Some people say that the Internet is an era of streaking information, and everyone’s privacy is gradually being exposed.
According to the Ministry of Industry and Information Technology on May 15th, in the recent inspection of mobile phone applications organized by third-party testing agencies, 16 apps have not completed the rectification of existing problems.Among them, the apps with high downloads, such as daily newspapers and Dangdang, are listed.Internet companies frequently violate personal data, and privacy issues have become one of the most blamed issues for Internet companies.
Have to admit.With the rapid development of the Internet, our personal privacy space is gradually being squeezed, and the issue of whether personal privacy will eventually disappear is also increasingly concerned.
Why do companies enjoy the excavation of privacy?
This is not the first time that privacy issues have been exposed.
In 2018, the New York Times exposed a data analysis company called “Cambridge Analysis” and its affiliated company “Strategic Communications Laboratory”.The two companies claimed to have stolen and privately retained 50 million Facebook user data and used the information to manipulate the results of the presidential election.As soon as the heavy news came out, Facebook, the controversial social giant, once again caused panic and resentment among the people and fell into the whirlpool of public opinion.
In April 2020, two primary school students of HK and JC sued Google for illegally collecting their voice, facial information and other personally identifiable information.In addition, Google illegally collects and stores the child ’s physical location, websites visited, each search term used in Google ’s search engine, and videos viewed on YouTube without the knowledge or consent of its parents., Personal contact list and other information.At present, the San Jose District Court of Northern California has accepted the lawsuit.
Whether it is a traditional “bank-robbing” hijacking information database; or a “supervision and self-piracy” of a technology company’s own user information.Private data seems to be like the meat of Tang monks, making companies yearning for it.
Behind the mining of private information, what is the motivation of the company?
Data analysis helps companies accurately locate customers
In the era of mobile Internet, “ID”, as a virtual code name for every surfer traveling in the sea of the Internet, has an identity characteristic that is highly fitted to itself in reality.
“Through the duality of imagination and real mind-body, what kind of self do people project on the big screen of life composed of symbols?” Jiang Qiping, Secretary General of the Information Technology Research Center of the Chinese Academy of Social Sciences in “Feminist Features of the Internet”In this article, we show the decentralization of Internet identity and symbolic expression as feminist features.
In other words, Jiang Qiping believes that at one end of the network, Internet users, through the decentralized expression of egoism, gradually formed an identity that highly overlaps with the most real self in reality in the virtual space of the network.
It is this identity that enables companies that acquire it to accurately locate customers, sort out customer groups, and customize differentiated services and product pushes based on this.
Why do some people only have a quota of 2,000 on flowers, while others can reach 200,000?Why do some people see the prices on the platform more expensive than others for the same hotel?Why open Ctrip, the same May Day holiday, why do different people receive such a high price difference for recommended routes?
This kind of behavior that may have been regarded as discriminatory in the past was to “look at people for dishes”, but now it has transformed into a “thousands of people” experience battlefield where Internet companies are competing with each other.The realization of all this is based on the mining of users’ daily private information.
Provide better services and increase user stickiness
“The lazy man has promoted the progress of science and technology” is a god’s prophecy.With the development of the Internet, people have entered the lifestyle of “clothing to reach out” (online shopping) and “food to open mouth” (takeaway).Even studying, you can stay home and learn from ancient and modern times.
When the basic food, clothing, housing and transportation problems are solved by the Internet at the speed of light, people further think that there is a person around them who really understands their needs, can assist or even replace their own thinking, and increase the sense of life experience and happinesssense.
The Internet’s keen sense of demand has allowed companies to quickly grasp the pain points of users.
In August 2012, Toutiao released its first version.At that time, no one thought that a humble information app would become a decisive presence on the Internet in the future.
And the slogan “What you pay attention to is the headline” also resonates with everyone’s spiritual world.Under the unique algorithm after the headline background information is obtained, an app that seems to be customized specifically for “you” is finally
Completed by yourself.
And the headline comment area commented on the headline “The brush text is cool for a while, and the brush text has always been cool” also completely announced the formation of the headline high viscosity group.
Since then, all companies began to focus on “algorithm” overnight.The user’s Internet trajectory is tracked layer by layer, and integrated analysis.You just finished watching “Zhen Huan Zhuan” on Youku, and then jumped to UC, post it, know, when the headlines, there will be information related to Zhen Huan Chuan pushed to the homepage.
The highly intelligent information recognition and retrieval push makes users hooked, and behind every precise delivery, the software grabs the user’s personal information.
“I just finished reading fairy tales to my son, and Dangdang pushed me” Little Prince “.” A young mother shared her experience with us.
And as long as you ask the colleagues or relatives around you, there should be a lot of people with similar experiences.
“I seem to be monitored by my mobile phone, it seems to know what is in my heart.” Became a deep resonance of many people.
