Privacy

R. Baecker
{"title":"Privacy","authors":"R. Baecker","doi":"10.32388/0ahz4m","DOIUrl":null,"url":null,"abstract":"Fears about loss of privacy in computerized societies have been central to dystopian literature. The issue has also concerned thoughtful computer scientists and lawyers since the 1960s. By then, the scope of the computer revolution was making clear that governments and corporations could keep records about almost every aspect of our lives. As data storage became virtually limitless at trivial cost, effective uses of data grew, as did risks to personal privacy. We shall define privacy, look at its manifestations and roles, and discuss current and future threats to it. We shall introduce concepts that are key to understanding privacy, such as informed consent. A major concern is the threats to information privacy or data privacy, in which a person’s confidential information has errors or becomes exposed to people who should not be able to see or use it. We shall examine situations in which privacy can be invaded by governments, organizations, and individuals. Governments amass vast stores of personal data during the everyday course of administration and regulation. Government surveillance in many nations captures information that should be private, a topic we discussed in Chapter 6. Search engines, credit rating organizations, and insurance companies also gather huge amounts of data on consumers. When data is incorrect, or is hacked, there are serious implications for information privacy. Criminals seek to gain leverage by ferreting out computer-based data about personal financial transactions. Health information is a particularly sensitive area in which many people feel especially vulnerable. These are all ‘classical’ privacy concerns, the dangers of which were evident in the 1960s. New technologies have raised more concerns. Social media holds vast quantities of personal data that we have willingly disclosed, including information that could prove embarrassing later in life. A vivid example of a privacy breech was the Cambridge Analytica/Facebook scandal of 2018. New technologies raise new privacy concerns. Chips use GPS to track our location and movements. Recent advances in computer vision and the widespread deployment of video cameras enable face recognition. Chips located in the environment and embedded as sensors and prostheses in our bodies make our activities and even our moods accessible by others.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers and Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32388/0ahz4m","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Fears about loss of privacy in computerized societies have been central to dystopian literature. The issue has also concerned thoughtful computer scientists and lawyers since the 1960s. By then, the scope of the computer revolution was making clear that governments and corporations could keep records about almost every aspect of our lives. As data storage became virtually limitless at trivial cost, effective uses of data grew, as did risks to personal privacy. We shall define privacy, look at its manifestations and roles, and discuss current and future threats to it. We shall introduce concepts that are key to understanding privacy, such as informed consent. A major concern is the threats to information privacy or data privacy, in which a person’s confidential information has errors or becomes exposed to people who should not be able to see or use it. We shall examine situations in which privacy can be invaded by governments, organizations, and individuals. Governments amass vast stores of personal data during the everyday course of administration and regulation. Government surveillance in many nations captures information that should be private, a topic we discussed in Chapter 6. Search engines, credit rating organizations, and insurance companies also gather huge amounts of data on consumers. When data is incorrect, or is hacked, there are serious implications for information privacy. Criminals seek to gain leverage by ferreting out computer-based data about personal financial transactions. Health information is a particularly sensitive area in which many people feel especially vulnerable. These are all ‘classical’ privacy concerns, the dangers of which were evident in the 1960s. New technologies have raised more concerns. Social media holds vast quantities of personal data that we have willingly disclosed, including information that could prove embarrassing later in life. A vivid example of a privacy breech was the Cambridge Analytica/Facebook scandal of 2018. New technologies raise new privacy concerns. Chips use GPS to track our location and movements. Recent advances in computer vision and the widespread deployment of video cameras enable face recognition. Chips located in the environment and embedded as sensors and prostheses in our bodies make our activities and even our moods accessible by others.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
隐私
对计算机化社会中隐私丧失的担忧一直是反乌托邦文学的核心内容。自20世纪60年代以来,这个问题也引起了深思熟虑的计算机科学家和律师的关注。到那时,计算机革命的范围已经很清楚,政府和公司可以记录我们生活的几乎每一个方面。随着数据存储以微不足道的成本变得几乎无限,对数据的有效利用也在增加,对个人隐私的风险也在增加。我们将定义隐私,看看它的表现形式和作用,并讨论当前和未来对它的威胁。我们将介绍理解隐私的关键概念,例如知情同意。一个主要的担忧是对信息隐私或数据隐私的威胁,其中一个人的机密信息有错误或暴露给不应该看到或使用它的人。我们将研究隐私可能被政府、组织和个人侵犯的情况。政府在日常管理和监管过程中积累了大量的个人数据。许多国家的政府监控获取了本应属于私人的信息,这是我们在第六章讨论过的话题。搜索引擎、信用评级机构和保险公司也收集了大量的消费者数据。当数据不正确或被黑客攻击时,会对信息隐私产生严重影响。犯罪分子试图通过搜寻有关个人金融交易的计算机数据来获得杠杆作用。健康信息是一个特别敏感的领域,许多人感到特别脆弱。这些都是“经典的”隐私问题,其危险在20世纪60年代是显而易见的。新技术引发了更多的担忧。社交媒体上有大量我们自愿披露的个人数据,包括可能在以后的生活中让人尴尬的信息。2018年剑桥分析公司/Facebook丑闻是隐私泄露的一个生动例子。新技术引发了新的隐私问题。芯片利用GPS追踪我们的位置和活动。计算机视觉的最新进展和摄像机的广泛部署使人脸识别成为可能。植入环境中的芯片以传感器和假肢的形式植入我们的身体,使我们的活动甚至情绪都能被他人接触到。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Law and order, war and peace Free speech, politics, and government Privacy Computers in education and learning Lifestyle
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1