Difference between revisions of "Privacy in the Online Environment"

From SI410
Jump to: navigation, search
Line 1: Line 1:
'''Privacy in the Online Environment''' (also referred to as information privacy) refers to a user's rights and control over his [http://en.wikipedia.org/wiki/Personal_information personal information] in the digital realm. It allows for the many tiers of privacy (expressed in three theories), while simultaneously letting the users  freely express themselves in whichever manner they choose, without jeopardizing their real identities (refer to [[Anonymous_Behavior_in_Virtual_Environments|Anonymous Behavior in Virtual Environments]]). Privacy in the Online Environment is related to the fields of information privacy and [http://en.wikipedia.org/wiki/Anonymity anonymity] in [http://en.wikipedia.org/wiki/Cyberspace cyberspace].  
+
'''Privacy in the Online Environment''' (also referred to as information privacy) refers to a user's rights and control over his [[Wikipedia:Personal_information|personal information]] in the digital realm. It allows for the many tiers of privacy (expressed in three theories), while simultaneously letting the users  freely express themselves in whichever manner they choose, without jeopardizing their real identities (refer to [[Anonymous_Behavior_in_Virtual_Environments|Anonymous Behavior in Virtual Environments]]). Privacy in the Online Environment is related to the fields of information privacy and [[Wikipedia:Anonymity|anonymity]] in [[Wikipedia:Cyberspace|cyberspace]].  
  
 
== The Complexity of Privacy in Virtual Environments ==
 
== The Complexity of Privacy in Virtual Environments ==
Because there are various types of [[Virtual_Environment|environments]] in the web, we must distinguish the need for privacy in each kind of environment.  For example, the amount of information one would give to other users when playing a [http://en.wikipedia.org/wiki/Massively_multiplayer_online_role-playing_game massively multiplayer online role-playing game] (MMORPG), such as [http://en.wikipedia.org/wiki/World_of_warcraft World of Warcraft], is probably not the same as the content one might share with friends when playing [http://en.wikipedia.org/wiki/Halo_3 Halo 3] or interacting on [http://en.wikipedia.org/wiki/Facebook Facebook].  The dynamics of privacy become increasingly complex as the number of users increases.  If other users in the environment are exclusively friends, one may not want to hide their real name, phone number and home address.  However, if the environment is occupied by millions of unknown people, an individual may not want to share as much of their [http://en.wikipedia.org/wiki/Personal_information personal information].  One may choose to remain completely [http://en.wikipedia.org/wiki/Anonymity anonymous] or could configure privacy settings to ensure greater protection over such information.
+
Because there are various types of [[Virtual_Environment|environments]] in the web, we must distinguish the need for privacy in each kind of environment.  For example, the amount of information one would give to other users when playing a [[Wikipedia:Massively_multiplayer_online_role-playing_game|massively multiplayer online role-playing game]] (MMORPG), such as [[Wikipedia:World_of_warcraft|World of Warcraft]], is probably not the same as the content one might share with friends when playing [[Wikipedia:Halo_3|Halo 3]] or interacting on [[Wikipedia:Facebook|Facebook]].  The dynamics of privacy become increasingly complex as the number of users increases.  If other users in the environment are exclusively friends, one may not want to hide their real name, phone number and home address.  However, if the environment is occupied by millions of unknown people, an individual may not want to share as much of their [[Wikipedia:Personal_information|personal information]].  One may choose to remain completely [[Wikipedia:Anonymity|anonymous]] or could configure privacy settings to ensure greater protection over such information.
 
   
 
   
Privacy, or information privacy, has been directly linked to [http://en.wikipedia.org/wiki/Personal_identity personal identity]. According to David Shoemaker, "a threat to informational privacy is a threat to our personal identity <ref> Shoemaker, David. "Self-exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity." Ethics and Information Technology 12.1 (2009): 3-15. SpringerLink. 3 Apr. 2009. Web. <http://dx.doi.org/10.1007/s10676-009-9186-x>. </ref>." There are several connections between information offered on the internet and personal identity, which participants  should recognize and choose as most integral to their virtual environment.
+
Privacy, or information privacy, has been directly linked to [[Wikipedia:Personal_identity|personal identity]]. According to David Shoemaker, "a threat to informational privacy is a threat to our personal identity <ref> Shoemaker, David. "Self-exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity." Ethics and Information Technology 12.1 (2009): 3-15. SpringerLink. 3 Apr. 2009. Web. <http://dx.doi.org/10.1007/s10676-009-9186-x>. </ref>." There are several connections between information offered on the internet and personal identity, which participants  should recognize and choose as most integral to their virtual environment.
  
