Post 5: An interview and issue probe on online privacy

Written by Jiahui Li (nancy)

In this blog I have introduced my semi structured interview which help me further understand more about online privacy, as well as collected more personal experience around online privacy. Here the summary of the Interview:

1. How much you know about online privacy?

First I will first think my personal information. Actually I’m not sure the definition of online privacy, the thing I know is all about we need protect our privacy online. For example, If I use apps without checking their privacy settings or the settings on my device, then I might be say-bye to my personal information. And also online privacy risk exist in our life everywhere; we lost our personal data in different ways: when you sign in a new website, sign in a new social account, using booking system, applying job….

2. Do you usually using privacy setting for your mobile? why?

Yes, I do. I think I’m the person really don’t like talk with strangers. I remember once I was using a chat app to chat with my friend, I didn’t turn off the location; then I got a lot people from nearby to add me friends and talk to me which is very annoying. So I always check the privacy setting when I sign in with new webs/apps. Furthermore, privacy setting can help me hide the information I don’t want to show, and most of people can’t find it.

3. Are you always read Terms and Conditions before you sign online? Any suggestion to improve?

No, definitely not. I haven’t meet the person really serious about Terms and Conditions in my life. I only read them briefly when I sign something really important, such as bank, paypal…They are too long and all looks same. For example, the new Terms and Conditions for Apple ID achieved 49 pages, that not possible to read them in full. In terms of suggestions, I was thinking use visual graphic, but it hard too communicate the content.

4. What do you think all your drives connect together with could (iphone/ipad/mac/…)?

I have iPhone,ipad and mac at home, all my drives are connect together. I don’t think there something wrong with the connection. If I lost the information from one of this drive or someone stolen my phone, I can get them back. I know my information will easily exposed, but I still think it’s will bring me benefits more than harm.

5. Are you usually provide your real information when you sign in on website/store? Why?

Yes, I am. But still depend on what kind of website/store. If the website I only use for once, I will sign in with fake information (most of them need verify your email address which I have no choice). But I usually put the wrong phone number for all my sign in. For me, email address, gender, age not that important, but phone number is the most important personal information.

TAKE HOME TASK (PROBE) : After the Interview, I have handed out to my interviewee a take home task specific to “ How many junk email/promotion email you have received in one week?” 

Though the pervious stakeholder maps of online/data privacy can be identified the relationship between general users, government and business/companies. Government and Companies on the positive side share values, and users don’t want their information expose in public.  Although government and companies undertake to protect user’s privacy, they still stick their personal information without causing the user’s suspect which can be used as their own advertising.

 

The screenshot above came from the issue probe completed by my interviewee which recorded “How many junk email/promotion email you have received in one week?” In the screen shot shows she got 27 promotion emails from different stores/companies include bank and school in one week.  As she said, sometimes the amount of the email far beyond these numbers. The companies collect your information when you sign in, analysis your need; they know what you may interesting in and send thousands of email no matter your feeling. Their behaviour made most users feel disturbing. Though they never stop to contact with you, these promotion emails from different companies did not cause our attention, so most of them are unread. Therefore, a descendant trend of government/companies reliability has been pointed out by most of online users.

Five point summary:

  1. Most promotion emails from government and companies has disturbed user’s life.
  2. The similarity and complexity lead to people give up with Terms and Conditions.
  3. Acute dependence has existed in the connection between different drives.
  4. User’s vague understanding causes privacy disclosure.
  5. An interview/ primary research can help us open mind and further understand more about online privacy
Advertisement

Post 3: Online privacy stakeholder mapping

Written by Jiahui Li (nancy)

Screen Shot 2016-08-28 at 8.36.31 PM
(group 28 2016)
IMG_7011
(group 28 2016)

 

These are the stakeholder maps we develop in our group. In terms of the mindmap section, we still working on online privacy and data security issue, the maps help us clean up all the possible stakeholders we can look at in the next few stages, as well as the value share between some of the stakeholders.

  • For users (no matter public or private) they have the same position feel scared and against hackers
  • For some technology companies and the government they are one the same boat for business and management
  • Users and Government/Business are opposite; they don’t want share their personal information

 

  1. The Search Giant

    bc83389394911.5602de2e7b63d
    (Fisher 2011) “The Search Giant”

    This illustration is called The Search Giant. Julie Fisher came out this illustration that information can be tracked and people can be found through the internet. When you look at the image, it makes you feel creepy and paranoid, as well as present the idea and connecting the man to being followed on the internet. The idea of the spider comes from the ideas of internet, which already very popular in everyone’s life.

    On the other hand, you can become stuck in the world wide web, the predatory nature of some giant corporations, can be perceived as an ominous presence, the fact that they are useful but potentially dangerous as a spider in the center of a web knows exactly where the ‘flies’ are – alluding to a notion of being tracked and finally spiders don’t blink and have many eyes in which the word google is reflected.

    The image reflected the serious problem on how information online are easily accessible and controllable involved personal and business. In my pervious research, I have shown few articles that can confirm online privacy and data security already too common to exist in current society.

 

2.Lies, damned lies, and statistics.

45facf5e71eb8ad3f0eaa1f5de30f68d
(Levin 2016)

“Lies, damned lies, and statistics.” — Mark Twain

Why you should lie as much as possible on your Facebook profile? We all know the purpose is prevent the identity thief online. This image is created by Vincent Mahé and used in Adam Levin’s article “ Scared of identity theft? Tell lies on Facebook.”

In this image, the man is Selfie at home with the family plant, cool drink and the naked upper body. He is trying to show others he was enjoying his holiday outside, obviously he lied.

Had Facebook existed then, people’s rights (ie. identity privacy information) have been violated. So people like to puff up their egos on social-networking sites to protect their own information, they believe this is the most expedient way.  People lie on Facebook to not only make themselves look good, but to feel better about themselves. A 2014 study found that a fifth of young Facebook users admitted to lying on the site about things such as relationship status and job promotions.

This is a powerful data to explain how people feel with online privacy.

3. Eyephone

9446d89396599.5602db893cb86
(Fisher 2011) “Eyephone”

This illustration is from the same illustrator I had before – Julie Fisher. She looked into the issues surrounding the development of new technologies and their effects on social life and generation divides. This piece called “EyePhone”, which be named with the homophonic word of “iphone”.

The inspiration of this illustration is come from the radio news. The radio has told “Iphones+Ipad’s that track your location and updates when synced to a computer.”

Besides, she has done some research and the basic problem is if someone steals your mobile they could find out exactly where you have been using a simple computer program. This will put you in danger such as stalking, blackmail and jealous spouses following you. As you can feel the technology and current situation are a bit fearful which is shown through the graphics (ie. arrow, eyes in mobile, colour and hands) out the places where the man has walked.

I’ve watched a video before which is shown “how wifi tracking a smartphone can be used by retailers to covertly learn about their visitors,” but this illustration looks more effective.

4. lPRISM surveillance

Digital privacy, Internet Surveillance and The PRISM - Enemies of the Internet
(Kumar 2013)

Digital privacy, Internet surveillance and the prism-enemies of the Internet are presented in this image.  In this image the man is afraid of all the technology devices he own. He try to close the door to avoid internet surveillance. These huge eyes are staring at his life and his actions. Online surveillance is a growing danger for journalists, bloggers, citizen-journalists and human rights defenders.

On the other hand, the text in the images: “ you can trust government” made the man more afraid. In the article, which the image belong to has pointed out that lPRISM surveillance scandal has consumed the Internet as the implications of massive scale U.S.

The most serious situation is the NSA got direct access Google, Facebook, Apple, Yahoo and Microsoft servers which allowed it to harvest internet usage details of millions of unsuspecting American citizens. All public knows about it, and they are outraged like what shows in the image.

5. Delete cookies?

privacy-cookies
(Abu 2015)

Same with the image, many people think if they clear their cookies and browsing history and delete their history will protect their identification data, however there are still have many technologies that allow companies to identify you even after doing that.

Some big companies are dedicated to collect as much data as possible on users which they later sell. Even the information you think not important to you, they will collected to analysis your other personal information.

On the other hand, I also mentioned in my research before, many companies are losing credibility which caused by their own attitude for online privacy.

Therefore,tracking is all over the place and very hard to stay far away.

6. The cloud

0a835e9392865.5602dda5690f2
(Fisher 2011) “The cloud”

 

The image “The Cloud” has communicated the idea behind is showing a potential conflict in power and privacy. Perhaps it is easier for him to connect to his work than his children. In this image a man is on holiday in north east England with his children, but he is caught up in the cloud and his work in London which takes a greater precedence in his life.

As soon as he is on the internet, no matter his location, he’s location is at his office. Different with before, in this piece, if his location been tracking, will help him hide his current location and left more time with his family.

That’s what technology do sometimes with good effect.

7. Ads with Eyes

6ba6089396337.5602de438f29b
(Fisher 2011) “Ads with Eyes”

This illustration is called “Ads with Eyes”. The illustrator has been reading about computers that can scan your face when you walk into a building or shopping centre and analyze your information such as your age, your mood and then (although this is in development) deduce what kind of advert would be best suited to your tastes and thus be more effective as a campaign. As you can see, the tech is trying to analysis the man: he is herather harried, stressed and the camera suggested him to the coffee shop. This is similar with one of the video I have watched on vimeo is shown “how wifi tracking a smartphone can be used by retailers to covertly learn about their visitors,” when you shopping in the shopping centre, they know where you have been.

8. a new balancing of privacy

f76bb477699e2abc376157a065ffd4bb
(Liu 2016)

 

The image is created by Thomas Leuthard, it been published in the article The Wearable Revolution: Drawing the Line Between Exciting New Tech and Privacy. The huge face are watching peoples action and where are they going.

The author of the article aims to find the great deal of discourse about balancing tech revolutions and personal rights and boundaries. According to that, the perspectives are listed on three different sections: 

  • Start with the issue of Google Glass and similar wearables has raised serious privacy concerns among consumers and business owners.
  • Introduced eyewear cameras.
  • Balancing innovation and invasion: Wherever people land on issues about privacy, it is exciting to be surrounded by so many innovative devices and watch how they are transforming the world.

We cant live without technology. The idea of wearable technology is represented a new balancing of privacy issue and new tech.

9. The things you revealing online is much more than you think

fe1da2bb1516315c5b18d65794cebbfa
(Ha 2015)

This illustration shows the meaning of “The things you revealing online is much more than you think.” The inspiration of the image is from a TED video talk. When you working online, how little you know? and how much others know.

Also they have discussed what the web knows about you, and what we can do about the things we’d rather it forgot. If go back to my pervious blog post, I have discussed people’s attitude on online privacy. Business and people not pay attention to data protection led to Privacy disclosure: correct business operations and data protection method.

10. Clues in the Cloud

illo5-half-L
(Clues in the Cloud 2015)

This artwork is from “Clues in the Cloud” — a multi-media art piece that combines visual illustrations, audio recordings and poetic prose. They have seven sections to explores a different aspect of privacy in the digital age.  It has stated that the benefits of technology are not always clear, so the studio use illustrations to explain “what is privacy and how does it affect our lives?”

In this image, a female nude is exposed public with a huge number of eyes as the background. When we are texting all the powers that may be are surveilling our action at day and night.

Because of most of people cannot stop data surveillance, the girl in the image is praying privacy could be here to stay.

REFERENCES

Abu, L. 2015, Stands’ Stand on Privacy, Stands, viewed 28 August 2016, <http://blog.standsapp.org/why-privacy-matters/>

Clues in the Cloud, 2015, viewed 21 August 2016, <http://cluesinthecloud.com>

Fisher, J. 2011, Exploring the way technology in the UK is changing social interaction, Bechance, viewed 28 August 2016, < https://www.behance.net/gallery/1341063/A-Visual-exploration-of-social-Techonogies>

Ha, TH. 2014, What are you revealing online? Much more than you think, viewed 20 August 2016, <http://ideas.ted.com/do-you-know-what-youre-revealing-online-much-more-than-you-think/?utm_campaign=social&utm_medium=referral&utm_source=facebook.com&utm_content=ideas-blog&utm_term=technology>

Kumar, M. 2013, Digital privacy, Internet surveillance and the prism-enemies of the Internet, The Hacker News, viewed 20 August 2016, <http://thehackernews.com/2013/06/digital-privacy-internet-surveillance.html>

Levin, A. 2016, Scared of identity theft? Tell lies on Facebook, wired, viewed 20 August 2016, <http://www.wired.co.uk/article/facebook-privacy-adam-levin-social-media>

Liu, Z. 2016, The Wearable Revolution: Drawing the Line Between Exciting New Tech and Privacy, wired, viewed 28 August 2016, <http://www.wired.com/insights/2014/01/wearable-revolution-drawing-line-exciting-new-tech-privacy/>

Blog Post 5: Primary Sources

This post is structured around an informal interview that was conducted on the 16th August 2016 between the researcher, Rose McEwen and Participant A and a probe that was conducted throughout the period between the 16-30th August 2016.

Interviews and probes are a form of primary research, allowing researchers to collect original and unique data, generating new insights. The goal of this research was to allow discussion around refugees and explore some of the reasons behind our societal desensitisation and apathy towards offshore detention centres and the treatment of refugees.

The participant began the conversation by identifying as ‘uneducated’ in refugee issues. They said that they cared but ‘wouldn’t go out of their way to get involved’ and felt as though they needed to be more educated in order to participate in refugee activism or volunteer work.

Upon enquiry into the participants’ views on immigration they said they had concerns about safety and space, although they believed that immigration detention centres and strict policies were not the solution.

‘’I don’t think it [immigration] should be less strict because I’m concerned about people coming into the country and keeping the country safe, but I just feel like there has to be something better than what there is. . . I suppose just knowing who people are when they come into the country. Like where do you put everyone? What if we start letting people in and then everybody will come”

During the interview there was discussion around the context of the refugee discussions, which revealed how exposure and education played a significant role in an individuals engagement in the subject matter.

The participant said that they lived on the northern beaches in a community that wasn’t very multicultural or political.

“I think it’s one of those issues that I’ve stuck my head in the sand about because I don’t feel like I can make an impact. My way of caring about issues is when I socialise with people and when I come into contact with people. I’ve never met a refugee, I’ve never met or seen anyone who has been effected by those issues apart from the news where you become so desensitised.”

When questioned on her lack of motivation to self educate, the participant said that the mainstream media sometimes made her feel indifferent towards refugees as it was talked about so much. Secondary sources confirm that in the last two decades the Australian government has worked to perpetuate the indifference of the public by moving detention centres offshore and away from public eye. We can see this through the enforcement of policies such as temporary protection visas to offshore processing and total media blackouts at the offshore camps.

One of most interesting and important aspects of the interview process was that it helped confirm my belief that the Australian government and media have effectively promoted widespread apathy towards humanitarian crises. This interview process has helped me identify an audience for my design research and enlightened me to some of the causations of societal desensitisation and apathy to tragedy and trauma.

In summary;

  • Government policies for offshore processing and low media coverage of camps perpetuate attitudes of indifference in the Australian public.
  • The interview highlighted that a lack of education or knowledge is a barrier for people to connect with the refugee issues and activism. .
  • The media and community greatly contributes to an individual’s exposure and education towards an issue. In a sense the context greatly informs content.
  • The target audiences for my research and design project are (1) People who are interested but uninvolved in refugee issues and (2) People who don’t care about refugee issues.

Probing Task

Brief: The probe given to the participants was to look through their respective local newspapers (Manly Daily, Inner West Courier, Mosman Daily and St Mary’s Standard) since the beginning of the year and note when articles were written on refugees. They were asked to note the date of the issue and whether the author was writing favourably or against immigration laws and multiculturalism within Australia.

Below is a visualisation of the information that I collected for my probe.

graph.jpgRaw Data

The results of this probe indicate particular and nuanced attitudes held within different geographical areas in Sydney. In the Inner West Courier, there were no negatively geared articles written about refugees and were overall written about more than any of the other areas. The Manly Daily had a mixed bag of articles, seemingly trying to appeal to generally conservative audience. In line with these results, Mosman Daily had almost no coverage of refugee issues. Minor issues occurred within the probe, mainly from resulting from a misunderstanding of an article. The subtlety of language and tone of voice are techniques that continue to shape mainstream narratives of refugees and play a major part in media consumption and public perception. These issues were clarified and adjusted accordingly.