It is true that the software reduces the user’s operation steps in this way and becomes more “sensible”, which greatly increases the user stickiness of software users.
There are indeed many users now enjoying more and more personalized service platforms.But they never seem to think about the privacy price paid behind it.
What they think of as “personalization” is probably the “sweet dungeon” of the Internet scene.More and more similar and narrow-minded information layers wrap your ID, and the folding effect of the Internet has been maximized.
At the same time it became the “residual pupa” in the information cocoon room that could no longer go out, it also became a person who was easily “see through” by the Internet.
Being seen through the Internet may not be a good thing.
Enticed by privacy interests, how can technology be good?
On the issue of privacy and security, the United States is the first to sound the alarm for us.As a major information country, the United States has repeatedly suffered missteps in privacy and security and has become a national pain.
In 2017, the famous American law professor Michelle Gilman warned the US government to call for privacy legislation “Personal data is used to deny low-income people access to resources and opportunities, but it is used to predatory marketing against the poor in order to obtainPayday loans are even scams. ”
Gilman’s concerns are not groundless.American society’s information monitoring and privacy access to the bottom people is becoming an important factor hindering the fairness of American society.
In the United States, most of the bottom-level people are blocked by the “information screening” barrier in finding jobs, mortgages, and childcare tax credits.Most of the people at the bottom have not been able to obtain equality in resources throughout their lives.
All this comes from the second definition of private information for American citizens, which distinguishes people from three to six.Among them, the bottom-level citizens who are least liked by capital are the first to be defined and targeted.
The people at the bottom of the United States enter their personal information through various apps and networks, share them locally through online and offline methods, and be “labeled” on the information side.In terms of access to social resources, it has become a “useless person” defined by the Internet, and resources have never been inclined to them.
After the second definition of personal information on the data port by the Internet, almost no one will consider a person’s subjective initiative in reality.Only at the information port, all “people” are digitized and matched.Personal dignity is broken at this stage, replaced by cold data.
This has led to the fact that in some scenarios, the identity of data has overstepped human dignity. Those who once called for technology to change the world are now using the sword of technology to break through the personality.
In 2017, Ma Huateng said in an interview at the Global Fortune Forum: “Every day, more than one billion pictures are uploaded to Tencent. Holidays will even reach as much as 3 billion. Tencent has almost every Chinese person in the past ten years.Data on changes in human faces, because they always have photos in Tencent, so they can analyze these data to predict what they look like when they are old. ”
At that time, we were proud of Tencent’s strength, but today, we have to worry about the return of billions of photos every day in the future.As a company advocating “technology is good”, how will Tencent handle such huge private data?Will Tencent implement their slogan and let technology be born?
And this is not only Tencent’s problem, but also the dilemma of the entire Internet technology.
The battlefield of private information is just beginning
The development of the times is ultimately the iteration of information.In the information age, whether it is the objective existence of the network information library or the cloud platform of the big data blockchain, it has become a trace that is difficult for individuals to remove on the Internet.
As a port of use, the software will inevitably record everyone’s traces of use.Unless you will never use any products in the information age, “privacy collection” will never pass.
Under the trend of the intelligent trend, software algorithms need to collect data and provide users with a profile of the data port to provide more convenient services.
Baidu Li Yanhong once said, “Chinese people are more open to privacy and relatively less sensitive. If they can use privacy for convenience, safety or efficiency. In many cases, they are willing to do so. Of course we alsoThere are some principles to follow. If this data benefits users and they are willing to use it for us, we will use it. I think this is the basic standard for what we can and cannot do. ”
The remarks immediately triggered a huge controversy about Baidu, but behind the controversy, Li Yanhong’s remarks are also a true portrayal of the current Internet technology companies’ attitudes towards user information.
In fact, for the issue of privacy and security, the most critical issue now seems to be not whether the collection of privacy should be allowed, but how to be reasonable and controllable in all aspects of privacy information processing.
Among them, “the right to decide the right to open privacy”, “the scope and authority of the use of private information”, “the suspension of privacy authorization”, “traceable privacy loss”, etc. should all become issues for enterprises to consider.
When privacy is still lacking clear rules, the self-discipline of an enterprise has become an important guarantee for protecting privacy.
As an important part of the customer’s virtual identity, private information requires user authorization.In the future, personal privacy will be more and more valued by people.As for private information itself, it may one day become a new way for enterprises to gain user trust and compete with it.
In the future, technological competition may eventually migrate to the battlefield of user privacy information warfare.Companies that know how to respect and properly use customer information will have a long-tail advantage in the future.This requires that today’s knowers and celebrities need to reexamine themselves.
Koi Finance, in-depth fun and good luck, public number: jinlifin.This article is an original article, and I will not reprint it in any form without retaining the author’s information.