The Quantified Self, Self-Tracking, and the Limits Of

Total Page:16

File Type:pdf, Size:1020Kb

The Quantified Self, Self-Tracking, and the Limits Of Sensored: The Quantified Self, Self-Tracking, and the Limits of Digital Transparency Yuliya Grinberg Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2019 © 2018 Yuliya Grinberg All rights reserved ABSTRACT Sensored: The Quantified Self, Self-Tracking, and the Limits of Digital Transparency Yuliya Grinberg The idea that daily life overflows with data has entered our common sense. Digital sensors placed in phones, clothing, or household appliances to track how we walk, how much we sleep, or where we travel have heightened the sense that everything about our lives is rapidly being translated into data. Theorists writing about data overload have largely converged around questions of privacy and agency, focusing on the feelings of impotence produced by large quantities of data that now let corporations effortlessly monitor and regulate people’s lives. By contrast, I am interested in moments of friction. Scholars point to real issues, but they overstate the efficacy of data gathering and discount the professional dynamics that motivate the proliferation of data. As I evaluate how data discourse operates and builds, I concentrate on the experiences of those involved in the business of self-tracking, and mainly on the work of U.S.- based developers of wearable computing and the technology professionals who participate in the international forum for data enthusiasts called the Quantified Self. As I analyze how digital entrepreneurialism configures notions of data and transforms digital self-monitoring into meaningful work, I examine how the relationship of technology professionals to data opens onto wider debates about the politics of digital representation. Ultimately, by applying an anthropological lens to explore how the practices, beliefs, and views of marketers, engineers, and developers of self-tracking tools shape digital knowledge, this research challenges accounts of data based purely on transparency, anxiety, and fear and reveals just how precarious the control exerted by digital companies and self-monitoring tools really is. Table of Contents List of Illustrations ...................................................................................................... ii Acknowledgements ..................................................................................................... iii Dedication .................................................................................................................. viii Introduction ................................................................................................................. 1 Opening Interlude: The Most Connected Man on Earth ...................................... 38 PART I: TRANSPARENCY ......................................................................................... 53 Chapter 1: Second Skin ............................................................................................. 57 Chapter 2: Social Skin ............................................................................................... 92 PART II: FLOW .......................................................................................................... 128 Chapter 3: The (Moral) Economy of Gestures ..................................................... 129 PART III: COMMUNITY .......................................................................................... 178 Chapter 4: Searching for Community ................................................................... 181 Chapter 5: United in Difference ............................................................................. 216 PART IV: CLEAN DATA .......................................................................................... 247 Chapter 6: Emotional Sweating ............................................................................. 248 Conclusion: Purity and Data .................................................................................. 282 Bibliography ............................................................................................................. 289 i List of Illustrations Figure 1: Poster for Dark Net ...........................................................................................................................1 Figure 2: Page from Chris's calendar, Chrisdancy.com .................................................................................41 Figure 3: Painting by Aaron Jastinski ............................................................................................................46 Figure 4: Life size poster greeting visitors at CES 2016. Photo by author. ...................................................47 Figure 5: The Creation of Adam, Michelangelo ............................................................................................47 Figure 6: Before and After image of Chris, Mashable 13, 2014 ....................................................................48 Figure 7: Photo by Kyle Thompson ...............................................................................................................49 Figure 8: Cover of Time magazine, September 11, 2014 ...............................................................................50 Figure 9: Photograph by Kyle Thompson ......................................................................................................51 Figure 10: Tweet by Chris ..............................................................................................................................62 Figure 11: Mock-up of the project X.pose .....................................................................................................63 Figure 12: The Borg Club. Steve Mann is far left. Courtesy of © Steve Mann, 1996. ..................................64 Figure 13: Forrester Research Graphic ...........................................................................................................70 Figure 14: The Vitruvian Man ........................................................................................................................70 