it open and other parts we want to keep it hidden, like a fun dance or a seductive game, like the author explained.

by Ayesha Mira


References:

Keller, M. & Neufeld, J. 2014, Aljazeera America, viewed 18 August 2016,
< http://projects.aljazeera.com/2014/terms-of-service/#2>.

Domestic Surveillance Directorate n.d., Domestic Surveillance Directorate, viewed 18 August 2016, < https://nsa.gov1.info/surveillance/>.

Seifert, D. 2013, The Verge, viewed 18 August 2016,
< http://www.theverge.com/2013/6/6/4403868/nsa-fbi-mine-data-apple-google-facebook-microsoft-others-prism>.

Knee, T. 2013, Tear Knee Design, viewed 18 August 2016,
< https://tearkneedesign.wordpress.com/2013/02/20/russian-constructivism-online-privacy/>.

Morey, T. , Forbath, T. & Schoop, A. 2015, Harvard Business Review, viewed 18 August 2016,
< https://hbr.org/2015/05/customer-data-designing-for-transparency-and-trust>.

Wolfe, Z. 2014, Liberation, viewed 18 August 2016,
< https://www.liberationnews.org/demanding-securing-online-privacy/>.

Kabay, M.E. 2011, Network World, viewed 18 August 2016,
< http://www.networkworld.com/article/2202938/security/native-intelligence–awareness-and-humor.html>.

Redd, K. 2016, Behance, viewed 18 August 2016,
< https://www.behance.net/gallery/40095865/Customer-value-medium-BA-thesis>.

Vigilize 2014, Infotex, viewed 18 August 2016,
< http://my.infotex.com/awareness-poster-cyber-wars-are-coming/>.

Jurgenson, N. 2014, Wired, viewed 18 August 2016,
< https://www.wired.com/2014/03/privacy-is-dead/>.

 

Image:

Figure 1:

Keller, M. & Neufeld, J. 2014, Terms of Service:Understanding Our Role in the World of Big Data, Aljazeera America, viewed 18 August 2016, < http://projects.aljazeera.com/2014/terms-of-service/#2>.

Figure 2:

Domestic Surveillance Directorate n.d., Intercepting Communications of Americans, Domestic Surveillance Directorate, viewed 18 August 2016, < https://nsa.gov1.info/surveillance/>.

Figure 3:

Seifert, D. 2013, Prism Collection Details, The Verge, viewed 18 August 2016, <http://www.theverge.com/2013/6/6/4403868/nsa-fbi-mine-data-apple-google-facebook-microsoft-others-prism>.

Figure 4:

Knee, T. 2013, Online Surveillance Mood Board & Constructivist Posters, Tear Knee Design, viewed 18 August 2016, < https://tearkneedesign.wordpress.com/2013/02/20/russian-constructivism-online-privacy/>.

Figure 5:

Morey, T. , Forbath, T. & Schoop, A. 2015, Customer Data: Designing for Transparency and Trust, Harvard Business Review, viewed 18 August 2016, < https://hbr.org/2015/05/customer-data-designing-for-transparency-and-trust>.

Figure 6:

Wolfe, Z. 2014, Demanding and securing online privacy, Liberation, viewed 18 August 2016, < https://www.liberationnews.org/demanding-securing-online-privacy/>.

Figure 7:

Filius, C. 2011, Native-Intelligence: Awareness and Humor, Network World, viewed 18 August 2016, < http://www.networkworld.com/article/2202938/security/native-intelligence–awareness-and-humor.html>.

Figure 8:

Redd, K. 2016, Customer value: medium. BA thesis, Behance, viewed 18 August 2016, < https://www.behance.net/gallery/40095865/Customer-value-medium-BA-thesis>.

Figure 9:

Vigilize 2014, Awareness Poster: Cyber Wars Are Coming, Infotex, viewed 18 August 2016, < http://my.infotex.com/awareness-poster-cyber-wars-are-coming/>.

Figure 10:

Jurgenson, N. 2014, Why Privacy Is Actually Thriving Online, Wired, viewed 18 August 2016, < https://www.wired.com/2014/03/privacy-is-dead/>.