Friday, December 3, 2010
Monday, November 22, 2010
Wednesday, November 3, 2010
Wednesday, October 27, 2010
Monday, October 18, 2010
Judith Thomson`s discussion of privacy puts all of our worries into a practical perspective. If you’re having a conversation in your house and you don’t want outsiders to hear it, then you should have your windows closed and you should take the measures that you can to ensure that nobody can hear you. If you leave your door and windows open then you can’t keep people from overhearing – you are accountable for your own privacy. It’s the same when using the web. Some people are highly cautious about their privacy when surfing the web. Some even go to lengths to use IP scramblers so they can surf the web anonymously.
In my opinion, the concept of privacy is unique to every individual. We each see and value privacy differently; our vision of privacy is shaped by our knowledge of its implications and our personal values. And as Thomson repeats in her article, the right to privacy is also overlapping with other rights. It’s clear that the concept of privacy is very difficult to define. But if we can’t define it, how can we protect it?
I understand that companies keep track of my actions on shopping websites and use that information in data mining. In this way, I know I am accountable for my actions online, just as I am accountable for my actions in physical public space – and there`s nothing private about either one. When I’m meandering through a store, I can’t keep the clerks from watching me and taking note of my interests. Likewise, when I’m shopping online, I know that something is keeping track of the items I’ve viewed. This is something I have to accept if I want to shop online. Not everyone sees it this way and many people are shocked to find that just because they are surfing the internet alone in a room, doesn`t mean they have complete privacy.
It is hard for average web users to grasp the concept that their actions online do not go unseen simply because there is no physical body watching them. Many people assume that because they use their computers in the privacy of their home, they are private in what they do online. Windows are automatically open when one starts using the Internet – individuals have to go to the length of shutting the windows before they want to do something privately. The problem when it comes to protecting privacy online is that is in increasingly taking more technical skills to ensure one’s privacy. Very few people have the technical skills (and the awareness of the tracking capabilities of most websites) to make sure that they are protected if they want to be. Professional techy people are hired for web companies to write codes that track IPs, collect data, implant cookies, etc. while the majority of internet users barely understand what information they are giving away freely and don’t know where to begin to protect themselves online. This is the difference between Thomson’s practical analyses and privacy online. It’s not as simple as shutting a window. It’s almost impossible to ensure that we have constructed for ourselves impenetrable walls. To protect privacy online, one must take an extra length of effort: one must have the awareness of privacy`s importance, plus technical skills and time to go about protecting oneself. Unfortunately, many of us don`t have the extra time, and many others just can`t be bothered.
Perhaps if there was greater awareness of the serious implications of protecting identity and privacy online, more people would take the extra length of effort.
Wednesday, September 29, 2010
After reading the interview with Barou, Foucault, and Perrot, in addition to the piece on “Sousveillance” it is clear that in the 21st century there exist diverse methods and effects of surveillance. At one point in the interview, Foucault mentions that the importance of Bentham’s concept of the gaze is archaic by today’s standards. No longer can something like Bentham’s panopticon model be thought of as an ultimate solution to easily control the behaviour of a large number of people. Today we are constantly using a variety of technological devices, which use a variety of methods of tracking us and mining our information. The idea that big brother is watching – that we are all under one vast overseeing gaze – is hard to reinforce because there are an increasing number of methods of surveillance today. Furthermore, it is becoming less and less obvious to individuals that they are under surveillance as the methods used for tracking people and information are disguised in the form of a necessity, a tool, or an entertaining activity.
Steve Mann’s experiments go a few steps father than Bentham’s concept. The article discusses some of Mann’s surveillance experiments and shows how our attitudes and concerns can change about being watched – but it depends on where we believe the gaze originates. “Sousveillance” is an interesting term in the article; it refers to the use of panoptic technology to monitor authority figures and help individuals take control of how they are being monitored. Indeed, by turning the gaze on those who are used to being the “watchers” Mann was able to cause a minor breakage in the power relationship, empowering the individual as opposed to the authority. But we’re not allowed to just go around everywhere with a camera attached to our body. It is tricky to implement Mann’s theory in real world settings. So what can we do?
