Vernacular Resistance to Data Collection and Analysis: A Political Theory

@inproceedings{Brunton2011VernacularRT,
  title={Vernacular Resistance to Data Collection and Analysis: A Political Theory},
  author={Finn Brunton and Helen Nissenbaum},
  booktitle={First Monday},
  year={2011}
}
Computer-enabled data collection, aggregation, and mining dramatically change the nature of contemporary surveillance. Refusal is not a practical option, as data collection is an inherent condition of many essential societal transactions. We present one vernacular response to this regime of everyday surveillance, a tactic we call obfuscation. With a variety of possible motivations, actors engage in obfuscation by producing misleading, false, or ambiguous data with the intention of confusing an… 
Obfuscation and Strict Online Anonymity
  • T. Doyle
  • Computer Science
    Philosophical Studies Series
  • 2019
TLDR
It is argued that the best hope for protecting privacy online is anonymity through obfuscation, and how individual, rational decisions have led to a surveillance regime that few would have chosen beforehand and the alleged autonomy of information technology are examined.
Privacy, obfuscation, and propertization
  • T. Doyle
  • Computer Science
    IFLA Journal
  • 2018
TLDR
It is concluded that privacy is a lost cause and that the attempts to defend it from the moral point of view should be called off.
The (Big) Data-security assemblage: Knowledge and critique
The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security practices are deployed in a digital age and with what political effects. While critical scholars
Built to lie: Investigating technologies of deception, surveillance, and control
  • T. Monahan
  • Sociology, Computer Science
    Inf. Soc.
  • 2016
TLDR
An analysis of deceptive systems reveals more fundamental problems: imbalances in power and widespread acquiescence to corporate and state efforts to control individuals, groups, and their data.
Finn Brunton and Helen Nissenbaum: Obfuscation: a user’s guide for privacy and protest
  • T. Doyle
  • Sociology, Computer Science
    Ethics and Information Technology
  • 2016
TLDR
In her highly influential 2010 book Privacy in Context Helen Nissenbaum confronted the rising threat to privacy posed by information technology and its increased ability to gather, store, analyze, and distribute personal information, presenting a lucid discussion and careful justification of obfuscation in a broad range of cases.
From data politics to the contentious politics of data
This article approaches the paradigm shift of datafication from the perspective of civil society. Looking at how individuals and groups engage with datafication, it complements the notion of “data
Paratactic commoning: collective knowledge production networking as political struggle
ABSTRACT Today we are confronted with an ever-increasing tactical control of rights to access, use and store data as a shared resource. Control of commons and commoning has never before been this
The end of forgetting: Strategic agency beyond the panopticon
TLDR
A range of strategic information-management options available to individuals and institutions in the networked society are discussed, and these ‘blueprints’ are compared to Foucault’s well-known panopticon model to develop a lexicon for the design, description and critique of socio-technical systems.
Self Curation, Social Partitioning, Escaping from Prejudice and Harassment: the Many Dimensions of Lying Online
TLDR
This paper uses a survey to examine ways in which people fabricate, omit or alter the truth online, and concludes that lying may be essential to maintaining a humane online society.
Toward a Hermeneutics of Data
TLDR
Data's impact on society and studies of data have reached a point for which it is now time for historians of computing to historicize data directly, and computing historians are uniquely positioned to probe the entanglement of networked infrastructures, data, and cultures of computing in the recent past and near future.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 55 REFERENCES
Data Mining and the Security-Liberty Debate
In this essay, written for a symposium on surveillance for the University of Chicago Law Review, I examine some common difficulties in the way that liberty is balanced against security in the context
On Notice: The Trouble with Notice and Consent
This paper scrutinizes the use of ‘notice and consent’ to address privacy concerns in online behavioral advertising (OBA). It is part of a larger project with Dan Boneh, Arvind Narayanan, and Vincent
A Tack in the Shoe: Neutralizing and Resisting the New Surveillance
Eleven behavioral techniques of neutralization intended to subvert the collection of personal information are discussed: discovery moves, avoidance moves, piggybacking moves, switching moves,
Online Privacy, Tailoring, and Persuasion
This chapter tackles a somewhat neglected realm of the information privacy discourse, by directly examining the specific detriments arising from the systematic uses of personal information collected
Inaccuracy as a privacy-enhancing tool
The accuracy principle is one of the key standards of informational privacy. It epitomises the obligation for those processing personal data to keep their records accurate and up-to-date, with the
Profiling and the rule of law
Both corporate and global governance seem to demand increasingly sophisticated means for identification. Supposedly justified by an appeal to security threats, fraud and abuse, citizens are screened,
Technological Dramas
This article examines the technological construction of political power, as well as resistance to political power, by means of an "ideal-typical" model called a technolog ical drama. In technological
The Use of Deception Techniques : Honeypots and Decoys
Honeypots and similar sorts of decoys represent only the most rudimentary uses of deception in protection of information systems. But because of their relative popularity and cultural interest, they
Disinformation: A Taxonomy
TLDR
The model is derived from Shannon's communications model, but with an intentional “noise source” and an unintended receiver, to illustrate a variety of disinformation techniques.
Toward an Approach to Privacy in Public: Challenges of Information Technology
This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Although these approaches emphasize the connection between privacy and a
...
1
2
3
4
5
...