{"id":17,"date":"2022-11-15T13:21:30","date_gmt":"2022-11-15T11:21:30","guid":{"rendered":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/?p=17"},"modified":"2023-12-18T10:39:11","modified_gmt":"2023-12-18T08:39:11","slug":"better-the-devil-or-the-robot-you-know-negotiating-the-human-aspects-of-privacy-and-technology","status":"publish","type":"post","link":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/better-the-devil-or-the-robot-you-know-negotiating-the-human-aspects-of-privacy-and-technology\/","title":{"rendered":"Better the Devil or the Robot you know? Negotiating the human aspects of privacy and technology"},"content":{"rendered":"<p>There is a lot of talk about privacy these days. One may say that the world has grown larger and become more difficult due to the measures we are taking to protect our data. The drivers of privacy and overall cyber security are fascinating to think about.<\/p>\n<p>Firstly, stories of large-scale personal information leaks are hard to ignore when they are extensively covered in the media.\u00a0Secondly, the General Data Protection Regulation (GDPR) has made Internet use and website browsing unpleasant and disgruntling to the \u2018flow seeker\u2019 to say the least.\u00a0And then thirdly, who can forget that ugly notice on the right-hand screen of your new laptop stating that your \u201c\u2026Security software has expired\u2026\u201d and that \u201c\u2026you are no longer protected\u2026\u201d?<\/p>\n<h3>What is it that we are really concerned about?<\/h3>\n<p>Protection money, cryptic privacy statements (or \u2018trade-your-soul for access to this website and its services\u2019), and phones that like to listen to you while you\u2019re on your lunch breaks, don\u2019t really sound like the ingredients for an ideal world. And, are certainly not a good prognosis for a utopian digital future.<\/p>\n<p>But, a part from these obvious turn-offs, what is it that we are really concerned about? And, or, who is it that we are really threatened by? Despite circulating knowledge about the surveillance economy and how big (and smaller) tech are commercially exploiting our data, and perhaps an even deeper-seated fear that one day the <em>robots will take over<\/em>, there do not seem to be too many individuals used as the <em>face<\/em> of privacy concerns. In fact, online and mass media frequently report on consumer discomfort in corporations and other organisations knowing too much about them. One fairly recent article in <a href=\"https:\/\/thefintechtimes.com\/new-report-shows-that-almost-50-consumers-fear-losing-privacy-over-an-increased-digital-footprint\/\"><em>The Fintech Times<\/em> (Clarke, 2021)<\/a> reports on how almost half of all consumers fear that their privacy is compromised by their increasingly expanding digital footprint.<\/p>\n<p>Certainly, risk and vulnerability to the theft of assets as well as fraud cause persistent trepidation. And, if you were around during the 1990s for the release of the Sandra Bullock movie, <em>The Net <\/em>(directed by Irwin Winkler, 1995), then you might have had second thoughts about engaging in online spaces to begin with.<\/p>\n<h3>Stop worrying about privacy and start worrying about identity<\/h3>\n<p>The idea of one\u2019s identity being hijacked certainly isn\u2019t a pretty one. In fact, <a href=\"https:\/\/www.wired.com\/insights\/2013\/07\/stop-worrying-about-privacy-and-start-caring-about-identity\/\"><em>Wired <\/em>contributor Lawrence I Lerner (2018)<\/a> warns us to stop worrying about privacy and start worrying about identity. Interestingly, rather than \u2018faking it\u2019 through the Net with pseudonyms and avatars, Lerner encourages us to:<\/p>\n<ol>\n<li>live our lives and representation through our values and <strong><em>define them<\/em><\/strong>;<\/li>\n<li><strong><em>be authentic<\/em><\/strong> \u2013 don\u2019t turn our voices into marketing constructs;<\/li>\n<li><strong><em>practice social listening<\/em><\/strong> \u2013 or techno-social \u2018listening\u2019, be in tune with the data representing you;<\/li>\n<li>be aware of and <strong><em>identity our social network<\/em><\/strong> \u2013 choose your company well, as they reflect who you are;<\/li>\n<li><strong><em>manage our identity<\/em><\/strong>\u00a0 &#8211; don\u2019t be defensive, just be careful to release thoughtful information; and<\/li>\n<li><strong><em>curate our data privacy<\/em><\/strong> \u2013 establish game rules for how, what and when we disclose particular information.<\/li>\n<\/ol>\n<p>The reasons for this being that even if someone or something is callous enough to hijack your identity for your ruin, through your persistence, genuineness and quantity you may survive with adequate proof and witnesses to testify who you are, and who you <em>are not<\/em>.<\/p>\n<h3>Previous experience matters<\/h3>\n<p>Yet, once again I ask \u2013 what or whom are we afraid of? Silly question? Particularly since I have just stated a few good reasons\u2026. Just think for a moment&#8230; Have you ever been victimized? If not, maybe it is the corporations and robots that might give you the eeries at night. If you have, was it an individual or group? If it was a group you may have several demon-faces in mind. If it was by one, then the demon may be one individual devil.