0% found this document useful (0 votes)
78 views

GROUP 1 Conceptions of Privacy and The Values of Privacy - PPTX

The document discusses concepts of privacy and its value in the digital age. It begins by outlining Alan Westin's four states of privacy: solitude, intimacy, anonymity, and reserve. It then examines different definitions of privacy relating to personhood, intimacy, secrecy, and contextual integrity. The value of privacy is discussed in relation to personal autonomy, emotional release, self-evaluation, and limited communication. Privacy is complicated in today's world due to advances in technology enabling vast data collection and analysis.

Uploaded by

ina gastador
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views

GROUP 1 Conceptions of Privacy and The Values of Privacy - PPTX

The document discusses concepts of privacy and its value in the digital age. It begins by outlining Alan Westin's four states of privacy: solitude, intimacy, anonymity, and reserve. It then examines different definitions of privacy relating to personhood, intimacy, secrecy, and contextual integrity. The value of privacy is discussed in relation to personal autonomy, emotional release, self-evaluation, and limited communication. Privacy is complicated in today's world due to advances in technology enabling vast data collection and analysis.

Uploaded by

ina gastador
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

Conc e p ti on s of P riva c y a nd

the Values of Privacy

Living in the IT Era

Presented by GROUP 1
THE TEAM

Cj Vincent
Lien Jenny

James

Jonh Paul Lady Lee Kyla Alyssa


PRIVACY

Privacy is a value that people in the world today hold in high


esteem. Traditionally, the value of privacy was based on the
strong belief that each individual deserves the right to be left
alone and the right to choose what he/she wants to disclose to
other people. The concept of privacy has become significantly
complicated in the digital age.

LADY LEE
PRIVACY

“Privacy is a value so complex, so entangled in competing and


contradictory dimensions, so engorged with various and distinct
meanings, that I sometimes despair whether it can be usefully
addressed at all.”

Robert C. Post, Three Concepts of Privacy, 89 Geo. L.J. 2087


(2001)
PRIVACY AS CONCEPT
What is it

How and why is it Valued

PRIVACY AS RIGHT
How it is (or should be) protected
OTHER DEF. OF PRIVACY
• PERSONHOOD By Law
• INTIMACY
• SECRECY
• CONTEXTUAL INTEGRITY By Policy
• LIMITED ACCESS TO THE SELF
• CONTROL OVER By Technology
INFORMATION
Control over information “Privacy is the claim of individuals, groups or

institutions to determine for themselves when, how, and to what extent

information about them is communicated to others.” “…each individual is

continually engaged in a personal adjustment process in which he balances

the desire for privacy with the desire for disclosure and communication….”

Alan Westin, Privacy and Freedom, 1967

KYLA MAE
Realizing limited access and control

• Limited access – Laws to prohibit or limit collection, disclosure, contact –

Technology to facilitate anonymous transactions, minimize disclosure

• Control – Laws to mandate choice (opt-in/opt-out) – Technology to

facilitate informed consent, keep track of and enforce privacy preferences


WESTIN’S FOUR STATES OF PRIVACY

SOLITUDE - Individual separated form the group and freed

form the observation of other persons

INTIMACY - Individual is part of a small unit

ANONYMITY- Individual in public but still seeks and finds freedom from

identification and surveillance

RESERVE - The creation of a psychological barrier against unwanted intrusion –

holding back communication

JAMES
WESTIN’S FOUR FUNCTIONS OF PRIVACY

PERSONAL AUTONOMY

Control when you go public about info

EMOTIONAL RELEASE

- Be yourself

- Permissible deviations to social or institutional norms

SELF – EVALUATION

LIMITED AND PROTECTED COMMUNICATION


Information vs. decisional privacy

• Information privacy concerns the collection, use, and

disclosure of personal information

• Decisional privacy concerns the freedom to make decisions

about one's body and family

VINCENT
Privacy is a well-known subject for quite a few years and yet

very few have a better understanding fully. Privacy is an

essential element for maintaining humanity and social

responsibilities and relationships. Humans value their privacy

and protection of personal data.


Recent technological advances and corporate giants'

competition to expand the market threaten individual privacy

more than ever. The 21st century brought Big Data and

sophisticated information technology, which made data

access and processing easier.


Many researchers said the worries that threaten privacy and
security are now real because we can access, collect, and
analyze large amounts of data from internet searches,
telephone calls, electronic payments, and personal
information breached by various government agencies, and
business firms can use this data to expand their market.

LIEN MAR
Privacy is still a major issue to discuss and rewrite
regulations, agreements, and ethics for a better world
(Santanen, 2019).
THE VALUE OF PRIVACY
Privacy and cutting-edge technology like genetics, biometrics,
social media, smart phones, cybersecurity, Big Data, and search
engines go hand in hand. Technology's impact on privacy and
personal information has two reactions. The first is that the IT
industry holds all our data, implying that we have no privacy in
the digital era and no way to defend it.

