<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区

          Snowden and hegemony of social media

          Updated: 2013-06-19 06:55

          By Jony Lam(HK Edition)

            Print Mail Large Medium  Small

          The whole Edward Snowden episode is intriguing for a number of reasons, but whether Beijing or the courts will have the final say on the future of the whistleblower if the US demands his extradition or whether he is a hero or not are not among the more important questions. Therefore, of course, we are having exactly these angles in the newspapers.

          It is revealing that "activists" and "pan-democrats" who would have cried foul if it was China that spies on its social media (such as QQ, WeChat or Renren) now remain largely silent. They succeeded to a certain extent to make the issue merely personal, that's why the quotes all read like "we support Snowden," or better yet, "Hong Kong's rule of law protects Snowden." The truth is, Hong Kong can protect as many Snowdens as they please, but the Big Brother will still be checking our e-mails.

          Let's look at the bigger issues. In certain business circles, the buzzword this year is "big data". According to IBM, we create 2.5 quintillion bytes of data everyday - so much that 90 percent of the data in the world today has been created in the last two years alone. This data comes from everywhere: sensors used to gather climate information, posts to social media sites, digital images and videos, purchase transaction records, and cell phone GPS signals to name a few. This data is what they call "big data".

          "Big data" is a quantitative methodologist's dream come true. It is not that a person has produced more data, but now all that data is digitized, more or less standardized, and stored. Before, only my close friends knew I am a Buddhist, now this piece of information is in a standard field in my "Facebook profile" easily retrieved by Big Brother and others. In the past, only my girlfriend knew my whereabouts around the clock, now my GPS data, my Google calendar information and my Facebook "check-ins" will broadcast where I am almost 24 hours a day.

          It does not matter how I set my share settings or security levels, folks like Snowden are hired exactly to crack these safeguards and mine the data.

          Every student of the social sciences would know that a world where quantitative methodologists prevail is a nightmare. Methods like interviews and self-administered questionnaires all have their limitations, especially when you are asking the kind of questions such as "have you ever cheated on your spouse", - that's why all scholarly research qualifies its findings. Ultimately, these irregularities reflect the research subjects' resistance - the relationship between the researcher and the researched is one of power, and the researched does not yield readily.

          Now "big data" changes the rule of the game. Researchers no longer have to ask "have you ever cheated on your spouse"; all they need to do is look at the "meta-data" - who you are calling, and the frequency and duration of the calls. This is pure objectivity, and big business, and it is frightening.

          This leads us to the other important question: why aren't we revolting against this nightmare. Ten years ago, we were all cautious about revealing personal data in cyberspace. We are told to create unique passwords for different accounts. These strategies were possible because in the Web 1.0 era information was not customized and everyone only had a few accounts (perhaps just a hotmail account).

          In Web 2.0, all service experiences are customized. I create, on average, an account every other day (have a look at the channels at IFTTT.com to have an idea how many services a person can utilize), and it is just impossible for me to remember all the passwords if they are all unique. Customized services are more convenient, but by definition they also keep track of all your activities.

          Social media is one form of customized services, which has the effect of making people conform to their peers. Conforming messages get "likes" and "shares", and messages with more "likes" and "shares" appear in a prominent position on your friends' "newsfeed."

          That is to say, social control exerted by social media is twofold. Socially it promotes accepted and conventional messages; technologically it monitors people's behaviors. We accept its technological tyranny in exchange for convenience and the comfort provided by conforming to a social and cultural hegemony.

          The author is a current affairs commentator.

          (HK Edition 06/19/2013 page9)

          主站蜘蛛池模板: 四虎成人精品在永久在线| 综合色在线| 久久av高潮av喷水av无码| 91精品午夜福利在线观看| 亚洲区中文字幕日韩精品| 吉川爱美一区二区三区视频 | 国产成人精品日本亚洲成熟| 色欲国产一区二区日韩欧美| 亚洲国产午夜精品理论片| 亚洲乱码精品久久久久..| 国产精品一区二区三区四区| 久久精品不卡一区二区| 国产不卡一区不卡二区| 久久99热只有频精品6狠狠| 日韩大片在线永久免费观看网站| 亚洲精品一区国产精品| 欧美日韩人成综合在线播放| 国产精品久久中文字幕第一页| 无码人妻天天拍夜夜爽| 国产精品爽爽久久久久久竹菊| 91精品国产自产91精品| 亚洲一区成人在线视频| 国产一区二区三区黄网| 亚洲第一视频区| 国产无遮挡A片又黄又爽小直播| 久久综合狠狠综合久久| 中文字幕日韩国产精品| 黄色亚洲一区二区三区四区| 在线a级毛片无码免费真人| 亚洲av无码成人精品区一区| 97精品国产91久久久久久久| 美女啪啪网站又黄又免费| 99久久精品午夜一区二区| 国产亚洲精品福利在线无卡一| 久久热在线视频精品视频| 国产欧美日韩亚洲一区二区三区| 日韩精品成人网页视频在线| 乱中年女人伦av三区| 啦啦啦啦www日本在线观看| 99久久精品免费看国产电影| 国产老熟女国语免费视频|