Image Reference:
Wallman, S, A Guard’s Tale (2014)

Post 3 – Mapping the participants and constructing an image archive

This exercise of creating a visual map of the stakeholders involved in data and online privacy was an excellent way to see who the main stakeholders are, their dominant beliefs towards to the issue, as well as the interaction between some of the stakeholders in terms of their position on the issue and where their beliefs cross.

20160809_153227
Political proximity of stakeholders in online data, privacy and security.
20160809_153236
Political proximity of stakeholders in online data, privacy and security.
20160809_143032
Political proximity of stakeholders in online data, privacy and security.

In terms of the beliefs, the group took that to mean how the stakeholder was using the data–positively or negatively–as well as what their position on the current issue of privacy and security was. Stakeholders such as technology companies and the government are on the positive side for the reason of innovation and technological advance (especially in the context of the Internet of Things). They are for data mining and tracking. Whereas the general users are on negative side as they don’t want their private or personal data and details to be used for targeted advertising or to track their movements. They are scared off by the hackers and hacktivists that are also on opposing sides to the issue. The hackers are on the positive side as they are often the thieves of online content and information, and can use the data mining and tracking to take advantage of users online, whereas hacktivists are o the negative side with the users, and they are against innocent people being taken advantage of. They want to expose the wrong doings of the government and hackers.

The spectrums that were explored throughout the maps were mainly positive and negative views on the issue. Whether that be how they used the data or whether they wanted data mining, storing and tracking or not. Generally, the users were on the side of the hacktivists and not-for-profit organisations, but in terms of their interactions and relationships with other stakeholders, they were alone on the map. On the other side were government bodies, businesses, technological and data companies, and hackers–who are for the tracking and mismatched security online. Basically, if the stakeholder’s positions and beliefs were to be reduced to their simplest form, they would be the following: the private sector on the negative side, and the public sector and related industries on the position side.

 

IMAGE ARCHIVE

Throughout the research process of the issue of data privacy and security, many images have popped up. Below are ten of the images or visuals that either resonated with me, or helped to further develop my understanding of the issue and any related to it.

 

BIG DATA WATCHERS

Big-Data-Watching-300x350
(Big Data Watchers n.d.)

This image depicts the notion that there are companies out there always watching your online presence and the data that is being collected. It is commenting on the lack of privacy online, especially with large companies targeting their advertising through the data collected about your activity and behaviour. Data collectors are always watching. This is a common idea, visually translated from the information explored in the scholarly and secondary media sources found. This visual–as well as the text sources–is particularly focusing in the context of shopping. Big data is always being collected and sourced.

 

CYBER THIEF

103443166-6ED1-REQ-Pulse-030416.600x400
(Cyber Thief n.d.)

This image depicts the notion of online hackers stealing private r personal data. What isn’t being represented is what data is being stolen or taken illegally (assuming it is done illegally due to the balaclava worn by the protagonist). However, what is being shown is similar to the text sources gathered; that with the internet–and the growing connectivity of devices and technology–there is an increased risk of online hacking and theft, particularly with personal data.

 

ONLINE THEFT

Computer_Theft
(Online Theft n.d.)

This image depicts the concept of online theft, and how it is just as dangerous and present as theft in the physical form. This particular message wasn’t brought up through the investigated text sources, and seems to be something that isn’t spoken about much. A lot of the time, users and consumers assume that because they have an account, and that they don’t share any of the personal details, that they are safe from online theft and hacking. This is certainly not true, and should be discussed further. This image creates a clear understanding of the issue, and simplifies the issue down to a visual representation–something that the text sources were lacking.

 

INTERNET OF THINGS EXPLAINED

internet-of-things-explained
(Internet of Things Explained n.d.)

The Internet of Things can be a difficult concept to grasp, but this image gives a good visual to help develop an understanding. The idea with the Internet of Things is that all devices and appliances will soon be connected to the internet to better our lives, and ultimately create smart homes–the visual represented in the image. What is let out of this image is an explanation of how it will work or how the devices would speak and communicate to each other. The concept of smart homes were a common idea among the scholarly articles as they discussed more technical, practical applications of the Internet of Things, rather than just a brief definition, while the problems and issues were explored in the popular media sites. Even though this is a clear visual representation, it does lack some explanation and clarity.

 

INTERNET OF THINGS GRAPHIC

IoT-Graphic
(Internet of Things Graphic n.d.)

This image also aims to distinguish what the Internet of Things is and what is can do, and possibly does it is an easier way. It doesn’t give a real world example like the previous image did, it more portrays the different avenues that it could be used in, and all the areas that our lives could be affected by it. However, again it lacks some kind of further explanation or visualisation on how we could benefit from it or its daily advantages. This is a common theme through the scholarly articles and the popular media sites, although they tend to go into more detail–which actually provides context and a more developed understanding of the Internet of Things. This graphic is a simplified visualisation, of a complex concept, that needs to be understood further, and explored more.

 

PRIVATE PROPERTY

privateproperty
(Private Property n.d.)

This image depicts a common theme or issue that isn’t always discussed or talked about, but is commonly known and misunderstood. The internet if not private like parts of the real world. In reality, you can lock your doors, draw your blinds, and live in the privacy of your own home. The internet lacks this privacy and security, and as this image suggests, the lock would always be open. I believe this image provides an excellent metaphor for the privacy of personal information on the web. The metaphor of the gate is such a universal idea that it is easily understood. The text sources investigated previously implied this issue, however none explained it or explicitly stated it, or did it quite as clearly.

 

WATCHED BY A CROWD

Unknown
(Watched by a Crowd n.d.)

This image conveys the common thought that when on the web, everybody is watching you. They are watching your activity, behaviour and shopping preferences; which can make the user anxious when surfing the web. This image demonstrates this concept well, and clearly, by blocking out the watchers so that the focus is on the user. Being watched for different reasons on the web was a common issue discussed in the text sources, especially in the popular media sites. However, even then, it was dominantly spoken about. This image improves on what was discussed.

 

PRIVACY

privacy13
(Privacy n.d.)

A black and white scribbled drawing doesn’t often show a lot as most images depend on colour. However, this image simply conveys the idea of watching and spying without the use of colour, but through the simple design elements of solid shades and contrast. This image effectively portrays this idea of always being watched online through the small eyes in the computer screen, through the solid black. Unlike some of the other images–or the text articles–the image depicts the fact that people can watch and spy on your personal data without you even being online. It merges the medias of print and digital, and demonstrated a snapshot in the everyday life. Most text sources didn’t exactly explain the ‘not being online’ clause of the issue, which this visual does so cleverly.

 

DATA AND PRIVACY SPYING

pr
(Data and Privacy Spying n.d.)

Like some of the other images, this one demonstrates the common thought that there is always someone on the other side–in a digital context–spying on your personal data and online activities or behaviour. The interesting part of this visual however is the use of the sailor and the telescope, exaggerating the concept of spying. This notion was investigated and explored thoroughly through all the text sources found, however, I feel that like the other images in this collection, the image does the explaining more succinctly. Like the text articles, it demonstrates both sides of the issue; the personal experience and behaviours of the user, and the overbearing and secretive surveillance f the data companies and the government.

 

USERS HAVE NO PRIVACY

Gmail-Users-Have-No-Privacy-internet-privacy
(Users have no Privacy n.d.)

What I like about this visual is that, unlike the other images, it shows data privacy, security and data mining from a personal experience or lens. It puts back the human element that the issue is lacking. Here we see the two main competitors for data; Google and Facebook. And like the popular media sites–and some of the scholarly texts–they are looking at every part of us and our online personals. They look for our behaviours, activities, preferences and favourites, in order to sell it to agencies and target advertisements to us. However, unlike the text sources, we are reminded of how invasive this data mining is, and this image helps to bring back the human element and personalise the experience.

