Friday, December 7, 2007

Chapter 11

I thought that the quote “Privacy is suffering the death of a thousand cuts” was perfect. There is no one event that has reduced our privacy, it has been many years of refusing to recognize the importance of privacy, and looking the other way. It’s a slippery slope and we are sliding. Each breach of privacy on its own may not seem like a big deal, but one thing leads to another thing, which leads to another, and so on. The unfortunate tendency of technology is to reduce the amount of privacy that we have, so in this technological age we must be very careful. New legislation needs to recognize the rising threats to our privacy that various forms of technology impose. We may even need to amend previous laws taking into consideration what affect technology has on them. The author brings up the idea of buying your privacy. I do not believe that privacy is something that I should have to buy, it should be a given. If it is not a given then our laws need to change, and our business practices need to change. Where do business ethics and customer privacy meet? Are some of these marketing practices unethical? Just something to think about.

Overall I’m glad I read this book. It has opened my eyes to the privacy issues facing our country, and I am going to do my part to stop at least one of the thousand cuts.

Chapter 10

It will be interesting to see how AI technology is used in the future, and what the limitations of AI are. I think the author is correct in his prediction that one day we could be carrying on a conversation with a computer. I remember there being a couple of AOL Instant Messenger screen names that were computers, and you could carry on a simple conversation with them. In time I’m sure the conversations that computers can have will become more complex, and more integrated into the business world. However, As with any technology AI can be used for good or for bad. Unfortunately I think that this technology could be scary in the wrong hands and could create a world in which you never know if you’re talking to a computer or a person. Marketing firms could bombard us with AI marketers at almost no cost to them. Legislation will be needed to ensure that we are informed if we are talking to a computer to reduce the amount of deception that could occur.

Amazon uses an intelligent agent to collect information about what products I buy and compares this information to what products others buy that appear to have similar preferences. I find this technology useful when researching a product because it allows me to see what other comparable products others in my situation are buying. However, I do not like the constant emails that they send me recommending different products, it is being used as a marketing tool now. I will go to Amazon when I want to buy a product, I do not need constant emails. There is a privacy issue with this technology because it allows Amazon to track and record all of my purchases, and then send related emails. Normally this is not an issue unless you are trying to hide something.

Wednesday, November 28, 2007

Chapter 9

I was very interested in the fact that in this chapter the author makes it very clear that terrorism is a major threat, and we are currently unprepared. However, the point was made that congress does not act until there is a body count. Keep in mind that this book was written pre-9/11, now there is a body count, and now congress has acted, the author was spot on in his prediction… I agree that we need to become proactive not reactive with terrorist threats and I believe our country has moved in that direction in recent years. Except many prevention techniques require the invasion of our privacy. The patriot act is a good example of this. The Act increased the ability of law enforcement agencies to search telephone and e-mail communications, medical, financial and other records. I said that we need to be proactive; unfortunately these are the costs unless we want to simply react to a body count again. However, it will be impossible to prevent all terrorist acts from ever happening, so we also need to be prepared for when they do happen. This can be done by increased training and equipment for emergency personnel, and by conducting further research on cures for possible biological weapons that could be used against us. I hate to say it but surveillance could be a good way to go back in time and catch the terrorists after the event has taken place, just like in the Oklahoma City bombing. Overall this chapter was ahead of its time and it sickens me to know that this kind of information and warning signs were present prior to 9/11, lets not make the same mistake twice even if it does cost a little privacy, it may save your life.

Tuesday, November 27, 2007

Chapter 8

This chapter touches on an interesting issue that involves the privacy and ownership of tissues and cells that are used in scientific research. Should companies be forced to pay their research subjects royalties if their cells and tests lead to the development of a profitable new product? I don't think so. The research subjects helped, but the bulk of the development expenses, risks, and research is conducted by the company, and they should then reap the rewards. However, I do not believe that doctors should be allowed to test you or use your tissue without your consent.

This chapter also asks whether or not we should own our personal names and addresses, and I think to an extent we should. If I give my information to a company I am giving them access to my information, but I should not have to accept the fact that they may sell my information to any number of other companies. If I choose to give those companies my information that is my choice, not theirs.

Finally, technology has made it increasingly easy to obtain pirated materials, there is a constant battle between companies and pirate's. I think that pirated material is great, now we're seeing the other side of the coin. The consumers are taking companies private information without their consent, and companies don't like it. They want our information for free to generate profit, but they won't give up their information for free... I find it pretty hypocritical.

Saturday, November 24, 2007

Chapter 7

I really enjoyed this chapter because I found it very useful. It explains how marketers get and use your personal information, and even explains a number of steps that can be taken to reduce the amount of junk mail and telemarketing phone calls that one receives. The author stresses the importance of tighter legislation against marketing firms, and protecting individuals on do not call or do not mail lists. I am not 100% on this but I think that some laws may have changed since this book was written. I know that I have registered my phone number on the national do not call list (www.donotcall.gov if you’re interested) but I am unsure as to what penalties exist if a marketer still calls me, I’ll bet it isn’t much and it would probably end up being more work for me than it is worth. There should be a law that before any marketing firm mails or calls an individual they must check the phone number or address against the do not call/mail lists and face strict penalties for noncompliance. I’ll admit that every now and then I will receive a good coupon in the mail and I’ll use it, but the amount of junk mail far outweighs the wanted mail. What about the effects that mailing out millions of letters of which 99% are thrown out has on the environment? What about the millions of dollars that companies spend to mail out their ads, costs that are undoubtedly passed on to the consumer? Do you want to pay for this mail? Most forms of marketing are inefficient by nature and bad for society, a little bit of marketing to keep consumers informed is ok but I have to admit things are getting out of control.

