请输入您要查询的百科知识:

 

词条 Data shadow
释义

  1. Digital footprint

  2. Dataveillance

  3. Privacy

  4. References

{{orphan|date=November 2017}}Data shadows refer to the information that a person leaves behind unintentionally while taking part in daily activities such as checking their e-mails, scrolling through social media or even by using their debit or credit card.[1][2][3] The generated information has the potential to create a vastly detailed record of an individual's daily trails, which includes the individual's thoughts and interests, whom they communicate with, information about the organizations with which they work or interact with and so forth.[4] This information can be dispersed to a dozen organizations and servers depending on their use.[5] Along with Individuals, the activities of institutions and organizations are also tracked. Data Shadows are closely linked with data footprints, which are defined as the data that has been left behind by the individual themselves through various activities such as online activities, communication information, and transactions.[6]

In a chapter for the book Geography and Technology, researcher Matthew Zook and his co-authors note that data shadows have come as a result of people becoming "digital individuals" and that these shadows are continually evolving and changing.[7] They are used to model and predict political opinions, and make inferences about a person's political values or susceptibility to advertising.[8]

Digital footprint

The data or digital footprints are obtained from monitoring and tracking individuals’ digital activities. Digital footprints provide a drive for companies such as Facebook and Google to invest in obtaining data generated from these footprints, in order to be sold to marketers.[9] As illustrated by Bodle, users are willing to give up their information to companies they trust.[10]

Although collecting individuals’ data raises several ethical concerns, it can be valuable for the healthcare data analytics and new health services.[11] For instance, access to such data can help healthcare services shed light on the causes of disease, the effects or side-effects the treatments might have and can facilitate a tailored analysis according to the individual’s characteristics. [12]

Dataveillance

{{Main|Dataveillance}}

Dataveillance gives rise to data shadows since it allows for the identification, classification and representation of individuals or organizations.[13] Dataveillance is defined as a mode of surveillance which tracks, monitors or regulates an individual using digital activity including their personal details and social media activities.[14] In 2013, Edward Snowden’s revelations on the National Security Agency's PRISM program, that the organization would “receive” emails, video clips, photos, voice and video calls, social networking details, logins and other data held by a range of US internet firms”.[15] It is also revealed that corporate social networks share their information with the intelligence agencies.[16] Platform owners such as Google and Facebook, anchor the trust of their users and reassure them that their information is protected through portrayal of corporate codes of conduct such as “Do no evil” and “Making the world transparent and connected” [17] However, as pointed out by Bodle, platform owners are themselves collecting the user’s information and using it for purposes they deem to be necessary.[18]

Privacy

Europe has brought about a long-awaited revision to their data protection framework called the Data Protection Directive. [19] According to this, European Union countries are forced to remove personal data of individuals upon their request if the information is obsolete or irrelevant.[20] Information privacy is defined as the right that individuals have over the data about themselves when subjected to a third party,[21] and that the data should not be available to any organization or person without their approval.[22] However, this is not the case when data is collected and collated for marketers: online marketers use cookies, spyware, adware and so on to capture rich data about their customers.[23]

State agencies also collect citizen data for security purposes.[24] The aftermath of the 9/11 terrorist attacks has allowed US national security agencies to increase their collation and exchange of information in order to strengthen the United States Intelligence Community (USIC) and to minimize potential threats.[25]

