SlideShare uma empresa Scribd logo
1 de 14
Online Privacy 1


Pro 250 Final Essay: Online Privacy




                            PRO 250 Final Essay: Online Privacy

                                      Christopher Horne

                                 Professor Ellen Wolterbeck

                            University of Advancing Technology
Online Privacy 2


There is nothing greater than an idea whose time has come. [FL1]

In our time, that idea may well be the Internet. The Internet is a radical discontinuity

as a communications technology, but it also represents a projection of the needs and

desires of the world. The web in its way embodies two of Mankind’s oldest dreams,

to be omnipresent and to be invisible. Yet organizing a new form of viewing the world

has its price. For the Internet, that price might be the loss of anonymity. Ideally the

flexible personality could enter into this technological consensus without loss of self.

The Net allows the mind to stand outside itself, creating an objective reality of facts and

data that still represents a complete island in the original psyche. This has the effect of

splitting the wholeness of the mind into rational and intuitive parts. This is not a new

aspect of the human condition, but it does represent an objectification of the mental

process. It is this objectification that represents the true danger. When a schizophrenic

believes that everyone in the world can hear their thoughts, we call it madness.

When the Internet actually turns this condition into reality, we call it commerce.

Love letters, medical records, financial information, social networking blogs, reading

habits and personal preferences of individual users become common knowledge almost

instantly, all over the world. [FL2] Privacy is the power to selectively reveal oneself to the

world. If the contents of all my words and actions are available, I have no privacy.

For privacy to be widespread, it must be part of a social contract. McLuhan said that

new technologies exert a gravitational effect on cognition, which in turn affects social

organization. [FL3] Autonomy is still possible, but it must be bought at the price of

internal freedoms and local identities. Culture rests on the limitation of the group.

This is because one aspect of Man is that he is a tribal animal, and seeks the safety

of a group identity as well as safety in numbers. The Internet at its heart is a
Online Privacy 3


system of mapping, not only of IP addresses and domains, but of users and groups.

Without this underlying system of organization, data packets could not efficiently

find their destination addresses, and no communication would be possble. Yet this
                                                                   i

efficient mapping system allows commerce and government to silently collect data

from each IP address and manipulate it fortheir own purposes. Other parties, notably

cyber-criminals, are able to exploit weaknesses in protocols and other mechanisms

built into the structure of the web to steal identities and databases from the other

participants. The very imperfection of the Internet echoes the imperfection of the

world. The menace of loss of privacy leaves us vulnerable and threatens to leave us

bankrupt of Self, and perhaps financially, too. We could of course agree to forego

the speed and convenience of the system in favor of absolute personal control, but

convenience has been sold since WWII as a panacea for all social ills, and is by

now deeply ingrained in our culture. Online identity has no social referent, no history.

Culturally we are in terra incognito, with our destination unknown. Thus it is hard to form

the required social consensus that would strike an acceptable balance between

convenience and safety, as we have, for example with the pharmaceutical drug industry.

In its stead, personal information has become ‘commoditized’, just another product like

fish sticks or lint rollers to be sold for a profit in the market. No one ponders the moral

consequences of selling lint rollers. By extension, personal privacy becomes just as

disposable. Thus the problem of personal privacy is essentially one of syntax.

Faced with the problem of the implosion of world culture into a black hole



of information, our only option is to find a context, a mythos, where we can define

ourselves in relation to the phenomenon of the web as a whole. The Internet is first and
Online Privacy 4


foremost a conceptual space. This is the business of the collective unconscious, the

reservoir of the experiences of our species. Jung postulated that this collective psyche, as

he called it, is common to everyone and has a better sense of the Self’s ideal than the ego

than the conscious self does. It thus directs the Self, via archetypes, dreams, and intuition,

moving the psyche towards individuation, or self-actualization. [FL4]

        Faced with a weightless wavespace where inputs curl upon themselves

and disappear into an electronic void, we need to relate its phenomena and artifacts

to something real and tangible, which includes something of ourselves.

This new world has engendered new creatures, simulacra like Internet advertisers,

who feed on sustained attention. Without the food of user interaction, online advertisers

simply die, or are eaten by others of their kind. Every mouseclick shapes the net.

Gaining ‘eyeballs’ magically transforms electrons into material energy. The brainwave

activity of individual minds is translated directly into ones and zeros in faraway

electronic bank accounts. Focused concentration by millions of users turns photons

and electrons into gold, a feat beyond the dreams of any medieval alchemist.

In order to accomplish this marvelous feat, advertisers must build a model of directed

anticipation. This is the province of so called data miners and data aggregators.

Data mining is the process of sorting through large amounts of data picking out relevant

information. [FL5]. This harvested data is then processed by a data aggregator, an

organization such as Acxiom or ChoicePoint involved in compiling information from



detailed databases on individuals and selling that information to others. [FL6]

The Internet has become a commodity within a decade of the advent of commercial use.

Data is the new gold, a medium of exchange for goods and services.
Online Privacy 5


At its heart, the Internet is a system of mapping. It is a machine for processing social

interaction. The model for the Internet is one of directed anticipation.

The process of socialization is directly related to exposure to media messages.

Information is thought to produce an accelerated circulation of meaning, [FL3] but we

sense that this is not so. People everywhere complain of ‘information overload’. The

function of media is to create events, not the other way around. No one seems to suffer

from ‘meaning overload’. Increasingly, however, the media defines itself as an extension

of market forces. The Internet user is the product being sold. The ability of the market to

attract viewers to specific locati ns on the Web is not unlike the classic relationship
                                 o

between bees and flowers. The form of the ‘flower’, its shape, color, scent, and appearance

are designed only for the purpose of creating a specific interaction with its user. In the case

of the Internet, the nectar is information. The actual meaning of the information never

enters the interaction. The information itself is an artifact of the marketing process.

