Ebeling, Mary F. E. (Author)
What our health data tell American capitalism about our value—and how that controls our lives. Afterlives of Data follows the curious and multiple lives that our data live once they escape our control. Mary F. E. Ebeling's ethnographic investigation shows how information about our health and the debt that we carry becomes biopolitical assets owned by healthcare providers, insurers, commercial data brokers, credit reporting companies, and platforms. By delving into the oceans of data built from everyday medical and debt traumas, Ebeling reveals how data about our lives come to affect our bodies and our life chances and to wholly define us. Investigations into secretive data collection and breaches of privacy by the likes of Cambridge Analytica have piqued concerns among many Americans about exactly what is being done with their data. From credit bureaus and consumer data brokers like Equifax and Experian to the secretive military contractor Palantir, this massive industry has little regulatory oversight for health data and works to actively obscure how it profits from our data. In this book, Ebeling traces the health data—medical information extracted from patients' bodies—that are digitized and repackaged into new data commodities that have afterlives in database lakes and oceans, algorithms, and statistical models used to score patients on their creditworthiness and riskiness. Critical and disturbing, Afterlives of Data examines how Americans' data about their health and their debt are used in the service of marketing and capitalist surveillance.
...More
Book
Josh Lauer;
Kenneth Lipartito;
(2021)
Surveillance Capitalism in America
(/isis/citation/CBB401959068/)
Article
Aynne Kokas;
(2018)
Platform Patrol: China, the United States, and the Global Battle for Data Security
(/isis/citation/CBB992297943/)
Thesis
Kim, Richard S.Y.;
(2010)
Cyber-Surveillance: A Case Study in Policy and Development
(/isis/citation/CBB001567169/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/isis/citation/CBB758382142/)
Article
Carsten Ochs;
Barbara Büttner;
Jörn Lamla;
(May 2021)
Trading Social Visibility for Economic Amenability: Data-based Value Translation on a “Health and Fitness Platform”
(/isis/citation/CBB474517087/)
Article
Darren Ellis;
(2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia
(/isis/citation/CBB734944273/)
Article
Ben Falchuk;
Shoshana Loeb;
Ralph Neff;
(June 2018)
The Social Metaverse: Battle for Privacy
(/isis/citation/CBB447859564/)
Review
Russell, Andrew;
(2016)
Review of unknown publication
(/isis/citation/CBB100069195/)
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/isis/citation/CBB775086796/)
Article
Rebecca J. Hester;
(2020)
Bioveillance: A Techno-security Infrastructure to Preempt the Dangers of Informationalised Biology
(/isis/citation/CBB548068287/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Article
Kjetil Rommetveit;
Niels van Dijk;
(2022)
Privacy engineering and the techno-regulatory imaginary
(/isis/citation/CBB677677741/)
Article
Jennifer J. Connor;
(2021)
Labrador Emergencies and St. Anthony Institutional Care: Medical Cases of Donald McI. Johnson for the Grenfell Association, 1928–29
(/isis/citation/CBB738934711/)
Book
Colin Koopman;
(2019)
How We Became Our Data: A Genealogy of the Informational Person
(/isis/citation/CBB981384434/)
Article
Lawrence, Susan C.;
(2007)
Access Anxiety: HIPAA and Historical Research
(/isis/citation/CBB000774467/)
Article
Thomas Jepsen;
(2014)
Reversing the whispering galley of Dionysius: A short history of electronic surveillance in the U.S.
(/isis/citation/CBB443893857/)
Book
Francesca Musiani;
Derrick L. Cogburn;
Laura DeNardis;
Nannette S. Levinson;
(2016)
The Turn to Infrastructure in Internet Governance
(/isis/citation/CBB771724730/)
Article
Alexander Trauth-Goik;
(December 2019)
"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System
(/isis/citation/CBB323886145/)
Article
Evan Selinger;
Darrin Durant;
(2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service
(/isis/citation/CBB181826170/)
Article
Sarah Myers West;
(June 2022)
Cryptography as information control
(/isis/citation/CBB869396949/)
Be the first to comment!