scholarly journals Data Pollution

2019 ◽  
Vol 11 ◽  
pp. 104-159 ◽  
Author(s):  
Omri Ben-Shahar

Abstract Digital information is the fuel of the new economy. But like the old economy’s carbon fuel, it also pollutes. Harmful “data emissions” are leaked into the digital ecosystem, disrupting social institutions and public interests. This article develops a novel framework—data pollution—to rethink the harms the data economy creates and the way they have to be regulated. It argues that social intervention should focus on the external harms from collection and misuse of personal data. The article challenges the hegemony of the prevailing view—that the injuries from digital data enterprise are exclusively private. That view has led lawmakers to focus solely on privacy protection as the regulatory objective. The article claims, instead, that a central problem in the digital economy has been largely ignored: how the information given by people affects others, and how it undermines and degrades public goods and interests. The data pollution concept offers a novel perspective why existing regulatory tools—torts, contracts, and disclosure law—are ineffective, mirroring their historical futility in curbing the harms from industrial pollution. The data pollution framework also opens up a rich roadmap for new regulatory devices—“an environmental law for data protection”—which focuses on controlling these external effects. The article examines how the tools used to control industrial pollution—production restrictions, carbon tax, and emissions liability—could be adapted to govern data pollution.

2019 ◽  
Author(s):  
Priscilla Ulguim

We live in the information age, and our lives are increasingly digitized. Our quotidian has been transformed over the last fifty years by the adoption of innovative networking and computing technology. The digital world presents opportunities for public archaeology to engage, inform and interact with people globally. Yet, as more personal data are published online, there are growing concerns over privacy, security, and the long-term implications of sharing digital information. These concerns extend beyond the living, to the dead, and are thus important considerations for archaeologists who share the stories of past people online. This analysis argues that the ‘born-digital’ records of humanity may be considered as public digital mortuary landscapes, representing death, memorialization and commemoration. The potential for the analysis of digital data from these spaces could result in a phenomenon approaching immortality, whereby artificial intelligence is applied to the data of the dead. This paper investigates the ethics of a digital public archaeology of the dead while considering the future of our digital lives as mnemonic spaces, and their implications for the living.Ulguim, P. F. 2018. Digital Remains Made Public: Sharing the Dead Online and Our Future Digital Mortuary Landscape. AP: Online Journal in Public Archaeology 8(2):153. https://doi.org/10.23914/ap.v8i2.162


2018 ◽  
Vol 8 (2) ◽  
pp. 153
Author(s):  
Priscilla Ulguim

We live in the information age, and our lives are increasingly digitized. Our quotidian has been transformed over the last fifty years by the adoption of innovative networking and computing technology. The digital world presents opportunities for public archaeology to engage, inform and interact with people globally. Yet, as more personal data are published online, there are growing concerns over privacy, security, and the long-term implications of sharing digital information. These concerns extend beyond the living, to the dead, and are thus important considerations for archaeologists who share the stories of past people online. This analysis argues that the ‘born-digital’ records of humanity may be considered as public digital mortuary landscapes, representing death, memorialization and commemoration. The potential for the analysis of digital data from these spaces could result in a phenomenon approaching immortality, whereby artificial intelligence is applied to the data of the dead. This paper investigates the ethics of a digital public archaeology of the dead while considering the future of our digital lives as mnemonic spaces, and their implications for the living.


