Privacy , Security ... and Risk and Danger and Secrecy and Trust and Morality and Identity and Power : Understanding Collective Information Practices

As everyday life is increasingly conducted online, and as the electronic world continues to move out into the physical, the privacy of information and action and the security of information systems are, increasingly, a focus of concern both for the research community and the public at large. Accordingly, privacy and security are active topics of investigation from a wide range of perspectives – institutional, legislative, technical, interactional and more. In this paper, we argue that we can understand privacy and security only by looking at the broader social and cultural contexts within which it is embedded. Privacy and security are difficult concepts to grapple with precisely because they are caught up in larger collective rhetorics and practices of risk, danger, secrecy, trust, morality, identity and more. When we try to separate these concepts, though, the results are incoherent. We argue for a move away from narrow views of privacy and security, and towards situated and collective information practices.

[1]  Alfred Schutz,et al.  The Problem of Rationality in the Social World , 1943 .

[2]  E. Goffman Behavior in Public Places , 1963 .

[3]  H. Garfinkel Studies in Ethnomethodology , 1968 .

[4]  M. Sahlins Culture and Practical Reason , 1979 .

[5]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[6]  Barbara Laslett,et al.  Privacy and Secrecy: A Conceptual Comparison , 1977 .

[7]  The Social Construction of Dangerousness , 1979 .

[8]  Gary Alan Fine,et al.  Rhetorics and Action in Moral Organizations , 1979 .

[9]  J. March,et al.  Information in Organizations as Signal and Symbol. , 1981 .

[10]  B. Erickson Secret Societies and Social Structure , 1981 .

[11]  E. Shils The Constitution Of Society , 1982 .

[12]  Laurel Richardson,et al.  Secrecy and Status: The Social Construction of Forbidden Relationships , 1988 .

[13]  C. Plott psychology and economics , 1990 .

[14]  Daniel G. Bobrow,et al.  Design for Conversation: Lessons from Cognoter , 1991, Int. J. Man Mach. Stud..

[15]  Brian Wynne,et al.  Misunderstood misunderstanding: social identities and public uptake of science , 1992 .

[16]  Michael B. Usher,et al.  Science in action , 1993, Nature.

[17]  Kristen Day,et al.  ASSAULT PREVENTION AS SOCIAL CONTROL: WOMEN AND SEXUAL ASSAULT PREVENTION ON URBAN COLLEGE CAMPUSES , 1995 .

[18]  Philip E. Agre,et al.  Conceptions of the user in computer systems design , 1995 .

[19]  G. Fine,et al.  Secrecy, Trust, and Dangerous Leisure: Generating Group Cohesion in Voluntary Organizations , 1996 .

[20]  Etienne Wenger,et al.  Communities of Practice: Learning, Meaning, and Identity , 1998 .

[21]  M. Lock,et al.  Breast cancer: Reading the omens , 1998 .

[22]  D. Merten,et al.  ENCULTURATION INTO SECRECY AMONG JUNIOR HIGH SCHOOL GIRLS , 1999 .

[23]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[24]  Wendy A. Kellogg,et al.  Socially translucent systems: social proxies, persistent conversation, and the design of “babble” , 1999, CHI '99.

[25]  M. Angela Sasse,et al.  Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.

[26]  Kristen Day,et al.  Constructing Masculinity and Women's Fear in Public Space in Irvine, California , 2001 .

[27]  Jonathan Grudin,et al.  Desituating Action: Digital Representation of Context , 2001, Hum. Comput. Interact..

[28]  J. Overhage,et al.  Sorting Things Out: Classification and Its Consequences , 2001, Annals of Internal Medicine.

[29]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[30]  Madhu C. Reddy,et al.  A finger on the pulse: temporal rhythms and information seeking in medical work , 2002, CSCW '02.

[31]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[32]  Marco Gruteser,et al.  USENIX Association , 1992 .

[33]  Lorrie Faith Cranor,et al.  'I didn't buy it for myself' privacy and ecommerce personalization , 2003, WPES '03.

[34]  William G. Griswold,et al.  Challenge: ubiquitous location-aware computing and the "place lab" initiative , 2003, WMASH '03.

[35]  D. Vaughan In Organizational Encounters with Risk, Bridget Hutter and Michael Power, eds. New York and Cambridge: Cambridge University Press, 2004. ORGANIZATIONAL RITUALS OF RISK AND ERROR , 2003 .

[36]  Bill N. Schilit,et al.  Privacy and Security in the Location-enhanced World Wide Web , 2003 .

[37]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[38]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[39]  Marc Langheinrich,et al.  Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols , 2004, UCS.

[40]  Shobita Parthasarathy,et al.  Regulating Risk: Defining Genetic Privacy in the United States and Britain , 2004 .

[41]  J. Fosket,et al.  Constructing “High-Risk Women”: The Development and Standardization of a Breast Cancer Risk Assessment Tool , 2004 .

[42]  Paul Dourish,et al.  Everyday Encounters with Context-Aware Computing in a Campus Environment , 2004, UbiComp.

[43]  G. Cradock Risk, Morality, and Child Protection: Risk Calculation as Guides to Practice , 2004 .

[44]  William E. Kastenberg,et al.  Uncertainty and Regulation: The Rhetoric of Risk in the California Low-Level Radioactive Waste Debate , 2004 .

[45]  A. Tversky,et al.  Prospect theory: an analysis of decision under risk — Source link , 2007 .