ICCC Media Intervention: Animation Video Discussion

Description

Throughout the semester, we have discussed important aspects of data and datafication and the ethical aspects of its collection, use, and reuse. We have explored how these processes impact areas such as privacy, sociality, identity and even freedom. It’s now your turn to explore these ideas further and on your own.For your final project, you will create a media intervention (http://www.publicsphereproject.org/node/331) which highlights how datafication intersects with one of the following areas: privacy, racism and/or discrimination, self-determination, or personal freedom. A media intervention is a mechanism that inserts an alternative message into public consciousness, specifically one that contrasts with the typical messaging presented by media companies and platforms. Media interventions take many forms; we know them as culture jamming, subvertisements, textual poaching, and tactical media such as “billboard adjustment.” Your intervention can inform a particular audience about some aspect of what we have been studying, or deliver an important, critical message that deserves widespread attention.Importantly, your media intervention should address one of the conceptual junctures that we explored during the semester—for example, data collection devices (such as a fitness tracker) and privacy—and highlight how these intersections might contribute to inequality or problems in our society environment. Your intervention should be a blend of critique and education, showcasing creativity and thoughtful reflection on the discussions we have had throughout the semester.But what you will be answering are these two questions:Why did you choose this form of intervention?Consider the ways in which your project will be deployed. In other words, where should it be launched, how will it be distributed, or where does it go from here? What challenges do you envision in this process?The artifact that we chose was an animation video to help describe data privacy by using the terms data human assemblages, data tracking, data brokers, etc. You can have up to 2 references and use the research found to help support the questions that need to be answered. The main reason why we chose this artifact (animation video) and intervention is because it helps talk about the topic and spread it throughout all ages and makes it easier to understand, more enjoyable…. this is something along the lines as to why we chose animation video. Also, the ways it is deployed is just social media but you can add to that and with what you think applies. In total should have 2 references and up to 700 words!Here are articles that we used in class that might help you https://journals.sagepub.com/doi/10.1177/2053951715619947https://www.wired.com/story/wired-guide-personal-data-collection/
Make sure to cite please. Attached are notes from the animation video with the terms and topics we discussed that could help you answer the questions. Just as an understanding, the only thing you will be doing is answering the two questions above in bold and the rest is to help you answer those questions. I tip well for thorough work.

1 attachmentsSlide 1 of 1attachment_1attachment_1

Unformatted Attachment Preview

SLIDE NOTES
INTRO
DO YOU KNOW YOU ARE BEING TRACKED?
● Tracking is commonly thought with video surveillance, but there is also dataveillance
● This concept has evolved from the progression of technology and the relationship with
data (voice over)
WHat is tracking?
● What is tracking anyways? It is a mechanism of data that, can be defined as the
monitoring of human behavior and activities. Tracking data is typically collected at
the individual level—it primarily documents individual characteristics and
behaviors
REAL WORLD TRACKING
● VOICE OVER (THESE MECHANISMS ARE A CLOSER TRADITIONAL
INTERPRETATION OF SURVEILLANCE, IN THAT THEY FOLLOW LESS
FREQUENCE DIGITIZED FORMS OF OUR DATA
● FACIAL RECOGNITION
● One example of real world surveillance is facial recognition. This can be found in
airports, stores, and sports venues. It has been promoted as a mechanism that
can improve safety, but it also has been considered problematic because it is not
foolproof.
○ Threatens priv
○ Imposes on personal freedom
○ Violates personal rights
○ Data vulnerabilities
○ Can be maniupulated
● Automated license plate readers
○ Add cars image,
○ Add/talk info on video survallienacne
What is Datavalienace?
● Data recorded from technological devices used in everyday life
○ Show and say examples of devices (Smart assistants: television,cell phones,
Alexa, Amazon Echo, fitness devices, ETC.
○ Put logos of corporations (Maybe)
● Add magnifying glass picture (maybe)
● Show examples of data valances
How Does Datavalliance Track You?
DEVICE IDENTIFIERS
● IMEI Location services

