Nothing Special   »   [go: up one dir, main page]

skip to main content
chapter

Loss of Privacy

Published: 15 February 2024 Publication History
First page of PDF

References

[1]
“Britain Is ‘Surveillance Society,’” BBC News, 2006. See also Allison Linn, “Post 9/11, Surveillance Cameras Everywhere,” NBCNews, August 23, 2011. See also Ron Nixon, “On the Mexican Border, a Case for Technology Over Concrete,” New York Times, June 21, 2017. See also Timothy Williams, “Can 30,000 Cameras Help Solve Chicago’s Crime Problem?,” New York Times, May 26, 2018. See also Eric L. Piza et al., “CCTV Surveillance for Crime Prevention: A 40-year Review with Meta-Analysis,” Criminology and Public Policy 18, no. 1 (2019): 135–59. See also https://en.wikipedia.org/wiki/Mass_surveillance_in_the_United_Kingdom.
[2]
Paul Mozur, “Inside China’s Dystopian Dreams: A.I. Shame and Lots of Cameras,” New York Times, July 8, 2018. See also Javier C. Hernandez, “In China, Daydreaming Students Are Caught on Camera,” New York Times, April 25, 2017. See also Amy Qin, “Chinese City Uses Facial Recognition to Shame Pajama Wearers,” New York Times, January 21, 2020. See also Kendra Albert et al., “Politics of Adversarial Machine Learning,” in Schneier on Security (February 2021), https://www.schneier.com/wp-content/uploads/2020/02/Politics_of_Adversarial_Machine_Learning-3.pdf.
[3]
Alan F. Westin, Privacy and Freedom (Atheneum, 1967). For a classic legal article, see also Samuel D. Warren and Louis D. Brandeis, The Right to Privacy (Harvard Law Review, 1890), 4, 193–220. See also Benjamin E. Bratman, “Brandeis and Warren’s The Right to Privacy and the Birth of the Right to Privacy,” Tennessee Law Review 69 (2002): 623–52.
[4]
Daniel Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review 154 (2006): 477–564. See also Daniel Solove, Understanding Privacy (Harvard University Press, 2008). See also Daniel Solove, Nothing to Hide: The False Tradeoff Between Privacy and Security (Yale University Press, 2011), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3976770. See also Woodrow Hartzog, “What Is Privacy? That Is the Wrong Question,” University of Chicago Law Review 88 (2021): 1677.
[6]
Michael Riley, Jordan Robertson, and Anita Sharpe, “The Equifax Hack Has the Hallmarks of State-Sponsored Pros,” Bloomberg, September 29, 2017. See also Stacy Cowley and Tara Siegel Bernard, “As Equifax Amassed Ever More Data, Safety Was a Sales Pitch,” New York Times, September 23, 2017. See also Shannon Liao, “Chatbot Lets You Sue Equifax for Up to $25,000 without a Lawyer,” The Verge, September 11, 2017. See also Kurt Wagner, “Facebook Data on 533 Million Users Reemerges Online for Free,” Bloomberg, April 3, 2021.
[7]
Zack Whittaker, “A New Data Leak Hits Aadhaar, India’s National ID Database,” ZDNet, March 23, 2018.
[8]
Nazi Germany, IEEE Annals of the History of Computing 16, no. 3: 25–39. See also Edwin Black, “IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation,” Crown, 2000. See also Gabriel Schoenfield, “The Punch-Card Conspiracy: A Journalist Explores Relations between I.B.M. and the Third Reich,” New York Times, March 18, 2001. See also Thomas Coombes, “Lessons from the Stasi,” The European Magazine, April 1, 2015. See also Andrew Curry, “No, the NSA Isn’t Like the Stasi—And Comparing Them Is Treacherous,” Wired, January 14, 2015. See also https://en.wikipedia.org/wiki/Stasi_Records_Agency.
[9]
https://en.wikipedia.org/wiki/National_identification_number. See also Hal Berghel, “Identity Theft, Social Security Numbers, and the Web,” Communications of the ACM 43, no. 2 (2000): 17–21. See also Adrienne Jeffries, “Identity Crisis: How Social Security Numbers Became Our Insecure National ID,” The Verge, September 26, 2012.
