Privacy in context : technology, policy, and the integrity of social life

cover image

Where to find it

Information & Library Science Library

Call Number
JC596.2.U5 N57 2010
Status
Available

Law Library — 3rd Floor Collection (3rd floor)

Call Number
JC596.2.U6 N57 2010
Status
Checked Out (Due 9/27/2024)

Undergrad Library

Call Number
JC596.2.U5 N57 2010
Status
Checked Out (Due 7/21/2024)

Authors, etc.

Names:

Summary

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself--most people understand that this is crucial to social life --but the inappropriate, improper sharing of information.

Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts--whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Contents

  • Acknowledgments p. ix
  • Introduction p. 1
  • Part I Information Technology's Power and Threat
  • 1 Keeping Track and Watching over Us p. 21
  • 2 Knowing Us Better than We Know Ourselves: Massive and Deep Databases p. 36
  • 3 Capacity to Spread and Find Everything, Everywhere p. 51
  • Part II Critical Survey of Predominant Approaches to Privacy
  • 4 Locating the Value in Privacy p. 67
  • 5 Privacy in Private p. 89
  • 6 Puzzles, Paradoxes, and Privacy in Public p. 103
  • Part III The Framework of Contextual Integrity
  • 7 Contexts, Informational Norms, Actors, Attributes, and Transmission Principles p. 129
  • 8 Breaking Rules for Good p. 158
  • 9 Privacy Rights in Context: Applying the Framework p. 186
  • Conclusion p. 231
  • Notes p. 245
  • References p. 257
  • Index p. 281

Other details