Hey everyone, check out my interview about big data and the government!
https://drive.google.com/open?id=1K0C7sn13pAtGCcnvCCm9ZQSICxlICb5l
Hey everyone, check out my interview about big data and the government!
https://drive.google.com/open?id=1K0C7sn13pAtGCcnvCCm9ZQSICxlICb5l
The utilization of big data by the United States government provides benefits to public safety through foreign and domestic crime prevention which drastically outweigh the concerns of privacy invasion.
I have decided that for my Big Data project, I definitely would like to use Glenn Greenwald’s TED Talk, “Why Privacy Matters”. I agree with him that the internet is no longer a place of liberation, but I do not agree that the internet is a place for ‘surveillance’. There is a difference between surveillance and the mass collection of data. Additionally, I agree with the claim that people who claim privacy does matter actually value privacy greatly, as shown by their actions. Greenwald discusses the idea of the CEO of Google being a hypocrite for not liking an online magazine for posting personal information about him, even though he gathers information from Google users. Again, there is a distinct difference between the collection of data for private investigation and the mass collection of data to view trends and see what is popular. This is something I would want to learn more about. I want to know what data is being collected for and how it is being used. I also want to know how personal it is to each online user. My view on big data right now is not on a specific side, but rather complicating the arguments of both those who believe big data is harmful and those who believe big data is helpful. I do not think privacy is a concern if there are computer programs being coded to show ads based on search history. I do think it is an invasion of privacy, however, to view the medical records of a specific person without having permission from the patient, no matter what the use is.
In his TED Talk “What will a future without secrets look like?”, Alessandro Acquisti discusses the lack of privacy that we have today due to the internet and Big Data. Acquisti points out, “When someone tells you, “People don’t care about privacy,” consider whether the game has been designed and rigged so that they cannot care about privacy”. I believe that Acquisti is making a very good point here. We almost never know what is included in the Terms & Conditions which we agree to on every internet web page. Though the site is usually telling you what they are using your information for data for, there is no way to pick and choose which parts of the Terms & Conditions you are okay with, and which go too far. Aquisti acknowledges how little this transparency does for the user, especially because the sites still request an egregious amount of information. For high school teens trying to fit in with their peers, they will mindlessly agree to anything that allows them to interact with their peers online. This poses the question of just how much personal information users will unknowingly agree to share. This is extremely concerning because when we check boxes to agree to giving up our information, there is no one to blame but ourselves. Internet sites and Big Data collectors have coerced the public into giving them everything they think they need to improve society.
8:00 am: I’m ringing.
8:01 am: I’m snoozed.
8:05 am: I’m ringing.
8:06 am: I’m snoozed.
8:10 am: I’m ringing.
8:11 am: I’m snoozed.
8:12 am: Wow she’s finally awake! …Oh wait she’s asleep again.
8:15 am: She’s awake!! Here comes the gooey “Good Morning” text to her boyfriend even though we saw him 6 hours ago.
9:00 am: How many times do you have to check the weather before you choose an outfit, Tori? GO TO BREAKFAST!
9:29 am: You have checked the time 11 times within the last 4 minutes. And yes, you’re still almost late for class. I thought this was what the 4 alarms were for this morning! Maybe you should try going to bed earlier instead of scrolling through Twitter watching funny videos until 2 am.
11:00 am: If I had a dollar for every time you check your grades on Blackboard, I would be an iPhoneX.
12:00 pm: I really appreciate the hummus you had on your fingers from your sandwich at lunch getting all over my screen. Thanks, girl. This is just what we wanted after chemistry class, which, by the way, you checked Blackboard twice during. Your grades have not changed!
1:00 pm: Now it’s time for her daily email responses. Why do you have so many? You must be important or something… no, you’re definitely not. This email is to your best friend.
3:45 pm: Why do you feel the need to take a picture of the ocean every other day? It looks the same as the last picture you took.
4:00 pm: I don’t think Vans.com is helping you study for your Psych exam, Tori. Also, my battery is low.
4:56 pm: Hey, that new Facebook profile picture of you and Will is adorable, but my battery is dangerously low. That doesn’t mean use me as a calculator- charge me! I have so many Instagram notifications for you, but I need a battery to give you them.
5:00 pm: And… I’m dead. Goodnight world.
5:01 pm: Oh, so now you scurry for a charger. Funny how that works. Where were you ten minutes ago?
5:15 pm: Time for dinner and dance practice. She is checking the dinner menu and Dance Team schedule online, which means I’ll be in her bag on Do Not Disturb for the next couple hours.
8:10 pm: Hey, you’re out of dance! Practice was great, and she is posting a Finsta about how good it went.
9:00 pm: Girl, you have way too many Safari tabs open on here. When’s the last time you actually watched this competition video you have open? Oh, right. May 1, 2017. Time to let it go!! You can just Google it later if you want to see it. We all know you Google dance videos, like, 15 times a day.
