{"id":393,"date":"2023-07-17T18:57:28","date_gmt":"2023-07-17T18:57:28","guid":{"rendered":"https:\/\/privacyand.com\/?p=393"},"modified":"2023-07-17T18:57:28","modified_gmt":"2023-07-17T18:57:28","slug":"common-themes","status":"publish","type":"post","link":"https:\/\/privacyand.com\/?p=393","title":{"rendered":"Common Themes"},"content":{"rendered":"\n<p>The topic of privacy appears in many traditional academic disciplines, and of late, in the world of pop culture.\u00a0\u00a0\u201cThat is a source of strength, for it raises the profile of privacy as a value, an interest and a right\u201d\u00a0(Raab, 2008).\u00a0\u00a0 Exploring these intersects gives a hint at the range of both scholarly and non-scholarly work outside the traditional sciences.\u00a0\u00a0It can also serve to inform any formal model to measure privacy.  <\/p>\n\n\n\n<p>Researchers in <strong>psychology<\/strong> and <strong>sociology<\/strong> are often interested in privacy for mental health and group dynamics respectively.\u00a0\u00a0Psychology can approach privacy as a dependency for establishing social relationships\u00a0(Magi, 2011).\u00a0\u00a0Sociology and social psychology examine privacy from the perspective of the group.\u00a0\u00a0Within that group, some scholars examine the impact of privacy deprivation notionally related to Bentham\u2019s panopticon and the balance between forced and chosen solitary confinement as an expression of privacy\u00a0(Bentham, 1791; Goffman, 1961).\u00a0\u00a0Others look at the threshold necessary for balancing individual needs for privacy against the common good\u00a0(Allen, 1998; Etzioni, 2005).\u00a0\u00a0<strong>Gender studies<\/strong> also strongly debate privacy. MacKinnon\u2019s seminal work on a feminist theory of the state expresses a strong critique of privacy, calling for feminism to explode the private, and see the political as personal\u00a0(MacKinnon, 1989).\u00a0\u00a0Others continue that exploration by examining gender implications of the public \/ private distinction\u00a0(Gavison, 1992).\u00a0\u00a0<strong>Economic<\/strong> researchers also examine privacy, studying for example the cost or revenue gained or lost from information disclosure\u00a0(Acquisti &amp; Grossklags, 2005; Acquisti, 2004; Berthold &amp; B\u00f6hme, 2010).\u00a0\u00a0<\/p>\n\n\n\n<p>Themes on privacy and surveillance appear in <strong>modern art<\/strong> in both individual artists and exhibits.\u00a0\u00a0Surveillance art is a form of critical social practice, and crosses over many of the traditional boundaries that separate art and design\u00a0(Shanken, 2014).\u00a0\u00a0Generally, it uses technology to record a data subject in order to comment on either the process, technology or act of surveillance itself.\u00a0\u00a0Vito Acconci\u2019s\u00a0<em>Following Piece<\/em>\u00a0(1969) involved following a different person every day until that person \u2018entered a private place\u2019.\u00a0\u00a0Other works around this time in the United States were presented as commentaries in the wake of the House Un-American Activities Committee\u00a0(Shanken, 2014).\u00a0\u00a0Other exhibits from Bruce Nauman,\u00a0<em>Live Taped Video Corridor\u00a0<\/em>(1970) and Peter Weibel\u2019s\u00a0<em>Observation of the Observation: Uncertainty<\/em>\u00a0(1976) used closed circuit video to play with notions of identity and observation: Robert Adrian and Helmut Mark transformed every television set in Austria into a surveillance monitor for a brief moment to transform it in to a public communication in the early eighties.\u00a0\u00a0<\/p>\n\n\n\n<p>Exhibits dedicated to surveillance art appeared in the early 2000, with the\u00a0<em>CTRL-Space<\/em>\u00a0exhibit in Germany.\u00a0\u00a0The Tate Modern hosted an exhibit titled\u00a0<em>Exposed<\/em>\u00a0in 2010.\u00a0\u00a0Both were dedicated to interruption of privacy by surveillance\u00a0(Levin, 2001; Serota, 2010).\u00a0\u00a0<em>Watching You, Watching M<\/em>e organized by the Open Society Foundations (2014) demonstrated new ways to interact with surveillance, including a tapestry of reproductions of 32,000 photos taken of and by the artist (Hasan Elahi).\u00a0\u00a0<em>Sanctum\u00a0<\/em>(2014) is an interactive exhibit that requests viewers consent to facial recognition scanning and subsequently displays a live feed of publicly available data about them.\u00a0\u00a0Modern painters also use concepts of identity and surveillance in their art, Luc Tuymans has several works that appear to be a painting of a still image from a video surveillance camera, one in the woods (<em>The Park<\/em>, 2005) and the other in a bathroom stall aptly titled\u00a0<em>CCTV<\/em>\u00a0(2008).<\/p>\n\n\n\n<p>The origins of privacy can be traced back to <strong>ancient philosophy<\/strong> in Artistotle\u2019s distinction between public and private spheres of activity\u00a0(Everson, 1996).\u00a0\u00a0Privacy can be seen as a component of a spiritual relationship between an individual and their <strong>religious<\/strong> practice, while in a social context it is most often discussed in the context of the protection of religious rights by the state, and \/ or the debate over the separation of church and state depending on the country\u00a0(Lyon &amp; Van Die, 2000; Ritter, 2000).\u00a0\u00a0Privacy themes can be clearly identified in <strong>classic literature<\/strong> and <strong>modern novels<\/strong>.\u00a0\u00a0A few examples, George Orwell\u2019s\u00a0<em>1984<\/em>\u00a0(and Zamyatin\u2019s\u00a0<em>We<\/em>), Alfred Bester\u2019s\u00a0<em>The Demolished Man<\/em>,\u00a0\u00a0Zelazny\u2019s\u00a0<em>Lord of Light<\/em>, John Brunner\u2019s\u00a0<em>Shockwave Rider<\/em>, several Philip K. Dick novels, including\u00a0<em>The Minority Report<\/em>\u00a0and a\u00a0<em>Scanner Darkly<\/em>.\u00a0\u00a0Most tend towards dystopias, but some more modern books, such as Brown\u2019s\u00a0<em>Digital Fortress<\/em>, praise mass surveillance.\u00a0\u00a0<\/p>\n\n\n\n<p>Similarly, privacy themed <strong>movies<\/strong> span genres\u00a0(Office of the Privacy Commissioner of Canada, 2012).\u00a0\u00a0<em>Louis 19, le roi des ondes<\/em>\u00a0is a comedy dealing with the reality of reality television stardom.\u00a0\u00a0<em>The Conversation<\/em>,\u00a0<em>Enemy of the State<\/em>\u00a0and\u00a0<em>Cache<\/em>are all set in current day, and highlight tension between technology and privacy as well as the emotional impact of a lack of privacy.<\/p>\n\n\n\n<p>Taken together, one could suggest that privacy is indeed, <em>everything<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The topic of privacy appears in many traditional academic disciplines, and of late, in the world of pop culture.\u00a0\u00a0\u201cThat is a source of strength, for it raises the profile of privacy as a value, an interest and a right\u201d\u00a0(Raab, 2008).\u00a0\u00a0 Exploring these intersects gives a hint at the range of both scholarly and non-scholarly work &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/privacyand.com\/?p=393\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Common Themes&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-393","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7IDr7-6l","_links":{"self":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=393"}],"version-history":[{"count":1,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/393\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/393\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}