{"id":141,"date":"2024-08-07T10:14:40","date_gmt":"2024-08-07T07:14:40","guid":{"rendered":"https:\/\/sites.uwasa.fi\/bugged\/?p=141"},"modified":"2024-08-07T10:14:40","modified_gmt":"2024-08-07T07:14:40","slug":"better-the-robot-you-know-negotiating-the-human-aspects-of-privacy-and-technology","status":"publish","type":"post","link":"https:\/\/sites.uwasa.fi\/bugged\/2024\/08\/07\/better-the-robot-you-know-negotiating-the-human-aspects-of-privacy-and-technology\/","title":{"rendered":"Better the robot you know? Negotiating the human aspects of privacy and technology"},"content":{"rendered":"<p>[First published by Vaasa Insider, November 3, 2022 at: https:\/\/www.vaasainsider.fi\/fi\/nakokantoja\/rebekah-rousi-better-the-robot-you-know-negotiating-the-human-aspects-of-privacy-and-technology\/]<\/p>\n<p>There is a lot of talk about privacy these days. One may say that the world has grown larger and become more difficult due to the measures we are taking to protect our data. The drivers of privacy and overall cyber security are fascinating to think about.<\/p>\n<p>Firstly, stories of large-scale personal information leaks are hard to ignore when they are extensively covered in the media.<\/p>\n<p>Secondly, the General Data Protection Regulation (GDPR) has made Internet use and website browsing unpleasant and disgruntling to the \u201dflow-seeker\u201d to say the least.<\/p>\n<p>And then thirdly, who can forget that ugly notice on the right-hand screen of your new laptop stating that your \u201dsecurity software has expired\u201d and that \u201dyou are no longer protected\u201d?<\/p>\n<h2>What are we actually worried about?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-46324\" src=\"https:\/\/www.vaasainsider.fi\/wp-content\/uploads\/2021\/07\/matthew-henry-fpxoowbr6ls-unsplash.jpg\" alt=\"Women looking up at surveillance cameras\" width=\"300\" height=\"268\" \/>Protection money, cryptic privacy statements (or \u201dtrade-your-soul for access to this website and its services\u201d), and phones that listen to you on your lunch breaks don\u2019t really sound like the ingredients for an ideal world. And they are certainly not a good prognosis for a utopian digital future.<\/p>\n<p>But, apart from these obvious turn-offs, what is it that we are really concerned about? And who is it that we are really threatened by?<\/p>\n<p>Despite circulating knowledge about the surveillance economy and how big (and smaller) tech is commercially exploiting our data, and perhaps an even deeper-seated fear that one day \u201dthe robots will take over\u201d, there do not seem to be too many individuals used as the face of privacy concerns.<\/p>\n<p>In fact, online and mass media frequently report on consumer discomfort in corporations and other organisations knowing too much about them. One fairly recent article in\u00a0<a href=\"https:\/\/thefintechtimes.com\/new-report-shows-that-almost-50-consumers-fear-losing-privacy-over-an-increased-digital-footprint\/\">The Fintech Times<\/a>\u00a0reports on how almost half of all consumers fear that their privacy is compromised by their increasingly expanding digital footprint.<\/p>\n<p>Certainly, risk and vulnerability to the theft of assets as well as fraud cause persistent trepidation. And, if you were around during the 1990s for the release of the Sandra Bullock movie The Net, then you might have had second thoughts about engaging in online spaces to begin with.<\/p>\n<h2>Identity before privacy<\/h2>\n<p>The idea of one\u2019s identity being hijacked certainly isn\u2019t a pretty one. In fact, Wired contributor Lawrence I. Lerner warns us to \u201d<a href=\"https:\/\/www.wired.com\/insights\/2013\/07\/stop-worrying-about-privacy-and-start-caring-about-identity\/\">stop worrying about privacy, start worrying about identity<\/a>\u201d.<\/p>\n<p>Interestingly, rather than \u201dfaking it\u201d through the Net with pseudonyms and avatars, Lerner encourages us to:<\/p>\n<ol>\n<li><em>define our values<\/em>\u00a0\u2013 to live and present ourselves through them;<\/li>\n<li><em>be authentic<\/em>\u00a0\u2013 to avoid turning our voices into a marketing construct;<\/li>\n<li><em>practice social listening<\/em>\u00a0\u2013 to be in tune with the data representing us;<\/li>\n<li><em>identify our social network<\/em>\u00a0\u2013 to choose our company well, as it reflects who we are;<\/li>\n<li><em>manage our identity<\/em>\u00a0\u2013 to not be defensive, just be careful to release thoughtful information; and<\/li>\n<li><em>curate our data privacy<\/em>\u00a0\u2013 to establish game rules for how, what and when we disclose particular information.