{"id":33,"date":"2023-12-19T22:38:05","date_gmt":"2023-12-19T22:38:05","guid":{"rendered":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/?post_type=chapter&#038;p=33"},"modified":"2024-02-03T17:48:01","modified_gmt":"2024-02-03T17:48:01","slug":"surveillance-capitalism","status":"publish","type":"chapter","link":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/chapter\/surveillance-capitalism\/","title":{"raw":"Surveillance Capitalism","rendered":"Surveillance Capitalism"},"content":{"raw":"<p class=\"import-pf\">Take a second to consider the standard manila folder\u2014not the folder icons on your computer. We\u2019re going old school for just a moment to consider the <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">actual<\/em><\/span> folder with its simple, clean design and distinctive color. It has a tab that peeks out on the side so that you can label the contents of the folder and therefore easily organize and retrieve information, which is especially helpful if you have a lot of different types of information spread across multiple folders.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">It\u2019s a pretty simple concept, but information wasn\u2019t always organized this way, and as we\u2019ll discuss in this chapter, this type of data collection isn\u2019t always beneficial to everyone. In fact, it seems fitting that the manila folder is often considered a symbol of imperialism and oppression. Invented in the United States in the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId315\" href=\"https:\/\/www.guggenheim.org\/blogs\/checklist\/a-manila-envelope-the-inspiration-behind-an-exhibitions-graphic-identity\"><span class=\"import-url\">early nineteenth century<\/span><\/a><\/span>, manila paper originally came from a type of banana tree called acaba, which grew predominantly in the Philippines. When the United States colonized the Philippines, it took control of the acaba trade to ensure that it\u2014not the Filipinos\u2014would profit (Lui). The U.S. used the wood for a variety of purposes, including manila envelopes and paper.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">In its most basic form, surveillance is about collecting information about people so it can be easily retrieved and analyzed. Before filing cabinets were invented in 1890, information was written in ledger books or in loose bundles of paper, which made information less accessible because it was difficult to find specific information. The <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId316\" href=\"https:\/\/history.nebraska.gov\/blog\/how-filing-cabinets-changed-world\"><span class=\"import-url\">filing cabinet<\/span><\/a><\/span> revolutionized record management practices by making it possible to quickly retrieve a single document (Bristow). Soon, filing cabinets were a must in businesses across the country, and large storage facilities emerged with the singular purpose of securing large amounts of data. In other words, filing cabinets became foundational to the way that institutions managed systems\u2014and people. They were used to document identities, relationships, events, and transactions.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Now think about all of the folders out there somewhere that contain information about you\u2014medical records, academic transcripts and other test scores, employment evaluations, bank information, credit scores, tax records. It\u2019s obvious why privacy has become such an important issue. Everyone has personal information stored in files across various institutions. Sometimes we don\u2019t even know these files exist. Rarely do we know all of the information that the files contain or how the information was collected. It\u2019s a form of institutional power because it increases our visibility (and vulnerability). Individuals are provided opportunities\u2014or not\u2014based on the information in their files. Data collection also has the power to control behaviors. Think about standard employment practices that require workers to clock in and out, that mandate an annual employee evaluation, that put surveillance cameras in parking lots and workstations, or that require random drug testing. These are all ways of monitoring and managing the behaviors of employees, of creating systems of rewards and punishments based on the information in a person\u2019s file.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The digital age of computers, web browsers, and cloud-based computing and data storage expanded data collection practices. It\u2019s even easier to store and retrieve vast amounts of personal data. It\u2019s also possible to collect all kinds of user information without the users\u2019 explicit knowledge. That\u2019s what \u201c<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId317\" href=\"https:\/\/policies.google.com\/technologies\/cookies?hl=en-US\"><span class=\"import-url\">cookies<\/span><\/a><\/span>\u201d do. When you visit a website and it requires you to \u201caccept cookies,\u201d a code is embedded in your browser\u2019s software that allows the website to collect information about your online activities and to recognize your computer when you revisit the site (Google, \u201cHow Google\u201d). Information about your preferences, profile information, browsing history, past purchases, and even your navigation path and time spent on individual pages is collected. Cookies also allow websites to track your activities across the internet, even when you aren\u2019t on that specific website. A robust user profile is developed about you\u2014your interests, activities, and identifying information\u2014all so that companies can create targeted ads and online experiences that will increase your chances of buying certain products and services.<\/p>\r\n\r\n\r\n[caption id=\"\" align=\"alignnone\" width=\"213\"]<img src=\"http:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-content\/uploads\/sites\/64\/2024\/01\/image13.png\" alt=\"Cartoon graphic of a surveillance camera\" width=\"213\" height=\"236\" \/> <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:CCTV_Surveillance_Notice.svg\">CCTV Surveillance Notice<\/a>, by Amityadav8, on Wikimedia Commons <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">(CC BY-SA 3.0)<\/a>[\/caption]\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The term \u201csurveillance capitalism\u201d refers to this collection of personal data for the purpose of financial gain or some other benefit related to power and control. In the introduction of <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Surveillance Capitalism<\/em><\/span>, Josh Lauer and Kenneth Lipartito define surveillance capitalism as a<\/p>\r\n<p class=\"import-bqs\" style=\"margin-left: 18pt; margin-right: 18pt; text-indent: 0pt;\">broad range of strategies and techniques, both formal and informal, that commercial actors\u2014including lenders, merchants, employers, managers, service providers, and others\u2014deploy to observe, record, predict, and control human behavior and relationships. The targets of such commercial surveillance typically include clients and customers, borrowers and buyers, staff and laborers (free and unfree), markets and competitors (5).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">It\u2019s a broad definition because surveillance is so prevalent throughout our daily lives. We\u2019re reminded in many parking lots, stores, schools, and government buildings that we are being recorded. Cameras also exist at many intersections and toll booths to ensure that people follow the rules. Many people have cameras on their doorbells and inside their homes so they can monitor the activities of visitors or maybe even their own pets or family members and prevent negative behaviors. Then there are the smartphones, smart watches, and GPS apps that track your location throughout the day. Our Siris, Alexas, and Google Assistants are listening devices that <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId319\" href=\"https:\/\/www.cnn.com\/2019\/08\/19\/tech\/siri-alexa-people-listening\"><span class=\"import-url\">record our dialogue<\/span><\/a><\/span>, which can be reviewed by tech companies themselves or third-party contractors (Metz). There is even some fear that our devices are listening to our conversations when we aren\u2019t using them. For instance, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId320\" href=\"https:\/\/moniotrlab.ccis.neu.edu\/wp-content\/uploads\/2019\/09\/ren-imc19.pdf\"><span class=\"import-url\">this study<\/span><\/a><\/span> examined 81 different Internet of Things devices and found that many of them surreptitiously transmit information to tech companies like Netflix, Amazon, and Google, even when the device isn\u2019t being used (Ren et al.).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Advancements in digital technology have made it easier than ever for organizations to secretly collect information, which has created a number of privacy concerns. This chapter explores the history of surveillance capitalism, identifies common surveillance practices, and examines how surveillance is often used not only to <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">predict<\/em><\/span> but also to <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">control<\/em><\/span> human behaviors. The chapter ends with basic guidelines for protecting your private information.<\/p>\r\n\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Understand the history of surveillance and how different practices emerged over time as technologies became more advanced.<\/li>\r\n \t<li>Understand the connection between surveillance and power.<\/li>\r\n \t<li>Consider all of the different types of surveillance practices and the types of data that organizations are able to collect based on our digital devices.<\/li>\r\n \t<li>Learn how commercialization connects with surveillance and how companies use surveillance and metadata to not only predict but influence behavior.<\/li>\r\n \t<li>Consider why surveillance is such a concern for society.<\/li>\r\n \t<li>Learn practical ways to protect your own private information.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<h1 class=\"import-ah\">The History of Surveillance Capitalism<\/h1>\r\n<p class=\"import-paft\">As discussed in the previous section, the practice of compiling information into personal files has a long history that predates the advent of digital technology. Surveillance practices have an even longer, more complex history. Michel Foucault\u2019s 1975 book <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Discipline and Punish: The Birth of the Prison<\/em><\/span> has had a profound influence on our understanding of surveillance practices and the social consequences throughout history. In it, Foucault traces the rise of the prison system in eighteenth-century Europe. Before prisons emerged as the standard form of punishment for criminal behavior, people who were convicted of a crime were typically subjected to some sort of public torture or punishment. For instance, criminals might be put in the pillory or in stocks in the town square, which was intended to deter future crime from the individual as well as everyone else in town. When prisons emerged, however, punishment shifted from being mostly physical to being mostly psychological. Within the confines of the prison, every aspect of the prisoner\u2019s life was regimented, monitored, and controlled.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The panopticon is what made surveillance possible. Defined by its circular structure and a system of backlighting in each prison cell, the panopticon made it possible for a guard in the tower to monitor every movement that the prisoners made. They were constantly visible. The guard in the tower, on the other hand, was hidden. There were no lights in the tower to let prisoners know whether or not they were being watched; however, they knew it was always a possibility. So they had to constantly be on their best behavior to avoid punishment. Over time, the prisoners began to internalize the gaze of the guard and to monitor their own behaviors.<\/p>\r\n\r\n\r\n[caption id=\"\" align=\"alignnone\" width=\"792\"]<img src=\"http:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-content\/uploads\/sites\/64\/2024\/01\/image12.png\" alt=\"Inside one of the prison buildings at Presidio Modelo, Isla de la Juventud, Cuba.\" width=\"792\" height=\"530\" \/> <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Presidio-modelo2.JPG\">Presidio Modelo 2<\/a>, by Friman on Wikimedia Commons <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">(CC BY-SA)<\/a>[\/caption]\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The panopticon serves as a poignant metaphor for current surveillance practices. Just like the prisoners in the cells, everyone in society is subjected to different forms of surveillance that force their exposure\u2014making their behaviors, identities, and relationships visible. Meanwhile, the organizations that collect this information about us (the metaphorical guards in the tower) are largely invisible. We don\u2019t often see who specifically is collecting information about us, what that information is, or how it\u2019s being used. Even more significant is the psychological effect this surveillance has. Like the prisoners in their cells, most people don\u2019t know <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">if<\/em><\/span> they are being watched. They just know that it\u2019s <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">always<\/em><\/span> possible, so they also internalize the gaze of authority to monitor their own behaviors.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">A classic example might relate to traffic laws. Most of us monitor our own speed. We come to a full stop at a stop sign. We sit at an intersection waiting for the light to turn green even if there are no other cars at the intersection. It\u2019s always <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">possible<\/em><\/span> that a cop might be stationed nearby or that we are being filmed by a traffic camera somewhere, and because we don\u2019t want to get a speeding ticket or have our license revoked, we drive a little slower. We make the full stop. We wait for the light to turn at the empty intersection. Often we don\u2019t even consciously make these choices because the behaviors\u2014and often the underlying message about safety and good driving\u2014have become ingrained in our minds. The same is true for lots of activities we do all day long, even parts of our identities that we might typically think of as inherent. Foucault would argue that a complex system of surveillance, rewards, punishments, self-monitoring, and internalization is responsible for nearly all of our behaviors.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">While surveillance itself isn\u2019t new, the term \u201csurveillance capitalism\u201d typically refers to more recent practices related to digital technology and data collection, which emerged gradually once the internet shifted to a commercial enterprise run by a few private companies. You might recall from the first chapter that the World Wide Web was created with a focus on information sharing. The NSFNET, developed by the National Science Foundation, was dedicated to educational advancement and had initially banned the commercial use of the internet. That changed in the mid-1990s as the number of users grew beyond what the NSF could manage. Private companies provided internet services, and more and more businesses registered their websites with the purpose of attracting new customers.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">One of the key events that perpetuated the development of surveillance capitalism was the invention of cookies, which would record the unique navigation paths of individual users as they visited particular websites. According to Meg Leta Jones in \u201cSurveillance Capitalism Online,\u201d these paths were called \u201cclickstreams,\u201d which allowed web creators to understand how users were navigating their site and to use that information to evaluate the website\u2019s effectiveness. This technology was not built into the original design of the World Wide Web. In fact, Tim Berners-Lee intended for the web to be \u201cstateless,\u201d meaning that it would retrieve the information that a user is looking for, but nothing about the transaction would be recorded or documented. For companies looking to understand the user journey, they called this original design the \u201cmemory\u201d problem (Jones 186). The cookie, invented by computer scientist Lou Montulli, created a unique session ID that began when a user accessed a specific website. The server for that website would place the text code into the memory of the user\u2019s browser, which is then stored on the hard drive and allows the website to recognize that user each time they return to the website.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Importantly, Jones points out that the cookie is an \u201copaque\u201d memory, meaning that it\u2019s invisible to the user (187). The code could include anything, to collect any sort of data, and the user wouldn\u2019t know, which connects directly to the idea of surveillance. The user becomes more visible while the companies collecting the data are largely hidden. This obviously raised concerns about user privacy, which then prompted Montulli to adjust the process so that users could manage their own cookie preferences and receive notifications before a cookie was placed on their computer. They could accept or reject the cookie, though the default was set so that all cookies were accepted. He argued that this was a technique that actually protected users because it kept their identities anonymous and it allowed them a measure of control over whether information was collected, though they still wouldn\u2019t know what type of information was collected or how it was being used.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">And then as the Clinton administration ushered in <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId322\" href=\"https:\/\/clintonwhitehouse4.archives.gov\/WH\/Accomplishments\/technology.html\"><span class=\"import-url\">self-regulation policies<\/span><\/a><\/span> that removed commercial restrictions online (White House) and as only a handful of large tech companies survived the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId323\" href=\"https:\/\/www.thestreet.com\/dictionary\/d\/dot-com-bubble-and-burst\"><span class=\"import-url\">dot-com crash<\/span><\/a><\/span> in the early 2000s, new practices emerged that worked against the privacy of users (Salvucci). Whereas companies had originally tracked user data only when they were on a particular page, now they began tracking the users themselves as they traveled across the internet, and they began selling user data to interested third parties who could now market their products and services directly to users based on their past behaviors.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Interestingly, Jones points out that surveillance capitalism didn\u2019t begin with the cookie. As far back as the 1970s, direct mail companies would buy mailing lists from varying companies with the explicit purpose of targeting them with mail advertisements. For instance, one medical lab sold patient information to a direct mail service, which could then target those patients with ads for specific products. One woman received diaper coupons because her medical information revealed that she was pregnant. Jones explains, \u201cData breaches, sexual privacy, informational asymmetries, and racial bias were issues with direct marketing expressed by members of Congress in 1970\u201d (197). However, when given the chance to take their names off all mailing lists, very few people responded. Though direct mail was considered a minor nuisance, the opt-out method was deemed sufficient to protect consumer information, which Jones argues is what set the precedent for increased surveillance capitalism once cookies were established.