Privacy in Context: Technology, Policy, and the Integrity of Social LifeStanford University Press, 2009 M11 24 - 304 páginas Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life. |
Contenido
1 | |
19 | |
Critical Survey of Predominant Approaches to Privacy | 65 |
The Framework of Contextual Integrity | 127 |
Conclusion | 231 |
Notes | 245 |
References | 257 |
Index | 281 |
Otras ediciones - Ver todas
Privacy in Context: Technology, Policy, and the Integrity of Social Life Helen Nissenbaum Sin vista previa disponible - 2009 |
Privacy in Context: Technology, Policy, and the Integrity of Social Life Helen Nissenbaum Sin vista previa disponible - 2009 |
Términos y frases comunes
Accessed June activities actors Acxiom aggregation autonomy breaches capacity CCTV challenges Charles Fried ChoicePoint claims companies conception conflicts consumer contexts contextual integrity data mining databases Digital Rights Management E-ZPass entrenched norms evaluation example expectation of privacy Facebook flow of information flows of personal framework of contextual function Google harm heuristic identifiable important individuals information flows informational norms interests Internet law enforcement Lotus Marketplace mation means monitoring and tracking moral and political offers particular personal information potential price discrimination privacy protection profiles public records purposes question realms reasonable recipients relationships relative informational norms relevant requires RFID right to privacy roles rules share social networking sites society socio-technical systems specific spheres Street View surveillance systems and practices tags theories tion transmission principles types of information users vacy values violated