{"id":4262,"date":"2021-11-30T06:00:00","date_gmt":"2021-11-30T11:00:00","guid":{"rendered":"https:\/\/alumni.cornell.edu\/cornellians\/?p=4262"},"modified":"2022-07-01T11:57:16","modified_gmt":"2022-07-01T15:57:16","slug":"tech-privacy","status":"publish","type":"post","link":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/","title":{"rendered":"Studying How Tech Can Be Used to Track Our Daily Lives"},"content":{"rendered":"\n<p class=\"has-text-align-left rkv-gutter-bottom-triple has-large-font-size\">Professor Karen Levy has explored digital privacy in such varied areas as trucking, nursing homes, and domestic abuse<\/p>\n\n\n\n<p>By <strong>Beth Saulnier<\/strong><\/p>\n\n\n\n<p class=\"has-drop-cap\">Amid the wall d\u00e9cor in Karen Levy\u2019s Gates Hall office\u2014across from an assortment of trucker memorabilia and a signed photo of late Supreme Court Justice Ruth Bader Ginsburg \u201954\u2014is a poster from the classic thriller <em>The Conversation<\/em>. A Best Picture nominee written and directed by Francis Ford Coppola, the 1974 film stars Gene Hackman as a surveillance expert tasked with bugging an \u201cunrecordable\u201d event: two people talking as they walk through a busy, noisy city square.<\/p>\n\n\n\n<p>It\u2019s apt artwork for Levy, an assistant professor of information science whose research explores the often fraught intersection of technology and privacy. Levy, who also has an appointment in the Law School, had already earned a JD from Indiana University and clerked for a federal judge when she decided to pursue a PhD in sociology from Princeton\u2014training that gives her a novel perspective as she explores a wide variety of topics, from the use of webcams in nursing homes to the ways in which retailers track customers to the role of technology in intimate partner abuse.<\/p>\n\n\n\n<p class=\"rkv-gutter-bottom-quarter\"><strong>Tracking on 18 wheels<\/strong><\/p>\n\n\n\n<p>But first, there were the truckers. While the current shortage of long-haul drivers\u2014and its role in pandemic-related supply chain issues\u2014has made headlines in recent months, Levy began studying the industry a decade ago. The subject of her doctoral thesis (and the reason why she has a trucker patch and belt buckle on her office wall) was how surveillance technology has impacted trucking.<\/p>\n\n\n\n<p>Starting in 2011, Levy spent several years interviewing drivers at truck stops in 11 states as part of her research on the use of electronic monitors in their vehicles, installed to ensure that they adhere to regulations limiting their driving time to prevent fatigue and accidents. \u201cPreviously, they\u2019d had a lot of autonomy in deciding how to get their work done\u2014when they were going to work, which rules they were going to follow,\u201d Levy says. \u201cThis was much, much more rigid.\u201d<\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-style-offset\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"819\" height=\"1024\" src=\"https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-819x1024.jpg\" alt=\"A photo of Prof. Karen Levy wearing a blue dress\" class=\"wp-image-4325 size-full\" srcset=\"https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-819x1024.jpg 819w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-240x300.jpg 240w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-768x960.jpg 768w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-1229x1536.jpg 1229w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-632x790.jpg 632w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-316x395.jpg 316w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-280x350.jpg 280w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-140x175.jpg 140w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-70x87.jpg 70w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-400x500.jpg 400w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-200x250.jpg 200w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A-100x125.jpg 100w, https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/11\/UP_2018_0536_007A.jpg 1260w\" sizes=\"auto, (max-width: 819px) 100vw, 819px\" \/><figcaption>Levy in Gates Hall; she also has an appointment in the Law School. <em>(Photo by Lindsay France \/ Cornell University)<\/em><\/figcaption><\/figure><div class=\"wp-block-media-text__content\">\n<p>She found that the tech was deeply unpopular with drivers\u2014learning, among other things, that some developed clever ways of sabotaging the equipment, and that their employers sometimes altered data to conceal violations.<\/p>\n\n\n\n<p>\u201cTruckers get paid by the mile, so if they\u2019re not on the road they\u2019re making zero money, even if they\u2019re doing other things that are required of them by their companies or by the law,\u201d Levy explains. \u201cSo of course they\u2019re incentivized to stay on the road as much as they possibly can, and to break the law if they have to. There\u2019s a lot of pressure on them to do that.\u201d<\/p>\n<\/div><\/div>\n\n\n\n<p>One overarching issue she examined was how the new technology clashes with trucking\u2019s traditionally independent culture; it\u2019s a profession that has long treasured the freedom and romance of life on the open road.