 

 

REFERENCES:

Big Data Watchers n.d., Anthill Online, viewed 14 August 2016, <http://anthillonline.com/big-data-online-reputation-shapes-economic-outcomes/&gt;

Cyber Thief n.d., Google Images, viewed 14 August 2016, <http://fm.cnbc.com/applications/cnbc.com/resources/img/editorial/2016/03/04/103443166-6ED1-REQ-Pulse-030416.600×400.jpg?v=1457102445&gt;

Data and Privacy Spying n.d., Google Images, viewed 14 August 2016, <http://www.henry4school.fr/Sciences/images/big-brother/Internet-Censorship.jpg&gt;

Internet of Things Explained n.d., Google Images, viewed 14 August 2016, <http://s3.amazonaws.com/digitaltrends-uploads-prod/2014/01/Internet-of-Things.jpg&gt;

Internet of Things Graphic n.d., Google Images, viewed 14 August 2016, <http://blog.beautheme.com/wp-content/uploads/2015/12/IoT-Graphic.png&gt;

Online Theft n.d., Google Images, viewed 14 August 2016, <https://westwood.wikispaces.com/file/view/Computer_Theft.jpg/31015011/365×282/Computer_Theft.jpg&gt;

Privacy n.d., Google Images, viewed 14 August 2016, <https://smhttp-ssl-23575.nexcesscdn.net/80ABE1/sflashrouters/wp/wp-content/uploads/2013/02/privacy13.gif&gt;

Private Property n.d., Google Images, viewed 14 August 2016, <http://www.cloudwards.net/wp-content/uploads/2015/01/privateproperty.jpg&gt;

Users have no Privacy n.d., Google Images, viewed 14 August 2016, <https://ellenahoban.files.wordpress.com/2015/05/gmail-users-have-no-privacy-internet-privacy.jpg&gt;

Watched by a Crowd n.d., Google Images, viewed 14 August 2016, <http://www.hostingreviews.com/wp-content/uploads/2011/12/Internet-Privacy.jpg&gt;

 

Needle Free Blood Glucose Testing

Post 4 by Lucy Allen

In the recent blog post Truths of Type 1 Diabetes I explored the emotional and social impact living with Type 1 Diabetes and a lack of support can have. Tackling these social issues requires a long-term intervention and strategies to ensure a better support network and management for diabetics.  There are however many exciting and fast-paced innovations in the field of Type 1 Diabetes that make living with the disease a littler easier for people like myself.

A common issue faced by people living with Type 1 Diabetes is the large amount of needles used day to day. Between injections, blood glucose tests and site insertions Diabetics use over 3000 needles a year. There are options these days in regards to injecting insulin in the form of an insulin pump, decreasing 5 – 10 injections a day to just one needle insertion every three days however testing your blood glucose level (BGL) is imperative in the proper management of Type 1 Diabetes and is done so by pricking your finger with a needle to draw blood for reading by a metre multiple times a day.

testing-blood-sugar-levels
Testing your BGL  (G. Matej, 2015)

Just recently Abbott have released the first needle-free BGL monitoring system called The FreeStyle Libre Flash. This system works by inserting a sensor into the upper arm that can be scanned using the monitor to receive not only a BGL but also detecting patterns and trends. This breakthrough technology is the first of it’s kind in offering needle free testing, providing ease of use and making living with Type 1 Diabetes just a little bit easier. Abbot have very effectively engaged with a major issue for those living with Type 1 that is in no way a cure but rather explores a major detriment of the disease and developed the appropriate technology in response. Whilst this technology doesn’t completely obliterate the use of needles as the sensors insertion still requires a needle, it drastically decreases the use of them and enables easier and more user-friendly BGL testing.

abbott libre
The FreeStyle Libre System (Abbott, 2016)

Whilst it’s clear Abbott have very successfully engaged and provided a solution to this issue there are still social barriers the deter people such as myself from using this new system. The system is usable whilst swimming, showering, exercising and in most day to day situations. Despite so many benefits, for me the idea of having another thing attached to me in addition to my insulin pump is a big turn off. With an insulin pump, the site and pump can sit comfortable and discreetly under my clothing however with the Libre it is inserted on the upper arm in clear view. For someone such as myself who lives in the sun and at the beach, the thought of the sensor being so blatantly obvious really deters me as it screams ‘there’s something wrong with me’. For me I would rather keep using needles to prick myself, draw blood and test my BGL to avoid this more intrusive technology.

It’s clear that whilst Abbott have provided an emergent solution to an ongoing issue there are still further areas of engagement that need to tackle the more social aspects surrounding the Libre. This project is however a fantastic example of all the exciting and emergent outcomes that are coming to fruition as technology improves and issues surrounding health and obesity are explored. My hope is that we can continue to develop, test and respond to these innovations in a way that allows people living with Type 1 to feel more ‘normal’ as some might say.

References

Abbott, ‘Free Style Libre’, accessed 20th of August 2016, < http://www.freestylelibre.com.au/&gt;

G, Matej., 2016, ‘What is Normal Blood Sugar Level’, accessed 23rd of August 2016, <http://healthiack.com/health/what-is-normal-blood-sugar-level&gt;

post 4:Identifying and collecting design example

Screen Shot 2016-08-22 at 10.15.34 PMHyperakt Labs collaborated with UNHCR (the United Nations High Commissioner for Refugees)on ‘The Refugee Project’, UNHCR is an organisation which displays over 35 million refugee in 126 countries in one data base. Hyperakt Labs challenges to communicate and visualise UNHCR’s data in a meaningful way and at the same time to reveal the stories behind these numbers.

The approach provided by Hyperakt was creating a compelling narrative with a set of UNHCR’s 40 years refugee data. Hyperakt collaborated with technologist Ekene Ijeoma, they created an interactive experience that tells a story of where and when these refugees came from, as well as the complex history that involves social, political and economic influences.

I was overwhelmed by the numbers of refugees increasing years by years since the early 1970s automatically, it shows statistic about top 3 countries where refugees came from, and they are Syria, Afghanistan and Somalia, the top 3 countries where wars and persecutions occurred.

The design was so successful as it was exhibited around the world. It was selected for MoMA’s Design and Violence exibition, won the Designs of the Year 2015 at Design Museum in London, it  was featured as part of Mapmaker Manifesto installation at 2014 Istanbul Design Biennial and etc. The Refugee Project has hit nearly 1 million page views since their launching in January 2014, and was shared around social medias by global humanitarian organisations.

Reference:

Angela Yu

Blog Post 4 // We Feel Fine

‘We Feel Fine’ is an incredibly rich and versatile data set which employs an emergent practice of generative systems to investigate human emotions on a global scale in an unbiased and unobtrusive manner. The project utilises a code system which collects, collates and processes data based upon the world’s newly posted blog entries which contain the phrases “I feel” and “I am feeling”. The system records the entire sentence and categorises each of them according to the feelings that are expressed within the sentence, for example: happy, sad, depressed, excited, etc. Using the information provided within the blog, the system can often record the age, gender and geographical location of the author; even the weather of the location can be extracted and ultimately used as a means to categorise the data. The project then employs another emergent practice of data visualisation to depict and communicate the rich data in a plethora of different ways, such as colour, size, shape and opacity.

mobs-weathers-big
The data is displayed in six different categories: Madness, Murmurs, Montage, Mobs, Metrics, and Mounds. This data can then be further filtered by five sub-categories: Feeling, Gender, Age, Weather and Location. [Harris & Kamva 2005]

‘We Feel Fine’ is authored by everyone for everyone, ultimately producing a wide exploration of the notion of human emotions and mental health. I was particularly interested in this project as it not only explores mental health, it even utilises technology and online platforms to collate and provide information of the current ‘feelings’ being felt and expressed across the world. However, this generative system has proven to be quite thought provoking, as it utilises information provided in public blogs without the permission of the author. For although the information accumulated is open to public consumption and is not private information, the nature of feelings and personal reflections almost seem sacred or sensitive, thus causing a slight sense of unease within the audience as they are able to focus in on particular sentences that may be describing how someone feels about their sexuality or current family situation.

montage3-big
‘We Feel Fine’ not only displays large scale macro data sets, but can also provide a micro observation of a single sentence within the larger picture; here is one such example. [Harris & Kamva 2005]

The project is quite fascinating as it does not seem to have an apparent agenda, or opinion, that it wishes to present, it merely wishes to provide a space which “helps people see beauty in the everyday ups and downs of life”. [Harris 2006] This is an exemplar of universally minded design, as it not only uses the internet as a medium which can be easily accessed by a large number of people, it also uses a communicative language which supersedes all linguistics, cultures and nationalities, such as colour, shape and size. Ultimately, the project provides an expansive and versatile avenue through which people across the world can better understand human emotions on a global scale and ultimately the intricacies and beauties of human emotions as they occur within their own lives.

