EstherLukmanFirstPaper 4 - 11 May 2015 - Main.EstherLukman
|
|
META TOPICPARENT | name="FirstPaper" |
| |
< < | Privacy and the Freedom of Choice | > > | Information: The Cost of Access and Convenience | | -- By EstherLukman - 06 Mar 2015
The Two-Way Highway | |
< < | The Internet is often nicknamed the world’s “information highway”, a phenomenon capable not only of connecting far-flung users to one another but of granting each said user access to the near-whole of human knowledge and pursuit. In the space of two decades, we have seen previously unfathomable innovations become commonplace. As the Internet has grown faster and more accessible- by smartphones, by tablets, by laptops, by personal Wi-Fi hotspots, etc., it has fused itself with the backbone of our daily behaviors. | > > | The Internet is often nicknamed the world’s “information highway”. As the Internet has grown faster and more accessible- by smartphones, by tablets, by laptops, by personal Wi-Fi hotspots, etc., it has fused itself with the backbone of our daily behaviors. | | | |
< < | On any given day, many of us will use it to stay current on whatever segment of news most interests us, to navigate ourselves, to find answers, to purchase goods and services, to entertain ourselves, to chart our schedules, and of course, to communicate. Knowingly, we use the Internet to correspond with other individuals through e-mails. With some awareness, we broadcast through social media platforms to the global public. But what about the “speech” we unknowingly speak? The information we unwittingly donate? The “listeners” we didn’t intend to reach? | > > | On any given day, many of us will use it to stay current on whatever segment of news most interests us, to navigate ourselves, to find answers, to purchase goods and services, to entertain ourselves, to chart our schedules, and of course, to communicate. The swelling rapidity and frequency with which we consume Internet-based services has increased the ease of forgetting that the Internet is a two-way highway; that, the price of access to these Internet-based services is our private information. | | | |
< < | The swelling rapidity and frequency with which we consume Internet-based services has increased the ease of forgetting that the Internet is a two-way highway; that, as users, we contribute just as much, or perhaps more, information as we consume. | > > | Information Mining | | | |
< < |
We still haven't really gotten to your idea yet, and we are more than 200 words in. You want your reader to want to read, which means you want to show what you have to offer her sooner. | > > | Prior to installation of any phone/tablet application, the user is asked to provide a series of permissions to their digital information vaults. You want to download an app that helps you make restaurant reservations without having to pick up the phone and call? Fork over access to your phone contact database, your email contact database, your calendar, your social media networks, and your real-time location. Seems fair enough. Because regardless of whether or not the amount of access requested feels proportionate to the service rendered, at least the request for information was overt and easy to reject. The problem is only a fraction of the information collected from our online behaviors follow express grants of access. | | | |
< < | On the amount of information consumed and produced, isn't it evident that if we're just counting bits, we consume orders of magnitude more than we produce? If that's not what you mean here, and it may well not be, you need to explain.
"Speech" On the Internet
It is uncontroversial to assert that what we say and write is considered speech. It is less universally accepted, but at the least legally recognized, that some of one’s actions can be considered speech. Yet, the Internet’s inherent disparities from traditional mediums of speech test our understanding of these “truths” as they relate to privacy rights.
Not at all clear why.
Speech Through Talk | | When you engage in an in-person conversation, your expected audience typically consists of invited parties (and maybe nosy third-party listeners within earshot). Until Snowden proved otherwise, many of us were under the impression, or perhaps, without concrete contravening evidence, chose to believe, that the above even applied to phone calls.
Audience control on the Internet differs immensely. Let’s take e-mails. Generally, we send e-mails expecting their contents to reach the parties addressed in the “To”, “CC”, and/or “BCC” lines. We may even factor in the possibility that some third-party might grab a glimpse. But the companies providing the e-mail services to both the sender and each addressed party? It seems unlikely that very many of us would take no issue with postal services opening, transcribing, and storing said copies of our mail. Yet, the bulk of e-mail senders avoid precautionary measures that might keep the likes of Google, Yahoo, Hotmail, etc. from accumulating a database of searchable transcripts of our private correspondences. | |
< < |
But it is clear that we can not only do so, but also choose not to use these services and to do their work for ourselves, in which case the compiling of the databases will cease.
| > > | And that’s just talk. As in life outside the digital world, at least some of our actions on the Internet constitute speech. That is to say, that at least some of our actions on the Internet betray private information about our preferences and opinions, which in turn are collected and aggregated into companies’ market research data. | | | |
< < | Speech Through Action
The fraction collected from users’ talk constitutes the miniscule tip of the iceberg of collected information. On the Internet, actions speak more than words.