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Another important component in the history of surveillance capitalism was the emergence of Google, which improved search results by creating a system that collected information about users, their search queries, and their online behaviors. As Shoshana Zuboff points out in <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Age of Surveillance Capitalism<\/em><\/span>, the system was initially about enhancing the user experience and providing the most relevant queries. However, it didn\u2019t take long for Google to realize the value of the massive amounts of user data it was collecting, which could be used for targeted advertising that profits off people\u2019s personal data. Zuboff also points to Facebook as a pioneer in surveillance capitalism through its collection of user data and targeted advertising. Zuboff argues that increasingly, users are treated as commodities as every click is recorded as some sort of metric for enhanced analytics and profit. Businesses obviously profit off this sort of data, but so too do political organizations that have a stake in influencing voter opinions and behaviors. The last chapter discussed the power of media spins and echo chambers to direct people\u2019s perceptions of reality. By collecting data about these users, political entities could target their ads to individuals who are more likely to respond favorably to their message\u2014because they are predisposed to certain beliefs and values. For example, the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId324\" href=\"https:\/\/www.nytimes.com\/2018\/04\/04\/us\/politics\/cambridge-analytica-scandal-fallout.html\"><span class=\"import-url\">Cambridge Analytica scandal in 2016<\/span><\/a><\/span> revealed that the data firm had acquired data from 50 million Facebook users and then sold that data to political campaigns so they could build voter profiles and create targeted ads that would sway voter sentiment (Confessore). This data was used to assist the Ted Cruz and Donald Trump campaigns in 2016 and to promote public support for Brexit.<\/p>\r\n\r\n<h1 class=\"import-ah\">Surveillance Practices<\/h1>\r\n<p class=\"import-paft\">Remember that word \u201cubiquitous\u201d from the first chapter? If our use of technology is ubiquitous, so too is surveillance. Hardly a moment of the day goes by when we don\u2019t have our phones nearby, tracking our location. And as mentioned in the previous section, many companies are tracking our activities across the internet, gathering data about sites we\u2019ve visited, hyperlinks we\u2019ve followed, products we\u2019ve purchased, and so on. But the ways in which we are surveilled and the (known) uses of this information extend much further. Though it\u2019s impossible to identify every surveillance tactic and though government organizations and large tech companies aren\u2019t always forthcoming about the types of information they are collecting, this section will look at some of the more common surveillance strategies made possible through a variety of technologies.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Video surveillance.<\/strong><\/span> Video cameras are increasingly common, particularly in public spaces such as busy intersections, parking lots, street corners, schools, shopping centers, and restaurants. Often, there will be a sign alerting the public that they are being recorded, but not always. Sometimes the cameras themselves are easy to spot, but not always. As you might imagine, cameras are used in many circumstances to help prevent crime and other unwanted behaviors. They\u2019re also helpful once a crime or some other incident has occurred because they provide footage of what happened and who was involved. Facial recognition software and license plate scanners make it even easier to identify individuals in specific places and visibly track their movements.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The concern many people have relates to the abuse of video surveillance\u2014tracking and recording someone\u2019s movements for the sake of spying or using video surveillance in deceptive or inappropriate ways. For instance, people of color are typically <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId325\" href=\"https:\/\/www.brookings.edu\/research\/police-surveillance-and-facial-recognition-why-data-privacy-is-an-imperative-for-communities-of-color\/\"><span class=\"import-url\">monitored more closely<\/span><\/a><\/span>, and video surveillance makes it easy to target\/scrutinize these individuals while they are buying groceries, pumping gas, eating dinner, and so on (Lee and Chin). There have also been incidents where video cameras have been discovered in inappropriate places, demonstrating a gross abuse of power. In 2003, a middle school in Tennessee was sued by parents after they found out there were <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId326\" href=\"https:\/\/abcnews.go.com\/US\/story?id=90486&amp;page=1\"><span class=\"import-url\">video cameras in the locker rooms<\/span><\/a><\/span> that had recorded their children undressing, and because of a lack of security, the footage had been accessed by unauthorized users outside of the school system (ABC News).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Laptops and cell phones also have built-in video cameras, which is a cause for concern. During the COVID-19 pandemic as schools shifted to online learning, many people were concerned about <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId327\" href=\"https:\/\/www.edweek.org\/technology\/massive-shift-to-remote-learning-prompts-big-data-privacy-concerns\/2020\/03\"><span class=\"import-url\">platforms like Zoom<\/span><\/a><\/span> that gave viewers access to students\u2019 homes, including their bedrooms and other activities that occurred in the background (Lieberman). Similarly, it became common practice to use <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId328\" href=\"https:\/\/www.edweek.org\/technology\/massive-shift-to-remote-learning-prompts-big-data-privacy-concerns\/2020\/03\"><span class=\"import-url\">remote proctors<\/span><\/a><\/span> and other surveillance technologies to monitor students\u2019 behaviors while they were taking tests. In many instances, students felt the monitoring was unfair and overly aggressive. And then there are the typical <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId329\" href=\"https:\/\/www.rd.com\/article\/laptop-camera\/\"><span class=\"import-url\">concerns about hackers<\/span><\/a><\/span> who gain access to video feeds from laptops, phones, and personal home surveillance systems, usually with the intention of gaining bank account information or spying on users\u2019 personal activities (Erickson).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Voice recognition.<\/strong><\/span> Many technologies also have a microphone, including your phone, your computer, and many of your household devices like Siri or Alexa. There\u2019s been concern for some time that the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId330\" href=\"https:\/\/abcnews.go.com\/ABC_Univision\/governments-phone-text-email-spying-explained\/story?id=19347440\"><span class=\"import-url\">government spies on personal conversations<\/span><\/a><\/span> in order to collect personal information (Weinstein). However, tech companies are also leveraging voice recognition technology in order to identify who we are and build a profile about us. Google says that it <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId331\" href=\"https:\/\/www.whatthetech.tv\/voice-assistants-are-always-listening-should-you-be-worried\/\"><span class=\"import-url\">uses <\/span><span class=\"import-url\">snippets of voice recordings<\/span><\/a><\/span> in order to get aggregate data about user preferences and how the device can be improved, but it says it doesn\u2019t connect specific conversations with specific users (Tucker). Of particular concern is the fact that these smart devices are <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId332\" href=\"https:\/\/www.consumerwatchdog.org\/privacy-technology\/how-google-and-amazon-are-spying-you\"><span class=\"import-url\">listening all the time<\/span><\/a><\/span> that they are on, even when they haven\u2019t been activated (King). What\u2019s more, the recordings are sometimes sent to third-party reviewers, which puts personal data at an increased risk.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Emails and <\/strong><strong class=\"import-b\">t<\/strong><strong class=\"import-b\">exts.<\/strong><\/span> If you have an email account or a cell phone provided by your employer, they have the right to view that information. In fact, many employers have <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId333\" href=\"https:\/\/www.brookings.edu\/blog\/techtank\/2021\/01\/05\/how-employers-use-technology-to-surveil-employees\/\"><span class=\"import-url\">monitoring software<\/span><\/a><\/span> installed on employee computers that allows them to view emails and other online activities (West). Cell phone companies retain records pertaining to text messages and when they were sent. Though most say that they <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId334\" href=\"https:\/\/news.law.fordham.edu\/jcfl\/2016\/06\/02\/cell-phone-forensics-powerful-tools-wielded-by-federal-investigators\/\"><span class=\"import-url\">retain the messages themselves<\/span><\/a><\/span> for only a short time after they have been delivered, some do store the data for several days or even months after delivery (Evans). Likewise, up until 2017, Google would scan Gmail customers\u2019 emails for the purpose of having them analyzed for direct marketing purposes. Though Google no longer scans emails, it is still able to track users across multiple Google apps, including Gmail, Google Chrome, Google Analytics, and Double Click. In fact, Google recently published its <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId335\" href=\"https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480\"><span class=\"import-url\">privacy label<\/span><\/a><\/span> for the Gmail app, which reports on all of the types of data Google will collect, including location, purchase history, contacts, user content, search history, identifiers, and \u201cother data\u201d (Google, \u201cGmail\u201d).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Social media.<\/strong><\/span> Social media companies like Facebook, X (formerly Twitter), Instagram, and YouTube can also collect information about you. This includes the information you provide in your profile as well as your posts. It also includes your list of contacts and the things that you like and share. All of this is information that can be used to provide targeted ads across multiple web platforms\u2014not just your feed on that particular site. Many social media sites also collect information about your location, phone and email contacts, text and email messages, payment information, online views, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId336\" href=\"https:\/\/www.security.org\/blog\/how-much-would-you-sell-your-social-media-data-for\/\"><span class=\"import-url\">and more<\/span><\/a><\/span>. These social media companies not only use the information to better their own platforms, but they also make a lot of money by selling user information to advertisers (Vigderman and Turnera).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Digital records.<\/strong><\/span> In the digital age, most of the private information about you is stored on a digital server somewhere\u2014your health care history, the medications you take, your bank account information, your grades, your credit score, your legal record. For instance, think about the type of information that most colleges collect about individual students\u2014high school transcripts, income information, bank information, individual test scores and homework activities, attendance records, disciplinary files, physical or mental health information, specific disabilities, and so on. Likewise, doctor\u2019s offices, government organizations, merchants, and others all collect private information about you.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Big <\/strong><strong class=\"import-b\">d<\/strong><strong class=\"import-b\">ata.<\/strong><\/span> On a larger scale, more businesses as well as educational and governmental organizations are able to collect big data\u2014massive amounts of information from a lot of different users that help them see big-picture trends. It\u2019s less about the individual user and more about analytics. To put it into context, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId337\" href=\"https:\/\/hbr.org\/2012\/10\/big-data-the-management-revolution\"><span class=\"import-url\">this article<\/span><\/a><\/span> in the <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Harvard Business Review<\/em><\/span> says that Walmart collects 2.5 petabytes of information every hour based solely on customer transactions (McAfee and Brynjolfsson). Since a petabyte is \u201c20 million filing cabinets worth of text,\u201d that means Walmart can fill 50 million filing cabinets in the course of an hour, and that doesn\u2019t count the information collected through cookies and other surveillance tools.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">IoT.<\/strong><\/span> Let\u2019s look at one last category\u2014Internet of Things devices. These are smart devices that connect to the internet and can then be controlled by our phones. Home security systems, garage doors, heating and cooling systems, medical sensors, smart watches, digital assistants like Alexa, doorbell cameras, and so on are all IoT devices that collect data. Some of the information is logged right away when you initialize the product and create a user profile, but most of the information is created through your <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId338\" href=\"https:\/\/www.wired.com\/insights\/2015\/03\/internet-things-data-go\/\"><span class=\"import-url\">ongoing use of the product<\/span><\/a><\/span> (McFadin). This includes information about the product and its status, the surrounding environment, and usage.<\/p>\r\n\r\n<div class=\"textbox textbox--exercises\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span class=\"import-sbhn\">Activity 4.1<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nThis section includes many of the most common forms of surveillance and data collection. Make a list of the surveillance technologies that you encounter each day\u2014whether on your personal devices or in public spaces.\r\n\r\nAfter you make your list, separate them into two lists\u2014one for what you consider to be acceptable or even beneficial uses of surveillance and one for what you consider to be too intrusive or threatening in some way. Consider your rationale for what constitutes positive surveillance (if anything) and what types of activities cross the line.\r\n\r\n<\/div>\r\n<\/div>\r\n<h1 class=\"import-ah\">Commercialization and Behavior Modification<\/h1>\r\n<p class=\"import-paft\">By now it\u2019s probably pretty clear that surveillance capitalism is about power and profit. Thinking back to Foucault\u2019s theory of the panopticon and the psychological effects that surveillance has on an individual, surveillance is a mechanism of control because it creates \u201cdocile\u201d bodies who have become conditioned to behave in desirable ways, typically submitting to authority and accepting certain behaviors (and identities) as \u201cnormal.\u201d Once people are conditioned in this way, it\u2019s easy to capitalize on their perceptions and values to create market demand for certain products and to influence buying behaviors. Organizations in every industry collect information about people\u2019s experiences and turn it into data that can be leveraged to make predictions about what they will do. The more relevant the advertising is to an individual, based on their demographics, interests, location, and so on, the more likely they are to buy the product. In an <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId339\" href=\"https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/\"><span class=\"import-url\">interview<\/span><\/a><\/span> about her book on surveillance capitalism, Zuboff explains,<\/p>\r\n<p class=\"import-bqs\" style=\"margin-left: 18pt; margin-right: 18pt; text-indent: 0pt;\">The opportunities to align supply and demand around the needs of individuals were overtaken by a new economic logic that offered a fast track to monetization.\u2026This economic logic has now spread beyond the tech companies to new surveillance-based ecosystems in virtually every economic sector, from insurance to automobiles to health, education, finance, to every product described as \u201csmart\u201d and every service described as \u201cpersonalized.\u201d<\/p>\r\n<p class=\"import-pcon\">Zuboff demonstrates the pervasiveness of surveillance capitalism with the recent discovery that even breathing machines are collecting data about people with sleep apnea. Health insurance companies receive that data and then use it for their own benefit, usually to deny or reduce coverage.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">It would be impossible to trace all of the ways that surveillance capitalism either makes or saves (as in the example above) companies money, but a few statistics might help put the growth of surveillance capitalism and digital advertising in perspective:<\/p>\r\n\r\n<ul>\r\n \t<li class=\"import-blf\">From 2001 to 2020, digital advertising <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId340\" href=\"https:\/\/evangelicalfocus.com\/jubilee-centre\/13158\/surveillance-capitalism-the-hidden-costs-of-the-digital-revolution\"><span class=\"import-url\">has grown by more than 40%<\/span><\/a><\/span> (Ebsworth et al.).<\/li>\r\n \t<li class=\"import-bl\">In 2021, digital advertising rose <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId341\" href=\"https:\/\/www.oberlo.com\/statistics\/digital-ad-spend\"><span class=\"import-url\">nearly 30%<\/span><\/a><\/span> from the previous year, making the largest annual growth in history (Oberlo). The total spent on digital advertising that year was more than $520 billion worldwide.<\/li>\r\n \t<li class=\"import-bl\">Google, Amazon, and Facebook receive the bulk (two-thirds) of these advertising dollars.<\/li>\r\n \t<li class=\"import-bll\"><span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId342\" href=\"https:\/\/evangelicalfocus.com\/jubilee-centre\/13158\/surveillance-capitalism-the-hidden-costs-of-the-digital-revolution\"><span class=\"import-url\">Amazon\u2019s income<\/span><\/a><\/span> from advertising doubles every two years ($14.1 billion in 2019). In 2020, Google made $147 billion in advertising. In that same year, Facebook made $86 billion, totaling 98% of its income (Ebsworth et al.).<\/li>\r\n<\/ul>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Certainly, surveillance capitalism has proven to be popular, which is why it has grown so quickly. However, the major concern stems from two interrelated issues:<\/p>\r\n\r\n<ul>\r\n \t<li class=\"import-blf\"><span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId343\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1045235421001155\"><span class=\"import-url\">Invasion of privacy<\/span><\/a><\/span>. As much of this chapter has demonstrated, surveillance capitalism is clandestine (Andrew et al.). While people create Facebook and Google accounts because they believe these services are created <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">for<\/em><\/span> their benefit, they are often unaware that their profile information and online activities are tracked so that commercial entities can commodity their experiences and inundate them with advertising. Lots of different applications and smart devices have access to data that many people couldn\u2019t imagine, and much of it is sensitive data that they wouldn\u2019t want to be collected\u2014and they certainly wouldn\u2019t want it to be shared and exploited.<\/li>\r\n \t<li class=\"import-bll\">Behavior modification. Researchers like Zuboff claim that surveillance capitalism not only predicts what we will do but it can actually alter the choices that we make through consistent yet subtle messaging that rewards us for certain behaviors and thus conditions us toward preset outcomes. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId344\" href=\"https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/\"><span class=\"import-url\">Zuboff<\/span><\/a><\/span> puts it this way: \u201cThe shift is from monitoring to what the data scientists call \u201cactuating.\u201d Surveillance capitalists now develop \u201ceconomies of action,\u201d as they learn to tune, herd, and condition our behavior with subtle and subliminal cues, rewards, and punishments that shunt us toward their most profitable outcomes.