{"id":4703,"date":"2022-03-20T19:47:31","date_gmt":"2022-03-20T23:47:31","guid":{"rendered":"https:\/\/blogs.shu.edu\/stillmanexchange\/?p=4703"},"modified":"2022-03-20T20:00:59","modified_gmt":"2022-03-21T00:00:59","slug":"our-digital-revolution","status":"publish","type":"post","link":"https:\/\/blogs.shu.edu\/stillmanexchange\/2022\/03\/20\/our-digital-revolution\/","title":{"rendered":"Our Digital Revolution"},"content":{"rendered":"<p><strong>Trina Stroedecke<br \/>\n<em>Technology Editor<\/em><\/strong><\/p>\n<p>Advances in the digital revolution can be dazzling. Now, data about where we are, where we\u2019re going, how we\u2019re feeling, what we\u2019re saying are turning into beacons of revenue that illuminate a new commercial prospect. Lights, bells, and whistles have blinded us to the ways that high-tech giants exploit our personal data.<\/p>\n<p>Corporations are mining users\u2019 information to predict and shape their behavior. Here, we\u2019re entering uncharted territory. As a result, no longer can the concept of privacy limit the assault on <span style=\"font-size: 1rem\">behavioral data. Now we face a new kind of challenge, one that threatens the political, ideological, and existential basis of a modern liberal order; built upon principles of self-determination that have been developed over centuries. Individual sanctity and social equality; the social development of identity and autonomy; the integrity of contracts, the freedom derived from making and keeping promises; the rules of collective agreements; the functions of market democracy; the political integrity of societies; and the future of democratic sovereignty. All have been threatened in our lives.<\/span><\/p>\n<figure id=\"attachment_4720\" aria-describedby=\"caption-attachment-4720\" style=\"width: 300px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blogs.shu.edu\/stillmanexchange\/files\/2022\/03\/Evolution-1024x608-1.jpg\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-4720\" src=\"https:\/\/blogs.shu.edu\/stillmanexchange\/files\/2022\/03\/Evolution-1024x608-1-300x178.jpg\" alt=\"\" width=\"300\" height=\"178\" srcset=\"https:\/\/blogs.shu.edu\/stillmanexchange\/files\/2022\/03\/Evolution-1024x608-1-300x178.jpg 300w, https:\/\/blogs.shu.edu\/stillmanexchange\/files\/2022\/03\/Evolution-1024x608-1-768x456.jpg 768w, https:\/\/blogs.shu.edu\/stillmanexchange\/files\/2022\/03\/Evolution-1024x608-1.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-4720\" class=\"wp-caption-text\"><strong>As we evolve, technology does as well <em>(Photo courtesy of Maastricht)<\/em><\/strong><\/figcaption><\/figure>\n<p>In the world, there is a growing concern for government surveillance and the rapid innovation leading technology to spy on our daily lives. An instance where this technology has been used is in the extensive aerial surveillance that has begun being carried out by law enforcement to point out people in crowds. Precincts can scan the contents of millions of social media posts, forwarding crucial information to police departments so agents can track and surveil protests.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Contact Trina at stroedka@shu.edu<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Advances in the digital revolution can be dazzling. Now, data about where we are, where we\u2019re going, how we\u2019re feeling, what we\u2019re saying are turning into beacons of revenue that illuminate a new commercial prospect.<\/p>\n","protected":false},"author":4937,"featured_media":4786,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"no_sidebar_content_centered","colormag_page_sidebar_layout":"no_sidebar","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4,2],"tags":[1068,1157,19,1156,18,366],"class_list":["post-4703","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","category-trending","tag-1068","tag-digital-surveillance","tag-march","tag-surveillance","tag-technology","tag-trending"],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/posts\/4703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/users\/4937"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/comments?post=4703"}],"version-history":[{"count":4,"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/posts\/4703\/revisions"}],"predecessor-version":[{"id":4781,"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/posts\/4703\/revisions\/4781"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/media\/4786"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/media?parent=4703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/categories?post=4703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/stillmanexchange\/wp-json\/wp\/v2\/tags?post=4703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}