May 1, 2014
Childress, Sarah “The future of Digital Marketing is you” PBS February 2014 Web April 5,
marketing-is-you/ Privacy advocates would disagree. Mining of data for the soul
purpose to have that information be used commercially and can lead to abuse of that vital
data. Target recently experienced a hack of customer data has brought up questions about
transparency on what is being collected, how much is collected, how is that information
being used and if it is even accurate. Target has also seen the backlash of analyzing data
of purchase histories when a high school student was being sent fliers to her at home with
ads for baby products. The father of the high student did not know his daughter was
pregnant. Target did apologize and they changed the mailers to look less conspicuous.
Guilford, Gwynn “Instagram teaches users Digital Media.” Yahoo Finance Web December
2012 Web April 8, 2014 http://finance.yahoo.com/news/instagram-teach-users-digitalmedia-
114500712.html Users certainly are outraged with privacy policies that push the
usage into two different categories. Paying for the commodity/service or the usage online
with the social network is the commodity /service. Most startups will start with a “free for
now” to attract users however it may not be clear for the start how they plan to monetize
from it’s users. Being upfront about how that is used detracts users and can sink start-ups
that are looking to grow quickly. The decision is in the hands of the AP user. Will they
vote for less that superior platform or paid services in trade for boycotting the digital
Markoff, John You’re Leaving a Digital Trail. What About Privacy? The New York Times. 28
November 2008. Web. 8 April 2014.
100 MIT students agree to being tracked in trade for smart phones. The information
tracked is everything from music downloads. The author pulls us in telling us that the 100
students got free smart phones but it did cost them privacy and the collection of
information is powerful and if abused could be catastrophic. The author poses questions
about the miss use of that information by insurance companies to identify people
suffering from disease and denies them insurance coverage. The author is uses lot of data
on the technology being tracked and how it is being used and presents a good argument
for both the positive and negative effects of tracking and storing that information. Experts
that were interviewed share insight to the future with systems that data can disappear in
an attempt to protect privacy. The use of technology to reduce the epidemic of severe
acute respiratory syndrome in infected people and could have stopped it early on. The
author end his article by comparing us to a small tribe where everyone knew everything
they did they knew. He wants us to reason with the fact that nothing is new under the sun
and that we should accept the things we cannot control or change.
Notari, Caetano “Boston bombing manhunt and privacy in a digital world – opposite ends of our
reality?” Intelligent Inclusion. 24 April 2013. Web. 8 April 2014.
The article recaps the events of the Boston Marathon and how technology was used to
help with the case and lead to the fast capture of the bombers. The public’s help in
providing the FBI with images and videos helped to detain the individuals involved
quickly. The author uses ethos to appeal to the reader with a disclaimer that he is against
violence and his personal experience living in a country with military dictatorship and
lack of human rights. This writer mentions articles he has written in the past on the
subject of privacy in the digital age. He states that he in now describing the state of
privacy as “gone for good” and that this case certainly will have effects on the state of
privacy in the future. He suggests that improvements of technology make everyone a
reporter. The amount of people recording and taking pictures along with all the
surveillance cameras is setting records and does not leave much room to be anonymous.
The article also includes information about the size and tradition of the marathon. “With
over 500,000 spectators. So, if one-third of them took at least 4 pictures, we likely have
over half a million high-definition images of the event.” Presenting both the positive and
negative side to the use of media the author also mentions how it lead to “modern day
witch hunt” when an innocent Brown student was identified in connection with the events
in error. He rounds out his article with stating, “I can’t do anything to change this, but
now I can accept it. He continues to try and convince is to also accept it when he explains
he is going to install his own set of surveillance cameras. He encourages the readers to
get involved with digital inclusion programs and that mankind can evolve if we use the
technology for its knowable and efficacy.
“ Is online privacy over?” USC Annenberg Center for the Digital Future. 22 April 2013. Web.
8 April 2014.
The author jumps in to layout the difference between how Millennial and older Internet
users feel about privacy and social media. Millennial are more willing to allow access as
long as they have tangible benefits in return. Jeffrey I. Cole, director of the USC
Annenberg Center for the Digital Future states that Millennial get that online privacy is
dead. New sets of values are driving behaviors in new ways. The article provided good
Meta data about the numbers of Millennial vs. older users that trust the use of social
networking and direct marketing advertising. Most of the data collected came from The
Center for the Digital Future and Bovitz. They are touted as experts in this area and a
reliable source for understanding the differences of the two generations.
HENN, STEVE “If there’s privacy in the Digital Age It Has a New Definition” NPR
March 2014 Web April 8 2014
Steve Henn for NPR in March of 2014 takes closer look at how we collect and track
information as part of our modern life. Finding privacy in our forever changing
information tracking work has even experts saying it is becoming more and more
impossible to keep personal data private. With all the ways information is stored and
shared a new set of definitions are changing the rules and expectations for privacy are
being redefined. How that information is stored and shared and protected from the hands
of third parties that could cause harm or benefit from your information privately. Unlike
checking credit you must have permission. Tracking how personal data is pulled up in
individuals could have adverse effects when applying for jobs or not know what
information is being reported.
Guilford, Gwynn “Instagram teaches users Digital Media.” Yahoo Finance Web
December 2012 Web April 8, 2014 http://finance.yahoo.com/news/instagram-teachusers-
Paying for the commodity/service or the usage online with the social network is the
commodity /service. Most startups will start with a “free for now” to attract users
however it may not be clear for the start how they plan to monetize from it’s users. Being
upfront about how that is used detracts users and can sink start-ups that are looking to
grow quickly. The decision is in the hands of the ap user. Will they vote for less that
superior platform or paid services in trade for boycotting the digital sharecroppers?
