  {"id":2513,"date":"2022-01-17T08:11:57","date_gmt":"2022-01-17T08:11:57","guid":{"rendered":"https:\/\/jgu.edu.in\/blog\/?p=2513"},"modified":"2022-01-17T08:12:02","modified_gmt":"2022-01-17T08:12:02","slug":"cyber-surveillance-and-the-psychological-spiral","status":"publish","type":"post","link":"https:\/\/jgu.edu.in\/blog\/2022\/01\/17\/cyber-surveillance-and-the-psychological-spiral\/","title":{"rendered":"Cyber-surveillance and the Psychological Spiral"},"content":{"rendered":"\n<p><em><u>Last year, more than 50 thousand cyber-crime incidents were registered in India, with estimates suggesting over $ 20 billion losses suffered by consumers in the country due to cyber crimes<\/u><\/em><\/p>\n\n\n\n<p>Despite the promise of cutting-edge growth and possibility brought to the table by an ever expanding cyberspace, there is little room left for the users to feel safe about the information they share- and many a time- information they don\u2019t share.<\/p>\n\n\n\n<p>Before we dive into the world of cyber safety (or the lack thereof), it is essential to recognise that we don\u2019t quite feel safe about the information we <em>choose to share<\/em> outside the digital space either. Much of our vulnerability is at stake, and if we look at this conversation from a gendered lens, the stakes rise phenomenally. The dynamics of this phenomenon take on a much more amplified tone in the digital world, with the threat of data breaches forever looming in our internet-interactions.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Cyber Hygiene\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/TXFHnMFENEc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>A 2015 study revealed that nearly 20% of American women have been affected by cyber harassment. The internet mirrors its many physical counterparts in the sense that it is not the free space for human expression it claims to be, and it rather systemically contributes to this anomaly.&nbsp;<\/p>\n\n\n\n<p>In 2018, it was public news that the world\u2019s largest biometric database was up for sale, online. This was linked to none other than the information of Aadhaar-card holders, a mandatory identity card associated with a state-owned utility company. The type of information exposed was as sensitive as the holders\u2019 fingerprints, photographs, retina scans, and so on.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"560\" src=\"https:\/\/jgu.edu.in\/blog\/wp-content\/uploads\/2022\/01\/blog-2a.png\" alt=\"\" class=\"wp-image-2517\" srcset=\"https:\/\/jgu.edu.in\/blog\/wp-content\/uploads\/2022\/01\/blog-2a.png 666w, https:\/\/jgu.edu.in\/blog\/wp-content\/uploads\/2022\/01\/blog-2a-300x252.png 300w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><figcaption>Credits: ScoopWoop<\/figcaption><\/figure>\n\n\n\n<p>Since then, the news has been stacked with breach upon breach that exposes the failure of the very systems meant to protect our data.\u00a0Other than the crucial, fundamental questions we ought to be asking about how these systems profit from owning and sharing our data, it is equally imperative that we ask: What are the Psychological Implications of a Data Breach, or Even its Possibility?<\/p>\n\n\n\n<p><strong><em>\u201cThe psychological effects of cyberattacks may even rival those of traditional terrorism.\u201d<\/em><\/strong><\/p>\n\n\n\n<p>&#8211;<em>Dr. Maria Bada, Cybercrime Centre, Computer Laboratory, University of Cambridge, UK<\/em><\/p>\n\n\n\n<p>The thought of the leakage of information sensitive to us, by someone we know, at even a small neighbourhood dinner, seems like the stuff of nightmares. To think that this can happen on a much larger scale, by an untraceable criminal, and can travel back to us in more ways than one, is a thought that sends shivers down the spine of many internet users today.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"589\" height=\"372\" src=\"https:\/\/jgu.edu.in\/blog\/wp-content\/uploads\/2022\/01\/blog-2b.png\" alt=\"\" class=\"wp-image-2516\" srcset=\"https:\/\/jgu.edu.in\/blog\/wp-content\/uploads\/2022\/01\/blog-2b.png 589w, https:\/\/jgu.edu.in\/blog\/wp-content\/uploads\/2022\/01\/blog-2b-300x189.png 300w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><\/figure>\n\n\n\n<p><em>Credits: Statista<\/em><\/p>\n\n\n\n<p>Disrupted sleep, sudden loss or increase of appetite, an increased vulnerability to turn to substance-use are just some of the most commonly occurring effects of data theft.<br>\u201cWith every exposure you have to it, with every reminder, you get retraumatized,\u201d <a href=\"https:\/\/www.usatoday.com\/story\/tech\/conferences\/2020\/02\/21\/data-breach-tips-mental-health-toll-depression-anxiety\/4763823002\/\">says<\/a> Stanford University Psychiatry Professor, Elias Aboujaoude.<\/p>\n\n\n\n<p><em>\u201cYou only care about your right to privacy if you have something to hide.\u201d<\/em>This is an everyday conversation-closer as per self-proclaimed middle-aged experts. But unfortunately, it seems to have find some legal validation too. The new Draft IT Rules 2021 recommends going to the extent of dissolving end-to-end encryptions on our everyday texts for not just the sake of &#8216;national security&#8217;, but also to grant legal immunity to the platforms used for these exchanges (WhatsApp, Instagram, for instance).<\/p>\n\n\n\n<p>State-sanctioned surveillance, howsoever well intentioned, is not safe from the reach of hackers and cyber criminals.