Take a Virtual, Interactive Tour 

Cyber Security, Technology News

  |  
5 Min Read

Surveillance Capitalism: The Cost of Data

Watching for a Pay Day

Surveillance capitalism is the act of earning money from surveillance in the simplest terms. Large companies who have access to massive data sets can reduce uncertainty and identify the probability that a future action will be taken by people. Many of these companies are collecting data about people in bulk, distilling it, and reselling that data to advertisers or companies to assist them in bolstering their ability to sell products.

The secondary use for large data sets is surveillance. If you can collaboratively build a dossier or database on someone, it is not a large stretch to apply the knowledge you have gained to matters of national security. However, this massive gathering of data that was once the business of governments is now being used by corporations and this has shifted the power structure tremendously from the government towards these organizations.

PokemonAn excellent and often cited example of surveillance capitalism is the game Pokémon Go. Pokémon Go is a game in which your location is tracked constantly, and your behavior distilled as you are provided "Pokemon" and other rewards for your efforts. This data can then be used to match photographs, time spent, network connections, phone activities, and more to a database that can then identify what products are more likely to sell to you and when and how they should be advertised.

Understanding how technology works, what the uses for that technology are, and how our privacy intersects with our comfort is of utmost importance. As a cyber instructor a the University of Advancing Technology, I take privacy and security very seriously, and our classes are designed to make you ask and answer some of the toughest ethical questions in the industry. 

Surveillance 2


Earn a Degree In Cyber Security at UAT

UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network Engineering, Network Security, and Technology Forensics. Our Cyber Security Degree for Ethical Hackers and Network Security Curriculum has been certified through the NSA/DHS National Information Assurance Training Program in Information Assurance and Cyber Defense.

Comment

What is a Text Editor?

How to Do Serious Systems Admin Work The Word Processor is an amazing piece of technology that has enhanced the creation of documents and formatted text the world over. If you are seeking a desktop ...
Picture of Aaron Jones Aaron Jones 5 Min Read

Brute Force Attacks

What does brute force mean? Brute force attacks are a method by which many login attempts are made to gain access to a system. WordPress is a free and open-source content management system that is ...
Picture of Aaron Jones Aaron Jones 5 Min Read

NFTs and UAT

Non-Fungible Tokens (or NFTs) Have Two Big Problems. The first is the name. Non-fungible sounds like fungus, which is gross. So, there’s a branding issue, which I’m sure is why people try to refer to ...