JENNY
THE VALUE OF PRIVACY

Second, privacy and personal data are more vital than ever
(Hoven,2014). Technology is ingrained in our lives. Privacy
helps us develop relationships with family and friends by letting
us keep aspects of ourselves private. 91% of adults own a
smartphone or laptop, and the amount of personal data saved in
them is growing.
legal conceptions of privacy

Prosser Four Torts


Intrusion – Intruding (physically or otherwise) upon the solitude of

another in a highly offensive manner.

Ex. A woman sick in the hospital with a rare disease refuses a

reporter’s request for a photograph and interview. Then the reporter

photographs her anyway, over her objection.

CEEJAY
Private Facts – publicizing highly offensive private information about

someone which is not of legitimate concern to the public

Ex. Photographs of an undistinguished and wholly private hardware merchant

carrying on an adulterous affair in a hotel room are published in a magazine.

ion.
False light - publicizing a highly offensive and false impression of

another.

For example: a taxi driver’s photograph is used to illustrate a

newspaper article on cabdrivers who cheat the public when the driver

in the photo is not, in fact, a cheat.


Appropriation – using another’s name or likeness for some

advantage without the other’s consent.

For example: a photograph of a famous actress is used without her

consent to advertise a product.


Thus the concept of privacy is best understood as a concern for
limited accessibility and one has perfect privacy when one is
completely inaccessible to others. Privacy can be gained in three
independent but interrelated ways: through secrecy, when no one
has information about one, through anonymity, when no one
pays attention to one, and through solitude, when no one has
physical access to one.

ALYSSA
The desire for personal space predates modern humanity. Despite the
difficulty in providing definitive proof for this claim, anthropological,
biological, and sociological research all point to a consistent theme:
people have always wanted some degree of privacy, from the first
human communities to the wildest animals (Westin 1984, p. 56-74).
Methods of establishing physical boundaries and avoiding unnecessary
interaction between members of different social groups exist in nearly
every society, ancient and modern alike (Wagner DeCew 1997, p. 12).
Understanding the motivations behind the use of these strategies and the
interests they are designed to safeguard requires an examination of the
social context in which they are being employed.

JOHN PAUL
Someone who never leaves their home has no need for personal space.
Taking this into account, we can determine that privacy has value only
when there are more than two people involved. Thus, the meaning of
privacy varies greatly from one group and culture to the next. We each have
our own unique cultural, philosophical, and political perspectives that shape
how we understand and value privacy. Privacy serves a number of important
purposes in contemporary life, and this has prompted a wide range of
different ways of thinking about privacy.
Alan
Westin’sPrivacy and
Freedom
• PRIVACY AS PRE-REQUISITE

FOR PERSONA AUTONOMY


• EMOTIONAL RELEASE

• LIMITED AND PROTECTED

COMMUNICATION
• SELF EVALUATION

• PRIVACY TO MINIMIZE

BURDEN
In today's interconnected society, many people would give anything for a little

privacy. Historically, the importance of privacy was grounded in the idea that

everyone should be allowed some alone time and the freedom to decide what

information about themselves to share with others. In today's highly connected

world, the very idea of privacy has become convoluted.

JENNY
• PRIVACY AS PRE REQUISITE FOR PERSONAL AUTONOMY

Some believe that freedom of choice requires privacy. Privacy begins with this

individualist philosophy. Democratic cultures emphasize individuality, dignity, and

worth, and they safeguard these principles (Westin 1967, p. 33). The protection of

one's independence and identity requires the provision of a personal refuge from

the prying eyes of others.


An individual's "inner sanctum of the self" is where they can be alone with their

thoughts and feelings. A person is subject to criticism and judgment from others

without the psychological shield of privacy. Unwarranted (internal) body searches,

public presentation of private conduct or abnormalities, and home invasions violate

our sense of human dignity (Bloustein 1984, p. 156). Privacy protects from prying

eyes. Invasion of your privacy degrades your humanity (Marx 2001, p. 157).
Autonomy defines a person. Understanding is power. Thus, more information

about a person gives me more control over them. Privacy limits government and

other access to our data by creating a secure private space. The right to privacy

limits the power of others, especially the state. Thus, personal space opposes

central authority.
2. EMOTIONAL RELEASE

Privacy also facilitates emotional discharge. Most people have private and public

selves. Because public self-representation differs from private self-representation.

. Depending on audience and situation, we all play different characters and show

different sides of ourselves (Goffman 1959, p. 55-57). For instance, our behavior with

family and friends may differ from our professional behavior.