‘Media’ is called media because it mediates between one reality and another. Users are

both subject and objects. As subjects, we are in full possession of our individuality. Our

sense of personal space, of restraint, judgment and desire are tempered by the facts of

experience. As objects, our insecurities about who we are and the incompleteness of our

psyches is ruthlessly manipulated by the most advanced advertising techniques available.

Among these techniques is the ability to construct through data mining and information

aggregation algorithms a digital doppelganger, a limited replica of ourselves that bears a

resemblance to Freud’s ‘Id’. Freud divided the psyche into three parts- the Id, the Ego, and

the Super-ego. The Id was supposed to represent inner desire, that part of ourselves

governed by the pleasure principle. [FL7]
Online Privacy 6


At a certain point, the real world functions to support the online world. We become like

players in a game of chess, where bits of wood on a piece of patterned cardboard become

extensions of our inner thought processes. The power of Freudian thought was in its

metaphoric simplicity- a few dramatic images stabilized and organized all the data of a

world in flux. Captivity is presented as liberation- we can be our ‘best selves’, but only if

we accept the distorted image presented by the forces of the marketplace. The catch is that

we are required to completely surrender our personal privacy to attain the vision of this

ideal self. Consider the search box on a browser. As a device, it is a direct translation of the

metaphysical idea that a question determines and brings about its own answer.

We see through the prism of our categories. The categories we use are shared. Loss of

meaningful structures of agreement results in loss of the definition of personality itself.

We become willing partners in the process of selling ourselves. Any worldview is a

creative tension between possibility and choice, but consent, as Noam Chomsky pointed

out, can be readily manufactured. [FL8]

        In the United States, one of the primary definitions of privacy from the legal standpoint

was provided by Samuel Warren and Louis Brandeis in an article in the Harvard Law

Review in 1890 entitled The Right to Privacy [FN9]. In the first paragraph, the authors state,

“The right to life has come to mean the right to enjoy life- the right to be let alone.”

Later legal scholars such as Roscoe Pound [FN10] and Paul Freund [FN11] attempted to define

privacy as an expression of personhood, a right of an individual to discover their nature as

a human being. Privacy was sometimes seen as a moral freedom to engage in thoughts and

actions, and to decide accordingly. The notion that citizens have a right to regulate information

about themselves in order to define their interactions with other citizens is still common today,

although, as Machiavelli noted in ‘The Prince’, “People are by nature changeable”, and more
Online Privacy 7


ominously, “Politics have no relation to morals” [FN12]. Professor Ken Gormley in an online

article [FN13] focused on cyber-law notes that US case law has subdivided the topic into about

four areas of legal rights, which although interrelated, vastly complicate the interpretat on of
                                                                                         i

the basic question, “What is privacy?” These areas include Tort privacy, First Amendment

Privacy (related to the Constitution’s guarantee of Free Speech), Fourth Amendment Privacy

(relating to warrantless searches and seizures), and State Constitutional Privacy.

Further complicating matters is the changing nature of individual privacy, which is subject

to historic traditions, current and past events, changes in society and technology,

and the trade-offs necessary to preserve the concept of Democracy in a dangerous world.

For the moment, the philosophical and moral values of this subject are in flux.

Older interpretations based on anthropology and sociology have been displaced by historical

events focused on the interest of society as a whole, such as the World Trade Center attacks
                             s

[FN14]

         Many scholars claim that the concept of privacy is unnecessary for life in America.

Privacy is not a right as such. Its stature as a force in society largely rests on moral

and philosophical grounds. Many countries, such as Japan and China, with different

historical perspectives, find comfort in group relations when addressing authorities such as

government. An old Japanese saying is “The nail that sticks up must be hammered down.”

Individuality is seen as a disturbing force in society. America was founded by social and

religious refugees from Europe seeking self expression in the wake of the Protestant

Reformation, the central tenet of which emphasized Man’s individual relationship with God.

[FN15] However, in more secular terms, most functioning democracies require that citizens

surrender certain information in order to maintain a viable administrative record

on such matters as taxes, welfare, census and military eligibility (currently required but
Online Privacy 8


not in active use). Privacy in these areas is superseded by public interest. At certain

times in our history, such as the threat of terrorists in 2001 and in wartime in general,

a temporary suspension of some aspects of personal privacy is generally considered

to be an acceptable trade-off for the continuation of the institution of Democracy.

The fulcrum point of this trade-off is the issue of Trust in government. Confucius,

the fifth-century BC Chinese scholar and philosopher, stated that “If the people

have no faith in their rulers, there is no standing in the state.”[FN16] However, in

return for granting this trust, certain expectations by citizens must be advanced. An online

article in Wikipedia on “Privacy Law “[FN17] references a document by the Organization for

Economic Co-operation and Development (OECD) related to this matter called the

“Fair Information Practice Principles” which underlie the structure of many privacy

laws in democratic states. [FN18]. These are:



OPENNESS

There should be a general policy of openness about the practices and policies with respect to

personal information.

COLLECTIVE LIMITATION

Personal information should be collected only for a stated purpose by lawful and fair means

and with the knowledge or consent of the subject.

PURPOSE SPECIFICATION

The purpose for collecting personal information should be specified at the time of collection.

Further uses should be limited to those purposes.

USE LIMITATION

Personal information should not be used for purposes other than those specified, except for
Online Privacy 9


consent of the subject or by theauthority of law.

DATA QUALITY

Personal information must be accurate, complete, timely, and relevant to the purpose for which it is

to be used.

INDIVIDUAL PARTICIPATION

Individuals should have the right to inspect and correct their personal information.

SECURITY SAFEGUARDS

Personal information should be protected against such risks as loss, unauthorized access,

destruction, modification, or disclosure.

