In an interview discussing our relationship with the Internet of Things, Powell, an Assistant Professor in Media and Communications at the London School of Economics, posits that our trust in this network of seamlessly connected devices to benefit us has blinded us from the fact that the data which is created and circulated constantly around this network, serves only the interests of the network itself rather than us (Sumner 325).
As such, consumers should consider that this data is not only valuable and made available to us who wish to know how fit we are, but also to firms that sell fitness trackers, as well as any entity that purchases these aggregated fitness tracker data.
Take the fitness tracker as an example. There is an implicit understanding that our data will be passively collected on top of registered information such as name, date of birth, contact details, height and weight that we willingly surrender to these devices and services. However, most, if not all of us are unaware of the full extent of our participation in this relationship.
“It’s out in the world, having a life, creating relationships about a single person and groups of people who undertake similar actions. The results of the analysis of those data doubles are open to lots of different entities.”
For example, a profiler identifying a person’s gender is only likely to be accurate 42% of the time (Neumann et al. 8), which means even if they can pinpoint our identities online, their profiles of us are still highly likely to be inaccurate.
Therein lies the danger for these erroneous inferences to cause negative consequences for us, as former employee of the National Security Agency of USA and data privacy critic Doss cautions.
According to her, it is more likely than ever that even sensitive searches about biological weapons that stemmed from curiosity or news-watching will possibly be archived into aggregated data about her by data brokers.
In his established profile, he was described as in his 50s, married with children, with a graduate degree and employed. But none of that was true, he was 29, unmarried and jobless (Savage).
This would mean searches around mental illnesses or medical conditions, potentially harmful or unsociable activities would also be included in that data archive. The same would hold true for the rest of any of our online and offline activities that could be misinterpreted in that fashion (Doss 30-31).
“Everyone is vulnerable to manipulation because no one has unmediated access to information. ...Companies like Twitter, or Facebook are carefully curating their content for you. They are selling your attention to unknown actors who want to influence you.”
In an interview discussing our relationship with the Internet of Things, Powell, an Assistant Professor in Media and Communications at the London School of Economics, posits that our trust in this network of seamlessly connected devices to benefit us has blinded us from the fact that the data which is created and circulated constantly around this network, serves only the interests of the network itself rather than us (Sumner 325).
For example, a profiler identifying a person’s gender is only likely to be accurate 42% of the time (Neumann et al. 8), which means even if they can pinpoint our identities online, their profiles of us are still highly likely to be inaccurate.
Therein lies the danger for these erroneous inferences to cause negative consequences for us, as former employee of the National Security Agency of USA and data privacy critic Doss cautions.
According to her, it is more likely than ever that even sensitive searches about biological weapons that stemmed from curiosity or news-watching will possibly be archived into aggregated data about her by data brokers.
In his established profile, he was described as in his 50s, married with children, with a graduate degree and employed. But none of that was true, he was 29, unmarried and jobless (Savage).
This would mean searches around mental illnesses or medical conditions, potentially harmful or unsociable activities would also be included in that data archive. The same would hold true for the rest of any of our online and offline activities that could be misinterpreted in that fashion (Doss 30-31).
“Everyone is vulnerable to manipulation because no one has unmediated access to information. ...Companies like Twitter, or Facebook are carefully curating their content for you. They are selling your attention to unknown actors who want to influence you.”