23
Privacy Policy, Law and Technology • Carnegie Mellon University Fall 2007 Lorrie Cranor • http://cups.cs.cmu.edu/courses/p 1 History and Philosophy of History and Philosophy of Privacy Privacy September 4, 2007

History and Philosophy of Privacy

  • Upload
    shelley

  • View
    61

  • Download
    0

Embed Size (px)

DESCRIPTION

History and Philosophy of Privacy. September 4, 2007. Research and Communication Skills. Finding info with search engines. General purpose search engines Google, Yahoo, Altavista, A9, etc. Clustered searching Vivisimo, Dogpile Search CS research literature http://portal.acm.org - PowerPoint PPT Presentation

Citation preview

Page 1: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/1

History and Philosophy of History and Philosophy of PrivacyPrivacy

September 4, 2007

Page 2: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/2

Finding info with search Finding info with search enginesenginesGeneral purpose search engines

• Google, Yahoo, Altavista, A9, etc.

Clustered searching• Vivisimo, Dogpile

Search CS research literature• http://portal.acm.org• http://citeseer.ist.psu.edu/• http://ieeexplore.ieee.org/• http://scholar.google.com/

Research and Communication Skills

Page 3: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/3

Advanced searchingAdvanced searching Boolean searching• Operators: AND, OR, NOT, NEAR• Implied operators: AND is often implied• Parentheses for grouping• Wildcards• Quotes

Getting to know the ins and outs of your favorite search engines• Many search engines do not use pure boolean

searching• Most search engines have some special syntax• Search engines use different algorithms to determine

best match

Research and Communication Skills

Page 4: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/4

Advanced GooglingAdvanced Googling See

http://www.lib.berkeley.edu/TeachingLib/Guides/Internet/Google.html

Ranks results using PageRank algorithm, taking into account popularity, importance, word proximity

Special syntax• intitle, inurl, site, intext, filetype, daterange, numrange• Boolean operators: OR, -• Fuzzy searching: ~, .., *• Exact phrases: “”

10-term limit Special searches Definitions (define), calculator, area codes, flight

searches, and more

Research and Communication Skills

Page 5: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/5

What is privacy?What is privacy?

“Being alone.”- Shane (age 4)

Page 6: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/6

Multiple conceptions of privacyMultiple conceptions of privacyPersonhood

Intimacy

Secrecy

Limited access to the self

Control over information

Page 7: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/7

Westin “Privacy and Freedom” Westin “Privacy and Freedom” 19671967

“Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others”

“desire for privacy is never absolute”

“each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication….”

Page 8: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/8

Westin’s four states of privacyWestin’s four states of privacy Solitude • individual separated form the group and freed form the

observation of other persons

Intimacy • individual is part of a small unit

Anonymity • individual in public but still seeks and finds freedom

from identification and surveillance

Reserve• the creation of a psychological barrier against

unwanted intrusion - holding back communication

Page 9: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/9

Westin’s four functions of Westin’s four functions of privacyprivacy

Personal autonomy• control when you go public about info

Emotional release• be yourself• permissible deviations to social or institutional

norms

Self-evaluation

Limited and protected communication

Page 10: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/10

Solove’s privacy taxonomySolove’s privacy taxonomy Information Collection

• Surveillance• Interrogation

Information Processing• Aggregation• Identification• Insecurity• Secondary Use• Exclusion

Information Dissemination• Breach of Confidentiality• Disclosure• Exposure• Increased Accessibility• Blackmail• Appropriation• Distortion

Invasion• Intrusion• Decisional Interference

Page 11: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/11

Information vs. decisional Information vs. decisional privacyprivacy

Information privacy concerns the collection, use, and disclosure of personal information

Decisional privacy concerns the freedom to make decisions about one's body and family

Page 12: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/12

Limited access vs. controlLimited access vs. controlPrivacy as limited access to self• the extent to which we are known to others and

the extent to which others have physical access to us

Privacy as control over information• not simply limiting what others know about you,

but controlling it• this assumes individual autonomy, that you

can control information in a meaningful way (not blind click through, for example)

Page 13: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/13

Multiple facets of privacyMultiple facets of privacyHow can posting personal information

about myself on my web site result in a reduction of my privacy? How can it result in an increase in my privacy?

Page 14: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/14

Privacy as deprivation?Privacy as deprivation?Deprived of being heard and seen by

others

Deprived of being contacted by others

Deprived of benefits that come as a result of your personal information being available to others

Page 15: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/15

Privacy as animal instinct?Privacy as animal instinct?

Eagles eating a deer carcass http://www.learner.org/jnorth/tm/eagle/CaptureE63.html

Is privacy necessary for species survival?

Page 16: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/16

Information privacyInformation privacyIn 17th century America, colonists began to

collect information about each other• Census, birth and death records, school

records, tax records

Informants reported people who behaved badly• Disorderly children, nightwalkers, Sabbath

breakers, atheists, drunks

Page 17: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/17

Privacy of personal spacePrivacy of personal spaceHistorically, depended a lot on the type and

proximity of available housing

In 18th century Europe, most people lived in cities where houses were close together, but small number of people lived in each house

In 18th century America, people lived far away from each other but many people lived in each house and even shared beds

Page 18: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/18

Communication privacyCommunication privacy When all communication was oral,

communication privacy depended on• Communicating without someone overhearing• Communicating with people who wouldn’t tell others

Written communications brought new opportunities for privacy violations

In 18th century America, postal mail was not necessarily private• Sealing wax, basic encryption used to increase privacy• 1782 - Congress made it illegal to open other peoples’

mail• Later the invention of the adhesive envelope increased

communications privacy

Page 19: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/19

TelegraphTelegraphIn the late nineteenth century the telegraph

became a popular means of long distance communication

Messages could be coded, but you could not recover damages due to transmission errors if the message was coded

Telegraph operators were supposed to keep messages confidential

Occasional subpoenas for telegraph messages

Page 20: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/20

CamerasCamerasCameras, especially portable “snap”

cameras (1888), raised new privacy concerns

Telephoto lenses

Video cameras

Hidden cameras

Web cams

Satellite images

Page 21: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/21

The Prada NYC dressing roomThe Prada NYC dressing room http://www.sggprivalite

.com/

What aspects seem privacy invasive?

How could the design be changed to reduce privacy concerns?

Page 22: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/22

Discussion questionsDiscussion questionsWhich technologies are privacy invasive?

Which technologies are privacy protective?

Can we turn one into the other?

Page 23: History and Philosophy of Privacy

Privacy Policy, Law and Technology • Carnegie Mellon University • Fall 2007 • Lorrie Cranor • http://cups.cs.cmu.edu/courses/privpolawtech-fa07/23

Privacy History ReferencesPrivacy History ReferencesRobert Ellis Smith. 2000. Ben Franklin’s

Web Site: Privacy and Curiosity from Plymouth Rock to the Internet. Providence: Privacy Journal.

Alan Westin. 1967. Privacy and Freedom. New York: Atheneum.