160 likes | 174 Views
Explore the complexities of privacy in society, technology, and behavior. Evaluate tools, redefine privacy, and challenge standard approaches. Join the conversation on disclosure, evaluation, and the boundaries of privacy. Discover a broader view.
E N D
Privacy:let‘s stop thinking small Bettina Berendt Dept. Computer Science KU Leuven http://people.cs.kuleuven.be/~bettina.berendt/
Tool types à la SPION • Confidentiality • Control • Awareness of ... • „I am being tracked.“ • „which audiences do I have (whom I could give access)?“ e.g., FreeBu • „when I am thinking too small about this“
A bigger picture Environment - technology, society Mental schema - privacy, p. problems Behaviour - disclosure, evaluation
Environment - technology, society Mental schema - privacy, p. problems Behaviour - disclosure, evaluation A bigger picture
Society, technology interpersonal boundaries disclosure E S B
Disclosure disclosure (over)evaluation E S B BUT: Evaluating something/someone along different dimensions can lead to worse judgements and less satisfying decisions
E S B Evaluation disclosure
E S B Evaluation privacy definitions & technology Def. of “appropriate”; Privacy is social privacy and some chilled overdisclosure (as opposed to instrumental privacy) [Moreno et al., 2009]
E S B Evaluation privacy definitions Privacy is an individually owned and tradeable good (as opposed to a fundamental right or a social good) Slashdot article on [Jentzsch, Preibusch & Harasser, 2012]
Please argue with me about • Let us not divide and conquer ourselves: • The standard (scientific ?!) distribution of work can be a dangerous self-blinding and continued delegation of responsibility when it comes to problems like privacy. • (Being forced to) being responsible is not only bad, but also part and parcel of being a human & a citizen. • We need awareness (tools), but we also need to build • true private spaces • true public spaces • “Privacy is not only about clicking Facebook.“
This talk was inspired by many … Intro quote (“I asked the audience not to tweet or blog while I was talking. Not out of respect for me, but out of respect for themselves.“): • Lanier, J. (2010). You are Not a Gadget. A Manifesto. New York: Knopf. http://www.jaronlanier.com/gadgetwebresources.html P.9: • Turkle, S. (2010). Alone Together. Why we Expect More from Technology and Less from Each Other. Basic Books. http://alonetogetherbook.com/ • Altman, I. (1976). Privacy: A conceptual analysis. Environment and Behaviour, 8(1), 7-29. P. 10: • Illouz, E. (2012). Why Love Hurts. Cambridge: Polity Press. – especially her reading of • Wilson, T.D. & Schooler, J.W. (1991). Thinking too much: Introspection can reduce the quality of preferences and decisions. Journal of Personality and Social Psychology, 60(2), 181-192. • Ofir, C. & Simonson, I (2001). In search of negative customer feedback: The effect of expecting to evaluate on satisfaction and evaluation. Journal of Marketing Research, 38(2),170-182.
Specific cited sources(these are examples of wider research areas) P. 12: • Moreno MA, Vanderstoep A, Parks MR, Zimmerman FJ, Kurth A, and Christakis DA. Reducing at-risk adolescents' display of risk behavior on a social networking web site: a randomized controlled pilot intervention trial. Arch Pediatr Adolesc Med, 163(1): 35-41, 2009. P. 13: • Nicola Jentzsch, Sören Preibusch, Andreas Harasser. Study on monetising privacy. An economic model for pricing personal information. European Network and information Security Agency (ENISA). Deliverable, February 2012. http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/monetising-privacy