Privacy in Context: Technology, Policy, and the Integrity of Social LifeStanford University Press, 24 nov. 2009 - 304 pagini Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life. |
Cuprins
1 | |
19 | |
Critical Survey of Predominant Approaches to Privacy | 65 |
The Framework of Contextual Integrity | 127 |
Conclusion | 231 |
Notes | 245 |
References | 257 |
Index | 281 |
Alte ediții - Afișează-le pe toate
Privacy in Context: Technology, Policy, and the Integrity of Social Life Helen Nissenbaum Nu există previzualizare disponibilă - 2009 |
Privacy in Context: Technology, Policy, and the Integrity of Social Life Helen Nissenbaum Nu există previzualizare disponibilă - 2009 |
Termeni și expresii frecvente
according actions activities actors aggregation allow analysis application approach attributes autonomy called capacity challenges changes Chapter claims companies conception concerns conflicts considered constitute consumer contexts contextual integrity court critical databases decision defined developed dichotomy direct discussed distinctive effective ends entrenched evaluation example expectation expressed flow framework of contextual function harm important individuals informational norms institutions interests limited means monitoring moral offers particular personal information political possible potential practices principles profiles protection question reasonable records relation relationships requires respective result reveal right to privacy roles rules serve share similar social society sources specific spheres subjects surveillance systems and practices technologies theories tion tracking transmission types United University users values violated