10:00 pm: I’m ringing. Time for your medicine!
10:14 pm: She is doing homework on the laptop. I guess it’s time for me to go in the bag on Do Not Disturb again.
12:18 am: Time for the dance videos. How many can you possibly watch?! Yes, play games on me- nice and quiet.
12:45 am: Goodnight Tori! See you at 8 am!
I agree with Greenfield’s theory that low self esteem pushes other away on the internet because of my experiences with Facebook and Twitter. When people have low self esteem, it often shows online, where they want to continuously post to show people how their life is going. This gets annoying to other users, which leads them to unfriend or unfollow the person who posts too much. This inherently leads to the person being unfriended or unfollowed by many friends to develop an even lower self esteem, and they will be more likely to post even more because of this.
In her article “Have Smartphones Destroyed a Generation?”, Jean M. Twenge claims that the youngest generation is “accustomed to being wired at all times”. She believes that young people have simply formed their lives around technology and social media. Her evidence to this claim is that her toddler is comfortable swiping through an iPad, barely yet knowing how to walk. I disagree with this claim and evidence because the child was not born knowing how to use an iPad. The child was not even born owning an iPad. It was the parent who purchased the technology, provided the technology to the toddler, and taught the toddler how to use the technology. The youngest generation is so accustomed to being wired at all times because they are raised surrounding by technology at all times. Parents provide their children with technology from a young age and often buy them a smartphone by age 13. This type of technological childhood development inherently allows children to grow exceedingly comfortable using technology from a young age.
Twenge also claims that Athena, a 13-year-old girl from Houston Texas, is part of a generation which lives a life on social media. After describing the typical behavior of teenagers from her youth, Twenge briefly explains the teens of Athena’s generation. “She told me she’d spent most of the summer hanging out alone in her room with her phone. That’s just the way her generation is, she said.” Twenge shows the difference between her generation and Athena’s generation to emphasize the technology dependency of Athena’s generation. What she does not discuss is the fact that Athena’s parents purchased her a smart phone at the age of 11, providing her with unlimited access to technology, and more importantly, social media. If Athena’s parents had not provided her with such exposure, she would not have grown so accustomed to this technology. Perhaps if they had encouraged her to spend time outdoors during the summer instead of spending it in her bedroom on her phone, she would not have developed a dependency for her smartphone. Children are not born with knowledge of technology. This knowledge must be learned from observing those around them. If a child grows up surrounded by a family who has a significant dependency on technology, then that child will learn from their family to depend on technology as well.
The following quotes reflect boyd’s arguments in her first chapter.
“…regardless of how they use privacy settings, teens must grapple with who can see their
profile, who actually does see it, and how those who do see it will interpret it” (32).
“The popularity of social media in recent years has produced a significant rise in
nonfiction or so-called real names identity production, but it is also important to
recognize that there continue to be environments where teens gather anonymously or don
crafted identities to create a separation between the kinds of social contexts that are
viable offline and those that can be imagined online” (41).
“Matthew and his classmate had very different ideas of how to use Facebook and who
their imagined audiences might be, but their online presence was interconnected because
of the technical affordances of Facebook. The were each affecting the other’s attempts at
self-representation, and their sharing and friending norms created unexpected conflicts.
Even when teens have a coherent sense of what they deem to be appropriate in a
particular setting, their friends and peers do not necessarily share their sense of decorum
and norms. Resolving the networked nature of social contexts is complicated” (50).
Though I was already aware of many of the topics boyd discussed in the first chapter of It’s Complicated, I found the section about association most interesting. Even if you do not invite certain people to see your social media, they may see it due to one of your friends inviting them to see their pages.
One idea I did not agree with was that the officer who displayed a photo of a teen drinking had violated the teen’s privacy. If the photo was posted online for anyone in the world to see, then that picture was not private.
rip to 2011 tori, who used to post on FB “like this status for a truth is”. no one ever liked them.
In the TED Talk “What I learned from 100 days of rejection”, speaker Jia Jiang insists that putting yourself in difficult situations over and over again allows for you to overcome them. Jiang believes that this works when applied to the fear of rejection. In order to test this, Jiang set himself up to be rejected once a day for 100 days. Jiang has always had a significant fear of rejection, he admitted. On the first day of rejection, Jiang explains that he asked a stranger for $100. When the stranger said no, Jiang apologized and ran away. He acknowledged that he needed to work on his reaction to rejection. On day 2, Jiang asked the cashier at a burger joint if he could have a burger refill. When he as denied, Jiang explained why he wanted another burger and accepted the rejection. This experiment continued for 100 days, and overcoming his fear of rejection taught Jiang that he could embrace rejection and better himself.
© 2026 Tori's Site
Theme by Anders Noren — Up ↑
Recent Comments