SlideShare una empresa de Scribd logo
1 de 50
Descargar para leer sin conexión
The	Crisis	of	Self	Sovereignty
- With	A	Brief	Overview	of	“The	Age	of	Surveillance	Capitalism”
Jonathan Kim
(deframing@icloud.com)
2019.4.25
It’s Time to Panic about Privacy
What	is	Privacy?
Privacy is a fundamental right,
essential to autonomy and
the protection of human dignity,
serving as the foundation upon which
many other human rights are built.
<Source:https://privacyinternational.org/explainer/56/what-privacy>
Debates	on	Privacy
ü Companies and governments are
gaining newpowers to followpeople
across the internet and around the
world, and even to peer into their
genomes.
ü The benefitsofsuch advances have
been apparent for years; the costs
are nowbecoming clearer.
ü The boundariesof privacy are in
dispute, and its future isin doubt.
Citizens, politicians and business
leaders are asking if societies are
making the wisest tradeoffs.
<Source:https://www.nytimes.com/interactive/2019/opinion/internet-privacy-project.html>
Privacy	is	Too	Big	to	Understand
<Source:https://www.nytimes.com/2019/04/16/opinion/privacy-technology.html>
§“Privacy” is an impoverished word — far too small a word to describe what we talk
about when we talk about the mining, transmission, storing, buying,selling, use and
misuse ofour personal information.
§You are losing controlover your life.When technologygovernsso many aspects of our
lives — and when that technologyis powered by the exploitation of ourdata —
privacy isn’t just about knowing your secrets, it’s about autonomy.
§Privacy is really about being able to define for ourselveswho we are forthe world and
on our own terms.
§“Maintaining privacy will be integral to the internet’sfuture, if only because consumers
need to feelsafe enoughto participate.”
How	Capitalism	Betrayed	Privacy
<Source:https://www.nytimes.com/2019/04/10/opinion/sunday/privacy-capitalism.html>
§The forcesof wealth creation no longer favor the expansion of privacy but work to
undermine it. - Therise of “attention merchants” and “surveillancecapitalism”;
thecommodificationofourpersonal data by techgiants likeFacebook,Googleand theirimitators.
§We face a future in which active surveillance is such a routine part of business that for
most people it is nearly inescapable. We are on the road back to serfdom.
§Many employers also nowconstantly watch their employees. There is good reason to
believe that, if nothing is done,gratuitous surveillance will be built into nearly every
business and business model.
§Those who want privacy should support and reward the companies who respect it.
The economicsof privacy would change if enough consumers bought fromcompanies
that don’t spy on us and whose products actually help people avoid an unwanted gaze.
Facebook	Under	Fire
<Source:https://variety.com/2018/digital/features/facebook-privacy-crisis-big-data-mark-zuckerberg-1202741394>
§Cambridge Analytica illicitly procured the
data of50 million Facebook users —
without their knowledge or consent —
and then enlisted that to informvoter-
targeting strategies forDonald Trump’s
presidential campaign.
§Both Facebook and CAclaim they were
duped by the researcher who originally
harvested the data, who used an
innocuous-seemingpersonality quiz in
2013 to access infoon friends of people
who used the app. à Facebook is
expecting to pay as much as $5bn to the
US Federal Trade Commission.(2019.4.25)
Facebook	is	"Surveillance	Machine"	
<Source:https://www.lrb.co.uk/v39/n16/john-lanchester/you-are-the-product>
You don't use Facebook. Facebook uses you.
“Facebook is in the surveillance business.
Facebook, in fact, is the biggest surveillance-based enterprise in the history of mankind.
It knows far, far more about youthan the most intrusive government has ever known
about its citizens.”
“Note that the company’s knowledge about its users isn’t used merely to target ads
but to shape the flowof news to them.”
When the service is free, you're not the customer.You're the product.
The	‘Data	Labor	Union’
<Source:https://thedataunion.eu>
Facebook usersunite!
'Data Labour Union'launches in Netherlands §The Data Union is going to demand the
transparency and readability of
algorithms used corporationsand
governments.
§The Data Union is going to help members
demand their data rights from
corporations and governments.
§The Data Union will focus attention on
the need for the Data Union.
§The Data Union will inform its members
about the newest tools to protect your
data and develop these ourselves,to end
our dependency.
Facebook’s	Privacy	Policies
<Source:https://web.facebook.com/notes/mark-zuckerberg/a-privacy-focused-vision-for-social-networking/10156700570096634/?_rdc=1&_rdr>
ü Facebook founderMark
Zuckerberg told that if
he were to create
Facebook again today,
user information would
by default be public,
not private as it was for
years until the company
changed dramatically in
December.
(2010. 1. 9)
ü Facebook’s mission is to
make the world more
open and connected.
ü The main way we do
this is by giving people
the tools to map out
their relationships with
the people and things
they care about. We
call this map the graph.
(2013. 1. 15)
The digital equivalent of
a town square à
The digital equivalent of
the living room
- Private interactions
- Encryption
- ReducingPermanence
- Safety
- Interoperability
- Securedata storage
(2019. 3.7)
“The Age of Privacyis Over” “GraphAPI/Graph Search” “A Privacy-FocusedVision”
Four	Essential	Privacy	Principles(by	Tim	Cook)
Ø Companies should challenge themselves to de-identify customer data or not collect
that data in the first place.
Ø Users should always knowwhat data is being collected from them and what it’s being
collected for.This is the only way to empower users to decide what collection is
legitimate and what isn’t.
Ø Companies should recognizethat data belongs to users and we should make it easy for
people to get acopy of their personal data, as well as correct and delete it.
Ø Everyonehas a right to the security of their data. Security is at the heart ofall data
privacy and privacy rights.
<Source:https://twitter.com/tim_cook>
“The Age of Surveillance Capitalism”
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Foundations of Surveillance Capitalism
Sur-veil-lance	Cap-i-tal-ism,	n.
1. Anew economicorder that claims human experienceas free raw material for hidden
commercial practices ofextraction, prediction, and sales;
2. Aparasitic economiclogic in which the productionof goods and services is
subordinated to a newglobal architecture ofbehavioral modification;
3. Arogue mutation of capitalism marked by concentrations of wealth, knowledge, and
power unprecedented in human history;
4. The foundationalframework ofa surveillance economy;
5. The origin ofa new instrumentarian power that asserts dominance over society and
presents startling challenges to market democracy;
6. Amovement that aims to impose a new collective order based on total certainty;
7. An expropriation of critical human rights that is best understoodas a coup from above:
an overthrowofthe people’s sovereignty.
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Behavioral	Surplus
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Behavioral
Data
Human
Experience
appliedto product or service
improvement
a proprietary
behavioralsurplus
Although some ofbehavioral data are applied to product or service improvement,
the rest are fed into advanced manufacturing processes known as“machine intelligence,”
and fabricated into prediction products that anticipate what you will do.
Data	Extraction	and	Analysis	
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Data
The raw material necessary for surveillance capitalism’s novel
manufacturing processes
Extraction
The social relations and material infrastructure with which the firm
asserts authority over those raw materials to achieve economiesof
scale in its raw-material supply operations
Analysis
The complex ofhighly specialized computational systems that is
generally referred to as “machine intelligence”
Behavioral	Value	Reinvestment	Cycle
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
ü Users provides the raw material in the
