history and philosophy of privacy
Post on 10-Feb-2016
59 Views
Preview:
DESCRIPTION
TRANSCRIPT
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/1
History and Philosophy of History and Philosophy of PrivacyPrivacy
September 4, 2007
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/2
Finding info with search Finding info with search enginesenginesGeneral purpose search engines
• Google, Yahoo, Altavista, A9, etc.
Clustered searching• Vivisimo, Dogpile
Search CS research literature• http://portal.acm.org• http://citeseer.ist.psu.edu/• http://ieeexplore.ieee.org/• http://scholar.google.com/
Research and Communication Skills
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/3
Advanced searchingAdvanced searching Boolean searching• Operators: AND, OR, NOT, NEAR• Implied operators: AND is often implied• Parentheses for grouping• Wildcards• Quotes
Getting to know the ins and outs of your favorite search engines• Many search engines do not use pure boolean
searching• Most search engines have some special syntax• Search engines use different algorithms to determine
best match
Research and Communication Skills
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/4
Advanced GooglingAdvanced Googling See
http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Google.html
Ranks results using PageRank algorithm, taking into account popularity, importance, word proximity
Special syntax• intitle, inurl, site, intext, filetype, daterange, numrange• Boolean operators: OR, -• Fuzzy searching: ~, .., *• Exact phrases: “”
10-term limit Special searches Definitions (define), calculator, area codes, flight
searches, and more
Research and Communication Skills
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/5
What is privacy?What is privacy?
“Being alone.”- Shane (age 4)
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/6
Multiple conceptions of privacyMultiple conceptions of privacyPersonhood
Intimacy
Secrecy
Limited access to the self
Control over information
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/7
Westin “Privacy and Freedom” Westin “Privacy and Freedom” 19671967
“Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others”
“desire for privacy is never absolute”
“each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication….”
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/8
Westin’s four states of privacyWestin’s four states of privacy Solitude • individual separated form the group and freed form the
observation of other persons
Intimacy • individual is part of a small unit
Anonymity • individual in public but still seeks and finds freedom
from identification and surveillance
Reserve• the creation of a psychological barrier against
unwanted intrusion - holding back communication
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/9
Westin’s four functions of Westin’s four functions of privacyprivacy
Personal autonomy• control when you go public about info
Emotional release• be yourself• permissible deviations to social or institutional
norms
Self-evaluation
Limited and protected communication
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/10
Solove’s privacy taxonomySolove’s privacy taxonomy Information Collection
• Surveillance• Interrogation
Information Processing• Aggregation• Identification• Insecurity• Secondary Use• Exclusion
Information Dissemination• Breach of Confidentiality• Disclosure• Exposure• Increased Accessibility• Blackmail• Appropriation• Distortion
Invasion• Intrusion• Decisional Interference
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/11
Information vs. decisional Information vs. decisional privacyprivacy
Information privacy concerns the collection, use, and disclosure of personal information
Decisional privacy concerns the freedom to make decisions about one's body and family
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/12
Limited access vs. controlLimited access vs. controlPrivacy as limited access to self• the extent to which we are known to others and
the extent to which others have physical access to us
Privacy as control over information• not simply limiting what others know about you,
but controlling it• this assumes individual autonomy, that you
can control information in a meaningful way (not blind click through, for example)
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/13
Multiple facets of privacyMultiple facets of privacyHow can posting personal information
about myself on my web site result in a reduction of my privacy? How can it result in an increase in my privacy?
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/14
Privacy as deprivation?Privacy as deprivation?Deprived of being heard and seen by
others
Deprived of being contacted by others
Deprived of benefits that come as a result of your personal information being available to others
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/15
Privacy as animal instinct?Privacy as animal instinct?
Eagles eating a deer carcass http://www.learner.org/jnorth/tm/eagle/CaptureE63.html
Is privacy necessary for species survival?
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/16
Information privacyInformation privacyIn 17th century America, colonists began to
collect information about each other• Census, birth and death records, school
records, tax records
Informants reported people who behaved badly• Disorderly children, nightwalkers, Sabbath
breakers, atheists, drunks
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/17
Privacy of personal spacePrivacy of personal spaceHistorically, depended a lot on the type and
proximity of available housing
In 18th century Europe, most people lived in cities where houses were close together, but small number of people lived in each house
In 18th century America, people lived far away from each other but many people lived in each house and even shared beds
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/18
Communication privacyCommunication privacy When all communication was oral,
communication privacy depended on• Communicating without someone overhearing• Communicating with people who wouldn’t tell others
Written communications brought new opportunities for privacy violations
In 18th century America, postal mail was not necessarily private• Sealing wax, basic encryption used to increase privacy• 1782 - Congress made it illegal to open other peoples’
mail• Later the invention of the adhesive envelope increased
communications privacy
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/19
TelegraphTelegraphIn the late nineteenth century the telegraph
became a popular means of long distance communication
Messages could be coded, but you could not recover damages due to transmission errors if the message was coded
Telegraph operators were supposed to keep messages confidential
Occasional subpoenas for telegraph messages
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/20
CamerasCamerasCameras, especially portable “snap”
cameras (1888), raised new privacy concerns
Telephoto lenses
Video cameras
Hidden cameras
Web cams
Satellite images
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/21
The Prada NYC dressing roomThe Prada NYC dressing room http://www.sggprivalite
.com/
What aspects seem privacy invasive?
How could the design be changed to reduce privacy concerns?
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/22
Discussion questionsDiscussion questionsWhich technologies are privacy invasive?
Which technologies are privacy protective?
Can we turn one into the other?
Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/23
Privacy History ReferencesPrivacy History ReferencesRobert Ellis Smith. 2000. Ben Franklin’s
Web Site: Privacy and Curiosity from Plymouth Rock to the Internet. Providence: Privacy Journal.
Alan Westin. 1967. Privacy and Freedom. New York: Atheneum.
top related