Wednesday 3 April 2013

Surveillance in the Digital Era: Part 2

Hey Folks,
Here is one more exciting post about the surveillance theme. Hope you like it and leave your comments bellow. Sorry for the long text, but it was necessary due to the social nature of the article. Hope you enjoy!

 
In my first publication about this subject, I wrote about the importance of selecting what we publish on our social networking sites in order to protect our personal data from theft. Personal security was emphasized following a dictionary definition of the term surveillance.

Now, in this second and final publication about the same issue, I will then discuss the academic definition for surveillance, definition that I now shall repeat. David Lyon, an academic writer, says that surveillance is “Watching and recording others’ activity as a means of monitoring and supervising them” (Lyon, 2002). Or yet, “Focusing and systematic attention to personal details for the purpose of influence, management, care, control or regulation.” (Lyon, 2002: p. 1-5).

Even though it seems to be the same definition as it is in the dictionary, which I profoundly explored in the previous article, it is not the same; there is a crucial element of difference. The academic definition that I will pass on to describe means much more than a “close observation” as the dictionary states. The academic definition speaks about constant surveillance, monitoring something in a systematic manner. It is almost as if dissecting a human or animal body. It is something beyond social networking, something that we are all submitting to in our daily lives, no matter where we go.

In London, United Kingdom, there is a camera monitoring system that works 24/7. This system is known as Closed Circuit Television (CCTV) and according to official sources there is one camera for every 14 inhabitants. Every step or action we make is filmed and controlled by an operation system that unites all the cameras in a switcher room, watching all over London.

Applying this to the virtual territory, we see that the situation is similar to when we share personal information to others without noticing it. A clear example is those public entities where we leave our ID numbers and many other very personal data. The same happens when we type in or share personal info on networking websites, dating websites, and so on. Even when we authorize the use of our data to access some web content. Or when we authorize an online contract, which will give us access to a specific portal. In this sense, there is a monitoring system created by Facebook that allows them to use our info to let us access games or even application, even if those are our most basic data.

From the online advertising point of view, there are huge opportunities with this kind of information sharing. There are specialist advertisers who use key words typed on Google to tailor pop up adverts to users (Which I personally think that it is too annoying and unnecessary). Furthermore, there are those advanced systems that sweep your Internet preferences to use that data for their own companies benefit. An example of this is universities that use their data system to register and capture students’ classification awards to promote them to prospect students.

In parallel to this and coming back to the real world, we think of health check records, official records, criminal check records, bankcards, store loyalty cards and any other personal info that we give away. Recently I was told that even with that entry cards that we take when we check in to hotels around the world carry very important data about us. Those data are things like passport number, ID number and so on. When we check out, this data stays on the card, which is kept inside a drawer until the next guest comes in. Only then the info is wiped out from the card, but it remains there on their computer records. In other words, we are never free from this constant surveillance in anywhere we go.

To wrap this all up, I want to stress that this subject is too extensive and there is much more to it that I do not have space to cover it all here. But, it is also important to say that all the issues I did not mention are equally crucial. Anyway, my aim here is not and it never was to alarm anyone to this “lack of security” we have out there. I want to make clear that for everything there are positive and negative sides, therefore I only present the facts as they are to the own judgement of each of us. For this reason, when I put “lack of security” in inverted comma was to say that there is also a positive aspect in all of this, from where companies and institutions take advantage. So, from all of this we have to think: What am I doing with my personal data? To whom and Why am I passing this information? Do I need to do this for this purpose or not? We have to be conscious of our acts and that those acts are most important than anything else. 

Well, I this I wrote to much for today so see you next time!

No comments:

Post a Comment