form ofbehavioral data, and those data
are harvested to improve speed, accuracy,
and relevance and to help build ancillary
productssuch as translation.
ü In the Behavioral Value Reinvestment
Cycle, all the behavioral data are
reinvested in the improvement ofthe
product or service.
Discovery	of	Behavior	Surplus
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
ü Surveillance Capitalism begins with the
discovery of behavioral surplus. More
behavioral data are rendered than
required for service improvement.
ü This surplus feeds machine intelligence
that fabricates predictions ofuser
behavior.These Productsare sold to
business customersin newbehavioral
futures markets.
ü The Behavioral Value Reinvestment Cycle
is subordinated to this new logic.
The	Logic	and	Operation	of	Surveillance	Capitalism	
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Logic
The Means
of Production
The
Products
The
Marketplace
The translation of
behavioral surplus
from outside to inside
the market finally
enabled Google to
convert investment
into revenue.
Google’s machine
intelligence
capabilities feed on
behavioral surplus,
and the more surplus
they consume,
the more accurate the
prediction products
that result.
Machine intelligence
processesbehavioral
surplus into prediction
products designed to
forecast what we will
feel, think, and do.
Prediction products
are sold into a new
kind ofmarket that
trades exclusively in
future behavior.
Surveillance
capitalism’s profits
derive from behavioral
futuresmarkets.
The	Dynamic	of	Behavioral	Surplus	Accumulation
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
ü Surveillance Capitalism master motionis
the accumulation of newsources of
behavioral surplus with more predictive
power.
ü The goalis predictionscomparable to
guaranteed outcomes in real-life behavior.
ü Extraction begins online,but the
prediction imperative increases the
momentum,driving extraction toward
new sourcesin the real world.
Accumulation	by	Dispossession
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Accumulationby dispossession is a conceptpresented by the Marxist geographer
David Harvey, which defines the neoliberal capitalist policies in many western
nations as resulting in a centralization ofwealth and power in the hands of a fewby
dispossessing the public and private entitiesof their wealth or land.
Human experience could be extracted at no extra cost online and at very low cost
out in the real world. Once extracted, it is rendered as behavioral data, producing a
surplus that forms the basis ofa wholly newclass ofmarket exchange.
Surveillance capitalism originatesin this act of digital dispossession, brought to life by
the impatience of over-accumulated investment.This isthe lever that moved
Google’s world and shifted it toward profit.
The	Dispossession	Cycle
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Incursion Habituation Adaptation Redirection
The incursion is when
dispossession
operations rely ontheir
virtual capabilities to
kidnap behavioral
surplus from the
nonmarket spaces of
everyday life where it
lives.
The incursion itself,
once unthinkable,
slowly worms its way
into the ordinary.
Worse still, it gradually
comes to seem
inevitable. New
dependencies develop.
when Google is forced
to alter its practices, its
engineers produce
superficial but
tactically effective
adaptations that satisfy
the immediate
demands of
government authorities
and public opinion.
In afinal stage the
corporation regroups to
cultivate new rhetoric,
methods, and design
elements that redirect
contested supply
operations just enough
so that they appear to
be compliant with
social/legal demands.
Scrapes	Your	Site	Activity
<Source:https://www.washingtonpost.com/news/the-intersect/wp/2016/06/09/creepy-startup-will-help-landlords-employers>
“People will give up their privacy
to get something they want.”
(Steve Thornhill)
Who	Knows?	Who	Decides?	Who	Decides	Who	Decides?
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Who
Knows?
Who
Decides?
Who Decides
Who Decides?
• ‘This is aquestion about the distribution of knowledge and whether
one is included or excluded from the opportunityto learn.
• This is a question about power. What is the sourceof power that
undergirds the authority to share or withhold knowledge?
• This is a question about authority : which people, institutions, or
processesdetermine who is included in learning, what they are able
to learn, and how they are able to act ontheir knowledge.
Merely	Human	Natural	Resources
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
In this future we are exiles from ourown behavior, denied access to
or controlover knowledge derived from our experience.
Knowledge, authority, and power rest with surveillance capital,
for which we are merely “human natural resources.”
The commodificationof behavior under the conditionsof
Surveillance capitalism pivotsustoward a societal future in which
an exclusive division oflearning is protected by secrecy,indecipherability, and expertise.
A	Fight	over	Surveillance	Capitalism
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
ü Let it be an insistence that raw surveillance capitalism is as much a threat to society as
it is to capitalism itself.
ü This is not a technical undertaking, not a program for advanced encryption,improved
data anonymity,or data ownership.
ü Such strategies only acknowledge the inevitability ofcommercial surveillance.
ü Surveillance capitalism dependson the social, and it is only in and through collective
social action that the larger promise of an information capitalism aligned with a
flourishing third modernitycan be reclaimed.
‘If there is to be a fight, let it be a fight over capitalism.
The Advances of Surveillance Capitalism
Economic	Imperative
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Extraction
Imperative
Prediction
Imperative
l The first wave of prediction productsenabled targeted online
advertising. These productsdepended upon surplus derived at scale
from the internet.
l I have summarized the competitive forcesthat drive the need for
surplus at scale as the “extraction imperative.”
l The next threshold was definedby the quality of prediction products.
l In the race for higher degrees of certainty, it became clear that the
best predictionswould have to approximate observation.
l The prediction imperative is the expression ofthese competitive forces.
what forms of surplus enable the fabrication of predictionproducts that
most reliably foretell the future?
Prediction	Imperative
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Economiesof
Scale
Economiesof
Scope
Economiesof
Action
• Extension ofExtraction
• Depth
Rendition	:	From	Experience	to	Data	
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
why is our experience rendered as behavioraldata in the first place?
Rendition: the specific operations that target the gap between
experience and data on a mission to transform the one into the other
Rendition describes the concrete operationalpractices through which
dispossession is accomplished, as human experienceis claimed as raw material
for datafication and all that follows, from manufacturing to sales.
Big	Data	and	Big	Profits
<Source:https://www.livemint.com/Technology/Bnj3jc8hTDgONgBtTsENvN/The-movement-to-make-your-data-earn-money.html>
§It is the data—which we give away for
free—that is the coreof the vast profits
of the world’smost valuable companies.
- Facebook, pays only 1% ofits value to
its workers(programmers), because the
rest of its work it getsfree from us
- Walmart pays 40% of its value in wages.
§Afewvisionaries have been trying to
introduce a radical new concept.
—“Data as Labor(DaL)”— that will make
for a far more economically fair society
in the digital age.
Data	as	Labor
<Source:http://radicalmarkets.com>
ü Imagine a world in which your personal data, currently
hooveredup by tech companiesand repurposed for their
profit, were honoredas your dignified work and compensated
as such.
ü Data as Labor(DaL) : Because data suppliers are not properly
rewarded for their digital contributions,they lack the
incentive or freedomto contributethe high-quality data that
