History and Philosophy of Privacy September 4, 2007 1

advertisement
History and Philosophy of Privacy
September 4, 2007
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
1
Research and Communication Skills
Finding info with search engines
General purpose search engines
• Google, Yahoo, Altavista, A9, etc.
Clustered searching
• Vivisimo, Dogpile
Search CS research literature
•
•
•
•
http://portal.acm.org
http://citeseer.ist.psu.edu/
http://ieeexplore.ieee.org/
http://scholar.google.com/
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
2
Research and Communication Skills
Advanced searching
 Boolean searching
•
•
•
•
•
Operators: AND, OR, NOT, NEAR
Implied operators: AND is often implied
Parentheses for grouping
Wildcards
Quotes
 Getting to know the ins and outs of your favorite
search engines
• Many search engines do not use pure boolean
searching
• Most search engines have some special syntax
• Search engines use different algorithms to determine
best match
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
3
Research and Communication Skills
Advanced Googling
 See
http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/G
oogle.html
 Ranks results using PageRank algorithm, taking into
account popularity, importance, word proximity
 Special syntax
•
•
•
•
intitle, inurl, site, intext, filetype, daterange, numrange
Boolean operators: OR, Fuzzy searching: ~, .., *
Exact phrases: “”
 10-term limit
 Special searches
 Definitions (define), calculator, area codes, flight
searches, and more
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
4
What is privacy?
“Being alone.”
- Shane (age 4)
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
5
Multiple conceptions of privacy
Personhood
Intimacy
Secrecy
Limited access to the self
Control over information
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
6
Westin “Privacy and Freedom” 1967
 “Privacy is the claim of individuals, groups or
institutions to determine for themselves when,
how, and to what extent information about them is
communicated to others”
 “desire for privacy is never absolute”
 “each individual is continually engaged in a
personal adjustment process in which he
balances the desire for privacy with the desire for
disclosure and communication….”
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
7
Westin’s four states of privacy
 Solitude
• individual separated form the group and freed form the
observation of other persons
 Intimacy
• individual is part of a small unit
 Anonymity
• individual in public but still seeks and finds freedom
from identification and surveillance
 Reserve
• the creation of a psychological barrier against
unwanted intrusion - holding back communication
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
8
Westin’s four functions of privacy
Personal autonomy
• control when you go public about info
Emotional release
• be yourself
• permissible deviations to social or institutional
norms
Self-evaluation
Limited and protected communication
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
9
Solove’s privacy taxonomy
 Information Collection
• Surveillance
• Interrogation
 Information Processing
•
•
•
•
•
Aggregation
Identification
Insecurity
Secondary Use
Exclusion
 Information Dissemination
•
•
•
•
•
•
•
Breach of Confidentiality
Disclosure
Exposure
Increased Accessibility
Blackmail
Appropriation
Distortion
 Invasion
• Intrusion
• Decisional Interference
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
10
Information vs. decisional privacy
Information privacy concerns the collection,
use, and disclosure of personal information
Decisional privacy concerns the freedom to
make decisions about one's body and
family
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
11
Limited access vs. control
Privacy as limited access to self
• the extent to which we are known to others and
the extent to which others have physical
access to us
Privacy as control over information
• not simply limiting what others know about you,
but controlling it
• this assumes individual autonomy, that you can
control information in a meaningful way (not
blind click through, for example)
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
12
Multiple facets of privacy
How can posting personal information
about myself on my web site result in a
reduction of my privacy? How can it result
in an increase in my privacy?
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
13
Privacy as deprivation?
Deprived of being heard and seen by
others
Deprived of being contacted by others
Deprived of benefits that come as a result
of your personal information being available
to others
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
14
Privacy as animal instinct?
Is privacy necessary for species survival?
Eagles eating a deer carcass http://www.learner.org/jnorth/tm/eagle/CaptureE63.html
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
15
Information privacy
In 17th century America, colonists began to
collect information about each other
• Census, birth and death records, school
records, tax records
Informants reported people who behaved
badly
• Disorderly children, nightwalkers, Sabbath
breakers, atheists, drunks
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
16
Privacy of personal space
Historically, depended a lot on the type and
proximity of available housing
In 18th century Europe, most people lived
in cities where houses were close together,
but small number of people lived in each
house
In 18th century America, people lived far
away from each other but many people
lived in each house and even shared beds
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
17
Communication privacy
 When all communication was oral,
communication privacy depended on
• Communicating without someone overhearing
• Communicating with people who wouldn’t tell others
 Written communications brought new
opportunities for privacy violations
 In 18th century America, postal mail was not
necessarily private
• Sealing wax, basic encryption used to increase privacy
• 1782 - Congress made it illegal to open other peoples’
mail
• Later the invention of the adhesive envelope increased
communications privacy
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
18
Telegraph
In the late nineteenth century the telegraph
became a popular means of long distance
communication
Messages could be coded, but you could
not recover damages due to transmission
errors if the message was coded
Telegraph operators were supposed to
keep messages confidential
Occasional subpoenas for telegraph
messages
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
19
Cameras
Cameras, especially portable “snap”
cameras (1888), raised new privacy
concerns
Telephoto lenses
Video cameras
Hidden cameras
Web cams
Satellite images
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
20
The Prada NYC dressing room
 http://www.sggprivalite
.com/
 What aspects seem
privacy invasive?
 How could the design
be changed to reduce
privacy concerns?
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
21
Discussion questions
Which technologies are privacy invasive?
Which technologies are privacy protective?
Can we turn one into the other?
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
22
Privacy History References
Robert Ellis Smith. 2000. Ben Franklin’s
Web Site: Privacy and Curiosity from
Plymouth Rock to the Internet. Providence:
Privacy Journal.
Alan Westin. 1967. Privacy and Freedom.
New York: Atheneum.
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/
23
Download