scholarly journals PERCEPTIONS OF ALGORITHMIC PROFILING ON FACEBOOK AND THEIR SOCIAL IMPLICATIONS

Author(s):  
Aurelia Tamò Larrieux ◽  
Eduard Fosch Villaronga ◽  
Shruthi Velidi ◽  
Salome Viljoen ◽  
Christoph Lutz ◽  
...  

With every digital interaction, individuals are increasingly subject to algorithmic profiling, understood as the systematic and purposeful recording and classification of data related to individuals. Large Internet firms, such as Facebook and Google/Alphabet, as well as third-party data brokers collect and combine detailed personal data to create sophisticated profiles for predictive purposes. Research has started to look into people’s perception and engagement of algorithms, showing that many users are unaware of the existence of algorithms, for example those which curate news feeds, and that a majority feels uncomfortable with algorithmic profiling on Facebook. In our research, we investigate perceptions of algorithmic profiling on Facebook by addressing the following questions: What user narratives of profiling on Facebook exist? What reactions do users have when confronted with Facebook’s inferred profiles? What are the social implications of user perceptions of profiling? Drawing on rich and recent survey data from 292 US-based Facebook users, we identified four overarching themes relating to Facebook's profiling activities: uncertainty, naiveté, realism, and fatalism. While the third theme is the most prevalent, Facebook is perceived as very powerful when it comes to algorithmic profiling. However, when confronted with their own profiles through the "My interests" and "My categories" sections in the Facebook Ad preferences menu, many users indicated surprise at how imprecise or even wrong some of the inferred interests and categories were. We discuss the social implications of our findings with regards social exclusion and social justice.

2012 ◽  
Vol 26 (27n28) ◽  
pp. 1243008 ◽  
Author(s):  
LIN CHEN ◽  
MASAHITO HAYASHI

The monogamy of entanglement is one of the basic quantum mechanical features, which says that when two partners Alice and Bob are more entangled then either of them has to be less entangled with the third party. Here we qualitatively present the converse monogamy of entanglement: given a tripartite pure system and when Alice and Bob are entangled and nondistillable, then either of them is distillable with the third party. Our result leads to the classification of tripartite pure states based on bipartite reduced density operators, which is a novel and effective way to this long-standing problem compared to the means by stochastic local operations and classical communications. Furthermore we systematically indicate the structure of the classified states and generate them. We also extend our results to multipartite states.


2016 ◽  
Vol 5 (1) ◽  
Author(s):  
Sinta Dewi

<p align="center"><strong><em>Abstract</em></strong></p><p><em>The increasing use of internet technology has spawned new challenges to the protection of privacy and personal data, especially with the increasing practice of collection, use and dissemination of personal data of a person. The lack of specific instruments and regulations will cause of the weakness of the privacy and data personal protection mechanism, especially in the use of cloud computing technology. Cloud computing is a technology that uses the internet and central remote servers to maintain or manage user data. It allows users to use applications without installation so that personal files can be accessed anywhere and anytime through internet access. This technology enables efficiencies by centralizing storage, processing and data memory. However, on the other hand, cloud computing has raised a new legal issue is how could the personal data of the user of cloud computing be protected from a wide range of abuses by the provider of cloud computing and the third party. This legal issue become very significant because if a personal data of the user of cloud computing is misused by the provider or the third party, then it is contrary to human rights, namely the protection of privacy and personal data which has been protected by international, regional, and national instruments. So far, Indonesia has not been having regulation that specifically protect its citizens from the personal data abuse whether committed by governments, private companies or  individuals. Therefore, this study aims to create the concept of adequate regulation in order to provide protection for user of cloud computing services in Indonesia.</em></p><p><strong><em>Keywords</em></strong><em>: protection, privacy, personal data, cloud computing.</em></p><p align="center"><strong>Abstrak</strong></p><p>Meningkatnya pemanfaatan teknologi internet melahirkan tantangan baru dalam perlindungan atas privasi dan data pribadi, terutama dengan semakin meningkatnya praktik pengumpulan, pemanfaatan dan penyebaran data pribadi seseorang. Ketertinggalan instrumen dan regulasi menjadi salah satu pemicu lemahnya mekanisme proteksi terhadap privasi dan data pribadi khususnya dalam penggunaan teknologi <em>cloud computing</em>. <em>Cloud computing </em>adalah teknologi yang menggunakan internet dan server pusat yang jauh untuk menjaga atau mengelola data pengguna. <em>Cloud computing </em>membantu pengguna untuk menggunakan aplikasi tanpa melakukan instalasi sehingga file pribadi dapat diakses di manapun dan kapanpun melalui akses internet. Teknologi ini memungkinkan efisiensi dengan memusatkan penyimpanan, pemrosesan dan memori data. Namun demikian, di sisi lain, <em>cloud computing </em>telah menimbulkan permasalahan hukum baru yaitu bagaimana data pribadi pengguna cloud computing terlindungi dari berbagai macam pengungkapan dan pendistribusian oleh penyedia jasa cloud computing terhadap pihak ketiga. Permasalahan hukum ini menjadi sangat signifikan karena jika data pribadi seseorang disalahgunakan oleh pihak penyedia data atau pihak ketiga, maka hal ini bertentangan dengan hak dasar manusia yaitu perlindungan terhadap privasi dan data pribadi seseorang yang telah dilindungi oleh instrumen internasional, regional dan nasional. Indonesia hingga saat ini belum memiliki regulasi yang secara khusus melindungi warga negara dari praktik pemanfatan data pribadi yang sewenang wenang, baik yang dilakukan oleh pemerintah, perusahaan swasta maupun individu. Oleh sebab itu, penelitian ini bertujuan untuk menciptakan konsep pengaturan yang memadai dalam rangka memberikan perlindungan bagi pengguna jasa cloud computing di Indonesia.</p><p><strong>Kata kunci</strong>: perlindungan, privasi, data pribadi, <em>cloud computing</em>.</p>