References

1. ^{{cite book |last=Howard |first=Philip N. |date=2005 |title=New Media Campaigns and the Managed Citizen |url=http://www.cambridge.org/us/academic/subjects/politics-international-relations/american-government-politics-and-policy/new-media-campaigns-and-managed-citizen |location=New York, NY |publisher=Cambridge University Press |pages=93, 144 |isbn=9780521612272}}
2. ^{{cite book|last1=Kitchin|first1=Rob|title=The data revolution: big data, open data, data infrastructures & their consequences|date=2014|publisher=Sage Publications Ltd|pages=xvii, 222 pages}}
3. ^{{cite journal|last1=Koops|first1=E.J|date=2011|title=Forgetting footprints, shunning shadows: A critical analysis of the 'right to be forgotten' in big data practice|journal=SCRIPTed|volume=8|issue=3|pages=229–256|ssrn=1986719}}
4. ^{{cite book|last1=Kitchin|first1=Rob|title=The data revolution: big data, open data, data infrastructures & their consequences|date=2014|publisher=Sage Publications Ltd|pages=xvii, 222 pages}}
5. ^{{Cite book|chapter-url=https://books.google.com/books?id=oARaHF4D6h0C|title=Raw Data Is an Oxymoron|last=Raley|first=Rita|date=2013|publisher=MIT Press|isbn=9780262518284|location=|pages=121–146|language=en|chapter=Data and countervailence}}
6. ^{{cite book|last1=Kitchin|first1=Rob|title=The data revolution: big data, open data, data infrastructures & their consequences|date=2014|publisher=Sage Publications Ltd|pages=xvii, 222 pages}}
7. ^{{Cite book|chapter-url=https://books.google.com/books?id=wahcN1wD2DcC&pg=PA169&dq=Data+Shadows&hl=en&sa=X&ved=0ahUKEwj4j4rS6c3XAhWpiFQKHRTYBVgQ6AEIKDAA#v=onepage&q=Data%20Shadows&f=false|title=Geography and Technology|last=Zook|first=Matthew|last2=Dodge|first2=Martin|last3=Aoyama|first3=Yuko|last4=Townsend|first4=Anthony|date=2004-03-31|publisher=Springer Science & Business Media|isbn=9781402018718|location=|pages=169|language=en|chapter=New Digital Geographies: Information, Communication, and Place}}
8. ^{{cite book |last=Howard |first=Philip N. |date=2005 |title=New Media Campaigns and the Managed Citizen |url=http://www.cambridge.org/us/academic/subjects/politics-international-relations/american-government-politics-and-policy/new-media-campaigns-and-managed-citizen |location=New York, NY |publisher=Cambridge University Press |pages=93, 144 |isbn=9780521612272}}
9. ^{{cite journal|last1=Wyner, Gordon|first1=Wyner, Gordon|title=Digital footprints abound|date=2015|volume=27|issue=1|page=16}}
10. ^{{cite book|last1=German|last2=Kathleen|first2=M|last3=Drushel|first3=Bruce|title=The ethics of emerging media: information, social norms, and new media technology|date=2011|publisher=Continuum|pages=279}}
11. ^{{cite journal|last1=Harjumaa|first1=Marja|last2=Saraniemi|first2=Saila|last3=Pekkarinen|first3=Saara|last4=Lappi|first4=Minna|last5=Similä|first5=Heidi|last6=Isomursu|last7=Minna|date=2017-12-05|title=Feasibility of digital footprint data for health analytics and services: an explorative pilot study|url=|journal=BMC Medical Informatics and Decision Making|volume=16|issue=1|pages=139|doi=10.1186/s12911-016-0378-0|pmid=27829413|pmc=5112682|via=}}
12. ^{{Cite journal|last=Kostkova|first=Patty|last2=Brewer|first2=Helen|last3=de Lusignan|first3=Simon|last4=Fottrell|first4=Edward|last5=Goldacre|first5=Ben|last6=Hart|first6=Graham|last7=Koczan|first7=Phil|last8=Knight|first8=Peter|last9=Marsolier|first9=Corinne|date=2016|title=Who Owns the Data? Open Data for Healthcare|journal=Frontiers in Public Health|language=English|volume=4|doi=10.3389/fpubh.2016.00007|pmid=26925395|issn=2296-2565}}
13. ^{{cite journal|last1=Selwyn|first1=Neil|date=2017-12-05|title=Data entry: towards the critical study of digital data and education|url=|journal=Learning, Media and Technology|volume=40|issue=1|pages=64–82|doi=10.1080/17439884.2014.921628|via=}}
14. ^{{Cite book|chapter-url=https://books.google.com/books?id=oARaHF4D6h0C|title=Raw Data Is an Oxymoron|last=Raley|first=Rita|date=2013|publisher=MIT Press|isbn=9780262518284|location=|pages=121–146|language=en|chapter=Data and countervailence}}
15. ^{{Cite news|url=https://www.bbc.com/news/technology-23027764|title=Q&A: Prism internet surveillance|last=Kelion|first=Leo|date=2013-06-25|work=BBC News|access-date=2017-11-25|language=en-GB}}
16. ^{{Cite journal|last=van Dijck|first=José|year=2014|title=Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology|journal=Surveillance & Society|volume=12|issue=2|pages=|issn=1477-7487|via=}}
17. ^{{Cite journal|last=van Dijck|first=José|year=2014|title=Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology|journal=Surveillance & Society|volume=12|issue=2|pages=|issn=1477-7487|via=}}
18. ^{{cite book|last1=German|last2=Kathleen|first2=M|last3=Drushel|first3=Bruce|title=The ethics of emerging media: information, social norms, and new media technology|date=2011|publisher=Continuum|pages=279}}
19. ^{{cite book|last1=Gutwirth|first1=Serge|title=European data protection: coming of age|date=2013|publisher=Springer|pages=437|edition=1. Aufl., 2013, 1|url=https://carletonu.summon.serialssolutions.com/?q=Datafication%2C%20dataism%20and%20dataveillance%3A%20Big%20Data%20between%20scientific%20paradigm%20and%20ideology#!/search?ho=t&l=en&q=European%20data%20protection:%20coming%20of%20age-gutwirth%20serge|accessdate=25 November 2017}}
20. ^{{Cite journal|last=Walker|first=R. K.|date=2012|title=The Right to be Forgotten|url=|journal=Hastings Law Journal|volume=64|pages=257–261|via=}}
21. ^{{cite book|last1=Kitchin|first1=Rob|title=The data revolution: big data, open data, data infrastructures & their consequences|date=2014|publisher=Sage Publications Ltd|pages=xvii, 222 pages}}
22. ^{{cite book|last1=Kitchin|first1=Rob|title=The data revolution: big data, open data, data infrastructures & their consequences|date=2014|publisher=Sage Publications Ltd|pages=xvii, 222 pages}}
23. ^{{Cite journal|last=Ashworth|first=Laurence|last2=Free|first2=Clinton|date=August 26, 2006|title=Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers' Online Privacy Concerns|journal=Journal of Business Ethics|language=en|volume=67|issue=2|pages=107–123|doi=10.1007/s10551-006-9007-7|issn=0167-4544}}
24. ^{{cite book|last1=Kitchin|first1=Rob|title=The data revolution: big data, open data, data infrastructures & their consequences|date=2014|publisher=Sage Publications Ltd|pages=xvii, 222 pages}}
25. ^{{cite book|last1=Mace|first1=Robyn R|title=Intelligence, Dataveillance, and Information Privacy|date=2009|publisher=Springer Berlin Heidelberg}}

2 : Big data|Information privacy

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/27 7:16:04