Figure 15: Poster for the film The Human Face of Big Data. ........................................................................79 Figure 16: Stanley Kubrick’s 2001: A Space Odyssey. A DVD cover (2007 release). .................................79 Figure 17: Hair samples used in Stranger Vision. ..........................................................................................81 Figure 18: Busts at the Stranger Vision Exhibit .............................................................................................82 Figure 19: Football Gladiators, www.bodyworlds.com .................................................................................88 Figure 20: Image: Body Worlds pulse, Destination: You banner, www.bodyworlds.com. ...........................88 Figure 21: The Skin Man, www.bodyworlds.com .........................................................................................89 Figure 22: Body Metrics exhibit, on premise billboard. ................................................................................90 Figure 23: February 8, 1993 Time magazine cover .....................................................................................108 Figure 24: Time magazine February 8, 1993 cover story art, p. 61. ............................................................109 Figure 25: A slide from B. Wilder’s presentation at the 2015 WearableTech Expo. ...................................129 Figure 26: Sphygmograph and Step-Tracker developed by Etienne Jules Marey in 1860. .........................134 Figure 27: FitBit wrist-work heart-rate and step-tracker. .............................................................................134 Figure 28: Monitors at the Scanadu display at the Quantified Self conference. Photo by author. ...............152 Figure 29: Gartner Hype Cycle for Emerging Technologies, 2015. ............................................................159 Figure 30: Displays set up at CES. Photo by author. ...................................................................................161 Figure 31: David Sipress, New Yorker Cartoon, May 2017 ........................................................................181 Figure 32: Demo Hour Showcase .................................................................................................................188 Figure 33: Attendees seated for a Show & Tell presentation .......................................................................189 Figure 34: Quantified Self Logo ...................................................................................................................208 Figure 35: Online banner ad and event display at the CES 2015. ................................................................235 Figure 36: Ads for data-processing software and wearable technology in SF and Denver airports. ...........239 Figure 37: Cover of the first edition of the Whole Earth Catalog ................................................................241 Figure 38: Photo by Bianca Consunji, Evan Engel for Mashable.com ........................................................283 Figure 39: Photo by Benjamin Rasmussen for Bloomberg BusinessWeek .................................................284 Figure 40: Photo from Mashable.com’s "The Most Connected Man is You Just a Few Years from Now”286 ii Acknowledgements A joke had been making rounds at dinner
Recommended publications
  • The Social Internet: Frustrating, Enriching, but Not Lonely
    Public Culture The Social Internet: Frustrating, Enriching, but Not Lonely Zeynep Tufekci The “lonely world of cyberspace” is a curious example of the vast gap that every so often opens between an idea’s popularity among pun- dits (considerable) and its basis in empirical research (very little). In the past few years the New York Times has run multiple op- eds suggesting social media or our phones are eroding human connections (for example, Cohen 2012; Egan 2013; Foer 2013; Franzen 2011; Fredrickson 2013); the Atlantic ran a cover story ask- ing, “Is Facebook Making Us Lonely?” (Marche 2012); Massachusetts Institute of Technology psychologist Sherry Turkle wrote a book titled Alone Together (2011) that is partly about social media damaging “real world” human connections; and Pope Benedict warned youngsters not to replace their real friends with virtual ones (Benedict XVI 2011, 2009). In the meantime, a growing pile of empirical research shows that, if anything, the relationship runs the other way — Internet users are more social and less isolated. This curious “Freddy Krueger effect” — the inability of data to kill the endur- ing attractiveness of a theme — deserves unpacking that goes beyond an indication of its lack of empirical basis and appeal to moral panic. The Internet’s integration into sociality happened with such impressive speed that it is at once mundane, all around us, and yet also barely examined. In addition, the Internet’s qualitative and subjective impacts are harder to measure than simple indicators like use or penetration. Further, a technology as multifaceted and complex as the Internet not only will not produce a “main effect” — a single, homogeneous impact that applies to everyone and every type of use — but it may well have different consequences at systemic, individual, and historical scales.
    [Show full text]
  • Opinion | Youtube, the Great Radicalizer - the New York Times 03/11/2018, 0924