ACCOUNTABILITY

Someone in an organization should be held accountable for compliance with the organization’s

privacy policy.

Note that these principles are applicable in general both to government and commercial

entities. [FN19] This has become a somewhat controversial point in recent years because of

a deliberate US Government policy of outsourcing many of the functions which used

to be the responsibility of the federal government. In particular, so-called data aggregators

have become one of the chief agencies for creating value from personal data. [FN20]

Online forms, loyalty cards, law enforcement data, demographic data, credit card data and other

information is fed into an algorithm which creates a personal profile of all citizens.

This profile is used by both commercial interests for marketing, insurance and financial

appraisals of individuals, and by federal agencies such as the FBI, INS, and IRS in order to

enforce laws and regulations. The lax protection of this data has become a serious problem

for private citizens because criminal elements have begun to practice identity theft, which

in effect robs the individual of their legal selfhood. Given that citizens are mandated
Online Privacy 10


by law to grant personal information to the government,and that the government then

violates their trust by giving that information to commercial entities in a manner which

imperils the identity and well-being of those citizens, a serious ethical and moral condition

has come to exist. Commercial entities have a different relationship with their customers, but here,

too, the issue of trust is of paramount importance. Computers, communications networks, and

digital information have made personal information readily avaiable on a near-universal basis to
                                                              l

companies. The possibilities for misuse of this information have certainly grown exponentially,

while the ability of individuals to control their own data has developed an inverse relationship to

its availability. The practice of outsourcing has made this information available

worldwide. Tracking public opinion by surveys in order for legislators to remedy the situation

has also become a problem, because the private agencies invo
                                                           lved may now have either suspect

motives or write the questions in able to influence the outcome in a way favorable to

lobbyists [FN21]. The more vectors of distribution exist, the more the chances for theft by

organized criminals and hackers online. This illegal activity has now reached the point where

there are regular marketplaces online for buying and selling personal information [FN22].

While a valid credit card number may be purchased for a few dollars, an entire corporate

database only fetches a few hundred dollars. Clearly, the problem has reached critical

proportions.

         The notion of personal privacy is a received aesthetic construction. Beginning

as a child, we self-modify our perceptual worlds in order to achieve perceptual rapport

with the wider world, one that provides food, care, shelter and other requirements of

survival. The need to adapt exists long before the need for autonomy. To take part in a

society, we accept the precepts of that society; privacy is a category of permitted
Online Privacy 11


behavior. Egalitarianism is repressed in favor of the goal of individual success. This

reflects our history. To give an example, in Europe during WWII, the Nazi’s were able to

use traffic analysis of telephones to identify the networks of people who were able to

maintain views not in conformity with those of National Socialism. Once telephone

numbers were identified, those persons were exterminated. Thus, telephone bills in Europe

do not identify individual numbers, only ‘units’ of calls. The Europeans decided that the

loss of convenience to customers in identifying individual calls was a good tradeoff for

never allowing this heinous behavior to occur again.

        Privacy is a self-sustaining idea seeking its own expression, but it is also a nexus, a

nucleus of a lot of other ideas. The question of personal privacy is one of syntax.

The illusion of personal online privacy is at the heart of the Internet experience. Since

the data offered back to the Internet is given without restraint, the value of that data is

greatly enhanced. Personal searches represent unfiltered access to the needs and desires

of specific persons. It remains only to identify and target that person to actuate

marketing strategies. After a time, Internet searches form clusters of information, which

further pinpoint the strategies required to manipulate users. Certain caveats apply-

if the keyboard is used by more than one user, different demographics apply. But in

general, the longer the ‘tail’ of personal search patterns the better the efficiency of

an advertiser’s efforts. The Internet is a cultivated field from which is harvested

sustained attention. It is a system of sympathetic viewing.

        On April 22, 2008, in a ruling that supersedes weaker US Supreme Court rulings,

the Supreme Court of New Jersey became first court in the nation to rule that people have

an expectation of privacy when they are online, and that law enforcement officials need a

Grand Jury warrant to gain access to their private information .NJStar Ledger. [FL23]
Online Privacy 12


It is this kind of case law that ultimately decides the rights of citizens, corporations, and

the government in incorporating such matters as electronic privacy int normal customs
                                                                     o

and culture. But it is a slow process, sometimes taking decades before the firm outlines

of a solid legal foundation are in place. We are accustomed to thinking of change as a

rapid process, but this is in some sense a manufactured illusion, designed to sell news.

Real change resembles punctuated equilibrium, with the inculcation of generations.

Our presidential candidates have only shifted from being of the WWII generation to

the Vietnam generation. A twenty year old lieutenant in Iraq might expect to campaign

for the top job in the Executive branch of Government sometime in 2040. By then, of

course, the technological successors to the Internet will make these kinds of economic

and moral decisions seem simplistic. The Internet may be located inside our

skulls, which would sharpen the debate betweenwhere the rights of the inner person

and those who wish to manipulate those rights to the physical boundaries of ourselves.

We cannot live in the past, and the future is unknowable. The uncertainties and

complexities of any culture are in the here and now. I have tried to the best of my small

abilities to present some ideas for the elucidation of whoever may choose to read them.

My goal is to leave the world a better place than I found it. That is all one person can do.



                                      References

FL1 Victor Hugo, “Histoire d’un crime” quote from

www.nature.com /nature/journal/v419/n6903/full/919108a.html

FL2 Schneier, Bruce and Banisar, David. (1997). The Electronic Privacy Papers.

New York: John Wiley and Sons.

FL3 Baudrillard, Jean. (1994). Simulacra and Simulation. Ann Arbor: University of
Online Privacy 13


Michigan Press.



