Skip to content
Search

Latest Stories

Top Stories

Since when did Big Brother take over American colleges?

Big Brother is watching through an American flag
Moor Studio/Getty Images

Daniel O. Jamison is a retired attorney.

In his classic novel “1984,” George Orwell described a frightening dystopian future where individual freedom is lost as technology enables “Big Brother” to watch, monitor and direct everyone. Big Brother has now come to American colleges and universities.

College students often must log into course management programs to take classes. These systems gather information for the professor on how much time is spent looking at readings and whether course messages have been checked. Professors can insist that students read course books online, which allows the professor to check if pages were actually read, when they were read and how much time was spent on each page.

Professors can monitor how long one takes to complete an assignment and quizzes. Website visits, keystrokes, link clicks, and mouse movements are recorded. Professors can insist on activating one’s camera so that test-taking can be proctored through facial recognition. Never mind that algorithms can flag certain innocent movements of the test-taker as suspicious or not allow a Black person’s face to register.


Card swipes allow tracking of one’s use of the library. Then there are the cameras in the parking areas that pick up not only your license plate to see if you have a parking pass but also see who you are riding with and what you are carrying when you leave the car. Better hide what you don’t want Big Brother to see. If you have not been to the food commons for several days, someone may give you the creeps by showing up at your dorm room to check on you.

Sign up for The Fulcrum newsletter

At least one presumably can still avoid taking a course that requires reading “War and Peace” in two weeks. Course papers used to often be written in late- or all-night cram sessions. One learned how well they can perform under pressure.

Now one presumably could be flagged as a potential miscreant who – instead of spending days cooped up writing a paper – socializes, plays intramural sports, watches sports, sees and attends what else is happening on campus or in the area, and learns the ways and ideas of fellow students.

Early diversity programs of the 1970s allowed students of diverse races, ethnicities, and backgrounds to learn about and from each other. There is and was immense value in bringing together people who would otherwise have little or no contact so that they might get to know and appreciate one another.

This is not to say that students should neglect their studies, but how can learning take place if they are so worried about being tracked? They may become hermits and lose the forest for the trees amid mind-numbing constant studying. Big Brother’s fear-inducing monitoring would appear to make it harder for people to get to know one another. A college education should include learning through in-person social interaction and working together to rise above anger against one another or retreating to “safe spaces.”

This massive data collection is very disturbing beyond the world of academia. What data has been gathered from visits to health websites? Artificial intelligence presumably can overcome the sheer volume of data to drill down on someone. Autonomy is lost. Adolf Hitler would have been delighted with the assistance of all of this data to rid Nazi Germany of those viewed as “vermin,” not pure of blood or race, or otherwise undesirable. Don’t think it can’t happen here.

The root of the problem is the massive and willy-nilly unwarranted collection of all of this data in the first place. According to Tara Garcia Mathewson, a University of California, San Diego chief privacy officer has stated: “We haven’t had regulator scrutiny, to a great extent, on our privacy practices or our data practices, so our data really do live all over the place, and no one quite knows who has what.”

Except for some broader protections for the disabled and personal health information, federal law and regulations appear for the most part not to address the root problem.

The definition of “education records” in federal post-secondary student privacy law and regulations appears to include much of this massive data, but the regulations do not address the unnecessary massive collection of data in the first place. They appear to address only such topics as who can access “education records” without a student’s consent, a student’s right to see and seek to amend the records (the school is not required to make the amendment), a student’s right to file a complaint with the Department of Education, and the school’s obligation to notify students of these rights.

“Transparency” is no solution. It only lets you know what Big Brother has on you. Big Brother already has the data and can use it, plus hacking is always a concern. One can ask professors to accept typed work outside these systems, but the school or professors may not allow it. It is otherwise apparently a practical impossibility to entirely avoid being monitored.

Government may not have addressed the root of the problem, but schools can on their own. Higher education should drop the coursework management systems and limit electronic school communication to emails. Our troubled times seem to require surveillance cameras and key card entry systems, but they should be narrowly tailored to documented needs.

These changes made, “1984” should be required reading for students and administrators.

Read More

Athens, GA., bookstore battles bans by stocking shelves

News Ambassadors is working to narrow the partisan divide through a collaborative journalism project to help American communities that hold different political views better understand each other, while giving student reporters a valuable learning experience in the creation of solutions reporting.

A program of the Bridge Alliance Education Fund, News Ambassadors is directed by Shia Levitt, a longtime public radio journalist who has reported for NPR, Marketplace and other outlets. Levitt has also taught radio reporting and audio storytelling at Brooklyn College in New York and at Mills College in Oakland, Calif., as well as for WNYC’s Radio Rookies program and other organizations.

Keep ReadingShow less
Woman looking off into the distance while holding her mobile phone

Seeing a lie or error corrected can make some people more skeptical of the fact-checker.

FG Trade/Getty Inages

Readers trust journalists less when they debunk rather than confirm claims

Stein is an associate professor of marketing at California State Polytechnic University, Pomona. Meyersohn is pursuing an Ed.S. in school psychology California State University, Long Beach.

Pointing out that someone else is wrong is a part of life. And journalists need to do this all the time – their job includes helping sort what’s true from what’s not. But what if people just don’t like hearing corrections?

Our new research, published in the journal Communication Research, suggests that’s the case. In two studies, we found that people generally trust journalists when they confirm claims to be true but are more distrusting when journalists correct false claims.

Keep ReadingShow less
FCC seal on a smart phone
Pavlo Gonchar/SOPA Images/LightRocket via Getty Images

Project 2025: Another look at the Federal Communications Commission

Biffle is a podcast host and contributor at BillTrack50.

This is part of a series offering a nonpartisan counter to Project 2025, a conservative guideline to reforming government and policymaking during the first 180 days of a second Trump administration. The Fulcrum's cross partisan analysis of Project 2025 relies on unbiased critical thinking, reexamines outdated assumptions, and uses reason, scientific evidence, and data in analyzing and critiquing Project 2025.

Project 2025, the Heritage Foundation’s policy and personnel proposals for a second Trump administration, has four main goals when it comes to the Federal Communications Commission: reining in Big Tech, promoting national security, unleashing economic prosperity, and ensuring FCC accountability and good governance. Today, we’ll focus on the first of those agenda items.

Keep ReadingShow less
Taylor Swift singing and playing the piano

Taylor Swift performs on July 27 in Munich, Germany.

Thomas Niedermueller/TAS24/Getty Images

I researched the dark side of social media − and heard the same themes in ‘The Tortured Poets Department’

Scheinbaum,is an associate professor of marketing as Clemson University.

As an expert in consumer behavior, I recently edited a book about how social media affects mental health.

I’m also a big fan of Taylor Swift.

So when I listened to Swift’s latest album, “The Tortured Poets Department,” I couldn’t help but notice parallels to the research that I’ve been studying for the past decade.

Keep ReadingShow less
person hacking a website
Bill Hinton/Getty Images

The end of privacy?

Frazier is an assistant professor at the Crump College of Law at St. Thomas University and a Tarbell fellow.

Americans have become accustomed to leaving bread crumbs of personal information scattered across the internet. Our scrolls are tracked. Our website histories are logged. Our searches are analyzed. For a long time, the practice of ignoring this data collection seemed sensible. Who would bother to pick up and reconfigure those crumbs?

In the off chance someone did manage to hoover up some important information about you, the costs seemed manageable. Haven’t we all been notified that our password is insecure or our email has been leaked? The sky didn’t fall for most of us, so we persisted with admittedly lazy but defensible internet behavior.

Keep ReadingShow less