IT and Privacy Flashcards

1
Q

Privacy Morality meaning?

A
  • your moral commitments in your personal life
    Example. utilitarian greater good, Kantian autonomy, integrity to personal values
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Public morality meaning?

A
  • your moral commitments in your professional life
    E.g. loyalty, duty to employer, non-disclosure/confidentiality
    Professional obligations to protect privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Negative consequences of IT and privacy?

A

Data breaches
Criminal activity
Surveillance capitalism
Collection and commodification of personal data by corporations
Threats and innovations in IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A right to share vs a right to not share information?

A

a right to privacy) vs
A right to know, a right to access personal information)
Celebrities vs fans
Governments vs citizens
Corporations vs customers/clients
Employers vs employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Constitutional (decisional) vs Tort (or informational) privacy

A

decisional:
Freedom to make personal decisions without interference by others in personal or intimate matters
Legal/political right to do as you please in private

Informational: Exercising control over access to information about themselves
The right to know (and correct) the information held about you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Difference between Reductionist, Non- reductionist, and cluster accounts

A

Reductionist:
Privacy claims are really about other values (privacy reduces to…)
Property rights, security, intimacy, democracy, liberty, etc.

Non-reductionist:
Privacy claims are not-reducible. Privacy is valuable in itself, and itself a human right.

Cluster accounts:
A cluster of related moral claims underlying appeals to privacy, but no single, essential core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Moral reasons for protecting personal data?

A
  1. harm prevention
    Unrestricted access by others
  2. informational inequality
    Commodification – users typically not in a good position to negotiate contracts about the use of their data
  3. informational injustice and discrimination
    Information collected in one sphere (eg health care) changes its meaning when used in another sphere (eg insurance)
  4. encroachment on moral autonomy and human dignity
    Lack of privacy may expose people to outside coercive forces (eg mass surveillance)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the developments in IT

A
  • Capacity and speed
    Storage capacity on exabyte level
  • Connectivity and interaction
    Physical space less important
  • Access to info (and personal data) has increased
  • Increases in the possibility for agents to act based on new sources of info
    Context for use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The impact of IT on privacy?

A
  • Internet
  • Social media: show our profile and life for everyone to see.
  • Data mining:
    Information explicitly entered by users, but also statistics on user behaviour (eg sites visited, links clicked, search terms entered)
    – Mobile devices:
    Data generating sensors, eg. GPS (location), movement sensors, cameras (data may be transmitted via the internet or other networks)
  • Threats of physical harm (stalking, burglary during holidays)
  • User awareness of camera activity:
    Engagement lights may be manipulated by malicious software
  • The ‘Internet of Things’
    All our devices are connected in the internet of things
    Computing devices, but also:
    RFID chips
    Smart meters
    Smart home devices
    Household appliances
    All transmit data that can be traced back to the user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The impact of privacy part 2

A

E-government:
Biometric passports
Voting systems
Privacy protects against vote buying, coercion
In some US states it is illegal to take a selfie in a voting booth with your completed ballot
Targeted misinformation
Influence election results
- Surveillance:
CCTV and other camera systems
Facial recognition may lead to profiling, injustice, discrimination
Surveillance capitalism
Data generates prediction models of individual users
Uses by intelligence services and law enforcement in the name of the ‘greater good’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can IT itself solve privacy concerns?

A

Design methods
“Privacy by design”
Value sensitive approach
“Privacy engineering”
Proactive incorporation of privacy and data protection (rather than add-on or reactive)
- Privacy enhancing technologies
Software tools such as Tor or Freenet browsers
- Identity management
- Cryptography: the practice and study of hiding information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A history of privacy?

A

1890 – Warren and Brandeis published in the Harvard Law Review protesting the intrusive activities of journalists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly