Workflow
Dijital Çağda Ne Kadar Özgürüz? | Erman Müftüoğlu | TEDxAnkara Atatürk Lisesi
TEDx Talks·2025-07-24 14:55

Data Collection and Profiling - Companies collect various user activities including location, device information, visited sites, and purchase history to create digital profiles [8] - Algorithms are used to analyze these profiles, determining political leanings, shopping habits, and even emotional states for targeted advertising [9] Revenue Models of Tech Giants - Meta's total revenue in 2024 is $164.5 billion, with $160.6 billion (97.6%) coming from advertising sales [6] - Alphabet's total revenue in 2024 is $350 billion, with $264.6 billion (75.6%) derived directly from advertising sales [7] Digital Manipulation and Privacy Risks - Digital manipulation involves directed information flows designed to alter emotions, thoughts, and behaviors on online platforms [11] - The Facebook emotion contagion experiment in 2012 involved manipulating 689,000 users' content to influence their emotional states without their consent [13] - The Cambridge Analytica scandal affected 87 million Facebook users through a personality analysis app that collected data and created psychological profiles to influence voter behavior in the 2016 US presidential election [16][17] - Deepfake technology can be used for identity simulation, as demonstrated by a case where fraudsters used AI to mimic a CEO's voice and steal $35 million [19][20][21] - Clearview AI collected 30 to 60 billion photos from platforms like Facebook, Instagram, and YouTube to create facial recognition technology, raising privacy concerns and leading to legal challenges [22][23][24] User Awareness and Control - It is crucial to increase awareness of what data is being collected and how it is processed by online systems [26] - Users should be aware of their rights regarding personal data protection, such as the ability to request data deletion or correction, as protected by regulations like KVKK in Turkey and GDPR in the European Union [26][27] - Individuals should regularly review permissions and preferences given to apps and services, understanding the implications of granting access to their data [27][28] - Practicing digital minimalism and regularly cleaning up digital footprints by closing unused accounts and revoking unnecessary permissions can reduce manipulation risks [29][30]