2019 ◽  
Vol 15 (01) ◽  
pp. 1-8
Author(s):  
Ashish C Patel ◽  
C G Joshi

Current data storage technologies cannot keep pace longer with exponentially growing amounts of data through the extensive use of social networking photos and media, etc. The "digital world” with 4.4 zettabytes in 2013 has predicted it to reach 44 zettabytes by 2020. From the past 30 years, scientists and researchers have been trying to develop a robust way of storing data on a medium which is dense and ever-lasting and found DNA as the most promising storage medium. Unlike existing storage devices, DNA requires no maintenance, except the need to store at a cool and dark place. DNA has a small size with high density; just 1 gram of dry DNA can store about 455 exabytes of data. DNA stores the informations using four bases, viz., A, T, G, and C, while CDs, hard disks and other devices stores the information using 0’s and 1’s on the spiral tracks. In the DNA based storage, after binarization of digital file into the binary codes, encoding and decoding are important steps in DNA based storage system. Once the digital file is encoded, the next step is to synthesize arbitrary single-strand DNA sequences and that can be stored in the deep freeze until use.When there is a need for information to be recovered, it can be done using DNA sequencing. New generation sequencing (NGS) capable of producing sequences with very high throughput at a much lower cost about less than 0.1 USD for one MB of data than the first sequencing technologies. Post-sequencing processing includes alignment of all reads using multiple sequence alignment (MSA) algorithms to obtain different consensus sequences. The consensus sequence is decoded as the reversal of the encoding process. Most prior DNA data storage efforts sequenced and decoded the entire amount of stored digital information with no random access, but nowadays it has become possible to extract selective files (e.g., retrieving only required image from a collection) from a DNA pool using PCR-based random access. Various scientists successfully stored up to 110 zettabytes data in one gram of DNA. In the future, with an efficient encoding, error corrections, cheaper DNA synthesis,and sequencing, DNA based storage will become a practical solution for storage of exponentially growing digital data.


Author(s):  
Will Straw

Abstract: The twentieth century ended with the widespread conversion of cultural artefacts into digital information. Less attention has been granted to the ways in which cultural artefacts accumulate in the form of "things"-tangible books, recordings, and other objects whose economic value has often withered. This article examines the question of cultural waste and looks at those commercial and social institutions (such as the flea market and garage sale) which have evolved in order to keep old cultural commodities circulating. The recycling of old musical styles within contemporary practice is examined as one means of retrieving and revalorizing cultural waste. Résumé: La transposition massive d'artefacts culturels sous forme digitale a marqué la fin du 20e siècle. En revanche, on a porté moins d'attention à l'accumulation de ces artefacts sous forme de «choses»-livres, enregistrements et autres objets matériaux dont la valeur marchande a fortement diminué dans bien des cas. Cet article examine la question de détritus culturels, et jette un regard sur les institutions commerciales et sociales (telles que le marché aux puces et la vente de garage) qui ont évolué afin de garder les vieux biens culturels en circulation. En outre, l'article examine le recyclage d'anciens styles musicaux dans la pratique contemporaine, à titre d'exemple de récupération et de remise en valeur de détritus culturels.


2021 ◽  
Vol 23 (4) ◽  
pp. 796-815
Author(s):  
Yang Wang ◽  
Sun Sun Lim

People are today located in media ecosystems in which a variety of ICT devices and platforms coexist and complement each other to fulfil users’ heterogeneous requirements. These multi-media affordances promote a highly hyperlinked and nomadic habit of digital data management which blurs the long-standing boundaries between information storage, sharing and exchange. Specifically, during the pervasive sharing and browsing of fragmentary digital information (e.g. photos, videos, online diaries, news articles) across various platforms, life experiences and knowledge involved are meanwhile classified and stored for future retrieval and collective memory construction. For international migrants who straddle different geographical and cultural contexts, management of various digital materials is particularly complicated as they have to be familiar with and appropriately navigate technological infrastructures of both home and host countries. Drawing on ethnographic observations of 40 Chinese migrant mothers in Singapore, this article delves into their quotidian routines of acquiring, storing, sharing and exchanging digital information across a range of ICT devices and platforms, as well as cultural and emotional implications of these mediated behaviours for their everyday life experiences. A multi-layer and multi-sited repertoire of ‘life archiving’ was identified among these migrant mothers in which they leave footprints of everyday life through a tactical combination of interactive sharing, pervasive tagging and backup storage of diverse digital content.