\u201d<\/li>\r\n<\/ul>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Behavior modification goes hand in hand with surveillance. As companies collect more data about us, they are able to create better algorithms and ultimately make better predictions. This is largely dependent, however, on people\u2019s increasing engagement with digital media. Nir Eyal\u2019s book <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Hooked: How to Build Habit-Forming Products<\/em><\/span> explains the way that companies intentionally create addictions to products through a system of \u201ctriggers\u201d (prompting users to use the product) and \u201crewards\u201d (based on the user\u2019s compliance with the trigger). As Ebsworth et al. explain, \u201cIncreasing engagement via the hook model provides both a constant source of behavioural data and a committed audience for advertisements.\u201d In other words, as engagement (and addiction) increase, free will and freedom of thought would diminish as people are \u201cconditioned,\u201d \u201ctuned,\u201d and \u201cherded\u201d to make specific buying choices. As Foucault would say, they have become \u201cdocile\u201d bodies.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Importantly, the concern about behavior modification is about more than just how people spend their money. It\u2019s also about ideologies and political choices. Political parties and interest groups can use data collection to steer people toward certain websites and information and use a similar system of rewards and punishments to direct their attention as well as their ways of thinking. \u201cPolitical partisans, including shadowy private interests and foreign governments, promise to swing voters and elections with microtargeted social media campaigns\u201d (Lauer and Lipartito 1). Some notable examples include the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId345\" href=\"https:\/\/www.nytimes.com\/2018\/04\/04\/us\/politics\/cambridge-analytica-scandal-fallout.html\"><span class=\"import-url\">Cambridge Analytica scandal<\/span><\/a><\/span> noted above and also more recent attempts to <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId346\" href=\"https:\/\/www.miaminewtimes.com\/news\/republicans-capitalize-on-fear-of-communism-in-florida-cuban-communities-15669381\"><span class=\"import-url\">influence Cuban voters in <\/span><span class=\"import-url\">S<\/span><span class=\"import-url\">outh Florida<\/span><\/a><\/span> with propaganda that positions Democrats as communists (Kapnick; <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId347\" href=\"https:\/\/www.cnn.com\/2022\/11\/05\/politics\/florida-election-lies-spanish-language\/index.html\"><span class=\"import-url\">O\u2019Sullivan and Sands<\/span><\/a><\/span>).<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Employers also use surveillance technologies to control behaviors. Systems for clocking in and out, video cameras in public workspaces, and software that monitors employee activities on work computers and cell phones all have the effect of keeping employees in line so that they can keep their jobs and perhaps be rewarded with promotions or pay increases. This is exactly the kind of surveillance and control that ties directly to Foucault\u2019s panopticon. People modify their behaviors to avoid punishment (or gain a reward), and over time as they internalize the gaze of the \u201cguard\u201d (in this case, the employer, but it could also be a teacher, government official, religious leader, etc.), their ways of thinking and being begin to shift in ways that benefit the authorities in charge.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Importantly, while everyone in society is surveilled to some degree, it is always the populations with the least amount of power\u2014those who are already marginalized\u2014who are surveilled to the greatest extreme: welfare recipients, people of color, immigrants, working-class employees, criminals, and women. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId348\" href=\"https:\/\/tcf.org\/content\/report\/disparate-impact-surveillance\/?session=1\"><span class=\"import-url\">Gellman and Adler-Bell<\/span><\/a><\/span> explain it like this:<\/p>\r\n<p class=\"import-bqs\" style=\"margin-left: 18pt; margin-right: 18pt; text-indent: 0pt;\">Privacy scholars speak of philosophical rights and hypothetical risks; privacy-minded middle class Americans fear allowing the government too much access to their electronic trails. But there is nothing abstract about the physical, often menacing, intrusions into less fortunate neighborhoods, where mere presence in a \u201chigh-crime\u201d area is grounds for detention, search, and questioning by police. At age sixty-five, tens of millions of Americans claim their Medicare benefits with nothing more eventful than completion of some forms. (Medicare.gov even promises to \u201cprotect your privacy by getting rid of the information you give us when you close the browser.\u201d) An impoverished single mother on Medicaid faces mortifying questions, face-to-face with benefit managers, about her lovers, hygiene, parental shortcomings, and personal habits.<\/p>\r\n<p class=\"import-pcon\">Their point is that surveillance capitalism affects everyone but not to the same degree. Its prevalence in our society has had real consequences for minorities, putting them under higher levels of scrutiny, finding reasons to inflict \u201cpunishments,\u201d and perpetuating discriminatory practices and injustices.<\/p>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">You might wonder what all of this has to do with digital writing. In some ways, it\u2019s maybe more geared toward digital <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">literacy<\/em><\/span>, understanding how to use digital media and the consequences of your choices. This critical unit is about complicating the overly simplistic and utopian views of digital media as unequivocally progressive and beneficial. It\u2019s about lifting the veil to examine the more negative effects of digital media, which will hopefully lead to more informed and intentional engagement. Also, as we\u2019ll see in the third section of the book related to functional literacy, digital writers do participate in surveillance practices. SEO is based exclusively on behavioral data\u2014how people search for information and what they do as they travel across the internet. Digital writers use that data to write copy that will capture users\u2019 attention. They also use analytics to assess the effects of their SEO practices, and they use lead generation to send email campaigns and targeted social media ads to people\u2014some who may have opted in to receive updates and ads, but many who haven\u2019t. Critical literacy means thinking more deeply about these practices and their ethical and social\u2014not just financial\u2014consequences in order to make informed choices.<\/p>\r\n\r\n<h1 class=\"import-ah\">Protecting Your Privacy<\/h1>\r\n<p class=\"import-paft\">While it\u2019s impossible to navigate online spaces and remain completely off the grid, there are some important ways that you can control\/limit the types of information that businesses can collect about you. You can\u2014and should\u2014take important steps to protect your privacy, your data, and your accounts from cybercriminals. This final section of the chapter lists some basic things that you can do.<\/p>\r\n\r\n<ul>\r\n \t<li class=\"import-blf\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Create strong passwords.<\/strong><\/span> Probably the best thing you can do to protect your private information from hackers is to create passwords that they can\u2019t guess. That means that they should be long and have a variety of upper and lowercase letters in addition to numbers and symbols. You should also have different passwords for different accounts. That might be a lot of passwords to keep track of, but there are password managers available that generate strong passwords, help you keep track of the passwords for your different accounts, and monitor your accounts for data breaches. A couple of common data managers are <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId349\" href=\"https:\/\/1password.com\"><span class=\"import-url\">1Password<\/span><\/a><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId350\" href=\"https:\/\/www.logmeonce.com\"><span class=\"import-url\">LogMeOnce<\/span><\/a><\/span>, and <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId351\" href=\"https:\/\/www.dashlane.com\"><span class=\"import-url\">Dashlane<\/span><\/a><\/span>. Of course, you\u2019d want to make sure that if you use a password manager, your \u201cmaster password\u201d for that account is strong.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Use <\/strong><strong class=\"import-b\">t<\/strong><strong class=\"import-b\">wo-<\/strong><strong class=\"import-b\">f<\/strong><strong class=\"import-b\">actor <\/strong><strong class=\"import-b\">a<\/strong><strong class=\"import-b\">uthentication.<\/strong><\/span> Many accounts are moving toward requiring two-factor authentication, which only grants you access to your account when you provide two pieces of evidence that you own the account, including a password in addition to a temporary passcode, facial recognition, a fingerprint, or an answer to a security question. This is a great way to prevent unauthorized users from gaining access to your accounts. You can also enable two-factor authorization on some of your accounts, including your Apple ID, Google, Facebook, X, and banking websites. Check your account settings to see what types of security features are available.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Install a browser extension.<\/strong><\/span> As this chapter discusses, companies and other organizations can collect more information about you than you might realize based on your browsing history. A browser extension like <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId352\" href=\"https:\/\/github.com\/gorhill\/uBlock\"><span class=\"import-url\">uBlock Origin<\/span><\/a><\/span> is designed to prevent this data collection as well as the targeted ads that are generated as a result. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId353\" href=\"https:\/\/privacybadger.org\/\"><span class=\"import-url\">Privacy Badger<\/span><\/a><\/span> is another web extension that prevents trackers and targeted ads.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Cover your camera.<\/strong><\/span> It\u2019s easier than you might think to install software on your computer that will take over your camera and collect private footage. An easy way to avoid that happening is to put a sticker over your camera.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Opt out of targeted ads.<\/strong><\/span> Platforms like <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId354\" href=\"https:\/\/support.apple.com\/en-us\/HT202074\"><span class=\"import-url\">Apple<\/span><\/a><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId355\" href=\"https:\/\/www.facebook.com\/help\/568137493302217\"><span class=\"import-url\">Facebook<\/span><\/a><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId356\" href=\"https:\/\/support.google.com\/ads\/answer\/2662922?hl=en\"><span class=\"import-url\">Google<\/span><\/a><\/span>, and <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId357\" href=\"https:\/\/business.twitter.com\/en\/help\/ads-policies\/product-policies\/interest-based-opt-out-policy.html\"><span class=\"import-url\">X<\/span><\/a><\/span> allow you to disable interest ads in your account settings, which will help cut down on the amount of targeted ads that you receive. You can also use this <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId358\" href=\"https:\/\/simpleoptout.com\/\"><span class=\"import-url\">Simple Opt Out<\/span><\/a><\/span> website to prevent similar data collection and ad targeting from numerous other organizations. Since you are \u201copted in\u201d by default, you\u2019ll have to manually opt out of any sort of data collection.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Consider a <\/strong><strong class=\"import-b\">v<\/strong><strong class=\"import-b\">irtual <\/strong><strong class=\"import-b\">p<\/strong><strong class=\"import-b\">rivate <\/strong><strong class=\"import-b\">n<\/strong><strong class=\"import-b\">etwork (VPN).<\/strong><\/span> If you often connect to public Wi-Fi, a VPN can create a more secure connection by encrypting your data and hiding your IP address so that your internet service provider and other third-party organizations can\u2019t track your activities or see your information.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Use antivirus software.<\/strong><\/span> Once your device has been \u201cinfected\u201d with a virus, it\u2019s incredibly difficult to recover. Antivirus software adds another layer of protection that will help prevent viruses and other malicious software. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId359\" href=\"https:\/\/support.microsoft.com\/en-us\/windows\/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963\"><span class=\"import-url\">Windows Defender<\/span><\/a><\/span> is built into Windows automatically. Similarly, Mac computers have browser extensions and other security built in. You could always add another layer of security, such as <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId360\" href=\"https:\/\/us.norton.com\/\"><span class=\"import-url\">Norton Antivirus<\/span><\/a><\/span> or <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId361\" href=\"https:\/\/www.malwarebytes.com\/\"><span class=\"import-url\">Malwarebytes<\/span><\/a><\/span>. It\u2019s also important that as updates are made available for your browser, apps, and home devices, you install the latest version, which often has improved security features designed specifically for the latest threats.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Enable remote tracking on your phone.<\/strong><\/span> If you lose your phone, it\u2019s important to make sure that your data doesn\u2019t fall into the wrong hands. To enable remote tracking, you must first set up a pin number and\/or biometric login (i.e., facial or fingerprint recognition). You can then activate your phone\u2019s remote tracking feature, which will allow you to identify where your phone is and, if necessary, delete all of its data from a remote location.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Beware of phishing scams.<\/strong><\/span> Increasingly, scammers are targeting people through their emails and text messages, often posing as someone that you might know and encouraging you to click a specific link or download a file. Never click on a link in an email or text message unless you are certain it\u2019s legitimate. You can hover over the link to see for sure what the URL is and if it matches the location where it says it will take you. Lots of misspellings and invalid email addresses or phone numbers are also red flags. You\u2019d also avoid downloading unknown files unless you verify with the person who sent it about what it is. These are common ways that criminals spread malware that can lock you out of your device.<\/li>\r\n \t<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Encrypt the information on your laptop.<\/strong><\/span> It\u2019s also possible to enable encryption on your laptop so that if it\u2019s ever lost or stolen, your data can\u2019t be accessed because it will come up as gibberish. For Mac users, this encryption tool is called <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId362\" href=\"https:\/\/support.apple.com\/guide\/mac-help\/encrypt-mac-data-with-filevault-mh11785\/mac\"><span class=\"import-url\">FileVault<\/span><\/a><\/span> and can be turned on in the system preferences menu. For PC users, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId363\" href=\"https:\/\/mashable.com\/article\/how-to-encrypt-computer-windows-mac\"><span class=\"import-url\">device encryption<\/span><\/a><\/span> is available under the settings menu, under \u201cUpdates &amp; Security\u201d (Morse).<\/li>\r\n \t<li class=\"import-bll\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Be discerning.<\/strong><\/span> You want to keep your phone number and email address as private as possible. Don\u2019t give them out unless you have to, and if you do have to give an email address to sign up for coupons or some other perk, it\u2019s helpful to have a secondary \u201cburner\u201d email address devoted to spam. That way, if the account does get hacked, it doesn\u2019t include a lot of personal information about you, and it\u2019s not connected to your important accounts. You should also make sure your settings on social media and other accounts are set to \u201cprivate\u201d and that you don\u2019t share sensitive information or photos over social media, email, or text messaging that could be damaging if they fell into the wrong hands.<\/li>\r\n<\/ul>\r\n<p class=\"import-p\" style=\"text-indent: 36pt;\">As you can see, these guidelines relate to privacy in a variety of ways\u2014from targeted ads and data collection prompted by businesses and tech companies to data breaches from hackers looking to steal your private information. Though you won\u2019t be able to block all forms of surveillance that have become so prominent in our society, taking a few easy steps and being smart about the information that you share will help you take control over your data and provide a measure of protection from the invisible forces that have a stake in tracking your digital activities.<\/p>\r\n\r\n<div class=\"textbox textbox--exercises\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span class=\"import-sbhn\">Activity 4.2<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nThis section provided lots of helpful, and fairly easy, ways that you can protect your information. This activity is simple: See how many of the security measures you can complete on your phone or laptop in the course of 15 or 20 minutes. Many of them require a simple security adjustment or a change to your account preferences.\r\n\r\nFor those that are more complex\u2014researching VPNs and browser extensions, for instance\u2014do some research about your options, including features, cost, and consumer ratings. Compile a list of your top options.\r\n\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox textbox--examples\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Discussion Questions<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ol>\r\n \t<li>Look again at the introduction to this chapter and the analogy of the manila folder as it relates to today\u2019s more complex data collection. How did the manila folder and other organization systems make surveillance possible? Why is it fitting that the manila folder is sometimes seen as a symbol of oppression?<\/li>\r\n \t<li>The chapter states in several places that data collection has the power to control behaviors in various ways. What does this mean? In what ways does surveillance influence people\u2019s behaviors?<\/li>\r\n \t<li>What is a panopticon, as described by Foucault? How does the metaphor of the panopticon relate to current surveillance practices in our culture?<\/li>\r\n \t<li>Which types of institutions perform this type of \u201cpanopticon\u201d surveillance? Name as many as you can think of.<\/li>\r\n \t<li>What does the \u201ccapitalism\u201d in \u201csurveillance capitalism\u201d refer to? How do companies make money off surveillance practices?<\/li>\r\n \t<li>What are some key historical events that perpetuated surveillance capitalism as we experience it today?<\/li>\r\n \t<li>This chapter mentions several ways that your data are collected. Which ones were you already familiar with? Which ones were a surprise?<\/li>\r\n \t<li>How do data collection and targeted advertising relate to behavior modification? What are some basic activities that organizations want to \u201cnudge\u201d people to do? Can you think of any specific examples of this type of nudging?<\/li>\r\n \t<li>Why is surveillance capitalism such a concern?<\/li>\r\n \t<li>What are some basic ways that you can protect your own personal data?<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Sources<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">1Password. \u201cThe World\u2019s Most Loved Password Manager.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">1Password.com<\/em><\/span>, n.d., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId364\" href=\"https:\/\/1password.com\/?cjevent=f514c3e6303e11ed8099006f0a82b832&amp;utm_medium=affiliate&amp;utm_source=Wirecutter+Inc.