Intercultural Extraneity
Search

Privacy Online? Does That Exist?

The strong parts of this draft are the title, the excerpt, and the following section:
Private information might be somewhat simple to come by, but this has led to many leaked exchanges between political figures, proving the suspicions people had about those they saw on their screens and were expected to just trust. While we are stuck online and have the chance of losing some self-awareness thanks to it, we are globally becoming more aware of what is going on and we can take even a small amount of action to try and force change.
If I were you, I would only keep that section (and of course the title and excerpt), rewrite it (it is not very clear, e.g. “simple to come by” =? “proving … expected to just trust” ?) and expand on it. It could be the intro.
Then you write about examples of data misuse (you could cite the GPS example here) – but also be sure to add sources!
Note that the assignment asks you to cite a variety of course material. There was plenty about the subjects you explore here.
Then in the next paragraph you can write about examples that show increasing awareness of privacy concerns (there is also plenty of course material about this – including sites devoted to this listed in week 3).
Then your conclusion will sum up the specific examples you will be adding, and a final comment on the meaning of this, or the purpose of this essay, or a question,
Please keep these notes here.

This post is in response to the prompt The risk and ingenuity of social media

Private information might be somewhat simple to come by, but this has led to many leaked exchanges between political figures, proving the suspicions people had about those they saw on their screens and were expected to just trust. While we are stuck online and have the chance of losing some self-awareness thanks to it, we are globally becoming more aware of what is going on and we can take even a small amount of action to try and force change.

It is a fact that the data we hand to various social media outlets is used to alter our experience, but what people need to remember is that this data, like most things, is bought and sold to corporations; in essence, your identity is sold just because of a desire to socialize with peer and share your everyday life (https://knowledge.wharton.upenn.edu/article/data-shared-sold-whats-done/). What is more, that does not just stop at selling at sale of your identity, but social media outlets such as Facebook, Instagram and similar our notorious for letting you Geotag (a tool that lets you tag your current location and share it with people who follow you) yourself and thus it further gives out more private information about your whereabouts(https://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/?sh=69af4fef4125). When the internet was uncharted territories for most, children were for the most warned about the dangers of the internet, but we see many reports that prove that adults are not immune to the scams of the internet. Although Geotagging has been a concern for various reasons (https://www.nationalgeographic.com/travel/features/when-why-not-to-use-geotagging-overtourism-security/), the use of it has also brought on many rescues of missing people who, otherwise would not have been found(https://www.theguardian.com/technology/shortcuts/2013/apr/07/geolocation-technology-save-lives-developing-world).

The term doxing means “is the Internet-based practice of researching and publicly broadcasting private or identifying information (especially personally identifying information) about an individual or organization” and is one of the most often words you will see when it comes to speaking about scandals of both the entertainment and political world. This though used as a threat to harm someone’s career (https://www.kuow.org/stories/top-washington-state-elections-official-threatened-doxxed-after-disputing-trump-campaign-s-election-misinformation), is often seen as anonymous individuals can find a way to shed light on dangerous people. There have been many cases where simply the police could not do anything as there was no data available to find individuals, but the internet (more specifically, various groups on sites such as Facebook, Reddit, 4Chan, Twitter, and similar) can never be exhausted at searching for clues (https://www.macleans.ca/society/technology/the-internet-was-hunting-luka-rocco-magnotta-long-before-the-murder/). Communities have been built to try and spread awareness of dangerous individuals and help search for answers and clues. As it is never exhausting, the plethora of groups that deal with different themes, some more light hearted than others. It’s proven to be a good support system for people dealing with similar struggles.

In conclusion, the internet itself has proven to be an uncharted area, with many positives, but many grim negatives. Social media is a double-edged sword; are we willing to give up a large amount of our own privacy for the greater good?

H.P.

I hereby confirm that this work is solely the result of my own independent scholarly work and that if any ideas, text passages, or diagrams from books, papers, the Web or other sources have been copied, paraphrased, or in any other way used, all references – including those found in electronic media – have been clearly acknowledged and fully cited.

References:
1. How Much Social Media Is Too Much? Eric Hamilton, 2019
https://www.techtimes.com/articles/245782/20191021/how-much-social-media-presence-is-too-much.htm
2. Don’t F*** With Cats Netflix, 2019
https://www.netflix.com/watch/81031766?trackId=13752289&tctx=0%2C0%2Ca9ebffaedb20c2d76aa29ed44fabceebc70bb9ef%3A4db4ce3540ac8851a8ef490c96f9780785130dd1%2Ca9ebffaedb20c2d76aa29ed44fabceebc70bb9ef%3A4db4ce3540ac8851a8ef490c96f9780785130dd1%2C%2C
3. Sharing Too Much? It’ll Cost You Cheryl Conner, 2012
https://www.forbes.com/sites/cherylsnappconner/2012/10/19/sharing-too-much-itll-cost-you/?sh=69af4fef4125
4. Geotagged photos: a useful tool for criminological research? Andrew M Lemieux, 2015
https://crimesciencejournal.biomedcentral.com/articles/10.1186/s40163-015-0017-6

5.How geolocation technology is helping save lives in the developing world Jon Henley, 2013
https://www.theguardian.com/technology/shortcuts/2013/apr/07/geolocation-technology-save-lives-developing-world
6.Your Data Is Shared and Sold…What’s Being Done About It? University of Pennsylvania, 2019
7._ When not to geotag while traveling_ Christina Djossa, 2019
https://www.nationalgeographic.com/travel/features/when-why-not-to-use-geotagging-overtourism-security/
8._ Surveillance Capitalism and the Internet of Things_ Jessica Burder and Dale Maharidge, 2020
https://lithub.com/surveillance-capitalism-and-the-internet-of-things/

Posted By:

Related