● activity through the device
○ App activity
Online Identifiers
● WIFI LINKING & IP ADDRESS
○ Add picture of computer
● COOKIES & BROWSER fingerprinting
● SOCIAL MEDIA
○ Activity through social media
WHO HAS YOUR DATA?
● IMAGE OF LOOKING OR SEARCHING
● VOICE OVER: YOU DATA GOES BACK TO THE OWNER OF THE DEVICE
THAT YOU USE, BUT YOUR DATA CAN FALL INTO THE HANDS OF DATA
BROKERS. HERE DIVE IN TO WHAT ARE DATA BROKERS ARE.
DATA BROKERS
An information broker, also known as a data broker, is an individual or company that specializes in
collecting personal data or data about companies, mostly from public records but sometimes
sourced privately, and selling or licensing such information to third parties for a variety of uses.
● THINK ABOUT A BANK THAT IS FULL OF INFORMATION RATHER THAN CASH. AND YOU
HAVE INDIVIDUALS THAT GO TO THE BANK THAT DEPOSIT MONEY FOR EXCHANGE OF
DATA. ON TOP OF THIS THIS BANK ALSO GOES OUT AND PURCHASES DATA FROM OTHER
INDIIUDLAS TO STORE THE DATA, TO BE LATER SOLD.
WHY IS DATAVALIANCE BAD?
* THIS PROCESS OF IS TAKEN ADVANTAGE by corporations
*INVASION OF PRIVACY
*CAPITALISM
* IMPLICATIONS EHTICS
*VIOLATIONS OF RIGHTS
HOW TO RECLAIM YOUR PRIVACY & CONTROL OF YOUR DATA ?
● TIPS ON WAYS TO SLOW DOWN PRIVACY FROM YOUR DEVICES
Device Identifiers
● Swap out web browsers with mobile devices
● (voice over) talk about devices currently used
Omit slide of “Dont let vocab fool you….
● Instead use that line for voice over
Technological tracking
ISP- internet service provider s an organization that provides services for accessing, using, or
participating in the Internet.
Online Trackigng
Social Media Tracking
1 in 6 of American adults have a smart speaker
Smart Devices can track your activities and engagement through the device and report back to
the host. For example, a smart television knows how long you’ve been watching TV and knows
what shows you like selling that information to data brokers and advertisers.
Ongoing conversations from device to companies that are invisible to the consumer.
Devices track our human behavior.
DATA BROKERS
An information broker, also known as a data broker, is an individual or company that specializes in
collecting personal data or data about companies, mostly from public records but sometimes
sourced privately, and selling or licensing such information to third parties for a variety of uses.

We have no rights to the data
We consider surveillance as a tracking mechanism, but separate from dataveillance. In
the past, surveillance has been politicized and has connotations with espionage and
mistrust. In comparison to dataveillance, we will also look to surveillance as a form of
tracking before dataveillance.
Roger Clark defined dataveillance in 1988 as the systematic use of personal data
systems in the investigation or monitoring of the actions or communications of one or
more persons.Dataveillance is the primary focus of our discussion here and the concept
has evolved from the progression of technology and our relationship with data.
So, how does dataveillance track you? There are two kinds of identifiers that we will look
at. Device identifiers and online identifiers are categories of labels that tie activity to the
individual. They are unique and persistent at tracking you.
International Mobile Equipment Identities are device identifiers that are created before
you even own your device. It is a series of numbers unique to each of your devices and is
assigned during manufacturing. They can be used to recover lost or stolen devices, but
at the same time this means that you can be tracked through your device’s IMEI number.
More on this concept would reach into location services. Location services have
developed far beyond their navigation intentions. The data being tracked through
location services also work hand in hand with other tracking mechanisms to understand
your and your device’s activity.
Smart assistants, like Siri, can be found within our devices. Others, like Google Assistant
and Alexa have entire devices devoted to them. However, they are all able to
communicate your data back to their companies and track your activity.
Browser fingerprinting is a form of dataveillance that occurs when you use a web
browser. Don’t let the name fool you though, data that is recorded and tracked through
browser fingerprinting reaches far beyond your activity within the browser. Your
timezone, language, keyboard layout, operating system, and much more can be tracked
through browser fingerprinting. All of which can be connected to previously stored
personal information and then used to identify you.
Ethical implications of dataveillance include loss of informed consent and invasion of
privacy. Both of which are violations of research codes of ethics. However, in the United
States we currently do not have significant, overarching protections of our data privacy
that would limit these invasive tracking mechanisms.
Another risk consequence involved with dataveillance are data brokers. They are
profiting off of your data while making no effort to tell you how they use it.They also take
advantage of your information to then take advantage of us through targeted ads and
privacy breaches.

Purchase answer to see full
attachment

Explanation & Answer:
700 Words

Tags:
communication

Animation video

Media Intervention

User generated content is uploaded by users for the purposes of learning and should be used following Studypool’s honor code & terms of service.

Reviews, comments, and love from our customers and community:

Article Writing

Keep doing what you do, I am really impressed by the work done.

Alexender

Researcher

PowerPoint Presentation

I am speechless…WoW! Thank you so much!

Stacy V.

Part-time student

Dissertation & Thesis

This was a very well-written paper. Great work fast.

M.H.H. Tony

Student

Annotated Bibliography

I love working with this company. You always go above and beyond and exceed my expectations every time.

Francisca N.

Student

Book Report / Review

I received my order wayyyyyyy sooner than I expected. Couldn’t ask for more.

Mary J.

Student

Essay (Any Type)

On time, perfect paper

Prof. Kate (Ph.D)

Student

Case Study

Awesome! Great papers, and early!

Kaylin Green

Student

Proofreading & Editing

Thank you Dr. Rebecca for editing my essays! She completed my task literally in 3 hours. For sure will work with her again, she is great and follows all instructions

Rebecca L.

Researcher

Critical Thinking / Review

Extremely thorough summary, understanding and examples found for social science readings, with edits made as needed and on time. Transparent

Arnold W.

Customer

Coursework

Perfect!

Joshua W.

Student

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>