FL4 http://en.wikipedia.org/wiki/Collective_unconscious.html

FL5 http://en.wikipedia.org/wiki/ Data_mining

FL6 http://en.wikipedia.org/wiki/Data_aggregators

FL7 http://en.wikipedia.org/wiki/Id%2C_ego%2C_and_super-ego

FL8 Chomsky, Noam. (2002). Manufacturing Consent. New York: Pantheon Books

FL9 Warren, Samuel D. and Brandeis, Louis D. (1890). The Right to Privacy.

Harvard Law Review 193.

FL10 Pound, Roscoe. (1921). The Spirit of the Common Law. Tucson: Marshall Jones.

FL11 Freund, Paul A. (May 23, 1975). Address to the American Law Institute.

Quoted in A.L.I. Proceedings 574-5.

FL12 Machiavelli, Niccolo. (2008). The Prince. New York: Random House.

FL13 http://cyber.law.harvard.edu/privacy/Gormley--100%20
                                                        Years%of20%Privacy

FL14 Mead, Margaret. (1930). Growing Up in New Guinea. New York: Penguin.

FL15 en.wikipedia.org/wiki/Martin_luther

FL16 Confucius and Lau, D.C. (1998). The Analects of Confucius. New York: Penguin.

FL17 http://en.wikipedia.org/wiki/Online_Privacy

FL18 www.OECD.org/home

FL19 http://www.egovt.nz/resources/research/trus
                                               t-and-privacy/chapter3.html

FL20 www.privacyactivism.org/docs/DataAggregatorsStudy.html

FL21 http://epic.org

FL22 http://news.bbc.co.uk/2/hi/technology/7363422.stm

FL23 www.nj.com/news/index.ssf/2008/04/supreme_court_rules_internet_u.html
Online Privacy 14




.

Mais conteúdo relacionado

Mais procurados

Publishing the private notes
Publishing the private   notesPublishing the private   notes
Publishing the private notesDavid Patman
 
Living In A Connected Marketplace
Living In A Connected MarketplaceLiving In A Connected Marketplace
Living In A Connected MarketplaceAlexandre Delamaire
 
Disruptive Trends Affecting Human Capital Strategies
Disruptive Trends Affecting Human Capital StrategiesDisruptive Trends Affecting Human Capital Strategies
Disruptive Trends Affecting Human Capital StrategiesSynchronous
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
 
Everyday surveillance
Everyday surveillanceEveryday surveillance
Everyday surveillanceYavuz Paksoy
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelAbhijeet Kelkar
 
The internet of things
The internet of thingsThe internet of things
The internet of thingsRicardo Murer
 
Data protection and privacy in the social web en 201006
Data protection and privacy in the social web en 201006Data protection and privacy in the social web en 201006
Data protection and privacy in the social web en 201006ADTELLIGENCE GmbH
 
E-learning: The Dark Side?
E-learning: The Dark Side?E-learning: The Dark Side?
E-learning: The Dark Side?eLearning Papers
 
SXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data ConversationSXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data Conversationjohn st.
 
Derrick De K Brainframes Of Web 2.0
Derrick De K Brainframes Of Web 2.0Derrick De K Brainframes Of Web 2.0
Derrick De K Brainframes Of Web 2.0New Media Days
 
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. SnowerThe Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snowereraser Juan José Calderón
 
Data Protection and Privacy in the Social Web
Data Protection and Privacy in the Social Web Data Protection and Privacy in the Social Web
Data Protection and Privacy in the Social Web ADTELLIGENCE GmbH
 

Mais procurados (18)

Publishing the private notes
Publishing the private   notesPublishing the private   notes
Publishing the private notes
 
Living In A Connected Marketplace
Living In A Connected MarketplaceLiving In A Connected Marketplace
Living In A Connected Marketplace
 
Disruptive Trends Affecting Human Capital Strategies
Disruptive Trends Affecting Human Capital StrategiesDisruptive Trends Affecting Human Capital Strategies
Disruptive Trends Affecting Human Capital Strategies
 
Data Ownership: Who Owns 'My Data'?
Data Ownership: Who Owns 'My Data'?Data Ownership: Who Owns 'My Data'?
Data Ownership: Who Owns 'My Data'?
 
Privacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issuePrivacy Transparency Secrecy - The PRactice April 2017 issue
Privacy Transparency Secrecy - The PRactice April 2017 issue
 
Everyday surveillance
Everyday surveillanceEveryday surveillance
Everyday surveillance
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Hamilton Google talk
Hamilton Google talkHamilton Google talk
Hamilton Google talk
 
Societal and ethical issues of digitization
Societal and ethical issues of digitizationSocietal and ethical issues of digitization
Societal and ethical issues of digitization
 
Data protection and privacy in the social web en 201006
Data protection and privacy in the social web en 201006Data protection and privacy in the social web en 201006
Data protection and privacy in the social web en 201006
 
E-learning: The Dark Side?
E-learning: The Dark Side?E-learning: The Dark Side?
E-learning: The Dark Side?
 
SXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data ConversationSXSW 2012 - Big Data Conversation
SXSW 2012 - Big Data Conversation
 
Derrick De K Brainframes Of Web 2.0
Derrick De K Brainframes Of Web 2.0Derrick De K Brainframes Of Web 2.0
Derrick De K Brainframes Of Web 2.0
 
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. SnowerThe Digital Freedom Pass: Emancipation from Digital Slavery.  Dennis J. Snower
The Digital Freedom Pass: Emancipation from Digital Slavery. Dennis J. Snower
 
Data Protection and Privacy in the Social Web
Data Protection and Privacy in the Social Web Data Protection and Privacy in the Social Web
Data Protection and Privacy in the Social Web
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 
Reading the Next Book
Reading the Next BookReading the Next Book
Reading the Next Book
 

