or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing
xxxxxxxxxx
Data Studies 2021 // S10. Surveillance
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →Pablo Velasco // Information Studies // pablov.me
Plan for the day:
SURVEILLANCE(S)
Classic approaches to surveillance
Foucault, M. (1978). Discipline and Punish: The Birth of the Prison
Elmer, G. (2003). A Diagram of Panoptic Surveillance
Landa, M. D. (1991). War in the Age of Intelligent Machines
But also surveillance as everyday practice
Lupton, D. (2016). The quantified self
Social surveillance is the ongoing eavesdropping, investigation, gossip, and inquiry that consitutes information gathering by people about their peers, made salient by the social digitalization normalized by social media
(…)
the nature of "surveillance" dynamically changes based on the social role played by observer and observant
Marwick, A. E. (2012). Social Surveillance in Everyday Life
Persistent Surveillance Systems
e.g. Radiolab: Eye in the sky
1. Which devices/artifacts are tracking us now?
2. Which of them are obviously visible? Which are obfuscated?
3. Who is gathering this information? Do you know to what purpose?
DIGITAL SURVEILLANCE
Bauman, Z., & Lyon, D. (2012). Liquid Surveillance: A Conversation
Dijck, J. van. (2014). Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology
Let's look at the exhaust data captured from your browser
Agre, P. E. (1994). Surveillance and capture: Two models of privacy
NOT mutually exclusive models!
Mathematical formalism
*Compstats in Brooklyn Nine-Nine (S01E15)
How do grammars of action happen?
"The crime rate itself became the boss"
"The people who started running CompStat didn't understand it"
In the original design Data was the means, and eventually Data became the ends
Agre, P. E. (1994). Surveillance and capture: Two models of privacy.
SURVEILLANCE CAPITALISM
[Surplus (value): earnings minus costs of materials and labor]
[Alienation: from products, but also of our own determination]
Behavioural data reinvestment cycle
Every action a user performs is considered a signal to be analyzed and fed back into the system (Hal Varian)
"Surveillance Capitalism is not a technology; it is a logic that imbues technology and commands it into action" (15)
"Machine intelligence" -> analysis, Machine Learning, prediction, recognition, modeling…
Hmm… Machine intelligence seems to be used quite broadly and I can't quite wrap my head around where the borders are. Google themselves refer to things like language translation, speech recognition and prediction as machine intelligence (Mathilde)
Recommendation systems
The Napoleon Dynamite problem
When we predict a visualization based on a sample of data and then feed more data to test the accuracy of our prediction in the visualization (Laura)
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →https://www.visualcapitalist.com/how-big-tech-makes-their-billions-2020/
Google's reinvesment cycle turns from "improving the product" towards "prediction of user behavour"
Instead of 'fordist' production, Google UPI (user profile information) extraction and analysis tailored to advertisment (ends)
Unique mix (means): behavioural surplus, data science, material infrastructure, computational power, algorithmic systems, and automated platforms ("machine intelligence")
"instrumentarianism" power -> shape human behaviour to other's ends
Behavioural knowledge, manipulation, and prediction: microtargeting as a combination of politics and consumer marketing, and the capacity of manipulation of affective states (O'Neil 2017)
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →https://firstdraftnews.org/long-form-article/trackers-gephi-dmi/
DMI version (in development, but you can export directly to gephi): https://github.com/digitalmethodsinitiative/brightbeam
Also, tracker-tracker (exports to gephi): https://tools.digitalmethods.net/beta/trackerTracker/
Short activity: lightbeam
Install Thunderbeam-Lightbeam for chrome here
Try doing the same with your adblockers on. Is there a substantial difference? You can try different adblockers.