Privacy online

I n the recent literature on privacy and technology, considerable attention has been paid to online privacy issues and concerns. For example, a number of books and scholarly journal articles, as well as reports in the popular press, have examined" the impact of certain online activities involving the Internet and the World Wide Web for personal privacy. In this essay, I use the expression "online activities" to refer to those activities involving both the Web in particular and the Internet in general. And I use the tern "Internet" in its most generic sense to include protocols such as File Transfer Protocol (FTP) and Gopher as well as the Web (HTTP). Our concern in this study is with privacy issues arising from online activities involving any of these Internet protocols. Note, however, that we will not be concerned with privacy issues peculiar to privately owned computer systems and networks (such as privacy issues involving employee email). Nor will we be concerned with privacy issues involving the use of digital telephony, including devices such as cell phones. Instead, we will limit our analysis of privacy issues to those concerns arising from certain user activities involving Internet resources. One interesting question to considermand one that is often overlooked in the contemporary privacy literature-is: To what extent has the Internet itself generated new privacy issues, and to what extent has it merely exacerbated existing ones? It will be argued that in most cases, the privacy issues frequently associated with the Internet are issues which have their genesis in technologies that predate the Internet. It will also be shown, however, that at least two of the privacy issues currently associated with the Internet are such that they would not have arisen without the availability of certain Internet tools and techniques. Issues of the latter type are labeled Internet-specific and are contrasted with Internet-enhanced privacy issues. Another interesting, and perhaps more important, question is: How can we best resolve Internet-related privacy issues, regardless of whether such issues are unique to, or merely exacerbated by, Internet technology? In the final section of this study, we consider some policy proposals recently put forth to address current online privacy issues involving certain Internet activities. We begin our study with a brief look at the concept of privacy.

[1]  Alecia Wolf,et al.  Emotional Expression Online: Gender Differences in Emoticon Use , 2000, Cyberpsychology Behav. Soc. Netw..

[2]  Priscilla M. Regan Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.

[3]  Fred H. Cate,et al.  Privacy in the Information Age , 1997 .

[4]  R. Gavison Privacy and the Limits of Law , 1980 .

[5]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[6]  W. Nord,et al.  Social exchange theory: an integrative approach to social conformity. , 1969, Psychological bulletin.

[7]  Katelyn Y. A. McKenna,et al.  Plan 9 From Cyberspace: The Implications of the Internet for Personality and Social Psychology , 2000 .

[8]  I. Kant,et al.  Groundwork for the Metaphysics of Morals , 2002 .

[9]  Nancy Fraser Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy , 1990 .

[10]  Susan S. Hendrick Self-disclosure and marital satisfaction. , 1981 .

[11]  D. Berry Accuracy in social perception: contributions of facial and vocal information. , 1991, Journal of personality and social psychology.

[12]  Anke A. Ehrhardt,et al.  Man and Woman: Boy and Girl , 1974 .

[13]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[14]  M. Zanna,et al.  Persuasion as a function of self-awareness in computer-mediated communication , 1989 .

[15]  D. M. Pedersen PSYCHOLOGICAL FUNCTIONS OF PRIVACY , 1997 .

[16]  Douglas B. Sawin,et al.  Children's Privacy in the Home , 1979 .

[17]  L. Miller,et al.  Self-disclosure and liking: a meta-analytic review. , 1994, Psychological bulletin.

[18]  J. Habermas,et al.  The structural transformation of the public sphere : an inquiry into a category of bourgeois society , 1989 .

[19]  P. Bourdieu Distinction: A Social Critique of the Judgement of Taste* , 2018, Food and Culture.

[20]  D. Jacobson,et al.  Contexts and Cues in Cyberspace: The Pragmatics of Naming in Text-Based Virtual Realities , 1996, Journal of Anthropological Research.

[21]  Barbara Laslett,et al.  Privacy and Secrecy: A Conceptual Comparison , 1977 .

[22]  S. Jourard Some Psychological Aspects of Privacy , 1966 .

[23]  J. Ritchie,et al.  Gender differences in friendship patterns , 1988 .

[24]  S. Feld The Focused Organization of Social Ties , 1981, American Journal of Sociology.

[25]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[26]  Robert L. Leahy,et al.  The Construction of the Self: A Developmental Perspective , 2001, Journal of Cognitive Psychotherapy.

[27]  Susan Sprecher,et al.  The Effects of Self-Disclosure Given and Received on Affection for an Intimate Partner and Stability of the Relationship , 1987 .

[28]  R. Sommer Studies in Personal space , 1959 .

[29]  T. Abel,et al.  Mind, Self, and Society , 1934 .

[30]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[31]  S. Jourard The Transparent Self , 1964 .