&amp;utm_campaign=3512519&amp;utm_content=5513721&amp;utm_term=1password.com&amp;cjdata=MXxOfDB8WXww\"><span class=\"import-url\">https:\/\/1password.com<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">ABC News. \u201cLocker Room Cameras Expose School to Suit.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ABC News<\/em><\/span>, 16 July 2003, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId365\" href=\"https:\/\/abcnews.go.com\/US\/story?id=90486&amp;page=1\"><span class=\"import-url\">https:\/\/abcnews.go.com\/US\/story?id=90486&amp;page=1<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Andrew, Jane, et al. \u201cData Breaches in the Age of Surveillance Capitalism: Do Disclosures Have a New Role to Play?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Critical Perspectives on Accounting<\/em><\/span>, vol. 86, 7 Dec. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId366\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1045235421001155\"><span class=\"import-url\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1045235421001155<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Apple. \u201cControl Personalized Ads on the App Store, Apple News, and Stocks.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Apple.com<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId367\" href=\"https:\/\/support.apple.com\/en-us\/HT202074\"><span class=\"import-url\">https:\/\/support.apple.com\/en-us\/HT202074<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Apple Store. \u201cGmail-Email by Google.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Apple.com<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId368\" href=\"https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480\"><span class=\"import-url\">https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Banks, Adam. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Race, Rhetoric, and Technology: Searching for Higher Ground<\/em><\/span>. Routledge, 2005.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Bristow, David L. \u201cHow Filing Cabinets Changed the World.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">History Nebraska<\/em><\/span>, 24 Feb. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId369\" href=\"https:\/\/history.nebraska.gov\/blog\/how-filing-cabinets-changed-world\"><span class=\"import-url\">https:\/\/history.nebraska.gov\/blog\/how-filing-cabinets-changed-world<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Consumer Watchdog. \u201cHow Google and Amazon Are \u2018Spying\u2019 on You.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ConsumerWatchdog.org, 2022<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId370\" href=\"https:\/\/www.consumerwatchdog.org\/privacy-technology\/how-google-and-amazon-are-spying-you\"><span class=\"import-url\">https:\/\/www.consumerwatchdog.org\/privacy-technology\/how-google-and-amazon-are-spying-you<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Dashlane. \u201cDashlane.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId371\" href=\"https:\/\/www.dashlane.com\/stopcyberattacks?utm_source=CM&amp;utm_medium=affiliates&amp;utm_campaign=tier2a&amp;gclid=Cj0KCQjwyOuYBhCGARIsAIdGQROscAQuFmYZ95AdSCleAiIKARDmvUjDqPtIogiPsbCgDbXX4M4CaXwaAiYzEALw_wcB\"><span class=\"import-url\">https:\/\/www.dashlane.com<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ebsworth, Jonathan, et al. \u201cSurveillance Capitalism: The Hidden Costs of the Digital Revolution.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Evangelical Focus Europe<\/em><\/span>, 7 Sept. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId372\" href=\"https:\/\/evangelicalfocus.com\/jubilee-centre\/13158\/surveillance-capitalism-the-hidden-costs-of-the-digital-revolution\"><span class=\"import-url\">https:\/\/evangelicalfocus.com\/jubilee-centre\/13158\/surveillance-capitalism-the-hidden-costs-of-the-digital-revolution<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Erickson, Alexa. \u201cThe Real Likelihood You\u2019re Being Watched through Your Laptop Computer.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Reader\u2019s Digest<\/em><\/span>, 1 Apr. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId373\" href=\"https:\/\/www.rd.com\/article\/laptop-camera\/\"><span class=\"import-url\">https:\/\/www.rd.com\/article\/laptop-camera\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Evans, Joseph B. \u201cCell Phone Forensics: Powerful Tools Wielded by Federal Investigators.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Fordham Journal of Corporate and Financial Law<\/em><\/span>, 2 June 2016, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId374\" href=\"https:\/\/news.law.fordham.edu\/jcfl\/2016\/06\/02\/cell-phone-forensics-powerful-tools-wielded-by-federal-investigators\/\"><span class=\"import-url\">https:\/\/news.law.fordham.edu\/jcfl\/2016\/06\/02\/cell-phone-forensics-powerful-tools-wielded-by-federal-investigators\/#:~:text=Cellular%20service%20providers%20retain%20records,very%20long%2C%20if%20at%20all<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Eyal, Nir. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Hooked: How to Build Habit-Forming Products<\/em><\/span>. Penguin Publishing Group, 2014.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Facebook. \u201cHow Can I Adjust How Ads on Facebook are Shown To Me Based on Data about My Activity from Partners?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Facebook.com<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId375\" href=\"https:\/\/www.facebook.com\/help\/568137493302217\"><span class=\"import-url\">https:\/\/www.facebook.com\/help\/568137493302217<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Foucault, Michel. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Discipline &amp; Punish: The Birth of the Prison<\/em><\/span>. Vintage Books, 1975.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Gellman, Barton, and Sam Adler-Bell. \u201cThe Disparate Impact of Surveillance.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Century Foundation<\/em><\/span>, 21 Dec. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId376\" href=\"https:\/\/tcf.org\/content\/report\/disparate-impact-surveillance\/?session=1\"><span class=\"import-url\">https:\/\/tcf.org\/content\/report\/disparate-impact-surveillance\/?session=1<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Google. \u201cBlock Certain Ads.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Google Support<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId377\" href=\"https:\/\/support.google.com\/ads\/answer\/2662922?hl=en\"><span class=\"import-url\">https:\/\/support.google.com\/ads\/answer\/2662922?hl=en<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cGMail\u2014Email By Google.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Google<\/em><\/span>, n.d., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId378\" href=\"https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480\"><span class=\"import-url\">https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cHow Google Uses Cookies.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Google Terms &amp; Privacy<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId379\" href=\"https:\/\/policies.google.com\/technologies\/cookies?hl=en-US\"><span class=\"import-url\">https:\/\/policies.google.com\/technologies\/cookies?hl=en-US<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Jones, Meg Leta. \u201cSurveillance Capitalism Online: Cookies, Notice and Choice, and Web Privacy.\u201d in <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Surveillance Capitalism in America<\/em><\/span>, edited by Josh Lauer and Kenneth Lipartito, University of Pennsylvania Press, 2021.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">King, Evan Thomas. \u201cHow Google and Amazon Are \u2018Spying\u2019 On You.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Consumer Watchdog<\/em><\/span>, 15 Dec. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId380\" href=\"https:\/\/consumerwatchdog.org\/uncategorized\/how-google-and-amazon-are-spying-you\/\"><span class=\"import-url\">https:\/\/consumerwatchdog.org\/uncategorized\/how-google-and-amazon-are-spying-you\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Laidler, John. \u201cIn New Book, Business School Professor Emerita Says Surveillance Capitalism Undermines Autonomy\u2014and Democracy.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Harvard Business Review<\/em><\/span>, 4 Mar. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId381\" href=\"https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/\"><span class=\"import-url\">https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lauer, Josh and Kenneth Lipartito. \u201cIntroduction\u201d in <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Surveillance Capitalism in America<\/em><\/span>, edited by Josh Lauer and Kenneth Lipartito, University of Pennsylvania Press, 2021.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lee, Nicol, and Caitlin Chin. \u201cPolice Surveillance and Facial Recognition: Why Data Privacy is Imperative for Communities of Color.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Brookings<\/em><\/span>, 12 Apr. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId382\" href=\"https:\/\/www.brookings.edu\/research\/police-surveillance-and-facial-recognition-why-data-privacy-is-an-imperative-for-communities-of-color\/\"><span class=\"import-url\">https:\/\/www.brookings.edu\/research\/police-surveillance-and-facial-recognition-why-data-privacy-is-an-imperative-for-communities-of-color\/#:~:text=In%20fact%2C%20surveillance%20and%20data,current%20circumstances%20and%20political%20regimes<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lieberman, Mark. \u201cMassive Shift to Remote Learning Prompts Big Data Privacy Concerns.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Edweek.org<\/em><\/span>, 27 Mar. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId383\" href=\"https:\/\/www.edweek.org\/technology\/massive-shift-to-remote-learning-prompts-big-data-privacy-concerns\/2020\/03\"><span class=\"import-url\">https:\/\/www.edweek.org\/technology\/massive-shift-to-remote-learning-prompts-big-data-privacy-concerns\/2020\/03<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">LogMeOnce. \u201cAll-In-One Security Platform.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">LogMeOnce.com<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId384\" href=\"https:\/\/www.logmeonce.com\/?sscid=91k6_91mdv\"><span class=\"import-url\">https:\/\/www.logmeonce.com<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lui, Claire. \u201cThe Manila Envelope: The Inspiration Behind an Exhibition\u2019s Graphic Identity.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Guggenheim.org<\/em><\/span>, 2 Apr. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId385\" href=\"https:\/\/www.guggenheim.org\/blogs\/checklist\/a-manila-envelope-the-inspiration-behind-an-exhibitions-graphic-identity\"><span class=\"import-url\">https:\/\/www.guggenheim.org\/blogs\/checklist\/a-manila-envelope-the-inspiration-behind-an-exhibitions-graphic-identity<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">McAfee, Andrew, and Erik Brynjolfsson. \u201cBig Data: The Management Revolution.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Harvard Business Review<\/em><\/span>, Oct. 2012, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId386\" href=\"https:\/\/hbr.org\/2012\/10\/big-data-the-management-revolution\"><span class=\"import-url\">https:\/\/hbr.org\/2012\/10\/big-data-the-management-revolution<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">McFadin, Patrick. \u201cInternet of Things: Where Does the Data Go?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Wired<\/em><\/span>, 2018, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId387\" href=\"https:\/\/www.wired.com\/insights\/2015\/03\/internet-things-data-go\/\"><span class=\"import-url\">https:\/\/www.wired.com\/insights\/2015\/03\/internet-things-data-go\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Malwarebytes. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId388\" href=\"https:\/\/www.malwarebytes.com\/\"><span class=\"import-url\">https:\/\/www.malwarebytes.com\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Metz, Rachel. \u201cYes, Tech Companies May Listen When You Talk to Your Virtual Assistant. Here\u2019s Why That\u2019s Not Likely to Stop.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">CNN.com<\/em><\/span>, 19 Aug. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId389\" href=\"https:\/\/www.cnn.com\/2019\/08\/19\/tech\/siri-alexa-people-listening\"><span class=\"import-url\">https:\/\/www.cnn.com\/2019\/08\/19\/tech\/siri-alexa-people-listening<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Microsoft. \u201cWhat Protected with Windows Security.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Microsoft.com<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId390\" href=\"https:\/\/support.microsoft.com\/en-us\/windows\/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963\"><span class=\"import-url\">https:\/\/support.microsoft.com\/en-us\/windows\/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Morse, Jack. \u201cHow to Encrypt Your Computer (and Why You Should).\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Mashable.com<\/em><\/span>, 14 Aug. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId391\" href=\"https:\/\/mashable.com\/article\/how-to-encrypt-computer-windows-mac\"><span class=\"import-url\">https:\/\/mashable.com\/article\/how-to-encrypt-computer-windows-mac#:~:text=How%20to%20encrypt%20a%20Windows,encryption%20option%2C%20select%20Turn%20on<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Norton Antivirus. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId392\" href=\"https:\/\/us.norton.com\/\"><span class=\"import-url\">https:\/\/us.norton.com\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Oberlo. \u201cDigital Ad Spend (2021\u20132026).\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Oberlo.com<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId393\" href=\"https:\/\/www.oberlo.com\/statistics\/digital-ad-spend\"><span class=\"import-url\">https:\/\/www.oberlo.com\/statistics\/digital-ad-spend#:~:text=Digital%20Advertising%20Growth,expected%20to%20continue%20in%202023<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ong, Walter. \u201cThe Writer\u2019s Audience is Always a Fiction.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">PMLA<\/em><\/span>, vol. 90, no. 1, 1975, pp. 9\u201321, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId394\" href=\"https:\/\/www.jstor.org\/stable\/461344\"><span class=\"import-url\">https:\/\/www.jstor.org\/stable\/461344<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ren, Jingjing, et al. \u201cInformation Exposure from Consumer IoT Devices: A Multidimensional Network-Informed Measurement Approach.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">IMC, Proceedings from the Internet <\/em><em class=\"import-i\">Measurement Conference<\/em><\/span>, 2019, pp. 267\u2013269, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId395\" href=\"https:\/\/moniotrlab.ccis.neu.edu\/wp-content\/uploads\/2019\/09\/ren-imc19.pdf\"><span class=\"import-url\">https:\/\/moniotrlab.ccis.neu.edu\/wp-content\/uploads\/2019\/09\/ren-imc19.pdf<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Salvucci, Jeremy. \u201cWhat Was the Dot-Com Bubble &amp; Why Did It Burst?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Street<\/em><\/span>, 12 Jan 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId396\" href=\"https:\/\/www.thestreet.com\/dictionary\/d\/dot-com-bubble-and-burst\"><span class=\"import-url\">https:\/\/www.thestreet.com\/dictionary\/d\/dot-com-bubble-and-burst<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Schabner, Dean. \u201cLocker Room Cameras Expose School to Suit.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ABCnews.com<\/em><\/span>, 16 July 2003, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId397\" href=\"https:\/\/abcnews.go.com\/US\/story?id=90486&amp;page=1\"><span class=\"import-url\">https:\/\/abcnews.go.com\/US\/story?id=90486&amp;page=1<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Simple Opt Out. \u201cOpt Out of the Data Sharing You Wouldn\u2019t Opt in to.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Simple OptOut.com<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId398\" href=\"https:\/\/simpleoptout.com\/\"><span class=\"import-url\">https:\/\/simpleoptout.com\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Tucker, Jamey. \u201cVoice Assistants Are Always Listening. Should You Be Worried?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">What The Tech<\/em><\/span>, 8 Feb. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId399\" href=\"https:\/\/www.whatthetech.tv\/voice-assistants-are-always-listening-should-you-be-worried\/\"><span class=\"import-url\">https:\/\/www.whatthetech.tv\/voice-assistants-are-always-listening-should-you-be-worried\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Twitter. \u201cInterest-Based Opt-Out Policy.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Twitter Business<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId400\" href=\"https:\/\/business.twitter.com\/en\/help\/ads-policies\/product-policies\/interest-based-opt-out-policy.html\"><span class=\"import-url\">https:\/\/business.twitter.com\/en\/help\/ads-policies\/product-policies\/interest-based-opt-out-policy.html<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ublock Origin. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId401\" href=\"https:\/\/github.com\/gorhill\/uBlock\"><span class=\"import-url\">https:\/\/github.com\/gorhill\/uBlock<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Vigderman, Aliza, and Gabe Turner. \u201cWho Much Would You Sell Your Social Media Data for?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Security.org<\/em><\/span>, 22 July 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId402\" href=\"https:\/\/www.security.org\/blog\/how-much-would-you-sell-your-social-media-data-for\/\"><span class=\"import-url\">https:\/\/www.security.org\/blog\/how-much-would-you-sell-your-social-media-data-for\/#<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Weinstein, Adam. \u201cThe Government\u2019s Phone, Text, and Email Spying Explained.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ABCnews.com<\/em><\/span>, 7 June 2013, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId403\" href=\"https:\/\/abcnews.go.com\/ABC_Univision\/governments-phone-text-email-spying-explained\/story?id=19347440\"><span class=\"import-url\">https:\/\/abcnews.go.com\/ABC_Univision\/governments-phone-text-email-spying-explained\/story?id=19347440<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">West, Darrell M. \u201cHow Employers Use Technology to Surveil Employees.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Brookings.edu<\/em><\/span>, 5 Jan. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId404\" href=\"https:\/\/www.brookings.edu\/blog\/techtank\/2021\/01\/05\/how-employers-use-technology-to-surveil-employees\/\"><span class=\"import-url\">https:\/\/www.brookings.edu\/blog\/techtank\/2021\/01\/05\/how-employers-use-technology-to-surveil-employees\/<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">The White House. \u201cTechnology and Innovation.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Clinton-Gore Administration: A Record of Progress<\/em><\/span>, 2000, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId405\" href=\"https:\/\/clintonwhitehouse4.archives.gov\/WH\/Accomplishments\/technology.html\"><span class=\"import-url\">https:\/\/clintonwhitehouse4.archives.gov\/WH\/Accomplishments\/technology.html<\/span><\/a><\/span>.<\/p>\r\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Zuboff, Shoshana. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Age of Surveillance Capitalism<\/em><\/span>. Profile Books, 2019.<\/p>\r\n\r\n<\/div>\r\n<\/div>","rendered":"<p class=\"import-pf\">Take a second to consider the standard manila folder\u2014not the folder icons on your computer. We\u2019re going old school for just a moment to consider the <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">actual<\/em><\/span> folder with its simple, clean design and distinctive color. It has a tab that peeks out on the side so that you can label the contents of the folder and therefore easily organize and retrieve information, which is especially helpful if you have a lot of different types of information spread across multiple folders.