1 / 42

Cartography, privacy and surveillance: Are some parts of the Web better left unmapped?

Cartography, privacy and surveillance: Are some parts of the Web better left unmapped?. Martin Dodge Centre for Advanced Spatial Analysis, University College London Web: espaces de navigation, objets d’exploration, 13 th May 2004.

zarifa
Télécharger la présentation

Cartography, privacy and surveillance: Are some parts of the Web better left unmapped?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cartography, privacy and surveillance: Are some parts of the Web better left unmapped? Martin Dodge Centre for Advanced Spatial Analysis, University College London Web: espaces de navigation, objets d’exploration, 13th May 2004

  2. “… we have every reason to believe that cyberspace, left to itself, will not fulfill the promise of freedom. Left to itself, cyberspace will become a perfect tool of control … The invisible hand of cyberspace is building an architecture that is quite the opposite of what it was at cyberspace’s birth.”Lawrence Lessig, Code and Other Laws of Cyberspace

  3. WATCHING THE WEB

  4. Perfect panopticon for commerce?According to Ron Kohavi director of data Mining and personalization at Amazon.com (source: http://robotics.stanford.edu/users/ronnyk/etailKohavi.pdf)

  5. Defining privacy • Justice Brandeis (1890), ‘the right to be letalone’ • the power to control what others can come to know about you • modern privacy benchmark, at an international level, can be found in the 1948 Universal Declaration of Human Rights, which specifically protects territorial and communications privacy. Article 12 states: • ‘No one should be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks on his honour or reputation. Everyone has the right to the protection of the law against such interference or attacks.’ (www.un.org/Overview/rights.html)

  6. Web and individual privacy • nothing new. ongoing tension and debate • most express concern but actions are ambivalent

  7. Expectations of anonymity and rights to privacy?

  8. Leaky browsing

  9. ‘Privacy through obscurity’ • some have argued that liberties come in large part because of the inherent inefficiencies in surveillance • rapid developments in data mining of online interactions • looking deeper, easy zero in on a single person • looking backwards. many more things kept and getting kept for longer time • unintended leakage, permeable borders to private information • widening access. ‘bottom-up’ surveillance. anyone can google me. (e.g. Google access to Usenet archives; Way Back Machine at Internet Archive)

  10. Benefits of forgetfulness ? 1993

  11. 1996

  12. Googledorks! googleDork (gOO gôl'Dôrk) noun 1. Slang. An inept or foolish person as revealed by Google. (Source: ‘Online search engines help lift cover of privacy’ Washington Post, 9th February 2004)

  13. Commerce likes to know you?According to Ron Kohavi director of data Mining and personalization at Amazon.com (source: http://robotics.stanford.edu/users/ronnyk/etailKohavi.pdf)

  14. Linking data. Combined portraitAccording to Ron Kohavi director of data Mining and personalization at Amazon.com (source: http://robotics.stanford.edu/users/ronnyk/etailKohavi.pdf)

  15. Power of maps 1. seeing patterns (eureka moment) 2. revealing process • (proving theory to others) 3. classifying space and people, enabling geographically specific action

  16. Dr John Snow’s ‘Cholera’ Map, 1854

  17. The Bullard fit

  18. Charles Booth's ‘Inquiry into the Life and Labour of the People in London’, 1880s (Source: www.umich.edu/~risotto/ )

  19. MAPS FOR WEB SURVEILLANCE

  20. Difference mapping makes • visual data mining of social cyberspace • opportunities to combine powerful capabilities of people and software, exploits best abilities of both • fast but dumb calculation and record keeping versus slow but smart recognition and interpretation • case studies 1. hyperlink structures 2. clickstream visualisation 3. list participation / posting 4. chat dynamics 5. social networks in email 6. activities in 3d virtual worlds • not designed for surveillance in a negative sense, but raise privacy concerns

  21. 1. Hyperlink structures

  22. 2. Web browsing patterns, clickstream visualisation • data mining is automated extraction of hidden predictive information from large databases

  23. Research • NIST VISVIP • Stanford’s WebQuilt • Ben Fry’s Anemone • Commercial • Blue Martini’s ClickViz • Insight’s eBizinsights • Vividence ClickStreams • NetRaker Clickstream

  24. Blue Martini’s ClickViz (Source: Brainerd, J. and Becker B., 2001. “Case Study: E-Commerce Clickstream Visualization”)

  25. NIST VISVIPby John Cugini (Source: http://zing.ncsl.nist.gov/WebTools/VisVIP/overview.html)

  26. 3. Community structure and individual participation

  27. VisualWho by Judith Donath, MIT Media Lab Source: http://smg.www.media.mit.edu/projects/VisualWho/

  28. mapping people • understanding the formation of virtual groups formed via conversation and other shared interaction • asynchronous - email groups, listserv, news • synchronous - messaging, chat, muds, avatar worlds, games, IM • what structures do the communities build • can mapping the social life help the community • many important privacy issues. ethics of identifying individuals and social surveillance

  29. 4 . Individual activities in 3d virtual worlds

  30. Interactive visualisation tool for analysing user trails in ActiveWorld space. Katy Börner, http://ella.slis.indiana.edu/~katy/

  31. Beyond individual privacy rights • decline in ability to read anonymously. attempted anonymity will be seen as marker of suspicion and risk • negative implications of censorship and informational, financial and material discrimination. feedback effect - narrowing of choice • dangers of self censorship • enabling better blocking and censorship. Chilling of cyberspace by DMCA and security paranoia • ethics of the researchers. maps of CMC are ‘responsible artefacts’, that do not destroy what they seek to represent or enhance. • Marc Smith say “The bright light of social science research can create an unpleasant glare for participants drawn to a dimly lit online space” (from Invisible crowds in cyberspace: Mapping the social structure of the Usenet) • linking together geographic and virtual activity patterns

  32. Unrelated activities tied together into unified dossiers, sum of the parts of more revealing • easily drawn into governmental security systems, commercial consumption profiling systems • moving from discretionary to mandatory • beyond personal privacy. Enabling and disabling potential. Facilitates further discriminatory practices. Software sorting of people based on their activity patterns

  33. We don’t like your browser, you can’t come in “Exclusively for Everyone (except mozilla users)”

  34. Surveillance = Transparency Visualising power - They Rule by Josh On leaving parts unmapped is a risk. Privacy becomes secrecy. privacy as a mask for wrong doing (e.g. corporations hiding activities) By graphically mapping the individuals who sit on one or more U.S. Fortune 100 executive boards, www.theyrule.net gives a view of the close connections between board members and seemingly unrelated companies.

  35. Politics, money and geographywww.fundrace.org

  36. questions ?? I would welcome feedback to m.dodge@ucl.ac.uk • the slides of this presentation are available at http://www.casa.ucl.ac.uk/martin/paris04.pdf www.privacyinternational.org/survey/censorship/ www.rsf.org

  37. http://nla.gov.au/nla.map-nk2456-13

More Related