would most empower technologyor develop their personal
capacities to maximize their earnings and contributions to the
digital economy.
Economies	of	Action	
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
“The new power is action.”
The prediction imperative phase represents the completion of the newmeans of
behavior modification, a decisive and necessary evolution
of the surveillance capitalist “means ofproduction”
toward a more complex,iterative, and muscular operational system.
Under surveillance capitalism the objectives and operations of
automated behavioral modification are designed and controlled
by companies to meet their own revenueand growth objectives.
Three	Key	Approaches	to	Economies	of	Action	
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Tuning Herding Conditioning
Nudge
any aspect of
a choice architecture
that alters people’sbehavior
in a predictable way
Orchestration of
the human situation
foreclosingaction alternatives
and thus movingbehavioralong
a path of heightenedprobability
Reinforcement
“Behaviormodification” or
“behavioral engineering,”
in whichbehavioris continuously
shaped to amplify some actions
at the expense of others
Behavioral	Economics	for	Surveillance	Capitalism
Extrinsic Motivation Intrinsic Motivation
《ChoiceArchitect》based on ‘LibertarianPaternalism’
Libertarianpaternalismis the idea that
it is both possible and legitimate for private and public institutions to affect behavior
while also respecting freedom ofchoice, as well as the implementation of that idea.
<Source:https://en.wikipedia.org/wiki/Libertarian_paternalism>
Behavioral	Modification
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Behavioral modification relies upon a variety of machine processes, techniques, and tactics
(tuning, herding,conditioning) to shape individual, group, and population behavior
in ways that continuouslyimprove their approximation to guaranteed outcomes.
Surveillance capitalists’ interests have shifted
from using automated machine processes to know about your behavior
to using machine processes to shape yourbehavior according to their interests.
This decade-and-a-half trajectory has taken us
from automating information flows about youto automating you.
Instrumentarianismas	a	New	Species	of	Power
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
What is
Instrumentarianism?
The instrumentation and instrumentalization of behavior for the
purposes of modification, prediction,monetization, and control
ü Totalitarianism was apolitical projectthat converged with economics to overwhelm society.
ü Instrumentarianism is amarket project that convergeswith the digital to achieve its own
unique brand ofsocial domination.
ü Thanks to Big Other’s capabilities, instrumentarian power aims for a conditionof certainty
without terror in the form of“guaranteed outcomes.”
*Big Other:It is thesensate, computational,connectedpuppetthatrenders,monitors,
computes, and modifies human behavior.
Two	Species	of	Power	:	Totalitarianism	vs.	Instrumentarianism
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
A	Market	Project	of	Total	Certainty
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
ü Totalitarianism was atransformation of the state into a project oftotal possession.
ü Instrumentarianism and Big Other signal the transformation ofthe market into a project
of total certainty, an undertaking that isunimaginable outside the digital milieu, but
also unimaginable outside the logic of accumulation that is surveillance capitalism.
ü This new power is the spawn of an unprecedentedconvergence:the surveillance and
actuation capabilities of Big Other in combination with the discovery and monetization
of behavioral surplus.
ü we can imagine economicprinciples that instrumentalize and controlhuman experience
to systematically and predictably shape behavior toward others’ profitable ends.
First, machinesare not individuals, andwe should be more like machines.
Crisis of Self-Sovereignty
What	is	Self-Sovereignty?
<Source:https://en.wikipedia.org/wiki/Sovereignty>
Sovereigntyis the full right and power of a governingbody over itself,
without any interference fromoutside sources or bodies.
sovereignty is a substantive term designating supreme authority over some polity.
ü Self(orindividual)-Sovereigntyis the concept of propertyin one's own person,
expressed as the natural right of aperson to have bodily integrity and
be the exclusive controller ofone's own bodyand life.
ü Self-Sovereigntyis a central idea in several political philosophies that emphasize
individualism, such as liberalism and anarchism.
What	is	Self-Determination?
<Source:https://en.wikipedia.org/wiki/Self-determination>
ü The right of a people to self-determination is a cardinal principle in modern
international law.
ü It states that people, based on respect for the principle of equal rights and fair equality
of opportunity,have the right to freely choose their sovereignty and international
political status with no interference.
ü By extension, the term self-determination has come to mean the freechoice of one's
own acts without external compulsion.
The	End	of	Self-Determination
surveillance capitalists declare their right to modify others’behavior
for profit according to methodsthat bypass human awareness,
individual decision rights, and the entire complex of self-regulatory processes
(autonomy and self-determination).
§Human consciousness itself is a threat to surveillance revenues,as awareness endangers
the larger project ofbehavior modification.
§Philosophers recognize“self-regulation,” “self-determination,” and “autonomy” as
“freedom of will.”
§The competitive necessity of economiesof action means that surveillance capitalists
must use all means available to supplant autonomousaction with heteronomousaction.
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
Solutions to the Problem of Self-Sovereignty
The	Right	to	Sanctuary	
§ A sanctuary is a sacred place. By extension the term has come to be used forany place
of safety. This secondary use can be categorizedinto human sanctuary, a safe place for
humans, such as a political sanctuary.
§ The sanctuary privilege has stood as an antidote to power since the beginning of the
human story.There was an exit fromtotalizing power, and that exit was the entrance to
a sanctuary in the formof a city, a community,or a temple.
<Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
ü Big Other outruns society and law in a self-authorizeddestruction of the right to
sanctuary as it overwhelms considerations of justice with its tactical mastery of shock.
ü “No exit” is the necessary conditionfor Big Other to flourish.
-That is the tides ofbehavioralsurplus and their transformation into revenue,
the certainty that willmeet everymarket player withguaranteed outcomes,
the actuation and modificationthat quietlydrains the willto will.
Obfuscation	:	as	a	Strategy	for	Privacy	Protection
Obfuscation is
the deliberateaddition of ambiguous,confusing, or misleadinginformation
to interfere with surveillanceand data collection.
<Source:Finn Brunton, Helen Nissenbaum, <Obfuscation:AUser'sGuideforPrivacy andProtest> TheMITPress,2015>
Operation
Vula
Uploads
to leak sites
TrackMeNot
Chaf
Identical
confederates
and objects
False
tells
Excessive
documentation
Group
identity
Shuffling
SIM cards
Tor
relays
Babble
tapes
CacheCloak
Privacy	Itself	is	a	Solution	to	Societal	Challenges
<Source:Finn Brunton, Helen Nissenbaum, <Obfuscation:AUser'sGuideforPrivacy andProtest> TheMITPress,2015>
Privacy does not mean stopping the flow of data;
It meanschannelingit wisely andjustly
to serve societal ends andvalues and the individualswho are its subjects,
particularlythe vulnerable andthe disadvantaged.
Privacy	Technologies	for	our	Struggle	for	Self-Sorvereignty
Decentralized
Identifier
Zero Knowledge
Proof
MimbleWimble
Secure
MPC
Self-Sovereigntyis a Guide to Privacy
…
It’s time for “Privacy Revolution” with the Blockchain Technology!
“What is at stake here is the human expectation of sovereignty
over one’s own life and authorship of one’s own experience.”
- Shoshana Zuboff,<TheAge of SurveillanceCapitalism>

