Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Privacy
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Actions which reduce privacy== As with other [[#Conceptions of privacy|conceptions of privacy]], there are various ways to discuss what kinds of processes or actions remove, challenge, lessen, or attack privacy. In 1960 legal scholar [[William Prosser (academic)|William Prosser]] created the following list of activities which can be remedied with privacy protection:{{sfn|Solove|2010|p=101}}<ref>{{cite journal|last1=Prosser|first1=William|author-link1=William Prosser (academic)|title=Privacy|journal=[[California Law Review]]|date=1960|volume=48|issue=383|page=389|doi=10.2307/3478805|jstor=3478805|url=http://scholarship.law.berkeley.edu/californialawreview/vol48/iss3/1}}</ref> # Intrusion into a person's private space, own affairs, or wish for solitude{{sfn|Solove|2010|p=101}} # Public disclosure of personal information about a person which could be embarrassing for them to have revealed{{sfn|Solove|2010|p=101}} # Promoting access to information about a person which could lead the public to have incorrect beliefs about them{{sfn|Solove|2010|p=101}} # Encroaching someone's personality rights, and using their likeness to advance interests which are not their own{{sfn|Solove|2010|p=101}} From 2004 to 2008, building from this and other historical precedents, Daniel J. Solove presented another classification of actions which are harmful to privacy, including collection of information which is already somewhat public, processing of information, sharing information, and invading personal space to get private information.{{sfn|Solove|2010|p=103}} ===Collecting information=== In the context of harming privacy, information collection means gathering whatever information can be obtained by doing something to obtain it.{{sfn|Solove|2010|p=103}} Examples include surveillance and [[interrogation]].{{sfn|Solove|2010|p=103}} Another example is how consumers and marketers also collect information in the business context through facial recognition which has recently caused a concern for things such as privacy. There is currently research being done related to this topic.<ref>{{Cite journal|last1=Zhou|first1=Yinghui|last2=Lu|first2=Shasha|last3=Ding|first3=Min|date=2020-05-04|title=Contour-as-Face Framework: A Method to Preserve Privacy and Perception|journal=Journal of Marketing Research|language=en-US|volume=57|issue=4|pages=617β639|doi=10.1177/0022243720920256|s2cid=218917353|issn=0022-2437|doi-access=free}}</ref> Companies like Google and Meta collect vast amounts of personal data from their users through various services and platforms. This data includes browsing habits, search history, location information, and even personal communications. These companies then analyze and aggregate this data to create detailed user profiles, which are sold to advertisers and other third parties. This practice is often done without explicit user consent, leading to an invasion of privacy as individuals have little control over how their information is used. The sale of personal data can result in targeted advertising, manipulation, and even potential security risks, as sensitive information can be exploited by malicious actors. This commercial exploitation of personal data undermines user trust and raises significant ethical and legal concerns regarding data protection and privacy rights.<ref>{{Cite journal|last=Esteve|first=AsunciΓ³n|date=2017|title=The business of personal data: Google, Facebook, and privacy issues in the EU and the USA|journal=International Data Privacy Law|volume=7|issue=1|pages=36β47|doi=10.1093/idpl/ipw026|url=https://academic.oup.com/idpl/article-abstract/7/1/36/3097625?redirectedFrom=fulltext&login=false}}</ref> ===Aggregating information=== It can happen that privacy is not harmed when information is available, but that the harm can come when that information is collected as a set, then processed together in such a way that the collective reporting of pieces of information encroaches on privacy.{{sfn|Solove|2010|pp=104β05}} Actions in this category which can lessen privacy include the following:{{sfn|Solove|2010|pp=104β05}} * [[data aggregation]], which is connecting many related but unconnected pieces of information{{sfn|Solove|2010|pp=104β05}} * identification, which can mean breaking the [[de-identification]] of items of data by putting it through a [[de-anonymization]] process, thus making facts which were intended to not name particular people to become associated with those people{{sfn|Solove|2010|pp=104β05}} * insecurity, such as lack of [[data security]], which includes when an organization is supposed to be responsible for protecting data instead suffers a [[data breach]] which harms the people whose data it held{{sfn|Solove|2010|pp=104β05}} * secondary use, which is when people agree to share their data for a certain purpose, but then the data is used in ways without the data donors' [[informed consent]]{{sfn|Solove|2010|pp=104β05}} * exclusion is the use of a person's data without any attempt to give the person an opportunity to manage the data or participate in its usage{{sfn|Solove|2010|pp=104β05}} ===Information dissemination=== {{blockquote|Count not him among your friends who will retail your privacies to the world.|[[Publilius Syrus]]}} Information dissemination is an attack on privacy when information which was shared in confidence is shared or threatened to be shared in a way that harms the subject of the information.{{sfn|Solove|2010|pp=104β05}} There are various examples of this.{{sfn|Solove|2010|pp=104β05}} Breach of confidentiality is when one entity promises to keep a person's information private, then breaks that promise.{{sfn|Solove|2010|pp=104β05}} Disclosure is making information about a person more accessible in a way that harms the subject of the information, regardless of how the information was collected or the intent of making it available.{{sfn|Solove|2010|pp=104β05}} Exposure is a special type of disclosure in which the information disclosed is emotional to the subject or taboo to share, such as revealing their private life experiences, their nudity, or perhaps private body functions.{{sfn|Solove|2010|pp=104β05}} Increased accessibility means advertising the availability of information without actually distributing it, as in the case of [[doxing]].{{sfn|Solove|2010|pp=104β05}} Blackmail is making a threat to share information, perhaps as part of an effort to coerce someone.{{sfn|Solove|2010|pp=104β05}} Appropriation is an attack on the [[personhood]] of someone, and can include using the value of someone's reputation or likeness to advance interests which are not those of the person being appropriated.{{sfn|Solove|2010|pp=104β05}} Distortion is the creation of misleading information or lies about a person.{{sfn|Solove|2010|pp=104β05}} ===Invasion=== Invasion of privacy, a subset of [[expectation of privacy]], is a different concept from the collecting, aggregating, and disseminating information because those three are a misuse of available data, whereas invasion is an attack on the right of individuals to keep personal secrets.{{sfn|Solove|2010|pp=104β05}} An invasion is an attack in which information, whether intended to be public or not, is captured in a way that insults the personal dignity and right to private space of the person whose data is taken.{{sfn|Solove|2010|pp=104β05}} ====Intrusion==== An ''intrusion'' is any unwanted entry into a person's private personal space and solitude for any reason, regardless of whether data is taken during that breach of space.{{sfn|Solove|2010|pp=104β05}} ''Decisional interference'' is when an entity somehow injects itself into the personal decision-making process of another person, perhaps to influence that person's private decisions but in any case doing so in a way that disrupts the private personal thoughts that a person has.{{sfn|Solove|2010|pp=104β05}} ====Examples of invasions of privacy==== * In 2019, [[independent contractors|contract workers]] for [[Apple Inc.|Apple]] and [[Amazon (company)|Amazon]] reported being forced to continue listening to "[[#Intimacy|intimate]] moments" captured on the companies' smart speakers in order to improve the quality of their automated [[speech recognition]] software.<ref name=bloomberg-siri-alexa-listen>{{cite news|url=https://www.bloomberg.com/news/features/2019-12-11/silicon-valley-got-millions-to-let-siri-and-alexa-listen-in|access-date=2021-06-02|publisher=Bloomberg Businessweek|title=Silicon Valley is Listening to Your Most Intimate Moments|newspaper=Bloomberg.com|date=2019-12-11}}</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Privacy
(section)
Add topic