Podcast
Questions and Answers
Which statement accurately reflects the historical perspective on privacy before the 20th century?
Which statement accurately reflects the historical perspective on privacy before the 20th century?
- Privacy was primarily a concern for the working class seeking refuge from industrial labor.
- Privacy was considered primarily a political threat, rather than an unambiguous good. (correct)
- Privacy was a fundamental right enshrined in legal systems across Europe and North America.
- Privacy was largely unrecognized as a concept until the rise of modern technologies.
What was the primary impetus behind the initial privacy laws enacted in England and the USA during the late 19th and early 20th centuries?
What was the primary impetus behind the initial privacy laws enacted in England and the USA during the late 19th and early 20th centuries?
- To protect citizens from unwarranted government surveillance.
- To shield celebrities from intrusive newspaper reporting. (correct)
- To safeguard the financial information of business owners.
- To establish a universal right to be left alone as a core principle.
How does PIPEDA (Personal Information Protection and Electronic Documents Act) regulate private organizations in Canada?
How does PIPEDA (Personal Information Protection and Electronic Documents Act) regulate private organizations in Canada?
- By granting the Privacy Commissioner the power to order organizations to comply with privacy regulations.
- By establishing a national registry of all Canadian citizens' personal data.
- By mandating strict data localization requirements for all personal information.
- By regulating how organizations collect, use, and disclose personal information, requiring consent for data collection except in national security issues. (correct)
Which of the following best describes the role of the Office of the Privacy Commissioner of Canada concerning PIPEDA?
Which of the following best describes the role of the Office of the Privacy Commissioner of Canada concerning PIPEDA?
Personal Information Act (PIPA) in Alberta dictates that organizations can only ask for 'reasonable data'. What is the primary intention behind this limitation?
Personal Information Act (PIPA) in Alberta dictates that organizations can only ask for 'reasonable data'. What is the primary intention behind this limitation?
Zuboff's concept of 'behavioral surplus' refers to:
Zuboff's concept of 'behavioral surplus' refers to:
What is 'dataification,' as understood by some scholars, in the context of surveillance capitalism?
What is 'dataification,' as understood by some scholars, in the context of surveillance capitalism?
What did Facebook's research on manipulating users' emotional states through their news feeds reveal?
What did Facebook's research on manipulating users' emotional states through their news feeds reveal?
Why are Institutional Ethics Review Boards (IERB) significant in academic research, and how do they relate to private companies like Facebook?
Why are Institutional Ethics Review Boards (IERB) significant in academic research, and how do they relate to private companies like Facebook?
What is 'algorithmic governance'?
What is 'algorithmic governance'?
What does the term 'platformization' refer to in the context of economics and computing?
What does the term 'platformization' refer to in the context of economics and computing?
Why is rent-seeking considered a key aspect of platform business models?
Why is rent-seeking considered a key aspect of platform business models?
What is 'enshitification' (or platform decay) and how does it typically occur?
What is 'enshitification' (or platform decay) and how does it typically occur?
In the context of cybersecurity, what distinguishes 'hacktivism' from general hacking activities?
In the context of cybersecurity, what distinguishes 'hacktivism' from general hacking activities?
Which of the following best describes 'cyberterrorism' as defined in the USA context?
Which of the following best describes 'cyberterrorism' as defined in the USA context?
What is the primary goal of 'cyberwarfare'?
What is the primary goal of 'cyberwarfare'?
What does the 'Dead Internet Theory' suggest?
What does the 'Dead Internet Theory' suggest?
What does the concept of a 'legitimation crisis' refer to in the context of cyberwarfare?
What does the concept of a 'legitimation crisis' refer to in the context of cyberwarfare?
What evidence might indicate that a country is a target of cyberwarfare aimed at undermining its institutions and social cohesion?
What evidence might indicate that a country is a target of cyberwarfare aimed at undermining its institutions and social cohesion?
What is meant by 'tech determinism' in the context of discussing the impact of digital technology on society?
What is meant by 'tech determinism' in the context of discussing the impact of digital technology on society?
What is 'technological momentum' in the context of digital technology and social change?
What is 'technological momentum' in the context of digital technology and social change?
What did Solomon Asch's famous line experiments demonstrate?
What did Solomon Asch's famous line experiments demonstrate?
How can one dissenting voice moderate the polarization effect in group discussions, according to research?
How can one dissenting voice moderate the polarization effect in group discussions, according to research?
Why did traditional media once act as gatekeepers regarding dissenting voices?
Why did traditional media once act as gatekeepers regarding dissenting voices?
According to group polarization theory, what are the two primary hypotheses explaining how group polarization works?
According to group polarization theory, what are the two primary hypotheses explaining how group polarization works?
What are some strategies to counteract the effects of group polarization?
What are some strategies to counteract the effects of group polarization?
In the context of affective computing, what is the main objective?
In the context of affective computing, what is the main objective?
