Podcast
Questions and Answers
What is the nature of privacy as described?
What is the nature of privacy as described?
- A prudential right (correct)
- A societal privilege
- A universal human right
- An inherent natural right
What is one of the reasons mentioned for modern life being more private than life centuries ago?
What is one of the reasons mentioned for modern life being more private than life centuries ago?
- Increased public entertainment options
- Traveling alone in automobiles (correct)
- Living with extended families
- Communal living
What remedy is suggested for the challenge of living among strangers?
What remedy is suggested for the challenge of living among strangers?
- Sharing private information
- Avoiding public spaces
- Limiting personal interactions
- Establishing reputations (correct)
What was a consequence of secretly monitoring the nanny as discussed?
What was a consequence of secretly monitoring the nanny as discussed?
According to rule utilitarian evaluation, why was the action of monitoring nannies deemed wrong?
According to rule utilitarian evaluation, why was the action of monitoring nannies deemed wrong?
What expectation does the nanny have regarding her interactions inside the home?
What expectation does the nanny have regarding her interactions inside the home?
What best describes the overall conclusion regarding the Sullivans’ decision to monitor the nanny?
What best describes the overall conclusion regarding the Sullivans’ decision to monitor the nanny?
What was the primary purpose of the Netflix Prize?
What was the primary purpose of the Netflix Prize?
What issue arose from the AOL Search Dataset?
What issue arose from the AOL Search Dataset?
Why did Lotus Development Corporation abandon its plan to sell the CD with American household information?
Why did Lotus Development Corporation abandon its plan to sell the CD with American household information?
What type of information was specifically stripped from the Netflix user ratings dataset before its release?
What type of information was specifically stripped from the Netflix user ratings dataset before its release?
What led to public outcry in the case of the AOL Search Dataset?
What led to public outcry in the case of the AOL Search Dataset?
What purpose does Facebook's tagging system primarily serve?
What purpose does Facebook's tagging system primarily serve?
What requirement do cell phone providers in the United States have regarding active cell phones?
What requirement do cell phone providers in the United States have regarding active cell phones?
How do rewards or loyalty programs benefit shoppers?
How do rewards or loyalty programs benefit shoppers?
What is a key feature of 3-D body scanners in department stores?
What is a key feature of 3-D body scanners in department stores?
What does RFID stand for?
What does RFID stand for?
What is an advantage of replacing bar codes with RFID tags?
What is an advantage of replacing bar codes with RFID tags?
What potential concern arises from the use of RFID tags that cannot be removed?
What potential concern arises from the use of RFID tags that cannot be removed?
What is one way body scanners benefit customers in stores?
What is one way body scanners benefit customers in stores?
What is a significant outcome of using RFID technology in inventory management?
What is a significant outcome of using RFID technology in inventory management?
What does TiVo service allow subscribers to do?
What does TiVo service allow subscribers to do?
What type of data does TiVo collect about its subscribers?
What type of data does TiVo collect about its subscribers?
What is a cookie in the context of web browsing?
What is a cookie in the context of web browsing?
What does the General Data Protection Regulation (GDPR) require companies to do?
What does the General Data Protection Regulation (GDPR) require companies to do?
How do companies use data mining?
How do companies use data mining?
What does Google do with the information it collects from search queries?
What does Google do with the information it collects from search queries?
What is a primary function of cookies on a website?
What is a primary function of cookies on a website?
What does data mining enable companies to create?
What does data mining enable companies to create?
Which of the following is a common method American companies are using to respond to GDPR?
Which of the following is a common method American companies are using to respond to GDPR?
What can users do regarding cookies in their web browser settings?
What can users do regarding cookies in their web browser settings?
What feature allows users to limit the amount of information Google saves about their activities?
What feature allows users to limit the amount of information Google saves about their activities?
Which of the following information can Google collect from signed-in devices?
Which of the following information can Google collect from signed-in devices?
What is collaborative filtering primarily used for?
What is collaborative filtering primarily used for?
In the context of ownership of transaction information, what does 'opt-in' imply?
In the context of ownership of transaction information, what does 'opt-in' imply?
Which method involves keeping track of purchases to analyze consumer preferences?
Which method involves keeping track of purchases to analyze consumer preferences?
What was one strategy used by Target to attract pregnant women as new customers?
What was one strategy used by Target to attract pregnant women as new customers?
What can be a barrier for new businesses regarding data sharing?
What can be a barrier for new businesses regarding data sharing?
Which of the following items was noted as frequently purchased by Target customers in their second trimester?
Which of the following items was noted as frequently purchased by Target customers in their second trimester?
What does 'opt-out' allow organizations to do?
What does 'opt-out' allow organizations to do?
What type of data analysis does explicit method involve in collaborative filtering?
What type of data analysis does explicit method involve in collaborative filtering?
Flashcards
Facebook Tags
Facebook Tags
Labels identifying people in photos on Facebook. Facebook uses facial recognition to suggest friend names.
Enhanced 911 Services
Enhanced 911 Services
Cell phone providers track the location of active phones to within 100 meters, helping emergency responders locate people in distress.