[10]
EPIC.org, National ID and the REAL ID Act (Electronic Privacy Information Center, 2017), https://www.epic.org/privacy/id_cards/. DHS.gov, “About Real ID,” 2023, https://www.dhs.gov/real-id/about-real-id. See also Debra Kamin, “You’ve Got to Be Kidding! Real ID Deadline for Domestic Flyers Is Extended. Again,” New York Times, December 5, 2022.
[11]
John Shattuck, “In the Shadow of 1984: National Identification Systems, Computer-Matching, and Privacy in the United States,” Hastings Law Journal 35 (1984): 991–1006. See also Neil Munro, “The Ever-Expanding Network of Local and Federal Databases,” Communications of the ACM 45, no. 7 (2002): 17–9.
[12]
By 2004, an estimated 52 US government agencies were carrying out or planning to carry out 199 separate data mining efforts, with 122 of them making use of personal data. See Ira S. Rubinstein, Ronald D. Lee, and Paul M. Schwartz, “Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches,” University of Chicago Law Review 75, no. 1 (2008): 261–85. See also Christopher Slobogin, “Data Mining and the Fourth Amendment,” University of Chicago Law Review 75, no. 1 (2008): 317–41. See also Brian X. Chen, “I Shared My Phone Number. I Learned I Shouldn’t Have,” New York Times, August 15, 2019. See also Gina Kolata, “Your Data Were ‘Anonymized’? These Scientists Can Still Identify You,” New York Times, July 23, 2019. See also Luc Rocher, Julien M. Hendrickx, and Yves-Alexandre de Montjoye, “Estimating the Success of Re-Identifications from Incomplete Data in Generative Models,” Nature Communications 10 (July 23, 2019): 3069.
[13]
Lillian R. BeVier, “Information about Individuals in the Hands of Government: Some Reflections on Mechanisms for Privacy Protection,” William & Mary Bill of Rights Journal 4 (1995): 455–506. See also https://en.wikipedia.org/wiki/Government_database. See also Daniel J. Solove, “Privacy and Power: Computer Databases and Metaphors for Information Privacy,” Stanford Law Review 53 (2001): 1393–462. See also Robert O’Harrow Jr., “Centers Tap into Personal Databases,” Washington Post, April 2, 2008. See also Sandra E. Garcia, “U.S. Requiring Social Media Information from Visa Applicants,” New York Times, June 2, 2019.
[14]
David Alexander, “5.6 Million Fingerprints Stolen in U.S. Personnel Data Hack: Government,” Reuters, September 23, 2015. See also Brendan I. Koerner, “Inside the Cyberattack that Shocked the US Government,” Wired, October 23, 2016. See also Jacob Kastrenakes, “SEC Issues $35 Million Fine over Yahoo Failing to Disclose Data Breach,” The Verge, 2018. See also GAO, Information Security: Control Deficiencies Continue to Limit IRS’s Effectiveness in Protecting Sensitive Financial and Taxpayer Data (US Government Accountability Office, July 26, 2017), https://www.gao.gov/products/GAO-17-395. See also Kevin Poulsen, “Five IRS Employees Charged with Snooping on Tax Returns,” Wired, May 13, 2008. See also Alexander Hendrie, “IRS Agents Caught Snooping on Taxpayer Data Rehired,” Americans for Tax Reform, February 6, 2015, https://www.atr.org/irs-agents-caught-snooping-taxpayer-data-rehired.
[15]
J. R. Minkel, “Bureau Gave Up Names of Japanese-Americans in WWII,” Scientific American, March 30, 2007. See also Lynette Clemetson, “Homeland Security Given Data on Arab-Americans,” New York Times, July 30, 2004.
[16]
Kenneth C. Laudon, “Data Quality and Due Process in Large Interorganizational Record Systems,” Communications of the ACM 29, no. 1 (1986): 4–11.
