Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Privacy Issues in the Digital Age: A Comprehensive Analysis, Slides of Cybercrime, Cybersecurity and Data Privacy

Privacy concerns in the context of cybertechnology, focusing on the acquisition, transfer, and retention of personal information. Topics include the loss and violation of privacy, informational privacy theories, and the role of contextual integrity. The document also discusses the value of privacy as a shield and its importance as a social value.

Typology: Slides

2021/2022

Uploaded on 03/31/2022

captainamerica
captainamerica šŸ‡ŗšŸ‡ø

4.4

(13)

250 documents

1 / 75

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Privacy and Cybertechnology
Privacy concerns affect many aspects of
our lives – from commerce to
healthcare to work.
We have categories such as:
consumer privacy,
medical/healthcare privacy,
employee/workplace privacy.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b

Partial preview of the text

Download Privacy Issues in the Digital Age: A Comprehensive Analysis and more Slides Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!

Privacy and Cybertechnology

 Privacy concerns affect many aspects of

our lives – from commerce to

healthcare to work.

 We have categories such as:

 consumer privacy,  medical/healthcare privacy,  employee/workplace privacy.

Privacy and Cybertechnology

(Continued)

 Privacy issues involving

cybertechnology affect each of us,

whether or not we have ever owned or

even used a networked computer.

 Consider the information about us that

can be acquired from our commercial

transactions in a bank or in a store.

Privacy and Cyberspace

 Are any privacy issues unique to cybertechnology?  Privacy concerns have been exacerbated by cybertechnology in at least four ways, i.e., by the:

1. amount of personal information that can now be

collected;

2. speed at which personal information can now be

transferred and exchanged;

3. duration of time in which personal information

can now be retained;

4. kind of personal information (such as

transactional information) that can be acquired.

What is Personal Privacy

 Privacy is a concept that is difficult to define.

 We sometimes speak of an individual’s

privacy as something that can be:

 lost,  diminished,  intruded upon,  invaded,  violated,  breached.

Classic Theories of Privacy

 Three classic theories have tended to

view privacy in terms of either:

 non-intrusion,  non-interference,  control over/restricting access to one’s personal information.

Non-intrusion Theory of Privacy

 The non-intrusion theory views

privacy as either:

 being let alone,

 being free from government intrusion.

 This view is also sometimes

referred to as accessibility privacy

(DeCew, 1997).

Non-interference Theory of

Privacy

 The non-interference theory views

privacy as freedom from interference in

making decisions.

 This view emerged in the 1960s, following

the Griswold v. Connecticut (U.S. Supreme

Court) case in 1965.

 The non-interference theory of privacy

is also sometimes referred to as

decisional privacy.

The Control and Limited Access

Theories of Informational Privacy

 Informational privacy is concerned with

protecting personal information in

computer databases.

 Most people wish to have some control

over their personal information.

 In some cases, ā€œprivacy zonesā€ have

been set up to restrict or limit access to

one’s personal data.

A Comprehensive Account of

Privacy

 James Moor (2004) has framed a

privacy theory that incorporates key

elements of the three classic theories:

 accessibility privacy (non-intrusion),  decisional privacy (non-interference),  informational privacy (controlling/restricting access to one’s personal information).

Moor’s Comprehensive Theory of

Privacy

 According to Moor:

ā€œan individual has privacy in a situation if

in that particular situation the individual is

protected from intrusion, interference, and information access by others.ā€ [italics

added]

Moor’s Privacy Theory

(continued)

 Moor also distinguishes between ā€œnaturally

privateā€ and ā€œnormatively privateā€ situations

required for having:

 (a) natural privacy (in a descriptive sense);  (b) a right to privacy (in a normative sense).

Moor’s Natural vs. Normative

Privacy Distinction

 Using Moor’s natural/normative privacy

distinction, we can further differentiate

between a:

 loss of privacy,
 violation of privacy.

Helen Nissenabum’s Theory of

Privacy as ā€œContextual Integrityā€

 Nissenbaum’s privacy framework requires

that the processes used in gathering and

disseminating information are

 (a) ā€œappropriate to a particular contextā€ and  (b) comply with norms that govern the flow of personal information in a given context.

Nissenbaum’s Theory (Continued)

 Nissenbaum (2004a) refers to these two

types of informational norms as:

 norms of appropriateness  norms of distribution.