Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

ARE PRIVACY CONCERNS ASSOCIATED WITH CYBERTECHNOLOGY UNIQUE OR SPECIAL? Concerns about personal privacy existed long before the advent of computers and cybertechnology. Prior to the

ARE PRIVACY CONCERNS ASSOCIATED WITH

CYBERTECHNOLOGY UNIQUE OR SPECIAL?

Concerns about personal privacy existed long before the advent of computers and

cybertechnology. Prior to the information era, for example, technologies such as the

camera and the telephone presented challenges for privacy. Cybertechnology makes it possible to collect and store much more information about

individuals than was possible in the precomputer era. The amount of personal information

that could be collected in the precomputer era was determined by practical

considerations, such as the physical space required to store the data and the time and

difficulty involved in collecting the data. Today, of course, digitized information that can

be stored electronically in computer databases takes up very little storage space and can

be collected with relative ease.

Consider the speed at which information is exchanged and transferred between

databases. At one time, records had to be physically transported between filing destinations;

the time it took to move them depended upon the transportation systemse.g.,

motor vehicles, trains, airplanes, and so forththat carried the records. Now, of course,

records can be transferred between electronic databases in milliseconds through wireless

technologies, high-speed cable lines, or even ordinary telephone lines.

Cybertechnology has also generated privacy concerns because of the kind of

personal information that can now be collected. For example, every time you engage

in an electronic transaction, such as making a purchase with a credit card or withdrawing

money from an ATM, transactional information is collected and stored in several

computer databases; this information can then be transferred electronically across

commercial networks to agencies that request it. Personal information, retrieved from

transactional information that is stored in computer databases, has been used to construct

electronic dossiers containing detailed information about an individuals commercial

transactions, including purchases made and places traveledinformation that can reveal

patterns in a persons preferences and habits.

Additionally, we should note that cybertechnology raises privacy concerns because

of the myriad ways in which it enables our personal information to be manipulated

(e.g., merged,

WHAT IS PERSONAL PRIVACY?

Although many definitions of privacy have been put forth, there is no universally agreed

upon definition of this concept. To illustrate this point, consider some of the metaphors

that are typically associated with privacy. Sometimes we speak of privacy as something

that can be lost or diminished, suggesting that privacy can be understood in terms of a

repository of personal information that can be either diminished altogether or gradually

eroded. Contrast this view with descriptions of privacy as something that can be intruded

upon or invaded, where privacy can be understood in terms of a spatial metaphor, such as

a zone, that deserves protection. Alternatively, privacy is sometimes described as

something that can be violated or breached, when we think of it in terms of either a

right or an interest that deserves legal protection

Accessibility Privacy: Freedom from Unwarranted Intrusion

Many Americans are astonished

to find out that there is no explicit mention of privacy in either the Constitution or its first

ten amendments, the Bill of Rights. However, some legal scholars believe that a right to

privacy can be inferred from the Fourth Amendment, which protects citizens against

unreasonable searches and seizures of personal affects (i.e., papers, artifacts, etc.) by the

government. Many legal scholars believe that the Fourth Amendment also provides legal

grounds for a right to privacy protection from nongovernmental intrusion as well.

Warren and Brandeis also suggested that our legal right to privacy is grounded in our

right to inviolate personality. In part, they were responding to a certain use of a new

technologynot the computer, of course, but rather the camerawhich had begun to

threaten individual privacy in new ways.2 Photographs of people began to appear in

newspapers, for example, in gossip columns, along with stories that were defamatory and

sometimes even false. Warren and Brandeis believed that individuals have a (legal) right

not be intruded upon in this manner. Because this definition of privacy as freedom from

unwarranted intrusion focuses on the harm that can be caused through physical access to

a person or to a persons possessions, Judith DeCew (1997) and others have described

this view as accessibility privacy.

Decisional Privacy: Freedom from Interference in Ones Personal Affairs

Privacy is also sometimes conceived of as freedom from interference in ones personal

choices, plans, and decisions; some refer to this view as decisional privacy. This kind of

privacy has also been associated with reproductive technologies having to do with

contraception. The view of privacy as freedom from external interference into ones personal affairs has since

been appealed to in legal arguments in a series of controversial court cases, such as those

involving abortion and euthanasia .

Informational Privacy: Control over the Flow of Personal Information

Because of the increasing use of technology to gather and exchange personal information,

many contemporary analysts view privacy in connection with ones ability to restrict

access to and control the flow of ones personal information. Privacy concerns are now

often framed in terms of questions such as: Who should have access to ones personal

information?