Browsing history reveals critical data about users’ viewing preferences. The seemingly innocent act of online shopping betrays, among other things, answers to the following: when, why, and how one choses to purchase certain items, what links successfully convert to click-throughs and purchases, and how the purchasing decision was arrived at. And location information can be pulled explicitly from social media updates or culled implicitly as a result of authorizing applications to access one’s mobile device’s location services.
Even inaction is itself an information-laden action. The clicks you didn’t make, the products you didn’t purchase, the content you didn’t chose to propagate, etc. These inactions contribute as much data about a user’s decision-making process as affirmative actions.
No, they don't. Once again, if we're just being literal about it, the number of choices we do not make is infinite, and only the value attached to the choices we do make can be measured. So if you mean something not literal here, you need to explain.
| > > | Browsing history reveals critical data about users’ viewing preferences. The seemingly innocent act of online shopping betrays, among other things, answers to the following: when, why, and how one choses to purchase certain items, what links successfully convert to click-throughs and purchases, and how the purchasing decision was arrived at. And location information can be pulled explicitly from social media updates or culled implicitly as a result of authorizing applications to access one’s mobile device’s location services. Even inaction can be information-laden. The clicks you didn’t make, the products you didn’t purchase, the content you didn’t chose to propagate, etc. These inactions too contribute data about a user’s decision-making process. | |
Privacy v. Convenience | |
< < | So why, with all this considered, do we continue to consume the Internet as we do? When so many of us would consider privacy a right worth protecting, why are we willing to surrender such protection on the Internet? | > > | So why, with all this considered, do we continue to consume the Internet as we do? When so many of us would consider privacy a right worth protecting, why are we willing to not only surrender such protection on the Internet but even willfully turn a blind eye to the wealth of information mining happening without our express permission? | | One answer: the convenience tradeoff. When the benefits of accessing and participating in Internet-based services are so great, privacy for privacy’s sake pales as a priority. We accept that Gmail collates searchable archives of our correspondences, because that means we have access to searchable archives of our past correspondences. We accept that Amazon tracks how we interact with its product offerings, because they come back to us with better suggested purchases. We accept that Google Maps, Uber, and Yelp all track our location, because it makes it that much easier for them to help help ourselves.
So valuable is the information gathered from user’s Internet activities that the information alone is a commercial asset. For example, Birchbox, a subscription service that sends users monthly bundles of beauty, makeup, and fragrance samples and allows users to easily buy full-sized products through their website, serves as a crucial middleman for the beauty, makeup, and fragrance industries. Industry giants vie to have their samples distributed through Birchbox, because through Birchbox, they’re able to effectively test their products on a targeted focus group. | |
< < | For convenience, the fact that our micro-behaviors are observed and converted into statistics that can be manipulated and utilized to better achieve companies’ commercial goals becomes more palatable. But perhaps it shouldn’t be. | > > | For convenience, the fact that our micro-behaviors are observed and converted into statistics that can be manipulated and utilized to better achieve companies’ commercial goals becomes more palatable. Because each additional Internet-based service we consume allows us to outsource just that much more of the tasks we’d rather outsource, we accept that the cost of access and convenience is our private information. But perhaps it shouldn’t be. | | Marketing plans have become so intelligent we can’t always tell when something is being sold to us. By surrendering volumes of information about ourselves, we are surrendering to companies the means to most effectively shape our demands. What we chose to buy, what we chose to read, and eventually, what we chose to think and how we chose to feel. The leap from protecting our privacy on the Internet to protecting freedom of choice may seem gargantuan, but if all decisions stem from a kernel of an idea, perhaps it is worth fighting to ensure that said kernels are not wholly provided for us by profit-seekers. | |
< < |
Reorganizing your next draft to put your idea prominently at the top, and to stay close to it through the development of the essay, will help the ideas implicit in this draft to bloom more, become clearer. You have things to say here, but they are muddled. One more draft and it will be clear how to finish the piece.
| | \ No newline at end of file |
|
EstherLukmanFirstPaper 3 - 28 Apr 2015 - Main.EbenMoglen
|
|
META TOPICPARENT | name="FirstPaper" |
Privacy and the Freedom of Choice | | The swelling rapidity and frequency with which we consume Internet-based services has increased the ease of forgetting that the Internet is a two-way highway; that, as users, we contribute just as much, or perhaps more, information as we consume. | |
> > |
We still haven't really gotten to your idea yet, and we are more than 200 words in. You want your reader to want to read, which means you want to show what you have to offer her sooner.
