In reality, we wouldn’t share your information in a way you wouldn’t want. The trust you place in us as a safe place to share information is the most important part of what makes Facebook work. Our goal is to build great products and to communicate clearly to help people share more information in this trusted environment….
…the interesting thing about this change in our terms is that it highlights the importance of these issues and their complexity. People want full ownership and control of their information so they can turn off access to it at any time. At the same time, people also want to be able to bring the information others have shared with them—like email addresses, phone numbers, photos and so on—to other services and grant those services access to those people’s information. These two positions are at odds with each other.
He says he’ll post more soon. Best had – this issue won’t go away…
I met my wife when my internet access was restricted to a 36 kps modem at one computer in my office, next to the fax machine in the secretaries’ room.
I bought my first mobile phone after we’d been together for about six months. It would be a year or two before text messaging started in the UK.
If we phone one another in the day during that honeymoon period it would be on a land-line. That would happen maybe once a day.
I had email. She didn’t.
So… I have no idea what online dating, or the early stages of a relationship conducted in the modern world is like. I’ve never had a Facebook status other than married and I’ve never had to de-friend an ex and divide up our friends online like so many paperback books.
Have some sympathy, then, for today’s yoot. While it may be easier to meet potential partners, once you have the etiquette is shifting as fast as the technologies and if you happen across someone whose boundaries are different to your own, there might be trouble. Your web shadow, social network presences and always-on personal comms device (mobile) mean that when things you don’t like kick off they kick off fast.
Encouraging, then, to see sites like thatsnotcool.com offering teens a helping hand with dealing with a terrifyingly long list of behaviours that might upset them, including:
Pestering via email and texts
Hacking email and social network accounts
Asking for inappropriate photos
Posting said photos online
The has advice, spaces to discuss these issues and an amusing/disturbing set of “call-out cards” you can send / post to a harasser’s web page by way of a hint to them to back off (a selection of which are below)…
I tend to be an optimist, and in accepting the considerable benefits of living in part online in social media, have learned more and more to be open, while also being clear with myself about where the boundaries of one’s public online life are set.
For some time we’ve had the concept of Google Shadows – what people find out about you when they put your name into Google (Jeff Jarvis is who I heard using it first).
I like the idea. A shadow is something that’s always with us, that follows us, that’s not separate. We increasingly need to be conscious of the shadows online cast by our actions in everyday life.
It’s not just Google, though, these days, but our other online places, all the public and private databases and spaces in our working and personal lives and in our social graphs, of course.
We need to not only be aware of what our web shadows are, but how we affect them through all of our everyday actions. Sometimes when people want to know more about you, the shadow is all they will see.
Here’s some of the most interesting posts and articles that I’ve been chewing over:
When a Governor in Arizona’s indiscretion was picked up by an open mic Lawrence Lessig takes CNN to task for broadcasting it, and muses on how it seems we have to “remember that there are a million privacy invading technologies surrounding us”. The discussion in the comments is very good indeed.
Like Lessig, private investigator Steve Rambam, summons the spectre of of life in the Cold War communist bloc in this video of his presentation called Privacy is Dead: Get Over It. Rather than worrying about Big Brother though, the proliferation of digital photography and video, among other things, means it’s more “Little Cousin” – as in we never know when we’re being recorded by one another, even inadvertently.
Rambam, an individual with a colourful Google shadow, to say the least, was also quoted in an article in the Economist’s the Perils of Sharing, part of the newspaper’s The World in 2009 special edition. More on that later…
Lastly, the brilliant David Spark’s 12 Great Tales of De-Frieinding reminds us how quickly we are having to evolve new social strategies to deal with relationship issues online.
In part, it follows an experiment at the MIT Media Lab where 100 students electronic trails (emails, calls, etc) are recorded and followed. It also recalls how the data about us can be mined to interesting effect:
In 2006, Sense Networks, based in New York, proved that there was a wealth of useful information hidden in a digital archive of GPS data generated by tens of thousands of taxi rides in San Francisco. It could see, for example, that people who worked in the city’s financial district would tend to go to work early when the market was booming, but later when it was down.
One suspects that early morning cabs are pretty plentiful at the moment then… Anyhow, Dr Pentland, who heads the project describes this sort of thing as “reality mining”.
A map expressing collaboration between students in an MIT Media Lab experiment
For the timebeing, Google acts as a supreme court in a world of “sovereign users” clashing with ever increasing frequency with nation states that would prefer to have the last word on free speech.
Google acts like a benign dictator of the world’s data, which makes it important that we keep an eye on how it behaves and who is in charge of the decisions about what can and can’t be accessed via the company’s search engine and YouTube services.
An article in the New York Times (free registration may be needed – can never work out the NYT’s crazy system) takes a close look at the Google legal team and some of the legal struggles they have been involved in around the world. These cases and how The Goog handles itself give us a sense of how it is operating within the various codes of behaviour, mainly informal, that have emerged.
Voluntary self-regulation means that, for the foreseeable future, Wong and her colleagues will continue to exercise extraordinary power over global speech online. Which raises a perennial but increasingly urgent question: Can we trust a corporation to be good — even a corporation whose informal motto is “Don’t be evil”?
Governments of various repressive shades are testing Google all the time. While we’re all aware of the restrictions in China, and of the Thai and Turkish governements effectively ransom the company’s access to their citizens (and vice versa) in return for Google blocking access to certain materials, most often YouTube videos. And other attempts to clamp down on content and conversations are surprisingly common:
Over the past couple of years, Google and its various applications have been blocked, to different degrees, by 24 countries. Blogger is blocked in Pakistan, for example, and Orkut in Saudi Arabia. Meanwhile, governments are increasingly pressuring telecom companies likeComcast and Verizon to block controversial speech at the network level. Europe and the U.S. recently agreed to require Internet service providers to identify and block child pornography, and in Europe there are growing demands for network-wide blocking of terrorist-incitement videos. As a result, Wong and her colleagues said they worried that Google’s ability to make case-by-case decisions about what links and videos are accessible through Google’s sites may be slowly circumvented, as countries are requiring the companies that give us access to the Internet to build top-down censorship into the network pipes.
Google operates a “decider model” for what plays and doesn’t on YouTube, for instance. Basically decisions get escalated depending on their complexity. A further concern for us all, Rosenberg points out, is that this system isn’t very scalable at a time in the development of the web where video and indeed all forms of content are, well, scaling pretty rapidly…
I trust Google – for now. But it’s important that we keep watching. Last word to Rosen and Lawrence Lessig:
“During the heyday of Microsoft, people feared that the owners of the operating systems could leverage their monopolies to protect their own products against competitors,” says the Internet scholar Lawrence Lessig of Stanford Law School. “That dynamic is tiny compared to what people fear about Google. They have enormous control over a platform of all the world’s data, and everything they do is designed to improve their control of the underlying data. If your whole game is to increase market share, it’s hard to do good, and to gather data in ways that don’t raise privacy concerns or that might help repressive governments to block controversial content.”