Take a Virtual, Interactive Tour 

Cyber Security, Technology News

  |  
5 Min Read

Surveillance Capitalism: The Cost of Data

Watching for a Pay Day

Surveillance capitalism is the act of earning money from surveillance in the simplest terms. Large companies who have access to massive data sets can reduce uncertainty and identify the probability that a future action will be taken by people. Many of these companies are collecting data about people in bulk, distilling it, and reselling that data to advertisers or companies to assist them in bolstering their ability to sell products.

The secondary use for large data sets is surveillance. If you can collaboratively build a dossier or database on someone, it is not a large stretch to apply the knowledge you have gained to matters of national security. However, this massive gathering of data that was once the business of governments is now being used by corporations and this has shifted the power structure tremendously from the government towards these organizations.

PokemonAn excellent and often cited example of surveillance capitalism is the game Pokémon Go. Pokémon Go is a game in which your location is tracked constantly, and your behavior distilled as you are provided "Pokemon" and other rewards for your efforts. This data can then be used to match photographs, time spent, network connections, phone activities, and more to a database that can then identify what products are more likely to sell to you and when and how they should be advertised.

Understanding how technology works, what the uses for that technology are, and how our privacy intersects with our comfort is of utmost importance. As a cyber instructor a the University of Advancing Technology, I take privacy and security very seriously, and our classes are designed to make you ask and answer some of the toughest ethical questions in the industry. 

Surveillance 2


Earn a Degree In Cyber Security at UAT

UAT offers a Master’s of Science in Cyber Security, as well as bachelor’s degrees in Network Engineering, Network Security, and Technology Forensics. Our Cyber Security Degree for Ethical Hackers and Network Security Curriculum has been certified through the NSA/DHS National Information Assurance Training Program in Information Assurance and Cyber Defense.

Comment

The Sixth Day of Techmas: UAT's 6 Top Blogs of 2025

On the 6th day of Techmas, we’re celebrating University of Advancing Technology's (UAT) six top blogs of 2025! From Artificial Intelligence (AI) art reaching the Moon to award-winning hackathon wins, ...
Picture of Katy Toerner Katy Toerner 5 Min Read

The Fourth Day of Techmas - 4 Cybersecurity tips from UAT's Cyber Faculty

On the fourth day of Techmas, University of Advancing Technology's (UAT) Cyber Security Faculty are here to help you stay safe online this holiday season! From phishing scams disguised as festive ...
Picture of Katy Toerner Katy Toerner 5 Min Read

Staying Secure: Best Practices for National Computer Security Day

Happy National Computer Security Day! To celebrate this, we are going to go over 4 tips and why they are important to keep your computer safe. We when we look at risk, one of the biggest indicators ...
Picture of Sarah Bunce Sarah Bunce 5 Min Read