Publicized Intimacies in Social Media & Surveillance Presentation

Download Report

Transcript Publicized Intimacies in Social Media & Surveillance Presentation

Lemi Baruh
&
Levent Soysal
Kadir Has University
Background & Problem
 Rise of social media:
 “Empowering” individuals to express
themselves
 Prerequisite: disclosure of intimate details
 Discussions regarding threats to individual
privacy
 Control over identification information
 Fraud & data security
 Protection of underage users’ privacy (from sexual predators)
 Institutions snooping around
 Kansas University penalizes students after perusing Facebook
photos of dorm parties.
 Microsoft checks Facebook pages of potential employees.
2
Background & Problem
 Most studies on privacy implications of
social media adopted a piecemeal
approach:
 In isolation from each other and the broader
context of a changing regime of surveillance
 Purpose:
 Investigate two related trends and their
relationship to social media
 Rise of personal, intimate and the subjective as a
social currency
 Evolving nature of automated surveillance
3
The New Individual: Image Laborer
 Ulrich Beck’s Reflexive Modernity:
 The self became the primary agent of
“Professionals in pursuit
of image”
meaning.
 Objective, institution driven information
loses credence as the currency of
information derived from subjective &
personal experience increases.
 Phantasmagoric Workplace*
 The individual is responsible for
maintaining his/her own image
constantly.
 Having a unique image, being
recognized is a crucial prerequisite of
success in contemporary capitalism
*Hearn, Alison. 2006. 'John, a 20-year old Boston native with a great sense of humour': on the spectacularization of
the 'self' and the incorporation of identity in the age of reality television. International Journal of Media and Cultural
5
Politics 2 (2):131-147.
The New Individual: Image Laborer
4 5
The New Individual: Image
6 6
Modular Identity of the New Individual
 Introversive Publicity
 Individuals with introversive personality are
characterized as being introspective.
 Self expression of subjective experience in
social media, despite its public nature, is
introspective.
 It is part of the image labor, and hence it is an
act of publicity.
 This does not mean it is intended to mislead
 It is modular
 This does not mean it is incoherent.
 Each component added helps create and
communicate a unique identity.
 The introversive is temporary, incomplete
and fleeting
7
Self Disclosure & Privacy Rights
 In an environment of extensive surveillance, self-disclosure is seen as the only viable way
for individuals to actively participate in the creation of images about themselves*
 Example: Dr. Hasan Elahi (www.trackingtransience.net)
*Groombridge, N. (2002). Crime control or crime culture TV?. Surveillance and Society, 1, 30-36.
*Koskela, H. (2004). Webcams, TV shows and mobile phones: Empowering exhibitionism. Surveillance & Society, 2(2/3), 200-215.
9
Contemporary Surveillance
 Data intensive. Social and other forms of
interactive media provide an increasingly
larger share of data.
 Data mining – algorithm based detection of
deviations from the base statistic*
 Three innocuous acts combined, who knows if they
are a threat?
 The components of the modular self are taken
out of their context.
*Andrejevic, M. (2007). iSpy: Surveillance and Power in the Interactive Era. Lawrence: University Press of Kansas
10
From Panopticon to…
 The panopticon’s disciplinary
function is partly dependent on
uncertainty
 “Chilling effect”
11
Kafkaesque Surveillance*
*Solove, D. J. (2001). Privacy and power: Computer databases and metaphors for information privacy. Stanford Law Review, 53, 1393-1462.
12
Kafkaesque Surveillance*
 Permanency of data
 Aura of Objectivity: Rationalization of surveillance through
automated mining
 “...figure of the vicious tyrant is replaced by that of the indifferent
bureaucrat.”**
 Automated data-mining dehumanizes and consequently “removes
human bias”.
 The automated surveillant is indifferent and hence its inferences are
“objective”
 Reliance on statistical evidence adds to this aura of objectivity
*Solove, D. J. (2001). Privacy and power: Computer databases and metaphors for information privacy. Stanford Law
Review, 53, 1393-1462.
**Mark Andrejevic. iSpy: Surveillance and Power in the Interactive Era. Lawrence: University Press of Kansas, 2007
15