The strategy of the obfuscation as the reaction to the digital surveillance
DOI:
https://doi.org/10.15633/ssc.3334Keywords:
obfuscation, digital surveillance, information noise, privacy, asymmetries of power and information, search engine, social mediaAbstract
Users, who take advantage of the digital media, gradually lose their privacy. Internet corporations and national governments use the new technology to track people. It is impossible to avoid the surveillance. Common users will not cope with the fight with Internet giants and state administrations. Helen Nissenbaum and Finn Brunton recommend the defense against the domination of the strong ones. They present the strategy of the obfuscation, i.e. such activity while using the digital media, which will not allow to collect true information about the user, because the information noise will be formed around him. The aim of this article is to show the examples of the digital surveillance, and to present the reaction to this surveillance, namely, the strategy of the obfuscation.References
Barbaro M., Zeller T., A face is exposed for AOL searcher no. 4417749, „New York Times” 09.08.2006, http://www.nytimes.com/2006/08/09/technology/09aol.html (10.05.2017).
Brunton F., Nissenbaum H., Zmyl trop. Na barykadach prywatności w Sieci. Przewodnik, przekł. J. Konieczny, Warszawa 2016.
Directorate General for Internal Policies, Policy Department C: Citizens’ Rights and Constitutional Affairs, Civil Liberties, Justice and Home Affairs, An assessment of the commission’s proposal on privacy and electronic communications, http://www.europarl.europa.eu/RegData/etudes/STUD/2017/583152/IPOL_STU(2017)583152_EN.pdf (12.05.2017).
Google CEO Eric Schmidt dismisses the importance of privacy, https://www.eff.org/deeplinks/2009/12/google-ceo-eric-schmidt-dismisses-privacy (11.05.2017).
Kołodziejczyk Ł., Prywatność w Internecie, Warszawa 2014.
Łuszczek K., Wolność i kontrola w internecie drugiej fali, Tychy 2015.
Niklas J., Unijny projekt ochrony prywatności w Internecie potrzebuje wzmocnienia?, https://panoptykon.org/wiadomosc/unijny-projekt-ochrony-prywatnosci-w-internecie-potrzebuje-wzmocnienia (12.05.2017).
Nissenbaum H., Privacy as Contextual Integrity, „Washington Law Review” 79 (2004), s. 101–139, https://crypto.stanford.edu/portia/papers/RevnissenbaumDTP31.pdf (10.05.2017).
NSA Prism program taps in to user data of Apple, Google and others, https://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data (10.05.2017).
Objectives of „europe-v-facebook.org”, http://europe-v-facebook.org/EN/Objectives/objectives.html (2.05.2017)
Szymielewicz K., Poznaliśmy projekt unijnego rozporządzenia o e-prywatności. Co ma się zmienić?, https://panoptykon.org/wiadomosc/poznalismy-projekt-unijnego-rozporzadzenia-o-e-prywatnosci-co-ma-sie-zmienic (12.05.2017)
Szymielewicz K., Słowo wstępne. Jeszcze możemy odzyskać kontrolę, w: F. Burton, H. Nissenbaum, Zmyl trop. Na barykadach prywatności w Sieci. Przewodnik, przekł. J. Konieczny, Warszawa 2016.
Śliwowski K, Obem A., Odzyskaj kontrolę w sieci. Odcinek III: ustawienia prywatności na Facebooku, https://panoptykon.org/wiadomosc/odzyskaj-kontrole-w-sieci-odcinek-iii-ustawienia-prywatnosci-na-facebooku (2.05.2017).
Trackmenot. Background, https://cs.nyu.edu/trackmenot/#why (3.05.2017).
Uwagi Fundacji Panoptykon dotyczące projektu rozporządzenia w sprawie poszanowania życia prywatnego oraz ochrony danych osobowych w łączności elektronicznej, https://panoptykon.org/sites/default/files/publikacje/panoptykon_uwagi_eprywatnosc_17.01.2017.pdf (12.05.2017).
Vaidhyanathan S., Googlization of everything (and why we should worry), Berkeley–Los Angeles 2011.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and full publishing rights without restrictions, and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).