A Comprehensive Account of Privacy can be gathered, stored, mined, combined, recombined, exchanged, and sold? Central to Moors theory is a distinction between naturally private and normatively

private situations, enabling us to differentiate between the conditions required for

(a) having privacy and (b) having a right to privacy. This distinction, in turn, enables

us to differentiate between a loss of privacy and a violation of privacy. In a naturally

private situation, individuals are protected from access and interference from others by

natural means, for example, physical boundaries such as those one enjoys while hiking

alone in the woods. In this case, privacy can be lost but not violated, because there are no

normsconventional, legal, or ethicalaccording to which one has a right, or even an

expectation, to be protected. In a normatively private situation, on the other hand,

individuals are protected by conventional norms (e.g., formal laws and informal policies)

because they involve certain kinds of zones or contexts that we have determined to need.

Three Views of Privacy

Accessibility privacy -Privacy is defined as ones physically being let alone, or being free from

intrusion into ones physical space.

Decisional privacy- Privacy is defined as freedom from interference in ones choices and

decisions.

Informational privacy- Privacy is defined as control over the flow of ones personal

information, including the transfer and exchange of that information.

Privacy as Contextual Integrity

Nissenbaums privacy framework requires that the processes used in gathering and

disseminating information (a) are appropriate to a particular context and (b) comply

with norms that govern the flow of personal information in a given context.5 She refers to

these two types of informational norms as follows:

1. Norms of appropriateness.

2. Norms of distribution.

Whereas norms of appropriateness determine whether a given type of personal

information is either appropriate or inappropriate to divulge within a particular context,

norms of distribution restrict or limit the flow of information within and across contexts.

When either norm has been breached, a violation of privacy occurs; conversely, the

contextual integrity of the flow of personal information is maintained when both kinds of

norm s are respected.6

WHY IS PRIVACY IMPORTANT?

We might also question whether the current privacy debate needs to be better

understood in terms of differences that reflect generational attitudes. For many so-called

Millennials, who are now college-aged, privacy does not always seem to be of paramount

importance. Most Millennials, as well as many members of Generations Xand Y, seem all

too eager to share their personal information widely on social networking services such as

Facebook, and many also seem willing to post away messages on AIM or Skype that

disclose their whereabouts at a given moment to a wide range of people. But for many

older Americans, including Baby Boomers, privacy is something that is generally still

valued. So the relative importance of privacy may vary considerably among the generations;

however, we will proceed on the assumption that privacy has value and thus is

important. Even in countries such as Israel, with strong

democratic systems but an even stronger priority for national security, individual privacy

may not be as important a value as it is in most democratic nations. So, even though

privacy has at least some universal appeal, it is not valued to the same degree in all

nations and cultures. As a result, it may be difficult to get universal agreement on privacy

laws and policies in cyberspace.

Is Privacy an Intrinsic Value?

While few would argue that privacy is an intrinsic value, desired for its own sake,

others, including Charles Fried (1990), argue that privacy is not merely an instrumental

value or instrumental good. Fried suggests that unlike most instrumental values that are

simply one means among others for achieving a desired end, privacy is also essential, that

is, necessary to achieve some important human ends, such as trust and friendship. We

tend to associate intrinsic values with necessary conditions and instrumental values with

contingent, or nonnecessary conditions; so while privacy is instrumental in that it is a

means to certain human ends, Fried argues that it is also a necessary condition for

achieving those ends

Privacy as a Social Value

we examine how privacy is threatened by three

different kinds of practices that use cybertechnology:

a. Data gathering techniques used to collect and record personal information, often

without the knowledge and consent of users.

b. Data exchange techniques used to transfer and exchange personal data across

and between computer databases, typically without the knowledge and consent

of users.

c. Data mining techniques used to search large databases in order to generate

consumer profiles based on the behavioral patterns of certain groups.

GATHERING PERSONAL DATA: MONITORING, RECORDING,

AND TRACKING TECHNIQUES

Collecting and recording data about people is hardly new. Since the Roman era, and

possibly before then, governments have collected and recorded census information. Not

all data gathering and data recording practices have caused controversy about privacy.

However, cybertechnology makes it possible to collect data about individuals without

their knowledge and consent. In this section, we examine some controversial ways in

which cybertechnology is used to gather and record personal data, as well as to monitor

and track the activities and locations of individuals.

