Mind Control: Sci Fi or Cell Phones?

This week I am reflecting on a Ted Talk given by Tristan Harris entitled, “How a handful of tech companies control billions of minds every day.” He knows what he is talking about: he was “a design ethicist at Google where he studied how to ethically steer peoples’ thoughts” (Harris, 2017). All of the large technology companies have similar labs and positions, although maybe they are not so ethical. So why do these positions exist? Because cell phone technology has created a competition for our attention.

You are experiencing it every day, maybe without even realizing it. You end up binge-watching a show instead of going to bed because the next episode auto-plays and you get sucked in. A teenager you know asks a friend to continue snapchatting for him while he’s on vacation because he doesn’t want to lose his streak. Videos on Facebook or YouTube start playing automatically so you start watching even though you weren’t that interested. Notifications pop up on your cell phone and send you off thinking about or acting on something you had not planned on thinking about or acting on at that moment. A headline pops up at the bottom of an article you read, and you are off reading another. All of these are examples of a few large technology companies swaying our thoughts and actions to do what they want us to do. They have studied the mind, how to get our attention, and the things that motivate us, like fear of losing something (a Snapchat streak) and outrage. Yes,outrage. This is why you see so many inflammatory posts on Facebook and Twitter. What better way to get our attention?

I admit that I’ve been sucked in. My husband and I don’t watch much television, but when Stranger Things is released all at once and the episodes automatically play one after another, it’s difficult to turn it off. I’ve also seen my teenage kids keep their friends’ Snapchat streaks going in their absence. As Tristan Harris states, “It affects everyone because a billion people have one of these [cell phones] in their pocket.”

He prefaces that statement with the following: “The costs are so obvious…It’s not just taking away our agency to spend our attention and live the lives that we want. It’s changing the way that we have our conversations, it’s changing our democracy, and it’s changing our ability to have the conversations and relationships we want with each other” (Harris, 2017).

That may seem like an extreme viewpoint at first, but let’s look at it a little closer. These technology companies have control rooms full of people trying to decide what will grab our attention, and they are all competing with each other. And as the Netflix CEO flippantly said, they are also competing with things like sleep (Hern, 2017). Seriously, though, what one company does, the other will do also, whether as simple as using auto-play or as disturbing as posting controversial items or telling lies to outrage people and perpetuate conversations online that we might not even want to have.

So what can we do about it? The first step is simply to understand that you can be persuaded and that you might want to protect against being persuaded. Harris goes on to discuss two more steps: a new accountability system for those aforementioned control rooms and a “Design Renaissance.” In a perfect world, wouldn’t it be great if these technology companies were aligned with the goals of those they are trying to influence? He uses the example of a lonely person at home getting on Facebook. Instead of Facebook encouraging him to spend more time onscreen alone, it could encourage him to go out and socialize with friends. However, when the bottom line for these companies is profitability, is that realistic? Perhaps, not. But, I do agree that in order for us to take back some control, the first steps are awareness that we are being persuaded and action to protect ourselves.

So what are your thoughts on the topic? Were you aware of this practice by technology companies? How do you feel about it? Now that you know this is happening, will you change the way you use your cell phone? One small step might be turning off notifications. I’d love to hear your thoughts and suggestions.

Harris, T. (2017, July 26). How a handful of tech companies control billions of minds every day [Video File]. Retrieved from https://www.ted.com/talks/tristan_harris_the_manipulative_tricks_tech_companies_use_to_capture_your_attention?language=en

Hern, A. (2017, April 18). Netflix’s Biggest Competitor? Sleep. The Guardian. Available at: https://www.theguardian.com/technology/2017/apr/18/netflix-competitor-sleep-uber-facebook

#SocialMedia and Tribulations

Social media is rampant in our society now and the average adult spends anywhere from 1-3 hours per day on social media platforms. Is this addiction or daily need for social media more impactful than we realize?