 
Limitations and cases to where a user's privacy is just and necessary are under constant development. Any breaches of a user's privacy is subject to penalization.
 
Limitations and cases to where a user's privacy is just and necessary are under constant development. Any breaches of a user's privacy is subject to penalization.
Line 20: Line 20:
 
Developed by [[James H. Moor|James Moor]] and Herman T. Tavani, RALC is a hybrid of the two aforementioned theories. It states that the user has privacy to his personal information depending on the context of the situation.  
 
Developed by [[James H. Moor|James Moor]] and Herman T. Tavani, RALC is a hybrid of the two aforementioned theories. It states that the user has privacy to his personal information depending on the context of the situation.  
 
# The distinction from the Control and Limited Theory is the case of 'condition of privacy' versus 'the right of privacy'.
 
# The distinction from the Control and Limited Theory is the case of 'condition of privacy' versus 'the right of privacy'.
# The 'condition of privacy' states that if the user exposes his personal information, he has lost his privacy. In contrast, if the user did not choose to reveal certain information yet said information is used without permission, 'the right of privacy' recognizes this as a [http://en.wikipedia.org/wiki/Violation_of_privacy violation of privacy].
+
# The 'condition of privacy' states that if the user exposes his personal information, he has lost his privacy. In contrast, if the user did not choose to reveal certain information yet said information is used without permission, 'the right of privacy' recognizes this as a [[Wikipedia:Violation_of_privacy|violation of privacy]].
 
#* The latter case occurs when there is a violation of privacy in the normative sense (i.e. conventional, legal, ethical). An example of this is the unsolicited sharing of one's medical information.   
 
#* The latter case occurs when there is a violation of privacy in the normative sense (i.e. conventional, legal, ethical). An example of this is the unsolicited sharing of one's medical information.   
 
#* The Limited Control Theory is more appropriate in defining the boundaries of a normative zone of privacy (i.e. one can share medical information with certain persons).  
 
#* The Limited Control Theory is more appropriate in defining the boundaries of a normative zone of privacy (i.e. one can share medical information with certain persons).  
Line 29: Line 29:
 
[[image:Privacy.jpg|2000px|thumb|right|How far will YOU go to protect your privacy?]]
 
[[image:Privacy.jpg|2000px|thumb|right|How far will YOU go to protect your privacy?]]
  
There exists a dichotomy in the [http://en.wikipedia.org/wiki/Information_sharing sharing of information], that is, publicly available information and partially available information. There has been an ongoing controversy stemming from the former case. [http://en.wikipedia.org/wiki/Data_mining Data Mining], the collection and use of publicly shared pieces of information (via databases, television, records, etc), has been alleged to be a blatant violation of one's information privacy. Specifically, the term "use" is vague, but can extend to a company using personal information and observed behavioral patterns to develop a profitable algorithm and/or enterprise. This issue of data mining and [http://en.wikipedia.org/wiki/Violation_of_privacy violation of privacy] comes into conflict with all three theories (i.e. Control, Limitation, RALC).  
+
There exists a dichotomy in the [[Wikipedia:Information_sharing|sharing of information]], that is, publicly available information and partially available information. There has been an ongoing controversy stemming from the former case. [[Wikipedia:Data_mining|Data Mining]], the collection and use of publicly shared pieces of information (via databases, television, records, etc), has been alleged to be a blatant violation of one's information privacy. Specifically, the term "use" is vague, but can extend to a company using personal information and observed behavioral patterns to develop a profitable algorithm and/or enterprise. This issue of data mining and [[Wikipedia:Violation_of_privacy|violation of privacy]] comes into conflict with all three theories (i.e. Control, Limitation, RALC).  
  
