privacy

This piece is cross-posted on Microsoft Research New England’s Social Media Collective Research Blog.

In her recent post here on the Cyborgology blog, Jenny Davis brought the pervasive use of Facebook as a study site back into conversation. In brief, she argued that “studying Facebook—or any fleeting technological object—is not problematic as long as we theorize said object.” The take away from this statement is important: We can hope to make lasting contributions to research literature through our conceptual work – much more so than through the necessarily ephemeral empirical details that are tied to a time, a place, and particular technologies.

In this post, I want to give a different yet complementary answer to why it may be a problem if our research efforts are focused on a single study site. This is regardless of whether it is the currently most popular social network site or an already obsolete technological object. more...

This is the complete version of a three-part essay that I posted in May, June, and July of this year:
Part I: Distributed Agency and the Myth of Autonomy
Part II: Disclosure (Damned If You Do, Damned If You Don’t)
Part III: Documentary Consciousness

Privacy is not dead, but it does need to change.

Part I: Distributed Agency and the Myth of Autonomy

Last spring at TtW2012, a panel titled “Logging off and Disconnection” considered how and why some people choose to restrict (or even terminate) their participation in digital social life—and in doing so raised the question, is it truly possible to log off? Taken together, the four talks by Jenny Davis (@Jup83), Jessica Roberts (@jessyrob), Laura Portwood-Stacer (@lportwoodstacer), and Jessica Vitak (@jvitak) suggested that, while most people express some degree of ambivalence about social media and other digital social technologies, the majority of digital social technology users find the burdens and anxieties of participating in digital social life to be vastly preferable to the burdens and anxieties that accompany not participating. The implied answer is therefore NO: though whether to use social media and digital social technologies remains a choice (in theory), the choice not to use these technologies is no longer a practicable option for number of people.

In this essay, I first extend the “logging off” argument by considering that it may be technically impossible for anyone, even social media rejecters and abstainers, to disconnect completely from social media and other digital social technologies (to which I will refer throughout simply as ‘digital social technologies’). Consequently, decisions about our presence and participation in digital social life are made not only by us, but also by an expanding network of others. I then examine two prevailing privacy discourses—one championed by journalists and bloggers, the other championed by digital technology companies—to show that, although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control. Clinging to the myth of individual autonomy, however, leads us to think about privacy in ways that mask both structural inequality and larger issues of power. Finally, I argue that the reality of inescapable connection and the impossible demands of prevailing privacy discourses have together resulted in what I term documentary consciousness, or the abstracted and internalized reproduction of others’ documentary vision. Documentary consciousness demands impossible disciplinary projects, and as such brings with it a gnawing disquietude; it is not uniformly distributed, but rests most heavily on those for whom (in the words of Foucault) “visibility is a trap.” I close by calling for new ways of thinking about both privacy and autonomy that more accurately reflect the ways power and identity intersect in augmented societies. more...

Documentary consciousness entails the ever-present sense of a looming future failure.

In Part I this essay, I considered the fact that we are always connected to digital social technologies, whether we are connecting through them or not. Because many companies collect what I call second-hand data (data about people other than those from whom the data is collected), whether we leave digital traces is not a decision we can make autonomously. The end result is that we cannot escape being connected to digital social technologies anymore than we can escape society itself.

In Part II, I examined two prevailing privacy discourses to show that, although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control. Clinging to the myth of individual autonomy, however, leads us to think about privacy in ways that mask both structural inequalities and larger issues of power.

In this third and final installment, I consider one of the many impacts that follow from being inescapably connected in a society that still masks issues of power and inequality through conceptualizations of ‘privacy’ as an individual choice. I argue that the reality of inescapable connection and the impossible demands of prevailing privacy discourses have together resulted in what I term documentary consciousness, or the abstracted and internalized reproduction of others’ documentary vision. Documentary consciousness demands impossible disciplinary projects, and as such brings with it a gnawing disquietude; it is not uniformly distributed, but rests most heavily on those for whom (in the words of Foucault) “visibility is a trap.” I close by calling for new ways of thinking about both privacy and autonomy that more accurately reflect the ways power and identity intersect in augmented societies. more...

This image is on the Internet. Whose fault is that? (Is it anyone's fault, per se?)

Last month in Part I (Distributed Agency and the Myth of Autonomy), I used the TtW2012 “Logging Off and Disconnection” panel as a starting point to consider whether it is possible to abstain completely from digital social technologies, and came to the conclusion that the answer is “no.” Rejecting digital social technologies can mean significant losses in social capital; depending on the expectations of the people closest to us, rejecting digital social technologies can mean seeming to reject our loved ones (or “liked ones”) as well. Even if we choose to take those risks, digital social technologies are non-optional systems; we can choose not to use them, but we cannot choose to live in a world where we are not affected by other people’s choices to use digital social technologies.

I used Facebook as an example to show that we are always connected to digital social technologies, whether we are connecting through them or not. Facebook (and other companies) collect what I call second-hand data, or data about people other those from whom the data is collected. This means that whether we leave digital traces is not a decision we can make autonomously, as our friends, acquaintances, and contacts also make these decisions for us. We cannot escape being connected to digital social technologies anymore than we can escape society itself.

This week, I examine two prevailing privacy discourses—one championed by journalists and bloggers, the other championed by digital technology companies—to show that, although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control, as something individuals can ‘own’. Clinging to the myth of individual autonomy, however, leads us to think about privacy in ways that mask both structural inequality and larger issues of power. more...

We're always connected, whether we're connecting or not.