Destaque

Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And AlifeZotronix
 
Day for justice webinar final_october 2011
Day for justice webinar final_october 2011Day for justice webinar final_october 2011
Day for justice webinar final_october 2011day4justice
 
Emerging cyber threats_report2012
Emerging cyber threats_report2012Emerging cyber threats_report2012
Emerging cyber threats_report2012day4justice
 
Day for justice webinar final_october 2011
Day for justice webinar final_october 2011Day for justice webinar final_october 2011
Day for justice webinar final_october 2011day4justice
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 

Destaque (6)

Botnets And Alife
Botnets And AlifeBotnets And Alife
Botnets And Alife
 
Day for justice webinar final_october 2011
Day for justice webinar final_october 2011Day for justice webinar final_october 2011
Day for justice webinar final_october 2011
 
Emerging cyber threats_report2012
Emerging cyber threats_report2012Emerging cyber threats_report2012
Emerging cyber threats_report2012
 
Day for justice webinar final_october 2011
Day for justice webinar final_october 2011Day for justice webinar final_october 2011
Day for justice webinar final_october 2011
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 

Semelhante a The Internet As Directed Anticipation

Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.Paolo Cirio
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010DCL2701A
 
A Criticial Approach to Social Media
A Criticial Approach to Social Media A Criticial Approach to Social Media
A Criticial Approach to Social Media Vincent Maher
 
LECTURE 9 - Cyberculture
LECTURE 9 - CybercultureLECTURE 9 - Cyberculture
LECTURE 9 - CybercultureKim Flintoff
 
Information talk slides february2011 1-final
Information talk slides february2011 1-finalInformation talk slides february2011 1-final
Information talk slides february2011 1-finalKaisa Schreck
 
The Third Place Manifesto
The Third Place ManifestoThe Third Place Manifesto
The Third Place ManifestoStephen Johnson
 
Mba Admission Essay Writing Service Orange ThesisEs
Mba Admission Essay Writing Service Orange ThesisEsMba Admission Essay Writing Service Orange ThesisEs
Mba Admission Essay Writing Service Orange ThesisEsMonica Carter
 
The Hive Mind
The Hive MindThe Hive Mind
The Hive Mind0bj11
 
understanding the self Digital-self.pptx
understanding the self Digital-self.pptxunderstanding the self Digital-self.pptx
understanding the self Digital-self.pptxShinyaMochizuki
 
Vintage Fashion Essay
Vintage Fashion EssayVintage Fashion Essay
Vintage Fashion EssayMartha Bush
 
who is writing my autobiography
who is writing my autobiographywho is writing my autobiography
who is writing my autobiographyLuca De Biase
 
Linkedinjune2011
Linkedinjune2011Linkedinjune2011
Linkedinjune2011Chris Ngo
 
Virtual communities
Virtual communitiesVirtual communities
Virtual communitiesJfrogner
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Tech and Law Center
 

Semelhante a The Internet As Directed Anticipation (15)

Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
 
Social-Media
Social-MediaSocial-Media
Social-Media
 
A Criticial Approach to Social Media
A Criticial Approach to Social Media A Criticial Approach to Social Media
A Criticial Approach to Social Media
 
LECTURE 9 - Cyberculture
LECTURE 9 - CybercultureLECTURE 9 - Cyberculture
LECTURE 9 - Cyberculture
 
Information talk slides february2011 1-final
Information talk slides february2011 1-finalInformation talk slides february2011 1-final
Information talk slides february2011 1-final
 
The Third Place Manifesto
The Third Place ManifestoThe Third Place Manifesto
The Third Place Manifesto
 
Mba Admission Essay Writing Service Orange ThesisEs
Mba Admission Essay Writing Service Orange ThesisEsMba Admission Essay Writing Service Orange ThesisEs
Mba Admission Essay Writing Service Orange ThesisEs
 
The Hive Mind
The Hive MindThe Hive Mind
The Hive Mind
 
understanding the self Digital-self.pptx
understanding the self Digital-self.pptxunderstanding the self Digital-self.pptx
understanding the self Digital-self.pptx
 
Vintage Fashion Essay
Vintage Fashion EssayVintage Fashion Essay
Vintage Fashion Essay
 
who is writing my autobiography
who is writing my autobiographywho is writing my autobiography
who is writing my autobiography
 
Linkedinjune2011
Linkedinjune2011Linkedinjune2011
Linkedinjune2011
 
Virtual communities
Virtual communitiesVirtual communities
Virtual communities
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
 

Último

NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...Amil Baba Dawood bangali
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...Amil baba
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》rnrncn29
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Sapana Sha
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 

Último (20)

NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
 
Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road🔝+919953056974 🔝young Delhi Escort service Pusa Road
🔝+919953056974 🔝young Delhi Escort service Pusa Road
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111Call Girls In Yusuf Sarai Women Seeking Men 9654467111
Call Girls In Yusuf Sarai Women Seeking Men 9654467111
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 