Dataveillance Techniques

Roger Clarke uses the term dataveillance to capture both the surveillance

(data monitoring) and data recording techniques made possible by computer technology.9

There are, then, two distinct controversies about dataveillance: one having to do with

surveillance as a form of data monitoring, and one having to do with the recording and processing of data once the data are collected. First, we should note the obvious, but relevant, point that privacy threats associated

with surveillance are by no means peculiar to cybertechnology. However, surveillance has clearly been exacerbated by

cybertechnology. In the past, it was not uncommon for companies to hire individuals to monitor the

performance of employees in the workplace. Now, however, there are invisible

supervisors, that is, computers, that can continuously monitor the activities of employees

around the clock without failing to record a single activity of the employee. We will

examine workplace monitoring in detail, including some arguments that have been used

to defend and to denounce computerized monitoring,

Internet Cookies

Cookies are files that Web sites send to and retrieve from the computer systems of Web

users, enabling Web site owners to collect information about an individuals online

browsing preferences whenever a person visits a Web site. The use of cookies by Web site

owners and operators has generated considerable controversy, in large part because of

the novel way that information about Web users is collected and stored. Data recorded

about the user are stored on a file placed on the hard drive of the users computer system;

this information can then be retrieved from the users system and resubmitted to a Web

site the next time the user accesses that site.

Those who defend the use of cookies tend to be owners and operators of Web sites.

Proprietors of these sites maintain that they are performing a service for repeat users of a

Web site by customizing the users means of information retrieval. They also point out that, because of cookies, they are able to provide a user with a list of preferences for

future visits to that Web site. Many privacy advocates object to the fact that the default status for most Web

browsers is such that cookies will automatically be accepted unless explicitly overridden

by the user.

RFID technology-Another mode of surveillance made possible by cybertechnology involves the use of

RFID technology. In its simplest form, RFID technology consists of a tag (microchip) and

a reader. The tag has an electronic circuit, which stores data, and an antenna that

broadcasts data by radio waves in response to a signal from a reader. The reader also

contains an antenna that receives the radio signal, and it has a demodulator that

transforms the analog radio information into suitable data for any computer processing

that will be done. Like Internet cookies and other online data gathering and surveillance techniques,

RFIDclearly threatens individual privacy. But unlike surveillance concerns associated with

cookies, which track a users habits while visiting Web sites, RFID technology can be used

to track an individuals location in the offline world.

Cybertechnology and Government Surveillance

Some cybertechnologies, despite their initial objectives and intent, can facilitate

government surveillance. Our purpose in this section has been to briefly

describe how government surveillance of citizens illustrates one more way that cybertechnology

both contributes to and enhances the ability of organizations to gather and

record data about individuals.

EXCHANGING PERSONAL DATA: MERGING AND MATCHING

ELE Much of the personal data gathered electronically by one organization is later

exchanged with other organizations; indeed, the very existence of certain institutions

depends on the exchange and sale of personal information. Some privacy advocates

believe that professional information gathering organizations, such as Equifax, Experion

(formerly TRW), and Trans Union (credit reporting bureaus), as well as the Medical

Information Bureau (MIB), violate the privacy of individuals because of the techniques

they use to facilitate the exchange of personal information across and between databases.

These techniques include computer merging and computer matching.

Merging Computerized Records

Computer merging is the technique of extracting information from two or more

unrelated databases that contain information about some individual or group of individuals,

and then integrating that information into a composite file. It occurs whenever

two or more disparate pieces of information contained in separate databases are

combined.

Matching Computerized Records

Computer matching is a variation of the technology used to merge computerized records.

It involves cross-checking information in two or more unrelated databases to produce

matching records, or hits. In federal and state government applications, this technique

has been used by various agencies and departments for the express purpose of creating a

new file containing a list of potential law violators, as well as individuals who have

actually broken the law or who are suspected of having broken the law.1

MINING PERSONAL DATA

A form of data analysis that uses techniques gained from research and development in

artificial intelligence. has been used to mine personal

data. Formally referred to as Knowledge Discovery in Databases, or KDD, the process

is now more commonly known as data mining. Essentially, data mining involves the

indirect gathering of personal information through an analysis of implicit patterns

discoverable in data. Data mining activities can generate new and sometimes nonobvious

classifications or categories; as a result, individuals whose data are mined can

become identified with or linked to certain newly created groups that they might never

have imagined to exist.

How Does Data Mining Threaten Personal Privacy?

For one thing, privacy laws as well as informal data protection guidelines

have been established for protecting personal data that are

_ explicit in databases (in the form of specific electronic records),

_ confidential in nature (e.g., data involving medical, financial, or academic

records),

_ exchanged between or across databases.