Más contenido relacionado

La actualidad más candente

Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data LiteracyDATAVERSITY
 
data science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecturedata science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecturechris wiggins
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best PracticesDATAVERSITY
 
Approaching Data Quality
Approaching Data QualityApproaching Data Quality
Approaching Data QualityDATAVERSITY
 
Introduction to Digital Activism
Introduction to Digital ActivismIntroduction to Digital Activism
Introduction to Digital ActivismMer Joyce
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAnsgar Koene
 
Key Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance ProgramKey Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance ProgramDATAVERSITY
 
Data Virtualization: An Introduction
Data Virtualization: An IntroductionData Virtualization: An Introduction
Data Virtualization: An IntroductionDenodo
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 
Actor Network Theory and UX
Actor Network Theory and UXActor Network Theory and UX
Actor Network Theory and UXangelbrown
 
Exploring the Boundaries of Artificial Intelligence (or "Modern AI")
Exploring the Boundaries of Artificial Intelligence (or "Modern AI")Exploring the Boundaries of Artificial Intelligence (or "Modern AI")
Exploring the Boundaries of Artificial Intelligence (or "Modern AI")James Hendler
 
Data Governance
Data GovernanceData Governance
Data GovernanceBoris Otto
 
Latour actor network theory
Latour   actor network theoryLatour   actor network theory
Latour actor network theoryNehali Jain
 
Data Architecture, Solution Architecture, Platform Architecture — What’s the ...
Data Architecture, Solution Architecture, Platform Architecture — What’s the ...Data Architecture, Solution Architecture, Platform Architecture — What’s the ...
Data Architecture, Solution Architecture, Platform Architecture — What’s the ...DATAVERSITY
 
Data Governance Initiative
Data Governance InitiativeData Governance Initiative
Data Governance InitiativeDataWorks Summit
 
Importance of Big data for your Business
Importance of Big data for your BusinessImportance of Big data for your Business
Importance of Big data for your Businessazuyo.com
 
Business Drivers Behind Data Governance
Business Drivers Behind Data GovernanceBusiness Drivers Behind Data Governance
Business Drivers Behind Data GovernancePrecisely
 
Data as a Profit Driver – Emerging Techniques to Monetize Data as a Strategic...
Data as a Profit Driver – Emerging Techniques to Monetize Data as a Strategic...Data as a Profit Driver – Emerging Techniques to Monetize Data as a Strategic...
Data as a Profit Driver – Emerging Techniques to Monetize Data as a Strategic...DATAVERSITY
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneTim Rich
 

La actualidad más candente (20)

Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
 
data science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecturedata science @NYT ; inaugural Data Science Initiative Lecture
data science @NYT ; inaugural Data Science Initiative Lecture
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Approaching Data Quality
Approaching Data QualityApproaching Data Quality
Approaching Data Quality
 
Introduction to Digital Activism
Introduction to Digital ActivismIntroduction to Digital Activism
Introduction to Digital Activism
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Key Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance ProgramKey Elements of a Successful Data Governance Program
Key Elements of a Successful Data Governance Program
 
Data Virtualization: An Introduction
Data Virtualization: An IntroductionData Virtualization: An Introduction
Data Virtualization: An Introduction
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 
Actor Network Theory and UX
Actor Network Theory and UXActor Network Theory and UX
Actor Network Theory and UX
 
Exploring the Boundaries of Artificial Intelligence (or "Modern AI")
Exploring the Boundaries of Artificial Intelligence (or "Modern AI")Exploring the Boundaries of Artificial Intelligence (or "Modern AI")
Exploring the Boundaries of Artificial Intelligence (or "Modern AI")
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Latour actor network theory
Latour   actor network theoryLatour   actor network theory
Latour actor network theory
 
Data Architecture, Solution Architecture, Platform Architecture — What’s the ...
Data Architecture, Solution Architecture, Platform Architecture — What’s the ...Data Architecture, Solution Architecture, Platform Architecture — What’s the ...
Data Architecture, Solution Architecture, Platform Architecture — What’s the ...
 
Data Governance Initiative
Data Governance InitiativeData Governance Initiative
Data Governance Initiative
 
Importance of Big data for your Business
Importance of Big data for your BusinessImportance of Big data for your Business
Importance of Big data for your Business
 
Business Drivers Behind Data Governance
Business Drivers Behind Data GovernanceBusiness Drivers Behind Data Governance
Business Drivers Behind Data Governance
 
Data as a Profit Driver – Emerging Techniques to Monetize Data as a Strategic...
Data as a Profit Driver – Emerging Techniques to Monetize Data as a Strategic...Data as a Profit Driver – Emerging Techniques to Monetize Data as a Strategic...
Data as a Profit Driver – Emerging Techniques to Monetize Data as a Strategic...
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs One
 
Data ethics
Data ethicsData ethics
Data ethics
 

Similar a The Crisis of Self Sovereignty in The Age of Surveillance Capitalism

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
Big Data And Information Privacy
Big Data And Information PrivacyBig Data And Information Privacy
Big Data And Information PrivacySandra Willey
 
Social Intelligence in the Age of Infobesity - A Verifeed White Paper
Social Intelligence in the Age of Infobesity - A Verifeed White PaperSocial Intelligence in the Age of Infobesity - A Verifeed White Paper
Social Intelligence in the Age of Infobesity - A Verifeed White PaperMelinda Wittstock
 
Privacy Under Attack Analysis
Privacy Under Attack AnalysisPrivacy Under Attack Analysis
Privacy Under Attack AnalysisKate Subramanian
 
Data Mining In Homeland Security
Data Mining In Homeland SecurityData Mining In Homeland Security
Data Mining In Homeland SecurityNicole Wells
 
How Data Breaches Affect Privacy And Security
How Data Breaches Affect Privacy And SecurityHow Data Breaches Affect Privacy And Security
How Data Breaches Affect Privacy And SecurityErin Adams
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Robert Stribley
 
