Appscapes in everyday life
Studying Mobile Datafication from an Infrastructural User Perspective
DOI:
https://doi.org/10.7146/mediekultur.v36i69.121018Keywords:
infrastructure, apps, datafication, digital resignation, data economy, surveillanceAbstract
It has long been acknowledged that the use of ‘free’ mobile apps comes at a price, but few empirical studies have looked into this supposed trade-off. This article combines qualitative interviews with mappings of infrastructures for datafication in order to study the implications of mobile app usage from the perspective of individual users. It analyses users’ understanding of online tracking, maps the infrastructural tenets of mobile datafication, and finds a disconnect between what users believe happens to their data and the actua data harvesting and distribution mechanisms of their apps. We thereby argue that users’ resigned attitudes should be understood in light of the material conditions of the app economy and, as such, that user and infrastructure studies should join forces in exploring and enhancing users’ agency, empowerment and emancipation.
References
Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security Privacy, 3(1), 26–33. https://doi.org/10.1109/MSP.2005.22
Atkinson, M., Olmstead, K., Smith, A., Hege, J., Heimlich, R., Amihere, D., Rubenstein, S., Greenwood, S., Rainee, L., Duggan, M., Porteus, M., & Paga, D. (2015, November 10). Apps permissions in the Google Play Store. Pew Research Center: Internet, Science & Tech. https://www.pewresearch.org/internet/2015/11/10/apps-permissions-in-the-google-play-store/, https://doi.org/10.2196/20009
Barth, S., & de Jong, M.D.T. (2017). The privacy paradox: Investigating discrepancies between expressed privacy concerns and actual online behavior: A systematic literature review. Telematics and Informatics, 34(7), 1038–1058. https://doi.org/10.1016/j.tele.2017.04.013
Binns, R., Lyngs, U., Van Kleek, M., Zhao, J., Libert, T., & Shadbolt, N. (2018). Third party tracking in the mobile ecosystem. Proceedings of the 10th ACM Conference on Web Science - WebSci ’18, 23–31. https://doi.org/10.1145/3201064.3201089
boyd, d., & Crawford, K. (2011, September 21). Six provocations for big data. https://papers.ssrn. com/abstract=1926431
Brinkmann, S., & Kvale, S. (2009). Interviews, learning the craft of qualitative research interviewing (2nd edition). California: SAGE Publications.
Bucher, T. (2017). The algorithmic imaginary: Exploring the ordinary affects of Facebook algorithms. Information, Communication & Society, 20(1), 30–44. https://doi.org/10.1080/1369118X.2016.1154086
Cimpanu, C. (2019, September 11). Most Android flashlight apps request an absurd number of permissions. ZDNet. https://www.zdnet.com/article/most-android-flashlight-apps-request-an-absurd-numberof-permissions/
Couldry, N., & Yu, J. (2018). Deconstructing datafication’s brave new world. New Media & Society, 20(12), 4473–4491. https://doi.org/10.1177/1461444818775968
Dalton, C.M., & Thatcher, J. (2014, May). What does a critical data study look like, and why do we care? Society+Space, 3(1), 1–9. https://www.societyandspace.org/articles/what-does-a-critical-data-studieslook-like-and-why-do-we-care, https://doi.org/10.1017/cbo9780511997389.005
Dencik, L., Hintz, A., Redden, J., & Treré, E. (2019). Exploring data justice: Conceptions, applications and directions. Information, Communication & Society, 22(7), 873–881. https://doi.org/10.1080/1369118X.2019.1606268
Draper, N.A., & Turow, J. (2019). The corporate cultivation of digital resignation. New Media & Society, 21(8), 1824–1839. https://doi.org/10.1177/1461444819833331
Dubois, E., & Ford, H. (2015). Trace interviews: An actor-centered approach. International Journal of Communication, 9(0), 25. http://ijoc.org/index.php/ijoc/article/view/3378
Ellison, G., & Ellison, S.F. (2009). Search, obfuscation, and price elasticities on the internet. Econometrica, 77(2), 427–452. https://doi.org/10.3982/ECTA5708
Exodus. (n.d.). Exodus privacy. Retrieved from https://reports.exodus-privacy.eu.org/en/
Falahrastegar, M., Haddadi, H., Uhlig, S., & Mortier, R. (2014). The rise of panopticons: Examining regionspecific third-party web tracking. In A. Dainotti, A. Mahanti, & S. Uhlig (Eds.), 6th International Workshop, TMA 2014 (pp. 104–114). Springer. https://doi.org/10.1007/978-3-642-54999-1_9
Galloway, A.R. (2004). Protocol: How control exists after decentralization. MIT Press.
Iliadis, A., & Russo, F. (2016). Critical data studies: An introduction. Big Data & Society, 3(2), 1-7. https://doi.org/10.1177/2053951716674238
Jensen, K.B. (2013). Definitive and sensitizing conceptualizations of mediatization. Communication Theory, 23(3), 203–222. https://doi.org/10.1111/comt.12014
Joinson, A. N., Reips, U.-D., Buchanan, T., & Schofield, C.B.P. (2010). Privacy, trust, and self-disclosure online. Human–Computer Interaction, 25(1), 1–24. https://doi.org/10.1080/ 07370020903586662
Joler, V., & Petrovski, A. (2016, August 21). Immaterial labour and data harvesting. Share Lab. https://labs.rs/en/facebook-algorithmic-factory-immaterial-labour-and-data-harvesting/
Kalavri, V., Blackburn, J., Varvello, M., & Papagiannaki, K. (2016). Like a pack of wolves: Community structure of web trackers. In T. Karagiannis, & X. Dimitropoulos (Eds.), Passive and active measurement. Lecture notes in computer science, vol. 9631 (pp. 42–54). Springer. https://doi.org/10.1007/978-3-319-30505-9_4
Kennedy, H., & Hill, R.L. (2017). The feeling of numbers: Emotions in everyday engagements with data and their visualisation. Sociology. https://doi.org/10. 1177/0038038516674675
King, N., & Horrocks, C. (2010). Interviews in qualitative research. London: SAGE.