The Internet As Directed Anticipation

  • 1. Online Privacy 1 Pro 250 Final Essay: Online Privacy PRO 250 Final Essay: Online Privacy Christopher Horne Professor Ellen Wolterbeck University of Advancing Technology
  • 2. Online Privacy 2 There is nothing greater than an idea whose time has come. [FL1] In our time, that idea may well be the Internet. The Internet is a radical discontinuity as a communications technology, but it also represents a projection of the needs and desires of the world. The web in its way embodies two of Mankind’s oldest dreams, to be omnipresent and to be invisible. Yet organizing a new form of viewing the world has its price. For the Internet, that price might be the loss of anonymity. Ideally the flexible personality could enter into this technological consensus without loss of self. The Net allows the mind to stand outside itself, creating an objective reality of facts and data that still represents a complete island in the original psyche. This has the effect of splitting the wholeness of the mind into rational and intuitive parts. This is not a new aspect of the human condition, but it does represent an objectification of the mental process. It is this objectification that represents the true danger. When a schizophrenic believes that everyone in the world can hear their thoughts, we call it madness. When the Internet actually turns this condition into reality, we call it commerce. Love letters, medical records, financial information, social networking blogs, reading habits and personal preferences of individual users become common knowledge almost instantly, all over the world. [FL2] Privacy is the power to selectively reveal oneself to the world. If the contents of all my words and actions are available, I have no privacy. For privacy to be widespread, it must be part of a social contract. McLuhan said that new technologies exert a gravitational effect on cognition, which in turn affects social organization. [FL3] Autonomy is still possible, but it must be bought at the price of internal freedoms and local identities. Culture rests on the limitation of the group. This is because one aspect of Man is that he is a tribal animal, and seeks the safety of a group identity as well as safety in numbers. The Internet at its heart is a
  • 3. Online Privacy 3 system of mapping, not only of IP addresses and domains, but of users and groups. Without this underlying system of organization, data packets could not efficiently find their destination addresses, and no communication would be possble. Yet this i efficient mapping system allows commerce and government to silently collect data from each IP address and manipulate it fortheir own purposes. Other parties, notably cyber-criminals, are able to exploit weaknesses in protocols and other mechanisms built into the structure of the web to steal identities and databases from the other participants. The very imperfection of the Internet echoes the imperfection of the world. The menace of loss of privacy leaves us vulnerable and threatens to leave us bankrupt of Self, and perhaps financially, too. We could of course agree to forego the speed and convenience of the system in favor of absolute personal control, but convenience has been sold since WWII as a panacea for all social ills, and is by now deeply ingrained in our culture. Online identity has no social referent, no history. Culturally we are in terra incognito, with our destination unknown. Thus it is hard to form the required social consensus that would strike an acceptable balance between convenience and safety, as we have, for example with the pharmaceutical drug industry. In its stead, personal information has become ‘commoditized’, just another product like fish sticks or lint rollers to be sold for a profit in the market. No one ponders the moral consequences of selling lint rollers. By extension, personal privacy becomes just as disposable. Thus the problem of personal privacy is essentially one of syntax. Faced with the problem of the implosion of world culture into a black hole of information, our only option is to find a context, a mythos, where we can define ourselves in relation to the phenomenon of the web as a whole. The Internet is first and
  • 4. Online Privacy 4 foremost a conceptual space. This is the business of the collective unconscious, the reservoir of the experiences of our species. Jung postulated that this collective psyche, as he called it, is common to everyone and has a better sense of the Self’s ideal than the ego than the conscious self does. It thus directs the Self, via archetypes, dreams, and intuition, moving the psyche towards individuation, or self-actualization. [FL4] Faced with a weightless wavespace where inputs curl upon themselves and disappear into an electronic void, we need to relate its phenomena and artifacts to something real and tangible, which includes something of ourselves. This new world has engendered new creatures, simulacra like Internet advertisers, who feed on sustained attention. Without the food of user interaction, online advertisers simply die, or are eaten by others of their kind. Every mouseclick shapes the net. Gaining ‘eyeballs’ magically transforms electrons into material energy. The brainwave activity of individual minds is translated directly into ones and zeros in faraway electronic bank accounts. Focused concentration by millions of users turns photons and electrons into gold, a feat beyond the dreams of any medieval alchemist. In order to accomplish this marvelous feat, advertisers must build a model of directed anticipation. This is the province of so called data miners and data aggregators. Data mining is the process of sorting through large amounts of data picking out relevant information. [FL5]. This harvested data is then processed by a data aggregator, an organization such as Acxiom or ChoicePoint involved in compiling information from detailed databases on individuals and selling that information to others. [FL6] The Internet has become a commodity within a decade of the advent of commercial use. Data is the new gold, a medium of exchange for goods and services.
  • 5. Online Privacy 5 At its heart, the Internet is a system of mapping. It is a machine for processing social interaction. The model for the Internet is one of directed anticipation. The process of socialization is directly related to exposure to media messages. Information is thought to produce an accelerated circulation of meaning, [FL3] but we sense that this is not so. People everywhere complain of ‘information overload’. The function of media is to create events, not the other way around. No one seems to suffer from ‘meaning overload’. Increasingly, however, the media defines itself as an extension of market forces. The Internet user is the product being sold. The ability of the market to attract viewers to specific locati ns on the Web is not unlike the classic relationship o between bees and flowers. The form of the ‘flower’, its shape, color, scent, and appearance are designed only for the purpose of creating a specific interaction with its user. In the case of the Internet, the nectar is information. The actual meaning of the information never enters the interaction. The information itself is an artifact of the marketing process. ‘Media’ is called media because it mediates between one reality and another. Users are both subject and objects. As subjects, we are in full possession of our individuality. Our sense of personal space, of restraint, judgment and desire are tempered by the facts of experience. As objects, our insecurities about who we are and the incompleteness of our psyches is ruthlessly manipulated by the most advanced advertising techniques available. Among these techniques is the ability to construct through data mining and information aggregation algorithms a digital doppelganger, a limited replica of ourselves that bears a resemblance to Freud’s ‘Id’. Freud divided the psyche into three parts- the Id, the Ego, and the Super-ego. The Id was supposed to represent inner desire, that part of ourselves governed by the pleasure principle. [FL7]
