Over the last week, there have been a series of articles dumping on one particular social media monitoring application that was allegedly using an unethical value proposition to market its solution: surveillance.
As one of Gartner’s social analytics analysts I’ve got to tell you, the tools that each vendor offers to the market could allow the exact same type of use. This isn’t in defense of any vendor nor is it meant to accuse any vendor or anything, this is just the fact of the matter. I’ve long told people that the data feeds that social analytics vendors access are not the differentiator in the social analytics equation, rather the way in which the vendor chooses to focus and present their analysis, is.
In the case of the vendor in question, they choose to plot the returns to their clients’ social media data queries on a map – but they’re not the only ones who do that. So if a vendor provides the tools, and a client chooses to use those tools in a way which is unethical, whose fault is it?
- Is it the social network who hands over our information via an API – despite its terms and conditions of API use specifically noting that its data can not be used for individual surveillance?
- Is it the vendor who provided the tools to spin that information into a dashboard where it could be used for surveillance?
- Is it the client who chose to watch individuals’ posts?
It’s not like companies watching individuals over social media is something new. Marketers watch “influencers” all of the time. Sales people watch what their prospects and customers talk about to try and find an opening. I don’t mean to imply this is the same thing as surveilling protesters, but don’t influencers, prospects and customers have rights as well? Where is the line?
Read Complimentary Relevant Research
Predicts 2017: Artificial Intelligence
Artificial intelligence is changing the way in which organizations innovate and communicate their processes, products and services. Practical...
View Relevant Webinars
How to Protect Mobile Apps
Securely enabling applications on corporate- or employee-owned devices is key to protecting enterprise data from misuse. From containers...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.