Dataveillance
Dataveillance
Dataveillance is the surveillance and collection of online data as well as metadata.[1] Also, dataveillance continuously monitors users' communications and actions across various platforms.[2] For instance, dataveillance refers to the monitoring of data produced by credit card transactions, GPS coordinates, emails, social networks, etc. This type of surveillance is not often known and happens discretly.[3] Dataveillance may involve the surveillance of groups of inviduals. There exists three types of dataveillance: personal dataveillance, mass dataveillance, and facilitiative mechanisms. [2]
Unlike computer and network surveillance, which collects data from computer networks and hard drives, dataveillance collects data (and metadata) online through social networks and various platforms. Dataveillance is not to be confused with electronic surveillance. Electronic surveillance refers to the surveillance of oral and audio systems such as wire tapping.[2] Additionally, electronic surveillance depends on having suspects already persumed before surveillance can occur.[4] On the other hand, dataveillance can use data to identify an individual or several suspect(s).[4]
Types of Dataveillance
The types of dataveillance are sepereated by the way data is collected, as well as the number of being individuals associated with it.
Personal Dataveillance: Personal dataveillance refers to the collection of a person's personal data. Personal dataveillance can occur when an individual's data causes a suspicion or has attracted attention in some way.[2]
Mass Dataveillance: Refers to the collection of data related to the
(REFER TO THE DEFINITIONS OF DATAVEILLANCE HERE. ID THE THREE TPYES. DO NOT PUT HOW THEY COLLECT INFO. USE THAT FOR A DIFFERENT SECTION?)
Benefits and Concerns
There are many concerns and benefits that are associated with dataveillance. Dataveillance can be useful for collecting and verifying data in ways that are benefical. For instance, personal dataveillance can be utilized by financial institutions to track fraudulant purcahses on credit card accounts.[2]
Dataveillance has also been useful in assessing security threats associated with terrorism. Dataveillance has utilized a tool to help understand criminal activity and impending terrorist activity.[5]
On the other hand, there are many concerns that arise with dataveillance. Dataveillance assumes that our technologies and data are a true reflection of ourselves.[2] This presents itself as a potential concern given that it can be believed that our data is true to our own actions and behavoirs.[5] This becomes a critical conern when associated with the surveillance of criminal suspects and terrorist groups. Authorities who monitor these suspects would then assume that the data they have collected is a reflection of their actions and potential or past threats. [5] However, the data collected by authorities may also help authorities prevent threats for being carried out and help protect individuals from criminal activity.[5]
There is also the lack of transparency and privacy with companies who collect and share their user's data.[2] This is a critical issue with both the trust and belief of the data and its uses.[1] Many social networks have argued that their user's forfeit part of their privacy in order to provide their service for free.[1] Several of these companies choose not to fully disclose what data is collected and who it is shared with. When data is volunteered to companies it is difficult to know what companies have gain data about you and your online activity.[5] Much of an individual's data is is shared with websites and social networks in order to provide a more customized marketing experience. Many of those social networks amy share your information with intellegent agencies and authoroties without a user's knowledge.[1] Since the recent scandal involving Edward Snowden and National Security Agency it has been revealed that authorities may have access to more data from various devices and platforms.[1] It has become very diffuclt to know what will happen with your data or what speficially has been collected.
With social networks collecting a large amount of personal data such as birth date, legal name, sex, and photos there is an issue of dataveiallance comprimising confidentiality. Dataveillance can comprise online anonymity.
This is a user sandbox of Dataveillance. You can use it for testing or practicing edits. This is not the sandbox where you should draft your assigned article for a dashboard.wikiedu.org course. To find the right sandbox for your assignment, visit your Dashboard course page and follow the Sandbox Draft link for your assigned article in the My Articles section. |
This template should only be used in the user namespace.This template should only be used in the user namespace.
This is a user sandbox of Dataveillance. A user sandbox is a subpage of the user's user page. It serves as a testing spot and page development space for the user and is not an encyclopedia article. |
- This template should only be used in the user namespace.
- ^ a b c d e van Dijck, José (2014). "Datafication, dadaism and dataveillance: Big Data between scientific paradigm and ideology". Surveillance & Society. 12 (2). ISSN 1477-7487.
- ^ a b c d e f g Clarke, Roger A. (1988). "Information Technology and Dataveillance". Communications of the ACM. 31: 498–511.
- ^ Clarke, Roger (1996). "Privacy and dataveillance, and organizational strategy". Proceedings of the IS Audit & Control Associate Conference.
- ^ a b Frikken, Keith B.; Atallah, Mikhail J. (2003). "Privacy preserving electronic surveillance". Proceedings of the 2003 ACM workshop on Privacy in the electronic society.
- ^ a b c d e Amoore, Louise; Goede, Marieke De. "Governance, risk and dataveillance in the war on terror". Crime, Law and Social Change. 43 (2–3): 149–173. doi:10.1007/s10611-005-1717-8. ISSN 0925-4994.