References

Harris, J. & Kamva, S. 2005, We Feel Fine, viewed 20 August 2016, < http://number27.org/wefeelfine >

Harris, J. 2006, We Feel Fine, viewed 20 August 2016, < http://number27.org/wefeelfine >

The line and where to draw it!

The line. An imaginary barrier that divides those that are anonymous and those that are public. Align the bends and turns around some of the largest issues and triumphs of the modern Internet. Whilst researching on Internet security and privacy, I have come across the works of Mr. Davenport and Miss Van Der Nagel. Both of them seem to share the same point of view on the cornerstones of the Internet and the proposed purpose of online communications.

Anonymous communication is one of the fundamental uses of the Internet. It paves the way for the Internet to become a free agent of which a culture of sharing and freedom speech is commonplace. Whether it’s Chinese citizens speaking up about their fascist government regime or those speaking out against crimes to that of which they will be persecuted if their identity be known, the Internet has allowed people to say what they need to say and do what they want to. However it is this inherent nature that can also bring out the worst in people. Online bullying, social media stalking, child predation. All performed by those who wish to hide behind the username and computer-generated profile picture. This is where the line needs to be drawn. Not at one end of the spectrum, or the other. A balance between anonymity and responsibility. The right to freedom of speech without persecution and yet the ability to stop those who misuse their anonymity. Can this line be drawn? Should it be drawn? How do we draw it? All questions that I hope to research and in turn result in a better understanding and proposed idea for the future of online communications and the Internet as a whole.

References

Davenport, D. 2002, Anonymity on the Internet, CSI. viewed 13 August 2016, <https://www.csl.mtu.edu/cs6461/www/Reading/Davenport02.pdf&gt;.

Nagel, E. and Frith, J. 2015, Anonymity, pseudonymity, and the agency of online identity, First Monday, vol 20, no 3, viewed 11 August 2016, <http://firstmonday.org/ojs/index.php/fm/article/view/5615/4346&gt;.

 

Anonymity Vs. Privacy

The first article that I found interesting was “anonymity is the internet’s next big battleground” written by Jon Card. The article was written for the guardian online publication in June of 2015. The guardian is a reputable source of information and therefore the article is trustworthy. Jon Card focuses on finance and the state of the Internet and published between 2 and 6 articles a month to the guardian. I feel that the article is mainly factual and overall lacks a sense of bias or opinion but the author could be selectively representing information that fits one side of the argument. The tone of the article is very factual and there are a lot of direct quotes and statistics, which lead me to believe that the topic has been well researched. The position of the author is that of the fact that we should be wary with the amount of data collection that is going on and that there needs to be a global inquest into the value of privacy and anonymity on the Internet.

“The use of personal data is a thorny subject for the public and for the many companies that use it. By allowing companies to take their data, Internet users are enabling the creation of a fast, free and relevant online experience. But more recently the scale of this data gathering and the way it is then traded, analysed and used has come under greater scrutiny.”

The second article I read was titled anonymity on the Internet: why the price may be too high. The article was written by David Davenport who is an assistant professor in the computer engineering department in Ankara, Turkey. Considering that the author has spent many years studying the topic, I feel that it is a very trustworthy document and the bias given is to be taken with high regard. Whilst many people believe that there is a right to anonymity on the Internet, Mr Davenport argues that this is not the case and is actually causing a breakdown of social justice and society in general. Whilst I believe that there should be a level of anonymity which allows for more challenging topics to be brought up, there needs to be a level of accountability to those who miss use this power.

“Experience suggests a society relying solely on the goodwill and conscious of its citizens would be unlikely to succeed in ensuring justice.” (David Davenport, 2002) Mr Davenport also agrees that the right to freedom of speech is a fundamental aspect of the democratic tradition. “I do transform society, any idea, no matter how bizarre it may appear initially, might ultimately prove beneficial.”

After reading these articles I decided to take a turn away from anonymity and towards privacy. I came across an article authored by Danny Bradbury titled “how can privacy survive in the year of the Internet of things?”. From a smart thermostat that changes the temperature of your house when you’re away to a smart watch that can read your heartbeat and use as a form of security to unlock your phone or your house, we are surrounded by devices that constantly connect to the Internet and monitor our every move. Cameras, microphones and motion sensors, just some of the ways in which our identity and data can be harvested without our knowledge or to those who don’t read terms and conditions, consent. Bradbury argues that we need to take control of our own data in a world that is slowly becoming saturated in devices that are designed to take it from us. As previously stated, the Guardian is a reputable source of online publications authored by many different people. This leads me to believe that the contents of articles is trustworthy and well researched. That being said, no matter who wrote the article, there will always be a bias and it is our job as researchers to look past that bias and see both sides of an argument. It is these devices that allow disabled people to have a better quality of life, it provides security and allows those to connect with family and friends around the world. It is my own belief that we should proceed with caution and really ask ourselves at what point do we stop.

As most people do, I spend my free time consuming various forms of media on the Internet, from streaming the latest game of thrones episode to watching hours and hours of YouTube videos. This often leads me to the comment section of some of my favourite websites. It is at this time that I begin to read some of the most hateful and disgusting forms of ‘free speech’ by users that have no profile picture and a random name that often begins and ends with XX. this then led me to an article written by Maria Konnikova which identifies the psychology behind Internet comments and as John Suler termed it, the online disinhibition effect. “The theory is that the moment you shed your identity the usual constraints on your behaviour disappear”. From death threats to racism, sexism and all forms of inequality, anything can be found plastered in the comment section. This destructive form of online bullying is often perpetrated by teenage males that hide behind usernames. Is this form of anonymity that needs to be put in check and people need to start being responsible for the actions that they take on the Internet.

My last article that I’ve decided to analyse rounds up the topic quite nicely. Titled “your online freedom is worth fighting for, isn’t it?”. It is this statement that truly wraps up the world sentiment on online privacy and anonymity. Not enough people care. This article was again found on the Guardian, however I found this article to have much bias to the other articles written and posted on the Guardian. The author has painted a bleak future for the state of online security and privacy whereas I believe there is a fix and that as the title states, as long as more people start caring about Data collection, anonymity and privacy, then equilibrium can be reached where freedom of speech is sustained whilst those that abuse their rights are responsible for their actions and to be brought to justice when need be. It is this equilibrium that will found the basis for my research over the next semester and I hope to not only educate those who read this blog but to also decide for myself where I stand in what I see to be one of the most important issues that the world faces today.

References

Bradbury, D. 2015, How can privacy survive in the era of the internet of things?, the Guardian. viewed 6 August 2016, <https://www.theguardian.com/technology/2015/apr/07/how-can-privacy-survive-the-internet-of-things&gt;.

Card, J. 2015, Anonymity is the internet’s next big battleground, the Guardian. viewed 7 August 2016, <https://www.theguardian.com/media-network/2015/jun/22/anonymity-internet-battleground-data-advertisers-marketers&gt;.

Chatfield, T. 2013, Your online freedom is worth fighting for, isn’t it? | Tom Chatfield, the Guardian. viewed 9 August 2016, <https://www.theguardian.com/commentisfree/2013/apr/05/online-freedom-worth-fighting-for&gt;.

Davenport, D. 2002, Anonymity on the Internet, CSI. viewed 13 August 2016, <https://www.csl.mtu.edu/cs6461/www/Reading/Davenport02.pdf&gt;.

Nagel, E. and Frith, J. 2015, Anonymity, pseudonymity, and the agency of online identity: Examining the social practices of r/Gonewild, First Monday, vol 20, no 3, viewed 11 August 2016, <http://firstmonday.org/ojs/index.php/fm/article/view/5615/4346&gt;.

The Psychology of Online Comments – The New Yorker 2013, The New Yorker. viewed 14 August 2016, <http://www.newyorker.com/tech/elements/the-psychology-of-online-comments&gt;.

 

 

 

 

 

 

Blind leading the blind but can edutainment technologies save us?

web_photo_obesechild_4914

Is it too late to transform the role of augmented reality in changing it’s ways for our future generations? (eNCA 2014)

Post two by Marie Good

The analysis’ below are of two scholarly articles that take a further scientific and researched based leap into the world of healthy living. I have decided to focus on two areas; healthy living blogs and how healthy they really are for their audiences and the role augmented reality could have in changing our education system to incorporate physical activity as a compulsory standard aspect of education curriculums.

