{"id":452,"date":"2023-08-09T07:32:00","date_gmt":"2023-08-09T07:32:00","guid":{"rendered":"https:\/\/privacyand.com\/?p=452"},"modified":"2023-08-06T19:36:02","modified_gmt":"2023-08-06T19:36:02","slug":"methodology-lets-measure","status":"publish","type":"post","link":"https:\/\/privacyand.com\/?p=452","title":{"rendered":"Methodology \/ Let&#8217;s Measure"},"content":{"rendered":"\n<p>Privacy inquiry is both philosophical and scientific, and comes with the problems associated with each type of investigation.\u00a0\u00a0Using a formal model to measure privacy and create a scientific theory is based on Popper\u2019s work on scientific contributions\u00a0(Popper, 1967).\u00a0\u00a0Popper sets out structural requirements for scientific theories, such as I propose for privacy, including that a theory must be falsifiable.\u00a0\u00a0<\/p>\n\n\n\n<p>Each example in my formalization stands as an attempt to test it.\u00a0\u00a0<\/p>\n\n\n\n<p>The formal model structure makes clear the boundaries for which privacy may be tested in its very definition.\u00a0\u00a0Any theory must also be simple, so that it has the highest possible testability.\u00a0\u00a0If the formal model fails, it will be clear that either a more complex model is required or privacy cannot be formalized.\u00a0\u00a0The theory must be repeatable with the same results.\u00a0\u00a0Results from experiments carried out to test the model \u2013 both theoretical and practical \u2013 can be easily reproduced using the details provided in the respective chapters.\u00a0\u00a0<\/p>\n\n\n\n<p>Finally, the theory must be capable of evolution (in keeping with the principle of falsifiability).\u00a0\u00a0The formal model presented here is intended to continually be in flux.\u00a0\u00a0Not only is it in need of refinement, but also the factor set is not completely identified.\u00a0\u00a0This is not a flaw, rather, it is intended to be subject to further refinement to enhance its strength and applicability.\u00a0\u00a0<\/p>\n\n\n\n<p><em>There is indeed a distinction between the process and outcome: the contribution herein is to the understanding of privacy.\u00a0\u00a0<\/em><\/p>\n\n\n\n<p>Without a formal model to examine and question there would be no further understanding.\u00a0\u00a0The dichotomy of an unfinished formal model is a risk, albeit a very necessary one in the pursuit of scientific inquiry.\u00a0\u00a0The contribution of the formal model for the theory of privacy is thus: simple, repeatable and flexible (or perhaps, finitely infinite).\u00a0\u00a0<\/p>\n\n\n\n<p>As part of the theory and to help the discussion about privacy, I use measurement as the core scientific principle.\u00a0\u00a0Measurement is the act of assigning value in a given range to decrease uncertainty.\u00a0\u00a0It lends itself to repeatable, scientific processes that can be proven.\u00a0\u00a0Measurement is about codification, it can lead to institutionalization of processes and procedures.\u00a0\u00a0Measurement enables evaluation, duplication and replication for the purposes of growth, accuracy and comparison.\u00a0\u00a0Thus, measurement meets the objectives and requirements set out by Popper\u2019s rules for scientific theory.<\/p>\n\n\n\n<p>When there are no real numbers measurement is harder.\u00a0\u00a0<\/p>\n\n\n\n<p>The value of privacy is like any other psychological or sociological value, it can be measured but those measurements are more likely than not representational\u00a0(Thurstone, 1954).\u00a0\u00a0For example, if you have 3 units of privacy, that number is meaningless.\u00a0\u00a0However, if I were able to suggest that you had 3 units of privacy in a given context, and when that context changed you had more or less units of privacy that may begin to illuminate meaningful scientific principles.\u00a0\u00a0<\/p>\n\n\n\n<p>I base my formal model on the theory of representational measurement for that reason, to highlight privacy impacting choices and the changes that occur as a result.\u00a0\u00a0Representational theory is used when numbers are correlated (no cause) to other numbers, assigned by rules, such as a finite state machine.\u00a0\u00a0In the case of representation, for the purposes of expressing uncertainty in measurement, the unit is called a <strong>measurand<\/strong>.\u00a0\u00a0<\/p>\n\n\n\n<p>A measurand has two parts: (1) an object being measured, and (2) a quantity intended to measure\u00a0(Kacker, Sommer, &amp; Kessel, 2007).\u00a0\u00a0For privacy, the measurand is the \u2018state\u2019 of privacy any given data subject is in at the moment.Using measurement for privacy goes beyond considering it as a problem to be solved.\u00a0\u00a0It provides the basis for a theory for privacy that can be applied across disciplines.\u00a0\u00a0<\/p>\n\n\n\n<p>Traditional policy mechanisms fail in privacy enforcement because they neglect consideration of computational requirements, e.g., a policy may require informed consent but understanding the computational requirements of information management architecture is arguably more complex than such a mechanism may allow.\u00a0\u00a0<\/p>\n\n\n\n<p>Measurement also makes privacy knowledge acquisition easier for both the organization and the data subject.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy inquiry is both philosophical and scientific, and comes with the problems associated with each type of investigation.\u00a0\u00a0Using a formal model to measure privacy and create a scientific theory is based on Popper\u2019s work on scientific contributions\u00a0(Popper, 1967).\u00a0\u00a0Popper sets out structural requirements for scientific theories, such as I propose for privacy, including that a theory &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/privacyand.com\/?p=452\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Methodology \/ Let&#8217;s Measure&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-452","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7IDr7-7i","_links":{"self":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=452"}],"version-history":[{"count":1,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/452\/revisions"}],"predecessor-version":[{"id":453,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/452\/revisions\/453"}],"wp:attachment":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}