  • 6. Online Privacy 6 At a certain point, the real world functions to support the online world. We become like players in a game of chess, where bits of wood on a piece of patterned cardboard become extensions of our inner thought processes. The power of Freudian thought was in its metaphoric simplicity- a few dramatic images stabilized and organized all the data of a world in flux. Captivity is presented as liberation- we can be our ‘best selves’, but only if we accept the distorted image presented by the forces of the marketplace. The catch is that we are required to completely surrender our personal privacy to attain the vision of this ideal self. Consider the search box on a browser. As a device, it is a direct translation of the metaphysical idea that a question determines and brings about its own answer. We see through the prism of our categories. The categories we use are shared. Loss of meaningful structures of agreement results in loss of the definition of personality itself. We become willing partners in the process of selling ourselves. Any worldview is a creative tension between possibility and choice, but consent, as Noam Chomsky pointed out, can be readily manufactured. [FL8] In the United States, one of the primary definitions of privacy from the legal standpoint was provided by Samuel Warren and Louis Brandeis in an article in the Harvard Law Review in 1890 entitled The Right to Privacy [FN9]. In the first paragraph, the authors state, “The right to life has come to mean the right to enjoy life- the right to be let alone.” Later legal scholars such as Roscoe Pound [FN10] and Paul Freund [FN11] attempted to define privacy as an expression of personhood, a right of an individual to discover their nature as a human being. Privacy was sometimes seen as a moral freedom to engage in thoughts and actions, and to decide accordingly. The notion that citizens have a right to regulate information about themselves in order to define their interactions with other citizens is still common today, although, as Machiavelli noted in ‘The Prince’, “People are by nature changeable”, and more
  • 7. Online Privacy 7 ominously, “Politics have no relation to morals” [FN12]. Professor Ken Gormley in an online article [FN13] focused on cyber-law notes that US case law has subdivided the topic into about four areas of legal rights, which although interrelated, vastly complicate the interpretat on of i the basic question, “What is privacy?” These areas include Tort privacy, First Amendment Privacy (related to the Constitution’s guarantee of Free Speech), Fourth Amendment Privacy (relating to warrantless searches and seizures), and State Constitutional Privacy. Further complicating matters is the changing nature of individual privacy, which is subject to historic traditions, current and past events, changes in society and technology, and the trade-offs necessary to preserve the concept of Democracy in a dangerous world. For the moment, the philosophical and moral values of this subject are in flux. Older interpretations based on anthropology and sociology have been displaced by historical events focused on the interest of society as a whole, such as the World Trade Center attacks s [FN14] Many scholars claim that the concept of privacy is unnecessary for life in America. Privacy is not a right as such. Its stature as a force in society largely rests on moral and philosophical grounds. Many countries, such as Japan and China, with different historical perspectives, find comfort in group relations when addressing authorities such as government. An old Japanese saying is “The nail that sticks up must be hammered down.” Individuality is seen as a disturbing force in society. America was founded by social and religious refugees from Europe seeking self expression in the wake of the Protestant Reformation, the central tenet of which emphasized Man’s individual relationship with God. [FN15] However, in more secular terms, most functioning democracies require that citizens surrender certain information in order to maintain a viable administrative record on such matters as taxes, welfare, census and military eligibility (currently required but
  • 8. Online Privacy 8 not in active use). Privacy in these areas is superseded by public interest. At certain times in our history, such as the threat of terrorists in 2001 and in wartime in general, a temporary suspension of some aspects of personal privacy is generally considered to be an acceptable trade-off for the continuation of the institution of Democracy. The fulcrum point of this trade-off is the issue of Trust in government. Confucius, the fifth-century BC Chinese scholar and philosopher, stated that “If the people have no faith in their rulers, there is no standing in the state.”[FN16] However, in return for granting this trust, certain expectations by citizens must be advanced. An online article in Wikipedia on “Privacy Law “[FN17] references a document by the Organization for Economic Co-operation and Development (OECD) related to this matter called the “Fair Information Practice Principles” which underlie the structure of many privacy laws in democratic states. [FN18]. These are: OPENNESS There should be a general policy of openness about the practices and policies with respect to personal information. COLLECTIVE LIMITATION Personal information should be collected only for a stated purpose by lawful and fair means and with the knowledge or consent of the subject. PURPOSE SPECIFICATION The purpose for collecting personal information should be specified at the time of collection. Further uses should be limited to those purposes. USE LIMITATION Personal information should not be used for purposes other than those specified, except for
  • 9. Online Privacy 9 consent of the subject or by theauthority of law. DATA QUALITY Personal information must be accurate, complete, timely, and relevant to the purpose for which it is to be used. INDIVIDUAL PARTICIPATION Individuals should have the right to inspect and correct their personal information. SECURITY SAFEGUARDS Personal information should be protected against such risks as loss, unauthorized access, destruction, modification, or disclosure. ACCOUNTABILITY Someone in an organization should be held accountable for compliance with the organization’s privacy policy. Note that these principles are applicable in general both to government and commercial entities. [FN19] This has become a somewhat controversial point in recent years because of a deliberate US Government policy of outsourcing many of the functions which used to be the responsibility of the federal government. In particular, so-called data aggregators have become one of the chief agencies for creating value from personal data. [FN20] Online forms, loyalty cards, law enforcement data, demographic data, credit card data and other information is fed into an algorithm which creates a personal profile of all citizens. This profile is used by both commercial interests for marketing, insurance and financial appraisals of individuals, and by federal agencies such as the FBI, INS, and IRS in order to enforce laws and regulations. The lax protection of this data has become a serious problem for private citizens because criminal elements have begun to practice identity theft, which in effect robs the individual of their legal selfhood. Given that citizens are mandated