May 1, 2014
Digital Privacy and the Modern World
When our fore fathers penned the Declaration of Independence and put into motion the ideals of individual liberties, the future technology and the liberties associated with technology was furthest from their minds. The world in which we live, work and play is certainly a different place from theirs. The way information is stored and shared has a new set of definitions, rules and expectations. Our rights for privacy are being redefined.
The question I set out to answer was “Is it becoming more difficult to keep personal data private?” Tracking a person’s shopping habits or online behaviors does not require the same permissions as checking ones credit. When considering the way personal data is gathered and stored, it is frightening what personal information might pop up. For example, an arrest from a person’s past may come back to haunt them even if the charges were later dropped. This personal data may be pulled up when a potential employer is researching a potential employee’s candidacy for employment. Potentially causing problems and embarrassment, despite the person’s belief the problem had been resolved. Currently there is no way to know when or why your data is being used. “Big brother” and big business are benefiting monetarily from the information we willingly and unwillingly share without our knowledge or permission. Equipping ourselves with the information to keep our information private and out of the hands of those who could do us harm. The research collected came from various articles from authorities in technology, government and security. Some of the information was surprising.
Digital privacy is often equated with things done online; yet, this data is gathered from offline sources as well. I never considered the amount of information captured offline through physical objects or shopping habits. Online and offline activity is being saved in the vaults of Big Data and is becoming the most powerful source of information ever collected in human history. Those who access and control the platforms of data mining and surveillance on the web can decide the future of your information. The U.S. government’s goal with our information is to protect against terrorism. Companies understand the data that has been extracted is currently worth over $200 billion for retailers in the U.S. alone (Childress). You do not need to be online to have companies gain access to your information going beyond what is posted online. New information is also being collected from the physical objects and the tech world refers to this as the “Internet of Things”. Those items include televisions, refrigerators, thermostats, pacemakers, roads and cars (Childress). The sensors in those objects are gathering information that is then uploaded to the web for analysis. The information gathered can be as personal as any email, Facebook post or tweet. In a recent PBS frontline article they explored how companies like Target, mine data to advertise specific marketing to customers. Target has also seen the backlash of analyzing data of purchase histories when a high school student was being sent fliers to her home with ads for baby products. The father of the student did not know his daughter was pregnant. Target later apologized and changed their mailers, making them look less conspicuous. The Federal Trade Commission has been working to keep our children safe from being targeted by ads online, however technology is moving faster than our laws and government can regulate. Advocates for consumer protection have committed to fighting for updated privacy and security. These actions have also prompted companies to find guidelines helping them to be responsible with information gathered from consumers. (Childress) In the wake of Target’s consumer information being stolen, questions are being asked about what information is collected, how much is collected, and how the information will be used. Even more concerning is the accuracy of the information having been gathered. The importance of what the companies are doing with this data and the responsibility they have to be more transparent about how that information is collected and used.
In the past year the events of the Boston showed how information sharing could be both positive and negative. The use of technology did help with the case and also brought the fugitives into custody in a fairly quick amount of time. The FBI could use photos and videos that were sent to them to help to identify the fugitives. This unfortunately also causes a modern day witch-hunt when some incorrect information was shared with the public. It is hard to pull back the wave and onset of the information being fed back into the main stream. In the article “Boston bombing manhunt and privacy in a digital world – opposite ends of our reality?” The author is very frank about his view of the current state of privacy. “I can’t do anything to change this, but now I can accept it.” He claims our state of privacy i “gone for good” and events like what occurred at the Boston Marathon will effect on the state of privacy in the future. (Notari)
Digital privacy is a very broad topic to tackle. You certainly cannot contain it to one tidy box. There is no hard and fast rule for taking on the new Wild West of the digital age and beyond. I certainly think we need to learn to educate ourselves. Know how to protect ourselves from the things we can’t control and control what information we do give out. Get involved with your local legislature to protect consumer’s information from falling into the wrong hands. The power to share and use technology can make our world a safer place.
May 6, 2014
The topic I chose for my Exploration Essay was digital privacy. This topic was not as easy to write about. The research opened my eyes to many different things that I had never considered before. With each new finding I found my self-changing how I felt. I quickly realized that this topic was more multifaceted then I had ever original anticipated. Finding the correct way to present my findings became difficult to communicate. Towards the end I was able to find a voice that did not take sides but presented what I found. The goal was to inform the reader, and let them decide how best to use that information for their own personal needs. It becomes hard to deal about topics with such grey areas and had I research before choosing I would have gone a different direction with my writing topic. This is one thing I would have changed about how I approached the topic. I would have researched more first to see what type of information I could find. I just assumed it was a hot topic and found that information available was lacking in the type of content I needed to write my paper.
I learned thru this course that writing and exploring topics and siting information is helpful and can be beneficial to having those skills in the future if I am working for someone that requires those skills or just updating my own personal blog that touches on researched subject matters. This was a great paper and I enjoyed the time spent on writing, editing and sharing.
Art has been a been my passion. Since 2005 I have had the opportunity to work in the crafting industry. During this time I have had the wonderful pleasure of creating, selling, and teaching crafting tools and products to preserve memories and tell stories and inspire. My deep-rooted passion for these things became the foundation for me to complete my degree in graphic design. My work has been published in Paper Crafts Magazine, Heritage Makers idea books 2010-2112. I am currently a freelance design team member for Heritage Makers. During my spare time I enjoy preserving my family memories, card making and wandering Salt Lake for the perfect photo opportunity.
I currently reside in South Jordan with my husband, two girls and our beloved dog.