{"id":348,"date":"2023-06-17T22:48:33","date_gmt":"2023-06-17T22:48:33","guid":{"rendered":"https:\/\/privacyand.com\/?p=348"},"modified":"2023-06-17T22:52:09","modified_gmt":"2023-06-17T22:52:09","slug":"this-is-about-privacy-and-privacy-is-about-everything","status":"publish","type":"post","link":"https:\/\/privacyand.com\/?p=348","title":{"rendered":"This is about privacy, and privacy is about everything."},"content":{"rendered":"\n<p>This site began as a place to gather my observations about privacy, a riff on my dissertation with the intention of contributing more broadly.  Over time, privacy experts have emerged from all disciplines with all types of background and training.  <\/p>\n\n\n\n<p>These &#8216;Posts&#8217; will be more academic in nature, while other sections of the site will be more practical, addressing the application of privacy in various fields. <\/p>\n\n\n\n<p>To begin, my philosophical approach:<\/p>\n\n\n\n<p>A person may not be certain what \u2018privacy\u2019 is but they care deeply about it.&nbsp; You can prove this by trying to open a locked stall door from the outside next time you are in a public bathroom.&nbsp; The concept of privacy is strong in each of us, we mediate what we say, to whom we say it and where.&nbsp; In mediating conversations we are each asserting control over what information we disclose about ourselves and others.&nbsp; That information includes not only our thoughts and opinions, but our behaviour itself.&nbsp; We act, speak and even dress differently when we are at work, a pub with some friends or at home alone.&nbsp; These decisions, to dress, speak and behave in accordance with our environment are sprinkled throughout our lives.<\/p>\n\n\n\n<p><strong>Social Impacts<\/strong><\/p>\n\n\n\n<p>In society, privacy also has a group preservation function; by allowing people to periodically separate from one another, we can remain in relationships (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Barry_Schwartz_(sociologist)\">Schwartz<\/a>, 1968).&nbsp; We each determine how much privacy we need, from whom and when throughout our day.&nbsp; As the days change, so do we, and our privacy preferences accordingly (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Alan_Westin\">Westin<\/a>, 1967).<\/p>\n\n\n\n<p>The development of computing marked a change in how people interact with machines, and eventually with each other.&nbsp; Indeed, \u201c(t)he prospect of enhanced or changed flows of information among people raises many other social psychological issues\u201d (<a href=\"http:\/\/collablab.northwestern.edu\/CollabolabDistro\/nucmc\/KieslerSiegalAndMcGuire-SocialPsychologicalAspectsOfCMC-AmerPsych-1984.pdf\">Kiesler, Siegel, &amp; McGuire<\/a>, 1984).&nbsp; In some cases, computing devices themselves have become the source for mediating our conversations and information disclosure choices (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Sherry_Turkle\">Turkle<\/a>, 2011).<\/p>\n\n\n\n<p><strong>Computer Mediated Communications<\/strong><\/p>\n\n\n\n<p>There are 6 aspects of social psychology in Computer Mediated Communications that have a direct privacy impact.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Easy, rapid communications change the quantity, distribution and \/ or timing of information exchange.<\/li>\n\n\n\n<li>The expectations for quick turnaround and fast processing time can lead to pressure to respond, resulting in impulsive information disclosures.<\/li>\n\n\n\n<li>Communication through text reduces the coordination of communication.&nbsp; This lack of nonverbal cues, i.e., body language, eliminates ongoing context used to regulate, modify and \/ or control information disclosures.<\/li>\n\n\n\n<li>Related, textual communication eliminates all nonverbal context, e.g., physical space or attributes, which in turn eliminates another cue historically used to signal information sharing or withholding.<\/li>\n\n\n\n<li>Software does not communicate organizational or relationship hierarchies well.&nbsp; Relationships are a key factor for information disclosure decisions (Schwartz, 1968).&nbsp; Messages are depersonalized, which can invite more assertive and \/ or uninhibited conversation.<\/li>\n\n\n\n<li>In electronic communication, messages are received by two parties \u2013 the machine and the recipient \u2013 but people do not actively consider the machine in communication.<\/li>\n\n\n\n<li>Finally, as technology evolves, the rules for computing behaviour and norms are developing.&nbsp; Office and home, work and personal and formal and information language are often blurred together in the same communication.&nbsp; The impact of information disclosures are relatively unpredictable, and remain unknown.<\/li>\n<\/ul>\n\n\n\n<p>In essence, electronic communication has significantly fewer non-verbal and contextual cues that would normally be used by people to guide information disclosures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This site began as a place to gather my observations about privacy, a riff on my dissertation with the intention of contributing more broadly. Over time, privacy experts have emerged from all disciplines with all types of background and training. These &#8216;Posts&#8217; will be more academic in nature, while other sections of the site will &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/privacyand.com\/?p=348\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;This is about privacy, and privacy is about everything.&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-348","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7IDr7-5C","_links":{"self":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=348"}],"version-history":[{"count":3,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/348\/revisions"}],"predecessor-version":[{"id":353,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/348\/revisions\/353"}],"wp:attachment":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}