Last month at TtW2012, a panel titled “Logging off and Disconnection” considered how and why some people choose to restrict (or even terminate) their participation in digital social life—and in doing so raised the question, is it truly possible to log off? Taken together, the four talks by Jenny Davis (@Jup83), Jessica Roberts, Laura Portwood-Stacer (@lportwoodstacer), and Jessica Vitak (@jvitak) suggested that, while most people express some degree of ambivalence about social media and other digital social technologies, the majority of digital social technology users find the burdens and anxieties of participating in digital social life to be vastly preferable to the burdens and anxieties that accompany not participating. The implied answer is therefore NO: though whether to use social media and digital social technologies remains a choice (in theory), the choice not to use these technologies is no longer a practicable option for number of people.

In the three-part essay to follow, I first extend this argument by considering that it may be technically impossible for anyone, even social media rejecters and abstainers, to disconnect completely from social media and other digital social technologies (to which I will refer throughout simply as ‘digital social technologies’). Even if we choose not to connect directly to digital social technologies, we remain connected to them through our ‘conventional’ or ‘analogue’ social networks. Consequently, decisions about our presence and participation in digital social life are made not only by us, but also by an expanding network of others. In the second section, I examine two prevailing discourses of privacy, and explore the ways in which each fails to account for the contingencies of life in augmented realities. Though these discourses are in some ways diametrically opposed, each serves to reinforce not only radical individualist framings of privacy, but also existing inequalities and norms of visibility. In the final section, I argue that current notions of both “privacy” and “choice” need to be reconceptualized in ways that adequately take into account the increasing digital augmentation of everyday life. We need to see privacy both as a collective condition and as a collective responsibility, something that must be honored and respected as much as guarded and protected. more...

I like Ellen DeGeneres. Lots of people respect what she does and she has a reputation of treating people right. However, I was surprised when I came across a clip from her popular daytime television show where she unsuspectingly broadcasts compromising Facebook photos of random audience members, a sketch I saw for the first time yesterday, and there seems to be at least a few more of these on YouTube.

I get it, it’s a gag on context collapse: photos taken in and for one time and place are dislocated onto broadcast television, to unexpected and hilarious results. Cute. However, the reality of this is not so funny, and The Ellen DeGeneres Show should know better.

The problem here is that Ellen is setting a precedent that it is okay and fun to share each others information to a larger audience than was initially intended; that blasting compromising photos from someone’s Facebook profile to other audiences, large or small, is a funny joke. For many, it isn’t.

Ellen’s lighthearted joke takes the form of much modern bullying; especially what is often called “cyberbullying” more...

Michael Rogers, Republican Congressional Representative of Michigan's 8th district and sponsor of CISPA

House representative Mike Rogers (R-MI) introduced a bill back in November called the Cyber Intelligence Sharing and Protection Act (H.R. 3523) or CISPA. It has since been referred to and reported by the appropriate committees. Since then, according to Representative Rogers’ own web site, over 100 members of congress have already announced their support for the bill:

The 105 co-sponsors of the bill include 10 committee chairmen.  Additionally, a wide range of major industry and cyber associations, such as Facebook, Microsoft, the US Chamber Commerce, the Business Roundtable, the Internet Security Alliance, TechAmerica, and many others have sent letters of support for the bill.  A list of major industry and association supporters can be found at http://intelligence.house.gov/bill/cyber-intelligence-sharing-and-protection-act-2011

Unlike SOPA and PIPA, CISPA is all about collecting and sharing “cyber threat intelligence” and has less to do with copyright infringement concerns. This bill does not directly threaten the business interests of web companies, which means we should not expect their help in fighting the bill. In fact Facebook, IBM, Intel, Oracle, and Microsoft (among others) have already sent letters in support. more...

By now, we have all heard the warning: potential employers will look at your Facebook page. We have been sufficiently terrified by the cautionary tale about the keg-stand profile pic (why is it always a keg stand?) that kept some otherwise capable candidate from getting hired. Indeed, we have taken note, with increased utilization of privacy settings and a collective awareness by job candidates about the visibility of social network sites.

Now, with the quickly spreading news of Justin Bassett, the warnings (and inevitable cautionary tales) become more epic. Bassett is a statistician out of New York, who, while on a job interview, was asked to log in to his social network profile. Bassett not only refused, but shared his story widely, sparking debates about privacy, employee rights, and the blurring line between personal and professional.   more...

Not long after the release of Google’s widely discussed and hotly contested privacy policy, which shares user data across its websites, the company is now offering to compensate customers for the data that they provide. Closely resembling the television tracking techniques used by  Nielsen, Google offers users who participate in the screenwise program up to $25 in Amazon gift cards for allowing Google to monitor their online activities. Users can even opt to be more extensively surveilled and earn up to $100.  While some (in particular, those in the comments section of the article linked above) view this as a cheap payoff for strong privacy violations, others are happy to receive monetary compensation for engaging in everyday leisure activities. This latter group is evidenced by a temporary hold on signups for the new program due to overwhelming interest.

Debates will likely ensue over the cost of privacy, the blurry line between labor and leisure, and the degree to which surveillance can—or should—be resisted.

[Editor’s comment: while this is only a small test, might we envision a model where users are paid for their data? Would it work? What are the implications? ~nathan]


I took the liberty of making a new meme: "Censorship Sandworm". http://memegenerator.net/Censorship-Sandworm

“I must rule with eye and claw — as the hawk among lesser birds.”

-Duke Leo Atreides in Book 1: Dune

Over a week ago, Twitter announced a new censorship policy, stating that it would comply with any “valid and applicable legal request” to take down tweets. The announcement came just as we were still digesting Google’s unified privacy policy and were still debating the (now confirmed) rumors that Facebook was releasing an IPO. Twitter has since been applauded, denounced, and dissected by a variety of scholars, media critics, and business leaders. In this post I will give a brief summary of the controversy, briefly weigh in with a commentary of my own, and conclude with a discussion of what all this means for theorizing online social activity.

more...