Jari Kauppila

Three articles

“I've got nothing to hide” and other misunderstandings of privacy http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565

An article from the same guy that wrote one of the books we have to read. In this article Solove explains why “having nothing to hide” is not a good argument against privacy and how the lack of privacy can affect our daily lives.

TED Talk - Why Privacy Matters https://www.ted.com/talks/glenn_greenwald_why_privacy_matters?language=en

A TED talk on privacy. People say that they have nothing to hide, but then nobody wanted to let the talker see their entire email account. The most convincing pro-privacy example is said at the very beginning of this, where he mentions Youtube videos of people doing silly things and then stop when they realize they are being filmed.

Search engine lets users find live video of sleeping babies http://www.theguardian.com/technology/2016/jan/25/search-engine-lets-users-find-live-video-of-sleeping-babies

Finally, an example of a privacy invasion caused by a device that is unnecessarily connected to the Internet. Controls for many non-computer devices are hidden behind a simple “admin / admin” username and password combo, which causes issues. And the most important question: why is a baby monitor connected to the Internet?

Presentation 17.3.

Presentation 14.4.

Presentation 21.4.

Services and personal information 1

Chosen service: Spotify

What is collected: Email, gender, date of birth during registration, user's location is automatically collected. If user connects a Facebook account, they get more information: real name, FB profile picture, hometown, FB friends list and their profile pictures. Connecting Facebook is optional (was mandatory in 2011-2012)

During usage of the service they collect music listening data and the location the user is in via IP. On a mobile device they will gather the device's motion data and may request access to user's photos, contacts or location.

What the information is used for: Gender and date of birth are used for targeting ads in the free version. User's location is needed because of music licensing deals that are country-specific.

Music listening data is used by the recommendation system so that it can give more music to listen to. The service also generates a weekly playlist of music based on the user's tastes and what other users with similar tastes have placed on their playlists that includes a previously listened song.

Photos are not yet used for anything, but the CEO stated during a controversy that there will be a feature to change user's profile picture or give pictures to playlists. Contacts are used with permission of the user in order to find friends who use the service.

Services and personal information 2

Chosen service: S-etukortti (S store membership card)

What is collected: Name, full address, email, phone number, bank account number.

What the information is used for: All purchases made while using the card are recorded. According to the company they use this information to manage inventories easier as they see what lots of different people buy. The information is also used to target advertisements. The amount of money spent in stores is recorded in order to pay the correct bonus sum to the bank account given.

Web Course

My task choice is the web course META101x: Philosophical and Critical Thinking


1. What does the Fourth Amendment protect from?

The purpose of this question is to find the limitations of the Fourth Amendment - it does not apply to companies that you have given information to and it does not protect information you have voluntarily given to someone else.

2. Explain the four different types of pressures against becoming a defector

Societal, moral, institutional and reputational pressures keep us from defecting. Each of them should be explained here.

3. What is the Exclusionary rule and what problems with it did Solove mention?

The exclusionary rule is the main way of enforcing the Fourth Amendment so it is important to know.

4. How does modern technology change who and what we can trust?

There is an entire chapter on this in the Liars and Outliers book, but this question also allows people to come up with their own ideas on how technology affects societal pressures.