Obiter ◽  
2021 ◽  
Vol 42 (1) ◽  
pp. 105-125
Author(s):  
Tumo Charles Maloka

The pivotal judgments on dismissals at the behest of a third party – East Rand Proprietary Mines Ltd v UPUSA, Lebowa Platinum Mines v Hill, NUMSA v Hendor Mining Supplies a Division of Marschalk Beleggings (Pty) Ltd, TSI Holdings (Pty) Ltd v NUMSA, NUPSAW obo Mani v National Lotteries Board and NUMSA v High Goal Investments t/a Chuma Security Services – deeply implicate discrimination in all its manifestations, accountability, gendered precariousness and social justice. This contribution explores the focal questions raised in recent times concerning the fairness of a dismissal at the instance of a third party. First, there are fundamental points relating to the constitutional and statutory protection of security of employment. Secondly, there are those familiar problems often associated with substantive and procedural fairness that surface here under the guise of questioning the disciplinary power of the employer. In this context, inroads into managerial prerogative and disciplinary procedure are amplified where there has been no fault on the part of the employee and no breakdown of the trust relationship, or where the employee has been disciplined, but not dismissed and the employer did not want to terminate the employee’s employment but was coerced by the third party to do so. Thirdly, there is the thorny issue of the reason behind the third-party demand and the related issue of intolerability caused by the targeted employee. And finally, there is the issue of striking in support of a demand for dismissal of a co-employee.


2017 ◽  
Vol 15 (5) ◽  
pp. 609-625 ◽  
Author(s):  
Jonathan Cinnamon

A rapidly accelerating phase of capitalism based on asymmetrical personal data accumulation poses significant concerns for democratic societies, yet the concepts used to understand and challenge practices of dataveillance are insufficient or poorly elaborated. Against a backdrop of growing corporate power enabled by legal lethargy and the secrecy of the personal data industry, this paper makes explicit how the practices inherent to what Shoshana Zuboff calls ‘surveillance capitalism’ are threats to social justice, based on the normative principle that they prevent parity of participation in social life. This paper draws on Nancy Fraser’s theory of ‘abnormal justice’ to characterize the separation of people from their personal data and its accumulation by corporations as an economic injustice of maldistribution. This initial injustice is also the key mechanism by which further opaque but significant forms of injustice are enabled in surveillance capitalism—sociocultural misrecognition which occurs when personal data are algorithmically processed and subject to categorization, and political misrepresentation which renders people democratically voiceless, unable to challenge misuses of their data. In situating corporate dataveillance practices as a threat to social justice, this paper calls for more explicit conceptual development of the social harms of asymmetrical personal data accumulation and analytics, and more hopefully, attention to the requirements needed to recast personal data as an agent of equality rather than oppression.