On the amount of information consumed and produced, isn't it evident that if we're just counting bits, we consume orders of magnitude more than we produce? If that's not what you mean here, and it may well not be, you need to explain.
| | "Speech" On the Internet
It is uncontroversial to assert that what we say and write is considered speech. It is less universally accepted, but at the least legally recognized, that some of one’s actions can be considered speech. Yet, the Internet’s inherent disparities from traditional mediums of speech test our understanding of these “truths” as they relate to privacy rights. | |
> > | Not at all clear why.
| | Speech Through Talk
When you engage in an in-person conversation, your expected audience typically consists of invited parties (and maybe nosy third-party listeners within earshot). Until Snowden proved otherwise, many of us were under the impression, or perhaps, without concrete contravening evidence, chose to believe, that the above even applied to phone calls.
Audience control on the Internet differs immensely. Let’s take e-mails. Generally, we send e-mails expecting their contents to reach the parties addressed in the “To”, “CC”, and/or “BCC” lines. We may even factor in the possibility that some third-party might grab a glimpse. But the companies providing the e-mail services to both the sender and each addressed party? It seems unlikely that very many of us would take no issue with postal services opening, transcribing, and storing said copies of our mail. Yet, the bulk of e-mail senders avoid precautionary measures that might keep the likes of Google, Yahoo, Hotmail, etc. from accumulating a database of searchable transcripts of our private correspondences. | |
> > |
But it is clear that we can not only do so, but also choose not to use these services and to do their work for ourselves, in which case the compiling of the databases will cease.
| | Speech Through Action
The fraction collected from users’ talk constitutes the miniscule tip of the iceberg of collected information. On the Internet, actions speak more than words. | | Even inaction is itself an information-laden action. The clicks you didn’t make, the products you didn’t purchase, the content you didn’t chose to propagate, etc. These inactions contribute as much data about a user’s decision-making process as affirmative actions. | |
> > |
No, they don't. Once again, if we're just being literal about it, the number of choices we do not make is infinite, and only the value attached to the choices we do make can be measured. So if you mean something not literal here, you need to explain.
| | Privacy v. Convenience
So why, with all this considered, do we continue to consume the Internet as we do? When so many of us would consider privacy a right worth protecting, why are we willing to surrender such protection on the Internet? | | For convenience, the fact that our micro-behaviors are observed and converted into statistics that can be manipulated and utilized to better achieve companies’ commercial goals becomes more palatable. But perhaps it shouldn’t be.
Marketing plans have become so intelligent we can’t always tell when something is being sold to us. By surrendering volumes of information about ourselves, we are surrendering to companies the means to most effectively shape our demands. What we chose to buy, what we chose to read, and eventually, what we chose to think and how we chose to feel. The leap from protecting our privacy on the Internet to protecting freedom of choice may seem gargantuan, but if all decisions stem from a kernel of an idea, perhaps it is worth fighting to ensure that said kernels are not wholly provided for us by profit-seekers. | |
> > |
Reorganizing your next draft to put your idea prominently at the top, and to stay close to it through the development of the essay, will help the ideas implicit in this draft to bloom more, become clearer. You have things to say here, but they are muddled. One more draft and it will be clear how to finish the piece.