Which historical event is mentioned as an example of groupthink and flawed decision-making?
Which historical event is mentioned as an example of groupthink and flawed decision-making?
What vulnerability did the NSA discover in Windows that was later exploited in the WannaCry cyberattack?
What vulnerability did the NSA discover in Windows that was later exploited in the WannaCry cyberattack?
What was the primary target of the WannaCry cyberattack in 2017?
What was the primary target of the WannaCry cyberattack in 2017?
Which country was targeted by a massive DDOS attack in 2007 that disabled most of its computer-related functionality?
Which country was targeted by a massive DDOS attack in 2007 that disabled most of its computer-related functionality?
What was the main purpose of the Stuxnet worm?
What was the main purpose of the Stuxnet worm?
What is 'doxing' in the context of hacktivism?
What is 'doxing' in the context of hacktivism?
What is a 'DDOS' attack?
What is a 'DDOS' attack?
What is the significance of the Big Five Factors (BFF)/OCEAN model mentioned in the context of algorithmic governance?
What is the significance of the Big Five Factors (BFF)/OCEAN model mentioned in the context of algorithmic governance?
In the platform economy, what is the role of 'complementors'?
In the platform economy, what is the role of 'complementors'?
Why might a platform engage in practices that 'screw over' its own complementors?
Why might a platform engage in practices that 'screw over' its own complementors?
How does the increasing cost of living relate to the concept of 'rent-seeking' on platforms?
How does the increasing cost of living relate to the concept of 'rent-seeking' on platforms?
Flashcards
Privacy
Privacy
A claim, right, privilege, or condition related to personal information and autonomy.
Early Privacy Laws
Early Privacy Laws
Laws enacted in the late 19th/early 20th century to protect celebrities from intrusive newspaper reporting.
Privacy Act of 1983 (Canada)
Privacy Act of 1983 (Canada)
Regulates the Federal Government in regard to individual information.
PIPEDA (Canada)
PIPEDA (Canada)
Signup and view all the flashcards
FOIP (Alberta)
FOIP (Alberta)
Signup and view all the flashcards
PIPA (Alberta)
PIPA (Alberta)
Signup and view all the flashcards
Surveillance Capitalism
Surveillance Capitalism
Signup and view all the flashcards
Dataification
Dataification
Signup and view all the flashcards
Algorithmic Governance
Algorithmic Governance
Signup and view all the flashcards
Platform (computing)
Platform (computing)
Signup and view all the flashcards
Enshitification
Enshitification
Signup and view all the flashcards
Hacktivism
Hacktivism
Signup and view all the flashcards
Cyberterrorism
Cyberterrorism
Signup and view all the flashcards
Cyberwarfare
Cyberwarfare
Signup and view all the flashcards
Dead Internet Theory
Dead Internet Theory
Signup and view all the flashcards
Legitimacy
Legitimacy
Signup and view all the flashcards
State Legitimacy
State Legitimacy
Signup and view all the flashcards
Legitimation Crisis
Legitimation Crisis
Signup and view all the flashcards
Technological Determinism
Technological Determinism
Signup and view all the flashcards
Social Construction
Social Construction
Signup and view all the flashcards
Technological Momentum
Technological Momentum
Signup and view all the flashcards
Group Polarization Theory
Group Polarization Theory
Signup and view all the flashcards
Study Notes
- The concept of privacy is relatively recent, with the earliest legal rulings emerging in the 20th century.
Historical context of privacy
- Privacy was historically linked to property rights.
- Increased prosperity in the 19th century led to more private possessions and larger living spaces.
- Privacy was once viewed as a political threat.
- Early mail protection laws focused on property rights rather than privacy.
- The first laws explicitly addressing privacy in England and the USA aimed to shield celebrities from intrusive newspaper reporting.
- These laws were inspired by an 1890 Harvard Law Review article advocating for a "right to be left alone."
- Individual homes with private spaces became common by the 1950s, shifting privacy concerns beyond the wealthy and famous.
- Compared to 40-70 years ago, individuals today may have more privacy despite concerns about the internet age.
Privacy today
- The rise of computerized record-keeping in the 1960s and 1970s introduced the concept of data privacy, which existing legislation has struggled to address.
Canadian privacy legislation
Federal
- The Privacy Act of 1983 governs the federal government's handling of individual information.
- The Personal Information Protection and Electronic Documents Act of 2000 (PIPEDA) regulates Canada-wide private organizations and companies regarding the collection, use, and disclosure of personal information.
- PIPEDA mandates consent for data collection, except in matters of national security.
- Individuals can access their personal information held by companies and file privacy complaints with the Office of the Privacy Commissioner.
- The Privacy Commissioner can issue reports but lacks the power to enforce compliance.
Provincial
- Alberta's Freedom of Information and Privacy Act (FOIP) is the provincial equivalent of the federal Privacy Act, regulating Alberta government agencies.
