Privacy as Contextual Integrity Helen Nissenbaum Department of Culture & Communications, NYU http://www.nyu.edu/projects/nissenbaum.

Slides:



Advertisements
Similar presentations
Justice & Economic Distribution (2)
Advertisements

Proactive Interventions: Incorporating a Children’s Rights Approach
Tri-Council Policy Statement 2010 Ethical Conduct for Research Involving Humans.
+ Developing Codes of Practice for Indigenous Research Suzanne Urbanczyk, HREB Member, Assoc Prof, Linguistics Eugenie Lam, Ethics Coordinator Wanda Boyer,
Introduction to basic principles
HUMAN RIGHTS Right of everyone to the enjoyment of the highest attainable standard of physical and mental health Heather Payne-Drakes.
Friendship and Support. Overview of Friendship Nature of Friendship Rules of Friendship Theories of Friendship Balance Theory Developmental Theory Theories.
L Social Atomism: as rational, self-interested individuals, we are interested in promoting the social good through a contract because it benefits us personally.
 Discrete data: do the lines between mean anything?  When do you use area charts: does the area mean anything or is it for visual effect?  Stacked charts:
Chapter 5 Leadership and Diversity
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Engineering Privacy November 6, 2008.
C MU U sable P rivacy and S ecurity Laboratory Philosophical definitions of privacy Lorrie Faith Cranor October 19, 2007.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech / Privacy.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 History and.
Limits on Political Authority 1)Morality: laws obligate only if they are moral, that is, if they are consistent with reason or the natural law (Stoics).
Contextual Integrity in PORTIA PI: Helen Nissenbaum Students: Timothy Weber & Michael Zimmer New York University In collaboration with: Sam Hawala (U.S.
Code of Ethics of the National Association of Social Workers
Project Management “Introduction to Project Management: Tools, Techniques, and Practices” BA 320 Operations Management.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
Chapter 6 Objectives Define interpersonal relationships & interpersonal communication Explain the importance of interpersonal relationships Describe the.
Research Ethics Dr Jennie Louise Discipline of Philosophy
What’s a Nice Law Professor Like You Doing at a Conference Like This? Katherine J. Strandburg Albert B. Engelberg Professor New York University School.
Guardianship for children deprived of parental care A handbook to reinforce guardianship systems to cater for the specific needs of child victims of trafficking.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 History and Philosophy Week.
Privacy as contextual integrity Helen Nissenbaum New York University September 6, 2007 Ars Electronica, Linz Support.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
The Primacy of Privacy: A survey of knowledge and opinions Prof. Masooda Bashir Kevin Hoff Gahyun Jeon.
“You have zero privacy,” “You own your data,” and other Myths Dr. Gilad L. Rosner Visiting Researcher Horizon Digital Economy Research Institute
The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford
Contextual Integrity as a Normative Guide for Privacy Helen Nissenbaum New York University * School of Information, UC Berkeley April 2, 2008 * Supported.
Business Ethics Lecture Rights and Duties 1.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Privacy in Context Helen Nissenbaum Department of Culture and Communication New York University m Research supported.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Schematic Model For the Nursing Meta-paradigm Alzheimer’s as a.
Dimensions of Privacy 18739A: Foundations of Security and Privacy Anupam Datta Fall 2009.
Types of privacy (Solove, Understanding Privacy)
Embedding Multilevel Factors in an Organization Field Context W. Richard Scott Stanford University.
International and Cross-Cultural Negotiation McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Definitions So what’s an “underrepresented” group?
ANIE IE Research Workshop Objectives towards a Curriculum Development University of Pretoria July 4-5, 2011 Rafael Capurro International Center for Information.
Comparing Political Systems. Why Compare To develop perspective on the mix of constants and variability which characterize the world’s governments and.
Definition: Privacy Psychology: Selective access to oneself or one’s group. Legal: The right to be left alone What is the difference between privacy and.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
RULES & EXPECTATIONS FOR CLOSE RELATIONSHIPS THE NATURE OF RELATIONSHIP RULES/EXPECTATIONS l CULTURAL AND PERSONAL EXPECTATIONS –Assist With Predictability.
McGraw-Hill© 2003 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill© 2003 The McGraw-Hill Companies, Inc. All rights reserved Chapter.
Communicating Results what can we say and to whom.
LEARNER CENTERED APPROACH
Manager ethics Definition of Ethics Slovak University of Technology Faculty of Material Science and Technology in Trnava.
Interpersonal Communication
1 Copyright © International Security, Trust & Privacy Alliance -All Rights Reserved Making Privacy Operational International Security, Trust.
Sociology.  What does society look like?  What is sociology?  Levels of Analysis  The Sociological Perspective  Starting your sociological journey.
Copyright © 2008 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 7 Generating Research Evidence Ethically.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Copyright © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 7 Ethics in Nursing Research.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
THE core elements of digital citizenship
Definition: Privacy Psychology: Selective access to oneself or one’s group. Legal: The right to be left alone What is the difference between privacy and.
Authentic service-learning experiences, while almost endlessly diverse, have some common characteristics: Positive, meaningful and real to the participants.
PRIVACY AND DATA PROTECTION in THE BIG DATA AGE JONATHAN PRICE.
Research Ethics Dr Nichola Seare Aston Health Research & Innovation Cluster.
Accountability and Coordination in a Decentralized Context: Institutional, Fiscal and Governance Issues Session I: General Good Principles in Integrated.
A trust-based framework for the data-driven economy
Tri-Council Policy Statement 2010
The right to be let alone … by yourself
Beyond Personal & Professional Decision Making
Ethics and Politics of Computational Social Science
Presentation transcript:

Privacy as Contextual Integrity Helen Nissenbaum Department of Culture & Communications, NYU http://www.nyu.edu/projects/nissenbaum

Overview What is privacy and why do we care about it (if we do)? Definitions Control versus Access Descriptive versus normative In search of a normative foundations for privacy “not a court of law but a court of conscience…” BUT … Conflicts, tradeoffs, balancing Principles -- e.g. sensitivity of information Problem: privacy in public (aggregation, data mining, etc.) Solution: fight it out; interest politics; revert to dogmatism Look for guidance at societal level

What is Privacy? …. Definitions Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. --Charles Fried Privacy is a limitation of others’ access to an individual through information, attention, or physical proximity. --Ruth Gavison Privacy is the right to control information about and access to oneself. -- Priscilla Regan Common Law Right to Privacy (as characterized by Samuel Warren and Louis Brandeis, 1890): An individual’s right of determining, ordinarily, to what extent his thoughts, sentiments, and emotions shall be communicated to others. "Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extend information about them is communicated to others." (p. 7) "...privacy is the voluntary and temporary withdrawal of a person from the general society through physical or psychological means, either in a state of solitude or small-group intimacy or, when among larger groups, in a condition of anonymity or reserve." (p. 7) Westin, Alan F. Privacy and Freedom. (New York: Atheneum, 1967)

Overview What is privacy and why do we care about it (if we do)? Definitions Control versus Access Descriptive versus normative In search of a normative foundations for privacy “not a court of law but a court of conscience…” BUT … Conflicts, tradeoffs, balancing Principles -- e.g. sensitivity of information Problem: privacy in public (aggregation, data mining, etc.) Solution: fight it out; interest politics; revert to dogmatism Look for guidance at societal level

Privacy as Contextual Integrity Norms of Appropriateness determine what types of information are/are not appropriate for a given context Norms of Distribution (Flow, transfer) determine the principles governing distribution (flow, transfer) of information from one party to another. S shares information with R at S’s discretion R requires S to share information R may freely share information about S R may not share information about S with anyone R may share information about S under specified constraints Information flow is/is not reciprocal Etc. Contextual Integrity, is respected when norms of appropriateness and distribution are respected; it is violated when any of the norms are infringed.

Questions Can we develop systematic ways to inform the technical mission of privacy-preserving data transactions (including data-mining) with contextual norms? Meta-question: If this is a beginning, how do we establish meaningful, ongoing conversation across the disciplines -- despite vast differences in knowledge-bases and methodologies?