Chapter 6

I found parts of this chapter very similar to the earlier chapter that dealt with credit reporting businesses. The reporting of medical records to insurance companies is very similar to the reporting of credit information to banks. One mistake can be difficult for an individual to be aware of, and be difficult to fix. One mistake can be the difference between being approved for medical/life insurance and being denied coverage. Should information as private as your medical history be provided to private insurance companies enabling them to increase premiums or deny coverage? How safe are these records kept? Do you know what your records are or if they’re accurate? This current system encourages insurance companies to only insure the healthy, the ones who don’t need medical care… What’s the point of that? Perhaps if the costs of medical care were less then insurance companies wouldn’t be forced to make these decisions in order to stay in business. I think that computers and technology can create a more efficient system of medical records enabling doctors to collaborate and eliminate the duplication of tests. This way doctors can view a centralized list of procedures, x-rays, blood work, etc. for a patient and use this information to determine when check-ups and other tests are needed. Often when you go to a new doctor it’s like starting from scratch and a whole new set of costly tests are needed, this shouldn’t be. Some are worried about the privacy implications of such a system, but what about the insurance companies, they already have more access to your medical information than most doctors do, and this needs to be reversed. There will be no more of a privacy risk with this system than we are currently taking with our insurance companies. I don’t know about everyone else, but I would be less concerned about my privacy if my records were in the hands of doctors than in the hands of insurance company clerks.

Monday, November 19, 2007

Chapter 5

This chapter touches on the privacy issues related to surveillance. It talks about satellite, video cameras, and microphone capabilities. As I read this book I am always taking into account that it was written in the late nineties, and I wonder how these issues have changed. I know that we now have even more accurate satellite imagery, and it is readily available to the public for free through websites such as Google Earth. The government has had satellite image capabilities since the 50’s which was classified information until 1996. It makes me wonder what’s classified now that we won’t know about for another 50 years. One main point that the author makes is how we have become numb to video surveillance, we don’t even notice the cameras anymore. There used to be a time when the public felt very uncomfortable around cameras and fought to keep them out of public areas as much as possible, MIT actually had a campus rule about public cameras. However, today cameras are commonplace and we have given up the fight and accepted them as part of our public life. It is true that when you’re in public anyone can see you and take note of what you’re doing, but technology has made it increasingly easy to observe the public often in unnecessary ways. It’s funny how many places will videotape you without your permission, but they won’t allow you to photograph or videotape them or their place of business. However, surveillance equipment is now readily available to consumers allowing them to watch over their home and anyone that is in or around it. Be careful what you do when you think you’re alone, because these days you’re never really alone.

Sunday, October 28, 2007

Chapter 4

It's amazing how much of our information is stored all over the internet for many years. Every email you ever sent, every website that you ever created an account on or purchased a product from, and every forum or blog that you've ever posted to (like this one).

Tracking systems such as VIN numbers and lot numbers that are placed on products has increased our security and safety. If your car is stolen it can be tracked back to you from the VIN number. If there is a product flaw you can easily identify and fix the problem and identify what products are affected and issue a recall.

RFID tags could create huge cost savings in the supply chain functions of companies, and in theft prevention in retail stores. However, as I read the section on RFID tags and Electronic Toll Systems (ETS), I was wondering why anyone would want to purchase a system that makes it easier for the police to catch you speeding. As you drive through the toll the speed of the RFID frequency tells the system how fast you are driving and can print you a ticket. I know that after I received my first ticket in the mail I would be trashing my ETS and buying a radar detector to instead put technology on my side for once. Also, the details of your location and what tolls you drive through are stored in a database that can now be easily accessed by the police or anyone that has access to your billing statement. It makes it a lot harder to cheat on your wife with an out of town girl that's for sure...

This chapter also discusses tracking the driving habits of your teenagers with a chip in the car that can alert you if they drive over a predetermined speed and where they're located. I'm just glad they didn't have that technology when I was a teenager, I feel sorry for the kids that will have this done to them. I wouldn't install that chip on my kids car, the more controlling and strict I am when they're a teenager the crazier they'll be when they're let loose in college. That is unless they can come up with another tracking tool for college, like that RFID tag that goes under your skin. They could have scanners in front of bars and frat houses, yeah that would be great!