 
Helen Nissenbaum points out the unethical aspects of data mining:  
 
Helen Nissenbaum points out the unethical aspects of data mining:  
Line 35: Line 35:
 
* certain collections or patterns of information may expose the identity of a person in an unexpected way
 
* certain collections or patterns of information may expose the identity of a person in an unexpected way
  
Users are therefore vulnerable to [http://en.wikipedia.org/wiki/Identity_theft identity theft] per se by merely cooperating in any kind of environment, especially virtual. One's real identity can be put at risk if the right amount of the correctly collected bits of information fall into the hands of an [http://en.wikipedia.org/wiki/Unauthorized unauthorized] viewer. Information revealed over the online environment lends itself to four self-identities: Self-determination, Narrative, Social, and Self-esteem. These four categories possess a subset of qualities that will contribute to the understanding of a person. <br>For example, one's beliefs, emotional dispositions, religious values, etc.
+
Users are therefore vulnerable to [[Wikipedia:Identity_theft|identity theft]] per se by merely cooperating in any kind of environment, especially virtual. One's real identity can be put at risk if the right amount of the correctly collected bits of information fall into the hands of an [[Wikipedia:Unauthorized|unauthorized]] viewer. Information revealed over the online environment lends itself to four self-identities: Self-determination, Narrative, Social, and Self-esteem. These four categories possess a subset of qualities that will contribute to the understanding of a person. For example, one's beliefs, emotional dispositions, religious values, etc.
  
 
===Self-Identities in an Online Environment===
 
===Self-Identities in an Online Environment===
Line 45: Line 45:
  
 
===='''Social Identity'''====
 
===='''Social Identity'''====
Developed by [http://en.wikipedia.org/wiki/Charles_Taylor_(philosopher) Charles Taylor] and Anthony Appiah, this identity joins collective and personal properties of persons that are seen as important for social life (i.e. [http://en.wikipedia.org/wiki/Race_(classification_of_human_beings) race], [http://en.wikipedia.org/wiki/Gender gender], [http://en.wikipedia.org/wiki/Ethnicity ethnicity], [http://en.wikipedia.org/wiki/Religion religion], [http://en.wikipedia.org/wiki/Sexual_orientation sexual orientation]) <ref> http://en.wikipedia.org/wiki/Charles_Taylor_(philosopher) </ref>.
+
Developed by [[Wikipedia:Charles_Taylor_(philosopher)|Charles Taylor]] and Anthony Appiah, this identity joins collective and personal properties of persons that are seen as important for social life (i.e. [[Wikipedia:Race_(classification_of_human_beings)|race]], [[Wikipedia:Gender|gender]], [[Wikipedia:Ethnicity|ethnicity]], [[Wikipedia:Religion|religion]], [[Wikipedia:Sexual_orientation|sexual orientation]]) <ref> http://en.wikipedia.org/wiki/Charles_Taylor_(philosopher) </ref>.
  
 
===='''Self-Esteem Identity'''====
 
===='''Self-Esteem Identity'''====

Revision as of 03:08, 11 December 2012

Privacy in the Online Environment (also referred to as information privacy) refers to a user's rights and control over his personal information in the digital realm. It allows for the many tiers of privacy (expressed in three theories), while simultaneously letting the users freely express themselves in whichever manner they choose, without jeopardizing their real identities (refer to Anonymous Behavior in Virtual Environments). Privacy in the Online Environment is related to the fields of information privacy and anonymity in cyberspace.

The Complexity of Privacy in Virtual Environments

Because there are various types of environments in the web, we must distinguish the need for privacy in each kind of environment. For example, the amount of information one would give to other users when playing a massively multiplayer online role-playing game (MMORPG), such as World of Warcraft, is probably not the same as the content one might share with friends when playing Halo 3 or interacting on Facebook. The dynamics of privacy become increasingly complex as the number of users increases. If other users in the environment are exclusively friends, one may not want to hide their real name, phone number and home address. However, if the environment is occupied by millions of unknown people, an individual may not want to share as much of their personal information. One may choose to remain completely anonymous or could configure privacy settings to ensure greater protection over such information.

Privacy, or information privacy, has been directly linked to personal identity. According to David Shoemaker, "a threat to informational privacy is a threat to our personal identity [1]." There are several connections between information offered on the internet and personal identity, which participants should recognize and choose as most integral to their virtual environment.

Limitations and cases to where a user's privacy is just and necessary are under constant development. Any breaches of a user's privacy is subject to penalization.

