Toward a Sociology of Privacy

What are, and what should be, the boundaries between self and society, individuals and groups? To address these questions, we synthesize research on privacy that is relevant for two foundational sociological issues: social order and inequality. By synthesizing work on a narrow yet fundamental set of issues, we aim to improve our understanding of privacy as well as provide a foundation for understanding contemporary privacy issues associated with information and communication technology. We explore the role of privacy in maintaining social order by examining the connections of privacy with social control and with group cohesion. We also discuss how inequality produces variation in privacy and how this variation in turn contributes to inequality. Throughout the review we identify potential directions for sociological research on privacy generally and in the context of new technologies. Our discussion highlights implications of privacy that extend beyond individual-level concerns to broader social, structura...

[1]  Tiffany D. Joseph “My Life was Filled with Constant Anxiety”: Anti-Immigrant Discrimination, Undocumented Status, and Their Mental Health Implications for Brazilian Immigrants , 2011 .

[2]  Andrew D. Selbst,et al.  Big Data's Disparate Impact , 2016 .

[3]  Ritchie P. Lowry Toward a Sociology of Secrecy and Security Systems , 1972 .

[4]  D. Merten,et al.  ENCULTURATION INTO SECRECY AMONG JUNIOR HIGH SCHOOL GIRLS , 1999 .

[5]  Charles T. Hill,et al.  Self-Disclosure in Dating Couples: Sex Roles and the Ethic of Openness* , 1980 .

[6]  Joel Podolny,et al.  Status: Insights from Organizational Sociology , 2012 .

[7]  R. F. Murphy,et al.  Social Distance and the Veil1 , 1964 .

[8]  Steven Hitlin,et al.  Copresence Revisiting a Building Block for Social Interaction Theories , 2013 .

[9]  Danah Boyd,et al.  Facebook privacy settings: Who cares? , 2010, First Monday.

[10]  Daniel E. Miller,et al.  Openings Revisited: The Foundations of Social Interaction , 1995 .

[11]  D. Pager The Mark of a Criminal Record1 , 2003, American Journal of Sociology.

[12]  Whose Privacy? What Harm? , 1982 .

[13]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[14]  G. Sewell,et al.  `Someone to Watch Over Me': Surveillance, Discipline and the Just-in-Time Labour Process , 1992 .

[15]  K. Ball Workplace surveillance: an overview , 2010 .

[16]  B. Schwartz The Social Psychology of Privacy , 1968, American Journal of Sociology.

[17]  Brandon C. Welsh,et al.  Public Area CCTV and Crime Prevention: An Updated Systematic Review and Meta‐Analysis , 2009 .

[18]  R. D. Schwartz Social Factors in the Development of Legal Control: A Case Study of Two Israeli Settlements , 1954 .

[19]  Latanya Sweeney,et al.  Discrimination in online ad delivery , 2013, CACM.

[20]  Nicole B. Ellison,et al.  Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment , 2006, J. Comput. Mediat. Commun..

[21]  Heiko Rauhut,et al.  Nuffield Centre for Experimental Social Sciences Discussion Paper Series Lifting the Veil of Ignorance: an Experiment on the Contagiousness of Norm Violations Lifting the Veil of Ignorance: an Experiment on the Contagiousness of Norm Violations , 2022 .

[22]  S. Raudenbush,et al.  Neighborhoods and violent crime: a multilevel study of collective efficacy. , 1997, Science.

[23]  Paul Attewell,et al.  Big brother and the sweatshop: computer surveillance in the automated office , 1987 .

[24]  C. Uggen,et al.  Legal Ambiguity in Managerial Assessments of Criminal Records , 2015, Law & Social Inquiry.

[25]  Matthew T. Mccarthy The big data divide and its consequences , 2016 .

[26]  Rourke L O'Brien Ineligible to Save? Asset Limits and the Saving Behavior of Welfare Recipients , 2008 .

[27]  Patrick A. Denice,et al.  The Power of Transparency , 2015 .

[28]  A. Danna,et al.  All That Glitters is Not Gold: Digging Beneath the Surface of Data Mining , 2002 .

[29]  H. Varian Price Discrimination and Social Welfare , 1985 .

[30]  Laurel Richardson,et al.  Secrecy and Status: The Social Construction of Forbidden Relationships , 1988 .

[31]  J. Kitts Egocentric bias or information management? Selective disclosure and the social roots of norm misperception , 2003 .

[32]  Jenny L. Davis,et al.  Context collapse: theorizing context collusions and collisions , 2014 .

[33]  Colin J. Bennett,et al.  Transparent Lives: Surveillance in Canada , 2014 .

[34]  PRIVATE PROTEST? , 2012 .

[35]  G. Sewell The discipline of teams: The control of team-based industrial work through electronic and peer surveillance. , 1998 .

[36]  A. Kendon,et al.  The Experimental Analysis of Social Performance1 , 1967 .

[37]  S. Margulis Conceptions of Privacy: Current Status and Next Steps , 1977 .

[38]  Danah Boyd,et al.  I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience , 2011, New Media Soc..

[39]  R. Ericson,et al.  The surveillant assemblage. , 2000, The British journal of sociology.

[40]  Charlene E. Miall Authenticity and the disclosure of the information preserve: The case of adoptive parenthood , 1989 .

