surveillance capitalism, data, and privacy
In the era of rapid development of the technology and network, they bring us more convenient and advanced life. The numbers of channels for people to gain information will increase and also the timeliness and effectiveness of information will also be stronger. However, while using the network to facilitate our life, people should also pay attention to network security issues, like personal information leak, fraud, internet addiction and so on. Today, unauthorized disclosure of personal information is one of the major problems that people should raise awareness of information protection.
In our daily life, everyone knows to protect theirs privacy and will not easily give personal details to other people. However, on another level, we seem to be naked in this era of information development. We expose our personal information inadvertently, like online shopping, registering an account, filling out a questionnaire and participating in a lucky draw.In the past decade, a term of Surveillance Capitalism has appeared in the visual field of public. The professor of Harvard University, Shoshanna Zuboff in her book “The Age of Surveillance Capitalism” coined a term “Surveillance Capitalism” which is “the monetization of data captured through monitoring people’s movements and behaviors online and in the physical world”(Rouse,2018). From this, a question has been raised “how does the companies know consumer’s behaviors ?” Google, as the pioneer of the big data, is a perfect example of analysis the Surveillance Capitalism. As the Advertising is one of the fastest, most cost-effective and effective ways of transmitting information, many company choose this way to promote. Hence, it have been using technology that hidden under advertising to capture as much user data as possible. Advertising is everywhere in our daily life, i.e, TV, bus stop, Youtube and many other types of promotion. What caught my attention was once that I receive an email about a pair of shoes and then I open the Youtube, I was surprised by the advertisement before the video was exactly about the shoes. In addition to the surprise, I was shocked. It feels like my personal information has been leaked. Email is a very private and important platform for people to communicate, especially in work. However, according to Wall Street Journal, Google allows hundreds of outside software developers to read and store personal information from millions of the company’s customers, as long as they have consented(Evans, 2018). This is how google share user information to the third parties. Although in 2018, google claimed that they “would no longer scan people’s Gmail emails for keywords that could be used to target ads at them”(Meyer,2018). What makes people more worrying is that “the possibility of those third-party services sharing users’ data with other third parties” (Meyer,2018). Google, one of the biggest data company, it really disappoints many users.
Hence, I used ad blocker to block all the advertising on my computer and phone in order to skip the advertisements and prevent my personal information leak. Anyhow, everything has two sides, as blocker can save some times by skipping the advertisements but does it really safe? As Stommel and Michael said that we need to see what the tools say they do and comparing that to what they actually do (Stommel&Michael, 2018).  According to an independent security researcher, he found that “eight browser extensions used by around 4 million Firefox and Chrome users were harvesting data”(O’Flaherty, 2019). The leaked data is not only the personal information, but also including “tax returns, GPS location, cloud services and data, file attachments, credit card information, genetic profiles and online shopping history”(O’Flaherty, 2019). People should be aware of the harm of Internet personal information disclosure.
What is the consequences of disclosing personal information? First of all, user’s personal property is threatened. Criminals can collect the personal information from illegal way and analyze the characteristics of the user to conduct crimes. For example, I have received a call, the person in the call saying that I had a package that seized by Chinese customs. In the package, there are some passports that belong to money laundering criminal. On the call, he can accurately provide my personal information. Fortunately, I have heard this kind of case in the social media, otherwise, I don’t know what the consequences will happen. Secondly, leaking information does not only lead threats to individuals, but also nation and company. If criminals sell the information to a company’s competitors, it will cause huge loss. Suppose the company that corporate with the nation confidential has been leaked, it also poses a threat to national security. For instance, in 2016, there were about 50 million Turkish citizens’ information has been leaked, including the president of Turkey, Recep Tayyip ErdoÄźan(Tait,2016). The leaked information including national identity numbers, addresses, dates of birth and names of parents that are downloadable in a 6.6 GB file(Tait,2016). This leak becomes the major breach for the Turkish authorities. The last threaten of personal information leaking is undermined personal reputation. Although leaking private information cause serious threats to individuals, companies and counties, it is even more frightening that privacy leaks can affect a person’s reputation. All the bad things that others have done under your name are your responsibilities to deal with. In the end, you may be able to prove that you are innocent, but the things have happened, personal reputation is still undermined.
Therefore, individuals need to be aware of all the possibilities of leaking information. Users who post sensitive information and share their locations in social media will easily be the target for the hackers or criminals. As well as the internet questionnaire that requires fill in users personal information. According to Hern and Cadwalladr, Aleksandr Kogan collected the information of Facebook users once they download his This Is Your Digital Life app (Hern&Cadwalladr, 2018). Even more, The author said that “For the users who did install the app, potentially their entire mailbox history was uploaded”(Hern&Cadwalladr, 2018). Although Facebook and Kogan refused to admit everything, the Facebook users who downloaded the app and being information leaked are the best witnesses. In addition to citizens should raise their awareness of self-protection, the government should also take some actions. The government website operation management need to fix the leak immediately to prevent more people involved in. Also, supervisors of internet security can use 24 hours technique to monitor the personal information. Once the problems are founded, specialists can use social media to warn citizens in order to minimize the damage of personal information leak and state secrets. Other than this, the reporters or issuers before they publish articles and news, they need to be careful that all personal information does not appear. If all levels of the judiciary can immediately crack down on information disclosure crimes from today, it will not be difficult for the public to regain a sense of security about personal privacy.
Network supervision is an urgent task. It is not an exaggeration to say that everyone is facing the threat of personal privacy disclosure. All of individuals need to take responsibility to protect personal information To avoid losses.
Reference:
Evans, P.(2018). Google faces criticism for giving 3rd-party apps access to user emails. CBC News. Retrieved from https://www.cbc.ca/news/business/gmail-privacy-security-1.4733533
Hern, A., & Cadwalladr, C. (2018, April 13). Revealed: Aleksandr Kogan collected Facebook users’ direct messages. Retrieved from https://www.theguardian.com/uk-news/2018/apr/13/revealed-aleksandr-kogan-collected-facebook-users-direct-messages
Meyer, D. (2018). Google Admits That It Lets Outside Services Share Your Gmail Data. Retrieved from https://fortune.com/2018/09/21/google-gmail-privacy-data-third-parties/
Morris, S. M., & Stommel, J. (2018). A Guide for Resisting Edtech: The Case Against Turnitin. An Urgency of Teachers. Retrieved from: https://criticaldigitalpedagogy.pressbooks.com/chapter/a-guide-for-resisting-edtech-the-case-against-turnitin/
O’Flaherty, K. (2019,). Data Leak Warning Issued To Millions Of Google Chrome And Firefox Users. Retrieved from https://www.forbes.com/sites/kateoflahertyuk/2019/07/19/data-leak-warning-issued-to-millions-of-google-chrome-and-firefox-users/#5b6ac1b43ded
Rouse,M.(2018).What is surveillance capitalism? – Definition from WhatIs.com. Retrieved from https://whatis.techtarget.com/definition/surveillance-capitalism
Tait, R. (2016, April 4). Personal details of 50 million Turkish citizens leaked online, hackers claim. Retrieved from https://www.telegraph.co.uk/news/2016/04/04/personal-details-of-50-million-turkish-citizens-leaked-online-ha/
Leave a Reply