Chapter: Informational Privacy: Concepts, Theories, and Controversies
Quote:
The conception of privacy in terms of physical nonintrusion or being let alone has been criticized because of its tendency to conflate two different concepts that need to be distinguished—namely, having privacy and being let alone. To see this flaw, consider a situation in which one might not be let alone and yet enjoy privacy. If a student approaches her professor, who is on his or her way to teach a class, and asks her professor a question about a previous class assignment, the student has not, strictly speaking, let her professor alone; however, she has also not violated her professor’s privacy. Next, consider a situation in which one might be let alone but still not have his or her privacy intact. If a student surreptitiously follows her professor one day and records each of her professor’s movements on and off campus, she has in one sense “let her professor alone” (physically) but, arguably, has also intruded upon her professor’s privacy.
What I expect to learn:
To know informational privacy
Review:
We all know what privacy is but just if you don’t, Privacy is the ability of an individual or group to seclude them or information about themselves and thereby reveal themselves selectively. With that given attention to, it is as though when people hear that something is for private use or privacy, they will get more curious about it. That is where hackers or crackers come in. They try to retrieve private information from different organizations or even single or home workstations just to get a hold of what you might have. Also mentioned in Wikipedia, “The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security — one in which trade-offs between the interests of one group and another can become particularly clear.”
What I learned:
· The concept of privacy
· Unitary, Derivative, and Cluster Definitions of Privacy
· Interest-Based Conceptions Versus Rights-Based Conceptions of Privacy
· FOUR DISTINCT KINDS OF PRIVACY: PHYSICAL/ACCESSIBILITY,
· DECISIONAL, PSYCHOLOGICAL/MENTAL, AND INFORMATIONAL
· PRIVACY
· Privacy as Nonintrusion Involving One’s Physical Space: Physical/Accessibility Privacy
· Privacy as Noninterference Involving One’s Choices: Decisional Privacy
· Privacy as Nonintrusion/Noninterference Involving One’s Thoughts and One’s Personal Identity: Psychological/Mental Privacy
· Privacy as Having Control Over/Limiting Access to One’s Personal Information: Informational Privacy
· The Restricted Access Theory
· The control Theory
· The Restricted Access/Limited Control (RALC) Theory
· Three ‘‘Benchmark Theories” of Informational Privacy
· Privacy as Contextual Integrity
· An “Ontological Interpretation” of Informational Privacy
Integrative Questions:
1. What is the concept of privacy?
2. Explain the control theory.
3. Explain the restricted theory.
4. Explain the restricted access theory.
5. What is privacy as contextual integrity?
Comments (0)
You don't have permission to comment on this page.