{"id":51,"date":"2007-04-05T15:01:58","date_gmt":"2007-04-05T20:01:58","guid":{"rendered":"http:\/\/www.onvural.net\/melih\/wordpress\/?p=48"},"modified":"2007-04-05T15:01:58","modified_gmt":"2007-04-05T20:01:58","slug":"encroachment-in-information-mining-technologies-part-viii","status":"publish","type":"post","link":"https:\/\/www.onvural.net\/melih\/thoughts\/2007\/04\/05\/encroachment-in-information-mining-technologies-part-viii\/","title":{"rendered":"Encroachment in Information Mining Technologies &#8211; Part VIII"},"content":{"rendered":"<p>A myth of the Internet must also be broken down so that progress can be made. The Internet does not provide unbound freedom from one\u00e2\u20ac\u2122s physical self. One exists on the Internet similarly to the notion of existence in reality. There is an expectation to act responsibly. One cannot escape their duties in reality simply because they are virtual. Greater freedom is a farce of Internet propaganda. While it seems to be tougher, those who want to find and trace one\u00e2\u20ac\u2122s trail on the Internet will do so. Freedom must be explained and defined for the information on the Internet to be more properly used.<\/p>\n<p>The first paradigm shift that the Internet must go through is a movement away from an English-centric entity, into a global medium of communication, exchange, and growth. It is possible for the Internet to help us break down walls that have stood for generations. It is not possible for us to do this if we don\u00e2\u20ac\u2122t allow the Internet to permeate into parts of the world where basic survival is still an issue. The Internet can help bridge gaps, but this must be done in a culturally sensitive way. We will learn a lot about ourselves as human beings as we help the Internet grow, and watch to see if humanity can grow with it.<\/p>\n<p>This first paradigm shift is an example of how we\u00e2\u20ac\u2122ve developed a \u00e2\u20ac\u0153normal sociology\u00e2\u20ac\u009d analogous to Kuhn\u00e2\u20ac\u2122s \u00e2\u20ac\u0153normal science.\u00e2\u20ac\u009d The rich are supposed to get access to new technology. Once it has been refined to help the rich, then it can be mass-produced and everyone else can have access to it. This kind of sociology must be broken down if the Internet is going to help foster humanity. Part of the problem with how information is used is its de-humanizing affect. The rich will continue to maintain the status quo by stripping everyone else of their identity. This is an acceptable solution to those who have the ability to walk in and out of situations without the potential consequences harming them. As an example, someone who has the ability to spend responsibly can buy products on the Internet, and is willing to become a credit card number. Someone else who is given a chance to spend freely on the Internet but is unable to do so responsibly will find a new way to get into extreme credit card debt. Also because they are disassociated from judgment from a scornful face, they don\u00e2\u20ac\u2122t feel as if they have to answer to someone on the other end when they\u00e2\u20ac\u2122re spending over their affordable limit.<\/p>\n<p>The revolutionary science here is a set of products that are released for everyone immediately for the good of everyone. This doesn\u00e2\u20ac\u2122t seem to be asking too much, but if we look at how products are released and the groups that they are targeted towards, it\u00e2\u20ac\u2122s simple to see that this is in fact quite the revolutionary business strategy. How can this be done? It\u00e2\u20ac\u2122s a matter of empowering the lower classes as a buying block. There must be a willingness to redistribute income and opportunity. While this is a problem much larger than the Internet itself, the cost of business for Internet-based applications allows them to lead the way in enacting this change. The breaking down of class walls is an important goal for humanity in general, and this \u00e2\u20ac\u0153sociological revolution\u00e2\u20ac\u009d may come from a digital hammer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A myth of the Internet must also be broken down so that progress can be made. The Internet does not provide unbound freedom from one\u00e2\u20ac\u2122s physical self. One exists on the Internet similarly to the notion of existence in reality. There is an expectation to act responsibly. One cannot escape their duties in reality simply [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[11,1],"tags":[],"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pQyAq-P","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":48,"url":"https:\/\/www.onvural.net\/melih\/thoughts\/2007\/03\/17\/encroachment-in-information-mining-technologies-part-vi\/","url_meta":{"origin":51,"position":0},"title":"Encroachment in Information Mining Technologies - Part VI","date":"March 17, 2007","format":false,"excerpt":"But what if we just didn\u00e2\u20ac\u2122t know? Couldn\u00e2\u20ac\u2122t