<\/p>\n\n\n\n<p>\u201cMany truckers will tell you that the reason they get into the job is that it\u2019s a way to have control over their lives,\u201d says Levy, who recently completed a book called <em>Data Driven: Truckers and the New Workplace Surveillance<\/em>, to be published in 2022 by Princeton University Press. \u201cPart of why this technology was received so negatively is that it slams up against this idea of autonomy that has been really valued in the industry.\u201d<\/p>\n\n\n\n<p>And paradoxically, she says, the tech may initially have had a negative effect on safety by alienating more experienced truckers\u2014prompting the very people that society would want behind the wheel of a semi to flee the industry. \u201cOlder drivers don\u2019t want to be told, \u2018We don\u2019t trust you; we\u2019re going to watch you now,\u2019\u201d Levy says. \u201cAlmost every trucker told me that these monitors treated them either like criminals or like children.\u201d<\/p>\n\n\n\n<p class=\"rkv-gutter-bottom-quarter\"><strong>Passwords and \u2018first pets\u2019<\/strong><\/p>\n\n\n\n<p>In addition to her many scholarly articles, Levy has been published widely in the lay press, including the <em>Washington Post<\/em>, <em>Vox<\/em>, the <em>Atlantic<\/em>, and the <em>L.A. Times<\/em>. In a March 2018 essay in <em>Slate<\/em>, she addressed the role that tech can play in facilitating intimate partner abuse\u2014potentially allowing someone to surreptitiously track a partner\u2019s movements, intercept their communications, and otherwise control their lives.<\/p>\n\n\n\n<p>\u201cWhat we\u2019ve discovered in our research is that digital abuse of intimate partners is both more mundane and more complicated than we might think,\u201d she wrote. \u201cIt\u2019s mundane in that many forms of digital abuse require little to no sophistication and are carried out using everyday devices and services: social media platforms, find-my-friends apps, cell phone family plans. Abusers aren\u2019t hackers: though some do install surreptitious \u2018spouseware\u2019 to monitor their victims without consent, it\u2019s much more common to abuse victims digitally in ways that don\u2019t require any high-tech skill.\u201d<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>What we\u2019ve discovered in our research is that digital abuse of intimate partners is both more mundane and more complicated than we might think.<\/p><\/blockquote>\n\n\n\n<p>But as Levy notes, while tech companies tend to focus on preventing sophisticated cyberattacks, much of everyday cybersecurity hinges on factors like passwords, pre-answered questions (like the name of your first pet), and access to physical devices like a laptop or cell phone.<\/p>\n\n\n\n<p>\u201cPasswords are saved on your home computer where your abuser probably is, and the abuser is going to know the answers to your security questions,\u201d she says. \u201cMany of these things that we\u2019ve built up as checks fall flat when the abuser is in the home with you. Technologies are not designed with that in mind; they\u2019re designed with the hacker in mind.\u201d<\/p>\n\n\n\n<p class=\"rkv-gutter-bottom-quarter\"><strong>No easy answers<\/strong><\/p>\n\n\n\n<p>For Levy, the most compelling research questions involve modes of technical surveillance that aren\u2019t clearly good or bad; the same app that can help parents ensure their third-grader gets safely home from school, for example, could allow an abusive husband to track his wife to the concealed location of a domestic violence shelter.<\/p>\n\n\n\n<p>In the <em>American Journal of Bioethics: Empirical Bioethics<\/em>, Levy and colleagues pondered the ethical issues around the use of webcams in nursing homes\u2014often installed by relatives concerned that their loved ones aren\u2019t getting proper care. While that\u2019s a noble goal, she says, it raises concerns about privacy\u2014not only of workers and roommates but of residents who may have dementia and can\u2019t consent to being surveilled.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>We often use technical solutions as a way to put a Band-Aid on a bigger social and economic problem, rather than just dealing with the root of it; you see that over and over.<\/p><\/blockquote>\n\n\n\n<p>In the same vein, Levy\u2019s trucker study explored the complicated effects of a technology intended to save lives by keeping exhausted drivers off the road. \u201cWe often use technical solutions as a way to put a Band-Aid on a bigger social and economic problem, rather than just dealing with the root of it; you see that over and over,\u201d she observes. <\/p>\n\n\n\n<p>\u201cIf we paid drivers a fair wage, or paid them for all the time they\u2019re actually working and not just moving on the highway, they wouldn\u2019t be so tired. That feels to me a much more sensible place to change the policy.\u201d<\/p>\n\n\n\n<p>Similarly, nursing home cameras are a way for relatives to cope with the fact that facilities are often understaffed\u2014something that could be improved by higher salaries and tighter Medicaid regulations. \u201cBut we\u2019ve chosen not to do those things,\u201d she says, \u201cand we\u2019ve created a situation where families feel like they have no other choice.\u201d<\/p>\n\n\n\n<p class=\"rkv-gutter-bottom-quarter\"><strong>A &#8216;shocking&#8217; (and possibly apocryphal) example<\/strong><\/p>\n\n\n\n<p>Among researchers on tech and privacy, there\u2019s an anecdote so canonical that Levy laughingly notes it\u2019s \u201calmost a drinking game; someone will eventually bring it up.