{"id":454,"date":"2023-08-11T12:36:00","date_gmt":"2023-08-11T12:36:00","guid":{"rendered":"https:\/\/privacyand.com\/?p=454"},"modified":"2023-08-06T19:38:25","modified_gmt":"2023-08-06T19:38:25","slug":"social-thresholds-for-privacy","status":"publish","type":"post","link":"https:\/\/privacyand.com\/?p=454","title":{"rendered":"Social Thresholds for Privacy"},"content":{"rendered":"\n<p>Privacy research across disciplines touches on some similar themes, spheres of activity, control and individual versus the group.\u00a0\u00a0Inherent in these themes is the notion of values, and the determination that one \u2018has privacy\u2019 or \u2018does not have privacy\u2019.\u00a0\u00a0This threshold is contextually dependent (consistent with Nissenbaum\u2019s theory) on the amount of overall privacy available\u00a0(Nissenbaum, 2009).\u00a0\u00a0Adapting Marsh\u2019s thresholds for trust\u00a0(Marsh, 1994),\u00a0figure below illustrates this for privacy.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"610\" height=\"394\" src=\"https:\/\/privacyand.com\/wp-content\/uploads\/2023\/08\/image.jpeg\" alt=\"\" class=\"wp-image-455\" srcset=\"https:\/\/privacyand.com\/wp-content\/uploads\/2023\/08\/image.jpeg 610w, https:\/\/privacyand.com\/wp-content\/uploads\/2023\/08\/image-300x194.jpeg 300w\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" \/><\/figure>\n\n\n\n<p><em>Threshold for Privacy<\/em><\/p>\n\n\n\n<p>An absence of privacy is not the same as being the subject of total surveillance, which suggests a negative valuation of privacy is possible.\u00a0\u00a0My work is focused on the positive valuation for privacy.\u00a0\u00a0Historically we each made a determination about our own degree of privacy based on a number of factors such as those described earlier.\u00a0\u00a0Technology has changed the availability of those factors, and added new ones (described later).\u00a0<\/p>\n\n\n\n<p>\u00a0The notion of this threshold nonetheless underpins the <em>value<\/em> of privacy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privacy research across disciplines touches on some similar themes, spheres of activity, control and individual versus the group.\u00a0\u00a0Inherent in these themes is the notion of values, and the determination that one \u2018has privacy\u2019 or \u2018does not have privacy\u2019.\u00a0\u00a0This threshold is contextually dependent (consistent with Nissenbaum\u2019s theory) on the amount of overall privacy available\u00a0(Nissenbaum, 2009).\u00a0\u00a0Adapting Marsh\u2019s &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/privacyand.com\/?p=454\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Social Thresholds for Privacy&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-454","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7IDr7-7k","_links":{"self":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=454"}],"version-history":[{"count":1,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/454\/revisions"}],"predecessor-version":[{"id":456,"href":"https:\/\/privacyand.com\/index.php?rest_route=\/wp\/v2\/posts\/454\/revisions\/456"}],"wp:attachment":[{"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privacyand.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}