South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018 James Quinlan
 
Big data and digital transformation
Big data and digital transformationBig data and digital transformation
Big data and digital transformationMatteo Cristofaro
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their dataGiuliadeNicolellis
 
2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...
2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...
2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...지훈 서
 
Cognitivo PoV - Market power in the data-driven economy
Cognitivo PoV - Market power in the data-driven economyCognitivo PoV - Market power in the data-driven economy
Cognitivo PoV - Market power in the data-driven economyAlan Hsiao
 
Defending Privacy Of Personal Information Essay
Defending Privacy Of Personal Information EssayDefending Privacy Of Personal Information Essay
Defending Privacy Of Personal Information EssaySusan Myers
 
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos  FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionAnonos  FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionTed Myerson
 
Security And Control Of Privacy
Security And Control Of PrivacySecurity And Control Of Privacy
Security And Control Of PrivacySasha Jones
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 

Similar a The Crisis of Self Sovereignty in The Age of Surveillance Capitalism (20)

Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
Big Data And Information Privacy
Big Data And Information PrivacyBig Data And Information Privacy
Big Data And Information Privacy
 
Social Intelligence in the Age of Infobesity - A Verifeed White Paper
Social Intelligence in the Age of Infobesity - A Verifeed White PaperSocial Intelligence in the Age of Infobesity - A Verifeed White Paper
Social Intelligence in the Age of Infobesity - A Verifeed White Paper
 
Privacy Under Attack Analysis
Privacy Under Attack AnalysisPrivacy Under Attack Analysis
Privacy Under Attack Analysis
 
Writing Sample
Writing SampleWriting Sample
Writing Sample
 
Data Mining In Homeland Security
Data Mining In Homeland SecurityData Mining In Homeland Security
Data Mining In Homeland Security
 
How Data Breaches Affect Privacy And Security
How Data Breaches Affect Privacy And SecurityHow Data Breaches Affect Privacy And Security
How Data Breaches Affect Privacy And Security
 
Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21Designing for Privacy NY Studio—10/04/21
Designing for Privacy NY Studio—10/04/21
 
Social Technology Quarterly 08
Social Technology Quarterly 08Social Technology Quarterly 08
Social Technology Quarterly 08
 
South By South Best 2018
South By South Best 2018 South By South Best 2018
South By South Best 2018
 
Big data and digital transformation
Big data and digital transformationBig data and digital transformation
Big data and digital transformation
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their data
 
2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...
2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...
2016.07.28 제65회 sw공학 technical_세미나(7월28일)_발표자료1(소셜컴퓨ᄐ...
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
 
Cognitivo PoV - Market power in the data-driven economy
Cognitivo PoV - Market power in the data-driven economyCognitivo PoV - Market power in the data-driven economy
Cognitivo PoV - Market power in the data-driven economy
 
Defending Privacy Of Personal Information Essay
Defending Privacy Of Personal Information EssayDefending Privacy Of Personal Information Essay
Defending Privacy Of Personal Information Essay
 
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos  FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionAnonos  FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
 
Security And Control Of Privacy
Security And Control Of PrivacySecurity And Control Of Privacy
Security And Control Of Privacy
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 

Más de Jongseung Kim

NFTs and DAO in the Digital Economy
NFTs and DAO in the Digital EconomyNFTs and DAO in the Digital Economy
NFTs and DAO in the Digital EconomyJongseung Kim
 
NFT and Digital Economic System
NFT and Digital Economic SystemNFT and Digital Economic System
NFT and Digital Economic SystemJongseung Kim
 
Blockchain DID Project
Blockchain DID ProjectBlockchain DID Project
Blockchain DID ProjectJongseung Kim
 
Crypto Constitutionalism
Crypto ConstitutionalismCrypto Constitutionalism
Crypto ConstitutionalismJongseung Kim
 
A Brief Overview of 'Radical Markets'
A Brief Overview of 'Radical Markets'A Brief Overview of 'Radical Markets'
A Brief Overview of 'Radical Markets'Jongseung Kim
 
Asset tokenization Real Estate Reinvented
Asset tokenization Real Estate ReinventedAsset tokenization Real Estate Reinvented
Asset tokenization Real Estate ReinventedJongseung Kim
 
Economic Thoughts Overview in Radical Markets
Economic Thoughts Overview in Radical MarketsEconomic Thoughts Overview in Radical Markets
Economic Thoughts Overview in Radical MarketsJongseung Kim
 
Game Theory in Cryptoeconomics
Game Theory in CryptoeconomicsGame Theory in Cryptoeconomics
Game Theory in CryptoeconomicsJongseung Kim
 
Asset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game ChangerAsset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game ChangerJongseung Kim
 
Economic design in cryptoeconomics_game theory_mechanism design_market design...
Economic design in cryptoeconomics_game theory_mechanism design_market design...Economic design in cryptoeconomics_game theory_mechanism design_market design...
Economic design in cryptoeconomics_game theory_mechanism design_market design...Jongseung Kim
 
Economic Design in Cryptoeconomics_Overview
Economic Design in Cryptoeconomics_Overview Economic Design in Cryptoeconomics_Overview
Economic Design in Cryptoeconomics_Overview Jongseung Kim
 
Crypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMCrypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMJongseung Kim
 
Initial Commons Offering for Integral Blockchain
Initial Commons Offering for Integral BlockchainInitial Commons Offering for Integral Blockchain
Initial Commons Offering for Integral BlockchainJongseung Kim
 

Más de Jongseung Kim (13)

NFTs and DAO in the Digital Economy
NFTs and DAO in the Digital EconomyNFTs and DAO in the Digital Economy
NFTs and DAO in the Digital Economy
 
NFT and Digital Economic System
NFT and Digital Economic SystemNFT and Digital Economic System
NFT and Digital Economic System
 
Blockchain DID Project
Blockchain DID ProjectBlockchain DID Project
Blockchain DID Project
 
Crypto Constitutionalism
Crypto ConstitutionalismCrypto Constitutionalism
Crypto Constitutionalism
 
A Brief Overview of 'Radical Markets'
A Brief Overview of 'Radical Markets'A Brief Overview of 'Radical Markets'
A Brief Overview of 'Radical Markets'
 
Asset tokenization Real Estate Reinvented
Asset tokenization Real Estate ReinventedAsset tokenization Real Estate Reinvented
Asset tokenization Real Estate Reinvented
 
Economic Thoughts Overview in Radical Markets
Economic Thoughts Overview in Radical MarketsEconomic Thoughts Overview in Radical Markets
Economic Thoughts Overview in Radical Markets
 
Game Theory in Cryptoeconomics
Game Theory in CryptoeconomicsGame Theory in Cryptoeconomics
Game Theory in Cryptoeconomics
 
Asset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game ChangerAsset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game Changer
 
Economic design in cryptoeconomics_game theory_mechanism design_market design...
Economic design in cryptoeconomics_game theory_mechanism design_market design...Economic design in cryptoeconomics_game theory_mechanism design_market design...
Economic design in cryptoeconomics_game theory_mechanism design_market design...
 