  • 10. Online Privacy 10 by law to grant personal information to the government,and that the government then violates their trust by giving that information to commercial entities in a manner which imperils the identity and well-being of those citizens, a serious ethical and moral condition has come to exist. Commercial entities have a different relationship with their customers, but here, too, the issue of trust is of paramount importance. Computers, communications networks, and digital information have made personal information readily avaiable on a near-universal basis to l companies. The possibilities for misuse of this information have certainly grown exponentially, while the ability of individuals to control their own data has developed an inverse relationship to its availability. The practice of outsourcing has made this information available worldwide. Tracking public opinion by surveys in order for legislators to remedy the situation has also become a problem, because the private agencies invo lved may now have either suspect motives or write the questions in able to influence the outcome in a way favorable to lobbyists [FN21]. The more vectors of distribution exist, the more the chances for theft by organized criminals and hackers online. This illegal activity has now reached the point where there are regular marketplaces online for buying and selling personal information [FN22]. While a valid credit card number may be purchased for a few dollars, an entire corporate database only fetches a few hundred dollars. Clearly, the problem has reached critical proportions. The notion of personal privacy is a received aesthetic construction. Beginning as a child, we self-modify our perceptual worlds in order to achieve perceptual rapport with the wider world, one that provides food, care, shelter and other requirements of survival. The need to adapt exists long before the need for autonomy. To take part in a society, we accept the precepts of that society; privacy is a category of permitted
  • 11. Online Privacy 11 behavior. Egalitarianism is repressed in favor of the goal of individual success. This reflects our history. To give an example, in Europe during WWII, the Nazi’s were able to use traffic analysis of telephones to identify the networks of people who were able to maintain views not in conformity with those of National Socialism. Once telephone numbers were identified, those persons were exterminated. Thus, telephone bills in Europe do not identify individual numbers, only ‘units’ of calls. The Europeans decided that the loss of convenience to customers in identifying individual calls was a good tradeoff for never allowing this heinous behavior to occur again. Privacy is a self-sustaining idea seeking its own expression, but it is also a nexus, a nucleus of a lot of other ideas. The question of personal privacy is one of syntax. The illusion of personal online privacy is at the heart of the Internet experience. Since the data offered back to the Internet is given without restraint, the value of that data is greatly enhanced. Personal searches represent unfiltered access to the needs and desires of specific persons. It remains only to identify and target that person to actuate marketing strategies. After a time, Internet searches form clusters of information, which further pinpoint the strategies required to manipulate users. Certain caveats apply- if the keyboard is used by more than one user, different demographics apply. But in general, the longer the ‘tail’ of personal search patterns the better the efficiency of an advertiser’s efforts. The Internet is a cultivated field from which is harvested sustained attention. It is a system of sympathetic viewing. On April 22, 2008, in a ruling that supersedes weaker US Supreme Court rulings, the Supreme Court of New Jersey became first court in the nation to rule that people have an expectation of privacy when they are online, and that law enforcement officials need a Grand Jury warrant to gain access to their private information .NJStar Ledger. [FL23]
  • 12. Online Privacy 12 It is this kind of case law that ultimately decides the rights of citizens, corporations, and the government in incorporating such matters as electronic privacy int normal customs o and culture. But it is a slow process, sometimes taking decades before the firm outlines of a solid legal foundation are in place. We are accustomed to thinking of change as a rapid process, but this is in some sense a manufactured illusion, designed to sell news. Real change resembles punctuated equilibrium, with the inculcation of generations. Our presidential candidates have only shifted from being of the WWII generation to the Vietnam generation. A twenty year old lieutenant in Iraq might expect to campaign for the top job in the Executive branch of Government sometime in 2040. By then, of course, the technological successors to the Internet will make these kinds of economic and moral decisions seem simplistic. The Internet may be located inside our skulls, which would sharpen the debate betweenwhere the rights of the inner person and those who wish to manipulate those rights to the physical boundaries of ourselves. We cannot live in the past, and the future is unknowable. The uncertainties and complexities of any culture are in the here and now. I have tried to the best of my small abilities to present some ideas for the elucidation of whoever may choose to read them. My goal is to leave the world a better place than I found it. That is all one person can do. References FL1 Victor Hugo, “Histoire d’un crime” quote from www.nature.com /nature/journal/v419/n6903/full/919108a.html FL2 Schneier, Bruce and Banisar, David. (1997). The Electronic Privacy Papers. New York: John Wiley and Sons. FL3 Baudrillard, Jean. (1994). Simulacra and Simulation. Ann Arbor: University of
  • 13. Online Privacy 13 Michigan Press. FL4 http://en.wikipedia.org/wiki/Collective_unconscious.html FL5 http://en.wikipedia.org/wiki/ Data_mining FL6 http://en.wikipedia.org/wiki/Data_aggregators FL7 http://en.wikipedia.org/wiki/Id%2C_ego%2C_and_super-ego FL8 Chomsky, Noam. (2002). Manufacturing Consent. New York: Pantheon Books FL9 Warren, Samuel D. and Brandeis, Louis D. (1890). The Right to Privacy. Harvard Law Review 193. FL10 Pound, Roscoe. (1921). The Spirit of the Common Law. Tucson: Marshall Jones. FL11 Freund, Paul A. (May 23, 1975). Address to the American Law Institute. Quoted in A.L.I. Proceedings 574-5. FL12 Machiavelli, Niccolo. (2008). The Prince. New York: Random House. FL13 http://cyber.law.harvard.edu/privacy/Gormley--100%20 Years%of20%Privacy FL14 Mead, Margaret. (1930). Growing Up in New Guinea. New York: Penguin. FL15 en.wikipedia.org/wiki/Martin_luther FL16 Confucius and Lau, D.C. (1998). The Analects of Confucius. New York: Penguin. FL17 http://en.wikipedia.org/wiki/Online_Privacy FL18 www.OECD.org/home FL19 http://www.egovt.nz/resources/research/trus t-and-privacy/chapter3.html FL20 www.privacyactivism.org/docs/DataAggregatorsStudy.html FL21 http://epic.org FL22 http://news.bbc.co.uk/2/hi/technology/7363422.stm FL23 www.nj.com/news/index.ssf/2008/04/supreme_court_rules_internet_u.html