<\/li>\n<\/ol>\n<p>The reason for this is that, even if someone or something is callous enough to hijack your identity for your ruin, through your persistence, genuineness and quantity you may survive with adequate proof and witnesses to testify who you are, and who you are not.<\/p>\n<h2>Previous experience of victimisation matters<\/h2>\n<p>Have you ever been victimised? If not, maybe it is the corporations and robots that might give you the eeries at night. If you have, was it an individual or group? If it was a group you may have several demon-faces in mind. If it was by one, then the demon may be one individual devil.<\/p>\n<p>Studies have shown that\u00a0<a href=\"https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC2747624\/\">females suffer higher rates of victimisation and bullying<\/a>\u00a0\u2013 physical or cyber. Furthermore, victims of stalking and privacy invasion\u00a0<a href=\"https:\/\/psycnet.apa.org\/record\/2020-49982-001\">by partners, friends and acquaintances<\/a>\u00a0are unsurprisingly\u00a0<a href=\"https:\/\/www.researchgate.net\/publication\/346629808_Transformative_or_Not_How_Privacy_Violation_Experiences_Influence_Online_Privacy_Concerns_and_Online_Information_Disclosure\">more worried about privacy matters<\/a>\u00a0than those who have not been.<\/p>\n<p>No doubt, there is a high likelihood that those who have been personally targeted and victimised will personify their predators more than those who have not been.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[First published by Vaasa Insider, November 3, 2022 at: https:\/\/www.vaasainsider.fi\/fi\/nakokantoja\/rebekah-rousi-better-the-robot-you-know-negotiating-the-human-aspects-of-privacy-and-technology\/] There is a lot of talk about privacy these days. One may say that the world has grown larger and become more difficult due to the measures we are taking to protect our data. The drivers of privacy and overall cyber security are fascinating to [&hellip;]<\/p>\n","protected":false},"author":388,"featured_media":142,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-yleinen"],"acf":[],"post_meta":"<span class=\"author\"> <span class=\"vcard\"><a class=\"url fn n\" href=\"https:\/\/sites.uwasa.fi\/bugged\/author\/rrousi\/\">Rebekah Rousi<\/a><\/span><\/span><span class=\"posted-on\"><a href=\"https:\/\/sites.uwasa.fi\/bugged\/2024\/08\/07\/better-the-robot-you-know-negotiating-the-human-aspects-of-privacy-and-technology\/\" rel=\"bookmark\"><time class=\"entry-date published updated\" datetime=\"2024-08-07T10:14:40+03:00\">07.08.2024<\/time><\/a><\/span>","post_categories":"<span class=\"entry-categories cat-links\"><a href=\"https:\/\/sites.uwasa.fi\/bugged\/category\/yleinen\/\" rel=\"category tag\">Yleinen<\/a><\/span>","post_thumbnail":"<a href=\"https:\/\/sites.uwasa.fi\/bugged\/2024\/08\/07\/better-the-robot-you-know-negotiating-the-human-aspects-of-privacy-and-technology\/\"><img width=\"640\" height=\"360\" src=\"https:\/\/sites.uwasa.fi\/bugged\/wp-content\/blogs.dir\/4\/files\/sites\/162\/2024\/08\/openart-image-anw1lrbh-1723014329740-raw-640x360.jpg\" class=\"attachment-banner-wide-640 size-banner-wide-640 wp-post-image\" alt=\"Evil robot\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/sites.uwasa.fi\/bugged\/wp-content\/blogs.dir\/4\/files\/sites\/162\/2024\/08\/openart-image-anw1lrbh-1723014329740-raw-640x360.jpg 640w, https:\/\/sites.uwasa.fi\/bugged\/wp-content\/blogs.dir\/4\/files\/sites\/162\/2024\/08\/openart-image-anw1lrbh-1723014329740-raw-320x180.jpg 320w, https:\/\/sites.uwasa.fi\/bugged\/wp-content\/blogs.dir\/4\/files\/sites\/162\/2024\/08\/openart-image-anw1lrbh-1723014329740-raw-1024x576.jpg 1024w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a>","_links":{"self":[{"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/posts\/141"}],"collection":[{"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/users\/388"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":2,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/posts\/141\/revisions"}],"predecessor-version":[{"id":144,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/posts\/141\/revisions\/144"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/media\/142"}],"wp:attachment":[{"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/media?parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/categories?post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.uwasa.fi\/bugged\/wp-json\/wp\/v2\/tags?post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}