Economic Design in Cryptoeconomics_Overview
Economic Design in Cryptoeconomics_Overview Economic Design in Cryptoeconomics_Overview
Economic Design in Cryptoeconomics_Overview
 
Crypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BMCrypto Token Economy Design for Disruptive BM
Crypto Token Economy Design for Disruptive BM
 
Initial Commons Offering for Integral Blockchain
Initial Commons Offering for Integral BlockchainInitial Commons Offering for Integral Blockchain
Initial Commons Offering for Integral Blockchain
 

Último

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 

Último (20)

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 

The Crisis of Self Sovereignty in The Age of Surveillance Capitalism

  • 2. It’s Time to Panic about Privacy
  • 3. What is Privacy? Privacy is a fundamental right, essential to autonomy and the protection of human dignity, serving as the foundation upon which many other human rights are built. <Source:https://privacyinternational.org/explainer/56/what-privacy>
  • 4. Debates on Privacy ü Companies and governments are gaining newpowers to followpeople across the internet and around the world, and even to peer into their genomes. ü The benefitsofsuch advances have been apparent for years; the costs are nowbecoming clearer. ü The boundariesof privacy are in dispute, and its future isin doubt. Citizens, politicians and business leaders are asking if societies are making the wisest tradeoffs. <Source:https://www.nytimes.com/interactive/2019/opinion/internet-privacy-project.html>
  • 5. Privacy is Too Big to Understand <Source:https://www.nytimes.com/2019/04/16/opinion/privacy-technology.html> §“Privacy” is an impoverished word — far too small a word to describe what we talk about when we talk about the mining, transmission, storing, buying,selling, use and misuse ofour personal information. §You are losing controlover your life.When technologygovernsso many aspects of our lives — and when that technologyis powered by the exploitation of ourdata — privacy isn’t just about knowing your secrets, it’s about autonomy. §Privacy is really about being able to define for ourselveswho we are forthe world and on our own terms. §“Maintaining privacy will be integral to the internet’sfuture, if only because consumers need to feelsafe enoughto participate.”
  • 6. How Capitalism Betrayed Privacy <Source:https://www.nytimes.com/2019/04/10/opinion/sunday/privacy-capitalism.html> §The forcesof wealth creation no longer favor the expansion of privacy but work to undermine it. - Therise of “attention merchants” and “surveillancecapitalism”; thecommodificationofourpersonal data by techgiants likeFacebook,Googleand theirimitators. §We face a future in which active surveillance is such a routine part of business that for most people it is nearly inescapable. We are on the road back to serfdom. §Many employers also nowconstantly watch their employees. There is good reason to believe that, if nothing is done,gratuitous surveillance will be built into nearly every business and business model. §Those who want privacy should support and reward the companies who respect it. The economicsof privacy would change if enough consumers bought fromcompanies that don’t spy on us and whose products actually help people avoid an unwanted gaze.
  • 7. Facebook Under Fire <Source:https://variety.com/2018/digital/features/facebook-privacy-crisis-big-data-mark-zuckerberg-1202741394> §Cambridge Analytica illicitly procured the data of50 million Facebook users — without their knowledge or consent — and then enlisted that to informvoter- targeting strategies forDonald Trump’s presidential campaign. §Both Facebook and CAclaim they were duped by the researcher who originally harvested the data, who used an innocuous-seemingpersonality quiz in 2013 to access infoon friends of people who used the app. à Facebook is expecting to pay as much as $5bn to the US Federal Trade Commission.(2019.4.25)
  • 8. Facebook is "Surveillance Machine" <Source:https://www.lrb.co.uk/v39/n16/john-lanchester/you-are-the-product> You don't use Facebook. Facebook uses you. “Facebook is in the surveillance business. Facebook, in fact, is the biggest surveillance-based enterprise in the history of mankind. It knows far, far more about youthan the most intrusive government has ever known about its citizens.” “Note that the company’s knowledge about its users isn’t used merely to target ads but to shape the flowof news to them.” When the service is free, you're not the customer.You're the product.
  • 9. The ‘Data Labor Union’ <Source:https://thedataunion.eu> Facebook usersunite! 'Data Labour Union'launches in Netherlands §The Data Union is going to demand the transparency and readability of algorithms used corporationsand governments. §The Data Union is going to help members demand their data rights from corporations and governments. §The Data Union will focus attention on the need for the Data Union. §The Data Union will inform its members about the newest tools to protect your data and develop these ourselves,to end our dependency.
  • 10. Facebook’s Privacy Policies <Source:https://web.facebook.com/notes/mark-zuckerberg/a-privacy-focused-vision-for-social-networking/10156700570096634/?_rdc=1&_rdr> ü Facebook founderMark Zuckerberg told that if he were to create Facebook again today, user information would by default be public, not private as it was for years until the company changed dramatically in December. (2010. 1. 9) ü Facebook’s mission is to make the world more open and connected. ü The main way we do this is by giving people the tools to map out their relationships with the people and things they care about. We call this map the graph. (2013. 1. 15) The digital equivalent of a town square à The digital equivalent of the living room - Private interactions - Encryption - ReducingPermanence - Safety - Interoperability - Securedata storage (2019. 3.7) “The Age of Privacyis Over” “GraphAPI/Graph Search” “A Privacy-FocusedVision”
  • 11. Four Essential Privacy Principles(by Tim Cook) Ø Companies should challenge themselves to de-identify customer data or not collect that data in the first place. Ø Users should always knowwhat data is being collected from them and what it’s being collected for.This is the only way to empower users to decide what collection is legitimate and what isn’t. Ø Companies should recognizethat data belongs to users and we should make it easy for people to get acopy of their personal data, as well as correct and delete it. Ø Everyonehas a right to the security of their data. Security is at the heart ofall data privacy and privacy rights. <Source:https://twitter.com/tim_cook>
  • 12. “The Age of Surveillance Capitalism”
  • 14. The Foundations of Surveillance Capitalism
  • 15. Sur-veil-lance Cap-i-tal-ism, n. 1. Anew economicorder that claims human experienceas free raw material for hidden commercial practices ofextraction, prediction, and sales; 2. Aparasitic economiclogic in which the productionof goods and services is subordinated to a newglobal architecture ofbehavioral modification; 3. Arogue mutation of capitalism marked by concentrations of wealth, knowledge, and power unprecedented in human history; 4. The foundationalframework ofa surveillance economy; 5. The origin ofa new instrumentarian power that asserts dominance over society and presents startling challenges to market democracy; 6. Amovement that aims to impose a new collective order based on total certainty; 7. An expropriation of critical human rights that is best understoodas a coup from above: an overthrowofthe people’s sovereignty. <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
  • 16. Behavioral Surplus <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> Behavioral Data Human Experience appliedto product or service improvement a proprietary behavioralsurplus Although some ofbehavioral data are applied to product or service improvement, the rest are fed into advanced manufacturing processes known as“machine intelligence,” and fabricated into prediction products that anticipate what you will do.