[17]
Angana Chatterji, Citizenship Laws and the Nazification of India. Berkley Center for Religion, Peace & World Affairs (Georgetown University, March 9, 2020), https://berkleycenter.georgetown.edu/responses/citizenship-laws-and-the-nazification-of-india. See also Gopal Krishna, “India’s Identity Crisis: Nine Reasons to Fear National Population Register (NPR) and Aadhaar,” Business Today, February 4, 2022, https://www.businesstoday.in/business/columns/story/national-population-register-npr-and-aadhaar-identity-india-data-collection-caa-249416-2020-02-04?utm_source=topic&utm_medium=topic&utm_campaign=topic.
[18]
Paul Mozur, Jonah M. Kessel, and Melissa Chan, “Made in China, Exported to the World: The Surveillance State,” New York Times, April 24, 2019. See also Sui-Lee Wee, “China Uses DNA to Track Its People, with the Help of American Expertise,” New York Times, February 21, 2019.
[19]
Christina Zhao, “‘Black Mirror’ in China: 1.4 Billion Citizens to Be Monitored through Social Credit System,” Newsweek.com, May 1, 2018, https://www.newsweek.com/china-social-credit-system-906865. See also The Late Show with Stephen Colbert, “Everyone In China Is Getting A ‘Social Credit Score,’” May 8, 2018, https://www.youtube.com/watch?v=N4Gr-HLM7Qk. See also Mike Elgan, “Uh-oh. Silicon Valley Is Building a Chinese-Style Social Credit System,” Fast Company, August 26, 2019. For a fictional account of a “social credit” society, in which people are on a never-ending, stressful, and soul-destroying quest to raise their ratings for real rewards, see https://en.wikipedia.org/wiki/Nosedive_(Black_Mirror).
[20]
Office of the U.S. Director of National Intelligence, “Report to the Director of National Intelligence,” 2022, https://www.dni.gov/files/ODNI/documents/assessments/ODNI-Declassified-Report-on-CAI-January2022.pdf. See also Dell Cameron (2023). Secretive White House Surveillance Program Gives Cops Access to Trillions of US Phone Records. Wired, 28 Nov.
[21]
Christo Petrov, “25+ Impressive Big Data Statistics for 2023,” TechJury, May 20, 2023, https://techjury.net/blog/big-data-statistics/.
[22]
Executive Office of the President, “Big Data: Seizing Opportunities, Preserving Values,” 2014, https://obamawhitehouse.archives.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf. See also Boel Nelson and Tomas Olovsson, “Security and Privacy for Big Data: A Systematic Literature Review,” 2016 IEEE International Conference on Big Data (2015): 3693–702.
[23]
Shoshana Zuboff, The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (PublicAffairs, 2019). See also James Silverman, “How Tech Companies Manipulate Our Personal Data,” New York Times, January 18, 2019. See also James Bridle, “The Age of Surveillance Capitalism by Shoshana Zuboff Review: We Are the Pawns,” Guardian, February 2, 2019. See also Shoshana Zuboff, “Surveillance Capitalism and the Challenge of Collective Action,” New Labor Forum, January 24, 2019,.
[24]
Caroline Daniel and Maija Palmer, “Google’s Goal: To Organise Your Daily Life,” Financial Times, May 22, 2007. See also Daisuke Wakabayashi, “How Google Cashes In on the Space Right Under the Search Bar,” New York Times, April 23, 2017. See also Daisuke Wakabayashi, “Google Will No Longer Scan Gmail for Ad Targeting,” New York Times, June 23, 2017. See also Michael Nagle, “Security News This Week: Oh Great, Google Tracks What You Buy Online with Gmail,” Brian Barrett Security, May 18, 2019, https://icexp.com/reader/security-news-this-week-oh-great-google-tracks-what-you-buy-online-with-gmail/.
[25]
Danah M. Boyd and Nicole Ellison, “Social Network Sites: Definition, History, and Scholarship,” Journal of Computer-Mediated Communication 13 (2008): 210–30.
