Techné: Research in Philosophy and Technology 20 (1):51-68 (2016)
Authors |
|
Abstract |
Unprecedented advances in the ability to store, analyze, and retrieve data is the hallmark of the information age. Along with enhanced capability to identify meaningful patterns in large data sets, contemporary data science renders many classical models of privacy protection ineffective. Addressing these issues through privacy-sensitive design is insufficient because advanced data science is mutually exclusive with preserving privacy. The special privacy problem posed by data analysis has so far escaped even leading accounts of informational privacy. Here, I argue that accounts of privacy must include norms about information processing in addition to norms about information flow. Ultimately, users need the resources to control how and when personal information is processed and the knowledge to make information decisions about that control. While privacy is an insufficient design constraint, value-sensitive design around control and transparency can support privacy in the information age.
|
Keywords | Applied Philosophy Philosophy of Science Social Science |
Categories | (categorize this paper) |
ISBN(s) | 1091-8264 |
DOI | 10.5840/techne201632446 |
Options |
![]() ![]() ![]() ![]() |
Download options
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Informational Privacy, Data Mining, and the Internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
Would You Mind Being Watched by Machines? Privacy Concerns in Data Mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
KDD, Data Mining, and the Challenge for Normative Privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
First-Person Data, Publicity and Self-Measurement.Gualtiero Piccinini - 2009 - Philosophers' Imprint 9:1-16.
Privacy by design: delivering the promises. [REVIEW]Peter Hustinx - 2010 - Identity in the Information Society 3 (2):253-255.
Navigating Computer Science Research Through Waves of Privacy Concerns.Latanya Sweeney - 2004 - Acm Sigcas Computers and Society 34 (1 special issue):1-18.
Privacy in (Mobile) Telecommunications Services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Designing Databases That Enhance People’s Privacy Without Hindering Organizations: Towards Informational Self-Determination.Thomas B. Hodel-Widmer - 2006 - Ethics and Information Technology 8 (1):3-15.
Inaccuracy as a Privacy-Enhancing Tool.Gloria González Fuster - 2010 - Ethics and Information Technology 12 (1):87-95.
Psychological Explanation: The 'Private Data' Hypothesis.Michel Treisman - 1962 - British Journal for the Philosophy of Science 13 (August):130-143.
Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
Biobanks, Data Sharing, and the Drive for a Global Privacy Governance Framework.Edward S. Dove - 2015 - Journal of Law, Medicine and Ethics 43 (4):675-689.
“But the Data is Already Public”: On the Ethics of Research in Facebook.Michael Zimmer - 2010 - Ethics and Information Technology 12 (4):313-325.
Analytics
Added to PP index
2016-04-02
Total views
41 ( #274,340 of 2,498,792 )
Recent downloads (6 months)
3 ( #210,517 of 2,498,792 )
2016-04-02
Total views
41 ( #274,340 of 2,498,792 )
Recent downloads (6 months)
3 ( #210,517 of 2,498,792 )
How can I increase my downloads?
Downloads