Issue #1: CYBERBULLYING

Image result for suicide rates due to cyberbullying

The first issue, and the most obvious to me is the amount of cyberbullying that occurs due to social media. Social media allows us to fully be ourselves but in turn it allows us to act without consequence or fear of true rebuttal. The amount of suicide and depression has steadily been increasing year by year and psychologists are suggesting cyberbullying may be the culprit.

ISSUE #2: WASTING TIME

Social media is excellent at getting our brains a break during the work day, but it is very easy to over use these breaks to the point where you are spending hours at a time on your smart devices taking meanless quizzes that attempt to guess your age based on your breakfast food choices. Websites such as Buzzfeed and Reddit can have you falling down the “Reddit Hole” and a five minute media break will quickly turn into a long sustained break as you read random news that have little to nothing productive about them.

ISSUE #3: ATTENTION SPAN

Image result for social media affecting attention span

Having these quick posts to keep us entertained while waiting in line at the movies is great! But as all things, everything needs to be in moderation. The ability to have something engaging us in the palm of our hands has reduced our attention span. We are quick to move on from a post or article and often have the TLDR (too long didn’t read) mentality. This leads to a decrease in reading and literacy as it affects our younger generations.

ISSUE #4: JEALOUSY

Social media is great at sharing our experiences and letting everyone know what you are doing and how well you are doing. This is great for being able to keep tabs on friends and family, but unfortunately this often leads to jealousy if you feel they are having a better time than you. We all know that in social media, you put your best side on display which can make it appear as though you have it all together with no concerns. HA! No one has it all together.. The world is hard for each and everyone of us but we don’t show this side to our social media.

ISSUE#5: INABILITY TO SEE LIFE

Pics or it didn’t happen right? We have been trained to film, record, and write about everything that happens in our day that might be noteworthy. Sure this may be great to be able to look back and recount memories from a later date; however, we are so concerned about getting that “shot” that we miss the feeling of being fully engrossed in the present. The urge to capture everything pulls us away from our natural presence and our “in the moment” chances to truly experience life raw. So do yourself a favor and leave your camera home during your next trip out and see what small things you notice that you may not have before.

The Price of Privacy: What Are You Paying for Your Online Choices?

I find it rather counter-intuitive that my very first blog happens to be about online privacy. I’ve shied away from blogs for so many years because they seemed too personal. I wasn’t ready to put my thoughts out there on the Internet. Yet, this week I’ve learned that I’ve put so much more of myself out there already without giving it much thought.

I use Facebook. I like to think that I’m a fairly savvy user of the site, reviewing my settings often, marking my photos as “friends only” instead of “public,” and requiring my permission for someone to tag me in a photo or post on my timeline. As an Internet user, you may feel the same way I do: you know what you are doing and are at least somewhat in control. You know you are giving up a little bit of privacy for the convenience of the many free applications you use on a regular basis. We all use free applications. They enable us to socialize, save money, and make life more convenient in so many ways. But are they really free? Are you paying for them with your privacy by handing over more information than you realize?

Data mining has become a huge industry, and data collection is widespread in the United States. Data brokers use data, such as public social media profiles and data from your purchases to provide information to marketers and put you in target categories. This means that each piece of data is not anonymous, but associated with you specifically and can be used for profiling –  to create a sort of picture of who you are and what you want. To give you an idea of scope, one data broker for Facebook has information on almost all of the households in the U.S. and $1 trillion in consumer transactions. Another data broker associated with Facebook, has information on 500 million consumers world-wide and about 1,500 data points per person.

Of course, the privacy concerns go far beyond just Facebook. Much of your online activity, such as search activity, is saved and can be sold to or used by third parties. Linking multiple accounts by using your Facebook or Google sign-on to create a new account exacerbates the problem of privacy. For the convenience of using your existing sign-on, you are connecting a variety of applications and providing more insight for profiling.

