BenjaminKastnerFirstPaper 2 - 28 Apr 2015 - Main.EbenMoglen
|
|
META TOPICPARENT | name="FirstPaper" |
Market Conflict in Digital Privacy
Corporation’s interests are not aligned with consumers in the digital privacy context. Corporations are incentivized to collect as much consumer data as they can, using essentially whatever means they can. The growth of “big data” and analytics in the business context has made this broad and deep collection of consumer data available to major corporations invaluable in shaping business strategies. The rapidly changing technological landscape over the past 20 years, specifically the rise to prominence of the internet, has changed not only the type but the quality of data available to business enterprises, and thus has changed the value of analytics and “data mining” fundamentally. Among the notable technological advances that have made this possible are the increased availability of the personal computer (decreases in both size and cost), and the adoption of the mobile platform. Examining the incentives of corporations to collect and use this data is important because it can provide insight into the likely future of data collection from a consumer facing perspective absent significant regulation. | |
< < | Opportunities to use consumer data are bountiful, and companies have responded by collecting whatever data they can. Samsung collects data from voice commands to smart TVs; Foursquare has begun tracking users even when the app is turned off; fitness devices, such as FitBit? , collects and uploads user data to the cloud; even taxi cabs are part of a large data set that “contains details about every taxi ride (yellow cabs) in New York in 2013, including the pickup and drop off times, locations, fare and tip amounts, as well as anonymized (hashed) versions of the taxi’s license and medallion numbers.” Some apps that track user location, for instance, while biking, have begun to share some of this information with city governments, while Google stores (but does not share) user location data refreshed every second via Waze, the GPS and traffic app it purchased for $1.3 billion. Database marketing companies like Acxiom aggregate and analyze consumer data sets from a variety of sources, which they then sell to corporate clients who use the information to more effectively reach customers. In the social media context, Facebook uses the massive amount of information it collects on its’ users to design targeted ad campaigns for corporate clients. In short, data collection is amply incentivized, and secondary markets for data have formed. | > > |
Shorter paragraphs will make your writing clearer. They will also help you shorten your sentences.
Opportunities to use consumer data are bountiful, and companies have responded by collecting whatever data they can.
You mean, because data about consumers are valuable, businesses collect whatever they can.
Samsung collects data from voice commands to smart TVs; Foursquare has begun tracking users even when the app is turned off; fitness devices, such as FitBit? , collects and uploads user data to the cloud; even taxi cabs are part of a large data set that “contains details about every taxi ride (yellow cabs) in New York in 2013, including the pickup and drop off times, locations, fare and tip amounts, as well as anonymized (hashed) versions of the taxi’s license and medallion numbers.”
This is not a very comprehensive, illustrative or simple set of examples.
Some apps that track user location, for instance, while biking, have begun to share some of this information with city governments, while Google stores (but does not share) user location data refreshed every second via Waze, the GPS and traffic app it purchased for $1.3 billion. Database marketing companies like Acxiom aggregate and analyze consumer data sets from a variety of sources, which they then sell to corporate clients who use the information to more effectively reach customers. In the social media context, Facebook uses the massive amount of information it collects on its’ users to design targeted ad campaigns for corporate clients. In short, data collection is amply incentivized, and secondary markets for data have formed.
In short, what did the examples add?
| | Interestingly enough, the incentive to generate competitive advantage through analytics may provide some level of protection to consumers. Since it has become abundantly clear that data is valuable, it only stands to reason that corporations want to keep the data they collect to themselves rather than allow their competitors (or anyone else) to get ahold of it. After Yahoo purchased the analytics firm Flurry, which collects data from a number of “Flurry enabled apps,” they switched from the less secure HTTP protocol to the considerably more secure HTTPS protocol for data transmission, providing consumers with a level of protection that they did not have before. While not going quite as far, Google has encouraged developers to use HTTPS in connection with its’ AdMob? program that provides advertising to apps. Further, both Apple and Google began to offer default encryption on iOS and Android, much to the chagrin of some law enforcement agents. It is notable that we are seeing large, public tech companies begin to move towards providing more secure services for their consumers. It is possible that this reflects the recognition of value the data being protected has, or perhaps these companies are seeking to avoid the public perception pitfalls that lie ahead in the form of data breaches and hacks, like with Target and Samsung, among others. Regardless, it is important to note the shift in focus by public corporations in providing secure tech services for consumers because they both created the issue, and may be responsible for shouldering the responsibility of consumer protection without a significant change in the legislative approach to the issue. While public perception has shifted considerably on digital security issues, legislation does not appear likely in the near term – especially with the NSA providing powerful and influential opposition. | | http://www.theguardian.com/commentisfree/2013/jul/29/poll-nsa-surveillance-privacy-pew | |
< < |
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines:
| > > |
Why aren't these linked in some useful way in the draft? It's as though you could find no better use for them than as a kitchen sink to be thrown at the reader. | | | |
< < | Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. | > > | The draft is one or two from ready, I think, from an organizational point of view. The outline is the crucial component of the next draft. Start from a clearer version of the central point: businesses collect data about consumers and so? Develop the idea not through an uncontrolled profusion of examples, but through the systematic exposition of your argument, with facts to support it.
