Quitting Social Media inside book

Quitting Social Media OR How I Learned To Love Subverting Data Science

The goal of this booklet is to increase the dialog about our personal exposure on the Internet. It looks at some of the ways we trade information for services, expose our personalities without realizing. All this is in the interest of we might shape our online behaviour to a personally acceptable amount of privacy.

The Project

Quiting-Social-Media-holding-book-smallerThis booklet encapsulates some of my findings about personal exposure on the Internet, and how our digital presence is read and used. It shows how exposed we can be, where the data is coming from, and the ways it is interpreted for social and economic gain.

Since social sharing is a big part of our society, this booklet describes strategies to manage your presence. Many wish to disconnect completely be find that peer pressure is to strong within their social and/ or work groups. This project provides suggestions to create awareness about your digital footprint and how you might subvert that data to your own ends.

There are numerous articles about this topic, which I encourage people to seek out and read. For my ends I wanted to create a booklet that could be presented to others in person, as a catalyst to sparking conversations about what each party desires, and how a community can support one another.

cvdazzle-performancemakeup The publication was originally presented to a small group in December 2014. It was accompanied by a statement about the book and what I learned from investigating my own social media presence. It was also the start of a dialog with my peers about my personal rules about acceptable content and practices of my identity from my friends. This statement was published along with images from the book in the Woo Publication Winter 2015 on pages 56-57.

During the performance I used CV Dazzle style make-up and wore my hair to obfuscate my face. This was to put in practice the advice from the booklet for avoiding computer vision detection and identification.


Conclusion

Far to often we pay with our data without consciously acknowledging that fact, so by creating an artifact and sharing my personal data vulnerability, I felt this provocation was worthwhile. I was pleased with the conversations were sparked from the presentation and the booklet, that got people to audit their own digital existence and learn more about how their personal information is used. I hope to expand this work in the future, both as a service to people and in how I approach interaction design in the future.