So what can you do to at least get back a little bit of your privacy? The article, How to Protect Your Privacy and Remove Data from Online Services, suggests a number of actions that you can take. I felt the following were simple and effective enough to use as a starting point:

  • Check your privacy settings in all of your apps and social media sites.
  • Remove old accounts.
  • Register with an alternate email address.
  • Set your browser to browse in private mode.

It can be overwhelming to think about all of the information you are sharing online and what to do about it. There are many benefits to being online so going “off grid” is not a feasible answer for most of us. However, you should do some research on unfamiliar apps and sites, err on the side of caution when sharing information or giving apps access to your personal data, and pause before you post anything online to think about if it really needs to be out there. Remember, just because an app or site is free, that does not mean that you aren’t paying for it one way or another.

Matteo, V. (2018, January 3). Facebook and Data Mining. TurboFuture. Available at: https://turbofuture.com/internet/How-Facebook-Collects-and-Sells-Your-Data [Accessed 2 Sep. 2019].

Howell, D. (2015, April 22) How to Protect Your Privacy and Remove Data from Online Services. TechRadar. Available at: https://www.techradar.com/news/internet/how-to-protect-your-privacy-and-remove-data-from-online-services-1291515 [Accessed 2 Sep. 2019]

Online Safety and Privacy: Is Ignorance Bliss?

What are your thoughts about the issues of safety, security, and privacy? What are your concerns? What are your ideas for addressing them in ways that still allow you to take advantage of the value of social networking and media?

As I read the articles and watched the assigned videos on privacy and security this week, I threw myself in the fetal position, feeling the hopelessness that I no longer belong to myself.

via GIPHY

But seriously, according to WebHostingGeeks and Privacy International, we have very little knowledge and control about what personal information we share on the web and to whom. Apparently, we have been profiled, not only by the information we shared but by our online behavior. Should we panic?

I started worrying.  So, out of curiosity, I googled myself and I found my personal information in pages where I have never participated or consented to share it, yet there it was. Mylife.com, zoominfo.com, voterrecords.com, to mention some. These pages had my full name, age, home address, working address, and they even offer a background check on me!

To access these records, you have to agree to the following: “I WILL NOT use this information to stalk anyone. If I see someone I know, I WILL NOT use this information for blackmail. I WILL NOT harass people whose criminal records appear on this site”. They even give you ideas!

As I stared at the screen, I wondered how they got my info –somehow, I must have given it to them. It took me a few seconds to decide to be proactive about it and found out how to request that my information is erased. I followed the recommended steps –with my fingers crossed that it wasn’t another trap. I am giving them a few days to see if it worked.

In case you are wondering, I did this:

So, all the reading and the googling made me aware of a problem I didn’t know I had. For me, it was just about being careful, and just thinking before posting. As one of the week’s readings said: “…privacy is the currency of our online lives, paying for petty conveniences with bits of personal information. But we are blissfully ignorant of what that means”. (Hess, 2017)

I haven’t decided yet if I liked it better when I didn’t know I had this problem. As I write this post, I still have more questions than answers. My stream of consciousness goes like this: What are my thoughts about the issues of safety, security, and privacy? Am I concerned about my safety? Is ignorance bliss? Who cares about my data? What do they use it for? Is it for selling me stuff? Can a cybercriminal use my information to steal my identity and buy a house in Timbuktu?

Lessons Learned

Whereas I don’t feel utterly unsafe for what I discovered with this assignment, I will be more careful the next time someone –or something– asks for my information. Here are some ideas on how to take advantage of the value of social networking and media while protecting my privacy and keep myself and my data safe.

Lesson 1: Take control!

Shape your digital footprint and make your online presence what you want it to be. This is not that difficult to achieve. Have “public” accounts for your professional online activities and let people find you.  Be in charge of what the internet says about you. For example, it makes me happy that when I googled myself, I found my LinkedIn Page and some of my Prezi presentations, they make me look good!

Lesson 2: Just say no!

