{"id":2226,"date":"2016-12-11T18:11:09","date_gmt":"2016-12-11T18:11:09","guid":{"rendered":"http:\/\/listheory.prattsils.org\/?p=2226"},"modified":"2016-12-11T18:11:09","modified_gmt":"2016-12-11T18:11:09","slug":"critical-awareness-of-big-data","status":"publish","type":"post","link":"https:\/\/studentwork.prattsi.org\/foundations\/2016\/12\/11\/critical-awareness-of-big-data\/","title":{"rendered":"Critical Awareness of Big Data"},"content":{"rendered":"<p><span style=\"font-weight: 400\">The article by danah boyd and Kate Crawford, \u201cCritical questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon,\u201d discusses the shortcomings of Big Data, specifically in correlation with social media. One of the arguments they put forth in their paper is the way in which data from Twitter is not what it appears to be. Since posts are public by default on Twitter, the \u201cdata\u201d from the site is often analyzed or used in research, but those publishing their findings don\u2019t always make it clear that Twitter posts aren\u2019t necessarily representative of what they claim to be. As boyd and Crawford point out, \u201cTwitter does not represent \u2018all people\u2019, and it is an error to assume \u2018people\u2019 and \u2018Twitter users\u2019 are synonymous: they are a very particular sub-set&#8230;Nor can we assume that accounts and users are equivalent\u201d (2012, p. 669). As they go on to explain, some users have several accounts, or many people use the same account, or tweets on an account are generated by a bot. There are also those who use Twitter in a passive sense: rather than participate, they simply look at what others are saying. These varying types of users are indicative of the fact that Twitter cannot be relied upon as a representative sample of the population. Unfortunately, however, although some researchers do point out the inherent flaws of using data from Twitter, many news sources do not. Thus, many people don\u2019t question the analysis of what users are expressing on Twitter, or statements relating to statistics of what is happening on the site.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It is this lack of questioning, and lack of awareness, that is worrisome. Big Data is everywhere we turn, yet many people don\u2019t stop to think about the ways in which it is all around us. When the iPhone came out with the touchpad home button, many people didn\u2019t think twice about turning over their thumbprint to their phones (and, as an extension, the company that makes them). Payton and Claypoole write in their book, <\/span><i><span style=\"font-weight: 400\">Privacy in the Age of Big Data<\/span><\/i><span style=\"font-weight: 400\">, \u201cAs business and government collects and benefits from all of this data, capturing data becomes an end in itself. We must have more and more data to feed the insatiable appetite for more. And yet, we are not having a serious public discussion about what information is collected about each of us and how it is being used\u201d (2014, p. vii). This is most likely because the average person does not stop to think how creepy many of these tracking systems are; they either don\u2019t care or don\u2019t realize it\u2019s happening. To return to iPhones as an example: several updates ago, location tags suddenly appeared on photos. As I am very paranoid about any possible intrusions into my private information, I immediately went to my settings and turned off location services for every single app except for Google Maps (and even then, the location is activated only while I am using the app). However, when I brought the issue up to friends, no one else seemed to care that their phones were essentially tracking them. <\/span><\/p>\n<p><span style=\"font-weight: 400\">And yet, the joke is on me. Because GPS is not the only form of tracking on phones. Pinging between cell towers can also help determine location (the first season of \u201cSerial\u201d should have taught me that). It can also be tracked via WiFi, if the phone is continually searching for different networks (another default setting, although that function can of course be turned off \u2013 and it most certainly is on my phone). Not only does tracking happen through these types of relatively subtle ways, but it can also happen in the form of a game. As laid out in \u201cTerms of Service,\u201d the graphic novella by Keller and Neufeld, participating in social media can be highly compelling, even if it means giving away a plethora of information about yourself (apparently checking in on Foursquare enough times to become \u201cmayor\u201d of a space is enough to overcome any feelings of hesitation). For those who don\u2019t participate in the technology at all, it can feel isolating: \u201cOnce enough people reveal their information, then NOT revealing your information becomes a stigma\u201d (2015, p. 12). There is also a form of pressure that can happen when a person doesn\u2019t have social media accounts: people may think or act like that person is weird for choosing to abstain.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Many of the services that are touted as time-saving and efficient, such as Amazon Go, are actually tracking insane amounts of data on each user. Of course, it\u2019s clear that Amazon is on a mission to take over the world (and no one seems to be upset about it), but people should at least be on the alert about a service that is keeping tabs on users in multiple ways. Using Amazon Go would mean providing the company with data on your physical location, your buying and eating habits, and your credit card information. The convenience of it all (not having to stand in line to check out, not having to interact with another human being), as well as the novelty, is what consumers will focus on, but what if Amazon\u2019s databases are broken into and suddenly a hacker knows everything about you? Not worth the convenience after all.<\/span><\/p>\n<p><span style=\"font-weight: 400\">There are also, of course, the new types of technology that have recently begun to invade homes: Google Home, Amazon Echo, ivee, etc. Here are some very worrying default settings for the Echo (and the other devices work similarly): past recordings are kept to improve answers the for future questions; location services are activated, the better to suggest nearby stores and restaurants; and the microphone is ALWAYS ON (Studio One Networks, 2016). These settings can all be changed, but will the average consumer know\/care to do that?<\/span><\/p>\n<p><span style=\"font-weight: 400\">In this day and age, everyone needs to be aware of, and protective of, their privacy. It is all too easy for both corporations and the government to keep track of and use data that is collected on the average citizen. Knowing the ease with which your movements, preferences, beliefs, habits and more can be recorded and tracked, it is the responsibility of every person to, at the very least, be aware of the accessibility of their individual data. People can decide for themselves how much or how little to reveal through their use of products and websites, but it is important for everyone to question the necessity of the data they are putting out into the world. Knowledge of this, as in most cases, is power.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>References:<\/p>\n<p><span style=\"font-weight: 400\">Boyd, D. &amp; Crawford, K. (2012). \u201cCritical questions for big data: provocations for a cultural, technological, and scholarly phenomenon.\u201d Information, Communication &amp; Society 15(5): 662\u2013679. http:\/\/www.tandfonline.com\/doi\/pdf\/ 10.1080\/1369118X.2012.678878<\/span><\/p>\n<p><span style=\"font-weight: 400\">Keller, M. &amp; Neufeld, J. (2015). \u201cTerms of service: understanding our role in the world of big data.\u201d Al Jazeera America. http:\/\/projects.aljazeera.com\/2014\/terms-of-service\/#1<\/span><\/p>\n<p><span style=\"font-weight: 400\">Payton, T. &amp; Claypoole T. (2014). <\/span><i><span style=\"font-weight: 400\">Privacy in the age of big data: Recognizing threats, defending your rights, and protecting your family<\/span><\/i><span style=\"font-weight: 400\">. Lanham, MD: Rowman &amp; Littlefield.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Studio One Networks. 2016. Expert Q &amp; A: How private is the new Amazon Echo? Retrieved from http:\/\/www.yoursecurityresource.com\/expertqa\/how-private-is-new-amazon-echo\/<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The article by danah boyd and Kate Crawford, \u201cCritical questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon,\u201d discusses the shortcomings of Big Data, specifically in correlation with social media. One of the arguments they put forth in their paper is the way in which data from Twitter is not what it [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-2226","post","type-post","status-publish","format-standard","hentry","category-articles"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/posts\/2226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/comments?post=2226"}],"version-history":[{"count":0,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/posts\/2226\/revisions"}],"wp:attachment":[{"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/media?parent=2226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/categories?post=2226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/studentwork.prattsi.org\/foundations\/wp-json\/wp\/v2\/tags?post=2226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}