- Alberta's Personal Information Act (PIPA) regulates incorporated private entities, allowing them to request only "reasonable data" relevant to their business, preventing data harvesting for resale.
Data tracking
- The extensive scale of modern data tracking raises concerns.
- Digital advertising platforms like Facebook and Google aim to predict future behavior for targeted advertising and potentially other purposes.
Surveillance Capitalism
- Shoshana Zuboff's book argues that digitally enabled automated surveillance represents a new form of capitalism.
- In the early days of the web, companies generated "behavioral surplus" data that could be used for purposes beyond service improvement.
Datafication and Algorithmic Governance
- Some scholars use the terms "dataification" and "algorithmic governance".
- Dataification refers to the technical growth of data quantification of human life and economic processes built around extracting value from this data.
- Zuboff believes that dataification is not just a monetary grift, but a key characteristic of newly emerging from of capitalism.
- "Algorithmic governance" is a term used instead of "behaviour modification"
- Facebook published papers in 2012 and 2014 demonstrating that emotional states could be widely influenced through networks, which was met with public concern.
- Unlike academic researchers, Facebook and other private companies are not always constrained by Institutional Ethics Review Boards (IERB).
Algorithmic Governance
- Digital environments provide partial information, influencing cognitive shortcuts in decision-making.
Platformization
- The growth and consolidation of platforms has been a key economic transformation of the last 10–15 years.
- Platforms are described as infrastructures with global user bases, complementors, and developers.
- A platform's user base can exert pressure on governments.
Enshitification
- Enshitification describes the decline in the quality of online services over time due to a monopoly or platform position.
- Initially, vendors provide high-quality service to attract users, but as the number of users increases, they shift their focus towards monetization.
- Once a platform achieves a certain size and monopoly, it focuses on extracting rents.
The internet's environmental costs
- Security risks
- Cyberwarfare + hacktivism
Hacking, Hacktivism, CyberTerrorism, Cyberwarfare
Hacking
- Hacking initially referred to clever solutions to computing problems.
- By the 1980s, hacking became associated with crime and mischief.
Hacktivism
- Hacktivism combines hacking with activism.
- Defacing websites, DDOS attacks, and doxing are typical acts.
- Whether hacktivism is considered a crime or civil disobedience is up for debate.
Cyber terrorism
- Cyberterrorism involves using computer crime and hacking to disrupt communication/internet infrastructure for political, ideological, or religious causes.
- Bodily harm or the threat of it is typically required for an act to be classified as cyberterrorism in the USA.
Notable Cyberattacks
- In 2007, Estonia was targeted by a massive DDOS attack that disabled most of its computer-related functionality.
- Stuxnet (2013) was a computer worm attack that damaged Iranian nuclear centrifuges.
- The WannaCry cyberattack (2017) affected hundreds of thousands of computers by encrypting them and demanding ransom in Bitcoin, with healthcare infrastructure being a primary target.
Cyberwarfare
- Cyberwarfare employs computer techniques to erode a nation's economic strength, undermine its institutions, encourage social discord, and weaken international bonds.
- Western states began to recognize cyberwarfare as a real threat in the late 2010s.
- One example of cyberwarfare is information poisoning, which makes it difficult to distinguish truth from falsehood.
Dead Internet Theory
- The Dead Internet Theory proposes that the majority of online content is now machine-generated.
Legitimacy in Cyberwarfare
- Legitimacy refers to the belief that something is legal, proper, valid, and acceptable.
- When a state's institutions are considered legitimate, they have the support of the majority of the population and the right to operate and exercise control.
- Evidence of cyberwarfare can include declining political participation, shrinkage of centralist parties, growth in populist options, and the rise of extremist platforms.
The role of digital technology in societal discord
- The use of digital technology (especially social media and the internet) to create discord and distrust in rival nations relates to the breakdown of the civil public sphere.
- This is done by encouraging dislike and disbelief of those whose views differ from one's own.
Explanations for the current legitimation crisis (LC)
- Technological determinism: Technology (specifically impartial social networks) is the primary cause.
- Social forces: Larger social forces (e.g., financial capitalism) are the main drivers, with technology acting as a delivery vehicle.
- Technological momentum: Larger social forces are the root cause, but technology amplifies and worsens the crisis.
Group Polarization theory
- Group polarization theory is a concept from experimental psychology.
- Initial work began in the late 1950s, and has become one of the most studied phenomenon in psychology
- Solomon Asch's line experiments (late 1950s)
- Juries: Placing like-minded individuals together has shown that theory will come out of that deliberation with stronger views which will cause their views to become more polarized
- A dissenting voice can moderate the polarization effect: echo chambers are real but can be moderated in their effects.
- Traditional media: Traditionally acted as gatekeepers including dissenting voices.
- Internet: people tend to consume information sources that reflect individual's views, and engagement algorithms of SM also do this.
How Group Polarization works
- Social comparison: People alter and adjust their stances
- Persuasive argumentation: Persuaded to agree
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.