[26]
Bernhard Debatin, Jennette P. Lovejoy, Ann-Kathrin Horn, and Brittany N. Hughes, “Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences,” Journal of Computer-Mediated Communication 15 (2008): 83–108. See also David Nield, “You Almost Definitely Don’t Know All the Ways Facebook Tracks You,” Gizmodo, June 8, 2017. See also Romain Dillet, “Facebook Knows Literally Everything About You: Behind Every Feature, Facebook Is Collecting Data,” TechCrunch, March 23, 2018.
[27]
Alyson L. Young and Anabel Quan-Haase, “Information Revelation and Internet Privacy Concerns on Social Network Sites: A Case Study of Facebook,” 2009 Proceedings of the Fourth International Conference on Communities and Technologies (2009): 265–73. See also Danah Boyd and Eszter Hargittai, “Facebook Privacy Settings: Who Cares?,” First Monday 15, no. 8 (2010).
[28]
Wali Ahmed Usmani, Diogo Marques, Ivan Beschastnikh, Konstantin Beznosov, Tiago Guerreiro, and Luís Carriço, “Characterizing Social Insider Attacks on Facebook,” Proceedings CHI’17 (2017): 3810–20.
[29]
Matthew Rosenberg, Nicholas Confessore, and Carole Cadwalladr, “How Trump Consultants Exploited the Facebook Data of Millions,” New York Times, March 17, 2018. See also Cale Guthrie Weissman, “How Amazon Helped Cambridge Analytica Harvest Americans’ Facebook Data,” Fast Company, March 27, 2018. See also Gabriel J. X. Dance, Ben Laffin, Drew Jordan, and Malachy Browne, “How Cambridge Analytica Exploited the Facebook Data of Millions,” New York Times, April 8, 2018. See also Sheera Frenkel, “Scholars Have Data on Millions of Facebook Users. Who’s Guarding It?,” New York Times, May 6, 2018. See also Kathleen Hall Jamieson, Cyber-War: How Russian Hackers and Trolls Helped Elect a President (Oxford University Press, 2018).
[30]
Arjun Kharpal, “Mark Zuckerberg’s Testimony: Here Are the Key Points You Need to Know,” CNBC, April 11, 2018. See also Irina Ivanova, “8 Promises from Facebook after Cambridge Analytica,” CBS News, April 10, 2018. See also Michael LaForgia and Gabriel J. X. Dance, “Facebook Gave Data Access to Chinese Firm Flagged by U.S. Intelligence,” New York Times, June 5, 2018. See also Sheera Frenkel, “Facebook Bug Changed Privacy Settings of Up to 14 Million Users,” New York Times, June 7, 2018. See also Michael LaForgia, Matthew Rosenberg, and Gabriel J. X. Dance, “Facebook Data Deals Are Under Criminal Investigation,” New York Times, March 13, 2019.
[31]
Michael Grothaus, “Here’s How to See the Data that Tech Giants Have About You,” Fast Company, May 25, 2018. See also Stefan Stieger, Christoph Burger, Manuel Bohn, and Martin Voracek, “Who Commits Virtual Identity Suicide? Differences in Privacy Concerns, Internet Addiction, and Personality between Facebook Users and Quitters,” Cyberpsychology, Behavior, and Social Networking 16, no. 9 (2013): 629–34.
[32]
“The Facebook Fallacy: Privacy Is Up to You,” New York Times. April 24. See also Alessandro Aquisti, Laura Brandimarte, and George Loewenstein, “Privacy and Human Behavior in the Age of Information,” Science, January 30, 2015, https://www.cmu.edu/dietrich/sds/docs/loewenstein/PrivacyHumanBeh.pdf.
[33]
Emily Dreyfuss, “Facebook Hires Up Three of Its Biggest Privacy Critics,” Wired, January 30, 2019. See also Zeynep Tufekci, “Zuckerberg’s So-Called Shift Toward Privacy,” New York Times, March 7, 2019. See also Mike Isaac, “Facebook Unveils Redesign as It Tries to Move Past Privacy Scandals,” New York Times, April 30, 2019.
[34]
Jason Aten, “Apple Quietly Rolled Out a Change that Could Be the End of Facebook,” Inc., October 26, 2022.