ignorance be bliss? The problem is that many are using the Internet without, \u00e2\u20ac\u0153the cognitive ability to appreciate the possible consequences of disclosure of personal information\u00e2\u20ac\u009d (Friedman and Thomas). Even something as simple as describing one\u00e2\u20ac\u2122s daily route to school for a\u2026","rel":"","context":"In &quot;Information Mining Essay&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":44,"url":"https:\/\/www.onvural.net\/melih\/thoughts\/2007\/02\/01\/encroachment-in-information-mining-technologies-part-ii\/","url_meta":{"origin":51,"position":1},"title":"Encroachment in Information Mining Technologies - Part II","date":"February 1, 2007","format":false,"excerpt":"Should collecting information about people without their knowledge be allowed? At the heart of this question, is whether or not our privacy is maintained if others are collecting information about us. This is the most serious implication here because the others are derivatives of this question. Ultimately, one should understand\u2026","rel":"","context":"In &quot;Information Mining Essay&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":45,"url":"https:\/\/www.onvural.net\/melih\/thoughts\/2007\/02\/02\/encroachment-in-information-mining-technologies-part-iii\/","url_meta":{"origin":51,"position":2},"title":"Encroachment in Information Mining Technologies - Part III","date":"February 2, 2007","format":false,"excerpt":"We must find a way to process the information that is constantly thrown at us. However, it is important to maintain the elements of our own information that don\u00e2\u20ac\u2122t need to be shared. Greater amounts of information for progress don\u00e2\u20ac\u2122t excuse those using the information from taking our identity or\u2026","rel":"","context":"In &quot;Information Mining Essay&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":43,"url":"https:\/\/www.onvural.net\/melih\/thoughts\/2007\/01\/21\/encroachment-in-information-mining-technologies-part-i\/","url_meta":{"origin":51,"position":3},"title":"Encroachment in Information Mining Technologies - Part I","date":"January 21, 2007","format":false,"excerpt":"Data mining has slowly, and silently, pervaded into the lives of everyday digital consumers. Using Gmail? Look at the advertisements on the right hand side of the screen and notice that they\u00e2\u20ac\u2122re related to the contents of your e-mail. Are you a social networker? You\u00e2\u20ac\u2122ve released information about yourself onto\u2026","rel":"","context":"In &quot;Information Mining Essay&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":47,"url":"https:\/\/www.onvural.net\/melih\/thoughts\/2007\/03\/09\/encroachment-in-information-mining-technologies-part-v\/","url_meta":{"origin":51,"position":4},"title":"Encroachment in Information Mining Technologies - Part V","date":"March 9, 2007","format":false,"excerpt":"This brings up the issue of protection and its relationship with privacy. In worldview 1, we let the church protect us. This evolved into a more state-sponsored role as worldviews progressed. In the next worldview, we might need to protect ourselves. Our identity\u00e2\u20ac\u2122s are now what\u00e2\u20ac\u2122s at stake, and something\u2026","rel":"","context":"In &quot;Information Mining Essay&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":49,"url":"https:\/\/www.onvural.net\/melih\/thoughts\/2007\/03\/18\/encroachment-in-information-mining-technologies-part-vii\/","url_meta":{"origin":51,"position":5},"title":"Encroachment in Information Mining Technologies - Part VII","date":"March 18, 2007","format":false,"excerpt":"If we give the Internet legitimacy, then the users of the Internet will be better able to protect themselves. This will also help create better citizens within the Internet. These citizens must understand that they are involved in the creation of a new paradigm. They are creating the digital persona.\u2026","rel":"","context":"In &quot;Information Mining Essay&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.onvural.net\/melih\/thoughts\/wp-json\/wp\/v2\/posts\/51"}],"collection":[{"href":"https:\/\/www.onvural.net\/melih\/thoughts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.onvural.net\/melih\/thoughts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.onvural.net\/melih\/thoughts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.onvural.net\/melih\/thoughts\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":0,"href":"https:\/\/www.onvural.net\/melih\/thoughts\/wp-json\/wp\/v2\/posts\/51\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.onvural.net\/melih\/thoughts\/wp-json\/wp\/v2\/media?parent=51"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.onvural.net\/melih\/thoughts\/wp-json\/wp\/v2\/categories?post=51"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.onvural.net\/melih\/thoughts\/wp-json\/wp\/v2\/tags?post=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}