Privacy in public
Contents
Applications
Data Mining
In David Shoemaker's 2009 paper, Self-exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity, he explains the “puzzle” of privacy in public with reference to data mining. Data mining is the process by which existing data is analyzed in order to create new data which relies on preexisting personal data sets widely available in public. [2] Data miners use a large set of data from various sources to make connections and draw conclusions. He states that data miners draw on bits of publicly available information, such as social media or public records. These data miners are seen as unethical by informational subjects who believe their privacy has been violated because their personal data has been taken out of context and packaged into a data sets portraying their digital identity. [3] [4]
Social Media
One way that this public data comes to exist is through social media. Social media is the collection of the social network sites that engage people through user accounts via the internet. Some examples are Facebook, Instagram, and Twitter. These accounts can be “private” or “public” as decided by the user. It is important to note that all information posted on these websites are voluntarily supplied by the user. While not every account is publicly accessible, all information supplied to these sites is accessible in some way.
Social media use is an example of a public in privacy. Facebook is a public domain where users voluntarily share their personal thoughts or stories through posts. Accessing this public sphere in a private setting, such as using a phone or personal computer, deems social media a public available in privacy. Therefore, the information that is posted to Facebook is public data, thus making it a target for data mining. For example, data miners might be interested in how many Facebook users between the ages of 18 and 25 are “in a relationship.” Twitter is also a major social media platform which exemplifies the online aggregation of public data. Like Facebook, the data that is posted on the platform is subject to data mining and scraping. Especially in today's recent political climate, Twitter's use has increased tremendously and it has become an even larger target for data mining. The discussion of data mining, with respect to public data, is often masked by the crime-prevention veil of public surveillance.
Public Surveillance
Public surveillance is the idea that your privacy is ignored in public settings. A few examples of this are facial recognition at the Superbowl[5], fingerprint scanning at Disney World,[6] and public collections of phone numbers and email addresses through retail store databases. [3]. Public surveillance, however, is a (violation of) privacy in public. Private and personal details, such as eye color, fingerprints, telephone number, and address can all be accessed publicly, in a public setting, such as Disney World or a football stadium. This is where technology jumps to the unethical side.
Google Street View
Google StreetView is one of the many technologies offered through Google Earth and Google Maps. [7] From web browsers or mobile devices, users can view 360 degree virtual representations of public settings. The algorithms used within Google Street View automatically blur faces and license plates. Google will also blur houses or other private pieces of land upon request. [7] In spite of Google's attempts to maintain the privacy of pedestrians and other private entities, there have been a number of unique cases that have emerged in the past several years involving the invasion of privacy for individuals who would otherwise prefer to remain anonymous or unbothered. [8]
Video Recording in Public
In the age where YouTube vloggers are some of the most famous societal influencers, there is a new frontier of privacy to be faced. When vloggers make their own private recordings in public spaces, they often record people in their surroundings who don't know and/or don't consent to being recorded. Then, these private recordings are posted to the internet for everyone in public to see.
In the past, it was only more "professional" people that were recording others in public. For example, if a reality TV show was being recorded in public, because the recording was for a network, they would blur out the faces of background people. Now that these recordings are private, however, that corporate level of respect for privacy is gone, and people are recorded and posted to the internet without their consent.
Ethics
Surveillance and Privacy
The Fourth Amendment in the United States constitution protects citizens against unwanted searches and seizures of property from the government. It is a central component to criminal and privacy law, allowing citizens the right to security in personal boundaries within society. When the Fourth Amendment is applied to privacy in public, it is referring to the right to be respected and secure in unwanted intrusion of.[1]. If a citizen in the United States does not wish to share his or her personal details and has not disclosed to publicly, then those pieces of information should be left private.
Some personal information surrounding an individual typically becomes public information once they leave their private residence and enter the public domain. The notion of a break down of information privacy barriers is what Floridi describes in chapter 6 of the Cambridge handbook to information ethics as a lack of informational friction.[9] What car one drives, what clothes and brands someone wears, their marital status, spoken language, and physical appearance can lend a great deal of information to who you are as a person. Income can be estimated, individual location can be ascertained, and physical identity can be described based on watching an individual walk from their house to their car. Though this might not be an accurate reading, it is a breach of privacy that most humans forgo by existing outside of their personal dwellings. Is being recorded a breach of privacy one overlooks or simply dismissed in order to watch a sporting event live? As Shoemaker says, “it is no wonder that most of us have reason to object to the sort of profiling produced by data mining. That a stranger may come to know our flaws is mortifying.” He continues, “when it comes to the exposure of ourselves, most of us prefer that our selves be the ones doing the exposing.” [3] It is a matter of autonomy and control at the root of the numerous violations of privacy in public.
