
Before we start
I would like for everyone to look at the meme that I created below, at first, you wouldnt understand the context and would assume this is not real, right?
If that is what you think or suspect might be true, then you are at least taking the first step toward learning the horrifying aspects of online data and privacy.
The full context of this meme is that, back in 2002, Target famously realized it could use customer data to figure out who was pregnant. But Target's algorithm was so accurate that it successfully categorized a teenage girl as "probably pregnant" based on her purchases and began sending her baby coupons, which led to her father, completely unaware that his daughter was pregnant, seeing the mail and filing a very angry customer service complaint. He eventually had to call the store back and apologize once he realized that Target's data mining system had figured out his daughter was pregnant before he did (Scishow, 2018). However, this is a big revelation for us: although individual purchases might seem completely irrelevant on their own, combining these weighted features creates a remarkably powerful predictive tool.
It then raises a question: are our data and privacy information online really protected, or are they being circulated so others can profit by selling more products to us, caring only about their own revenue rather than each person’s unique circumstances?
A summary video
Before we dive deeper, I have something for anyone who is checking out my website
Since adding an actual video here would require me to upgrade my subscription, and I don't want to waste money, please copy the link below and paste it so that anyone from the course can check out my artifact
This video will give you an overview of the topic, and then I will go in-depth more after you finish watching it
....Or you can just scroll right past this and then read the rest, it's your choice after all
Le Link: [https://youtu.be/pzNy1fRh8bI]
What is online data tracking
The continuous collection and analysis of a user's digital identity, which encompasses unique identifiers, transaction histories, online search activities, and detailed behavioral patterns (Digital Identity, nd)
Why does it matter?
Many users believe their privacy is secure if their name or Social Security Number isn't attached to a profile. However, online anonymity is a complete myth. Data brokers trade in pseudonymous data, which can easily yield your actual identity through cross-site data analysis. Researchers have proven that by simply cross-referencing three seemingly harmless data points—your zip code, date of birth, and gender—data brokers can uniquely identify the vast majority of citizens (TEDx Talks, 2017)
The Mechanisms of Invisible Tracking
Every click, search, and interaction you make online is recorded by a vast surveillance infrastructure. While companies traditionally used cookies to track users across the web, they now employ far more sophisticated and invisible methods, such as (NBC News, 2019):
Browser Fingerprinting
Websites send hidden instructions that make your browser create an invisible image. The unique way your device and software display this image works like a fingerprint, allowing trackers to recognize you even after you delete your cookies. (NBC News, 2019)
Cross-Device Tracking
Companies correlate the activity on your mobile phone with what you view on your smart TV or search on your computer to build a highly detailed, unified profile of your life (NBC News, 2019)
Session Replays
Some websites utilize scripts that record a video of your browser screen, capturing your keystrokes, mouse movements, and occasionally highly sensitive health or credit card information without your knowledge (NBC News, 2019)
But why should companies or corporate entities do that?
By filtering through these massive data piles and extracting predictive insights using applied statistics, then analyzing large amounts of data, companies can spot subtle patterns that predict what individuals might want or do (SciShow, 2018)
Target
Going no farther than the first example that I provided you, we already see how the greedy practices of corporation can affect someone personal life
As I mentioned before, Target famously used algorithms to analyze purchases of unscented lotion and zinc supplements to accurately predict a teenage girl's pregnancy before her father even knew about it (SciShow, 2018). It sure does help them sell extra products, but it negatively influences a teenager's life instead
Amazon
The most recognizable shopping app that we utilize daily
Unknown to everyone, it is the trailblazer in this space, proactively tracking what you buy, what you browse, and what you recommend to anticipate your desires and dictate your shopping experience (Press, 2005)
Disney
Even within the place that provide us lots of entertainment, we are also being tracked constantly
Disney uses apps and its electronic "MagicBands" to track guests' locations and ride preferences; while this massive data gathering helps Disney optimize park capacity and streamline logistics, it is a highly effective, walled-garden surveillance operation to generate park profit by knowing which services the visitors enjoy the most (Carr, 2019)
So!! Let's circle it back to the first question.....!!!
Why? And Why?! Does it Matter?!
Security Risks
We offer a range of specialized services tailored to meet your individual needs. Our approach is focused on understanding and responding to your requirements, providing effective, practical solutions.
...they inherently pose security risks, including identity theft and unauthorized sharing of sensitive medical data!! (NBC News, 2019)
Psychological Manipulation
The use of this tracked data to manipulate human behavior is the most profound security threat!!!
The Cambridge Analytica scandal highlighted how third-party developers exploited Facebook to harvest the data of up to 70 million users without their explicit consent (The Illusion of Choice, 2019)
This data wasn't just used to sell products; it was used to understand how people think and to covertly manipulate voters during the 2016 elections!!
By knowing your unique weaknesses and fears, entities can architect your choices so effectively that your decisions become an illusion of free will!!!

At the end of the day...
Everyone is still agreeing to the privacy policies, which constitute the notice-and-consent framework. Yet the system is fundamentally broken, as it would take the average user months to actually read these vaguely written documents. With smart devices like Alexa recording in our bedrooms and apps silently sending our location data to dozens of unknown companies, the traditional notion of privacy has eroded. We are no longer simply watched by other humans; our digital identities are constantly monitored and monetized by algorithms (What Your Apps Say About You, 2019)

Yet, let's not end this on a sad note!!
Through this meme-filled and informational post, I hope that I can raise everyone's awareness on the topic so that you can inform others on the topic, and then spread awareness to others
So, let's end it with this smiling dog and I hope that you would learn something new today!!
Add comment
Comments