Who’s watching you?The STS View of the Changing Landscape of the
Institution of Privacy
Ricky YeanDavid Tran
November 20, 2008
“You have zero privacy anyway. Get over it.” Scott McNealy
Founder and Chairman of SUN Microsystems
1
Overview
Definition
How We Got Here
IDUAR of Internet on Privacy
9/11
Social Networks
Summary
2
Privacy: A societal institution
"Each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication of himself to others, in light of the environmental conditions and social norms set by the society in which he lives." – Alan Westin, Privacy and Freedom, 1968
Sacrifice?Required?
3
How we got here:
4
How we got here:
4
How we got here:
4
IDUAR
5
IDUAR
Innovation: Creation of internet protocols and world wide web
Applications such as E-Mail
Enables faster access to and sharing of information
But who has access to this information?
I
5
IDUAR
6
IDUAR
Gov’t transferred control of internet access to public ISPs in 1989
Number of Internet HostsD
“The decision to make the Web an open system was necessary for it to be universal. You can't propose that something be a universal space and at the same time keep control of it.” -Tim Berners-Lee, Father of WWW
6
IDUAR
Gov’t transferred control of internet access to public ISPs in 1989
D“The decision to make the Web an open system was necessary for it to be universal. You can't propose that something be a universal space and at the same time keep control of it.” -Tim Berners-Lee, Father of WWW
6
IDUAR
7
IDUAR
Businesses
Government
Consumers
U
7
IDUAR
Convenient and streamlined access to everyday tasks and information
8
IDUAR
Convenient and streamlined access to everyday tasks and information
Low prerequisites
User-friendly interfaces
Takes little or no thought (esp. to privacy)
Convenient and streamlined access to everyday tasks and information
A
8
IDUAR
9
IDUAR
“ACLU Asks FCC to Scrutinize ISP Surveillance of Customers’
Internet Habits”
“EFF is suing AT&T for it's participation in the Bush administration's massive and illegal warrantless
wiretapping. “R “We may be legally compelled in the future to disclose personally identifiable information about you ... [But] We will use reasonable and lawful efforts to limit the scope of any such legally required disclosure, and we will make every attempt to notify you in advance insofar as we are legally permitted to do so. “
9
Watershed Moment: 9/11Leading Up to 9/11:
FTC statues and lawsuits
9/11 Changes SCES: National security before personal privacy
Homeland Security Act: “Cyber Security Enhancement”
DARPA: Total Information Awareness
10
Watershed Moment: 9/11Leading Up to 9/11:
FTC statues and lawsuits
9/11 Changes SCES: National security before personal privacy
Homeland Security Act: “Cyber Security Enhancement”
DARPA: Total Information Awareness
10
Watershed Moment: 9/11Leading Up to 9/11:
FTC statues and lawsuits
9/11 Changes SCES: National security before personal privacy
Homeland Security Act: “Cyber Security Enhancement”
DARPA: Total Information Awareness
10
Watershed Moment: 9/11Leading Up to 9/11:
FTC statues and lawsuits
9/11 Changes SCES: National security before personal privacy
Homeland Security Act: “Cyber Security Enhancement”
DARPA: Total Information Awareness
10
Case Study: Social Networks
11
Have online ProfilesDo not have online profiles
Online Teens
Contacted by strangerNever contacted by stranger
12
Summary: Future Trends in Online Privacy and Implications
Open Standards
Ultimately, people must be aware of what information they are divulging and understand the implications of new technology and policies on their private information.
13
McKay, S. “The Evolution of Online Privacy: 2000-2003”. Journal of Legal, Ethical, and Regulatory Issues, Volume 6, Number 2, 2003.
Lenhart, A. , Madden, M. “Teens, Privacy, & Online Social Networks”. PEW Internet & American Life Project.
“Effect of the USA Patriot Act on Internet Privacy”. http://cyber.law.harvard.edu/privacy/Introduction%20to%20Module%20V.htm
“History of Communications”. http://www.fcc.gov/omd/history/internet/common-standards.html”
Westin, Alan, Privacy and Freedom.
“Homeland Security Act of 2002”. http:/”P/www.whitehouse.gov/deptofhomeland/bill/
“EPIC Terrorism (Total) Information Awareness Page”. http://epic.org/privacy/profiling/tia/
“Privacy”. Stanford Encyclopedia of Philosophy. http://plato.stanford.edu/entries/privacy/
“Tim Berners-Lee”. http://www.w3.org/People/Berners-Lee/
“Federal Trade Commision”. http://www.ftc.gov/foia/privacy_act.shtm
“Sun on Privacy: Get Over It”. http://www.wired.com/politics/law/news/1999/01/17538
14
Images Used
http://www.crunchgear.com/wp-content/uploads/2008/08/usenet.gif
http://www.uvsc.edu/email/images/email-at1.gif
http://www.sortedsites.com/images/w3c-big.jpg
http://www.booktelevision.com/thewordthisweek/images/tabloids.jpg
http://upload.wikimedia.org/wikipedia/en/thumb/f/f9/DoubleClick_logo.svg/304px-DoubleClick_logo.svg.png
http://www.bu.edu/eng/news-cms/photos/Darpa_logo.jpg
http://www.meganboler.net/wp-content/uploads/2008/08/bush-as-uncle-sam-unwarranted-wiretap-730567.jpg
http://www.thomevincent.com/blog/images/web20/web20.jpg
http://imagecache2.allposters.com/images/pic/EPH/7827~The-Patriot-Act-Posters.jpg
http://www.fcc.gov/omd/history/internet/images/mci-mail.jpg
http://content.answers.com/main/content/wp/en/f/fa/Logo_cs40.gif
http://gothamist.com/attachments/nyc_toby/Wragge_Lane.jpg
http://www.top-tread-tyres.co.http://sourcenotes.files.wordpress.com/2008/07/facebook-logo.jpguk/images/email%20icon.gif
http://images.celebrities.com/d/DBeckhamAndSonS998.jpg
http://farm4.static.flickr.com/3250/2418014918_5f6439a7b8.jpg?v=0
15
Public Data No DataPrivate Data
Appendix A: User Data on Social Networks
16
Top Related