Theories

Information privacy is categorized by three theories: Control Theory, Limitation Theory, Restricted Access/Limited Control Theory.

Control Theory

Developed by Peter Burke, states that informational privacy exists only when the user has control over some domains of unrevealed personal information. This theory does not specify what constitutes as a zone of personal information, and why, and the extent of the user's control over said information.

Limitation Theory

Created by Herman T. Tavani in response to vagueness in Control Theory. This theory states that informational privacy exists when personal information is limited or restricted in certain contexts. Does not specify how the user's zone of privacy is constructed (i.e. the ability to grant or deny access to viewers).

Restricted Access/Limited Control Theory (RALC)

Developed by James Moor and Herman T. Tavani, RALC is a hybrid of the two aforementioned theories. It states that the user has privacy to his personal information depending on the context of the situation.

  1. The distinction from the Control and Limited Theory is the case of 'condition of privacy' versus 'the right of privacy'.
  2. The 'condition of privacy' states that if the user exposes his personal information, he has lost his privacy. In contrast, if the user did not choose to reveal certain information yet said information is used without permission, 'the right of privacy' recognizes this as a violation of privacy.
    • The latter case occurs when there is a violation of privacy in the normative sense (i.e. conventional, legal, ethical). An example of this is the unsolicited sharing of one's medical information.
    • The Limited Control Theory is more appropriate in defining the boundaries of a normative zone of privacy (i.e. one can share medical information with certain persons).

It is therefore context sensitive; and it is not the information itself, but the circumstance or the zone of privacy that is analyzed to decide whether said information should be normatively protected.

Protecting Privacy

How far will YOU go to protect your privacy?

There exists a dichotomy in the sharing of information, that is, publicly available information and partially available information. There has been an ongoing controversy stemming from the former case. Data Mining, the collection and use of publicly shared pieces of information (via databases, television, records, etc), has been alleged to be a blatant violation of one's information privacy. Specifically, the term "use" is vague, but can extend to a company using personal information and observed behavioral patterns to develop a profitable algorithm and/or enterprise. This issue of data mining and violation of privacy comes into conflict with all three theories (i.e. Control, Limitation, RALC).

Helen Nissenbaum points out the unethical aspects of data mining:

  • data mined is collected in one context, and used in another context. For example, manipulation of information and negative portrayal of character.
  • certain collections or patterns of information may expose the identity of a person in an unexpected way

Users are therefore vulnerable to identity theft per se by merely cooperating in any kind of environment, especially virtual. One's real identity can be put at risk if the right amount of the correctly collected bits of information fall into the hands of an unauthorized viewer. Information revealed over the online environment lends itself to four self-identities: Self-determination, Narrative, Social, and Self-esteem. These four categories possess a subset of qualities that will contribute to the understanding of a person. For example, one's beliefs, emotional dispositions, religious values, etc.

Self-Identities in an Online Environment

Self-determination

Created by Harry Frankfurt, states that psychological elements that govern one are only truly authorized by himself. 'Psychological elements' such as hope, theoretical beliefs, motivations, etc evidently lend to self-identity.

Narrative

This identity was developed by Marya Schechtman, and states that an identity is conceived through one's decision to impart importance on certain psychological features and by giving said features an intelligible place in his life.

Social Identity

Developed by Charles Taylor and Anthony Appiah, this identity joins collective and personal properties of persons that are seen as important for social life (i.e. race, gender, ethnicity, religion, sexual orientation) [2].

Self-Esteem Identity

David Copp asserts that there are clear properties a part of self-identity if there are positive or negative emotions consistently associated with certain situations [3]. For example, an aspiring student will almost always feel disappointment when receiving a lower grade on an exam.

See Also

References

  1. Shoemaker, David. "Self-exposure and Exposure of the Self: Informational Privacy and the Presentation of Identity." Ethics and Information Technology 12.1 (2009): 3-15. SpringerLink. 3 Apr. 2009. Web. <http://dx.doi.org/10.1007/s10676-009-9186-x>.
  2. http://en.wikipedia.org/wiki/Charles_Taylor_(philosopher)
  3. Copp, David (2005). The normativity of self-grounded reason. Social Philosophy and Policy 22 (2):165-203.<http://philpapers.org/rec/COPTNO>

(back to index)