Privacy, Surveillance, and the New Media You
Series:
Edward Lee Lamoureux
Very little in the American way of life functions adequately under surveillance. Democracy itself may be at mortal risk due to the loss of privacy and the increase in surveillance.
Examining challenges in a wide range of contexts, this book investigates and critically examines our systems of data management, including the ways that data are collected, exchanged, analyzed, and re-purposed.
The volume calls for re-establishing personal privacy as a societal norm and priority, requiring action on the part of everyone at personal, societal, business, and governmental levels. Because new media products and services are professionally designed and implemented to be frictionless and highly rewarding, change is difficult and solutions are not easy. This volume provides insight into challenges and recommended solutions.
Book (EPUB)
- ISBN:
- 978-1-4331-3579-8
- Availability:
- Available
- Subjects:
Prices
Currency depends on your shipping address
- New York, Bern, Berlin, Bruxelles, Frankfurt am Main, Oxford, Wien, 2016. XL, 248 pp.
- Cover
- Title
- Copyright
- About the author(s)/editor(s)
- About the book
- This eBook can be cited
- Contents
- Acknowledgements
- Preface
- Introduction
- How the Heck Did We Get Here?
- Technological Complexities in Data Collection: Out of Sight, Out of Reach
- Appealing to Consumers’ Lowest Common Denominators: It’s All Good?
- Supporting Economic Interests of Business and Industry: Doubling Down on Data
- Unwillingness of Government to Protect Its Citizenry from Itself: Corporations Are Our Most Valued People
- Concerns over Terrorism and Security Risks: A Darned (In)Convenient War on Terror
- Family Observations: A Personal Anecdote
- Chapter Previews
- Chapter 1: The Harms
- Loss of Control over Personal Data
- Hacking as Lawlessness
- Leaks and Sponges: We Were Not Supposed to Collect It or Lose It
- Costs and Harms of Data Breaches
- Undermining Constitutional Protections
- Encroaching on First Amendment Protections
- Encroaching on Third Amendment Protections
- Encroaching on Fourth Amendment Protections
- Encroaching on Fifth Amendment Protections
- Encroaching on Fourteenth Amendment Protections
- Article III: No Harm No Foul? Perhaps Not So Much
- Personal Data and the Value Equation
- Chapter 2: Centerings
- Theoretical Orientations
- Interrogating New Media
- The Framework of Contextual Integrity
- Identifying Loci of Control
- Ideological Powers in Platforms
- Chapter 3: FIP 1: No Secret Data Collection
- When Is a Contract Just Barely, or Not, a Contract?
- Data Anonymity via Aggregation as Oxymoron
- Even the Most Private Datum Isn’t
- Knowing about the Unknowable
- Quick Reminder: The Constitution Is Supposed to Protect Our Privacy
- Chapter 4: FIPs 2 and 4: Discovery and Repair
- You Can’t Fix It If You Don’t Know About—And Can’t Access—It
- Online Privacy and the European Union
- The Right to Be Forgotten
- Ownership of Social Media Accounts in the Enterprise: “Unhand My Stuff!”
- Toward Chapter 5 and the Third FIP
- Chapter 5: FIP 3: One Use Should Not Bind Them All
- Data Collection and Security: Commercial Entities Sharing with the Government
- Battles over Encryption and Cryptography
- Encryption and Export Controls
- The Snowden Revelations
- Data Collection and Insecurity: The Government Sharing with Commercial Entities
- Crossing Government and Commercial Streams within the Data Marketplace
- We Claim to Know Better but Do Not Act Like It
- Chapter 6: FIP 5: If You Don’t Protect It, You Should Not Have It
- Improved Data Reliability via the Marketplace
- Big Data Can Aid Problem Solving
- Recommendations Can Help
- Improved Targeting Can Be Good for Both Sides
- The Usability and Functionality Lies
- Unreliability via the Marketplace
- Data Abuse via the Marketplace
- You Can Touch This Because I Can’t Protect It
- Chapter 7: Recommendations
- Action Proposals for Government
- Executive Leadership
- Federal Agencies
- Congressional Legislation
- Congressional Legislative Action on Commercial Activities
- Congressional Legislative Action on Intelligence Activities
- Intelligence Community and Law Enforcement
- Judges and Courts
- State-Level Actions
- States and the FIPs: Constraint of Government Agencies and Law Enforcement from Predatory Practices
- State-Based Actions in the Commercial Privacy Environment
- Action Proposals for Commercial Entities
- Industry Leadership
- Executive Leadership
- Worker Behaviors
- Protocol Changes
- Privacy Policies and Terms of Service
- Flip the Defaults
- Offer Multiple Versions
- Reconsider Data as Revenue Streams
- Reengineer Data Anonymity
- Nonprofits: Great Responsibilities
- WE, the People
- Notes
- Chapter 3: FIP 1: No Secret Data Collection
- Chapter 7: Recommendations
- Works Cited
- About the Author
- About the Front Cover
- Index
- Series index
Chapter 7: Recommendations
Chapter
- Subjects:
Prices
Chapter Price (Chapters only digitally available)
Currency depends on your shipping address
Extract
| 141 →
· 7 ·
RECOMMENDATIONS
It is what it is.
—mantra spoken by numerous Cisco Inc. employees, San Jose, CA1
If I could change the world.