I believe the website theyrule.net is an example of one way in which we can start to shift the gaze around. The site offers org charts of the major US companies, listing the names of their directors and illustrating how much power a few companies and directors actually have over the economy. I love the concept of this site. Having information about major companies, being knowledgeable about a conglomerate’s assets, etc. provides an everyday person with power as a consumer. Keeping an eye out on the power relations between companies is definitely an example of sousveillance because it undermines the branding of major corporations that disguise themselves with a variety of brand names. Such knowledge means that the individual can’t as easily be manipulated by companies who purport to have specific values when really their values are the same as their relatives. The information on theyrule.net can enable a person to make more informed consumer decisions, rather than falling victim to corporate manipulation and advertising – the corporate gaze.
While all this talk of the gaze and power relations can be a bit scary, what’s even worse in my opinion is the fact that sometimes the gaze is invisible. As I mentioned earlier, new fun gadgets and convenient technologies (debit cards, visas), make it less obvious to individuals that they are being tracked. When the gaze becomes invisible, or when we don’t know where it’s coming from but we know we’re under watch – that’s when I would be most concerned. I thought about the Google Street View car example that we discussed in lecture.... If the Google car was driving around my neighbourhood with a big camera taking pictures, yes it would feel a bit invasive, but at least I would have a good idea as to why it is in my neighbourhood. If a car with no name on it was driving around taking pictures – I would be much more worried. I wouldn’t know why it was taking pictures, or where the pictures might end up. And I wouldn’t really be able to practice sousveillance because how would I know what authority to keep watch on?
To sum it up, I agree that Bentham’s concept is archaic as new technologies allow surveillance of individuals in a greater variety of ways than simply one gaze. I also like the concept of sousveillance to undermine the power of authorities. But my problem is that as the technologies become more advanced, they become more invisible – and so does surveillance. As the example with the nameless car shows, it becomes more difficult for us to know when we are being watched, to pin down the authority, to know why we are being watched, what type of data is being gathered, and why. Invisibility of the gaze makes it very hard for us to be aware that we should even be practicing sousveillance.
Wednesday, September 22, 2010
The night of September 20th, I got home from our first full lecture and sat down at my laptop to check my email and finish coordinating a meeting with a friend. That night in class we had discussed actor-network theory and cybernetics, to note two topics... I log into my Gmail account and notice that my friend had agreed to meet with me the following day. I also notice to the right of my email, Google requesting to add this meeting to my calendar. I was caught off guard; Google had the details down: “meet at TD Bank on Richmond at 1pm”. How on earth....? And then I realized that I had written nearly those exact words to my friend in the previous email, which obviously triggered some Google Calendar function, providing me with the feedback that I should be adding this commitment to my calendar.
I am used to shopping online (Amazon, Sephora, etc), so I am frequently being offered suggestions by the cybernetic technology of those major consumer websites. I’m used to that sort of technology tracking my actions. But when I realized that text from my email was also being scanned – not just my clicks and product choices – I was shocked (and a little creeped out).
To me, this instance reveals greater depth to the capability of cybernetics than what we had discussed in class. In that moment, I realized that so many of our online activities occur within the cybernetic loop and we don’t even realize it, plus there’s not much we can do to avoid it.... unless we’d rather boycott web 2.0; these cybernetic surveillance technologies can only fulfill their intentions with our participation. We perpetuate the feedback loop between users and technology so technically, we’re accountable for the way cybernetics works. I am not willing to forfeit cybernetics today for the sake of my privacy and identity. So many of our online activities are interactive and the feedback we get – fun features, smart applications, efficient ways of web browsing – encourages us to continue interacting. It’s almost an example of classical conditioning, where we receive positive reinforcement for our behaviours. I’m conditioned to see cybernetics in a positive way. I want to keep participating and giving away my information.
And so I guess I understand now how, in terms of actor-network theory, I am an effect of the network. Who I am online is undoubtedly shaped by what I do and what I am connected to. email@example.com has a very specific identity, which is constructed by every interaction: every online purchase, every Google search, and every site that asks for a log-in or email.
I would love to see a giant a cloud diagram with my email or IP address in the middle of it, stretching out to everything I am related to online, every site that stores information on me...and then I would like to compare that data-mined image to who I think I am. I think it would be frightening to see all the information about me that is stored somewhere, but I think it would be interesting to see the type of identity that is constructed for me. How personally can an actor within the network be portrayed?