<\/p>\n<p>Studies have shown that females suffer higher rates of victimization and bullying (Craig et al., 2009) \u2013 physical or cyber. Furthermore, victims of stalking and privacy invasion by partners, friends and acquaintances are unsurprisingly more worried about privacy matters than those who have not been (Jerin &amp; Dolinsky, 2001; Logan, 2020; Masur &amp; Trepte, 2021). No doubt, there is a high likelihood that those who have been personally targeted and victimized will personify their predators more than those who have not been.<\/p>\n<h3>Feeling BUGGED?\u00a0 Having a story?<\/h3>\n<p>Our multidisciplinary Academy of Finland project, Emotional Experience of Privacy and Ethics in Everyday Pervasive Systems (<a href=\"https:\/\/www.uwasa.fi\/en\/research\/projects\/emotional-experience-privacy-and-ethics-everyday-pervasive-systems-bugged\">BUGGED<\/a>), explores these questions and more. Just who, what and how people experience the networks of privacy, through their imagination and body, are what we are interested in unravelling.<\/p>\n<p><strong>Call to action: <\/strong>If you have a story, concern or simply have overlapping interests, please do not hesitate to contact me via <a href=\"mailto:Rebekah.rousi@uwasa.fi\">rebekah.rousi@uwasa.fi.<\/a>\u00a0Let\u2019s chat!<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.uwasa.fi\/fi\/henkilo\/2442144\">Rebekah Rousi<\/a><br \/>\n<em>A writer works as an Associate Professor (tenure track) at the School of Marketing and Communication and at Digital Economy Research Platform<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is a lot of talk about privacy these days. One may say that the world has grown larger and become more difficult due to the measures we are taking to protect our data. The drivers of privacy and overall cyber security are fascinating to think about. Firstly, stories of large-scale personal information leaks are [&hellip;]<\/p>\n","protected":false},"author":161,"featured_media":19,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[25,14],"tags":[],"class_list":["post-17","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-social-impacts"],"acf":[],"post_meta":"<span class=\"author\"> <span class=\"vcard\"><a class=\"url fn n\" href=\"https:\/\/blogs.uwasa.fi\/digitaleconomy\/author\/eylikosk\/\">Digital Economy<\/a><\/span><\/span><span class=\"posted-on\"><a href=\"https:\/\/blogs.uwasa.fi\/digitaleconomy\/better-the-devil-or-the-robot-you-know-negotiating-the-human-aspects-of-privacy-and-technology\/\" rel=\"bookmark\"><time class=\"entry-date published updated\" datetime=\"2022-11-15T13:21:30+02:00\">15.11.2022<\/time><\/a><\/span>","post_categories":"<span class=\"entry-categories cat-links\"><a href=\"https:\/\/blogs.uwasa.fi\/digitaleconomy\/category\/english\/\" rel=\"category tag\">ENGLISH<\/a> <a href=\"https:\/\/blogs.uwasa.fi\/digitaleconomy\/category\/social-impacts\/\" rel=\"category tag\">SOCIAL IMPACTS<\/a><\/span>","post_thumbnail":"<a href=\"https:\/\/blogs.uwasa.fi\/digitaleconomy\/better-the-devil-or-the-robot-you-know-negotiating-the-human-aspects-of-privacy-and-technology\/\"><img width=\"640\" height=\"360\" src=\"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-content\/blogs.dir\/6\/files\/sites\/165\/2022\/11\/shutterstock-1856205265-better-the-devil-640x360.jpg\" class=\"attachment-banner-wide-640 size-banner-wide-640 wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-content\/blogs.dir\/6\/files\/sites\/165\/2022\/11\/shutterstock-1856205265-better-the-devil-640x360.jpg 640w, https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-content\/blogs.dir\/6\/files\/sites\/165\/2022\/11\/shutterstock-1856205265-better-the-devil-320x180.jpg 320w, https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-content\/blogs.dir\/6\/files\/sites\/165\/2022\/11\/shutterstock-1856205265-better-the-devil-1024x576.jpg 1024w, https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-content\/blogs.dir\/6\/files\/sites\/165\/2022\/11\/shutterstock-1856205265-better-the-devil-1280x720.jpg 1280w, https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-content\/blogs.dir\/6\/files\/sites\/165\/2022\/11\/shutterstock-1856205265-better-the-devil-1600x900.jpg 1600w, https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-content\/blogs.dir\/6\/files\/sites\/165\/2022\/11\/shutterstock-1856205265-better-the-devil-1920x1080.jpg 1920w, https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-content\/blogs.dir\/6\/files\/sites\/165\/2022\/11\/shutterstock-1856205265-better-the-devil-2048x1152.jpg 2048w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/a>","_links":{"self":[{"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/posts\/17"}],"collection":[{"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/users\/161"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/comments?post=17"}],"version-history":[{"count":8,"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/posts\/17\/revisions"}],"predecessor-version":[{"id":26,"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/posts\/17\/revisions\/26"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/media\/19"}],"wp:attachment":[{"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/media?parent=17"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/categories?post=17"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uwasa.fi\/digitaleconomy\/wp-json\/wp\/v2\/tags?post=17"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}