Rewards Programs
Rewards Programs
Store rewards programs allow shoppers to save money and receive personalized services based on buying habits.
Body Scanners
Body Scanners
Signup and view all the flashcards
RFID Tags
RFID Tags
Signup and view all the flashcards
RFID Speed Inventory
RFID Speed Inventory
Signup and view all the flashcards
Privacy as a prudential right
Privacy as a prudential right
Signup and view all the flashcards
Modern privacy vs. past
Modern privacy vs. past
Signup and view all the flashcards
Establishing reputations
Establishing reputations
Signup and view all the flashcards
Privacy vs. monitoring (Nanny example)
Privacy vs. monitoring (Nanny example)
Signup and view all the flashcards
Rule Utilitarianism (Nanny)
Rule Utilitarianism (Nanny)
Signup and view all the flashcards
Social Contract (Nanny)
Social Contract (Nanny)
Signup and view all the flashcards
TiVo Service
TiVo Service
Signup and view all the flashcards
Cookie
Cookie
Signup and view all the flashcards
GDPR
GDPR
Signup and view all the flashcards
Data Mining
Data Mining
Signup and view all the flashcards
Secondary Use
Secondary Use
Signup and view all the flashcards
Personalized Search
Personalized Search
Signup and view all the flashcards
Limiting Google Activity
Limiting Google Activity
Signup and view all the flashcards
Privacy Checkup
Privacy Checkup
Signup and view all the flashcards
Collaborative Filtering
Collaborative Filtering
Signup and view all the flashcards
Explicit Method (CF)
Explicit Method (CF)
Signup and view all the flashcards
Implicit Method (CF)
Implicit Method (CF)
Signup and view all the flashcards
Ownership of Transactions
Ownership of Transactions
Signup and view all the flashcards
Opt-in
Opt-in
Signup and view all the flashcards
Opt-out
Opt-out
Signup and view all the flashcards
Targeting Pregnant Women (Marketing)
Targeting Pregnant Women (Marketing)
Signup and view all the flashcards
Customer backlash to data collection
Customer backlash to data collection
Signup and view all the flashcards
Netflix Prize
Netflix Prize
Signup and view all the flashcards
AOL Search Dataset
AOL Search Dataset
Signup and view all the flashcards
Marketplace Household Data
Marketplace Household Data
Signup and view all the flashcards
Data privacy issues
Data privacy issues
Signup and view all the flashcards
Data Anonymization
Data Anonymization
Signup and view all the flashcards
Data breaches
Data breaches
Signup and view all the flashcards
Study Notes
Chapter 5: Information Privacy
-
Information Technology Erodes Privacy: Computers, databases, and the internet facilitate increasingly sophisticated information collection, exchange, combination, and distribution. This makes accessing information about others, including strangers, easier than ever. A significant figure concerning this topic is Scott McNealy, who said "You have zero privacy anyway. Get over it."
-
Themes of This Chapter:
- What is privacy, and do we have a natural right to it?
- There's a tension between privacy rights and knowing enough about others for trust.
- How organizations collect information about our daily activities.
- How data mining creates individual profiles.
- How marketers use consumer profiles.
- How data mining techniques are applied in politics.
-
Defining Privacy: Privacy is tied to the concept of access. It encompasses physical proximity and knowledge about a person. Privacy is often viewed as a "zone of inaccessibility"; violating it is an affront to individual dignity. However, too much privacy can be harmful to society.
-
Harms of Privacy: Privacy can mask illegal or immoral activities, burden families, mask dysfunctional families, and allow for the marginalization of marginalized people in society.
-
Benefits of Privacy: Necessary for personal growth, promotes individual responsibility, recognizes personal freedom, enables creativity and intellectual/spiritual development, and fosters loving relationships.
-
Natural Right to Privacy (Argument in Favor):
- Originated from property rights: Historically, the home was considered a sanctuary.
- Coercive Acts (1773) led to the 3rd Amendment to the US Constitution, which protects the right to privacy in homes.
- Warren and Brandeis' "The Right to Privacy" (1890) defined privacy as the right to be left alone, now recognized in American courts.
-
Natural Right to Privacy (Argument Against): (Judith Jarvis Thomson)
- There's difficulty in defining privacy.
- Defining it as the right to be left alone is too narrow (not encompassing covert spying) or too broad (including assault).
- Violating privacy often involves violating other rights; therefore, precise definition isn't necessary.
-
Conclusion on Natural Right to Privacy: Privacy isn't a natural right, but a prudential one with benefits to society. Rational people recognize it.
-
Privacy and Trust: Modern life is possibly more private than life in prior centuries because most people aren't in close, extended families, and cars and TV enable more solitude, contrasted with the past where communities often lived together. Establishing reputations is done in exchange for less privacy. Methods of establishing reputations include ordeals (lie detector tests) and credentials (driver's license).
-
Case Study: New Parents: The Sullivans purchase a system that monitors their nanny through a laptop camera in their family room without informing the nanny. This highlights ethical issues regarding employee privacy.
-
Rule Utilitarian Evaluation: If everyone monitored nannies, there would be negative consequences (e.g., nanny stress, child abuse decrease, job satisfaction in child-care decrease) that outweigh any potential benefits, so the action was deemed wrong.
