| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Informational Privacy: Concepts, Theories, and Controversies

Page history last edited by Riela Isabel Antonio 15 years, 1 month ago

 

Chapter: Informational Privacy: Concepts, Theories, and Controversies

Quote:

The conception of privacy in terms of physical nonintrusion or being let alone has been criticized because of its tendency to conflate two different concepts that need to be distinguished—namely, having privacy and being let alone. To see this flaw, consider a situation in which one might not be let alone and yet enjoy privacy. If a student approaches her professor, who is on his or her way to teach a class, and asks her professor a question about a previous class assignment, the student has not, strictly speaking, let her professor alone; however, she has also not violated her professors privacy. Next, consider a situation in which one might be let alone but still not have his or her privacy intact. If a student surreptitiously follows her professor one day and records each of her professors movements on and off campus, she has in one sense “let her professor alone” (physically) but, arguably, has also intruded upon her professors privacy.

What I expect to learn:

To know informational privacy

Review:                    

We all know what privacy is but just if you don’t, Privacy is the ability of an individual or group to seclude them or information about themselves and thereby reveal themselves selectively. With that given attention to, it is as though when people hear that something is for private use or privacy, they will get more curious about it. That is where hackers or crackers come in. They try to retrieve private information from different organizations or even single or home workstations just to get a hold of what you might have. Also mentioned in Wikipedia, “The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security — one in which trade-offs between the interests of one group and another can become particularly clear.”

What I learned:

·         The concept of privacy

·         Unitary, Derivative, and Cluster Definitions of Privacy

·         Interest-Based Conceptions Versus Rights-Based Conceptions of Privacy

·         FOUR DISTINCT KINDS OF PRIVACY: PHYSICAL/ACCESSIBILITY,

·         DECISIONAL, PSYCHOLOGICAL/MENTAL, AND INFORMATIONAL

·         PRIVACY

·         Privacy as Nonintrusion Involving Ones Physical Space: Physical/Accessibility Privacy

·         Privacy as Noninterference Involving Ones Choices: Decisional Privacy

·         Privacy as Nonintrusion/Noninterference Involving Ones Thoughts and Ones Personal Identity: Psychological/Mental Privacy

·         Privacy as Having Control Over/Limiting Access to One’s Personal Information: Informational Privacy

·         The Restricted Access Theory

·         The control Theory

·         The Restricted Access/Limited Control (RALC) Theory

·         Three ‘‘Benchmark Theories” of Informational Privacy

·         Privacy as Contextual Integrity

·         An “Ontological Interpretation” of Informational Privacy

Integrative Questions:            

1.    What is the concept of privacy?

2.    Explain the control theory.

3.    Explain the restricted theory.

4.    Explain the restricted access theory.

5.    What is privacy as contextual integrity?

Comments (0)

You don't have permission to comment on this page.