Do not give away your info. Next time you go shopping and the cashier interviews you to enter the rewards program, just say no! Don’t click on the “Accept cookies” button on random webpages. Don’t open suspicious e-mails. Don’t answer the phone if you don’t recognize the number (let them leave a message; if it’s important they will.) Personal information has a lot of value, keep it safe!

Lesson 3: Technical Precautions

Stop leakage of sensitive information by preventing the transmission of confidential data from your computer and mobile devices. How? Use the incognito browser, delete cookies frequently, check the privacy settings of the apps you use and the sites you visit. Disable your microphone in your phone and computer –someone or something may be listening. Likewise, disable the location services for mobile apps so they cannot collect that data. You can never be too cautious.  

Lesson 4: Think before you post!

This one is obvious, but it’s worth remembering it. This is a classic: 

Private Eyes, They’re Watching You…

Privacy by Nick Youngson CC BY-SA 3.0 Alpha Stock Images

Privacy in the digital realm is of major concern. Which is no wonder as the number of data breaches of big companies continues to grow.

By J. Clement

There is another concern, however, and that is the question of how companies and governments will use this information to influence society.

On need only look at China’s “Social Credit System” to bring up ideas of Orwell’s 1984 and Big Brother watching you.

This social system has been in development for a while. The system has roots in Mao’s rule, but in its current state, was created in 2001 (Hoffman). Sold as a way to build up a system for distributing credit, and illustrating trust, this program has a number of much more sinister applications. One can listen to what happens when a Chinese citizen gets a low social credit score, as this episode of NPR’s “Planet Money” covers.

In addition, there is a not so far fetched episode of Netflix’s “Black Mirror” that shows what could happen when someone’s social score drops so low that services are denied. Do people think that this episode mimics China’s Social Credit System? This video explains just that.

In this article from the Washington Post, there is an exploration of what the Chinese people think about this credit scoring system. Could this happen in the United States? This article in Fast Company suggests that it has already happened.

Is it as bad as most people from the West seem to think? According to this article in the MIT Technology Review, the answer may not be as straight forward as we think. In addition, the fact is that Chinese tradition is that of finding ways to incentive moral behavior.

Is this program a simple nudge to get people to behave in a way that is better for the greater good? Does this program make free-thinking citizens into robots who simply follow rules and do not question authority? What happens to those who are marginalized by this system? These questions might be answered with more study of this program.

Regardless of what one might think, as many of these videos and articles suggested, it is impossible not to have your data out there for companies or governments to use. In the end, every time we click “Accept terms” for forfeit a little privacy to get what we want or need from those companies.

  • Clement, J. (2019, July 9). Global identity theft data breaches 2018. Retrieved from https://www.statista.com/statistics/215794/identity-theft-data-breaches-worldwide/
  • Elgan, M. (2019, August 26). Uh-oh: Silicon Valley is building a Chinese-style social credit system. Retrieved from https://www.fastcompany.com/90394048/uh-oh-silicon-valley-is-building-a-chinese-style-social-credit-system
  • Kostka, G. (2019, March 21). What do people in China think about ‘social credit’ monitoring? Retrieved from https://www.washingtonpost.com/politics/2019/03/21/what-do-people-china-think-about-social-credit-monitoring/
  • Hao, K. (2019, April 23). Is China’s social credit system as Orwellian as it sounds? Retrieved from https://www.technologyreview.com/f/613027/chinas-social-credit-system-isnt-as-orwellian-as-it-sounds/
  • Hoffman, Samantha (12 December 2017). “Programming China: The Communist Party’s autonomic approach to managing state security” (PDF). MERICS CHINA MONITOR. Retrieved 15 December 2018.
  • Netflix. (2016, October 21). Nosedive. Black Mirror. New York, New York.
  • NPR. (2018, October 26). Blacklisted In China. Planet Money. New York, New York.
  • YouTube. (2018, April 4). Is China Becoming A Black Mirror Episode (Social Credit). Asian Boss.