    Opinion | YouTube, the Great Radicalizer - The New York Times 03/11/2018, 0924 SUNDAY REVIEW SUNDAY REVIEW | YouTube, the Great Radicalizer Please disable your ad blocker. Advertising helps fund Times journalism. YouTube, the Great Radicalizer By Zeynep Tufekci March 10, 2018 At one point during the 2016 presidential election campaign, I watched a bunch of videos of Donald Trump rallies on YouTube. I was writing an article about his appeal to his voter base and wanted to confirm a few quotations. Soon I noticed something peculiar. YouTube started to recommend and “autoplay” videos for me that featured white supremacist rants, Holocaust denials and other disturbing content. Since I was not in the habit of watching extreme right-wing fare on YouTube, I was curious whether this was an exclusively right-wing phenomenon. So I created another YouTube account and started watching videos of Hillary Clinton and Bernie Sanders, letting YouTube’s recommender algorithm take me wherever it would. https://www.nytimes.com/2018/03/10/opinion/sunday/youtube-politics-radical.html Page 1 of 5 Opinion | YouTube, the Great Radicalizer - The New York Times 03/11/2018, 0924 Before long, I was being directed to videos of a leftish conspiratorial cast, including arguments about the existence of secret government agencies and allegations that the United States government was behind the attacks of Sept. 11. As with the Trump videos, YouTube was recommending content that was more and more extreme than the mainstream political fare I had started with. Please disable your ad blocker. Advertising helps fund Times journalism. Intrigued, I experimented with nonpolitical topics.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Axis Bank Credit Card Current Month Statement
    Axis Bank Credit Card Current Month Statement Wendell parallelizing his bransle fugles down or supportably after Sancho alight and upbraids mechanistically, unconjugal and nickelic.portative. Legless Piotr slice and his unwitty fresh Herbiebridge oftenlimpidly congee or unguardedly some susceptibleness after Hamlet tender-heartedlyranks and remonetized or predestinating deplorably, war. chilliest Chase bank credit score from bank card statement was not received through axis What you charge from vistara website too for errors, current bank card statement password should you the credit card being provided on. The online tool can something found here. On axis bank routing number field enter to? Ask on current month varies from bovada withdrawals usually measured at anz credit card no was taken up an hdfc credit card bill will be connected with. If in card was blocked or suspended due a suspicious activity, please contact us right away. Show bank is current month, bob advance remittance import as you consent axis bank is written or merchant. The banks, lenders, and credit card companies are taking responsible of any content posted on this fare and shot not call or guarantee any reviews. View key and print your eStatements through Online Banking at your convenience Fast Receive eStatements quicker than paper statements and access online for virgin to 12 months. Forms Click down to download nomination and enrollment forms for signature Bank of America Racing Challenge program. Transfers require you currently axis credit card statement sent by many real credit password but you accept or title of. Need easily avail a current month of this month, since credit card was difficult.
    [Show full text]
  • Disrupting Fields: Addressing Power Dynamics in the Fields of Climate Finance and Gender Lens Investing
    JANUARY 2021 Disrupting Fields: Addressing Power Dynamics in the Fields of Climate Finance and Gender Lens Investing Joy Anderson, Criterion Institute with funding from Wallace Global Fund and UNICEF Disrupting Fields: Addressing Power Dynamics | 1 Acknowledgements This paper is grounded in a moment in time in the development of gender lens investing and climate finance. It must be acknowledged up front that the work of Criterion Institute is implicated in this history. I invite you to challenge Criterion and me as its leader on our own decisions and how they affect power dynamics in the field. We are committed to publishing metrics and setting up feedback loops to be an example of the transparency and accountability in field building that we are calling for in this paper. Criterion’s Board of Directors, many of whom are referenced in this work, challenge the power dynamics that keep systems of inequity in place in their own work. They hold Criterion accountable for our mission to expand who sees themselves as able to use finance to create social change. Susan Gibbs at Wallace Global Fund and Patty Alleman at UNICEF have been long-time champions in ensuring that efforts to innovate in systems finance is grounded in goals of equity and justice. This work would not have been possible without funding from both Wallace Global Fund and UNICEF. This has been a collective effort. The whole team at Criterion participated in one way or another developing and writing this paper over the last 18 months as Criterion’s work became increasingly explicit in its focus on power.
    [Show full text]
  • Youtube, the Great Radicalizer, Zeynep Tufekci. New York Times, March 10, 2018
    YouTube, the Great Radicalizer, Zeynep Tufekci. New York Times, March 10, 2018. Zeynep Tufekci is an associate professor at the School of Information and Library Science at the University of North Carolina at Chapel Hill and the author of “Twitter and Tear Gas: The Power and Fragility of Networked Protest.” At one point during the 2016 presidential election campaign, I watched a bunch of videos of Donald Trump rallies on YouTube. I was writing an article about his appeal to his voter base and wanted to confirm a few quotations. Soon I noticed something peculiar. YouTube started to recommend and “autoplay” videos for me that featured white supremacist rants, Holocaust denials and other disturbing content. Since I was not in the habit of watching extreme right-wing fare on YouTube, I was curious whether this was an exclusively right-wing phenomenon. So I created another YouTube account and started watching videos of Hillary Clinton and Bernie Sanders, letting YouTube’s recommender algorithm take me wherever it would. Before long, I was being directed to videos of a leftish conspiratorial cast, including arguments about the existence of secret government agencies and allegations that the United States government was behind the attacks of Sept. 11. As with the Trump videos, YouTube was recommending content that was more and more extreme than the mainstream political fare I had started with. Intrigued, I experimented with nonpolitical topics. The same basic pattern emerged. Videos about vegetarianism led to videos about veganism. Videos about jogging led to videos about running ultramarathons. It seems as if you are never “hard core” enough for YouTube’s recommendation algorithm.