However, virtually no legal or normative protections apply to personal data manipulated

in the data mining process, where personal information is typically

_ implicit in the data,

_ non confidential in nature,

_ not exchanged between databases

Unlike personal data that reside in explicit records in databases, information

acquired about persons via data mining is often derived from implicit patterns in the

data. The patterns can suggest new facts, relationships, or associations about a person,

placing that person in a newly discovered category or group. Also, because most

personal data collected and used in data mining applications is considered neither

confidential nor intimate in nature, there is a tendency to presume that such data

must, by default, be public data

Web Mining

Initially, the mining of personal data depended on large (offline) commercial databases

called data warehouses, which stored the data, consisting primarily of transactional

information. Data mining techniques are now also used by commercial Web sites to

analyze data about Internet users, which can then be sold to third parties. This process is

sometimes referred to as Web mining, which has been defined as the application of

data mining techniques to discover patterns from the Web.16 The kinds of patterns

discovered from Web mining can be useful to marketers in promotional campaigns. The

following scenario, involving Facebook, illustrates one way in which mining can be done

on the Web.

Data Merging A data exchange process in which personal data from two or more sources is

combined to create a mosaic of individuals that would not be discernable

from the individual pieces of data alone.

Data Matching A technique in which two or more unrelated pieces of personal information are

cross-referenced and compared to generate a match, or hit, that suggests a

persons connection with two or more groups.

Data Mining A technique for unearthing implicit patterns in large single databases, or

data warehouses, revealing statistical data that associates individuals with

nonobvious groups; user profiles can be constructed from these patterns.

PROTECTING PERSONAL PRIVACY IN PUBLIC SPACE

This confidential and very personal information is

referred to as nonpublic personal information (NPI). Privacy analysts are now concerned

about a different kind of personal informationpublic personal information (PPI), which

is neither confidential nor intimate and which is also being gathered, exchanged, and

mined using cybertechnology.

PPI includes information about you, such as where you work or attend school or what

kind of car you drive. Even though it is information about you as a particular person, PPI

has not enjoyed the privacy protection that has been granted to NPI.

Search Engines and the Disclosure of Personal Information

Using Search Engines to Acquire Information about People

It is not only the fact that an individuals search requests are recorded and archived by

major companies such as Google that make Internet search engines controversial from

the perspective of personal privacy. Search engine-related privacy issues also arise

because that technology can be used for questionable purposes such as stalking.

We have seen how the use of search engines can threaten the privacy of individuals in

two distinct ways: (1) by recording and archiving records of a users search queries that

reveal the topic of the search and the time the request was made by the user and (2) by

providing users of search engines with personal information about individuals who may

have no idea of the wealth of personal information about them that is available online

(and have no control over how it is accessed and by whom it is accessed). The latter

concern is further complicated by the fact that individuals who are the subject of online

searches enjoy no legal protection because of the presumed public nature of the

personal information about them that is available via online searches.

Accessing Online Public Records

Another kind of personal information that can also be considered public in nature is

information about us stored in records located in municipal buildings, which are

accessible to the general public. Public records have generally been available to anyone. willing to go to those municipal buildings and request hardcopy versions of them. Some

municipalities charge a small fee to retrieve and copy the requested records. Many of

these public records can now also be accessed online. Has this changed anything?

Consider that information merchants were always able to physically or manually

collect all of the public records they could acquire

PRIVACY-ENHANCING TECHNOLOGIES

We have seen how cybertechnology has exacerbated privacy concerns. Ironically,

perhaps, cybertechnology also provides tools that can help users to protect their privacy.

For example, privacy-enhancing technologies or PETs have been developed to help users

protect (a) their personal identity while navigating the Internet and (b) the privacy of

their online communications (such as e-mail). An example of (b) is encryption tools that

encode and decode e-mail messages. Our main focus in this section is on whether PETs

actually accomplish. Many e-commerce sites now provide users with a

stated privacy policy that is backed by certified trustmarks or trust seals

Educating Users about PETs

How are users supposed to find out about PETs? Consider that Web sites are not

required to inform users about the existence of PETs or to make those tools available to

them. Furthermore, online consumers must not only discover that PETs are available, but

they must also learn how to use these tools. So at present, responsibility for learning

about PETs and how to use them is incumbent upon consumers

PETs and the Principle of Informed Consent

Traditionally, the principle of informed consent has been the model, or standard,

in contexts involving the disclosure of ones personal data. However, users who willingly

consent to provide information about themselves for one purpose (e.g., in one transaction)

may have no idea how that information can also be used in secondary applications.

