Computers, Privacy & the Constitution

View   r3  >  r2  ...
BenjaminKastnerFirstPaper 3 - 23 Jun 2015 - Main.BenjaminKastner
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Changed:
<
<
Market Conflict in Digital Privacy
>
>
Market Approach to Digital Privacy
 
Changed:
<
<
Corporation’s interests are not aligned with consumers in the digital privacy context. Corporations are incentivized to collect as much consumer data as they can, using essentially whatever means they can. The growth of “big data” and analytics in the business context has made this broad and deep collection of consumer data available to major corporations invaluable in shaping business strategies. The rapidly changing technological landscape over the past 20 years, specifically the rise to prominence of the internet, has changed not only the type but the quality of data available to business enterprises, and thus has changed the value of analytics and “data mining” fundamentally. Among the notable technological advances that have made this possible are the increased availability of the personal computer (decreases in both size and cost), and the adoption of the mobile platform. Examining the incentives of corporations to collect and use this data is important because it can provide insight into the likely future of data collection from a consumer facing perspective absent significant regulation.
>
>
Corporation’s interests have not been aligned with consumers in the digital privacy context, but this may be changing. Corporations are incentivized to collect as much consumer data as they can, using any means available. The growth of “big data” and analytics in the business context has made the broad and deep collection of consumer data available to major corporations invaluable in shaping business strategies. The vulnerability of this valuable resource will incentivize corporations to invest in consumer protection mechanisms.
 
Changed:
<
<
Shorter paragraphs will make your writing clearer. They will also help you shorten your sentences.
>
>
The rapidly changing technological landscape over the past 20 years, specifically the rise to prominence of the internet, has changed not only the type but the quality of data available to business enterprises, and thus has changed the value of analytics and “data mining” fundamentally. Among the notable technological advances that have made this possible are the increased availability of the personal computer (due to decreases in both size and cost), and the adoption of the mobile platform. Examining the incentives of corporations to collect and use this data is important because it can provide insight into the likely future of data collection from a consumer facing perspective, absent significant regulation. An initial survey of the data collection practices and the ways the data has been put to use provides important context for understanding corporate incentives moving forward.
 
Changed:
<
<
Opportunities to use consumer data are bountiful, and companies have responded by collecting whatever data they can.
>
>
Companies have realized both how valuable and bountiful the available consumer data are, and have responded by collecting whatever they can. Samsung collects data from voice commands to its smart TVs; Foursquare has begun tracking users even when the app is turned off; fitness devices, such as the FitBit? , collect and upload user data to the cloud; even taxi cab rides have become part of a large data set that “contains details about every taxi ride (yellow cabs) in New York in 2013, including the pickup and drop off times, locations, fare and tip amounts, as well as anonymized (hashed) versions of the taxi’s license and medallion numbers.” Companies are seeking to extract data from every interaction consumers have with electronics, and have gone so far as to design products in order to further this goal.
 
Changed:
<
<
You mean, because data about consumers are valuable, businesses collect whatever they can.
>
>
The ways that different data collectors have chosen to utilize their newfound wealth has varied. Some apps that track user location, for instance, while biking, have begun to share portions of this information with city governments, while Google stores (but does not share) user location data refreshed every second via Waze, the GPS and traffic app it purchased for $1.3 billion. Database marketing companies like Acxiom aggregate and analyze consumer data sets from a variety of sources, which they then sell to corporate clients who use the information to more effectively reach customers. In the social media context, Facebook uses the massive amount of information it collects on its’ users to design targeted ad campaigns for corporate clients. Data collection has become amply incentivized and secondary markets for data have formed, with demand coming from corporate clients and municipalities alike.
 
Added:
>
>
Interestingly enough, the incentive to generate competitive advantage through analytics may provide some level of protection to consumers. Since it has become abundantly clear that data is valuable, it only stands to reason that corporations want to keep the data they collect to themselves rather than allow their competitors (or anyone else) to get ahold of it. After Yahoo purchased the analytics firm Flurry, which collects data from a number of “Flurry enabled apps,” they switched from the less secure HTTP protocol to the considerably more secure HTTPS protocol for data transmission, providing consumers with a level of protection that they did not have before. While not going quite as far, Google has encouraged developers to use HTTPS in connection with its’ AdMob? program that provides advertising to apps. Further, both Apple and Google began to offer default encryption on iOS and Android, much to the chagrin of some law enforcement agents.
 