‘A content analysis of Healthy living blogs: evidence on content thematically consistent with dysfunctional eating attitudes and behaviours’, is a journal article published by the International Journal of Eating Disorders in 2014 and written by Leah Boepple and Joel Kevin Thompson (Boeple & Thompson 2014). Boeple at the Department of Psychology, University of South Florida, Tampa, Florida, holds a B.A and Thompson a PhD of the department also. This article is a content analysis and evaluation of various healthy living blogs. A sample of 21 blogs that had either won an award or had a large number of followers, was evaluated. It was discovered that more than half had shown signs of advertising or publishing content pro problematic eating or body image views. Boeple has written about issues such as this before, particularly focusing on body image, eating disorders and educational programs to combat these issues more effectively. Thompson has a very similar background also. I found this article very interesting as it supports the views I have had on this topic for a long time. Coming from a background where healthy living blogs have been an area of interest for myself and people I know closely, I have often realised the blogs are not always consistent with healthy lifestyle thinking.

Kuei-Fang Hsiao and Nian-Shing Chen (Hsiao & Chen 2011) from the Department of Information Management, Taiwan wrote a journal report in 2011 titled, ‘The development of the AR-Fitness System in Education.’ Hsiao has written about augmented reality several times previously, as well as wireless technologies and Chen has focused particularly on ubiquitous learning, technology and education. This article views the recent emergence of technology and healthcare to create interactions with the virtual and real world and expands it into information used to create AR technology for students which they call ‘edutainment technologies,’ based on the five physical indicators of BMI (body mass index), cardiorespiratory endurance, muscular strength, muscular endurance and flexibility. Hsiao and Chen designed a prototyped AR technology that aims to have the children moving and interacting with a screen in order to answer questions and proceed through their learning curriculum. Hsiao and Chen propose this technology might be more beneficial to subjects such as PE and sports as the children realise movement is incorporated into the curriculum, which I agree with. The struggle still seems to be convincing children of this revolutionary change in education that they currently understand as a sedentary activity so they can view it as a physical one instead.

 

Reference list

Boepple, L. & Thompson, J., K. 2014, ‘A content analysis of healthy living blogs: evidence on content thematically consistent with dysfunctional eating attitudes and behaviors’, International Journal of Eating Disorders, pp 362-367.

Hsiao, K. & Chen, N. 2011, ‘The development of the AR-fitness system in education’, Edutainment Technologies. Educational gmes and virtual reality/augumented reality applications, pp. 2–11

eNCA. 2014, unknown, E News Chanel Africa, date viewed 15 August 2016, < https://www.enca.com/10-facts-about-obesity >.

post one: youth homelessness

by zena dakkak

Mission Australia report finds one in seven young people at risk of homelessness written by Rachel Browne, a Social Affairs Reporter for Fairfax Media expresses her concern about vulnerable teenagers on the verge of being homeless in her article. One in 7 young people are at a risk of becoming homeless. To further the reader’s understanding Browne gathers information on the analysed data provided by Mission Australia in its annual survey. Results show that 13.5 percent of the 15-19 year olds faced with the threat of homelessness.

Continuing she mentions that young people who are homeless are more likely to suffer disrupted schooling, risky drug and alcohol use and mental illness. Mission Australia’s chief executive Catherine Yeomans, a participant in the article, describes the risks that the youth of Australia are facing. She focuses her concern with the federally funded services and support system that will that cut off in June of 2017. Browne continues to illustrate the issue of homelessness by interviewing young youth who have experienced being homeless and the constant struggles they are being faced with.


 

Elise Pianegonda, an online producer in the ABC’s Canberra newsroom, focuses on what it’s like to be homeless through the eyes of 23 year old Nathan Beer. After a month long experiment to raise awareness about homelessness and how easily it can happen, Nathan returns to his warm bed in Canberra.

Through the eyes of the homeless portrays a personal experience of the risks of being homeless. Among the many obvious issues of being homeless (no house, shortage of supplies, financial struggles etc) Nathan learned a harsh reality. The article discussed Nathan’s realisation that alcoholism is a product of their survival. The homeless drink to stay warm and numb the issues that they are faced with daily. Through this article it conveys the emotional strain of self worth that is displayed on the streets and their psychological state societies force them to be in. Society fails to recognise homeless people and view them as invisible. Although they can apply for housing through Centrelink, as mentioned, they don’t because of their psychological state.


 

Opal card: No paper tickets to be used on NSW public transport, concerns for homeless population

With eight years in the political industry, state political reporter Ashleigh Raper reports about the concern for the homeless population regarding the new Opal card system. While the new system is “so much more convenient” disadvantaged homeless people will be left unable to travel due to the cancellation of paper tickets. The transition from paper to card has concerns proving to be difficult due to not having accessibility to the resources or literacy and computer skills needed.

The article further demonstrates that homeless people are left with to way to travel on public transport because they are transient and unless they are known to a centre to have their mail sent there it would be very difficult for them to go through the process to register for an opal card. Charities like Wollongong Homeless Hub and many others, used to provide single bus/train tickets to their clients but as the new systems come into play that will no longer be possible. The state Opposition Mr Walton mentions in the article that the transport of NSW have been working with charities to help out those people who don’t have a permanent home.


 

Smartphones are a lifeline for homeless people, by Rosie Spinks, explains the value of smartphones among the homeless community in order to connect with vital support and combat social exclusion.

While society views a smartphone as a luxury item to use at their leisure, the homeless community view it as a life tool. Spinks describes that they are dependent on this technology as a source for stability. It enables the community to reach out and have a constant connection with the services (support services, case workers and to look for jobs or housing) that aid them to progress through their day and their lives. It also serves as a getaway from being isolated and according to Hafsah FitzGibbon, partnerships and participation manager for youth homeless charity Centrepoint, “a way to create networks to combat social exclusion”.

“Smartphones are incomparable tools for connecting people who are isolated”

Rosie Spinks continues in her article by portraying that having mobile phones creates an easier way to connect and stay in touch with the homeless community which can be passed onto other organisations that can assist them getting off the street quicker.

Only a handful of business addressing the issue support the project of distributing mobile phones to the homeless people. Through this, mobile phones play the role of stabilising homeless people’s lives. But the community is faced with challenges like the maintenance of the phone and finding a place to charge it, or having enough space for necessary apps. Although the homeless community is faced with these challenges, project managers are trying to build a social network where homeless people can find support and a way to collect data on their experience of homelessness via self reporting.


 

Ninety-five per cent of people experiencing homelessness are “invisible” to the public. In order to raise awareness for the homeless community, Happn, a dating app, will give its users an insight into ‘invisible homelessness’. It explores the couch surfing, rough sleeps in cars, rooming houses and caravan parks. It gives the opportunity for Happn users to pass by a location where someone has been homeless and reveals the stories of real life people and the different ways homelessness exists. It urges people to take action and to put an end to homelessness.

Rebecca David, author of the article, continues to convey that there is no right image of homelessness. She further describes this as chief executive Jenny Smith of the Council to Homeless Persons states that “… homelessness can happen to anyone at any time regardless of their age, gender, or employment status.” Challenging stereotypes is one of the issues that the community is faced with. In the hopes to unite the community to solve the problem, Smith stresses that support from the Government to end homelessness and funding from the NPAH is “a critical piece of that” process.


References:
Cover photo:  PIF 2016, Sydney’s homeless youth benefit from the winter campaign  , News, Property Industry Foundation, viewed August 13 2016, <https://www.pif.com.au/news/nsw/sydney-s-homeless-youth-benefit-from-the-winter-campaign/>.
Browne, R. February 16, 2016, ‘Mission Australia report finds one in seven young people at risk of homelessness‘, The Sydney Morning Herald, (NSW News), viewed August 13, 2016, <http://www.smh.com.au/nsw/one-in-seven-young-people-at-risk-of-homelessness-mission-australia-report-20160214-gmtokx.html>.
Pianegonda, E. August 8, 2013, ‘Through the eyes of the homeless  ‘, ABC, (News), viewed August 13, 2016, <http://www.abc.net.au/news/2013-08-07/through-the-eyes-of-the-homeless/4871752>.
Raper, A. August 1, 2016, ‘Opal card: No paper tickets to be used on NSW public transport, concerns for homeless population  ‘, ABC, (ABC News), viewed August 13, 2016, <http://www.abc.net.au/news/2016-08-01/opal-card-only-option-on-sydney-public-transport-from-today/7676698>.
Spinks, R. October 1, 2015, ‘Smartphones are a lifeline for homeless people‘, The Guardian, (Technology and Innovation), viewed August 13, 2016, <https://www.theguardian.com/sustainable-business/2015/oct/01/smartphones-are-lifeline-for-homeless-people>.
David, R. July 29, 2016, ‘Dating app to shine a light on hidden homelessness‘, Herald Sun, (Leader), viewed August 13, 2016, <http://www.heraldsun.com.au/leader/news/dating-app-to-shine-a-light-on-hidden-homelessness/news-story/bb945634ff73026b1802ee24a3427b45>.