With the rise of Surveillance Technologies in the public space, there are large amounts of uncertainty on who is observing an individual’s actions. This impacts a person’s sense of freedom and discretion. Regardless if a person knows they are being surveilled or not, surveillance affects a person’s experience and abilities in a space [10]. For example, video cameras implemented in public areas for security purposes are a common mode of surveillance. However, this means innocent people are being constantly monitored and the information collected can be used in ways unknown to the individual. This ultimately affects privacy because this is consequential for a person’s sense of self ownership [10]. As forms of surveillance increase in public spaces, including online spaces, a person’s ability to protect their privacy is greatly limited.
Expungement
Expungement in the age of social media and mass media has become a hot topic in the domain of public privacy. Laws on Expungement differ state to state, with some former criminals able to apply for expungement after 5 years from an encounter with the law. While the time frame for applicability seems reasonable, implementation and other concerns surrounding the practice are of concern. Expungement is granted to relatively few applicants each year, usually later than the 5 year minimum to apply, and once it is granted, it can be difficult to fully remove the records from the internet due to the development of data-brokers. Data-brokers scrape the internet for records on individuals, storing that data and sometimes failing to update these records years past[11]. It is probable that an individual with even a first-time minor offender could be locked out of future employment opportunity due to criminal background searches conducted via outdated data-brokers[11]. The concern surrounding future employment is one of the main ones, as there can be as much as a 20% increase in employ-ability post-expungement as compared to pre-expungement[12]. The presence of any sort of criminal record is typically a deterrent for prospective employers and a burden for those seeking or receiving expungement and one of the easiest ways to access these records is through a simple Google search. In certain cases it should be, and sometimes is, possible to remove oneself from Google searches online (called delinking). As Luciano Floridi describes, it is possible to remove oneself from Google within several European nations but as Floridi argues, it should occur solely within national boundaries, not across international borders[9]. Floridi argues that those searching for an individual through Google are almost always searching from within the same nation[9], as is the case in the U.S. with employers looking at criminal records of almost exclusively U.S. citizens.
See Also
References
- ↑ 1.0 1.1 Slobogin, Christopher. “Public Privacy: Camera Surveillance of Public Places Andthe Right to Anonymity.” SSRN Electronic Journal, 2003, doi:10.2139/ssrn.364600.
- ↑ "What Is Data Mining?" SAS. Accessed March 15, 2019. https://www.sas.com/en_us/insights/analytics/data-mining.html.
- ↑ 3.0 3.1 3.2 Shoemaker, David W. "Self-exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity." Ethics and Information Technology 12, no. 1 (2009): 3-15. doi:10.1007/s10676-009-9186-x.
- ↑ Stanford University Press Privacy In Context Hellen Nissenbaum 2009
- ↑ Woodward, John D., Super Bowl Surveillance: Facing Up to Biometrics. Santa Monica, CA: RAND Corporation, 2001. https://www.rand.org/pubs/issue_papers/IP209.html.
- ↑ Mathews, Devante. "Walt Disney World Now Requires Biometric Finger Scan for Children!" Orlando Tickets, Hotels, Packages. August 30, 2016. https://www.orlando-florida.net/walt-disney-world-now-requires-biometric-finger-scan-children/
- ↑ 7.0 7.1 “Discover Street View and Contribute Your Own Imagery to Google Maps.” Google, Google, www.google.com/streetview/.
- ↑ "Google admits it sniffed out people's data". TechEye. May 17, 2010.
- ↑ 9.0 9.1 9.2 Floridi, Luciano. The 4th Revolution How the Infosphere Is Reshaping Human Reality. Oxford University Press, 2014.
- ↑ 10.0 10.1 Patton, J.W. Ethics and Information Technology-Protecting Privacy in Public? (2000) 2: 181. https://doi.org/10.1023/A:1010057606781
- ↑ 11.0 11.1 Wayne, Logan Danielle. “THE DATA-BROKER THREAT: PROPOSING FEDERAL LEGISLATION TO PROTECT POST-EXPUNGEMENT PRIVACY.” The Journal of Criminal Law and Criminology, vol. 102, no. 1, 2012.
- ↑ Prescot, J.J., and Sonja B. Starr. “The Case for Expunging Criminal Records.” The New York Times, 20 Mar. 2019.