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">It\u2019s a pretty simple concept, but information wasn\u2019t always organized this way, and as we\u2019ll discuss in this chapter, this type of data collection isn\u2019t always beneficial to everyone. In fact, it seems fitting that the manila folder is often considered a symbol of imperialism and oppression. Invented in the United States in the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId315\" href=\"https:\/\/www.guggenheim.org\/blogs\/checklist\/a-manila-envelope-the-inspiration-behind-an-exhibitions-graphic-identity\"><span class=\"import-url\">early nineteenth century<\/span><\/a><\/span>, manila paper originally came from a type of banana tree called acaba, which grew predominantly in the Philippines. When the United States colonized the Philippines, it took control of the acaba trade to ensure that it\u2014not the Filipinos\u2014would profit (Lui). The U.S. used the wood for a variety of purposes, including manila envelopes and paper.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">In its most basic form, surveillance is about collecting information about people so it can be easily retrieved and analyzed. Before filing cabinets were invented in 1890, information was written in ledger books or in loose bundles of paper, which made information less accessible because it was difficult to find specific information. The <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId316\" href=\"https:\/\/history.nebraska.gov\/blog\/how-filing-cabinets-changed-world\"><span class=\"import-url\">filing cabinet<\/span><\/a><\/span> revolutionized record management practices by making it possible to quickly retrieve a single document (Bristow). Soon, filing cabinets were a must in businesses across the country, and large storage facilities emerged with the singular purpose of securing large amounts of data. In other words, filing cabinets became foundational to the way that institutions managed systems\u2014and people. They were used to document identities, relationships, events, and transactions.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Now think about all of the folders out there somewhere that contain information about you\u2014medical records, academic transcripts and other test scores, employment evaluations, bank information, credit scores, tax records. It\u2019s obvious why privacy has become such an important issue. Everyone has personal information stored in files across various institutions. Sometimes we don\u2019t even know these files exist. Rarely do we know all of the information that the files contain or how the information was collected. It\u2019s a form of institutional power because it increases our visibility (and vulnerability). Individuals are provided opportunities\u2014or not\u2014based on the information in their files. Data collection also has the power to control behaviors. Think about standard employment practices that require workers to clock in and out, that mandate an annual employee evaluation, that put surveillance cameras in parking lots and workstations, or that require random drug testing. These are all ways of monitoring and managing the behaviors of employees, of creating systems of rewards and punishments based on the information in a person\u2019s file.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The digital age of computers, web browsers, and cloud-based computing and data storage expanded data collection practices. It\u2019s even easier to store and retrieve vast amounts of personal data. It\u2019s also possible to collect all kinds of user information without the users\u2019 explicit knowledge. That\u2019s what \u201c<span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId317\" href=\"https:\/\/policies.google.com\/technologies\/cookies?hl=en-US\"><span class=\"import-url\">cookies<\/span><\/a><\/span>\u201d do. When you visit a website and it requires you to \u201caccept cookies,\u201d a code is embedded in your browser\u2019s software that allows the website to collect information about your online activities and to recognize your computer when you revisit the site (Google, \u201cHow Google\u201d). Information about your preferences, profile information, browsing history, past purchases, and even your navigation path and time spent on individual pages is collected. Cookies also allow websites to track your activities across the internet, even when you aren\u2019t on that specific website. A robust user profile is developed about you\u2014your interests, activities, and identifying information\u2014all so that companies can create targeted ads and online experiences that will increase your chances of buying certain products and services.<\/p>\n<figure style=\"width: 213px\" class=\"wp-caption alignnone\"><img src=\"http:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-content\/uploads\/sites\/64\/2024\/01\/image13.png\" alt=\"Cartoon graphic of a surveillance camera\" width=\"213\" height=\"236\" \/><figcaption class=\"wp-caption-text\"><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:CCTV_Surveillance_Notice.svg\">CCTV Surveillance Notice<\/a>, by Amityadav8, on Wikimedia Commons <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">(CC BY-SA 3.0)<\/a><\/figcaption><\/figure>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The term \u201csurveillance capitalism\u201d refers to this collection of personal data for the purpose of financial gain or some other benefit related to power and control. In the introduction of <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Surveillance Capitalism<\/em><\/span>, Josh Lauer and Kenneth Lipartito define surveillance capitalism as a<\/p>\n<p class=\"import-bqs\" style=\"margin-left: 18pt; margin-right: 18pt; text-indent: 0pt;\">broad range of strategies and techniques, both formal and informal, that commercial actors\u2014including lenders, merchants, employers, managers, service providers, and others\u2014deploy to observe, record, predict, and control human behavior and relationships. The targets of such commercial surveillance typically include clients and customers, borrowers and buyers, staff and laborers (free and unfree), markets and competitors (5).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">It\u2019s a broad definition because surveillance is so prevalent throughout our daily lives. We\u2019re reminded in many parking lots, stores, schools, and government buildings that we are being recorded. Cameras also exist at many intersections and toll booths to ensure that people follow the rules. Many people have cameras on their doorbells and inside their homes so they can monitor the activities of visitors or maybe even their own pets or family members and prevent negative behaviors. Then there are the smartphones, smart watches, and GPS apps that track your location throughout the day. Our Siris, Alexas, and Google Assistants are listening devices that <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId319\" href=\"https:\/\/www.cnn.com\/2019\/08\/19\/tech\/siri-alexa-people-listening\"><span class=\"import-url\">record our dialogue<\/span><\/a><\/span>, which can be reviewed by tech companies themselves or third-party contractors (Metz). There is even some fear that our devices are listening to our conversations when we aren\u2019t using them. For instance, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId320\" href=\"https:\/\/moniotrlab.ccis.neu.edu\/wp-content\/uploads\/2019\/09\/ren-imc19.pdf\"><span class=\"import-url\">this study<\/span><\/a><\/span> examined 81 different Internet of Things devices and found that many of them surreptitiously transmit information to tech companies like Netflix, Amazon, and Google, even when the device isn\u2019t being used (Ren et al.).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Advancements in digital technology have made it easier than ever for organizations to secretly collect information, which has created a number of privacy concerns. This chapter explores the history of surveillance capitalism, identifies common surveillance practices, and examines how surveillance is often used not only to <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">predict<\/em><\/span> but also to <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">control<\/em><\/span> human behaviors. The chapter ends with basic guidelines for protecting your private information.<\/p>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Understand the history of surveillance and how different practices emerged over time as technologies became more advanced.<\/li>\n<li>Understand the connection between surveillance and power.<\/li>\n<li>Consider all of the different types of surveillance practices and the types of data that organizations are able to collect based on our digital devices.<\/li>\n<li>Learn how commercialization connects with surveillance and how companies use surveillance and metadata to not only predict but influence behavior.<\/li>\n<li>Consider why surveillance is such a concern for society.<\/li>\n<li>Learn practical ways to protect your own private information.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<h1 class=\"import-ah\">The History of Surveillance Capitalism<\/h1>\n<p class=\"import-paft\">As discussed in the previous section, the practice of compiling information into personal files has a long history that predates the advent of digital technology. Surveillance practices have an even longer, more complex history. Michel Foucault\u2019s 1975 book <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Discipline and Punish: The Birth of the Prison<\/em><\/span> has had a profound influence on our understanding of surveillance practices and the social consequences throughout history. In it, Foucault traces the rise of the prison system in eighteenth-century Europe. Before prisons emerged as the standard form of punishment for criminal behavior, people who were convicted of a crime were typically subjected to some sort of public torture or punishment. For instance, criminals might be put in the pillory or in stocks in the town square, which was intended to deter future crime from the individual as well as everyone else in town. When prisons emerged, however, punishment shifted from being mostly physical to being mostly psychological. Within the confines of the prison, every aspect of the prisoner\u2019s life was regimented, monitored, and controlled.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The panopticon is what made surveillance possible. Defined by its circular structure and a system of backlighting in each prison cell, the panopticon made it possible for a guard in the tower to monitor every movement that the prisoners made. They were constantly visible. The guard in the tower, on the other hand, was hidden. There were no lights in the tower to let prisoners know whether or not they were being watched; however, they knew it was always a possibility. So they had to constantly be on their best behavior to avoid punishment. Over time, the prisoners began to internalize the gaze of the guard and to monitor their own behaviors.<\/p>\n<figure style=\"width: 792px\" class=\"wp-caption alignnone\"><img src=\"http:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-content\/uploads\/sites\/64\/2024\/01\/image12.png\" alt=\"Inside one of the prison buildings at Presidio Modelo, Isla de la Juventud, Cuba.\" width=\"792\" height=\"530\" \/><figcaption class=\"wp-caption-text\"><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Presidio-modelo2.JPG\">Presidio Modelo 2<\/a>, by Friman on Wikimedia Commons <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">(CC BY-SA)<\/a><\/figcaption><\/figure>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The panopticon serves as a poignant metaphor for current surveillance practices. Just like the prisoners in the cells, everyone in society is subjected to different forms of surveillance that force their exposure\u2014making their behaviors, identities, and relationships visible. Meanwhile, the organizations that collect this information about us (the metaphorical guards in the tower) are largely invisible. We don\u2019t often see who specifically is collecting information about us, what that information is, or how it\u2019s being used. Even more significant is the psychological effect this surveillance has. Like the prisoners in their cells, most people don\u2019t know <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">if<\/em><\/span> they are being watched. They just know that it\u2019s <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">always<\/em><\/span> possible, so they also internalize the gaze of authority to monitor their own behaviors.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">A classic example might relate to traffic laws. Most of us monitor our own speed. We come to a full stop at a stop sign. We sit at an intersection waiting for the light to turn green even if there are no other cars at the intersection. It\u2019s always <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">possible<\/em><\/span> that a cop might be stationed nearby or that we are being filmed by a traffic camera somewhere, and because we don\u2019t want to get a speeding ticket or have our license revoked, we drive a little slower. We make the full stop. We wait for the light to turn at the empty intersection. Often we don\u2019t even consciously make these choices because the behaviors\u2014and often the underlying message about safety and good driving\u2014have become ingrained in our minds. The same is true for lots of activities we do all day long, even parts of our identities that we might typically think of as inherent. Foucault would argue that a complex system of surveillance, rewards, punishments, self-monitoring, and internalization is responsible for nearly all of our behaviors.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">While surveillance itself isn\u2019t new, the term \u201csurveillance capitalism\u201d typically refers to more recent practices related to digital technology and data collection, which emerged gradually once the internet shifted to a commercial enterprise run by a few private companies. You might recall from the first chapter that the World Wide Web was created with a focus on information sharing. The NSFNET, developed by the National Science Foundation, was dedicated to educational advancement and had initially banned the commercial use of the internet. That changed in the mid-1990s as the number of users grew beyond what the NSF could manage. Private companies provided internet services, and more and more businesses registered their websites with the purpose of attracting new customers.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">One of the key events that perpetuated the development of surveillance capitalism was the invention of cookies, which would record the unique navigation paths of individual users as they visited particular websites. According to Meg Leta Jones in \u201cSurveillance Capitalism Online,\u201d these paths were called \u201cclickstreams,\u201d which allowed web creators to understand how users were navigating their site and to use that information to evaluate the website\u2019s effectiveness. This technology was not built into the original design of the World Wide Web. In fact, Tim Berners-Lee intended for the web to be \u201cstateless,\u201d meaning that it would retrieve the information that a user is looking for, but nothing about the transaction would be recorded or documented. For companies looking to understand the user journey, they called this original design the \u201cmemory\u201d problem (Jones 186). The cookie, invented by computer scientist Lou Montulli, created a unique session ID that began when a user accessed a specific website. The server for that website would place the text code into the memory of the user\u2019s browser, which is then stored on the hard drive and allows the website to recognize that user each time they return to the website.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Importantly, Jones points out that the cookie is an \u201copaque\u201d memory, meaning that it\u2019s invisible to the user (187). The code could include anything, to collect any sort of data, and the user wouldn\u2019t know, which connects directly to the idea of surveillance. The user becomes more visible while the companies collecting the data are largely hidden. This obviously raised concerns about user privacy, which then prompted Montulli to adjust the process so that users could manage their own cookie preferences and receive notifications before a cookie was placed on their computer. They could accept or reject the cookie, though the default was set so that all cookies were accepted. He argued that this was a technique that actually protected users because it kept their identities anonymous and it allowed them a measure of control over whether information was collected, though they still wouldn\u2019t know what type of information was collected or how it was being used.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">And then as the Clinton administration ushered in <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId322\" href=\"https:\/\/clintonwhitehouse4.archives.gov\/WH\/Accomplishments\/technology.html\"><span class=\"import-url\">self-regulation policies<\/span><\/a><\/span> that removed commercial restrictions online (White House) and as only a handful of large tech companies survived the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId323\" href=\"https:\/\/www.thestreet.com\/dictionary\/d\/dot-com-bubble-and-burst\"><span class=\"import-url\">dot-com crash<\/span><\/a><\/span> in the early 2000s, new practices emerged that worked against the privacy of users (Salvucci). Whereas companies had originally tracked user data only when they were on a particular page, now they began tracking the users themselves as they traveled across the internet, and they began selling user data to interested third parties who could now market their products and services directly to users based on their past behaviors.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Interestingly, Jones points out that surveillance capitalism didn\u2019t begin with the cookie. As far back as the 1970s, direct mail companies would buy mailing lists from varying companies with the explicit purpose of targeting them with mail advertisements. For instance, one medical lab sold patient information to a direct mail service, which could then target those patients with ads for specific products. One woman received diaper coupons because her medical information revealed that she was pregnant. Jones explains, \u201cData breaches, sexual privacy, informational asymmetries, and racial bias were issues with direct marketing expressed by members of Congress in 1970\u201d (197). However, when given the chance to take their names off all mailing lists, very few people responded. Though direct mail was considered a minor nuisance, the opt-out method was deemed sufficient to protect consumer information, which Jones argues is what set the precedent for increased surveillance capitalism once cookies were established.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Another important component in the history of surveillance capitalism was the emergence of Google, which improved search results by creating a system that collected information about users, their search queries, and their online behaviors. As Shoshana Zuboff points out in <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Age of Surveillance Capitalism<\/em><\/span>, the system was initially about enhancing the user experience and providing the most relevant queries. However, it didn\u2019t take long for Google to realize the value of the massive amounts of user data it was collecting, which could be used for targeted advertising that profits off people\u2019s personal data. Zuboff also points to Facebook as a pioneer in surveillance capitalism through its collection of user data and targeted advertising. Zuboff argues that increasingly, users are treated as commodities as every click is recorded as some sort of metric for enhanced analytics and profit. Businesses obviously profit off this sort of data, but so too do political organizations that have a stake in influencing voter opinions and behaviors. The last chapter discussed the power of media spins and echo chambers to direct people\u2019s perceptions of reality. By collecting data about these users, political entities could target their ads to individuals who are more likely to respond favorably to their message\u2014because they are predisposed to certain beliefs and values. For example, the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId324\" href=\"https:\/\/www.nytimes.com\/2018\/04\/04\/us\/politics\/cambridge-analytica-scandal-fallout.html\"><span class=\"import-url\">Cambridge Analytica scandal in 2016<\/span><\/a><\/span> revealed that the data firm had acquired data from 50 million Facebook users and then sold that data to political campaigns so they could build voter profiles and create targeted ads that would sway voter sentiment (Confessore). This data was used to assist the Ted Cruz and Donald Trump campaigns in 2016 and to promote public support for Brexit.<\/p>\n<h1 class=\"import-ah\">Surveillance Practices<\/h1>\n<p class=\"import-paft\">Remember that word \u201cubiquitous\u201d from the first chapter? If our use of technology is ubiquitous, so too is surveillance. Hardly a moment of the day goes by when we don\u2019t have our phones nearby, tracking our location. And as mentioned in the previous section, many companies are tracking our activities across the internet, gathering data about sites we\u2019ve visited, hyperlinks we\u2019ve followed, products we\u2019ve purchased, and so on. But the ways in which we are surveilled and the (known) uses of this information extend much further. Though it\u2019s impossible to identify every surveillance tactic and though government organizations and large tech companies aren\u2019t always forthcoming about the types of information they are collecting, this section will look at some of the more common surveillance strategies made possible through a variety of technologies.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Video surveillance.<\/strong><\/span> Video cameras are increasingly common, particularly in public spaces such as busy intersections, parking lots, street corners, schools, shopping centers, and restaurants. Often, there will be a sign alerting the public that they are being recorded, but not always. Sometimes the cameras themselves are easy to spot, but not always. As you might imagine, cameras are used in many circumstances to help prevent crime and other unwanted behaviors. They\u2019re also helpful once a crime or some other incident has occurred because they provide footage of what happened and who was involved. Facial recognition software and license plate scanners make it even easier to identify individuals in specific places and visibly track their movements.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">The concern many people have relates to the abuse of video surveillance\u2014tracking and recording someone\u2019s movements for the sake of spying or using video surveillance in deceptive or inappropriate ways. For instance, people of color are typically <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId325\" href=\"https:\/\/www.brookings.edu\/research\/police-surveillance-and-facial-recognition-why-data-privacy-is-an-imperative-for-communities-of-color\/\"><span class=\"import-url\">monitored more closely<\/span><\/a><\/span>, and video surveillance makes it easy to target\/scrutinize these individuals while they are buying groceries, pumping gas, eating dinner, and so on (Lee and Chin). There have also been incidents where video cameras have been discovered in inappropriate places, demonstrating a gross abuse of power. In 2003, a middle school in Tennessee was sued by parents after they found out there were <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId326\" href=\"https:\/\/abcnews.go.com\/US\/story?id=90486&amp;page=1\"><span class=\"import-url\">video cameras in the locker rooms<\/span><\/a><\/span> that had recorded their children undressing, and because of a lack of security, the footage had been accessed by unauthorized users outside of the school system (ABC News).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Laptops and cell phones also have built-in video cameras, which is a cause for concern. During the COVID-19 pandemic as schools shifted to online learning, many people were concerned about <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId327\" href=\"https:\/\/www.edweek.org\/technology\/massive-shift-to-remote-learning-prompts-big-data-privacy-concerns\/2020\/03\"><span class=\"import-url\">platforms like Zoom<\/span><\/a><\/span> that gave viewers access to students\u2019 homes, including their bedrooms and other activities that occurred in the background (Lieberman). Similarly, it became common practice to use <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId328\" href=\"https:\/\/www.edweek.org\/technology\/massive-shift-to-remote-learning-prompts-big-data-privacy-concerns\/2020\/03\"><span class=\"import-url\">remote proctors<\/span><\/a><\/span> and other surveillance technologies to monitor students\u2019 behaviors while they were taking tests. In many instances, students felt the monitoring was unfair and overly aggressive. And then there are the typical <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId329\" href=\"https:\/\/www.rd.com\/article\/laptop-camera\/\"><span class=\"import-url\">concerns about hackers<\/span><\/a><\/span> who gain access to video feeds from laptops, phones, and personal home surveillance systems, usually with the intention of gaining bank account information or spying on users\u2019 personal activities (Erickson).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Voice recognition.<\/strong><\/span> Many technologies also have a microphone, including your phone, your computer, and many of your household devices like Siri or Alexa. There\u2019s been concern for some time that the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId330\" href=\"https:\/\/abcnews.go.com\/ABC_Univision\/governments-phone-text-email-spying-explained\/story?id=19347440\"><span class=\"import-url\">government spies on personal conversations<\/span><\/a><\/span> in order to collect personal information (Weinstein). However, tech companies are also leveraging voice recognition technology in order to identify who we are and build a profile about us. Google says that it <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId331\" href=\"https:\/\/www.whatthetech.tv\/voice-assistants-are-always-listening-should-you-be-worried\/\"><span class=\"import-url\">uses <\/span><span class=\"import-url\">snippets of voice recordings<\/span><\/a><\/span> in order to get aggregate data about user preferences and how the device can be improved, but it says it doesn\u2019t connect specific conversations with specific users (Tucker). Of particular concern is the fact that these smart devices are <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId332\" href=\"https:\/\/www.consumerwatchdog.org\/privacy-technology\/how-google-and-amazon-are-spying-you\"><span class=\"import-url\">listening all the time<\/span><\/a><\/span> that they are on, even when they haven\u2019t been activated (King). What\u2019s more, the recordings are sometimes sent to third-party reviewers, which puts personal data at an increased risk.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Emails and <\/strong><strong class=\"import-b\">t<\/strong><strong class=\"import-b\">exts.<\/strong><\/span> If you have an email account or a cell phone provided by your employer, they have the right to view that information. In fact, many employers have <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId333\" href=\"https:\/\/www.brookings.edu\/blog\/techtank\/2021\/01\/05\/how-employers-use-technology-to-surveil-employees\/\"><span class=\"import-url\">monitoring software<\/span><\/a><\/span> installed on employee computers that allows them to view emails and other online activities (West). Cell phone companies retain records pertaining to text messages and when they were sent. Though most say that they <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId334\" href=\"https:\/\/news.law.fordham.edu\/jcfl\/2016\/06\/02\/cell-phone-forensics-powerful-tools-wielded-by-federal-investigators\/\"><span class=\"import-url\">retain the messages themselves<\/span><\/a><\/span> for only a short time after they have been delivered, some do store the data for several days or even months after delivery (Evans). Likewise, up until 2017, Google would scan Gmail customers\u2019 emails for the purpose of having them analyzed for direct marketing purposes. Though Google no longer scans emails, it is still able to track users across multiple Google apps, including Gmail, Google Chrome, Google Analytics, and Double Click. In fact, Google recently published its <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId335\" href=\"https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480\"><span class=\"import-url\">privacy label<\/span><\/a><\/span> for the Gmail app, which reports on all of the types of data Google will collect, including location, purchase history, contacts, user content, search history, identifiers, and \u201cother data\u201d (Google, \u201cGmail\u201d).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Social media.<\/strong><\/span> Social media companies like Facebook, X (formerly Twitter), Instagram, and YouTube can also collect information about you. This includes the information you provide in your profile as well as your posts. It also includes your list of contacts and the things that you like and share. All of this is information that can be used to provide targeted ads across multiple web platforms\u2014not just your feed on that particular site. Many social media sites also collect information about your location, phone and email contacts, text and email messages, payment information, online views, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId336\" href=\"https:\/\/www.security.org\/blog\/how-much-would-you-sell-your-social-media-data-for\/\"><span class=\"import-url\">and more<\/span><\/a><\/span>. These social media companies not only use the information to better their own platforms, but they also make a lot of money by selling user information to advertisers (Vigderman and Turnera).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Digital records.<\/strong><\/span> In the digital age, most of the private information about you is stored on a digital server somewhere\u2014your health care history, the medications you take, your bank account information, your grades, your credit score, your legal record. For instance, think about the type of information that most colleges collect about individual students\u2014high school transcripts, income information, bank information, individual test scores and homework activities, attendance records, disciplinary files, physical or mental health information, specific disabilities, and so on. Likewise, doctor\u2019s offices, government organizations, merchants, and others all collect private information about you.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Big <\/strong><strong class=\"import-b\">d<\/strong><strong class=\"import-b\">ata.<\/strong><\/span> On a larger scale, more businesses as well as educational and governmental organizations are able to collect big data\u2014massive amounts of information from a lot of different users that help them see big-picture trends. It\u2019s less about the individual user and more about analytics. To put it into context, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId337\" href=\"https:\/\/hbr.org\/2012\/10\/big-data-the-management-revolution\"><span class=\"import-url\">this article<\/span><\/a><\/span> in the <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Harvard Business Review<\/em><\/span> says that Walmart collects 2.5 petabytes of information every hour based solely on customer transactions (McAfee and Brynjolfsson). Since a petabyte is \u201c20 million filing cabinets worth of text,\u201d that means Walmart can fill 50 million filing cabinets in the course of an hour, and that doesn\u2019t count the information collected through cookies and other surveillance tools.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">IoT.<\/strong><\/span> Let\u2019s look at one last category\u2014Internet of Things devices. These are smart devices that connect to the internet and can then be controlled by our phones. Home security systems, garage doors, heating and cooling systems, medical sensors, smart watches, digital assistants like Alexa, doorbell cameras, and so on are all IoT devices that collect data. Some of the information is logged right away when you initialize the product and create a user profile, but most of the information is created through your <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId338\" href=\"https:\/\/www.wired.com\/insights\/2015\/03\/internet-things-data-go\/\"><span class=\"import-url\">ongoing use of the product<\/span><\/a><\/span> (McFadin). This includes information about the product and its status, the surrounding environment, and usage.<\/p>\n<div class=\"textbox textbox--exercises\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span class=\"import-sbhn\">Activity 4.1<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>This section includes many of the most common forms of surveillance and data collection. Make a list of the surveillance technologies that you encounter each day\u2014whether on your personal devices or in public spaces.<\/p>\n<p>After you make your list, separate them into two lists\u2014one for what you consider to be acceptable or even beneficial uses of surveillance and one for what you consider to be too intrusive or threatening in some way. Consider your rationale for what constitutes positive surveillance (if anything) and what types of activities cross the line.<\/p>\n<\/div>\n<\/div>\n<h1 class=\"import-ah\">Commercialization and Behavior Modification<\/h1>\n<p class=\"import-paft\">By now it\u2019s probably pretty clear that surveillance capitalism is about power and profit. Thinking back to Foucault\u2019s theory of the panopticon and the psychological effects that surveillance has on an individual, surveillance is a mechanism of control because it creates \u201cdocile\u201d bodies who have become conditioned to behave in desirable ways, typically submitting to authority and accepting certain behaviors (and identities) as \u201cnormal.\u201d Once people are conditioned in this way, it\u2019s easy to capitalize on their perceptions and values to create market demand for certain products and to influence buying behaviors. Organizations in every industry collect information about people\u2019s experiences and turn it into data that can be leveraged to make predictions about what they will do. The more relevant the advertising is to an individual, based on their demographics, interests, location, and so on, the more likely they are to buy the product. In an <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId339\" href=\"https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/\"><span class=\"import-url\">interview<\/span><\/a><\/span> about her book on surveillance capitalism, Zuboff explains,<\/p>\n<p class=\"import-bqs\" style=\"margin-left: 18pt; margin-right: 18pt; text-indent: 0pt;\">The opportunities to align supply and demand around the needs of individuals were overtaken by a new economic logic that offered a fast track to monetization.\u2026This economic logic has now spread beyond the tech companies to new surveillance-based ecosystems in virtually every economic sector, from insurance to automobiles to health, education, finance, to every product described as \u201csmart\u201d and every service described as \u201cpersonalized.\u201d<\/p>\n<p class=\"import-pcon\">Zuboff demonstrates the pervasiveness of surveillance capitalism with the recent discovery that even breathing machines are collecting data about people with sleep apnea. Health insurance companies receive that data and then use it for their own benefit, usually to deny or reduce coverage.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">It would be impossible to trace all of the ways that surveillance capitalism either makes or saves (as in the example above) companies money, but a few statistics might help put the growth of surveillance capitalism and digital advertising in perspective:<\/p>\n<ul>\n<li class=\"import-blf\">From 2001 to 2020, digital advertising <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId340\" href=\"https:\/\/evangelicalfocus.com\/jubilee-centre\/13158\/surveillance-capitalism-the-hidden-costs-of-the-digital-revolution\"><span class=\"import-url\">has grown by more than 40%<\/span><\/a><\/span> (Ebsworth et al.).<\/li>\n<li class=\"import-bl\">In 2021, digital advertising rose <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId341\" href=\"https:\/\/www.oberlo.com\/statistics\/digital-ad-spend\"><span class=\"import-url\">nearly 30%<\/span><\/a><\/span> from the previous year, making the largest annual growth in history (Oberlo). The total spent on digital advertising that year was more than $520 billion worldwide.<\/li>\n<li class=\"import-bl\">Google, Amazon, and Facebook receive the bulk (two-thirds) of these advertising dollars.<\/li>\n<li class=\"import-bll\"><span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId342\" href=\"https:\/\/evangelicalfocus.com\/jubilee-centre\/13158\/surveillance-capitalism-the-hidden-costs-of-the-digital-revolution\"><span class=\"import-url\">Amazon\u2019s income<\/span><\/a><\/span> from advertising doubles every two years ($14.1 billion in 2019). In 2020, Google made $147 billion in advertising. In that same year, Facebook made $86 billion, totaling 98% of its income (Ebsworth et al.).<\/li>\n<\/ul>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Certainly, surveillance capitalism has proven to be popular, which is why it has grown so quickly. However, the major concern stems from two interrelated issues:<\/p>\n<ul>\n<li class=\"import-blf\"><span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId343\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1045235421001155\"><span class=\"import-url\">Invasion of privacy<\/span><\/a><\/span>. As much of this chapter has demonstrated, surveillance capitalism is clandestine (Andrew et al.). While people create Facebook and Google accounts because they believe these services are created <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">for<\/em><\/span> their benefit, they are often unaware that their profile information and online activities are tracked so that commercial entities can commodity their experiences and inundate them with advertising. Lots of different applications and smart devices have access to data that many people couldn\u2019t imagine, and much of it is sensitive data that they wouldn\u2019t want to be collected\u2014and they certainly wouldn\u2019t want it to be shared and exploited.<\/li>\n<li class=\"import-bll\">Behavior modification. Researchers like Zuboff claim that surveillance capitalism not only predicts what we will do but it can actually alter the choices that we make through consistent yet subtle messaging that rewards us for certain behaviors and thus conditions us toward preset outcomes. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId344\" href=\"https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/\"><span class=\"import-url\">Zuboff<\/span><\/a><\/span> puts it this way: \u201cThe shift is from monitoring to what the data scientists call \u201cactuating.\u201d Surveillance capitalists now develop \u201ceconomies of action,\u201d as they learn to tune, herd, and condition our behavior with subtle and subliminal cues, rewards, and punishments that shunt us toward their most profitable outcomes.\u201d<\/li>\n<\/ul>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Behavior modification goes hand in hand with surveillance. As companies collect more data about us, they are able to create better algorithms and ultimately make better predictions. This is largely dependent, however, on people\u2019s increasing engagement with digital media. Nir Eyal\u2019s book <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Hooked: How to Build Habit-Forming Products<\/em><\/span> explains the way that companies intentionally create addictions to products through a system of \u201ctriggers\u201d (prompting users to use the product) and \u201crewards\u201d (based on the user\u2019s compliance with the trigger). As Ebsworth et al. explain, \u201cIncreasing engagement via the hook model provides both a constant source of behavioural data and a committed audience for advertisements.\u201d In other words, as engagement (and addiction) increase, free will and freedom of thought would diminish as people are \u201cconditioned,\u201d \u201ctuned,\u201d and \u201cherded\u201d to make specific buying choices. As Foucault would say, they have become \u201cdocile\u201d bodies.