\u00a0The argument against surveillance, according to Ronald Deibert, Director of The Citizen Lab at the University of Toronto, is simple: it is a preventive measure that could penetrate deeper than it can manage, and is at the risk of invading the privacy and threatening the freedom of speech of its victims.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"697\" height=\"366\" src=\"https:\/\/jgu.edu.in\/blog\/wp-content\/uploads\/2022\/01\/blog-2c.png\" alt=\"\" class=\"wp-image-2515\" srcset=\"https:\/\/jgu.edu.in\/blog\/wp-content\/uploads\/2022\/01\/blog-2c.png 697w, https:\/\/jgu.edu.in\/blog\/wp-content\/uploads\/2022\/01\/blog-2c-300x158.png 300w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\" \/><\/figure>\n\n\n\n<p><em>Credits: 91 Mobiles<\/em><\/p>\n\n\n\n<p><strong>What Can We Do About it?<\/strong><\/p>\n\n\n\n<p>Our perception of a threat and that of our ability to tackle it (better known as self-efficacy) shapes how well we are prepared for it. A <a href=\"https:\/\/www.ieee-security.org\/TC\/SPW2012\/proceedings\/4740a086.pdf\">study<\/a> in 2012 specified that our perception of our own susceptibility to the threat and the cost and efficacy of the preventive and mitigative steps undertaken also contribute to how we react to a possible data breach or cyberattack.<\/p>\n\n\n\n<p>Now, a lack of control over a situation that is perceived as dangerous could lead us to feel distressed and could affect how we engage with the online space altogether. This is where our <strong>Locus of Control<\/strong> comes into the picture, noted <a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1559-1816.2002.tb00236.x\">Ajzen<\/a> in 2002. People who attribute most events in their lives to external forces such as fate, or authority figures, are less likely to practice safeguarding their data. A study by <a href=\"https:\/\/www.researchgate.net\/publication\/336149510_The_Social_and_Psychological_Impact_of_Cyber-Attacks\">Bada &amp; Nurse<\/a> in 2020 ponders whether the opposite holds true for people who hold themselves responsible for what happens to them.&nbsp;<\/p>\n\n\n\n<p>While this is an arena of research bound to expand and arrive at solutions more targeted towards mental health, there are some practical solutions to take control of our safety and keep those eerie and anxious thoughts at bay.<\/p>\n\n\n\n<p><strong>The Importance of a Pinch of Salt<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Our safety is linked to our privacy, the more we protect our private data, the safer we are bound to feel. Other than practicing suspicion towards our emails and DMs, here are a few practical steps we can take to protect our data, and check ourselves from overthinking while we\u2019re at it.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Secure Your Accounts: Something as simple as utilising the <strong>Two-Step Authentication<\/strong> feature on your social media and bank accounts enables you to use those platforms with a password and a one-time pin only you can access.<\/li><li>Secure Your Browsing: If you\u2019re someone who frequently connects to public Wi-fi networks, using a Virtual Private Network (VPN) is a great idea. It adds an additional layer of security to your browsing.&nbsp;<\/li><li>Safeguard Your Data in Case You Lose Your Phone: Enable the remote-tracking feature on your phone; it\u2019s a tech boon for people who have a knack for misplacing their phone at crowded malls.<\/li><\/ul>\n\n\n\n<p><br>While you keep the aforementioned in mind, allow yourself the space to engage with the internet on your own terms, practice critical thinking with each stimulus you encounter online, educate those around you, and in turn, help foster a rewarding narrative of hope.<\/p>\n\n\n\n<p><strong>Author:&nbsp;<\/strong>Samreen Chhabra, Research Fellow at&nbsp;<strong>Jindal Institute of Behavioural Sciences, 91Ì½»¨<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last year, more than 50 thousand cyber-crime incidents were registered in India, with estimates suggesting over $ 20 billion losses suffered by consumers in the country due to cyber crimes Despite the promise of cutting-edge growth and possibility brought to the table by an ever expanding cyberspace, there is little <a href=\"https:\/\/jgu.edu.in\/blog\/2022\/01\/17\/cyber-surveillance-and-the-psychological-spiral\/\" class=\"btn btn-link continue-link\">Continue Reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":2514,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84,10,43,60],"tags":[],"class_list":["post-2513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-psychology","category-perspectives","category-study","category-research"],"_links":{"self":[{"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/posts\/2513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/comments?post=2513"}],"version-history":[{"count":1,"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/posts\/2513\/revisions"}],"predecessor-version":[{"id":2518,"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/posts\/2513\/revisions\/2518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/media\/2514"}],"wp:attachment":[{"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/media?parent=2513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/categories?post=2513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jgu.edu.in\/blog\/wp-json\/wp\/v2\/tags?post=2513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}