\u201d It traces its infamy to a February 2012 <em>New York Times Magazine<\/em> story by Charles Duhigg in which he described an effort by Target to market products to expectant mothers, whom it identified by mining data on their seemingly unrelated purchases, like calcium supplements and unscented lotion.<\/p>\n\n\n\n<p>Among those potential customers: a high schooler whose father was incensed by what he thought was an inappropriate mailing\u2014until he found out that she was, in fact, pregnant. \u201cIt was shocking,\u201d Levy says of the tale (which, she goes on to note, may in fact have been apocryphal). \u201cIt\u2019s so visceral. It has all these great ingredients that make it super sticky and memorable.\u201d<\/p>\n\n\n\n<p>The anecdote seemed all the more egregious, Levy says, because it came before the news of notorious breaches of privacy\u2014like Edward Snowden\u2019s disclosure of NSA surveillance (in 2013) and the Cambridge Analytica scandal (of 2018), when it was revealed that millions of Facebook users had their data mined without their consent. <\/p>\n\n\n\n<p>\u201cEvery few years, this issue pops up and we say, \u2018Oh my God, we have to do something about it,\u2019\u201d says Levy, \u201cand then we don\u2019t.\u201d<\/p>\n\n\n\n<p><em>Top image: Illustration by Cornell University<\/em><\/p>\n\n\n\n<p class=\"has-small-font-size\">Published November 30, 2021<\/p>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Professor Karen Levy has explored digital privacy in such varied areas as trucking, nursing homes, and domestic abuse<\/p>\n","protected":false},"author":68,"featured_media":4397,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"alumni_hub_syml_posts":[],"footnotes":""},"categories":[227],"tags":[],"cornell_year_post":[],"post_folder":[],"class_list":["post-4262","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-campus-beyond"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Studying How Tech Can Be Used to Track Our Daily Lives - Cornellians | Cornell University<\/title>\n<meta name=\"description\" content=\"Professor Karen Levy has studied digital privacy in such varied areas as trucking, nursing homes, and domestic abuse\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Studying How Tech Can Be Used to Track Our Daily Lives - Cornellians | Cornell University\" \/>\n<meta property=\"og:description\" content=\"Professor Karen Levy has studied digital privacy in such varied areas as trucking, nursing homes, and domestic abuse\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"Cornellians | Cornell University\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cornellians\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-30T11:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-01T15:57:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/12\/Levy-V22-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Beth Saulnier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@WeCornellians\" \/>\n<meta name=\"twitter:site\" content=\"@WeCornellians\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Beth Saulnier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/\"},\"author\":{\"name\":\"Beth Saulnier\",\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/#\\\/schema\\\/person\\\/32fea64e8c64bb984ed5809675634100\"},\"headline\":\"Studying How Tech Can Be Used to Track Our Daily Lives\",\"datePublished\":\"2021-11-30T11:00:00+00:00\",\"dateModified\":\"2022-07-01T15:57:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/\"},\"wordCount\":1505,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/12\\\/Levy-V22-scaled.jpg\",\"articleSection\":[\"Campus &amp; Beyond\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/\",\"url\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/\",\"name\":\"Studying How Tech Can Be Used to Track Our Daily Lives - Cornellians | Cornell University\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/12\\\/Levy-V22-scaled.jpg\",\"datePublished\":\"2021-11-30T11:00:00+00:00\",\"dateModified\":\"2022-07-01T15:57:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/#\\\/schema\\\/person\\\/32fea64e8c64bb984ed5809675634100\"},\"description\":\"Professor Karen Levy has studied digital privacy in such varied areas as trucking, nursing homes, and domestic abuse\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/12\\\/Levy-V22-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/12\\\/Levy-V22-scaled.jpg\",\"width\":2560,\"height\":1440,\"caption\":\"An illustration depicting two surveillance cameras observing people from various age groups\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/tech-privacy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Studying How Tech Can Be Used to Track Our Daily Lives\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/#website\",\"url\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/\",\"name\":\"Cornellians | Cornell University\",\"description\":\"Cornell&#039;s alumni publication\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/#\\\/schema\\\/person\\\/32fea64e8c64bb984ed5809675634100\",\"name\":\"Beth Saulnier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/321760a8edb5153d2c562bbadd61cc5ebb987bda75fb59074266c35cc35beae1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/321760a8edb5153d2c562bbadd61cc5ebb987bda75fb59074266c35cc35beae1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/321760a8edb5153d2c562bbadd61cc5ebb987bda75fb59074266c35cc35beae1?s=96&d=mm&r=g\",\"caption\":\"Beth