SunSun Lim, HiChang Choi and Sanchez summed it up really well when they argued “government surveillance can incorporate a range of activities – from extreme physical intrusions to day-to-day gathering of personal information, for example, ‘dataveillance'”(SunSun Lim.S, HiChang Choi.C & Sanchez.M, 2009). We can’t argue that all surveillance is destructive to our trust on security however we also can’t argue that surveillance is constructive and enables trust within all individuals.
This video was constructed by myself as an analysis of online surveillance. I wanted to review how powerful and destructive surveillance can be, and although it is used for safety and to prevent attacks, it appears to go to extreme lengths.
I have incorporated a excerpt from YAYNEWS’s coverage of an event where Edward Snowden spoke about surveillance and specifically his inclusion in the operation ‘PRISM’. I have also included an audio excerpt from Triple J Hack, who discussed in a detailed manner, an new issue wherein a young woman was attacked online about her Tinder profile.
The inclusion of this audio argues how volatile social media is and how different people respond to different information. Please note, a creative commons license has been provided by YAYNEWS and copyright by ABC enables the inclusion of audio excerpts where a link to the original page is provided. Further confirmation of this copyright ruling is available at http://www.abc.net.au/triplej/about/terms.htm.
I have found through the scholarly research completed and referenced in the video above assisted in developing my argument wherein we need to observe and review the harsh words expressed online, as some may be a simple sexist joke that caused a girl to be attacked on Facebook, or it may be intentionally cruel and hurtful. We also need to be aware that our online opinions never fall on deaf ears, as mentioned in the video, so we need to ensure that we understand between what we release publicly and what we don’t.
By including creative sources such as Edward Snowden and Triple J Hack, my argument has evolved into reviewing those negative aspects to surveillance and primarily the fear experienced by a lot of the public as to what information is obtained online by the government or security officials for reference.
“Personal information privacy is the individual’s ability to personally control information about him/herself”(SunSun Lim.S, HiChang Choi.C & Sanchez.M, 2009) which displays how important it is to respect your private life away from social media. What we don’t release on Facebook, Youtube or Twitter may be released by other means understandably, however it is arguably true that what you don’t release won’t ever be seen or heard by the public.
Therefore, it is necessary to review whether you want people to view you online for your opinion on argumentative issues as abortion, marriage equality or gun control.
In releasing this video online, the respect one needs to have to feel comfortable in allowing strangers to view your video, comment on your opinions, image, voice etc is surprisingly enormous. This is evident in the effect posting the young woman’s Tinder profile image on Facebook had for a young man. After the attack began, this man was fired from his job for breaching the organisations social media policy.
The face of your personal brand along with your employer’s image is extremely volatile and cannot be pinned down forever. Opinions change, interest is gained or lost. Nothing can be controlled and the expression of opinions online which vary to complete opposite ends of the spectrum confirm this.
As concluded in the video, we need to move away from the Americanised image of surveillance where PRISM is our future and you can’t trust anyone. Trust must be universal and freely available, however caution should be exercised to reduce the probability of dangerous events such as terrorist attacks.
Dumova, T. and Fiordo, R. (eds.) (2009) ‘Public Intimacy and the New Face (Book) of Surveillance’, in Handbook of research on social interaction technologies and collaboration software: concepts and trends. United States: Information Science Reference, pp. 392–403.
SUN SUN LIM1, s, HICHANG CHO1, c, & SANCHEZ, M 2009, ‘Online Privacy, Government Surveillance and National ID Cards’,Communications Of The ACM, 52, 12, pp. 116-120, Applied Science & Technology Source, EBSCOhost, viewed 5 September 2015.
Trottier, D 2012, Social Media As Surveillance : Rethinking Visibility In A Converging World, n.p.: Farnham ; Burlington, VT : Ashgate, c2012., DEAKIN UNIV LIBRARY’s Catalog, EBSCOhost, viewed 5 September 2015.
Use of YAYNEWS to include Edward Snowden’s expression relating to online surveillance –
C.C. YAYNEWS September 15 2014
Also use of Triple J Hack’s discussion relating to the attack of a girl’s Tinder profile –