Changed:
<
<
Samsung collects data from voice commands to smart TVs; Foursquare has begun tracking users even when the app is turned off; fitness devices, such as FitBit? , collects and uploads user data to the cloud; even taxi cabs are part of a large data set that “contains details about every taxi ride (yellow cabs) in New York in 2013, including the pickup and drop off times, locations, fare and tip amounts, as well as anonymized (hashed) versions of the taxi’s license and medallion numbers.”
>
>
It is notable that we are seeing large, public tech companies begin to move towards providing more secure services for their consumers. It is possible that this reflects the recognition of value the data being protected has, or perhaps these companies are seeking to avoid the public perception pitfalls that lie ahead in the form of data breaches and hacks, like with Target and Sony, among others. While the focus among companies up to this point has been to rapidly expand their data collection capabilities and to try to capture the richest consumer data available, this move may have happened too fast. The troves of information that have been accumulated are now vulnerable, and the companies are incentivized to quickly move towards procedures that protect this information going forward.
 
Deleted:
<
<
This is not a very comprehensive, illustrative or simple set of examples.

Some apps that track user location, for instance, while biking, have begun to share some of this information with city governments, while Google stores (but does not share) user location data refreshed every second via Waze, the GPS and traffic app it purchased for $1.3 billion. Database marketing companies like Acxiom aggregate and analyze consumer data sets from a variety of sources, which they then sell to corporate clients who use the information to more effectively reach customers. In the social media context, Facebook uses the massive amount of information it collects on its’ users to design targeted ad campaigns for corporate clients. In short, data collection is amply incentivized, and secondary markets for data have formed.

In short, what did the examples add?

Interestingly enough, the incentive to generate competitive advantage through analytics may provide some level of protection to consumers. Since it has become abundantly clear that data is valuable, it only stands to reason that corporations want to keep the data they collect to themselves rather than allow their competitors (or anyone else) to get ahold of it. After Yahoo purchased the analytics firm Flurry, which collects data from a number of “Flurry enabled apps,” they switched from the less secure HTTP protocol to the considerably more secure HTTPS protocol for data transmission, providing consumers with a level of protection that they did not have before. While not going quite as far, Google has encouraged developers to use HTTPS in connection with its’ AdMob? program that provides advertising to apps. Further, both Apple and Google began to offer default encryption on iOS and Android, much to the chagrin of some law enforcement agents. It is notable that we are seeing large, public tech companies begin to move towards providing more secure services for their consumers. It is possible that this reflects the recognition of value the data being protected has, or perhaps these companies are seeking to avoid the public perception pitfalls that lie ahead in the form of data breaches and hacks, like with Target and Samsung, among others. Regardless, it is important to note the shift in focus by public corporations in providing secure tech services for consumers because they both created the issue, and may be responsible for shouldering the responsibility of consumer protection without a significant change in the legislative approach to the issue. While public perception has shifted considerably on digital security issues, legislation does not appear likely in the near term – especially with the NSA providing powerful and influential opposition.

Examples: Data Collection: •Simon Sharwood, Watch out: Samsung's TV is watching YOU as you watch it, The Register, February 9, 2015 • Douglas MacMillan? , Foursquare Now Tracks Users Even When the App Is Closed, Wall Street Journal, August 6, 2014 • http://research.neustar.biz/2014/09/15/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset/https://www.aclu.org/blog/technology-and-liberty/location-apps-sharing-data-governments • Al Sassco, Fitness Trackers are Changing Online Privacy — and It's Time to Pay Attention, CIO.com, August 14, 2014 • http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?pagewanted=all

Data Protection •Yahoo switching to https encryption on Flurry; Google requesting developers do the same on AdMob? https://firstlook.org/theintercept/2015/01/26/secret-badass-spy-program/ •Apple and Google decide to offer default encryption on iOS and Android https://www.techdirt.com/articles/20150109/06144429646/new-yorks-top-prosecutor-says-we-need-new-laws-to-fight-iphoneandroid-encryption.shtml

Analysis/Increased value in use: • Vindu Goel, How Facebook Sold You Krill Oil, New York Times, August 2, 2014

Public Perception http://www.theguardian.com/commentisfree/2013/jul/29/poll-nsa-surveillance-privacy-pew

Why aren't these linked in some useful way in the draft? It's as though you could find no better use for them than as a kitchen sink to be thrown at the reader.

The draft is one or two from ready, I think, from an organizational point of view. The outline is the crucial component of the next draft. Start from a clearer version of the central point: businesses collect data about consumers and so? Develop the idea not through an uncontrolled profusion of examples, but through the systematic exposition of your argument, with facts to support it.

 \ No newline at end of file
Added:
>
>
It is important to note the shift in focus by public corporations in providing secure tech services for consumers both because they created the issue and may be responsible for shouldering the responsibility of consumer protection without a significant change in the legislative landscape. While public perception has shifted considerably on digital security issues, legislation does not appear likely in the near term – especially with the NSA providing powerful and influential opposition.

Revision 3r3 - 23 Jun 2015 - 21:07:48 - BenjaminKastner
Revision 2r2 - 28 Apr 2015 - 20:31:39 - EbenMoglen
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM