Chapter #5 Flashcards
Three Privacy Types
(Things)
Consumer Privacy
Medical/Healthcare Privacy
Employee/Workplace Privacy
Privacy concerns have been (exacerbated) increased by cybertechnology in at least four ways
- amount of personal data that can now be collected
- speed at which personal information can now be transferred and exchanged
- duration of time in which personal information can be retained
- kind of personal information that can be acquired (ex transactional)
What is Personal Privacy? What can happen to it?
lost,
diminished,
intruded upon,
invaded,
violated,
breached.
Classic Theories of Privacy
non-intrusion (into one’s space),
non-interference (with one’s decisions),
having control over/restricting access to one’s personal information.
Non-intrusion theories view privacy as either:
or Accessibility Privacy
being left alone,
being free from government intrusion (into one’s physical space).
This view is also sometimes referred to as accessibility privacy.
Informational Privacy
is concerned with protecting personal information in computer databases
Most people wish to have some control over their personal information.
In some cases, “privacy zones” have been set up either to restrict or limit access to one’s personal data.
Decisional Privacy
Privacy is defined in terms of freedom from interface in ones choices and desisions.
Moor’s Comprehensive Theory of Privacy
“an individual has privacy in a situation if in that particular situation the individual is protected from intrusion, interference, and information access by others.”
Mary Examples
Nissenabum’s Theory of Privacy as “Contextual Integrity”
Helen Nissenbaum’s “privacy as contextual integrity” framework requires that the processes used in gathering and disseminating information are
“appropriate to a particular context”
comply with norms that govern the flow of personal information in a given context.
Is Privacy an Intrinsic or an Instrumental Value
Privacy does not seem to be valued for its own sake, and thus does not appear to have intrinsic worth.
But privacy also seems to be more than merely an instrumental value because it is necessary (rather than merely contingent) for achieving important human ends.
Moor believes that privacy can be viewed as an expression of a “core value” – viz., security, which is essential for “human flourishing.”
Privacy as a Universal Value
Privacy has at least some importance in all societies, but it is not valued the same in all cultures.
Privacy as an Important Social Value
Priscilla Regan notes that we tend to underestimate the importance of privacy as an important social value (as well as an individual value).
Regan also believes that if we frame the privacy debate in terms of privacy as a social value (essential for democracy), as opposed to an individual good, the importance of privacy is better understood.
Cybertechology-related Techniques that Threaten Privacy
Data-gathering techniques: used to collect and record personal information, often without the knowledge and consent of users.
Data analysis techniques: including data mining, used to manipulate large data sets of personal information to discover patterns and generate consumer profiles (also typically without the knowledge and consent of users).
Dataveillance
captures, surveillance (data-monitoring) and data-recording.
Big Data
Large volumes of data, but is also measured by variety, velocity, veracity.