—“Change the World,” Tommy Sims, Gordon Kennedy, and Wayne Kirkpatrick (famously recorded by Eric Clapton)
Let us begin with a series of stipulations.
First: The Internet is not going to go away and ‘it is what it is.’ The business model based on banner advertising that supported the static, non-interactive, Web 1.0 Internet did not produce sufficient revenue to drive profit, investment, and runaway innovation. The business models based on targeted marketing and advertising that support the interactive, Web 2.0 Internet produce significant revenues that support the continued development and improvement of the Internet. Further, many of the operations that utilize the Internet can claim a variety of legal protections afforded to businesses and news gathering/disseminating operations that insulate them from wanton and reckless government intervention. Similarly, none of the following business segments are going to fold up their tents and go away: credit card providers, mobile phone services, corporate loyalty card issuers, or manufacturers of IoT devices and network infrastructure operations for the IoT. These companies ← 141 | 142 → ‘are what they are’ and data about customers are important aspects of, and contributors to, their business models.
Second: Targeted marketing and advertising currently depend on the collection of personal data in ways that require overly invasive and inadequately...
You are not authenticated to view the full text of this chapter or article.
This site requires a subscription or purchase to access the full text of books or journals.
Do you have any questions? Contact us.
Or login to access all content.- Cover
- Title
- Copyright
- About the author(s)/editor(s)
- About the book
- This eBook can be cited
- Contents
- Acknowledgements
- Preface
- Introduction
- How the Heck Did We Get Here?
- Technological Complexities in Data Collection: Out of Sight, Out of Reach
- Appealing to Consumers’ Lowest Common Denominators: It’s All Good?
- Supporting Economic Interests of Business and Industry: Doubling Down on Data
- Unwillingness of Government to Protect Its Citizenry from Itself: Corporations Are Our Most Valued People
- Concerns over Terrorism and Security Risks: A Darned (In)Convenient War on Terror
- Family Observations: A Personal Anecdote
- Chapter Previews
- Chapter 1: The Harms
- Loss of Control over Personal Data
- Hacking as Lawlessness
- Leaks and Sponges: We Were Not Supposed to Collect It or Lose It
- Costs and Harms of Data Breaches
- Undermining Constitutional Protections
- Encroaching on First Amendment Protections
- Encroaching on Third Amendment Protections
- Encroaching on Fourth Amendment Protections
- Encroaching on Fifth Amendment Protections
- Encroaching on Fourteenth Amendment Protections
- Article III: No Harm No Foul? Perhaps Not So Much
- Personal Data and the Value Equation
- Chapter 2: Centerings
- Theoretical Orientations
- Interrogating New Media
- The Framework of Contextual Integrity
- Identifying Loci of Control
- Ideological Powers in Platforms
- Chapter 3: FIP 1: No Secret Data Collection
- When Is a Contract Just Barely, or Not, a Contract?
- Data Anonymity via Aggregation as Oxymoron
- Even the Most Private Datum Isn’t
- Knowing about the Unknowable
- Quick Reminder: The Constitution Is Supposed to Protect Our Privacy
- Chapter 4: FIPs 2 and 4: Discovery and Repair
- You Can’t Fix It If You Don’t Know About—And Can’t Access—It
- Online Privacy and the European Union
- The Right to Be Forgotten
- Ownership of Social Media Accounts in the Enterprise: “Unhand My Stuff!”
- Toward Chapter 5 and the Third FIP
- Chapter 5: FIP 3: One Use Should Not Bind Them All
- Data Collection and Security: Commercial Entities Sharing with the Government
- Battles over Encryption and Cryptography
- Encryption and Export Controls
- The Snowden Revelations
- Data Collection and Insecurity: The Government Sharing with Commercial Entities
- Crossing Government and Commercial Streams within the Data Marketplace
- We Claim to Know Better but Do Not Act Like It
- Chapter 6: FIP 5: If You Don’t Protect It, You Should Not Have It
- Improved Data Reliability via the Marketplace
- Big Data Can Aid Problem Solving
- Recommendations Can Help
- Improved Targeting Can Be Good for Both Sides
- The Usability and Functionality Lies
- Unreliability via the Marketplace
- Data Abuse via the Marketplace
- You Can Touch This Because I Can’t Protect It
- Chapter 7: Recommendations
- Action Proposals for Government
- Executive Leadership
- Federal Agencies
- Congressional Legislation
- Congressional Legislative Action on Commercial Activities
- Congressional Legislative Action on Intelligence Activities
- Intelligence Community and Law Enforcement
- Judges and Courts
- State-Level Actions
- States and the FIPs: Constraint of Government Agencies and Law Enforcement from Predatory Practices
- State-Based Actions in the Commercial Privacy Environment
- Action Proposals for Commercial Entities
- Industry Leadership
- Executive Leadership
- Worker Behaviors
- Protocol Changes
- Privacy Policies and Terms of Service
- Flip the Defaults
- Offer Multiple Versions
- Reconsider Data as Revenue Streams
- Reengineer Data Anonymity
- Nonprofits: Great Responsibilities
- WE, the People
- Notes
- Chapter 3: FIP 1: No Secret Data Collection
- Chapter 7: Recommendations
- Works Cited
- About the Author
- About the Front Cover
- Index
- Series index