[35]
https://en.wikipedia.org/wiki/Radio-frequency_identification. See also Sarah Spiekermann, “RFID and Privacy: What Consumers Really Want and Fear,” Personal and Ubiquitous Computing 13 (2009): 423–34.
[36]
Simon Hill, “Find Out How to Keep Tabs on Your Phone with These Helpful Tracking Tips,” Digital Trends, March 28, 2018, https://www.digitaltrends.com/mobile/how-to-track-a-cell-phone/. See also Janus Kopstein, “A Phone for the Age of Snowden,” New Yorker, January 30, 2014.
[37]
Alex Pentland, Social Physics: How Good Ideas Spread—The Lessons from a New Science (Penguin Press, 2014). See also Aamena Alshamsi et al. “Beyond Contagion: Reality Mining Reveals Complex Patterns of Social Influence,” PLoS One 10, no. 8 (2015). For the origins of the active badge concept, see Roy Want, Andy Hopper, Veronica Falcao, and Jonathon Gibbons, “The Active Badge Location System,” ACM Transactions on Information Systems 10, no. 1 (1992): 91–102.
[38]
Andrew Hilts, Christopher Parsons, and Jeffrey Knockel, “Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security,” Citizen Lab, February 2, 2016, https://citizenlab.ca/2016/02/fitness-tracker-privacy-and-security/. See also GAO, Vehicle Data Privacy: Industry and Federal Efforts Under Way, but NHTSA Needs to Define Its Role (US Government Accountability Office, July 2017), http://www.gao.gov/assets/690/686284.pdf.
[39]
Daniel Halperin, Tadayoshi Kohno, Thomas S. Heydt-Benjamin, Kevin Fu, and William H. Maisel, “Security and Privacy for Implantable Medical Devices,” Pervasive Computing (January–March 2008): 30–9.
[40]
Mark Weiser, “The Computer for the 21st Century,” Scientific American (September 1991): 94–104. See also Blaine A. Price, Karim Adam, and Bashar Nuseibeh, “Keeping Ubiquitous Computing to Yourself: A Practical Model for User Control of Privacy,” International Journal of Human–Computer Studies 63 (2005): 228–253. See also Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park, and Spyros Kokolakis, “Privacy and Fair Information Practices in Ubiquitous Environments: Research Challenges and Future Directions,” Internet Research 19, no. 2 (2009): 194–208. See also Tanzima Hashem and Lars Kulik, “‘Don’t trust anyone’: Privacy Protection for Location-Based Services,” Pervasive and Mobile Computing 7 (2011): 44–59.
[41]
Ben Wajoyla, “How It Works: The Computer Inside Your Car,” PopularMechanics.com, February 21, 2012, https://www.popularmechanics.com/cars/how-to/a7386/how-it-works-the-computer-inside-your-car/. See also Jon Keegan and Alfred Ng, “Who Is Collecting Data from Your Car,” The Markup.org, July 27, 2022, https://themarkup.org/the-breakdown/2022/07/27/who-is-collecting-data-from-your-car. Security flaws in car computers are increasingly being weaponized, for example, see Kashmir Hill, “Your Car is Tracking You. Abusive Partners May Be, Too,” New York Times, December 31, 2023.
[42]
Brian X. Chen, “Your Doorbell Camera Spied on You. Now What?,” New York Times, February 19, 2020. See also Drew Harwell, “Managers Turn to Surveillance Software, Always-On Webcams to Ensure Employees Are (Really) Working from Home,” Washington Post, April 30, 2020. See also Katherine Schwab, “It’s Not Just Google or Facebook: The Freezer Aisle Is Ad Targeting Now,” Fast Company, February 6, 2019. See also Sapna Maheshwari, “Stores See a Future Without ‘May I Help You?’ (They’ll Already Have Your Data),” New York Times, March 10, 2019. See also Timothy Williams, “In High-Tech Cities, No More Potholes, but What About Privacy?,” New York Times, January 1, 2019. See also Chantal Da Silva, “Palintir’s ICE Contracts ‘Raise Human Rights Concerns,’ Report Warns as Firm Plans to Go Public,” Forbes, September 28, 2020. See also Rafil Kroll-Zaldi, “Your DNA Test Could Send a Relative to Jail,” New York Times, December 27, 2021. See also Greg Noone, “The Controversial Rise of Biometric Technology Among the Displaced,” Tech Monitor, October 20, 2022. See also Matt Burgess, “This Surveillance System Tracks Inmates Down to Their Heart Rates,” Wired, June 11, 2023. One more “technology for surveillance” is that sensitive data on people’s e-book reading habits is being sold in another kind of surveillance capitalism, see Lia Holland (2023). “E-books are Fast Becoming Tools of Corporate Surveillance,” Fast Company, December 12, 2023.
