Activity Overview

This discussion allows students to learn about the constraints and affordances of virtual identity systems through the perspective of computer science terminology and discuss ethical issues around corporate data collection practices.

Key Terms and Concepts

  • VIRTUAL IDENTITIES include but are not limited to game avatars, social media profiles, online shopping accounts, general media representations, and are created and maintained for self-expression, surveillance by law enforcement, as well as corporate user data management.
  • AVATARS are media representations of a particular person which can be used in video games, internet forums, and other contexts.
  • DATA DOPPELGÄNGERS are profiles created by third-parties which use data collected from people’s browsing history, status updates, GPS locations, responses to marketing mail, credit card transactions, public records, and more to personalize their information experience.
  • Key Takeaways:

  • When we use social media, certain types of data are being collected, stored, and disseminated about us. It’s important to be specific and as knowledgable as possible about this. Because of their business models, these systems are designed to get as much useful information as possible from you.
  • “From the moment you check your news feed in the morning to when you purchase lunch with your credit card to Googling your next vacation locale in the evening, the conglomerate of your digital touch points are being harnessed by multiple companies, often without your permission, and then sold to third-party vendors, or data brokers, for the purposes of ad targeting.” —Tracy Wallace, “Your Digital Doppelgänger, Or Why Third-Party Data Undermines Personal Agency”
  • Driving Questions:

  • What is the purpose of companies collecting and maintaining data profiles on people?
  • Should people always have access to this type of information on themselves? Should people have to consent to have this data sold? Is it important for it to be accurate? Why?
  • Materials and Preparation:

    MATERIALS

    1. Computer
    2. Projector
      • Alternatively: Print handouts of Facebook advertising preferences page

    Activity Instructions

    1. Review discussion on various types of virtual identities (15 minutes)
      • What are the differences in structure and content between virtual identity as avatar, social media profile, and data profile? Who creates each of them?
      • What do you focus on in each of these virtual identies? What are the constraints and limitations of these systems? What aspects of your identity are you not able to represent?
    2. Facebook Virtual Identity Discussion (35 minutes)
      • Navigate to: https://www.facebook.com/ads/preferences/?entry_product=ad_settings_screen
      • Discuss as a group: What is contained in our Facebook ad profiles? Why do these profiles exist, and how do websites like Facebook make money? How is this information is collected? Is this our real self? Do you want it to be accurate or not?
      • When we talk about data on people, this is not typically seen by anyone.
      • Only recently are facebook and google showing their advertising categories, but this is not the complete profile that is stored on you. Anytime you visit a page with a facebook share button, it tells Facebook. Some companies also use “pixels”. Incognito browser mode keeps it out of your history but you’re still trackable by these websites.
      • ASK: What is the purpose of companies collecting and maintaining data profiles on people?
      • ASK: Should people always have access to this type of information on themselves? Should people have to consent to have this data sold? Is it important for it to be accurate? Why?