CEEJAY
As vital as these "masks" are for social interaction, it is essential for our mental health
to be able to let them down occasionally and be entirely ourselves, including all the
ill-mannered parts we generally hide from the outer world. Privacy allows emotional
discharge (Westin 1967, p. 36), giving us a break from social interaction. This privacy
idea also allows social limits. Rosen (2000, p. 20) defines privacy as a social border
that prevents us from being simplified, objectified, and assessed out of context.
Without our consent, private information might be taken out of context and used to
assess our character. Rosen (2004, p. 161) emphasizes privacy when appraising a
person:
“It is impossible to know someone based on snatches of information, real
knowledge is something that can be attained only slowly, over time, behind a
shield of seclusion, with the handful of people to whom we've chosen to disclose
ourselves whole. Even those who know us best may not understand all our
complexities.”

Recording text, sound, and image makes selective (mis)interpretation worse.


Searchable digital records can easily manipulated.
3. LIMITED AND PROTECTED COMMUNICATION

Third, privacy limits and protects communication. If we always said what we


thought or felt, polite social interaction would be impossible. This is not a call for
structural dishonesty sanctioned by privacy. We rely on discretion when
interacting with others. If we always said what we thought about someone, we
would hurt or upset many individuals. This also applies to discussing people when
they are absent.

ALYSSA
We sometimes talk about someone to express our anger or irritation, which they
may not enjoy. Privacy lets us express our feelings without worrying about
offending others.

Since outside parties, including government agencies, cannot monitor our


communication, limited and shielded communication limits power. Without
communication protection, we could not express our opinions on the government
without fear of being prosecuted for libel.
4. SELF EVALUATION
Every person must make sense of his experiences and express his originality
(Westin 1967, p. 36). We need time alone to consider things out. Self-reflection
requires privacy. We can only template (1) our behavior and that of others, (2)
events, and (3) thoughts when we are genuinely alone. We couldn't process all the
information without privacy. Privacy also gives us time to establish, formulate,
and assess our thoughts and arguments. Without privacy, ideas, arguments, and
creativity cannot mature.

KYLA
5. PRIVACY TO MINIIZE BURDEN

Last, privacy is a tool to reduce strain. Outside forces disrupt our privacy.
Frequently occurring disturbances can be a nuisance and even a hardship. Thus,
privacy should be respected. The right to privacy protects us from these
burdensome intrusions. Legitimate disturbances should not burden the individual.
Spam illustrates this privacy principle. Privacy laws in the Netherlands and the
US protect individuals from spam since it burdens them.

LADY
There are two major findings regarding one's privacy that have been agreed
upon by many researchers. First, privacy is essential for people to feel good
about themselves, and second, it helps people keep the relationships that are
the foundation of a flourishing society.
There would be less of a distinction between relationships if there was no
such thing as privacy, which would have a negative impact on people's
ability to be social and loving with one another.

LIEN MAR
Humanity's long-term survival depends on recognizing the importance of
people' right to privacy and security and taking measures to ensure that
such rights are respected. Once private information is shared publicly, it can
never be recovered.

There have always been dangers to personal privacy, but the exponential
development of the technologies that are now ubiquitous poses the greatest
risk to humankind.
Rapid expansion of data-related marketing can be attributed to the ever-
increasing capabilities and processing capacity of devices that monitor our
every move and process and record most of the data specifics of our life.
This data is processed, analyzed for trends, and then shared with anyone
willing to pay for the data. This is the greatest threat that has the capacity to
ruin society and the human experience forever. There hasn't been much
work done to address the void in privacy-related policy. The possibility is
certainly there, and we need to give careful thought to how our society
closes the policy gaps that technology has exposed so that we can all live in
peace (Santanen, 2019).
Data protection is critical and complicated. Data protection has become

crucial as technology has advanced over the past two decades. Technology

and information dominate the corporate world. The upside is market

openness, which informs customers about business models and trade

opportunities and allows everyone to stay informed.


The downside of this technology is socio-techno risk, which has grown

with technology and users (e.g., cyberterrorism, identity theft, warfare

on information, online frauds) and organized social crime to exploit

personal information. Data protection is crucial now.


The requirement to secure personal data is a key aspect in developing

and implementing data privacy policies, guidelines, and standards that

operate well with advanced technology to prevent data privacy threats.

Policies and laws must be efficient, ethical, economically sound, and

universally accepted. This is crucial because difficulties arise after these

policies or regulations are implemented.


With current socio-techno advances to process and store vast amounts of

data through internet usage, data privacy protection is complex and vital.

Figure 1 depicts information privacy for diverse environments in three

dimensions, including time, where data is computed for analysis and

market processing. Privacy and data security for web browsing and

social media. Space deals with data privacy.

You might also like