[43]
Paul Mozur, “Inside China’s Big Tech Conference, New Ways to Track Citizens,” New York Times, December 5, 2017. See also David Owen, “Here’s Looking at You,” New Yorker, December 17, 2018. See also Cade Metz, “Facial Recognition Tech Is Growing Stronger, Thanks to Your Face,” New York Times, July 13, 2019. See also Kashmir Hill, “The Secretive Company That Might End Privacy as We Know It,” New York Times, January 18, 2020. See also Kashmir Hill and Gabriel J. X. Dance, “Clearview’s Facial Recognition App Is Identifying Child Victims of Abuse,” New York Times, February 7, 2020. See also General Accounting Office, “Facial Recognition Technology: Federal Law Enforcement Agencies Should Better Assess Privacy and Other Risks. Report GAO-21-518,” 2021, https://www.gao.gov/products/gao-21-518. See also Nathan Benaich and Ian Hogarth, “State of AI Report,” 2021, https://www.stateof.ai/.
[44]
Big Brother Watch, “Are They Still Watching?,” BigBrotherWatch.com, February, 2016, https://www.bigbrotherwatch.org.uk/wp-content/uploads/2016/02/Are-They-Still-Watching.pdf.
[45]
Timnit Gebru et al., “Using Deep Learning and Google Street View to Estimate the Demographic Makeup of Neighborhoods across the United States,” Proceedings of the National Academy of Sciences of the United States of America 114, no. 50 (December 21, 2017): 13108–13. See also Steve Lohr, “How Do You Vote? 50 Million Google Images Give a Clue,” New York Times, December 31, 2017.
[46]
For an interesting example, see Steven Melendez, “A New Border Security App Uses AI to Flag Suspicious People in Seconds,” Fast Company, March 6, 2018, describing a machine learning app that uses passenger travel histories and other data to predict which people (and cargo) at border crossings and airports are suspicious. For a comprehensive analysis of privacy and civil liberty risks from video surveillance, and recommendations for action, see Jay Stanley, “The Dawn of Robot Surveillance: AI, Video Analytics, and Privacy,” American Civil Liberties Union (2019), https://www.aclu.org/report/dawn-robot-surveillance.
[47]
Elizabeth Laird et al., Hidden Harms: The Misleading Promise of Monitoring Students Online (Center for Democracy and Technology, August 2022), https://cdt.org/insights/report-hidden-harms-the-misleading-promise-of-monitoring-students-online/. See also Pia Ceres, “Kids Are Back in Classrooms and Laptops Are Still Spying on Them,” Wired, August 3, 2022. See also Cory Doctorow, “Company that Makes Millions Spying on Students Will Get to Sue a Whistleblower,” Medium, April 21, 2023.
