Privacy
Privacy
In cyberspace
Table 5-1:
Three Theories of Privacy
Accessibility Privacy
Decisional Privacy
Informational Privacy
Is Privacy an Intrinsic or
Instrumental Value?
Not valued for its own sake.
But is more than an instrumental value in the sense
PPI
Why should the collection of PPI, which is publicly
PPI (Continued)
In the past, it would have been difficult to
PPI (Continued)
Hypothetical Scenario:
(a) Shopping at Supermart;
(b) Shopping at Nile.com;
Reveal problems of protecting privacy in
Comprehensive Privacy
Proposals
Clark argues for a "co-regulatory" model.
He believes that a successful on-line-privacy
strong legislation;
a privacy oversight commission;
industry self-regulation.
enhancing technologies.
A "privacy watchdog agency" and sanctions
are also both needed.
Essay Assignment
Topic: Privacy
Consider computing technologies that secure or
HLN Question
Should anonymity be allowed on the web?
Judge orders Google to hand over logs
eventually, anytime in the past as well, all from their own home. At
first, the knowledge that anybody could be looking at a person at
any time really freaked people out.
In a world of glass houses, every act is a public act and the idea
can.
you and I can pierce all secrets and everyone
else is transparent.
no one can keep secrets.
everyone can keep secrets at will.
own
achieved in part by granting control
over ourselves, our body, our mind
AND over extensions of our selves
my diary
a computer file
information about me in a database
Privacy Quiz
http://www.cdt.org/privacy/quiz/
Network Affect
e.g. John Gilmore's Free S/WAN project.
The idea is to deploy PC-based boxes that