| | \ No newline at end of file |
|
BenjaminKastnerFirstPaper 1 - 06 Mar 2015 - Main.BenjaminKastner
|
|
> > |
META TOPICPARENT | name="FirstPaper" |
Market Conflict in Digital Privacy
Corporation’s interests are not aligned with consumers in the digital privacy context. Corporations are incentivized to collect as much consumer data as they can, using essentially whatever means they can. The growth of “big data” and analytics in the business context has made this broad and deep collection of consumer data available to major corporations invaluable in shaping business strategies. The rapidly changing technological landscape over the past 20 years, specifically the rise to prominence of the internet, has changed not only the type but the quality of data available to business enterprises, and thus has changed the value of analytics and “data mining” fundamentally. Among the notable technological advances that have made this possible are the increased availability of the personal computer (decreases in both size and cost), and the adoption of the mobile platform. Examining the incentives of corporations to collect and use this data is important because it can provide insight into the likely future of data collection from a consumer facing perspective absent significant regulation.
Opportunities to use consumer data are bountiful, and companies have responded by collecting whatever data they can. Samsung collects data from voice commands to smart TVs; Foursquare has begun tracking users even when the app is turned off; fitness devices, such as FitBit? , collects and uploads user data to the cloud; even taxi cabs are part of a large data set that “contains details about every taxi ride (yellow cabs) in New York in 2013, including the pickup and drop off times, locations, fare and tip amounts, as well as anonymized (hashed) versions of the taxi’s license and medallion numbers.” Some apps that track user location, for instance, while biking, have begun to share some of this information with city governments, while Google stores (but does not share) user location data refreshed every second via Waze, the GPS and traffic app it purchased for $1.3 billion. Database marketing companies like Acxiom aggregate and analyze consumer data sets from a variety of sources, which they then sell to corporate clients who use the information to more effectively reach customers. In the social media context, Facebook uses the massive amount of information it collects on its’ users to design targeted ad campaigns for corporate clients. In short, data collection is amply incentivized, and secondary markets for data have formed.
Interestingly enough, the incentive to generate competitive advantage through analytics may provide some level of protection to consumers. Since it has become abundantly clear that data is valuable, it only stands to reason that corporations want to keep the data they collect to themselves rather than allow their competitors (or anyone else) to get ahold of it. After Yahoo purchased the analytics firm Flurry, which collects data from a number of “Flurry enabled apps,” they switched from the less secure HTTP protocol to the considerably more secure HTTPS protocol for data transmission, providing consumers with a level of protection that they did not have before. While not going quite as far, Google has encouraged developers to use HTTPS in connection with its’ AdMob? program that provides advertising to apps. Further, both Apple and Google began to offer default encryption on iOS and Android, much to the chagrin of some law enforcement agents. It is notable that we are seeing large, public tech companies begin to move towards providing more secure services for their consumers. It is possible that this reflects the recognition of value the data being protected has, or perhaps these companies are seeking to avoid the public perception pitfalls that lie ahead in the form of data breaches and hacks, like with Target and Samsung, among others. Regardless, it is important to note the shift in focus by public corporations in providing secure tech services for consumers because they both created the issue, and may be responsible for shouldering the responsibility of consumer protection without a significant change in the legislative approach to the issue. While public perception has shifted considerably on digital security issues, legislation does not appear likely in the near term – especially with the NSA providing powerful and influential opposition.
Examples:
Data Collection:
•Simon Sharwood, Watch out: Samsung's TV is watching YOU as you watch it, The Register, February 9, 2015
• Douglas MacMillan? , Foursquare Now Tracks Users Even When the App Is Closed, Wall Street Journal, August 6, 2014
• http://research.neustar.biz/2014/09/15/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset/
• https://www.aclu.org/blog/technology-and-liberty/location-apps-sharing-data-governments
• Al Sassco, Fitness Trackers are Changing Online Privacy — and It's Time to Pay Attention, CIO.com, August 14, 2014
• http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?pagewanted=all
Data Protection
•Yahoo switching to https encryption on Flurry; Google requesting developers do the same on AdMob? https://firstlook.org/theintercept/2015/01/26/secret-badass-spy-program/
•Apple and Google decide to offer default encryption on iOS and Android https://www.techdirt.com/articles/20150109/06144429646/new-yorks-top-prosecutor-says-we-need-new-laws-to-fight-iphoneandroid-encryption.shtml
Analysis/Increased value in use:
• Vindu Goel, How Facebook Sold You Krill Oil, New York Times, August 2, 2014
Public Perception
http://www.theguardian.com/commentisfree/2013/jul/29/poll-nsa-surveillance-privacy-pew
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable.
To restrict access to your paper simply delete the "#" character on the next two lines:
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list. |
|
|
|
This site is powered by the TWiki collaboration platform. All material on this collaboration platform is the property of the contributing authors. All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
|
|