[48]
Albert Fox Cahn and Eleni Manis, Pregnancy Panopticon: Abortion Surveillance after Roe (Surveillance Technology Oversight Project, May 24, 2022), https://www.stopspying.org/pregnancy-panopticon. See also Jake Laperruque et al., Following the Overturning of Roe v Wade, Action Is Needed to Protect Health Data (Center for Democracy and Technology, June 24, 2022), https://cdt.org/insights/following-the-overturning-of-roe-v-wade-action-is-needed-to-protect-health-data/. See also Russell Brandom et al., “The Biggest Privacy Risks in Post-Roe America,” TheVerge.com, June 27, 2022, https://www.theverge.com/23185081/abortion-data-privacy-roe-v-wade-dobbs-surveillance-period-tracking. See also Kendra Albert, Maggie Delano, and Emma Weil, “Fear, Uncertainty, and Period Trackers,” Medium, June 28, 2022. See also Alisson McCann and Amy Schoenfeld Walker, “One Year, 61 Clinics: How Dobbs Changed the Abortion Landscape,” New York Times, June 22, 2023. See also Austin Bailey, “Arkansas Attorney General Wants to Know About Your Out-of-State Abortion,” Arkansas Times, July 16, 2023.
[49]
Martin Dodge and Rob Kitchin, “The Ethics of Forgetting in an Age of Pervasive Computing.” UCL CASA Working Paper 92 (March 2005), http://discovery.ucl.ac.uk/1292/.
[50]
Anita L. Allen, “Lifelogging, Memory, and Surveillance,” University of Chicago Law Review 75, no. 1 (2008): 47–74.
[51]
Gordon Bell, “A Personal Digital Store,” Communications of the ACM 44, no. 1 (2001): 86–91. See also Jim Gemmell, Gordon Bell, and Roger Lueder, “MyLifeBits: A Personal Database for Everything,” Communications of the ACM 49, no. 1 (2006): 88–95.
[52]
Kate Eichhorn, The End of Forgetting: Growing Up with Social Media (Harvard University Press, 2019). See also https://archive.org/web/. See also Jeffrey Rosen, “The Web Means the End of Forgetting,” New York Times, July 21, 2010. For a discussion of technology that does not endanger forgetting, see Casey Johnston, “Snapchat, Instagram Stories, and the Internet of Forgetting,” New Yorker, August 5, 2016. See also Lauren Goode, “I Called Off My Wedding. The Internet Will Never Forget,” Wired, April 6, 2021. See also Kashmir Hill, “Our Digital Pasts Weren’t Supposed to Be Weaponized Like This,” New York Times, May 29, 2021.
[53]
Abigail Sellen and Steve Whittaker, “Beyond Total Capture: Constructive Critique of Lifelogging,” Communications of the ACM 53, no. 5 (2010): 70–7. See also Williams S. L. Hodges, E. Berry, S. Izadi, J. Srinivasan, A. Butler, G. Smyth, N. Kapur, and K. Wood, “SenseCam: A Retrospective Memory Aid,” in Ubicomp 2006: The 8th International Conference on Ubiquitous Computing, Lecture Notes in Computer Science, ed. P. Dourish and A. Friday (2006), 4206, 177–93. See also Steve Hodges, Emma Berry, and Ken Wood, “SenseCam: A Wearable Camera that Stimulates and Rehabilitates Autobiographical Memory,” Memory 19, no. 7 (2011): 685–96. A recent account describes new $300 attractive high-tech glasses from Meta and Ray Ban (under a partnership mentioned in Section 7.2) that contains a tiny camera for taking photos and videos, and speakers and microphones for listening to music and for speaking on the phone. The uses for recording memories are awesome; the possibilities for invading privacy staggering. See Brian X. Chen, “How Meta’s New Face Camera Heralds a New Age of Surveillance,” New York Times, December 13, 2023.
[54]
IBM Security, “Cost of a Data Breach Report 2023,” 2023, https://www.ibm.com/reports/data-breach.
[55]
Susan Landau, People Count: Tracing Apps and Public Health (MIT Press., 2021). See also Carmel A. Troncoso et al. “Deploying Decentralized, Privacy-Preserving Proximity Tracing,” Communications of the ACM 65, no. 9 (2022): 48–57.
[56]
Tripp Mickle, “In Monitoring Child Sex Abuse, Apple Is Caught Between Safety and Privacy,” New York Times, September 1, 2023.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Books
Digital Dreams Have Become Nightmares: What We Must Do
February 2024
364 pages
ISBN:9798400717703
DOI:10.1145/3640479

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 February 2024

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Chapter

Appears in

ACM Books

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media