2018 ◽  
Vol 62 (10) ◽  
pp. 1319-1337 ◽  
Author(s):  
Yong Jin Park ◽  
Jae Eun Chung ◽  
Dong Hee Shin

This study presents a conceptual model of understanding algorithmic digital surveillance systems, borrowing insight from Giddens, who proposed the notion of structuration as social practices deriving from the intersection between structure and agents. We argue that the status of privacy, or lack of it, is a product of these interactions, of which the personal data practices and related interests constitute the reproduction of a data ecosystem. We trace the process of data production and consumption, dissecting the interactive dynamics between digital media producers (personal data users) and users (personal data producers). Inadequacies, limits, and social and policy implications of data surveillance and its algorithmic reproduction of identities are discussed.


2020 ◽  
Vol 11 (2) ◽  
pp. 161-170
Author(s):  
Rochman Hadi Mustofa

AbstractBig Data has become a significant concern of the world, along with the era of digital transformation. However, there are still many young people, especially in developing countries, who are not yet aware of the security of their big data, especially personal data. Misuse of information from big data often results in violations of privacy, security, and cybercrime. This study aims to determine how aware of the younger generation of security and privacy of their big data. Data were collected qualitatively by interviews and focus group discussions (FGD) from. Respondents were undergraduate students who used social media and financial technology applications such as online shopping, digital payments, digital wallet and hotel/transportation booking applications. The results showed that students were not aware enough and understood the security or privacy of their digital data, and some respondents even gave personal data to potentially scam sites. Most students are not careful in providing big data information because they are not aware of the risks behind it, socialization is needed in the future as a step to prevent potential data theft.


Author(s):  
Yola Georgiadou ◽  
Rolf de By ◽  
Ourania Kounadi

The General Data Protection Regulation (GDPR) protects the personal data of natural persons and at the same time allows the free movement of such data within the European Union (EU). Hailed as majestic by admirers and dismissed as protectionist by critics, the Regulation is expected to have a profound impact around the world, including in the African Union (AU). For European–African consortia conducting research that may affect the privacy of African citizens, the question is ‘how to protect personal data of data subjects while at the same time ensuring a just distribution of the benefits of a global digital ecosystem?’ We use location privacy as a point of departure, because information about an individual’s location is different from other kinds of personally identifiable information. We analyse privacy at two levels, individual and cultural. Our perspective is interdisciplinary: we draw from computer science to describe three scenarios of transformation of volunteered/observed information to inferred information about a natural person and from cultural theory to distinguish four privacy cultures emerging within the EU in the wake of GDPR. We highlight recent data protection legislation in the AU and discuss factors that may accelerate or inhibit the alignment of data protection legislation in the AU with the GDPR.


2019 ◽  
Vol 35 (3) ◽  
Author(s):  
Tanja Sobko ◽  
Gavin Brown

Activity trackers (ATs) equipped with biometric sensors may support deep knowledge acquisition of health and active learning. The mechanism may be via personal data being pushed to the students, which deepens the knowledge about their own health and may impact long-term health action processes. To understand health knowledge acquisition, 43 students attending an undergraduate university course were equipped with an AT over a period of five months. Weekly observation on emerging personal data and consequent actions (lifestyle adaptations) were reflected in an individual course-related ePortfolio. Students’ change in health action process was assessed using a short standard eHealth literacy scale at the beginning and end of the course. The usability of ePortfolio tool was tested with two previously validated scales. The combination of personal information from an AT and ePortfolio may have enhanced students’ critical assessment of health-related personal and available digital information. eHealth literacy scores significantly increased by the end of the course (p < .01). The ePortfolio helped with learning, and the usability of the ePortfolio did not really interfere. The combination of AT and ePortfolio constitutes a novel and productive method of using ePortfolios in higher education in regards to eHealth literacy acquisition.


2018 ◽  
Vol 21 (2) ◽  
pp. 419-437 ◽  
Author(s):  
Luci Pangrazio ◽  
Neil Selwyn

The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2) Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.


Sign in / Sign up

Export Citation Format

Share Document