Some in the commercial sector argue that because no one is forcing users to reveal

personal data, the disclosure of such data is done on a completely voluntary basis.

Assume that a user has willingly consented to disclose personal data in an e-commerce

transaction. Some in the e-commerce sector have responded to critics by pointing out that in most

cases, users are provided with the means to either opt-in or opt-out of having their

personal data collected, as well as having those data made available for secondary use.

But the default is such that if no option is specified by the user when he or she discloses

personal data for use in one context, then those disclosed personal data are also available

for secondary use. Hence, the policy is presumed consent, not informed consent.

Because PETs provide users with some ways of protecting their identity and also

provide them some choice in controlling the flow of their personal information, they

would seem to be an empowering rather than a disabling technology. But PETs alone are

insufficient.

PRIVACY LEGISLATION AND INDUSTRY SELF-REGULATION

We saw in the previous section that even though PETs offer users a means to protect their

identity in certain kinds of activities, they are not the magic bullet many of their

staunchest supporters have suggested. Recognizing the limitations of PETs, some privacy

advocates believe that stronger privacy laws will protect consumers, whereas others in the

commercial sector, for example, believe that additional privacy legislation is neither

necessary nor desirable. Instead, they suggest strong industry controls regulated by

standards, for resolving many privacy concerns affecting e-commerce. Generally, privacy advocates have been skeptical of voluntary controls, including

industry standards for self-regulation initiatives. Instead, they argue for stricter privacy

legislation and data protection principles to protect the interests of users. We begin this

section with a look at certain self-regulatory schemes for privacy protection that is

provided to consumers by industry standards.

Industry Self-Regulation Initiatives Regarding Privacy

Some industry representatives who advocate for the use of voluntary controls might

concede that tools such as PETs, in themselves, are not adequate to protect the privacy of

consumers in e-commerce transactions. However, they also believe that alternatives to

additional privacy legislation are possible. These advocates point to the establishment of

industry standards that have already been accepted and implemented. Some of these

standards are similar to PETs in the sense that they are intended to protect a users

privacy, An industry-backed (self-regulatory) initiative called TRUSTe was designed to

help ensure that Web sites adhere to the privacy policies they advertise. TRUSTe uses

a branded system of trustmarks (graphic symbols), which represent a Web sites

privacy policy regarding personal information. Trustmarks provide consumers with the

assurance that a Web sites privacy practices accurately reflect its stated policies.

Through this PET-like feature, users can file a complaint to TRUSTe if the Web site

bearing its trust seal does not abide by the stated policies. Any Web site that bears the

TRUSTe mark and wishes to retain that seal must satisfy several conditions: The Web

site must clearly explain in advance its general information-collecting practices,

including which personally identifiable data will be collected, what the information

will be used for, and with whom the information will be shared.

And web sites displaying trust seals, such as TRUSTe, are subject to periodic and unannounced

audits of their sites.

Critics have pointed out some of the difficulties in implementing TRUSTe. For

example, the amount of information users are required to provide can easily discourage

them from carefully reading and understanding the agreement. Also, the various

warnings displayed may appear unfriendly and thus might discourage users; friendlier

trustmarks, on the contrary, might result in users being supplied with less direct

information that is important for protecting their privacy. But advocates of tools such

as TRUSTe argue that, with these tools, users will be better able to make informed

choices regarding electronic purchasing and other types of online transactions. but unlike PETs in that they are not themselves tools.

Privacy Laws and Data Protection Principles

Generally, U.S. lawmakers have resisted requests from privacy advocates for

stronger consumer privacy laws, siding instead with business interests in the private

sector who believe that such legislation would undermine economic efficiency and thus

adversely impact the overall economy. Critics point out, however, that many of those

businesses who have subsidiary companies or separate business operations in countries

with strong privacy laws and regulations, such as nations in Western Europe, have found

little difficulty in complying with the privacy laws of the host countries; profits for those

American-owned companies have not suffered because of their compliance. In any event,

there has been increased pressure on the U.S. government, especially from Canada and

the European Union (EU), to enact stricter privacy laws, and pressure on American

businesses to adopt stricter privacy polices and practices because of global e-commerce

pressures.

(5)Please write synopsis of this article in your own words

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems Design Implementation And Management

Authors: Carlos Coronel, Steven Morris

14th Edition

978-0357673034

More Books

Students also viewed these Databases questions