Jump to content

Dataveillance: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Added line about sousveillance
mNo edit summary
Line 7: Line 7:
The types of dataveillance are sepereated by the way data is collected, as well as the number of being individuals associated with it.
The types of dataveillance are sepereated by the way data is collected, as well as the number of being individuals associated with it.


''Personal Dataveillance:'' Personal dataveillance refers to the collection of a person's personal data. Personal dataveillance can occur when an individual's data causes a suspicion or has attracted attention in some way.<ref name=":0" /> Personal data can include information such as birth date, address, social security (or social insurance) number, as well as other [[Unique identifier|unique identifiers]].
'''''Personal Dataveillance:''''' Personal dataveillance refers to the collection of a person's personal data. Personal dataveillance can occur when an individual's data causes a suspicion or has attracted attention in some way.<ref name=":0" /> Personal data can include information such as birth date, address, social security (or social insurance) number, as well as other [[Unique identifier|unique identifiers]].


''Mass Dataveillance:'' Refers to the collection of data related to the
'''''Mass Dataveillance:''''' Refers to the collection of data related to the


(REFER TO THE DEFINITIONS OF DATAVEILLANCE HERE. ID THE THREE TPYES. DO NOT PUT HOW THEY COLLECT INFO. USE THAT FOR A DIFFERENT SECTION?)
(REFER TO THE DEFINITIONS OF DATAVEILLANCE HERE. ID THE THREE TPYES. DO NOT PUT HOW THEY COLLECT INFO. USE THAT FOR A DIFFERENT SECTION?)
Line 35: Line 35:


{{dashboard.wikiedu.org sandbox}}{{student sandbox}}
{{dashboard.wikiedu.org sandbox}}{{student sandbox}}
__FORCETOC__
[[Category:Big data]]
[[Category:Surveillance]]
[[Category:Communication]]

Revision as of 04:00, 30 November 2016

Dataveillance

Dataveillance is the surveillance and collection of online data as well as metadata.[1] Dataveillance is concerned with the continuous monitoring of users' communications and actions across various platforms.[2] For instance, dataveillance refers to the monitoring of data produced by credit card transactions, GPS coordinates, emails, social networks, etc. Using digital media often leaves traces of data and creates a digital footprint of our activitiy.[3] This type of surveillance is not often known and happens discretly.[4] Unlike sousveillance, where individuals willingly surveillance their activity, dataveillance is more discrete and unknown. Dataveillance may involve the surveillance of groups of inviduals. There exists three types of dataveillance: personal dataveillance, mass dataveillance, and facilitiative mechanisms. [2]

Unlike computer and network surveillance, which collects data from computer networks and hard drives, dataveillance collects data (and metadata) online through social networks and various platforms. Dataveillance is not to be confused with electronic surveillance. Electronic surveillance refers to the surveillance of oral and audio systems such as wire tapping.[2] Additionally, electronic surveillance depends on having suspects already persumed before surveillance can occur.[5] On the other hand, dataveillance can use data to identify an individual or several suspect(s).[5] The suspects that being refered to are people who leave data behind with their online activity.

Types of Dataveillance

The types of dataveillance are sepereated by the way data is collected, as well as the number of being individuals associated with it.

Personal Dataveillance: Personal dataveillance refers to the collection of a person's personal data. Personal dataveillance can occur when an individual's data causes a suspicion or has attracted attention in some way.[2] Personal data can include information such as birth date, address, social security (or social insurance) number, as well as other unique identifiers.

Mass Dataveillance: Refers to the collection of data related to the

(REFER TO THE DEFINITIONS OF DATAVEILLANCE HERE. ID THE THREE TPYES. DO NOT PUT HOW THEY COLLECT INFO. USE THAT FOR A DIFFERENT SECTION?)

Benefits and Concerns

Pros

There are many concerns and benefits associated with dataveillance. Dataveillance can be useful for collecting and verifying data in ways that are benefical. For instance, personal dataveillance can be utilized by financial institutions to track fraudulant purcahses on credit card accounts.[2] This has the potential to prevent and regulate fradulate financial claims.

Dataveillance has also been useful in assessing security threats associated with terrorism. Authorities have utilized dataveillance to help them understand and predict potential terrorist or criminal threats.[6] Dataveillance is very important to the concept of predictive policing. Since predictive policing requires a great deal of data to operate effectively and dataveillance can do just that.

Businesses also rely on dataveillance to help them understand the online activitiy for potential clients by tracking their online activity.[7] By tracking their online activity through cookies, as well as various other methods, businesses are able to better understand what sort of advertisements work with their existing and potential clients.[7] While making online transactions users often give away their information freely which is later used by the company for coperate or private interests.[8] For businesses this information can help boost sales and attract attention towards their products to help generate revenue.