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Importantly, the concern about behavior modification is about more than just how people spend their money. It\u2019s also about ideologies and political choices. Political parties and interest groups can use data collection to steer people toward certain websites and information and use a similar system of rewards and punishments to direct their attention as well as their ways of thinking. \u201cPolitical partisans, including shadowy private interests and foreign governments, promise to swing voters and elections with microtargeted social media campaigns\u201d (Lauer and Lipartito 1). Some notable examples include the <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId345\" href=\"https:\/\/www.nytimes.com\/2018\/04\/04\/us\/politics\/cambridge-analytica-scandal-fallout.html\"><span class=\"import-url\">Cambridge Analytica scandal<\/span><\/a><\/span> noted above and also more recent attempts to <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId346\" href=\"https:\/\/www.miaminewtimes.com\/news\/republicans-capitalize-on-fear-of-communism-in-florida-cuban-communities-15669381\"><span class=\"import-url\">influence Cuban voters in <\/span><span class=\"import-url\">S<\/span><span class=\"import-url\">outh Florida<\/span><\/a><\/span> with propaganda that positions Democrats as communists (Kapnick; <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId347\" href=\"https:\/\/www.cnn.com\/2022\/11\/05\/politics\/florida-election-lies-spanish-language\/index.html\"><span class=\"import-url\">O\u2019Sullivan and Sands<\/span><\/a><\/span>).<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Employers also use surveillance technologies to control behaviors. Systems for clocking in and out, video cameras in public workspaces, and software that monitors employee activities on work computers and cell phones all have the effect of keeping employees in line so that they can keep their jobs and perhaps be rewarded with promotions or pay increases. This is exactly the kind of surveillance and control that ties directly to Foucault\u2019s panopticon. People modify their behaviors to avoid punishment (or gain a reward), and over time as they internalize the gaze of the \u201cguard\u201d (in this case, the employer, but it could also be a teacher, government official, religious leader, etc.), their ways of thinking and being begin to shift in ways that benefit the authorities in charge.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">Importantly, while everyone in society is surveilled to some degree, it is always the populations with the least amount of power\u2014those who are already marginalized\u2014who are surveilled to the greatest extreme: welfare recipients, people of color, immigrants, working-class employees, criminals, and women. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId348\" href=\"https:\/\/tcf.org\/content\/report\/disparate-impact-surveillance\/?session=1\"><span class=\"import-url\">Gellman and Adler-Bell<\/span><\/a><\/span> explain it like this:<\/p>\n<p class=\"import-bqs\" style=\"margin-left: 18pt; margin-right: 18pt; text-indent: 0pt;\">Privacy scholars speak of philosophical rights and hypothetical risks; privacy-minded middle class Americans fear allowing the government too much access to their electronic trails. But there is nothing abstract about the physical, often menacing, intrusions into less fortunate neighborhoods, where mere presence in a \u201chigh-crime\u201d area is grounds for detention, search, and questioning by police. At age sixty-five, tens of millions of Americans claim their Medicare benefits with nothing more eventful than completion of some forms. (Medicare.gov even promises to \u201cprotect your privacy by getting rid of the information you give us when you close the browser.\u201d) An impoverished single mother on Medicaid faces mortifying questions, face-to-face with benefit managers, about her lovers, hygiene, parental shortcomings, and personal habits.<\/p>\n<p class=\"import-pcon\">Their point is that surveillance capitalism affects everyone but not to the same degree. Its prevalence in our society has had real consequences for minorities, putting them under higher levels of scrutiny, finding reasons to inflict \u201cpunishments,\u201d and perpetuating discriminatory practices and injustices.<\/p>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">You might wonder what all of this has to do with digital writing. In some ways, it\u2019s maybe more geared toward digital <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">literacy<\/em><\/span>, understanding how to use digital media and the consequences of your choices. This critical unit is about complicating the overly simplistic and utopian views of digital media as unequivocally progressive and beneficial. It\u2019s about lifting the veil to examine the more negative effects of digital media, which will hopefully lead to more informed and intentional engagement. Also, as we\u2019ll see in the third section of the book related to functional literacy, digital writers do participate in surveillance practices. SEO is based exclusively on behavioral data\u2014how people search for information and what they do as they travel across the internet. Digital writers use that data to write copy that will capture users\u2019 attention. They also use analytics to assess the effects of their SEO practices, and they use lead generation to send email campaigns and targeted social media ads to people\u2014some who may have opted in to receive updates and ads, but many who haven\u2019t. Critical literacy means thinking more deeply about these practices and their ethical and social\u2014not just financial\u2014consequences in order to make informed choices.<\/p>\n<h1 class=\"import-ah\">Protecting Your Privacy<\/h1>\n<p class=\"import-paft\">While it\u2019s impossible to navigate online spaces and remain completely off the grid, there are some important ways that you can control\/limit the types of information that businesses can collect about you. You can\u2014and should\u2014take important steps to protect your privacy, your data, and your accounts from cybercriminals. This final section of the chapter lists some basic things that you can do.<\/p>\n<ul>\n<li class=\"import-blf\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Create strong passwords.<\/strong><\/span> Probably the best thing you can do to protect your private information from hackers is to create passwords that they can\u2019t guess. That means that they should be long and have a variety of upper and lowercase letters in addition to numbers and symbols. You should also have different passwords for different accounts. That might be a lot of passwords to keep track of, but there are password managers available that generate strong passwords, help you keep track of the passwords for your different accounts, and monitor your accounts for data breaches. A couple of common data managers are <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId349\" href=\"https:\/\/1password.com\"><span class=\"import-url\">1Password<\/span><\/a><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId350\" href=\"https:\/\/www.logmeonce.com\"><span class=\"import-url\">LogMeOnce<\/span><\/a><\/span>, and <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId351\" href=\"https:\/\/www.dashlane.com\"><span class=\"import-url\">Dashlane<\/span><\/a><\/span>. Of course, you\u2019d want to make sure that if you use a password manager, your \u201cmaster password\u201d for that account is strong.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Use <\/strong><strong class=\"import-b\">t<\/strong><strong class=\"import-b\">wo-<\/strong><strong class=\"import-b\">f<\/strong><strong class=\"import-b\">actor <\/strong><strong class=\"import-b\">a<\/strong><strong class=\"import-b\">uthentication.<\/strong><\/span> Many accounts are moving toward requiring two-factor authentication, which only grants you access to your account when you provide two pieces of evidence that you own the account, including a password in addition to a temporary passcode, facial recognition, a fingerprint, or an answer to a security question. This is a great way to prevent unauthorized users from gaining access to your accounts. You can also enable two-factor authorization on some of your accounts, including your Apple ID, Google, Facebook, X, and banking websites. Check your account settings to see what types of security features are available.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Install a browser extension.<\/strong><\/span> As this chapter discusses, companies and other organizations can collect more information about you than you might realize based on your browsing history. A browser extension like <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId352\" href=\"https:\/\/github.com\/gorhill\/uBlock\"><span class=\"import-url\">uBlock Origin<\/span><\/a><\/span> is designed to prevent this data collection as well as the targeted ads that are generated as a result. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId353\" href=\"https:\/\/privacybadger.org\/\"><span class=\"import-url\">Privacy Badger<\/span><\/a><\/span> is another web extension that prevents trackers and targeted ads.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Cover your camera.<\/strong><\/span> It\u2019s easier than you might think to install software on your computer that will take over your camera and collect private footage. An easy way to avoid that happening is to put a sticker over your camera.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Opt out of targeted ads.<\/strong><\/span> Platforms like <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId354\" href=\"https:\/\/support.apple.com\/en-us\/HT202074\"><span class=\"import-url\">Apple<\/span><\/a><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId355\" href=\"https:\/\/www.facebook.com\/help\/568137493302217\"><span class=\"import-url\">Facebook<\/span><\/a><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId356\" href=\"https:\/\/support.google.com\/ads\/answer\/2662922?hl=en\"><span class=\"import-url\">Google<\/span><\/a><\/span>, and <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId357\" href=\"https:\/\/business.twitter.com\/en\/help\/ads-policies\/product-policies\/interest-based-opt-out-policy.html\"><span class=\"import-url\">X<\/span><\/a><\/span> allow you to disable interest ads in your account settings, which will help cut down on the amount of targeted ads that you receive. You can also use this <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId358\" href=\"https:\/\/simpleoptout.com\/\"><span class=\"import-url\">Simple Opt Out<\/span><\/a><\/span> website to prevent similar data collection and ad targeting from numerous other organizations. Since you are \u201copted in\u201d by default, you\u2019ll have to manually opt out of any sort of data collection.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Consider a <\/strong><strong class=\"import-b\">v<\/strong><strong class=\"import-b\">irtual <\/strong><strong class=\"import-b\">p<\/strong><strong class=\"import-b\">rivate <\/strong><strong class=\"import-b\">n<\/strong><strong class=\"import-b\">etwork (VPN).<\/strong><\/span> If you often connect to public Wi-Fi, a VPN can create a more secure connection by encrypting your data and hiding your IP address so that your internet service provider and other third-party organizations can\u2019t track your activities or see your information.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Use antivirus software.<\/strong><\/span> Once your device has been \u201cinfected\u201d with a virus, it\u2019s incredibly difficult to recover. Antivirus software adds another layer of protection that will help prevent viruses and other malicious software. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId359\" href=\"https:\/\/support.microsoft.com\/en-us\/windows\/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963\"><span class=\"import-url\">Windows Defender<\/span><\/a><\/span> is built into Windows automatically. Similarly, Mac computers have browser extensions and other security built in. You could always add another layer of security, such as <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId360\" href=\"https:\/\/us.norton.com\/\"><span class=\"import-url\">Norton Antivirus<\/span><\/a><\/span> or <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId361\" href=\"https:\/\/www.malwarebytes.com\/\"><span class=\"import-url\">Malwarebytes<\/span><\/a><\/span>. It\u2019s also important that as updates are made available for your browser, apps, and home devices, you install the latest version, which often has improved security features designed specifically for the latest threats.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Enable remote tracking on your phone.<\/strong><\/span> If you lose your phone, it\u2019s important to make sure that your data doesn\u2019t fall into the wrong hands. To enable remote tracking, you must first set up a pin number and\/or biometric login (i.e., facial or fingerprint recognition). You can then activate your phone\u2019s remote tracking feature, which will allow you to identify where your phone is and, if necessary, delete all of its data from a remote location.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Beware of phishing scams.<\/strong><\/span> Increasingly, scammers are targeting people through their emails and text messages, often posing as someone that you might know and encouraging you to click a specific link or download a file. Never click on a link in an email or text message unless you are certain it\u2019s legitimate. You can hover over the link to see for sure what the URL is and if it matches the location where it says it will take you. Lots of misspellings and invalid email addresses or phone numbers are also red flags. You\u2019d also avoid downloading unknown files unless you verify with the person who sent it about what it is. These are common ways that criminals spread malware that can lock you out of your device.<\/li>\n<li class=\"import-bl\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Encrypt the information on your laptop.<\/strong><\/span> It\u2019s also possible to enable encryption on your laptop so that if it\u2019s ever lost or stolen, your data can\u2019t be accessed because it will come up as gibberish. For Mac users, this encryption tool is called <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId362\" href=\"https:\/\/support.apple.com\/guide\/mac-help\/encrypt-mac-data-with-filevault-mh11785\/mac\"><span class=\"import-url\">FileVault<\/span><\/a><\/span> and can be turned on in the system preferences menu. For PC users, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId363\" href=\"https:\/\/mashable.com\/article\/how-to-encrypt-computer-windows-mac\"><span class=\"import-url\">device encryption<\/span><\/a><\/span> is available under the settings menu, under \u201cUpdates &amp; Security\u201d (Morse).<\/li>\n<li class=\"import-bll\"><span style=\"border: none windowtext 0pt; padding: 0;\"><strong class=\"import-b\">Be discerning.<\/strong><\/span> You want to keep your phone number and email address as private as possible. Don\u2019t give them out unless you have to, and if you do have to give an email address to sign up for coupons or some other perk, it\u2019s helpful to have a secondary \u201cburner\u201d email address devoted to spam. That way, if the account does get hacked, it doesn\u2019t include a lot of personal information about you, and it\u2019s not connected to your important accounts. You should also make sure your settings on social media and other accounts are set to \u201cprivate\u201d and that you don\u2019t share sensitive information or photos over social media, email, or text messaging that could be damaging if they fell into the wrong hands.<\/li>\n<\/ul>\n<p class=\"import-p\" style=\"text-indent: 36pt;\">As you can see, these guidelines relate to privacy in a variety of ways\u2014from targeted ads and data collection prompted by businesses and tech companies to data breaches from hackers looking to steal your private information. Though you won\u2019t be able to block all forms of surveillance that have become so prominent in our society, taking a few easy steps and being smart about the information that you share will help you take control over your data and provide a measure of protection from the invisible forces that have a stake in tracking your digital activities.<\/p>\n<div class=\"textbox textbox--exercises\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span class=\"import-sbhn\">Activity 4.2<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>This section provided lots of helpful, and fairly easy, ways that you can protect your information. This activity is simple: See how many of the security measures you can complete on your phone or laptop in the course of 15 or 20 minutes. Many of them require a simple security adjustment or a change to your account preferences.<\/p>\n<p>For those that are more complex\u2014researching VPNs and browser extensions, for instance\u2014do some research about your options, including features, cost, and consumer ratings. Compile a list of your top options.<\/p>\n<\/div>\n<\/div>\n<div class=\"textbox textbox--examples\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Discussion Questions<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ol>\n<li>Look again at the introduction to this chapter and the analogy of the manila folder as it relates to today\u2019s more complex data collection. How did the manila folder and other organization systems make surveillance possible? Why is it fitting that the manila folder is sometimes seen as a symbol of oppression?<\/li>\n<li>The chapter states in several places that data collection has the power to control behaviors in various ways. What does this mean? In what ways does surveillance influence people\u2019s behaviors?<\/li>\n<li>What is a panopticon, as described by Foucault? How does the metaphor of the panopticon relate to current surveillance practices in our culture?<\/li>\n<li>Which types of institutions perform this type of \u201cpanopticon\u201d surveillance? Name as many as you can think of.<\/li>\n<li>What does the \u201ccapitalism\u201d in \u201csurveillance capitalism\u201d refer to? How do companies make money off surveillance practices?<\/li>\n<li>What are some key historical events that perpetuated surveillance capitalism as we experience it today?<\/li>\n<li>This chapter mentions several ways that your data are collected. Which ones were you already familiar with? Which ones were a surprise?<\/li>\n<li>How do data collection and targeted advertising relate to behavior modification? What are some basic activities that organizations want to \u201cnudge\u201d people to do? Can you think of any specific examples of this type of nudging?<\/li>\n<li>Why is surveillance capitalism such a concern?<\/li>\n<li>What are some basic ways that you can protect your own personal data?<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Sources<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">1Password. \u201cThe World\u2019s Most Loved Password Manager.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">1Password.com<\/em><\/span>, n.d., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId364\" href=\"https:\/\/1password.com\/?cjevent=f514c3e6303e11ed8099006f0a82b832&amp;utm_medium=affiliate&amp;utm_source=Wirecutter+Inc.&amp;utm_campaign=3512519&amp;utm_content=5513721&amp;utm_term=1password.com&amp;cjdata=MXxOfDB8WXww\"><span class=\"import-url\">https:\/\/1password.com<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">ABC News. \u201cLocker Room Cameras Expose School to Suit.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ABC News<\/em><\/span>, 16 July 2003, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId365\" href=\"https:\/\/abcnews.go.com\/US\/story?id=90486&amp;page=1\"><span class=\"import-url\">https:\/\/abcnews.go.com\/US\/story?id=90486&amp;page=1<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Andrew, Jane, et al. \u201cData Breaches in the Age of Surveillance Capitalism: Do Disclosures Have a New Role to Play?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Critical Perspectives on Accounting<\/em><\/span>, vol. 86, 7 Dec. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId366\" href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1045235421001155\"><span class=\"import-url\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1045235421001155<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Apple. \u201cControl Personalized Ads on the App Store, Apple News, and Stocks.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Apple.com<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId367\" href=\"https:\/\/support.apple.com\/en-us\/HT202074\"><span class=\"import-url\">https:\/\/support.apple.com\/en-us\/HT202074<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Apple Store. \u201cGmail-Email by Google.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Apple.com<\/em><\/span>, 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId368\" href=\"https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480\"><span class=\"import-url\">https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Banks, Adam. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Race, Rhetoric, and Technology: Searching for Higher Ground<\/em><\/span>. Routledge, 2005.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Bristow, David L. \u201cHow Filing Cabinets Changed the World.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">History Nebraska<\/em><\/span>, 24 Feb. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId369\" href=\"https:\/\/history.nebraska.gov\/blog\/how-filing-cabinets-changed-world\"><span class=\"import-url\">https:\/\/history.nebraska.gov\/blog\/how-filing-cabinets-changed-world<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Consumer Watchdog. \u201cHow Google and Amazon Are \u2018Spying\u2019 on You.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ConsumerWatchdog.org, 2022<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId370\" href=\"https:\/\/www.consumerwatchdog.org\/privacy-technology\/how-google-and-amazon-are-spying-you\"><span class=\"import-url\">https:\/\/www.consumerwatchdog.org\/privacy-technology\/how-google-and-amazon-are-spying-you<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Dashlane. \u201cDashlane.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId371\" href=\"https:\/\/www.dashlane.com\/stopcyberattacks?utm_source=CM&amp;utm_medium=affiliates&amp;utm_campaign=tier2a&amp;gclid=Cj0KCQjwyOuYBhCGARIsAIdGQROscAQuFmYZ95AdSCleAiIKARDmvUjDqPtIogiPsbCgDbXX4M4CaXwaAiYzEALw_wcB\"><span class=\"import-url\">https:\/\/www.dashlane.com<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ebsworth, Jonathan, et al. \u201cSurveillance Capitalism: The Hidden Costs of the Digital Revolution.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Evangelical Focus Europe<\/em><\/span>, 7 Sept. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId372\" href=\"https:\/\/evangelicalfocus.com\/jubilee-centre\/13158\/surveillance-capitalism-the-hidden-costs-of-the-digital-revolution\"><span class=\"import-url\">https:\/\/evangelicalfocus.com\/jubilee-centre\/13158\/surveillance-capitalism-the-hidden-costs-of-the-digital-revolution<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Erickson, Alexa. \u201cThe Real Likelihood You\u2019re Being Watched through Your Laptop Computer.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Reader\u2019s Digest<\/em><\/span>, 1 Apr. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId373\" href=\"https:\/\/www.rd.com\/article\/laptop-camera\/\"><span class=\"import-url\">https:\/\/www.rd.com\/article\/laptop-camera\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Evans, Joseph B. \u201cCell Phone Forensics: Powerful Tools Wielded by Federal Investigators.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Fordham Journal of Corporate and Financial Law<\/em><\/span>, 2 June 2016, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId374\" href=\"https:\/\/news.law.fordham.edu\/jcfl\/2016\/06\/02\/cell-phone-forensics-powerful-tools-wielded-by-federal-investigators\/\"><span class=\"import-url\">https:\/\/news.law.fordham.edu\/jcfl\/2016\/06\/02\/cell-phone-forensics-powerful-tools-wielded-by-federal-investigators\/#:~:text=Cellular%20service%20providers%20retain%20records,very%20long%2C%20if%20at%20all<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Eyal, Nir. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Hooked: How to Build Habit-Forming Products<\/em><\/span>. Penguin Publishing Group, 2014.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Facebook. \u201cHow Can I Adjust How Ads on Facebook are Shown To Me Based on Data about My Activity from Partners?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Facebook.com<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId375\" href=\"https:\/\/www.facebook.com\/help\/568137493302217\"><span class=\"import-url\">https:\/\/www.facebook.com\/help\/568137493302217<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Foucault, Michel. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Discipline &amp; Punish: The Birth of the Prison<\/em><\/span>. Vintage Books, 1975.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Gellman, Barton, and Sam Adler-Bell. \u201cThe Disparate Impact of Surveillance.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Century Foundation<\/em><\/span>, 21 Dec. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId376\" href=\"https:\/\/tcf.org\/content\/report\/disparate-impact-surveillance\/?session=1\"><span class=\"import-url\">https:\/\/tcf.org\/content\/report\/disparate-impact-surveillance\/?session=1<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Google. \u201cBlock Certain Ads.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Google Support<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId377\" href=\"https:\/\/support.google.com\/ads\/answer\/2662922?hl=en\"><span class=\"import-url\">https:\/\/support.google.com\/ads\/answer\/2662922?hl=en<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cGMail\u2014Email By Google.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Google<\/em><\/span>, n.d., <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId378\" href=\"https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480\"><span class=\"import-url\">https:\/\/apps.apple.com\/us\/app\/gmail-email-by-google\/id422689480<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">\u2014\u2014\u2014. \u201cHow Google Uses Cookies.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Google Terms &amp; Privacy<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId379\" href=\"https:\/\/policies.google.com\/technologies\/cookies?hl=en-US\"><span class=\"import-url\">https:\/\/policies.google.com\/technologies\/cookies?hl=en-US<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Jones, Meg Leta. \u201cSurveillance Capitalism Online: Cookies, Notice and Choice, and Web Privacy.\u201d in <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Surveillance Capitalism in America<\/em><\/span>, edited by Josh Lauer and Kenneth Lipartito, University of Pennsylvania Press, 2021.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">King, Evan Thomas. \u201cHow Google and Amazon Are \u2018Spying\u2019 On You.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Consumer Watchdog<\/em><\/span>, 15 Dec. 2017, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId380\" href=\"https:\/\/consumerwatchdog.org\/uncategorized\/how-google-and-amazon-are-spying-you\/\"><span class=\"import-url\">https:\/\/consumerwatchdog.org\/uncategorized\/how-google-and-amazon-are-spying-you\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Laidler, John. \u201cIn New Book, Business School Professor Emerita Says Surveillance Capitalism Undermines Autonomy\u2014and Democracy.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Harvard Business Review<\/em><\/span>, 4 Mar. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId381\" href=\"https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/\"><span class=\"import-url\">https:\/\/news.harvard.edu\/gazette\/story\/2019\/03\/harvard-professor-says-surveillance-capitalism-is-undermining-democracy\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lauer, Josh and Kenneth Lipartito. \u201cIntroduction\u201d in <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Surveillance Capitalism in America<\/em><\/span>, edited by Josh Lauer and Kenneth Lipartito, University of Pennsylvania Press, 2021.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lee, Nicol, and Caitlin Chin. \u201cPolice Surveillance and Facial Recognition: Why Data Privacy is Imperative for Communities of Color.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Brookings<\/em><\/span>, 12 Apr. 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId382\" href=\"https:\/\/www.brookings.edu\/research\/police-surveillance-and-facial-recognition-why-data-privacy-is-an-imperative-for-communities-of-color\/\"><span class=\"import-url\">https:\/\/www.brookings.edu\/research\/police-surveillance-and-facial-recognition-why-data-privacy-is-an-imperative-for-communities-of-color\/#:~:text=In%20fact%2C%20surveillance%20and%20data,current%20circumstances%20and%20political%20regimes<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lieberman, Mark. \u201cMassive Shift to Remote Learning Prompts Big Data Privacy Concerns.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Edweek.org<\/em><\/span>, 27 Mar. 2020, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId383\" href=\"https:\/\/www.edweek.org\/technology\/massive-shift-to-remote-learning-prompts-big-data-privacy-concerns\/2020\/03\"><span class=\"import-url\">https:\/\/www.edweek.org\/technology\/massive-shift-to-remote-learning-prompts-big-data-privacy-concerns\/2020\/03<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">LogMeOnce. \u201cAll-In-One Security Platform.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">LogMeOnce.com<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId384\" href=\"https:\/\/www.logmeonce.com\/?sscid=91k6_91mdv\"><span class=\"import-url\">https:\/\/www.logmeonce.com<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Lui, Claire. \u201cThe Manila Envelope: The Inspiration Behind an Exhibition\u2019s Graphic Identity.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Guggenheim.org<\/em><\/span>, 2 Apr. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId385\" href=\"https:\/\/www.guggenheim.org\/blogs\/checklist\/a-manila-envelope-the-inspiration-behind-an-exhibitions-graphic-identity\"><span class=\"import-url\">https:\/\/www.guggenheim.org\/blogs\/checklist\/a-manila-envelope-the-inspiration-behind-an-exhibitions-graphic-identity<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">McAfee, Andrew, and Erik Brynjolfsson. \u201cBig Data: The Management Revolution.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Harvard Business Review<\/em><\/span>, Oct. 2012, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId386\" href=\"https:\/\/hbr.org\/2012\/10\/big-data-the-management-revolution\"><span class=\"import-url\">https:\/\/hbr.org\/2012\/10\/big-data-the-management-revolution<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">McFadin, Patrick. \u201cInternet of Things: Where Does the Data Go?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Wired<\/em><\/span>, 2018, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId387\" href=\"https:\/\/www.wired.com\/insights\/2015\/03\/internet-things-data-go\/\"><span class=\"import-url\">https:\/\/www.wired.com\/insights\/2015\/03\/internet-things-data-go\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Malwarebytes. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId388\" href=\"https:\/\/www.malwarebytes.com\/\"><span class=\"import-url\">https:\/\/www.malwarebytes.com\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Metz, Rachel. \u201cYes, Tech Companies May Listen When You Talk to Your Virtual Assistant. Here\u2019s Why That\u2019s Not Likely to Stop.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">CNN.com<\/em><\/span>, 19 Aug. 2019, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId389\" href=\"https:\/\/www.cnn.com\/2019\/08\/19\/tech\/siri-alexa-people-listening\"><span class=\"import-url\">https:\/\/www.cnn.com\/2019\/08\/19\/tech\/siri-alexa-people-listening<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Microsoft. \u201cWhat Protected with Windows Security.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Microsoft.com<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId390\" href=\"https:\/\/support.microsoft.com\/en-us\/windows\/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963\"><span class=\"import-url\">https:\/\/support.microsoft.com\/en-us\/windows\/stay-protected-with-windows-security-2ae0363d-0ada-c064-8b56-6a39afb6a963<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Morse, Jack. \u201cHow to Encrypt Your Computer (and Why You Should).\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Mashable.com<\/em><\/span>, 14 Aug. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId391\" href=\"https:\/\/mashable.com\/article\/how-to-encrypt-computer-windows-mac\"><span class=\"import-url\">https:\/\/mashable.com\/article\/how-to-encrypt-computer-windows-mac#:~:text=How%20to%20encrypt%20a%20Windows,encryption%20option%2C%20select%20Turn%20on<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Norton Antivirus. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId392\" href=\"https:\/\/us.norton.com\/\"><span class=\"import-url\">https:\/\/us.norton.com\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Oberlo. \u201cDigital Ad Spend (2021\u20132026).\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Oberlo.com<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId393\" href=\"https:\/\/www.oberlo.com\/statistics\/digital-ad-spend\"><span class=\"import-url\">https:\/\/www.oberlo.com\/statistics\/digital-ad-spend#:~:text=Digital%20Advertising%20Growth,expected%20to%20continue%20in%202023<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ong, Walter. \u201cThe Writer\u2019s Audience is Always a Fiction.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">PMLA<\/em><\/span>, vol. 90, no. 1, 1975, pp. 9\u201321, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId394\" href=\"https:\/\/www.jstor.org\/stable\/461344\"><span class=\"import-url\">https:\/\/www.jstor.org\/stable\/461344<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ren, Jingjing, et al. \u201cInformation Exposure from Consumer IoT Devices: A Multidimensional Network-Informed Measurement Approach.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">IMC, Proceedings from the Internet <\/em><em class=\"import-i\">Measurement Conference<\/em><\/span>, 2019, pp. 267\u2013269, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId395\" href=\"https:\/\/moniotrlab.ccis.neu.edu\/wp-content\/uploads\/2019\/09\/ren-imc19.pdf\"><span class=\"import-url\">https:\/\/moniotrlab.ccis.neu.edu\/wp-content\/uploads\/2019\/09\/ren-imc19.pdf<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Salvucci, Jeremy. \u201cWhat Was the Dot-Com Bubble &amp; Why Did It Burst?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Street<\/em><\/span>, 12 Jan 2023, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId396\" href=\"https:\/\/www.thestreet.com\/dictionary\/d\/dot-com-bubble-and-burst\"><span class=\"import-url\">https:\/\/www.thestreet.com\/dictionary\/d\/dot-com-bubble-and-burst<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Schabner, Dean. \u201cLocker Room Cameras Expose School to Suit.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ABCnews.com<\/em><\/span>, 16 July 2003, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId397\" href=\"https:\/\/abcnews.go.com\/US\/story?id=90486&amp;page=1\"><span class=\"import-url\">https:\/\/abcnews.go.com\/US\/story?id=90486&amp;page=1<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Simple Opt Out. \u201cOpt Out of the Data Sharing You Wouldn\u2019t Opt in to.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Simple OptOut.com<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId398\" href=\"https:\/\/simpleoptout.com\/\"><span class=\"import-url\">https:\/\/simpleoptout.com\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Tucker, Jamey. \u201cVoice Assistants Are Always Listening. Should You Be Worried?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">What The Tech<\/em><\/span>, 8 Feb. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId399\" href=\"https:\/\/www.whatthetech.tv\/voice-assistants-are-always-listening-should-you-be-worried\/\"><span class=\"import-url\">https:\/\/www.whatthetech.tv\/voice-assistants-are-always-listening-should-you-be-worried\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Twitter. \u201cInterest-Based Opt-Out Policy.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Twitter Business<\/em><\/span>, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId400\" href=\"https:\/\/business.twitter.com\/en\/help\/ads-policies\/product-policies\/interest-based-opt-out-policy.html\"><span class=\"import-url\">https:\/\/business.twitter.com\/en\/help\/ads-policies\/product-policies\/interest-based-opt-out-policy.html<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Ublock Origin. <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId401\" href=\"https:\/\/github.com\/gorhill\/uBlock\"><span class=\"import-url\">https:\/\/github.com\/gorhill\/uBlock<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Vigderman, Aliza, and Gabe Turner. \u201cWho Much Would You Sell Your Social Media Data for?\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Security.org<\/em><\/span>, 22 July 2022, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId402\" href=\"https:\/\/www.security.org\/blog\/how-much-would-you-sell-your-social-media-data-for\/\"><span class=\"import-url\">https:\/\/www.security.org\/blog\/how-much-would-you-sell-your-social-media-data-for\/#<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Weinstein, Adam. \u201cThe Government\u2019s Phone, Text, and Email Spying Explained.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">ABCnews.com<\/em><\/span>, 7 June 2013, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId403\" href=\"https:\/\/abcnews.go.com\/ABC_Univision\/governments-phone-text-email-spying-explained\/story?id=19347440\"><span class=\"import-url\">https:\/\/abcnews.go.com\/ABC_Univision\/governments-phone-text-email-spying-explained\/story?id=19347440<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">West, Darrell M. \u201cHow Employers Use Technology to Surveil Employees.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">Brookings.edu<\/em><\/span>, 5 Jan. 2021, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId404\" href=\"https:\/\/www.brookings.edu\/blog\/techtank\/2021\/01\/05\/how-employers-use-technology-to-surveil-employees\/\"><span class=\"import-url\">https:\/\/www.brookings.edu\/blog\/techtank\/2021\/01\/05\/how-employers-use-technology-to-surveil-employees\/<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">The White House. \u201cTechnology and Innovation.\u201d <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Clinton-Gore Administration: A Record of Progress<\/em><\/span>, 2000, <span style=\"border: none windowtext 0pt; padding: 0;\"><a class=\"rId405\" href=\"https:\/\/clintonwhitehouse4.archives.gov\/WH\/Accomplishments\/technology.html\"><span class=\"import-url\">https:\/\/clintonwhitehouse4.archives.gov\/WH\/Accomplishments\/technology.html<\/span><\/a><\/span>.<\/p>\n<p class=\"hanging-indent\" style=\"padding-left: 40px;\">Zuboff, Shoshana. <span style=\"border: none windowtext 0pt; padding: 0;\"><em class=\"import-i\">The Age of Surveillance Capitalism<\/em><\/span>. Profile Books, 2019.<\/p>\n<\/div>\n<\/div>\n","protected":false},"author":3,"menu_order":4,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"part":22,"_links":{"self":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapters\/33"}],"collection":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/wp\/v2\/users\/3"}],"version-history":[{"count":13,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapters\/33\/revisions"}],"predecessor-version":[{"id":332,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapters\/33\/revisions\/332"}],"part":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/parts\/22"}],"metadata":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapters\/33\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/wp\/v2\/media?parent=33"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/pressbooks\/v2\/chapter-type?post=33"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/wp\/v2\/contributor?post=33"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.palni.org\/writingfordigitalmedia\/wp-json\/wp\/v2\/license?post=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}