  • 17. Data Extraction and Analysis <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> Data The raw material necessary for surveillance capitalism’s novel manufacturing processes Extraction The social relations and material infrastructure with which the firm asserts authority over those raw materials to achieve economiesof scale in its raw-material supply operations Analysis The complex ofhighly specialized computational systems that is generally referred to as “machine intelligence”
  • 18. Behavioral Value Reinvestment Cycle <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> ü Users provides the raw material in the form ofbehavioral data, and those data are harvested to improve speed, accuracy, and relevance and to help build ancillary productssuch as translation. ü In the Behavioral Value Reinvestment Cycle, all the behavioral data are reinvested in the improvement ofthe product or service.
  • 19. Discovery of Behavior Surplus <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> ü Surveillance Capitalism begins with the discovery of behavioral surplus. More behavioral data are rendered than required for service improvement. ü This surplus feeds machine intelligence that fabricates predictions ofuser behavior.These Productsare sold to business customersin newbehavioral futures markets. ü The Behavioral Value Reinvestment Cycle is subordinated to this new logic.
  • 20. The Logic and Operation of Surveillance Capitalism <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> Logic The Means of Production The Products The Marketplace The translation of behavioral surplus from outside to inside the market finally enabled Google to convert investment into revenue. Google’s machine intelligence capabilities feed on behavioral surplus, and the more surplus they consume, the more accurate the prediction products that result. Machine intelligence processesbehavioral surplus into prediction products designed to forecast what we will feel, think, and do. Prediction products are sold into a new kind ofmarket that trades exclusively in future behavior. Surveillance capitalism’s profits derive from behavioral futuresmarkets.
  • 21. The Dynamic of Behavioral Surplus Accumulation <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> ü Surveillance Capitalism master motionis the accumulation of newsources of behavioral surplus with more predictive power. ü The goalis predictionscomparable to guaranteed outcomes in real-life behavior. ü Extraction begins online,but the prediction imperative increases the momentum,driving extraction toward new sourcesin the real world.
  • 22. Accumulation by Dispossession <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> Accumulationby dispossession is a conceptpresented by the Marxist geographer David Harvey, which defines the neoliberal capitalist policies in many western nations as resulting in a centralization ofwealth and power in the hands of a fewby dispossessing the public and private entitiesof their wealth or land. Human experience could be extracted at no extra cost online and at very low cost out in the real world. Once extracted, it is rendered as behavioral data, producing a surplus that forms the basis ofa wholly newclass ofmarket exchange. Surveillance capitalism originatesin this act of digital dispossession, brought to life by the impatience of over-accumulated investment.This isthe lever that moved Google’s world and shifted it toward profit.
  • 23. The Dispossession Cycle <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> Incursion Habituation Adaptation Redirection The incursion is when dispossession operations rely ontheir virtual capabilities to kidnap behavioral surplus from the nonmarket spaces of everyday life where it lives. The incursion itself, once unthinkable, slowly worms its way into the ordinary. Worse still, it gradually comes to seem inevitable. New dependencies develop. when Google is forced to alter its practices, its engineers produce superficial but tactically effective adaptations that satisfy the immediate demands of government authorities and public opinion. In afinal stage the corporation regroups to cultivate new rhetoric, methods, and design elements that redirect contested supply operations just enough so that they appear to be compliant with social/legal demands.
  • 25. Who Knows? Who Decides? Who Decides Who Decides? <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> Who Knows? Who Decides? Who Decides Who Decides? • ‘This is aquestion about the distribution of knowledge and whether one is included or excluded from the opportunityto learn. • This is a question about power. What is the sourceof power that undergirds the authority to share or withhold knowledge? • This is a question about authority : which people, institutions, or processesdetermine who is included in learning, what they are able to learn, and how they are able to act ontheir knowledge.
  • 26. Merely Human Natural Resources <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> In this future we are exiles from ourown behavior, denied access to or controlover knowledge derived from our experience. Knowledge, authority, and power rest with surveillance capital, for which we are merely “human natural resources.” The commodificationof behavior under the conditionsof Surveillance capitalism pivotsustoward a societal future in which an exclusive division oflearning is protected by secrecy,indecipherability, and expertise.
  • 27. A Fight over Surveillance Capitalism <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> ü Let it be an insistence that raw surveillance capitalism is as much a threat to society as it is to capitalism itself. ü This is not a technical undertaking, not a program for advanced encryption,improved data anonymity,or data ownership. ü Such strategies only acknowledge the inevitability ofcommercial surveillance. ü Surveillance capitalism dependson the social, and it is only in and through collective social action that the larger promise of an information capitalism aligned with a flourishing third modernitycan be reclaimed. ‘If there is to be a fight, let it be a fight over capitalism.
  • 28. The Advances of Surveillance Capitalism
  • 29. Economic Imperative <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> Extraction Imperative Prediction Imperative l The first wave of prediction productsenabled targeted online advertising. These productsdepended upon surplus derived at scale from the internet. l I have summarized the competitive forcesthat drive the need for surplus at scale as the “extraction imperative.” l The next threshold was definedby the quality of prediction products. l In the race for higher degrees of certainty, it became clear that the best predictionswould have to approximate observation. l The prediction imperative is the expression ofthese competitive forces. what forms of surplus enable the fabrication of predictionproducts that most reliably foretell the future?
  • 31. Rendition : From Experience to Data <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> why is our experience rendered as behavioraldata in the first place? Rendition: the specific operations that target the gap between experience and data on a mission to transform the one into the other Rendition describes the concrete operationalpractices through which dispossession is accomplished, as human experienceis claimed as raw material for datafication and all that follows, from manufacturing to sales.
  • 32. Big Data and Big Profits <Source:https://www.livemint.com/Technology/Bnj3jc8hTDgONgBtTsENvN/The-movement-to-make-your-data-earn-money.html> §It is the data—which we give away for free—that is the coreof the vast profits of the world’smost valuable companies. - Facebook, pays only 1% ofits value to its workers(programmers), because the rest of its work it getsfree from us - Walmart pays 40% of its value in wages. §Afewvisionaries have been trying to introduce a radical new concept. —“Data as Labor(DaL)”— that will make for a far more economically fair society in the digital age.