Cons

On the other hand, there are many concerns that arise with dataveillance. Dataveillance assumes that our technologies and data are a true reflection of ourselves.[2] This presents itself as a potential concern given that it can be believed that our data is true to our own actions and behavoirs.[6] This becomes a critical concern when associated with the surveillance of criminal suspects and terrorist groups. Authorities who monitor these suspects would then assume that the data they have collected is a reflection of their actions and potential or past threats. [6]

There is also the lack of transparency and privacy with companies who collect and share their user's data.[2] This is a critical issue with both the trust and belief of the data and its uses.[1] Many social networks have argued that their user's forfeit part of their privacy in order to provide their service for free.[1] ISeveral of these companies choose not to fully disclose what data is collected and who it is shared with. When data is volunteered to companies it is difficult to know what companies have gain data about you and your online activity.[6] Much of an individual's data is is shared with websites and social networks in order to provide a more customized marketing experience. Many of those social networks amy share your information with intellegent agencies and authoroties without a user's knowledge.[1] Since the recent scandal involving Edward Snowden and National Security Agency it has been revealed that authorities may have access to more data from various devices and platforms.[1] It has become very diffuclt to know what will happen with your data or what speficially has been collected. It is also important to recognize that while online users are worried about their information many of those same worries are not always applied to their activites or behavoir.[9] With social networks collecting a large amount of personal data such as birth date, legal name, sex, and photos there is an issue of dataveiallance comprimising confidentiality. Dataveillance can comprise online anonymity.

While dataveillance may help businesses market their products to existing and potential clients there are concerns over how and who has access to customer data. When visiting a businesses website often install cookies onto a users device. Cookies have been a new way for businesses to obtain data on potential customers since it allows them to track their online activites.[7] Companies may also look to sell information they have collected on their clients to third parties.[7] Since clients are not notified about these transactions it become difficult to know where your data has been sold. Furthermore, since dataveillance is discrete clients are very unlikely to know the exact nature of the data that has been either collected or sold.[7]

The issue stemming from companies and other agencies which collect personal data and information is that they have now engaged in the practices of data brokering. Data brokers, such as Acxiom, collect users information and are known for often selling that information to third parties. While companies may disclose that they are collecting data or online activity from their users it is usually not comprehensible by everyday users.[8] It is diffuclt for everyday people to spot this disclosure since it is hidden by jargon and writing most often understood by lawyers.[8] This is now becoming a new source of revenu for companies.

One of the major issues with dataveillance is the removal of a human actors who are replaced by computer system that oversee data and construct a representation from it.[3] The removal of human actors can allow for false representations to be created based on the data collected. This is largely due to the lack of loigcal reasoning or understanding of the data. Computer systems can only use the data they have, which is not necessarily an accurate depiction of individuals or their situations. Dataveillance is highly automated through computer systems which observe our interactions and activities which

This template should only be used in the user namespace.This template should only be used in the user namespace.

This template should only be used in the user namespace.
  1. ^ a b c d e van Dijck, José (2014). "Datafication, dadaism and dataveillance: Big Data between scientific paradigm and ideology". Surveillance & Society. 12 (2). ISSN 1477-7487.
  2. ^ a b c d e f g Clarke, Roger A. (1988). "Information Technology and Dataveillance". Communications of the ACM. 31: 498–511.
  3. ^ a b Selwyn, Neil (2014). "Data entry: towards the critical study of digital data and education". Learning, Media and Technology. 40 (1). Routledge: 64–82. doi:10.1080/17439884.2014.921628.
  4. ^ Clarke, Roger (1996). "Privacy and dataveillance, and organizational strategy". Proceedings of the IS Audit & Control Associate Conference.
  5. ^ a b Frikken, Keith B.; Atallah, Mikhail J. (2003). "Privacy preserving electronic surveillance". Proceedings of the 2003 ACM workshop on Privacy in the electronic society.
  6. ^ a b c d Amoore, Louise; Goede, Marieke De. "Governance, risk and dataveillance in the war on terror". Crime, Law and Social Change. 43 (2–3): 149–173. doi:10.1007/s10611-005-1717-8. ISSN 0925-4994.
  7. ^ a b c d e Ashworth, Laurence; Free, Clinton (2006-08-26). "Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers' Online Privacy Concerns". Journal of Business Ethics. 67 (2): 107–123. doi:10.1007/s10551-006-9007-7. ISSN 0167-4544.
  8. ^ a b c Tsesis, Alexander (2014). "The Right to Erasure: Privacy, Data Brokers, and the Indefinite Retention of Data". Scientific American. 49: 433–484 – via HeinOnline.
  9. ^ Ragnedda, Massimo (2015-01-01). "Electronic surveillance on Social Networking Sites. A critical case study of the usage of SNSs by students in Sassari, Italy". Studies in Communication Sciences. 15 (2): 221–228. doi:10.1016/j.scoms.2015.05.001.