Author: Helen Nissenbaum
Juan Lockett, Junghwan Shin, J. Karlo Pajota, Mike Nguyen,
Vikesh Parmar, Wing Shan Ho (Rosana), Adom Greene,
James Turman
Part I : Information Technology’s Power and
Threat
Part II: Critical Survey of Predominant Approaches to Privacy
Part III: The Framework of Contextual Integrity
Part I: Chapter 1
Overview of technology-based systems and practices that are seen as threats to privacy
Closed-Circuit Television Data records
Sensor Networks
Part I: Chapter 1
Overview of technology-based systems and practices that are seen as threats to privacy
Mobile Phone Triangulation
Global Positioning
Systems (GPS)
Tracking
Applications
Part I: Chapter 1
Overview of technology-based systems and practices that are seen as threats to privacy
In Public Roadways:
License Plate Readers
Part I: Chapter 1
Overview of technology-based systems and practices that are seen as threats to privacy
In Online Monitoring:
Part I: Chapter 1
Overview of technology-based systems and practices that are seen as threats to privacy
Uses of Radio Frequency Identification (RFID):
● Road toll systems
● Proximity cards
● Keyless automobile entry
● Tracking of air cargo
● Wristbands for newborn
● Implantable transponder chip
● Tracking of goods along distribution channel
● RFID-enabled passports
● RFID-enabled Identification cards
Part I: Chapter 2
Knowing Us Better than We Know Ourselves:
Massive and Deep Databases
Three areas of information science and technology have contributed to the landscape of threat
1. Capacity 2. The Internet 3. Advances in
Computer Software
Part I: Chapter 2
The Four Pivotal Transformations
1. Democratization of Database Technologies:
2.
Mobility:
Information
EMR
EHR
Vendors
Part I: Chapter 2
The Four Pivotal Transformations
3. Information Aggregation:
DB 1
DB 2
Internet
4. Information from Data, Knowledge from Information:
Part I: Chapter 2
The Four Pivotal Transformations
Netflix’s recommendation engine
Amazon’s item-to-item collaborative filtering
Part I: Chapter 2
Online Data Vendors
● Acxiom Corporation
● ChoicePoint, Inc.
● First Advantage Corporation
● Capacity to Spread and Find Everything,
Everywhere
● Enhanced powers to gather and stockpile information have yielded socio-technical practices often experienced as threats to privacy
● Public records are government records about individuals that are open to public inspection without restriction
● The degree of their accessibility is generally determined by two regulatory regimes exerting force in opposite directions.
● 1966 Freedom of Information Act
● 1974 Privacy Act
● Social networking sites constitute a subdomain of the larger social software ecosystem,sometimes called Web 2.0
● a loose class of Web sites dedicated to creating and maintaining social ties, groups, and networks.
● At least three different types of privacy issues have arises in the context of social network sites.
Locating the Value in Privacy
Ruth Gavison: privacy locates its value in its functional relationship to valued ends, including human well-being and development, creativity, autonomy, mental health, and liberty
Hoven: Four types of moral reasons for why privacy deserves protection:
1.
Information-based harm:
● increase critical transactions through internet and phone
● unrestricted availability of information e.g SSN, passwords
● protects against identity theft and undesirable access to personal information
2. Informational inequality:
● e.g get a job, obtain a critical loan
● We have little or no voice or choice in the data collections and sharing process
● We do not know who has what information, how they got it...
● restricts the ability of governments, corporations, etc. to collect information about individuals in a one-way
3. Informational injustice:
● e.g a job candidate's medical history or religious affiliation found in company’s file → may affect the hiring manager’s decision
● ensures that information is only used in the appropriate context
4. Encroachment on moral autonomy:
● allows individuals to independently pursue moral development
● the capacity to reflect on our moral career,
● identify with our own moral choice
● without interference of others
● without pressure to conform to the “normal” or socially desired identities
Private and Public
● Private and public have varying meaning from arena to arena o o to citizens private means familial, or intimate relations public means civic actions beyond the home and the personal
Information:Private versus public
● Scope and extent of privacy protection o o
FERPA(Family Education Rights and Privacy Act)
HIPPA(Health Insurance Portability and
Accountability Act) o o o
Video Privacy Protection Act
US Patriot Act
FCC’s Net Neutrality Act
Interactions, Gray Areas, and Applications
● Garbage is considered a gray area because it has been ruled public domain by the courts
● Internet
● Telephone conversations
Skeptic’s points against privacy:
1. Convenience over privacy
2.
“Media exhibitionism”
● People unaware their information is being used
● Key point : The framework of contextual integrity is able to respond to all challenges
● Contextual Integrity
○ holds when context of relative informational norms are respected; it is violated when they are breached
● Attributes
○ type of information
● The inappropriateness of flow of information
○ Sender, Receiver, Type of Information
Google + & Facebook
Health care information
Contextual integrity as a justification
● Adheres to currently accepted norms o Cost of any new practice not adhering to norms is not justified
● Tyranny of the normal o Unless the technology is accepted as normal it is not accepted at all
● Conservatism o expectations being fulfilled o violation of conservative norms is a breach of contextual integrity
Contextual values vs. value of contexts
● Contextual norms are to be overcome when novel practices are clearly needed
● When a current practice is in violation of norms o What are it’s information flows?
o What is the main context?
o How and why does it defy norms?
o What are the moral factors?
o Where does it deviate from the norms?
Privacy Rights in Context: Applying the framework
● Privacy is one of the most enduring social issues associated with information technologies.
○ Public discourse through radical transformations of technology from stand-alone computers.
○ Housing massive databases of government and other large institutions.
○ To the current distributed network of computers with linked information systems, such as the World Wide Web, networked mobile devices, video and radio-frequency surveillance systems, and computerenabled biometric identification.
● Contextual integrity ties adequate protection for privacy to norms of specific contexts, demanding that information gathering and dissemination be appropriate to that context and obey the governing norms of distribution within it.
● Three key elements of the framework - explanation, evaluation and prescription.
○ Explanation - Affect people’s reactions to new systems or practices.
○ Evaluation - Resolve a controversy, or at least to clarify what is at stake.
○ Prescription - Resistance and protest
● Problems arise when policies governing systems and practices assume that only the private warrants privacy protection and for the rest, anything goes.
● The new system violates contextual integrity.
○ CCTV
○ RFID
- Control over personal information.
- Information transmit
○ Online - Network diminishes information flow etc
○ Search engines - Personal information.
○ Social network - Privacy sharing
● Conclusion - controversial issues of privacy have been in the world.
Information technology has good things but bad things.