CS 1590

 

Social Implications of Computing Technology

syllabus homework readings notes grades

 

 


Chapter 4: Privacy in Cyberspace

Definitions of Privacy:

  • Warren and Brandeis. -(Harvard guys) The right to some measure of solitude in one's life.

  • Gavison. The limitation of other's access to an individual with three key elements: secrecy, anonymity, and solitude.
    Information Privacy:  collection, use, and dissemination of information about individuals.

  • Control Theory. - One has privacy iff one has control over one's information.

  • Restricted Access Theory. - Like Gavison's approach.

Loss of Privacy Leads to:

  • Extrinsic loss of freedom. - having your behavior controlled by others by misuse of information

  • Intrinsic loss of freedom. - behavior different when knowingly being monitored.

    Without privacy we are more subject to the manipulation and control of others.

    Privacy vs Free speech

    Private or personal?

    Private or personal?

Privacy-Invasive Technologies:

  • Data collection from online transactions.

  • Clickstream data.

  • Cookies.

Privacy Legislation in the United States:

  • Right to Financial Privacy.

  • Children's Online Privacy Protection Act.

  • Health Insurance Portability and Accountability Act.

  • Compared to Europe.

Privacy Architectures:

  • Intel's plan to put identification numbers in chips, and reactions.

  • World Wide Web Consortium's Platform for Privacy Preferences Project.

Important Cases:

  • Smyth v. Pillsbury.

  • DoubleClick.

  • Amazon's Privacy Policies.

online privacy