Thursday, October 11, 2007

Chapter 3

It was interesting to see how the identification of humans has evolved throughout history. From bodily measurements, to hand and foot prints, to fingerprints, to DNA, and to computerized fingerprints and DNA. I was a little jealous reading about how difficult it used to be to track and identify people, it was the ultimate freedom, and it’s a lot harder to escape the past and the law these days. Identification technology has had a huge impact on law enforcement. It’s much easier to link individuals to crimes and to get accurate convictions with DNA and fingerprinting technology. However, with these technologies there is always the chance of manipulation, fraud, and human error that must be considered in court. I thought it was hilarious that prior to DNA identification a court would rule on a child’s parents based upon which person the child most looked like. My brother doesn’t look anything like me or my parents I swear he’s adopted, so a few years back if challenged the court probably would have given him to another set of parents. The future of identification could be very cool if used one way, and very scary if used another. It seems like a lot of the identification technology is used against the average citizen to stop them from doing something, to catch them doing something, or to keep track of what they’ve been doing. So the government and police love to exploit this type of technology. In the future when this technology is even more advanced there will be nowhere to hide. With face recognition you will be identified everywhere a camera is present, and you will then be matched against a database that will provide the requester with endless personal information about your past, your criminal history, your credit, and the list goes on. This information will undoubtedly impact where you are allowed to go, and how you are treated at businesses. I know that some casinos in Las Vegas already are using a form of this technology. If you’ve been banned from the casino they will have your face on record and it will be identified within seconds if you ever set foot in the casino again. However, if this information is used in another way it could be very convenient, the book uses the example of a student at the library. The student could enter the library, the library recognizes the student and lets him in, he sits down at a computer and it automatically identifies him, logs him in, and pull up his files. Ultimately it is going to be critical to regulate how these technologies are used in the future to ensure that our freedom and privacy is protected.

Friday, October 5, 2007

Chapter 2

This chapter provides a history lesson, and shows us the roots of privacy loss and the lessons that can be learned from the mistakes of the past. It was interesting to see how information databases have evolved and what affect that has had on privacy over the years. This leads us to the main issue discussed in this chapter which is the accountability and protection of the information that is stored in large databases. The book uses the example of credit reporting agencies. It’s scary to think that a private company can have this much control over your life, and so little accountability for the information that it reports. Most of our lives and who we are is stored in a computer database somewhere. When we graduate college the university keeps computer records that prove that we graduated, what would happen if there was a mistake in these records and suddenly no one believed you had a college degree? Better hold onto that copy of your diploma. Our SSN’s, our birth certificates, our citizenship, our credit reports, one mistake in any of these documents could be detrimental to us, and if there is a mistake could you prove it? Many victims of fraud and incorrect credit reporting could not and had to wait seven years for their credit to be cleared of these mistakes. This brings us back to my last post when the statement was made that “It’s a world where computers are assumed to be correct, and people wrong.” With all of this vital information stored in databases, and with so many businesses requiring the knowledge of your SSN identity theft is becoming prevalent. The number of people at these companies that have access to your private information is sickening. In my last job I literally could personally access thousands of names addresses and SSN’s from each and every one of our clients, I could access there bank accounts and routing numbers as well, and the list goes on. What about the less important information like cell phone records, and credit cards and banks that track your every purchase and give you cash back or airline rewards depending on which stores you shop at and how much you spend. We find these services convenient but when you think about it it’s just another way in which we are being watched, it’s impossible for us to know who has or will have access to this information, and how they will use it. I can think of one way that they’ll be using it…They’ll sell your purchasing habits to marketers! Prepare yourself for more junk mail…

Thursday, October 4, 2007

A Scary Future?

The introduction of this book definitely goes right at the issue. It almost provides a sense of paranoia when thinking about technology in the future and how it could negatively impact our lives. As I read I couldn’t help but be reminded of numerous futuristic movies in which the down side of technology is realized. In Demolition Man a machine automatically prints out a ticket each time Sylvester Stallone swears, or in Gatika genetic technology creates a new form of class separation where girls check out your genetic information before deciding whether or not to date you, and numerous other movies touch on issues of future technology and what happens when computers take over. I never really thought about it too much until now, but a lot of our freedoms and privacies have disappeared in recent years. Computers can track almost everything that we do making it impossible to get away with anything. I liked the quote “It’s a world where computers are assumed to be correct, and people are wrong”. This is a scary thought, the more that computers and technology are integrated into our daily lives the more control the computers will have over us, and the more devastating any small clerical, or computing errors will become on our lives. If a mistake does happen who will people believe, you or the computer? Hopefully this is far into the future, but there are issues that we are realizing right now. I know that I hate marketing with a passion. I feel that marketing combined with technology is ruining our society, it’s everywhere! If you own a land line you know that the majority of calls you receive are from telemarketers, then there’s billboards, commercials, packaging, junk mail, junk email, the list goes on. Technology is making it easier and easier for marketers to find and use your personal information to forcibly communicate junk to you and it’s only getting worse. With the lack of security on the internet, and the amount of personal data that is floating around on it it’s becoming increasingly easy to steal someone’s identity. Technology is a new concept that has expanded so quickly that the laws and regulations have not had time to catch up with many of the privacy issues that are being created. The major question that is posed in this chapter is can technology and privacy coexist? I’m sure that it will be a constant battle between the two and only time will tell which wins, but right now technology appears to have a head start.