 

 

 

Blog Post 1: Creating a data set using secondary sources

vitruvian_cyborg
Spawnbrod, J. 2013, Vitruvian Cyborg, Google plus, viewed 15 August 2016, 

 

“DATA IS A MAJOR CONTRIBUTION TOWARDS HOW SOCIETY & THE WORLD FUNCTIONS (OPERATES).  EVERYTHING IS SLOWLY INTEGRATED WITH A DIGITAL PRESENCE, OFTEN WITH A SCREEN OR INTERFACE AS THE MEANS OF INTERACTION. IF PIXELS ARE THE NEW PENCILS THEN CODES ARE THE NEW CANVASES.” – ME

SUBFRAMES OF DATA:
  •  Collective & Individual
  • Aggregate (collection of data over time) & Discrete (background)
  • Open & Closed

Article 1:

Silicon Valley culture & social media, data and property rights – ABC

Prof. Michael Fraser states in his article that online activities and communication are constantly being harvested and monitored. In a digital era illuminated by technology and data, he questions how we can protect our own privacy? He speculates that one way is to introduce ‘Property Rights’ with our digital profiles which would give us the rights to control how our data is being consumed.

Monitoring/ tracking isn’t necessarily a bad thing. It provides users with better service but It’s the scale of tracking and lack of transparency behind it. All the harvesting of data and benefits goes towards the big corporations and not the individuals that produce that data, The issue is that big corporations and governments make billions of dollars with the use of our personal information and us as individuals would like to participate in that market, to give and return.

Michael Fraser proposes a solution – The idea was not to ban & restrict companies from accessing personal data from individuals but to give those individuals more rights and thus the ‘Online Property Rights’ come into action. The two main purpose is 1) Control: Allowing individuals to control how our data is being consumed and distributed, currently in exchange of our personal information, the data collated is being used for online services, free apps etc. 2) Charge a Fee: Since companies are making billions, It’s only ethically considerate to give back to the producers, contributing and giving back to the economy or to provide them with an incentive scheme.

Reference:
Silicon Valley culture and social media, data and property rights, 2014, Audio, ABC, Sydney. http://www.abc.net.au/radionational/programs/futuretense/silicon-valley-culture-and-social-media-data-and-property-rights/5313316

Article 2:

Privacy Is The New Money, Thanks to Big Data – Omri Ben Shahar

“The sum of our activities – is collated, neatly organised by algorithms, smartly analysed by sophisticated softwares… It does not decay or gather dust, and it is never forgotten.” – Omri Ben Shahar

The quote emphasises on the extent of tracking and how our privacy is at threat with our personal rights. The main purpose for our data is primarily used for marketing and commercial intents. You’d think big governments and corporate organisations would have the ability to access your personal information. Yes, that’s correct. But what people don’t understand is the values and financial costs that come with it.  

Personal information collection or ‘Big Data’ is the process of collating digital material that is ‘raw data’. The analogy of internet $$$. Raw Data is priceless but worth considerable due of its undefined value, unlike gold, there’s a price.

Is it acceptable? Well, that depends. Privacy is at stake and we’re being constantly monitored as we leave our digital footprints. Data collation by governments/ cause related organisations is far less alarming than those all in for profit, high-end corporations harvesting your information to boost their own economic gains and the lack of public interest.

“Even more, striking is how little people value potential protection”

As I’ve mentioned. There’s a difference between Interest & AwarenessThe article specifies that the general audience shares personal information onto websites and other platforms knowingly they are being tracked and monitored. Google mail is arguably the most invasive data practice which involves the entire scanning of individual’s accounts and emails. However, this isn’t at all concerning to the public. This outlines the difference between the Interest and Awareness of the public as well as the psychological behaviours on the online environment. As part of a research for the University of Chicago, They’ve analysed that only a small % of a minority of users are willing to pay $15 to stop privacy invasion which is quite alarming when it comes to this digital era that we live in.

Reference:
Shahar, O. B., 2016, ‘Privacy Is The New Money, Thanks To Big Data, Forbes, viewed 31 July 2016,http://www.forbes.com/sites/omribenshahar/2016/04/01/privacy-is-the-new-money-thanks-to-big-data/#7a94fa0720c3

Article 3:

Who can collect & process personal data

What exactly is personal data? Personal data is valuable information left behind such as names, photographs, phone #, D.O.B, address etc. whilst online activities. These activities and the data trail left behind is called the ‘digital footprint’.

The process of monitoring and tracking is rather interesting, almost depriving of your human rights. But what is more intriguing is the process that your data travels through and the legalities behind such matter. Personal data may be collated for ‘legal’ purposes such as business, memberships and jobs etc. But all this data goes through the ‘Data Protection Directive’ or Data Controllers. These are authorised individuals that collect and process personal data. Individual rights must  be respected and the importance of policy is upheld. The duty guidelines provide a backbone for social etiquette.

  • Collect & process personal data when only legally permitted
  • Respect certain obligations
  • Respond to complaints- regards to breaches etc.
  • Collaboration – national data protection supervisory authorities.
Reference:
COMM, 2011, ‘who can collect and process personal data?, European commission, viewed 31 July 2016, http://ec.europa.eu/justice/data-protection/data-collection/index_en.htm

Article 4:

Don’t smile: You’re on camera – Marc Kosciejew

“Our addiction to information makes us complicit in the increasing reach of dataveillance.” – Marc Kosciejew

Dataveillance is the newest form of surveillance, As more online activities increase, users leave a digital trail behind often analysed, monitored and recorded. Dataveillance is the process of infiltrating and tracking individuals on a more personal and intimate level. To gather insights into an individual’s private life.

Not only does it monitor and tracks data consumption but It also automatically categorises users (based on data/searching) behavioural patterns etc. As dataveillance increase, there is less transparency of whom is collating all these information which also brings to concern WHAT they do with them. The following articles in Dataveillance & Countervailance by Rita Raley suggests methods and procedures to limit dataveillance and how to protect the individual’s identity on the online web.

Reference:
Kosciejew, M., 2016, ‘Don’t smile: You’re on camera, Times of Malta, viewed 31 July 2016,http://www.timesofmalta.com/articles/view/20160619/technology/Don-t-smile-you-re-on-camera.616070

Article 5:

Dataveillance and Countervailance – Rita Raley

They key terms below are the main sections of this article which are summarised:

Dataveillance – The newest form of online surveillance.

Countervailance – The process and habit of protecting own privacy & maintaining control, searching the web anonymously, Using fake I.D and details, deleting cookies & LSO’s (local shared objects – extensions of flash players used to override security preference without notification) LSO main purpose is to distribute online behavioural advertising, Often Zombie cookies remain after deletion and are stored in caches which users aren’t aware of.  Data-Renaissance – New marketing world where ‘raw data’ (information still to come) is exploited. It is to be believed as the new online currency and the digital gold mine because its value is undefined. Users leave their identity and search history behind. This data (behavioural patterns) is collected and structurally analysed for strategic patterns and data sets which contribute to the ever so growing online market.

Data-Renaissance – New marketing world where ‘raw data’ (information still to come) is exploited. It is to be believed as the new online currency and the digital gold mine because its value is undefined. Users leave their identity and search history behind. This data (behavioural patterns) is collected and structurally analysed for strategic patterns and data sets which contribute to the ever so growing online market.