    [Show full text]
  • Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development
    J Bus Ethics DOI 10.1007/s10551-017-3504-8 ORIGINAL PAPER Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development 1 2 Katie Shilton • Daniel Greene Received: 10 August 2016 / Accepted: 7 March 2017 Ó The Author(s) 2017. This article is an open access publication Abstract Privacy is a critical challenge for corporate managers who wish to promote ethical practices in mobile social responsibility in the mobile device ecosystem. development. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make Keywords Corporate social responsibility Á Occupational ethical decisions about how and whether to collect, store, ethics Á Privacy Á Qualitative analysis Á Technology ethics and share these data. This paper conducts a discourse analysis of mobile application developer forums to dis- cover when and how privacy conversations, as a repre- Introduction: Investigating Work Dynamics sentative of larger ethical debates, arise during that Impact Privacy Reflection development. It finds that online forums can be useful spaces for ethical deliberations, as developers use these Mobile technologies enable new forms of access to infor- spaces to define, discuss, and justify their values. It also mation and communication. But even as the capabilities of discovers that ethical discussions in mobile development mobile technologies advance, many fail to reflect and are prompted by work practices which vary considerably support the values of their users. Studies demonstrate a between iOS and Android, today’s two major mobile striking discord between user values such as privacy and platforms. For educators, regulators, and managers inter- implementation of these values in mobile technologies ested in encouraging more ethical discussion and deliber- (Martin and Shilton 2015).
    [Show full text]
  • IIS Security and Programming Countermeasures
    IIS Security and Programming Countermeasures By Jason Coombs ([email protected]) Introduction This is a book about how to secure Microsoft Internet Information Services for administrators and programmers whose work includes a requirement for information security, a computer industry specialty field commonly referred to as infosec. In this book the terms information security and infosec are used interchangeably with the more friendly term data security. This is not a book about hacking, cracking, and the tools and techniques of the bad guys, the so-called black hat hackers. This book teaches computer professionals and infosec specialists how to build secure solutions using IIS. It is your duty to secure and defend networked information systems for the benefit of the good guys who are your end users, clients, or less technical coworkers. There is nothing you can do that will transform a programmable computer running Microsoft Windows from its vulnerable condition to an invulnerable one. Every general purpose programmable computer is inherently vulnerable because it is controlled by software and is designed to allow new software to be installed or executed arbitrarily. Network computing based on programmable general purpose computers will never be safe from an information security perspective. Eliminating the feature of general purpose programmability from a networked computer and replacing its software with firmware reduces but does not eliminate vulnerabilities. These are immutable realities of present day computing and, as always, reality represents your biggest challenge. Microsoft is in business to get as much of your money as possible using whatever means will work at a given moment and in this respect they know virtually no equal in the software business.
    [Show full text]
  • Download; (2) the Appropriate Log-In and Password to Access the Server; and (3) Where on the Server (I.E., in What Folder) the File Was Kept
    AN ALCTS MONOGRAPH LINKED DATA FOR THE PERPLEXED LIBRARIAN SCOTT CARLSON CORY LAMPERT DARNELLE MELVIN AND ANNE WASHINGTON chicago | 2020 alastore.ala.org © 2020 by the American Library Association Extensive effort has gone into ensuring the reliability of the information in this book; however, the publisher makes no warranty, express or implied, with respect to the material contained herein. ISBNs 978-0-8389-4746-3 (paper) 978-0-8389-4712-8 (PDF) 978-0-8389-4710-4 (ePub) 978-0-8389-4711-1 (Kindle) Library of Congress Control Number: 2019053975 Cover design by Alejandra Diaz. Text composition by Dianne M. Rooney in the Adobe Caslon Pro and Archer typefaces. This paper meets the requirements of ANSI/NISO Z39.48–1992 (Permanence of Paper). Printed in the United States of America 23 24 22 21 20 5 4 3 2 1 alastore.ala.org CONTENTS Acknowledgments vii Introduction ix One Enquire Within upon Everything 1 The Origins of Linked Data Two Unfunky and Obsolete 17 From MARC to RDF Three Mothership Connections 39 URIs and Serializations Four What Is a Thing? 61 Ontologies and Linked Data Five Once upon a Time Called Now 77 Real-World Examples of Linked Data Six Tear the Roof off the Sucker 105 Linked Library Data Seven Freaky and Habit-Forming 121 Linked Data Projects That Even Librarians Can Mess Around With EPILOGUE The Unprovable Pudding: Where Is Linked Data in Everyday Library Life? 139 Bibliography 143 Glossary 149 Figure Credits 153 About the Authors 155 Index 157 alastore.ala.orgv INTRODUCTION ince the mid-2000s, the greater GLAM (galleries, libraries, archives, and museums) community has proved itself to be a natural facilitator S of the idea of linked data—that is, a large collection of datasets on the Internet that is structured so that both humans and computers can understand it.
