Privacy: Difference between revisions
No edit summary |
No edit summary |
||
Line 91: | Line 91: | ||
In the Jonathan Zittrain piece, I found the following excerpt to incapsulate the true issues of today. ...."Nowadays an individual must increasingly give information about himself to large and relatively faceless institutions, for handling and use by strangers—unknown, unseen and, all too frequently..." How do we as a society protect against that information being used in a way that we would never think of?. | In the Jonathan Zittrain piece, I found the following excerpt to incapsulate the true issues of today. ...."Nowadays an individual must increasingly give information about himself to large and relatively faceless institutions, for handling and use by strangers—unknown, unseen and, all too frequently..." How do we as a society protect against that information being used in a way that we would never think of?. | ||
Another example....here is an article on how software analyzing all the CCTV cameras will be able to alert authorities to behaviour ... | |||
http://blogs.scientificamerican.com/observations/2013/04/18/httpblogs-scientificamerican-comobservationswp-adminpost-new-phppost_typepost/?WT_mc_id=SA_CAT_TECH_20130423 | http://blogs.scientificamerican.com/observations/2013/04/18/httpblogs-scientificamerican-comobservationswp-adminpost-new-phppost_typepost/?WT_mc_id=SA_CAT_TECH_20130423 | ||
[[User:Caroline|Caroline]] 15:43, 23 April 2013 (EDT)Caroline | [[User:Caroline|Caroline]] 15:43, 23 April 2013 (EDT)Caroline |
Revision as of 14:50, 23 April 2013
April 23
A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard enough time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet governance. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online it way succumb to the interests of profitability, online behavior regulation, cybersecurity, and law enforcement. Today’s class will set a framework for classifying privacy issues and explore how these issues play out in online spaces.
Speaking in class this week will be several members of Berkman's Youth and Media Project, as well as our own TA David O'Brien.
Assignments
We have a granted a one week extension to the rough draft in light of last week's events. Please have those uploaded before class on April 30th.
Readings
- Hal Abelson, Ken Ledeen, and Harry Lewis, Blown to Bits (Chapter 2) (focus on pages 36-42: “Why We Lost Our Privacy, Or Gave it All Away”)
- Lawrence Lessig, Code 2.0 (Chapter 7) (read “Solutions” through “Rules to Enable Choice About Privacy”)
Optional Readings
Videos Watched in Class
Links
Class Discussion
Daniel Solove concisely and accurately summarized the areas of consensus with regards to the definition of privacy when he stated that it encompasses, "(among other things) freedom of thought, control over one’s body, solitude in one’s home, control over personal information, freedom from surveillance, protection of one’s reputation, and protection from searches and interrogations." He also went on to point out that, “Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all.” These two statements probably best summarize where current thought on privacy is at this moment in world history. He goes on to emphasize how important privacy is, "Thus privacy is a fundamental right, essential for freedom, democracy, psychological well-being, individuality, and creativity. It is proclaimed inviolable but decried as detrimental, antisocial, and even pathological."
I see less problems with the actual definition of the core values which comprise privacy and more issues with drawing the borders of where privacy begins and ends. It can (more or less) be defined as the individual having his or her behavior, personal information and life protected from disclosure to anyone whom they wish to not share such information. One solution is to go back to the old paradigm of the good of the individual vs. the good of the collective. With this mindset, I believe there would be a constant shift towards the eroding away at individual privacy for the benefit of society, either real or perceived. Therefore, one must seek a minimal set of privacy rights which can either never be infringed upon, or can only be infringed upon after some sort of mechanism for "due process" has been put in place and followed and properly justified.
There are some who are criticizing police for their recent cordoning off and going house-to-house and searching for one of the suspects of the Boston Marathon bombings in Watertown Massachusetts. There are also those who believe, that while so many cameras in the city of Boston gave law enforcement an advantage in identifying the bombers, the sheer quantity of cameras allows the government too much power. I thought the crowd sourcing effort that the government used (posting pictures of who they strongly believed were involved in the bombing and then allowing the public to voluntarily come forward was an interesting and perhaps good example of a balance between privacy and security that can be struck in the future. With the popularity of social media such as Facebook and Twitter, such efforts have the potential to be very effective, although surely not without critics. Technology certainly makes the issue of privacy much more complicated. Data gathering via the internet, data mining tools and technologies, surveillance drones and public cameras all add further complications to the issue. CyberRalph 20:22, 21 April 2013 (EDT)
In my wiki post two weeks ago, on April 9th, I addressed issues surrounding online privacy. I noted that everything we do today is online, and as a result, we may all be hacked at some point in time. The assigned chapter this week by Abelson et al., Why We Lost Our Privacy, Or Gave It Away, further supports my claim with additional examples and relevant quotes.
"Technology creates opportunities and risks, and people, as individuals and as societies, decide how to live in the changed landscape of new possibilities [i.e., new technology]....We give away information about ourselves—voluntarily leave visible footprints of our daily lives—because we judge, perhaps without thinking about it very much, that the benefits outweigh the costs."
These two statements are equally relevant for this week’s discussion. A) Technology does indeed create opportunities and risks, and we as the users primarily see things from an opportunistic perspective—quite often, we don’t contemplate the risks. B) Based on our optimism and trust in the technological advancements that surround us, we give our personal information away continuously. Why? Because the benefits outweigh the costs: we need to pay our bills online, manage our finances online, purchase products online, sign-up for services online, and the list goes on. In some circumstances—when one is hacked, for example—the costs trump the benefits; yet, we remain optimistic overall, not because we necessarily want to, but because we need to.
Privacy today impacts all walks of life. RFID technologies, credit cards, supermarket loyalty programs, and beyond, capture personal data for countless reasons. As the consumers, we not only let this happen, but we don’t have a choice, unless we choose to live in a remote reality. Abelson et al. further states that, "we give up data about ourselves because we don’t have the time, patience, or single-mindedness about privacy that would be required to live our daily lives in another way." Privacy norms will inevitably continue to evolve in-line with technological advancements, and we as the ultimate users must therefore adapt accordingly.
The final quote worth highlighting comes from Zittrain’s article: "It is no wonder that people have come to distrust computer-based record-keeping operations. Even in non-governmental settings, an individual’s control over the personal information that he gives to an organization, or that an organization obtains about him, is lessening as the relationship between the giver and receiver of personal data grows more attenuated, impersonal, and diffused....Often [an individual] may not see [a record about him/her], much less contest its accuracy, control its dissemination, or challenge its use by others" (Report from the Blue-Ribbon Panel to the U.S. Secretary of Health, Education, and Welfare on computers and privacy).
I like this quote because it foreshadows today’s reality, from 40 years ago. Will this same reality be consistent 40 years from now? Will privacy take on new meanings as hacking becomes more prevalent? Will new industries emerge to protect online communications? How will we, as users, continue to adapt to ensure our own privacy across diverse online frontiers?
I look forward to hearing your insights! Zak Paster 09:48, 23 April 2013 (EDT)
I enjoyed our readings for today’s class in regards to the Internet privacy. With information systems, in my view privacy deals with the collection of misuse of data and information within the cyber arena. More and more information of users is being collected, stored, used, and shared among ample organizations. Who owns this information and knowledge? And what is the limit of the privacy? In my view, privacy is a status wherein an individual can work on his/her information in seclusion, resulting in a selective revelation of one's identity, which can mean anonymity in case a person wants to remain unidentified. Privacy can also be related to the security aspect of an individual or information. While using the Internet, it mainly comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers, the privacy security is limited as the card numbers are being stolen and/or forwarded to the 3rd parties. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track user’s information, which is viewed as another major privacy concern. The other important Internet privacy issue in my view is whether the sites that gather personally identifiable information from the users should store or share it. user777 12:09, 23 April 2013 (EDT)
Reflecting upon this week's readings, the discussion on privacy seems so much bigger than a question of laws and regulations. It fully encompasses the ethics and morals of individuals and of their cultures. The current privacy situation forces a person to constantly be ready to defend their reputation. It seems to hold human behavior to a higher standard, which might not be bad. Privacy while participating in online activity seems more like part of "playing the game", however when it comes to secret surveillance or someone else taking photographic images or videos of me and disseminating those images without my consent is another story. It is like living in a glass house or a fish bowl. We've all had bad days and made mistakes, but we do not desire for those to be captured and forever worn like a scarlet letter. This is of particular concern to me, as children are growing and hopefully learning from their mistakes, not permanently labeled for them. Zittrain's chapter brought many additional thoughts to mind such as his example about "good" customers and "bad" customers in a home improvement store. This type of behavior on the part of businesses could perpetuate economic discrimination.
Striking a balance between government control and individual/ non-state actor control is important. Technological advancements often come laden with unintended consequences but that is part of innovation and progress. As the debate and discussion continue, acceptable solutions will emerge. Question: Does COPPA or another law cover anything about photos or videos being taken of minor children (clothed, not pornographic) and disseminated online without parental consent? --Dear Alice 12:20, 23 April 2013 (EDT)
Privacy is a difficult topic to get legal and moral arms around. Reading the different perspectives for this week, it becomes clear that there aren't any real clear guidelines on how to approach this difficult topic. Protected by a constitutionality? Yes... enforced thoroughly? No.
I pulled up to my drive through bank machine yesterday. The three cameras there recorded my licence plate, a wide angle of my car and my face (finally noticed the small camera next to the key pad.) Was all that really necessary for me to pull 100 dollars? With the readings in mind, I started reviewing how many times I am photographed and cataloged in some obscure (to me) database. Yesterday alone was over 50 (that I know of) and I do not frequent high profile areas. I have no secret clearance or celebrity profile that could possible make these numbers justified yet in a normal course of events during my day I was like an animal that had been tagged with an ear chip for migration observation.
In the Jonathan Zittrain piece, I found the following excerpt to incapsulate the true issues of today. ...."Nowadays an individual must increasingly give information about himself to large and relatively faceless institutions, for handling and use by strangers—unknown, unseen and, all too frequently..." How do we as a society protect against that information being used in a way that we would never think of?.
Another example....here is an article on how software analyzing all the CCTV cameras will be able to alert authorities to behaviour ... http://blogs.scientificamerican.com/observations/2013/04/18/httpblogs-scientificamerican-comobservationswp-adminpost-new-phppost_typepost/?WT_mc_id=SA_CAT_TECH_20130423
Caroline 15:43, 23 April 2013 (EDT)Caroline