Author(s):  
Sinta Dewi ,

<p>Abstract<br />The increasing use of internet technology has spawned new challenges to the protection of privacy and personal data, especially with the increasing practice of collection, use and dissemination of personal data of a person. The lack of specific instruments and regulations will cause of the weakness of the privacy and data personal protection mechanism, especially in the use of cloud computing technology. Cloud computing is a technology that uses the internet and central remote servers to maintain or manage user data. It allows users to use applications without installation so that personal files can be accessed anywhere and anytime through internet access. This technology enables efficiencies by centralizing storage, processing and data memory. However, on the other hand, cloud computing has raised a new legal issue is how could the personal data of the user of cloud computing be protected from a wide range of abuses by the provider of cloud computing and the third party. This legal issue become very significant because if a personal data of the user of cloud computing is misused by the provider or the third party, then it is contrary to human rights, namely the protection of privacy and personal data which has been protected by international, regional, and national instruments. So far, Indonesia has not been having regulation that specifically protect its citizens from the personal data abuse whether committed by governments, private companies or individuals. Therefore, this study aims to create the concept of adequate regulation in order to provide protection for user of cloud computing services in Indonesia.<br /><em>Keywords: protection, privacy, personal data, cloud computing.</em></p><p>Abstrak<br />Meningkatnya pemanfaatan teknologi internet melahirkan tantangan baru dalam perlindungan atas privasi dan data pribadi, terutama dengan semakin meningkatnya praktik pengumpulan, pemanfaatan dan penyebaran data pribadi seseorang. Ketertinggalan instrumen dan regulasi menjadi salah satu pemicu lemahnya mekanisme proteksi terhadap privasi dan data pribadi khususnya dalam penggunaan teknologi cloud computing. Cloud computing adalah teknologi yang menggunakan internet dan server pusat yang jauh untuk menjaga atau mengelola data pengguna. Cloud computing membantu pengguna untuk menggunakan aplikasi tanpa melakukan instalasi sehingga file pribadi dapat diakses di manapun dan kapanpun melalui akses internet. Teknologi ini memungkinkan efisiensi dengan memusatkan penyimpanan, pemrosesan dan memori data. Namun demikian, di sisi lain, cloud computing telah menimbulkan permasalahan hukum baru yaitu bagaimana data pribadi pengguna cloud computing terlindungi dari berbagai macam pengungkapan dan pendistribusian oleh penyedia jasa cloud computing terhadap pihak ketiga. Permasalahan hukum ini menjadi sangat signifikan karena jika data pribadi seseorang disalahgunakan oleh pihak penyedia data atau pihak ketiga, maka hal ini bertentangan dengan hak dasar manusia yaitu perlindungan terhadap privasi dan data pribadi seseorang yang telah dilindungi oleh instrumen internasional, regional dan nasional. Indonesia hingga saat ini belum memiliki regulasi yang secara khusus melindungi warga negara dari praktik pemanfatan data pribadi yang sewenang wenang, baik yang dilakukan oleh pemerintah, perusahaan swasta maupun individu. Oleh sebab itu, penelitian ini bertujuan untuk menciptakan konsep pengaturan yang memadai dalam rangka memberikan perlindungan bagi pengguna jasa cloud computing di Indonesia.<br /><em>Kata kunci: perlindungan, privasi, data pribadi, cloud computing.</em></p>


2018 ◽  
Author(s):  
Reuben Binns ◽  
Elettra Bietti

Amid growing concern about the use and abuse of personal data over the last decade, there is an emerging suggestion that regulators may need to turn their attention towards the concentrations of power deriving from large-scale data accumulation. No longer the preserve of data protection or privacy law, personal data is receiving attention within competition and antitrust law.Recent mergers and acquisitions between large digital technology platforms have raised important questions about how these different areas intersect and how they can complement one another in order to protect consumer welfare while ensuring competitive markets. This paper draws attention to one particularly complicated kind of digital data-intensive industry: that of third party tracking, in which a firm does not (only or primarily) collect and process personal data of its own customers or users, but rather collects and processes data from the users of other ‘first party’ services.Mergers and acquisitions between firms active in the third party tracking industry raise unique challenges for privacy and fundamental rights which are often missed in regulatory decisions and academic discussions of data and market concentration. In this paper, we combine empirical and normative insights to shed light on the role of competition regulators in addressing the specific challenges of mergers and acquisitions in the third party tracking industry. After critically assessing some of the US and EU case law in this area, we argue that a bolder approach is needed; one that engages in a pluralist analysis of economic and noneconomic concerns about concentrations of power and control over data.


Author(s):  
Daniel Roth

The final chapter serves as conclusion to the book and examines the core conceptual questions through which the various case studies of third-party peacemakers were presented through the book, as well as identifying both common trends and variations between them. The core conceptual questions include: What was the social status of the third-party peacemakers and connection to the sides in conflict? Who took the initiative to intervene? Did the peacemakers bring the sides to a compromise agreement? Did they reconcile the conflict sides, and if so, how? The chapter concludes with a discussion on the scope of third-party peacemaking in Judaism, and the implications for today.


2018 ◽  
Vol 1 (1) ◽  
pp. 1
Author(s):  
Mursia Ekawati

Verbal anger is an expressive speech act. The language function that supported by expressive speech act is interactional, which is used to reveal social relationship and private attitude. The aims of this research is to get patterns of verbal anger in terms of expressive speech act in Bahasa. This research uses socio-pragmatic method to analyze through speech components, involving sociolinguistics and implicature. Data analysis is done by explaining the marker shapes as the indicator of anger and to whom (P1, P2 or P3) the anger is for. The result shows that speech act of anger are done through indirect sentences (interogative and affirmative sentences), implicit meanings and focus on the third party (P3). Anger to third party is realised as a pseudo politeness. The function of pseudo politeness is also for maintaining the social relationship between friends, families, and communities. This speech act of anger can be done through indirect sentences with the explicit meaning and focus on second party (P2). It is also done through direct sentences and explicit meanings with or without response from P2.


2018 ◽  
Vol 113 ◽  
pp. 169-185
Author(s):  
Maciej Jakub Zieliński

ON CONTROVERSIES OVER INTERPRETATION OF THE PHRASE “PERFORMING WORK FOR THE BENEFIT OF ONE’S EMPLOYER” WITHIN THE MEANING OF ARTICLE 8 SECTION 2A OF THE SOCIAL INSURANCE SYSTEM ACT AND CONSTITUTIONALITY OF THAT PROVISIONThe article discusses controversies over interpretation of the phrase “performing work for the benefi t of one’s own employer” within the meaning of Article 8 section 2a of the Social Insurance System Act. The author criticizes interpretation of this phrase based solely on abstract theses formulated in individual judicial decisions, especially the ones of the Supreme Court. When detached from facts on which they were based, they can lead to unreasonable interpretation of the provision in question. The phrase “for the benefi t of one’s own employer”, should be construed through the prism of a relation that takes place in a typical employment relationship. In the three-subject configuration, when services are provided to the employer and the role of the third party is reduced to placement of workers which makes them similar, in terms of scope of their business, to temporary work agencies, this results in recognition that under service contracts concluded with those workers work is provided for their employer. It is quite diff erent for the situation where the third party is obliged to provide employer with a particular product, which is produced in the course of their business. Then, the key factor should rely on establishing whether the party in question bears organizational, technical and production risks related to manufactured products. Furthermore, considerations contained herein lead to the conclusion that the normative content of Article 8 section 2a of the Social Security Act settled in the Supreme Court’s case-law is incompatible with the principle of citizens’ trust in the state and its law. Article 8 section 2a of the Social Security Act itself, at least when it comes to performing work for one’s own employer within a civil-law contract concluded with a third party, is incompatible with Articles 217 and 64 section 3 of the Constitution of the Republic of Poland. Thus, opinions on how the law should stand were made herein.


2018 ◽  
Vol 285 (1871) ◽  
pp. 20172681 ◽  
Author(s):  
Munehiko H. Ito ◽  
Motoomi Yamaguchi ◽  
Nobuyuki Kutsukake

Conflict management consists of social behaviours that reduce the costs of conflict among group members. Redirected aggression—that is, when a recently attacked individual attacks a third party immediately after the original aggression—is considered a conflict management tactic, as it may reduce the victim's probability of being the object of further aggression. Redirected aggression has been reported in many vertebrates, but few quantitative studies have been conducted on this behaviour in fishes. We examined the function of redirected aggression in Julidochromis regani , a social cichlid fish. Behavioural experiments showed that redirected aggression functioned to divert the original aggressor's attention towards a third party and to pre-empt an attack towards the victim by the third-party individual, specifically among females. We found, however, that redirected aggression did not delay the recurrence of aggression by the original aggressor. These results suggest that a primary function of redirected aggression is to maintain the dominance of its actor against a subordinate occupying an adjacent rank. This study provides, to our knowledge, the first evidence that redirected aggression functions to manage conflict in social fish.


Sign in / Sign up

Export Citation Format

Share Document