Over the last several years, the realm of technology and privacy has been transformed, creating a landscape that is both dangerous and encouraging. Significant changes include large increases in communications bandwidths; the widespread adoption of computer networking and public-key cryptography; new digital media that support a wide range of social relationships; a massive body of practical experience in the development and application of data-protection laws; and the rapid globalization of manufacturing, culture, and policy making. The essays in this book provide a new conceptual framework for the analysis and debate of privacy policy and for the design and development of information systems.
The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies. The contributors to this anthology don't simply describe these problems or warn about the loss of privacy—they propose solutions. They look closely at business practices, public policy, and technology design, and ask, “Should this continue? Is there a better approach?” They take seriously the dictum of Thomas Edison: “What one creates with his hand, he should control with his head.” It's a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there's a problem—let's find a solution.
Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other sophisticated technologies. With just a few keystrokes, records containing our financial information, phone and e - mail logs, and sometimes even o...
Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.
Through a series of close readings of two major figures of the modern movement, Adolf Loos and Le Corbusier, Beatriz Colomina argues that architecture only becomes modern in its engagement with the mass media, and that in so doing it radically displaces the traditional sense of space and subjectivity. Privacy and Publicity boldly questions certain ideological assumptions underlying the received view of modern architecture and reconsiders the methodology of architectural criticism itself. Where conventional criticism portrays modern architecture as a high artistic practice in opposition to mass culture, Colomina sees the emerging systems of communication that have come to define twentieth-century culture—the mass media—as the true site within which modern architecture was produced. She considers architectural discourse as the intersection of a number of systems of representation such as drawings, models, photographs, books, films, and advertisements. This does not mean abandoning the architectural object, the building, but rather looking at it in a different way. The building is understood here in the same way as all the media that frame it, as a mechanism of representation in its own right. With modernity, the site of architectural production literally moved from the street into photographs, films, publications, and exhibitions—a displacement that presupposes a new sense of space, one defined by images rather than walls. This age of publicity corresponds to a transformation in the status of the private, Colomina argues; modernity is actually the publicity of the private. Modern architecture renegotiates the traditional relationship between public and private in a way that profoundly alters the experience of space. In a fascinating intellectual journey, Colomina tracks this shift through the modern incarnations of the archive, the city, fashion, war, sexuality, advertising, the window, and the museum, finally concentrating on the domestic interior that constructs the modern subject it appears merely to house.
An expert on computer privacy and security shows how we can build privacy into the design of systems from the start. We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start. Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now.
An examination of corporate privacy management in the United States, Germany, Spain, France, and the United Kingdom, identifying international best practices and making policy recommendations. Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation—to put more laws “on the books.” But there was scant evidence of how well tighter regulation actually worked “on the ground” in changing corporate (or government) behavior—until now. This intensive five-nation study goes inside corporations to examine how the people charged with protecting privacy actually do their work, and what kinds of regulation effectively shape their behavior. And the research yields a surprising result. The countries with more ambiguous regulation—Germany and the United States—had the strongest corporate privacy management practices, despite very different cultural and legal environments. The more rule-bound countries—like France and Spain—trended instead toward compliance processes, not embedded privacy practices. At a crucial time, when Big Data and the Internet of Things are snowballing, Privacy on the Ground helpfully searches out the best practices by corporations, provides guidance to policymakers, and offers important lessons for everyone concerned with privacy, now and in the future.
An analysis of the people and groups who have emerged to challenge the increasingly intrusive ways personal information is captured, processed, and disseminated. Today, personal information is captured, processed, and disseminated in a bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by Web sites, data mining and profiling, and many others. In The Privacy Advocates, Colin Bennett analyzes the people and groups around the world who have risen to challenge the most intrusive surveillance practices by both government and corporations. Bennett describes a network of self-identified privacy advocates who have emerged from civil society—without official sanction and with few resources, but surprisingly influential. A number of high-profile conflicts in recent years have brought this international advocacy movement more sharply into focus. Bennett is the first to examine privacy and surveillance not from a legal, political, or technical perspective but from the viewpoint of these independent activists who have found creative ways to affect policy and practice. Drawing on extensive interviews with key informants in the movement, he examines how they frame the issue and how they organize, who they are and what strategies they use. He also presents a series of case studies that illustrate how effective their efforts have been, including conflicts over key-escrow encryption (which allows the government to read encrypted messages), online advertising through third-party cookies that track users across different Web sites, and online authentication mechanisms such as the short-lived Microsoft Passport. Finally, Bennett considers how the loose coalitions of the privacy network could develop into a more cohesive international social movement.
The Poverty of Privacy Rights makes a simple, controversial argument: Poor mothers in America have been deprived of the right to privacy. The U.S. Constitution is supposed to bestow rights equally. Yet the poor are subject to invasions of privacy that can be perceived as gross demonstrations of governmental power without limits. Courts have routinely upheld the constitutionality of privacy invasions on the poor, and legal scholars typically understand marginalized populations to have "weak versions" of the privacy rights everyone else enjoys. Khiara M. Bridges investigates poor mothers' experiences with the state—both when they receive public assistance and when they do not. Presenting a holistic view of just how the state intervenes in all facets of poor mothers' privacy, Bridges shows how the Constitution has not been interpreted to bestow these women with family, informational, and reproductive privacy rights. Bridges seeks to turn popular thinking on its head: Poor mothers' lack of privacy is not a function of their reliance on government assistance—rather it is a function of their not bearing any privacy rights in the first place. Until we disrupt the cultural narratives that equate poverty with immorality, poor mothers will continue to be denied this right.
Edward Snowden's revelations about the mass surveillance capabilities of the US National Security Agency (NSA) and other security services triggered an ongoing debate about the relationship between privacy and security in the digital world. This discussion has been dispersed into a number of national platforms, reflecting local political realities but also raising questions that cut across national public spheres. What does this debate tell us about the role of journalism in making sense of global events? This book looks at discussions of these debates in the mainstream media in the USA, United Kingdom, France, Germany, Russia and China. The chapters focus on editorials, commentaries and op-eds and look at how opinion-based journalism has negotiated key questions on the legitimacy of surveillance and its implications to security and privacy. The authors provide a thoughtful analysis of the possibilities and limits of 'transnational journalism' at a crucial time of political and digital change.