Kitchin, R. (2013). Big data and human geography: Opportunities, challenges and risks. Dialogues in Human Geography 3(3), 262-267. http://journals.sagepub.com/doi/10.1177/2043820613513388
Kitchin, R., & Lauriault, T.P. (2018). Toward critical data studies: Charting and unpacking data assemblages and their work. In J. Thatcher, J. Eckert, & A. Shears (Eds.), Thinking big data in geography (1st ed., pp. 3–20). Lincoln, Nebraska: University of Nebraska Press. https://doi.org/10.2307/j.ctt21h4z6m.6
Lai, S.S., & Flensburg, S. (2020). A proxy for privacy uncovering the surveillance ecology of mobile apps. Big Data & Society. http://journals.sagepub.com/doi/10.1177/2053951720942543
Lai, S.S., Pagh, J., & Zeng, F.H. (2019). Tracing communicative patterns. Nordicom Review, 40(s1). https://doi.org/10.2478/nor-2019-0019
Light, B., Burgess, J., & Duguay, S. (2018). The walkthrough method: An approach to the study of apps. New Media & Society, 20(3), 881–900. https://doi.org/10.1177/1461444816675438
Marcus, G.E. (1995). Ethnography in/of the world system: The emergence of multi-sited ethnography. Annual Review of Anthropology, 24(1), 95–117. http://www.annualreviews.org/doi/abs/10.1146/annurev.an.24.100195.000523
Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we live, work, and think. Boston, MA: Houghton Mifflin Harcourt. https://doi.org/10.3359/oz1314047
Musiani, F., Cogburn, D., Denardis, L., & Levinson, N. (Eds.). (2016). Turn to infrastructure in internet governance. Springer Nature. http://link.springer.com/openurl?genre=book&isbn=978-1-349-57846-7, https://doi.org/10.1057/9781137483591
Nieborg, D.B., & Helmond, A. (2018). The political economy of Facebook’s platformization in the mobile ecosystem: Facebook Messenger as a platform instance. Media, Culture & Society, 41(2), 196–218. https://doi.org/10.1177/0163443718818384
Norberg, P.A., Horne, D.R., & Horne, D.A. (2007). The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41(1), 100–126. https://doi.org/10.1111/j.1745-6606.2006.00070.x
Oomen, I., & Leenes, R. (2008). Privacy risk perceptions and privacy protection strategies. In E. de Leeuw, S. Fischer-Hübner, J. Tseng, & J. Borking (Eds.), Policies and research in identity management (pp. 121–138). Springer US. https://doi.org/10.1007/978-0-387-77996-6_10
Patton, M.Q. (2015). Qualitative research & evaluation methods: Integrating theory and practice (4th edition). Thousand Oaks, California: SAGE Publications, Inc.
Pötzsch, S. (2009). Privacy awareness: A means to solve the privacy paradox? In V. Matyáš, S. Fischer-Hübner, D. Cvrček, & P. Švenda (Eds.), The future of identity in the information society (pp. 226–236). Springer. https://doi.org/10.1007/978-3-642-03315-5_17
Sandvig, C. (2013). The internet as infrastructure. In W. H. Dutton (Ed.), The Oxford handbook of internet studies. Oxford: Oxford University Press. https://doi.org/10.1093/oxfordhb/9780199589074.013.0005
Vallina-Rodriguez, N., Sundaresan, S., Razaghpanah, A., Nithyanand, R., Allman, M., Kreibich, C., & Gill, P. (2016). Tracking the trackers: Towards understanding the mobile advertising and tracking ecosystem. ArXiv:1609.07190 [Cs]. http://arxiv.org/abs/1609.07190, https://doi.org/10.14722/ndss.2018.23353
Weltevrede, E., & Jansen, F. (2019). Infrastructures of intimate data: Mapping the inbound and outbound data flows of dating apps. Computational Culture, 7. http://computationalculture.net/infrastructuresof-intimate-data-mapping-the-inbound-and-outbound-data-flows-of-dating-apps/
Winseck, D. (2019). Internet infrastructure and the persistent myth of U.S. hegemony. In B. Haggart, K. Henne, & N. Tusikov (Eds.), Information, technology and control in a changing world (pp. 93–120). Springer International Publishing. https://doi.org/10.1007/978-3-030-14540-8_5
Yin, R. K. (2009). Case study research: Design and methods. Thousand Oaks, California: SAGE Publications, Inc.
Young, A.L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook. Information, Communication & Society, 16(4), 479–500. https://doi.org/10.1080/1369118X.2013.777757
Zuboff, S. (2019). The age of surveillance capitalism. The fight for a human future at the new frontier of power (1st edition). New York: PublicAffairs. https://doi.org/10.4000/qds.3723
Downloads
Published
How to Cite
Issue
Section
License
Copyright Author and Journal.
Articles published after January 1 2024 are licensed under CCBY 4.0.
Articles published until December 31 2023 are licensed under CCBYNCND.
Articles submitted to MedieKultur should not be submitted to or published in other journals.