| | \ No newline at end of file |
|
EstherLukmanFirstPaper 2 - 06 Mar 2015 - Main.EstherLukman
|
|
META TOPICPARENT | name="FirstPaper" |
| |
< < | PAPER TITLE | > > | Privacy and the Freedom of Choice | | -- By EstherLukman - 06 Mar 2015 | |
< < | Section I | > > | The Two-Way Highway
The Internet is often nicknamed the world’s “information highway”, a phenomenon capable not only of connecting far-flung users to one another but of granting each said user access to the near-whole of human knowledge and pursuit. In the space of two decades, we have seen previously unfathomable innovations become commonplace. As the Internet has grown faster and more accessible- by smartphones, by tablets, by laptops, by personal Wi-Fi hotspots, etc., it has fused itself with the backbone of our daily behaviors. | | | |
< < | Subsection A | > > | On any given day, many of us will use it to stay current on whatever segment of news most interests us, to navigate ourselves, to find answers, to purchase goods and services, to entertain ourselves, to chart our schedules, and of course, to communicate. Knowingly, we use the Internet to correspond with other individuals through e-mails. With some awareness, we broadcast through social media platforms to the global public. But what about the “speech” we unknowingly speak? The information we unwittingly donate? The “listeners” we didn’t intend to reach? | | | |
> > | The swelling rapidity and frequency with which we consume Internet-based services has increased the ease of forgetting that the Internet is a two-way highway; that, as users, we contribute just as much, or perhaps more, information as we consume. | | | |
< < | Subsub 1 | | | |
< < | Subsection B | > > | "Speech" On the Internet
It is uncontroversial to assert that what we say and write is considered speech. It is less universally accepted, but at the least legally recognized, that some of one’s actions can be considered speech. Yet, the Internet’s inherent disparities from traditional mediums of speech test our understanding of these “truths” as they relate to privacy rights. | | | |
> > | Speech Through Talk
When you engage in an in-person conversation, your expected audience typically consists of invited parties (and maybe nosy third-party listeners within earshot). Until Snowden proved otherwise, many of us were under the impression, or perhaps, without concrete contravening evidence, chose to believe, that the above even applied to phone calls. | | | |
< < | Subsub 1 | > > | Audience control on the Internet differs immensely. Let’s take e-mails. Generally, we send e-mails expecting their contents to reach the parties addressed in the “To”, “CC”, and/or “BCC” lines. We may even factor in the possibility that some third-party might grab a glimpse. But the companies providing the e-mail services to both the sender and each addressed party? It seems unlikely that very many of us would take no issue with postal services opening, transcribing, and storing said copies of our mail. Yet, the bulk of e-mail senders avoid precautionary measures that might keep the likes of Google, Yahoo, Hotmail, etc. from accumulating a database of searchable transcripts of our private correspondences. | | | |
> > | Speech Through Action
The fraction collected from users’ talk constitutes the miniscule tip of the iceberg of collected information. On the Internet, actions speak more than words. | | | |
< < | Subsub 2 | > > | Browsing history reveals critical data about users’ viewing preferences. The seemingly innocent act of online shopping betrays, among other things, answers to the following: when, why, and how one choses to purchase certain items, what links successfully convert to click-throughs and purchases, and how the purchasing decision was arrived at. And location information can be pulled explicitly from social media updates or culled implicitly as a result of authorizing applications to access one’s mobile device’s location services. | | | |
> > | Even inaction is itself an information-laden action. The clicks you didn’t make, the products you didn’t purchase, the content you didn’t chose to propagate, etc. These inactions contribute as much data about a user’s decision-making process as affirmative actions. | | | |
> > | Privacy v. Convenience
So why, with all this considered, do we continue to consume the Internet as we do? When so many of us would consider privacy a right worth protecting, why are we willing to surrender such protection on the Internet? | | | |
< < | Section II | > > | One answer: the convenience tradeoff. When the benefits of accessing and participating in Internet-based services are so great, privacy for privacy’s sake pales as a priority. We accept that Gmail collates searchable archives of our correspondences, because that means we have access to searchable archives of our past correspondences. We accept that Amazon tracks how we interact with its product offerings, because they come back to us with better suggested purchases. We accept that Google Maps, Uber, and Yelp all track our location, because it makes it that much easier for them to help help ourselves. | | | |
< < | Subsection A | > > | So valuable is the information gathered from user’s Internet activities that the information alone is a commercial asset. For example, Birchbox, a subscription service that sends users monthly bundles of beauty, makeup, and fragrance samples and allows users to easily buy full-sized products through their website, serves as a crucial middleman for the beauty, makeup, and fragrance industries. Industry giants vie to have their samples distributed through Birchbox, because through Birchbox, they’re able to effectively test their products on a targeted focus group. | | | |
< < | Subsection B | > > | For convenience, the fact that our micro-behaviors are observed and converted into statistics that can be manipulated and utilized to better achieve companies’ commercial goals becomes more palatable. But perhaps it shouldn’t be.
Marketing plans have become so intelligent we can’t always tell when something is being sold to us. By surrendering volumes of information about ourselves, we are surrendering to companies the means to most effectively shape our demands. What we chose to buy, what we chose to read, and eventually, what we chose to think and how we chose to feel. The leap from protecting our privacy on the Internet to protecting freedom of choice may seem gargantuan, but if all decisions stem from a kernel of an idea, perhaps it is worth fighting to ensure that said kernels are not wholly provided for us by profit-seekers. |
|
|