-
Social Contract Theory Evaluation: Privacy in the home is a reasonable tenet of society. The nanny has a reasonable expectation of privacy in her interactions with the baby in the home; thus, the Sullivans' action of secretly monitoring the nanny is judged ethically wrong because it violates that privacy.
-
Kantian Evaluation: If every employer secretly monitored employees who worked with vulnerable people, the idea of privacy would no longer exist; this rule would not hold. Therefore, according to Kantian ethics, the Sullivans' action is judged to be wrong.
-
Virtue Ethics Evaluation: Parents are responsible for their children's well-being.
-
Information Disclosures (5.3): • Public Records: Information about incidents and actions reported to a government agency (e.g., birth certificates, marriage records, deeds to property). Computerized databases and the internet facilitate easy access to public records. • Information Held by Private Organizations: Credit card purchases, purchases with loyalty cards, voluntary disclosures, and posts to social media.
-
Data Gathering and Privacy Implications: • Facebook Tags: Labels identifying people in photos, involving facial recognition, potentially increasing risk of improper tagging. • Enhanced 911 Services: Cell phone companies track location data, raising concerns about data sharing. • Rewards or Loyalty Programs: Data of customer buying habits used by businesses for personalized service. • Body Scanners: 3-D body scanners gather individual body measurements, which can be used for clothing recommendations and custom-made clothing. • RFID Tags: Radio Frequency Identification tags. Contain more information than bar codes, are easily scanned, and become tracking devices. • Implanted Chips: Microchips with personal information, implanted in animals (in Taiwan, for example). Has possibilities for use with humans. • Mobile Apps: Many apps collect location data and sell it to advertisers. • Facebook Login: Allows login to websites/apps with Facebook credentials.
-
(5.4) Data Mining: • Searching records in databases to find patterns and relationships. • Creating profiles of individuals based on data mining.
• Google's Personalized Search: Tracks search queries and visited webpages, learns user interests for returning more relevant results. Data is also used by retailers to target specific ads (direct marketing). • Limiting Information Google Saves: Google allows users to limit the information collected.
• Collaborative Filtering: Analyzing preferences of a large group of people to predict the preference of an individual (e.g., purchases, movies). Used by movie sites and retailers.
• Ownership of Transaction Information: Who controls transaction information (buyer, seller or both)? Opt-in (permission required) versus opt-out (consent presumed until withdrawn).
• "Target"-ing Pregnant Women: Target used data mining of customer shopping to predict pregnancy in second trimester, targeting marketing to those customers.
• Credit Reports: Credit bureaus track assets, debts, and payment history. Credit reports are sold to banks, credit card companies, etc. for borrowing money decisions. This allows choices and can affect employment options.
• Targeted Direct Mail: Businesses utilize customized mailing lists based on information collected online and offline. Shopping habits might be used to predict consumer demographics and lifestyles, used for direct-mail targeting and pricing.
• Microtargeting: Political campaigning uses voter demographics (registration, voting frequency, consumer data, locations) to target specific voters (e.g., home visits, emails, text messages).
• Social Network Analysis: Information from social networks is collected to inform decisions. Businesses may provide special promotions to influencers.
• Controlling Your Facebook Info: Options for controlling public visibility (friends' lists, future posts). Users may choose what information to share from their profiles to minimize potential public awareness from the sharing of this information.
• Additional controls may include choices to limit sharing of location history, advertising based on preferences or information about themselves, and additional controls for their posts. • Netflix Prize: A $1 million contest to develop better movie recommendation algorithms. Researchers discovered that customer data in this case was not truly anonymous, despite efforts to mask personal information.
• AOL Search Dataset: A dataset of AOL user search queries was posted publicly, revealing personal search data of 650,000 users. This led to a public outcry.
-
(5.5) Examples of Consumer or Political Backlash: • Lotus Development Corporation: Lotus had plans to sell a CD of information about 120 million Americans. This prompted consumer complaints about an invasion of privacy, resulting in abandoning the endeavor.
• Facebook Beacon: A targeted advertising device that posted information about user purchases to their friends' newsfeeds. The practice was criticized, led to a campaign by MoveOn.org, and Facebook changed to an opt-in policy.
• Malls Track Shoppers' Cell Phones: Concerns about the privacy of shoppers' movement in malls when using cell phones. Small signs informed shoppers about the study.
• iPhone Apps Upload Address Books: An app used the ability to upload an iPhone’s contacts without permission. After an outcry, this was corrected.
• Instagram's Proposed Terms of Service Change: Terms changes for using photos for advertising and in ads without permission were met with legal and consumer criticism and the original terms were restored.
• Cambridge Analytica: Collected personal information about 87 million people from publicly available Facebook information without permission. Campaign managers attempted to exploit the dataset for the benefit of specific politicians. Data was misused without the appropriate permission in this case.
-
Summary: Modern information technology makes information much easier to collect, and there are competing interests regarding privacy (user desire and company profit). Public records are generally considered part of the public domain. Sharing personal information often comes with some expectation that the receiver will use the information for the purpose disclosed. Companies sometimes push the boundaries of personal information use.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.