Vernacular Resistance to Data Collection and Analysis: A Political Theory

@inproceedings{Brunton2011VernacularRT,
  title={Vernacular Resistance to Data Collection and Analysis: A Political Theory},
  author={Finn Brunton and Helen Nissenbaum},
  booktitle={First Monday},
  year={2011}
}
Computer-enabled data collection, aggregation, and mining dramatically change the nature of contemporary surveillance. Refusal is not a practical option, as data collection is an inherent condition of many essential societal transactions. We present one vernacular response to this regime of everyday surveillance, a tactic we call obfuscation. With a variety of possible motivations, actors engage in obfuscation by producing misleading, false, or ambiguous data with the intention of confusing an… 
Obfuscation and Strict Online Anonymity
  • T. Doyle
  • Computer Science
    Philosophical Studies Series
  • 2019
TLDR
It is argued that the best hope for protecting privacy online is anonymity through obfuscation, and how individual, rational decisions have led to a surveillance regime that few would have chosen beforehand and the alleged autonomy of information technology are examined.
Privacy, obfuscation, and propertization
  • T. Doyle
  • Computer Science
    IFLA Journal
  • 2018
TLDR
It is concluded that privacy is a lost cause and that the attempts to defend it from the moral point of view should be called off.
The (Big) Data-security assemblage: Knowledge and critique
TLDR
This paper challenges the credibility of security professionals’ discourses in light of the knowledge that they supposedly mobilize and argues for a series of conceptual moves around data, human–computer relations, and algorithms to address some of the limitations of existing engagements with the Big Data-security assemblage.
Built to lie: Investigating technologies of deception, surveillance, and control
TLDR
An analysis of deceptive systems reveals more fundamental problems: imbalances in power and widespread acquiescence to corporate and state efforts to control individuals, groups, and their data.
Finn Brunton and Helen Nissenbaum: Obfuscation: a user’s guide for privacy and protest
  • T. Doyle
  • Computer Science
    Ethics and Information Technology
  • 2016
TLDR
In her highly influential 2010 book Privacy in Context Helen Nissenbaum confronted the rising threat to privacy posed by information technology and its increased ability to gather, store, analyze, and distribute personal information, presenting a lucid discussion and careful justification of obfuscation in a broad range of cases.
From data politics to the contentious politics of data
This article approaches the paradigm shift of datafication from the perspective of civil society. Looking at how individuals and groups engage with datafication, it complements the notion of “data
Paratactic commoning: collective knowledge production networking as political struggle
ABSTRACT Today we are confronted with an ever-increasing tactical control of rights to access, use and store data as a shared resource. Control of commons and commoning has never before been this
The end of forgetting: Strategic agency beyond the panopticon
TLDR
A range of strategic information-management options available to individuals and institutions in the networked society are discussed, and these ‘blueprints’ are compared to Foucault’s well-known panopticon model to develop a lexicon for the design, description and critique of socio-technical systems.
Self Curation, Social Partitioning, Escaping from Prejudice and Harassment: the Many Dimensions of Lying Online
TLDR
This paper uses a survey to examine ways in which people fabricate, omit or alter the truth online, and concludes that lying may be essential to maintaining a humane online society.
Toward a Hermeneutics of Data
TLDR
Data's impact on society and studies of data have reached a point for which it is now time for historians of computing to historicize data directly, and computing historians are uniquely positioned to probe the entanglement of networked infrastructures, data, and cultures of computing in the recent past and near future.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 55 REFERENCES
Data Mining and the Security-Liberty Debate
TLDR
Important dimensions of data mining's security benefits require more scrutiny, and the privacy concerns are significantly greater than currently acknowledged.
On Notice: The Trouble with Notice and Consent
TLDR
It is concluded that even an opt-in regime in online behavioral advertising would lack legitimacy, due to the confusing disconnect between the privacy policies of online publishers and the tracking and targeting third parties with whom they contract.
A Tack in the Shoe: Neutralizing and Resisting the New Surveillance
Eleven behavioral techniques of neutralization intended to subvert the collection of personal information are discussed: discovery moves, avoidance moves, piggybacking moves, switching moves,
Online Privacy, Tailoring, and Persuasion
This chapter tackles a somewhat neglected realm of the information privacy discourse, by directly examining the specific detriments arising from the systematic uses of personal information collected
Inaccuracy as a privacy-enhancing tool
  • G. G. Fuster
  • Computer Science
    Ethics and Information Technology
  • 2009
TLDR
It is suggested that the use of ‘inaccurate’ data can potentially play a useful role to preserve the informational autonomy of the individual, and that any understandings of privacy or personal data protection that would tend to unduly limit such potential should be critically questioned.
Profiling and the rule of law
TLDR
The author will assess the threats and opportunities of autonomic profiling in terms of its impact on individual autonomy and refined discrimination and indicate the extent to which traditional data protection is effective as regards profiling.
Technological Dramas
This article examines the technological construction of political power, as well as resistance to political power, by means of an "ideal-typical" model called a technolog ical drama. In technological
The Use of Deception Techniques : Honeypots and Decoys
TLDR
This paper introduces honeypots and similar sorts of decoys, discusses their historical use in defense of information systems, and describes some of their uses today, and goes into a bit of the theory behind deceptions, discuss their limitations, and put them in the greater context of information protection.
Disinformation: A Taxonomy
TLDR
The model is derived from Shannon's communications model, but with an intentional “noise source” and an unintended receiver, to illustrate a variety of disinformation techniques.
Toward an Approach to Privacy in Public: Challenges of Information Technology
TLDR
This article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches and is preliminary work in a larger effort to map out future theoretical directions.
...
1
2
3
4
5
...