[41]  M. Lamont,et al.  The Study of Boundaries in the Social Sciences , 2002 .

[42]  E. Shils,et al.  Privacy: Its Constitution and Vicissitudes , 1966 .

[43]  Glenn Woroch,et al.  The demographics of the do-not-call list [security of data] , 2005, IEEE Security & Privacy.

[44]  David R. Gibson Enduring Illusions , 2014 .

[45]  Luke Stark,et al.  The emotional context of information privacy , 2016, Inf. Soc..

[46]  Linda Steg,et al.  The Spreading of Disorder , 2008, Science.

[47]  Judith Donath,et al.  Public Displays of Connection , 2004 .

[48]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[49]  P. Cozby Self-disclosure, reciprocity and liking. , 1972, Sociometry.

[50]  Denise L. Anthony,et al.  The double-edged sword of electronic health records: implications for patient disclosure , 2015, J. Am. Medical Informatics Assoc..

[51]  Stefan Hirschauer On doing being a stranger: The practical constitution of civil inattention , 2005 .

[52]  Ben Jann,et al.  Reputation Formation and the Evolution of Cooperation in Anonymous Online Markets , 2014 .

[53]  S. Margulis Privacy as a Social Issue and Behavioral Concept , 2003 .

[54]  Jenny L. Davis Triangulating the Self: Identity Processes in a Connected Era , 2014 .

[55]  Robb Willer,et al.  Gossip and Ostracism Promote Cooperation in Groups , 2014, Psychological science.

[56]  C. Ridgeway,et al.  Framed by Gender , 2011 .

[57]  Timothy Stablein,et al.  Big Brother in the Information Age: Concerns about Government Information Gathering over Time , 2015, IEEE Security & Privacy.

[58]  T. Parsons The Professions and Social Structure , 1939 .

[59]  Richard Williams,et al.  The Changing Face of Inequality in Home Mortgage Lending , 2005 .

[60]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[61]  A. P. Bates,et al.  Privacy—A Useful Concept? , 1964 .

[62]  Gary T. Marx,et al.  A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .

[63]  Sarah Brayne Surveillance and System Avoidance , 2014 .

[64]  Keith N. Hampton Persistent and Pervasive Community , 2016 .

[65]  Denise D. Bielby,et al.  WHERE DID YOU HEAR THAT , 1995 .

[66]  Katherine C. Kellogg,et al.  Beyond Occupational Differences , 2014 .

[67]  Jessica Vitak The Impact of Context Collapse and Privacy on Social Network Site Disclosures , 2012 .

[68]  D. Boyd,et al.  CRITICAL QUESTIONS FOR BIG DATA , 2012 .

[69]  Anselm L. Strauss,et al.  Awareness Contexts and Social Interaction , 1964 .

[70]  R. Coser Insulation from Observability and Types of Social Conformity , 1961 .

[71]  Barbara Laslett,et al.  Privacy and Secrecy: A Conceptual Comparison , 1977 .

[72]  Eszter Hargittai,et al.  Digital Inequality , 2008, Commun. Res..

[73]  M. P. Johnson,et al.  Couple involvement and network structure: A test of the dyadic withdrawal hypothesis. , 1982 .

[74]  Jen Schradie,et al.  THE TREND OF CLASS, RACE, AND ETHNICITY IN SOCIAL MEDIA INEQUALITY , 2012 .

[75]  M. Hallinan,et al.  Sex differences in children's friendships. , 1978, American sociological review.

[76]  J. Stiglitz,et al.  Bargains and Ripoffs: A Model of Monopolistically Competitive Price Dispersion , 1977 .

[77]  D. Anthony,et al.  Negotiating stigma in health care: disclosure and the role of electronic health records , 2015 .

[78]  Mary Beth Rosson,et al.  journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .

[79]  Benjamin J. Goold,et al.  The Banality of Security The Curious Case of Surveillance Cameras , 2013 .

[80]  Nadera Shalhoub-Kevorkian E-RESISTANCE AND TECHNOLOGICAL IN/SECURITY IN EVERYDAY LIFE , 2011 .

[81]  Christine Horne,et al.  Privacy, technology, and norms: the case of Smart Meters. , 2015, Social science research.

[82]  Gary T. Marx,et al.  What’s new about the “new surveillance”?: Classifying for change and continuity , 2004 .

[83]  Lisa E. Bernstein Opting out of the Legal System: Extralegal Contractual Relations in the Diamond Industry , 1992, The Journal of Legal Studies.

[84]  R. Wilsnack Information Control , 1980 .

[85]  Karen E. C. Levy,et al.  The Contexts of Control: Information, Power, and Truck-Driving Work , 2015, Inf. Soc..

[86]  Tristan Henderson,et al.  Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.

[87]  Ebony L. Ruhland,et al.  THE EDGE OF STIGMA: AN EXPERIMENTAL AUDIT OF THE EFFECTS OF LOW‐LEVEL CRIMINAL RECORDS ON EMPLOYMENT , 2009 .

[88]  J. Balswick,et al.  Self-disclosure to same- and opposite-sex parents: an empirical test of insights from role theory. , 1977, Sociometry.

[89]  Young-Kyu Kim,et al.  Why Pseudonyms? Deception as Identity Preservation Among Jazz Record Companies, 1920–1929 , 2009, Organ. Sci..