Privacy: Difference between revisions
(→Class Discussion: Apologies for multiple saves. Have had a great deal of difficulty getting this to save at all, and what got saved at first was an early draft.) |
|||
Line 87: | Line 87: | ||
The other point Dear Alice makes that I find compelling is that we all have said and done things, which, upon reflection, we'd prefer we hadn't. None of us would like to wear a list of these things on a sign around our neck, nor have them attached to our name when someone looks up our resume, or listing on a social network. | The other point Dear Alice makes that I find compelling is that we all have said and done things, which, upon reflection, we'd prefer we hadn't. None of us would like to wear a list of these things on a sign around our neck, nor have them attached to our name when someone looks up our resume, or listing on a social network. Much has been made of the privilege the rich and politically connected have, just in their ability to keep their behavior behind closed doors. Now that these areas of privacy are becoming fewer and fewer, will this further equalize society or further expand the privileges of those that can afford to socialize and work in areas that remain free from cameras or other public oversight? | ||
Finally, we've been using the words discipline and punish in our discussions, at times, perhaps loosely, when what our intentions are perhaps to prevent or discourage behavior, or even encourage alternate behaviors. I wonder if we've spent enough time thinking about whether discipline and punishment actually deter the behaviors many of us have been discussing. Or if we've thought through the implications of a society so quick to jump to discipline and punishment, when prevention and discouragement might be more desirable. | |||
As a footnote to this discussion, there is a Wall Street Journal article which discusses an attempt to count the number of federal criminal laws, and an article on the Library of Congress's website that discusses the WSJ article and expands upon it. blogs.loc.gov/law/2013/03/frequent-reference-question-how-many-federal-laws-are-there/ | As a footnote to this discussion, there is a Wall Street Journal article which discusses an attempt to count the number of federal criminal laws, and an article on the Library of Congress's website that discusses the WSJ article and expands upon it. blogs.loc.gov/law/2013/03/frequent-reference-question-how-many-federal-laws-are-there/ |
Revision as of 15:32, 23 April 2013
April 23
A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard enough time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet governance. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online it way succumb to the interests of profitability, online behavior regulation, cybersecurity, and law enforcement. Today’s class will set a framework for classifying privacy issues and explore how these issues play out in online spaces.
Speaking in class this week will be several members of Berkman's Youth and Media Project, as well as our own TA David O'Brien.
Assignments
We have a granted a one week extension to the rough draft in light of last week's events. Please have those uploaded before class on April 30th.
Readings
- Hal Abelson, Ken Ledeen, and Harry Lewis, Blown to Bits (Chapter 2) (focus on pages 36-42: “Why We Lost Our Privacy, Or Gave it All Away”)
- Lawrence Lessig, Code 2.0 (Chapter 7) (read “Solutions” through “Rules to Enable Choice About Privacy”)
Optional Readings
Videos Watched in Class
Links
Class Discussion
Daniel Solove concisely and accurately summarized the areas of consensus with regards to the definition of privacy when he stated that it encompasses, "(among other things) freedom of thought, control over one’s body, solitude in one’s home, control over personal information, freedom from surveillance, protection of one’s reputation, and protection from searches and interrogations." He also went on to point out that, “Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all.” These two statements probably best summarize where current thought on privacy is at this moment in world history. He goes on to emphasize how important privacy is, "Thus privacy is a fundamental right, essential for freedom, democracy, psychological well-being, individuality, and creativity. It is proclaimed inviolable but decried as detrimental, antisocial, and even pathological."
I see less problems with the actual definition of the core values which comprise privacy and more issues with drawing the borders of where privacy begins and ends. It can (more or less) be defined as the individual having his or her behavior, personal information and life protected from disclosure to anyone whom they wish to not share such information. One solution is to go back to the old paradigm of the good of the individual vs. the good of the collective. With this mindset, I believe there would be a constant shift towards the eroding away at individual privacy for the benefit of society, either real or perceived. Therefore, one must seek a minimal set of privacy rights which can either never be infringed upon, or can only be infringed upon after some sort of mechanism for "due process" has been put in place and followed and properly justified.
There are some who are criticizing police for their recent cordoning off and going house-to-house and searching for one of the suspects of the Boston Marathon bombings in Watertown Massachusetts. There are also those who believe, that while so many cameras in the city of Boston gave law enforcement an advantage in identifying the bombers, the sheer quantity of cameras allows the government too much power. I thought the crowd sourcing effort that the government used (posting pictures of who they strongly believed were involved in the bombing and then allowing the public to voluntarily come forward was an interesting and perhaps good example of a balance between privacy and security that can be struck in the future. With the popularity of social media such as Facebook and Twitter, such efforts have the potential to be very effective, although surely not without critics. Technology certainly makes the issue of privacy much more complicated. Data gathering via the internet, data mining tools and technologies, surveillance drones and public cameras all add further complications to the issue. CyberRalph 20:22, 21 April 2013 (EDT)
In my wiki post two weeks ago, on April 9th, I addressed issues surrounding online privacy. I noted that everything we do today is online, and as a result, we may all be hacked at some point in time. The assigned chapter this week by Abelson et al., Why We Lost Our Privacy, Or Gave It Away, further supports my claim with additional examples and relevant quotes.
"Technology creates opportunities and risks, and people, as individuals and as societies, decide how to live in the changed landscape of new possibilities [i.e., new technology]....We give away information about ourselves—voluntarily leave visible footprints of our daily lives—because we judge, perhaps without thinking about it very much, that the benefits outweigh the costs."
These two statements are equally relevant for this week’s discussion. A) Technology does indeed create opportunities and risks, and we as the users primarily see things from an opportunistic perspective—quite often, we don’t contemplate the risks. B) Based on our optimism and trust in the technological advancements that surround us, we give our personal information away continuously. Why? Because the benefits outweigh the costs: we need to pay our bills online, manage our finances online, purchase products online, sign-up for services online, and the list goes on. In some circumstances—when one is hacked, for example—the costs trump the benefits; yet, we remain optimistic overall, not because we necessarily want to, but because we need to.
Privacy today impacts all walks of life. RFID technologies, credit cards, supermarket loyalty programs, and beyond, capture personal data for countless reasons. As the consumers, we not only let this happen, but we don’t have a choice, unless we choose to live in a remote reality. Abelson et al. further states that, "we give up data about ourselves because we don’t have the time, patience, or single-mindedness about privacy that would be required to live our daily lives in another way." Privacy norms will inevitably continue to evolve in-line with technological advancements, and we as the ultimate users must therefore adapt accordingly.
The final quote worth highlighting comes from Zittrain’s article: "It is no wonder that people have come to distrust computer-based record-keeping operations. Even in non-governmental settings, an individual’s control over the personal information that he gives to an organization, or that an organization obtains about him, is lessening as the relationship between the giver and receiver of personal data grows more attenuated, impersonal, and diffused....Often [an individual] may not see [a record about him/her], much less contest its accuracy, control its dissemination, or challenge its use by others" (Report from the Blue-Ribbon Panel to the U.S. Secretary of Health, Education, and Welfare on computers and privacy).
I like this quote because it foreshadows today’s reality, from 40 years ago. Will this same reality be consistent 40 years from now? Will privacy take on new meanings as hacking becomes more prevalent? Will new industries emerge to protect online communications? How will we, as users, continue to adapt to ensure our own privacy across diverse online frontiers?
I look forward to hearing your insights! Zak Paster 09:48, 23 April 2013 (EDT)
I enjoyed our readings for today’s class in regards to the Internet privacy. With information systems, in my view privacy deals with the collection of misuse of data and information within the cyber arena. More and more information of users is being collected, stored, used, and shared among ample organizations. Who owns this information and knowledge? And what is the limit of the privacy? In my view, privacy is a status wherein an individual can work on his/her information in seclusion, resulting in a selective revelation of one's identity, which can mean anonymity in case a person wants to remain unidentified. Privacy can also be related to the security aspect of an individual or information. While using the Internet, it mainly comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers, the privacy security is limited as the card numbers are being stolen and/or forwarded to the 3rd parties. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track user’s information, which is viewed as another major privacy concern. The other important Internet privacy issue in my view is whether the sites that gather personally identifiable information from the users should store or share it. user777 12:09, 23 April 2013 (EDT)
Reflecting upon this week's readings, the discussion on privacy seems so much bigger than a question of laws and regulations. It fully encompasses the ethics and morals of individuals and of their cultures. The current privacy situation forces a person to constantly be ready to defend their reputation. It seems to hold human behavior to a higher standard, which might not be bad. Privacy while participating in online activity seems more like part of "playing the game", however when it comes to secret surveillance or someone else taking photographic images or videos of me and disseminating those images without my consent is another story. It is like living in a glass house or a fish bowl. We've all had bad days and made mistakes, but we do not desire for those to be captured and forever worn like a scarlet letter. This is of particular concern to me, as children are growing and hopefully learning from their mistakes, not permanently labeled for them. Zittrain's chapter brought many additional thoughts to mind such as his example about "good" customers and "bad" customers in a home improvement store. This type of behavior on the part of businesses could perpetuate economic discrimination.
Striking a balance between government control and individual/ non-state actor control is important. Technological advancements often come laden with unintended consequences but that is part of innovation and progress. As the debate and discussion continue, acceptable solutions will emerge. Question: Does COPPA or another law cover anything about photos or videos being taken of minor children (clothed, not pornographic) and disseminated online without parental consent? --Dear Alice 12:20, 23 April 2013 (EDT)
I'm very interested in two points Dear Alice makes above, the first, that the question of privacy seems much bigger than a question of laws and regulations. I'd just expand this to say that perhaps much or all of what we've discussed this semester depends so much on what we view we take of what government is for, how big it should be, and (something we haven't really discussed) how this enforcement will occur and who will pay for it.
The other point Dear Alice makes that I find compelling is that we all have said and done things, which, upon reflection, we'd prefer we hadn't. None of us would like to wear a list of these things on a sign around our neck, nor have them attached to our name when someone looks up our resume, or listing on a social network. Much has been made of the privilege the rich and politically connected have, just in their ability to keep their behavior behind closed doors. Now that these areas of privacy are becoming fewer and fewer, will this further equalize society or further expand the privileges of those that can afford to socialize and work in areas that remain free from cameras or other public oversight?
Finally, we've been using the words discipline and punish in our discussions, at times, perhaps loosely, when what our intentions are perhaps to prevent or discourage behavior, or even encourage alternate behaviors. I wonder if we've spent enough time thinking about whether discipline and punishment actually deter the behaviors many of us have been discussing. Or if we've thought through the implications of a society so quick to jump to discipline and punishment, when prevention and discouragement might be more desirable.
As a footnote to this discussion, there is a Wall Street Journal article which discusses an attempt to count the number of federal criminal laws, and an article on the Library of Congress's website that discusses the WSJ article and expands upon it. blogs.loc.gov/law/2013/03/frequent-reference-question-how-many-federal-laws-are-there/ online.wsj.com/article/SB10001424052702304319804576389601079728920.html
I've pasted the second to last paragraph from the Library of Congress website article here:
"In an example of a failed attempt to tally up the number of laws on a specific subject area, in 1982 the Justice Department tried to determine the total number of criminal laws. In a project that lasted two years, the Department compiled a list of approximately 3,000 criminal offenses. This effort, headed by Ronald Gainer, a Justice Department official, is considered the most exhaustive attempt to count the number of federal criminal laws. In a Wall Street Journal article about this project, “this effort came as part of a long and ultimately failed campaign to persuade Congress to revise the criminal code, which by the 1980s was scattered among 50 titles and 23,000 pages of federal law.” Or as Mr. Gainer characterized this fruitless project: “[y]ou will have died and [been] resurrected three times,” and still not have an answer to this question."
Here is the final paragraph of the WSJ article:
"There is no one in the United States over the age of 18 who cannot be indicted for some federal crime," said John Baker, a retired Louisiana State University law professor who has also tried counting the number of new federal crimes created in recent years. "That is not an exaggeration."
Raven 16:16, 23 April 2013 (EDT)
Privacy is a difficult topic to get legal and moral arms around. Reading the different perspectives for this week, it becomes clear that there aren't any real clear guidelines on how to approach this difficult topic. Protected by a constitutionality? Yes... enforced thoroughly? No.
I pulled up to my drive through bank machine yesterday. The three cameras there recorded my licence plate, a wide angle of my car and my face (finally noticed the small camera next to the key pad.) Was all that really necessary for me to pull 100 dollars? With the readings in mind, I started reviewing how many times I am photographed and cataloged in some obscure (to me) database. Yesterday alone was over 50 (that I know of) and I do not frequent high profile areas. I have no secret clearance or celebrity profile that could possible make these numbers justified yet in a normal course of events during my day I was like an animal that had been tagged with an ear chip for migration observation.
In the Jonathan Zittrain piece, I found the following excerpt to incapsulate the true issues of today. ...."Nowadays an individual must increasingly give information about himself to large and relatively faceless institutions, for handling and use by strangers—unknown, unseen and, all too frequently..." How do we as a society protect against that information being used in a way that we would never think of?.
Another example....here is an article on how software analyzing all the CCTV cameras will be able to alert authorities to behaviour ... http://blogs.scientificamerican.com/observations/2013/04/18/httpblogs-scientificamerican-comobservationswp-adminpost-new-phppost_typepost/?WT_mc_id=SA_CAT_TECH_20130423
Caroline 15:43, 23 April 2013 (EDT)Caroline