Saulnier\"},\"url\":\"https:\\\/\\\/alumni.cornell.edu\\\/cornellians\\\/author\\\/ess8\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Studying How Tech Can Be Used to Track Our Daily Lives - Cornellians | Cornell University","description":"Professor Karen Levy has studied digital privacy in such varied areas as trucking, nursing homes, and domestic abuse","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/","og_locale":"en_US","og_type":"article","og_title":"Studying How Tech Can Be Used to Track Our Daily Lives - Cornellians | Cornell University","og_description":"Professor Karen Levy has studied digital privacy in such varied areas as trucking, nursing homes, and domestic abuse","og_url":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/","og_site_name":"Cornellians | Cornell University","article_publisher":"https:\/\/www.facebook.com\/Cornellians","article_published_time":"2021-11-30T11:00:00+00:00","article_modified_time":"2022-07-01T15:57:16+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/12\/Levy-V22-scaled.jpg","type":"image\/jpeg"}],"author":"Beth Saulnier","twitter_card":"summary_large_image","twitter_creator":"@WeCornellians","twitter_site":"@WeCornellians","twitter_misc":{"Written by":"Beth Saulnier","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/#article","isPartOf":{"@id":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/"},"author":{"name":"Beth Saulnier","@id":"https:\/\/alumni.cornell.edu\/cornellians\/#\/schema\/person\/32fea64e8c64bb984ed5809675634100"},"headline":"Studying How Tech Can Be Used to Track Our Daily Lives","datePublished":"2021-11-30T11:00:00+00:00","dateModified":"2022-07-01T15:57:16+00:00","mainEntityOfPage":{"@id":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/"},"wordCount":1505,"commentCount":1,"image":{"@id":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/12\/Levy-V22-scaled.jpg","articleSection":["Campus &amp; Beyond"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/","url":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/","name":"Studying How Tech Can Be Used to Track Our Daily Lives - Cornellians | Cornell University","isPartOf":{"@id":"https:\/\/alumni.cornell.edu\/cornellians\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/#primaryimage"},"image":{"@id":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/#primaryimage"},"thumbnailUrl":"https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/12\/Levy-V22-scaled.jpg","datePublished":"2021-11-30T11:00:00+00:00","dateModified":"2022-07-01T15:57:16+00:00","author":{"@id":"https:\/\/alumni.cornell.edu\/cornellians\/#\/schema\/person\/32fea64e8c64bb984ed5809675634100"},"description":"Professor Karen Levy has studied digital privacy in such varied areas as trucking, nursing homes, and domestic abuse","breadcrumb":{"@id":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/#primaryimage","url":"https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/12\/Levy-V22-scaled.jpg","contentUrl":"https:\/\/alumni.cornell.edu\/cornellians\/wp-content\/uploads\/sites\/2\/2021\/12\/Levy-V22-scaled.jpg","width":2560,"height":1440,"caption":"An illustration depicting two surveillance cameras observing people from various age groups"},{"@type":"BreadcrumbList","@id":"https:\/\/alumni.cornell.edu\/cornellians\/tech-privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alumni.cornell.edu\/cornellians\/"},{"@type":"ListItem","position":2,"name":"Studying How Tech Can Be Used to Track Our Daily Lives"}]},{"@type":"WebSite","@id":"https:\/\/alumni.cornell.edu\/cornellians\/#website","url":"https:\/\/alumni.cornell.edu\/cornellians\/","name":"Cornellians | Cornell University","description":"Cornell&#039;s alumni publication","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alumni.cornell.edu\/cornellians\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/alumni.cornell.edu\/cornellians\/#\/schema\/person\/32fea64e8c64bb984ed5809675634100","name":"Beth Saulnier","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/321760a8edb5153d2c562bbadd61cc5ebb987bda75fb59074266c35cc35beae1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/321760a8edb5153d2c562bbadd61cc5ebb987bda75fb59074266c35cc35beae1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/321760a8edb5153d2c562bbadd61cc5ebb987bda75fb59074266c35cc35beae1?s=96&d=mm&r=g","caption":"Beth Saulnier"},"url":"https:\/\/alumni.cornell.edu\/cornellians\/author\/ess8\/"}]}},"_links":{"self":[{"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/posts\/4262","targetHints":{"allow":["GET","POST","PUT","PATCH","DELETE"]}}],"collection":[{"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/comments?post=4262"}],"version-history":[{"count":3,"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/posts\/4262\/revisions"}],"predecessor-version":[{"id":7132,"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/posts\/4262\/revisions\/7132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/media\/4397"}],"wp:attachment":[{"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/media?parent=4262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/categories?post=4262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/tags?post=4262"},{"taxonomy":"cornell_year_post","embeddable":true,"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/cornell_year_post?post=4262"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/alumni.cornell.edu\/cornellians\/wp-json\/wp\/v2\/post_folder?post=4262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}