Reference:
“Raw Data” is an Oxymoron – Lisa Gitelman, The MIT Press Cambridge, London, 2013, Dataveillance & Countervailance – Rita Raley, pp 121 http://raley.english.ucsb.edu/wp-content/DV-uncorrected-proofs.pdf

Blog Post 1 Data Set: Using Secondary Sources

ARTICLE ONE

How Much Do You Know About Your Online Privacy

“Although it uses the word ‘privacy’, this should not be considered a sign of consumer-friendly or privacy-conscious practices by any means”

 

This article goes into detail about how newly implemented mediums of data distribution are not subjected to enough scrutiny, apps such as Pokemon Go are examples of how unassuming the average user can be in regards to online privacy. The author of this article “How much do you know about your Online privacy” from The Voice of America blog is called Aida Akl, she has also written about several other technology-related privacy issues, the most prevalent being the recent implementation of Pokemon go and the large retention of meta data that was just passed by congress in the unites states to retain large amounts of meta data. Considering the nature of this article in comparison to the previous ones written by the same author it is assumed that a much higher level of knowledge about Online privacy and personal data is known to them.

The author has shown a high levels of knowledge when in regards to the details of online privacy issues, with a significant array of privacy related articles written by her, the quality of this information is high. However, considering how convoluted these areas of information have become in the past several years it would take some significant research over several years to become confident in understanding that particular issue to its fullest extent.

The author uses a lot of relatable references in regards to talking about Online privacy, with smart phones and smart devices being only a recent addition to a huge array of Online Technologies, we now see a significant increase of third party applications and software used by a wide range of people most of which are unassuming to the quite complicated and quite often misleading terms and conditions of privacy.

One example would be the Pokemon Go app, Aki (2016) says, “Pokemon GO players, for example, have GPS location and proximity settings enabled on their devices. While that allows them to play the game, it also gives marketers, advertisers – even thieves – a treasure trove of personal information” This is a new type of potential invasive privacy, what would seem is a harmless app could be used for a more nefarious purpose.

Considering the nature of this particular blog and on the other issues this author has written about it is not to be assumed that any particular bias is implemented in this article, there is factual evidence identified in this article that proves a lot of what the author is saying to be true and does inform the reader about the risks you take when browsing the Internet or accepting terms and conditions that you do not understand.

 

ARTICLE TWO

Even your battery status may threaten your privacy online.

 

The second article goes into detail about how even your battery level on a smart device could potentially be giving away your Online data to some form of large retention Analytics. The author Seth Fiegerman is an editorial writer for CNN tech, considering that CNN is such a large and internationally recognised institute of media the quality of information coming from him is assumed to be accurate, however most of the issues talked about by this author seemed to be vaguely unfounded with physical proof at least to this point.

In this article, Figerman talks about how even your battery can be used against you in a privacy war, “The battery status information can then be paired with many other data points — everything from the IP address to the list of fonts and browser extensions — to help websites better “fingerprint” your activity Online.” (2016). I would say considering at this particular author only writes about tech related issues for CNN that there maybe some more personally invested opinions in his writing, however considering that large media corporations are also in the business of distorting and manipulating the facts to push an agenda it is safe to assume that whilst bias can be present in the most sensitive of issues so can the truth.

I would agree with the authors position when he references that the people who found out this information, in regards to battery life, only want the public to be aware that this information is being tracked, I would agree this information should be known by the general public so that they are fully aware of the potential of giving even a little consent to large corporations and multimedia industries that want your data so they can sell you targeted products.

 

ARTICLE THREE

Canada needs beefed up online privacy consent laws

 

The third article that I have chosen is written by man called Michael Geist, who is a lawyer that specialises in the field of Online privacy practices and data retention. In this article Michael goes into detail about how Canada need to improve it’s regulation in regards to the piracy laws, the main themes covered in this particular article is how the digital e-commerce Market has been structure to protect businesses to be able to opt out of certain privacy agreements leaving the single user exposed.

I would consider the nature of this article very professional and insightful, considering the long length of study this particular author has gone to provide this information with the additions of awards and publish books based on these topics, the quality of this information is assured. I would agree with the opinion of this author when he discusses the fact that the digital environment is quite dangerous for a single and user, for it is only at the specific consent of the private user to allow mass data retention to take place, marketing Analytics for big businesses and multimedia Industries presume they are allowed this information. Unless the customer or consumer explicitly informs the officials of the product, the information is taken.

Gesit (2016) says “The current system means that the majority of information is collected, used and disclosed without informed consent”, this being part of the standard practise when regarding the retention of private data. The biggest concern is the immunity that large corporations have compared to the single user, Gesit (2016) references the original privacy laws in Canada and says “The general Canadian privacy law is still premised on moral suasion or fears of public shaming, not tough enforcement backed by penalties. If privacy rules are to be taken seriously, there must be serious consequences when companies run afoul of the rules”

The nature of privacy laws in Canada have not been subjected to the scrutiny of modern Online practices, considering these foundations were based on systems of information that did not exist, a newly reformed legislation should be implemented to control large scale analytics from retaining data illegally.

 

ARTICLE FOUR

Should you have to pay for online privacy

 

This article talks about the potential for profiteering based upon a consumer’s ability to afford more or less security with certain Internet conglomerates. This author has done other editorial pieces for the Washington Post and the Denver post in regards to Online privacy and other Internet related issues.

The main concern the author is elaborating is the ability for Internet service providers to be able to adjust their prices for certain consumers, an example is, consumers willing to pay more for their Internet may be offered discounts in exchange for large amounts of their personal data, this gives an unsettling precedent for other businesses that used large scale analytics and meta data collection for it makes the presumption that only the rich are allowed privacy and all those who cannot afford it have to forgo that luxury until they have enough.

I would certainly agree with this author about the potential risks for the future when engaging these types of practices in an already morally gray industry, while some people would boast the claim that the mass retention of meta data and personal information isn’t harmful forget that this information may be used against in any scenario when it suits the proprietor if this information.

 

ARTICLE FIVE

 

Pokemon Go mania in UAE: Be wary of compromising online privacy

 

The final article I chose to my 5 goes into detail about how in the recent Mania of the Pokemon go up being released has brought to our attention once again the incredulous nature of Online privacy and the retention of meta data information.

The Gulf news is a reputable multimedia institution located in the United Arab Emirates and the author of this article is a reputable editorial writer who has written about several other technological issues that have risen because of Online privacy issues. I find this article to be the most relevant because of how relatable it is to many people in the recent months with the release of the Pokemon go app.

The author goes into detail about how the app uses Google Maps and global Analytics to identify the position of a player, will the location of one anonymous player is be harmless now the potential for such Target positioning could be used against the single and user for a much more nefarious purpose down the track.

A professor from the American University of Sharjah, says the sharing of ones location is advantageous as long as the identity of the individual is not revealed. I would agree with the author on this issues, Analytics can be helpful when used in conjunction with correct Online data retention laws, however when an unsuspecting user agrees to terms and conditions too convoluted for them understand, and then is manipulated by Big Business it turns the once harmless app into a medium of misconduct.

 

References

Blogs.voanews.com. (2016). How Much Do You Know About Your Online Privacy? « Techtonics. [online] Available at: http://blogs.voanews.com/techtonics/2016/08/05/how-much-do-you-know-about-your-online-privacy/ [Accessed 8 Aug. 2016].

Fiegerman, S. (2016). Even your battery status may threaten your privacy online. [online] CNNMoney. Available at: http://money.cnn.com/2016/08/02/technology/battery-level-data-privacy/ [Accessed 8 Aug. 2016].

Geist, M. and Technology, L. (2016). Canada needs beefed up online privacy consent laws: Geist | Toronto Star. [online] thestar.com. Available at: https://www.thestar.com/business/2016/08/01/canada-needs-beefed-up-online-privacy-consent-laws-geist.html [Accessed 8 Aug. 2016].

Post, B. (2016). Should you have to pay for online privacy? FCC head says no. [online] The Denver Post. Available at: http://www.denverpost.com/2016/08/05/should-you-have-to-pay-for-online-privacy-fcc-head-says-no/ [Accessed 8 Aug. 2016].

Suchitra Bajpai Chaudhary, S. (2016). Pokemon Go mania in UAE: Be wary of compromising online privacy. [online] GulfNews. Available at: http://gulfnews.com/news/uae/crime/pokemon-go-mania-in-uae-be-wary-of-compromising-online-privacy-1.1862904 [Accessed 8 Aug. 2016].