  • 33. Data as Labor <Source:http://radicalmarkets.com> ü Imagine a world in which your personal data, currently hooveredup by tech companiesand repurposed for their profit, were honoredas your dignified work and compensated as such. ü Data as Labor(DaL) : Because data suppliers are not properly rewarded for their digital contributions,they lack the incentive or freedomto contributethe high-quality data that would most empower technologyor develop their personal capacities to maximize their earnings and contributions to the digital economy.
  • 34. Economies of Action <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> “The new power is action.” The prediction imperative phase represents the completion of the newmeans of behavior modification, a decisive and necessary evolution of the surveillance capitalist “means ofproduction” toward a more complex,iterative, and muscular operational system. Under surveillance capitalism the objectives and operations of automated behavioral modification are designed and controlled by companies to meet their own revenueand growth objectives.
  • 35. Three Key Approaches to Economies of Action <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> Tuning Herding Conditioning Nudge any aspect of a choice architecture that alters people’sbehavior in a predictable way Orchestration of the human situation foreclosingaction alternatives and thus movingbehavioralong a path of heightenedprobability Reinforcement “Behaviormodification” or “behavioral engineering,” in whichbehavioris continuously shaped to amplify some actions at the expense of others
  • 36. Behavioral Economics for Surveillance Capitalism Extrinsic Motivation Intrinsic Motivation 《ChoiceArchitect》based on ‘LibertarianPaternalism’ Libertarianpaternalismis the idea that it is both possible and legitimate for private and public institutions to affect behavior while also respecting freedom ofchoice, as well as the implementation of that idea. <Source:https://en.wikipedia.org/wiki/Libertarian_paternalism>
  • 37. Behavioral Modification <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> Behavioral modification relies upon a variety of machine processes, techniques, and tactics (tuning, herding,conditioning) to shape individual, group, and population behavior in ways that continuouslyimprove their approximation to guaranteed outcomes. Surveillance capitalists’ interests have shifted from using automated machine processes to know about your behavior to using machine processes to shape yourbehavior according to their interests. This decade-and-a-half trajectory has taken us from automating information flows about youto automating you.
  • 38. Instrumentarianismas a New Species of Power <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> What is Instrumentarianism? The instrumentation and instrumentalization of behavior for the purposes of modification, prediction,monetization, and control ü Totalitarianism was apolitical projectthat converged with economics to overwhelm society. ü Instrumentarianism is amarket project that convergeswith the digital to achieve its own unique brand ofsocial domination. ü Thanks to Big Other’s capabilities, instrumentarian power aims for a conditionof certainty without terror in the form of“guaranteed outcomes.” *Big Other:It is thesensate, computational,connectedpuppetthatrenders,monitors, computes, and modifies human behavior.
  • 40. A Market Project of Total Certainty <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> ü Totalitarianism was atransformation of the state into a project oftotal possession. ü Instrumentarianism and Big Other signal the transformation ofthe market into a project of total certainty, an undertaking that isunimaginable outside the digital milieu, but also unimaginable outside the logic of accumulation that is surveillance capitalism. ü This new power is the spawn of an unprecedentedconvergence:the surveillance and actuation capabilities of Big Other in combination with the discovery and monetization of behavioral surplus. ü we can imagine economicprinciples that instrumentalize and controlhuman experience to systematically and predictably shape behavior toward others’ profitable ends. First, machinesare not individuals, andwe should be more like machines.
  • 42. What is Self-Sovereignty? <Source:https://en.wikipedia.org/wiki/Sovereignty> Sovereigntyis the full right and power of a governingbody over itself, without any interference fromoutside sources or bodies. sovereignty is a substantive term designating supreme authority over some polity. ü Self(orindividual)-Sovereigntyis the concept of propertyin one's own person, expressed as the natural right of aperson to have bodily integrity and be the exclusive controller ofone's own bodyand life. ü Self-Sovereigntyis a central idea in several political philosophies that emphasize individualism, such as liberalism and anarchism.
  • 43. What is Self-Determination? <Source:https://en.wikipedia.org/wiki/Self-determination> ü The right of a people to self-determination is a cardinal principle in modern international law. ü It states that people, based on respect for the principle of equal rights and fair equality of opportunity,have the right to freely choose their sovereignty and international political status with no interference. ü By extension, the term self-determination has come to mean the freechoice of one's own acts without external compulsion.
  • 44. The End of Self-Determination surveillance capitalists declare their right to modify others’behavior for profit according to methodsthat bypass human awareness, individual decision rights, and the entire complex of self-regulatory processes (autonomy and self-determination). §Human consciousness itself is a threat to surveillance revenues,as awareness endangers the larger project ofbehavior modification. §Philosophers recognize“self-regulation,” “self-determination,” and “autonomy” as “freedom of will.” §The competitive necessity of economiesof action means that surveillance capitalists must use all means available to supplant autonomousaction with heteronomousaction. <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019>
  • 45. Solutions to the Problem of Self-Sovereignty
  • 46. The Right to Sanctuary § A sanctuary is a sacred place. By extension the term has come to be used forany place of safety. This secondary use can be categorizedinto human sanctuary, a safe place for humans, such as a political sanctuary. § The sanctuary privilege has stood as an antidote to power since the beginning of the human story.There was an exit fromtotalizing power, and that exit was the entrance to a sanctuary in the formof a city, a community,or a temple. <Source:ShoshanaSuboff,<TheAgeofSurveillance Capitalism> PublicAffairs,2019> ü Big Other outruns society and law in a self-authorizeddestruction of the right to sanctuary as it overwhelms considerations of justice with its tactical mastery of shock. ü “No exit” is the necessary conditionfor Big Other to flourish. -That is the tides ofbehavioralsurplus and their transformation into revenue, the certainty that willmeet everymarket player withguaranteed outcomes, the actuation and modificationthat quietlydrains the willto will.
  • 47. Obfuscation : as a Strategy for Privacy Protection Obfuscation is the deliberateaddition of ambiguous,confusing, or misleadinginformation to interfere with surveillanceand data collection. <Source:Finn Brunton, Helen Nissenbaum, <Obfuscation:AUser'sGuideforPrivacy andProtest> TheMITPress,2015> Operation Vula Uploads to leak sites TrackMeNot Chaf Identical confederates and objects False tells Excessive documentation Group identity Shuffling SIM cards Tor relays Babble tapes CacheCloak
  • 48. Privacy Itself is a Solution to Societal Challenges <Source:Finn Brunton, Helen Nissenbaum, <Obfuscation:AUser'sGuideforPrivacy andProtest> TheMITPress,2015> Privacy does not mean stopping the flow of data; It meanschannelingit wisely andjustly to serve societal ends andvalues and the individualswho are its subjects, particularlythe vulnerable andthe disadvantaged.
  • 50. “What is at stake here is the human expectation of sovereignty over one’s own life and authorship of one’s own experience.” - Shoshana Zuboff,<TheAge of SurveillanceCapitalism>