    [Show full text]
  • Glee Club 125Th Anniversary Alumni Music Download Procedure to Download the Music for the Alumni Concert, Follow These Steps
    Glee Club 125th Anniversary Alumni Music Download Procedure To download the music for the alumni concert, follow these steps: 1. Visit www.purdue.edu/pmo/gleeclub. 2. Scroll down on the page until you see the list of songs for Glee Club alumni. 3. When you click on the title of each song, the pdf should open up in a new tab in your internet browser. To download, click on the arrow button in the upper right hand corner of the screen. You should see a folder appear in the lower left hand corner. To download the part tapes for the alumni concert, follow these steps: 1. Visit www.purdue.edu/pmo/gleeclub. 2. Scroll down on the page until you see the Glee Club Alumni Anniversary Concert. Click on the phrase that says “clicking here.” 3. After clicking on the link, your internet browser will open up a new tab that redirects you to the PMO Google Drive folder containing all of the part tapes inside separate folders. 4. Double click on the folder for your voice part (Baritone, Bass, Tenor I, or Tenor II). You should be able to listen to the part tapes by clicking on them to identify which recording is right for you. 5. To download the part tape for your voice part, right click on the music note icon and scroll down to “Download.” Then, a folder should appear in the lower left hand corner of your screen. 6. To locate the files that you downloaded onto your computer, open up your “Documents” folder and click on “Downloads.” Everything should be located in this folder, but you may want to move them to a different folder on your computer for safe keeping.
    [Show full text]
  • Council of Europe Study Algorithms and Human Rights
    DGI(2017)12 STUDY ON THE HUMAN RIGHTS DIMENSIONS OF AUTOMATED DATA PROCESSING TECHNIQUES (IN PARTICULAR ALGORITHMS) AND POSSIBLE REGULATORY IMPLICATIONS PREPARED BY THE COMMITTEE OF EXPERTS ON INTERNET INTERMEDIARIES (MSI-NET) ALGORITHMS AND HUMAN RIGHTS Study on the human rights dimensions of automated data processing techniques and possible regulatory implications English edition The opinions expressed in this work are the responsibility of the authors and do not necessarily reflect the official policy of the Council of Europe. All rights reserved. No part of this publication may be translated, reproduced or transmitted in any form or by any means without the prior permission in writing from the Directorate of Communications (F-67075 Strasbourg Cedex or [email protected]). Cover page photo: Shutterstock Published by the Council of Europe F-67075 Strasbourg Cedex, www.coe.int © Council of Europe, March 2018 Council of Europe study Algorithms and Human Rights TABLE OF CONTENTS COMPOSITION OF THE MSI-NET ............................................................. 2 I. INTRODUCTION .............................................................................. 3 II. THE SCOPE OF THE STUDY .............................................................. 5 1. AUTOMATION ................................................................................................ 5 2. DATA ANALYSIS ............................................................................................ 6 3. ADAPTABILITY..............................................................................................
    [Show full text]
  • Local Judges Opposie Regional Court Idea
    Cloudy, Warm THEMLY Ctondy warm witt late show- era today. Cooler tonigit. Sun- } Red Bank, Freehold f FINAL ny, pleasant tomorrow and Long Branch / Thursday. EDITION Monmouth County's Home Newspaper for 92 Years VOL 93 NO. 239 RED BANK, N.J., TUESDAY, JUNE 8,1971 TENCEWflJ A Vietnam Veteran: He's Not Bitter ByMABYBETHAlLEN Braille. he estimates that maybe eight were still against the Ger- skin of his teeth" from Mid- (Second of a series) Through operations to re- will ever, further their educa- mans and. the Japanese, and "dletowrr Township High tion or return to normalcy. he remembers being insulted LEONABDO-"Ican'tfeei move shrapnel and cataracts, School in 1966 and was "a big partial vision has been re- The .gripes, he says, come when he would go out in the surfing fanatic." He swam at mainly from patients in Army street. "I knew it might happen. .stored. Loss of his bands, he Edgewater Beach Club, Sea hospitals because "half of Fd worked .with explosives. I accepts without bitterness. "It got to the point," he Bright, and worked as a bus- them were drafted and didn't knew the chances of getting And he considers himself says, "where all I did was boy for Bahr's Restaurant, want to go in the first place." shot or blown up. There's not more fortunate than some of fight every day. So I blocked Highlands, because the hours "I've tried to sit down and much I could say about I'm the men whom he has seen in the German language out of fit his surfing schedule.
    [Show full text]