[32]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[33]  J. Holmes Women, Men and Politeness , 1995 .

[34]  Doreen Rosenthal,et al.  Constructing a Sexual Self: Adolescents' Sexual Self-Perceptions and Sexual Risk-Taking. , 1996 .

[35]  E. E. Jones,et al.  When Self-Presentation is Constrained by the Target's Knowledge: Consistency and Compensation. , 1978 .

[36]  Katrin Schatz Byford,et al.  Privacy in Cyberspace: Constructing a Model of Privacy for the Electronic Communications Environment , 1998 .

[37]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[38]  A. R. Stone,et al.  The War of Desire and Technology at the Close of the Mechanical Age , 1995 .

[39]  A. Portes Social Capital: Its Origins and Applications in Modern Sociology , 1998 .

[40]  H. Kelley,et al.  The social psychology of groups , 1960 .

[41]  J. Walther Computer-Mediated Communication , 1996 .

[42]  Judith A. Hall Nonverbal sex differences : communication accuracy and expressive style , 1984 .

[43]  F. Schoeman,et al.  Philosophical Dimensions of Privacy: Privacy and intimate information , 1984 .

[44]  J. Coleman,et al.  Social Capital in the Creation of Human Capital , 1988, American Journal of Sociology.

[45]  J. Galtung,et al.  The Structure of Foreign News , 1965 .

[46]  Herbert H. Clark,et al.  Grounding in communication , 1991, Perspectives on socially shared cognition.

[47]  Nicholas Negroponte,et al.  Being Digital , 1995 .

[48]  D. Opel Privacy and the Internet. , 1999, Healthcare executive.

[49]  D. Edge,et al.  The social shaping of technology , 1988 .

[50]  Lawrence R. Wheeless,et al.  Conceptualization and Measurement of Reported Self-Disclosure. , 1976 .

[51]  R. Zajonc Attitudinal effects of mere exposure. , 1968 .

[52]  W. Parent Privacy, morality, and the law , 1985 .

[53]  D. Buhrmester,et al.  Patterns and functions of self-disclosure during childhood and adolescence. , 1995 .

[54]  Charles R. Berger,et al.  Uncertainty and Social Interaction , 1993 .

[55]  Solveig M. Singleton Privacy as Censorship: A Skeptical View of Proposals to Regulate Privacy in the Private Sector , 1998 .

[56]  Anind K. Dey,et al.  Understanding and Using Context , 2001, Personal and Ubiquitous Computing.

[57]  Chen Wang,et al.  Consumer privacy concerns about Internet marketing , 1998, CACM.

[58]  I. Ajzen The theory of planned behavior , 1991 .

[59]  I. Ajzen Attitudes, Personality and Behavior , 1988 .

[60]  Sirkka L. Jarvenpaa,et al.  Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..

[61]  E. McClure A meta-analytic review of sex differences in facial expression processing and their development in infants, children, and adolescents. , 2000, Psychological bulletin.

[62]  Marie A. Wright,et al.  The erosion of privacy , 1997, CSOC.

[63]  Amitai Etzioni,et al.  The Limits Of Privacy , 1999 .

[64]  N. Lin Buidling a Network Theory of Social Capital , 1999, Connections.

[65]  S. Margulis Conceptions of Privacy: Current Status and Next Steps , 1977 .

[66]  B. R. Schlenker Impression Management: The Self-Concept, Social Identity, and Interpersonal Relations , 1980 .

[67]  Richard G. Vedder,et al.  Privacy and security , 1996, CSOC.

[68]  Howard Rheingold,et al.  The Virtual Community: Homesteading on the Electronic Frontier , 2000 .

[69]  R L Brown,et al.  Sex differences in psychiatric help-seeking: evidence from four large-scale surveys. , 1981, Journal of health and social behavior.

[70]  Oren Etzioni,et al.  Face-to-Face and Computer-Mediated Communities, A Comparative Analysis , 1999, Inf. Soc..

[71]  Judith A. Hall,et al.  Gender differences in nonverbal communication of emotion , 2000 .

[72]  J. W. DeCew In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .

[73]  Charles Fried Philosophical Dimensions of Privacy: Privacy [a moral analysis] , 1984 .

[74]  Paola Benassi,et al.  TRUSTe: an online privacy seal program , 1999, CACM.

[75]  Seumas Miller Privacy and the Internet , 1997, Aust. Comput. J..

[76]  D. Kandel Homophily, Selection, and Socialization in Adolescent Friendships , 1978, American Journal of Sociology.

[77]  L. Fiedler,et al.  The tyranny of the normal. , 1984, The Hastings Center report.

[78]  D L Newman,et al.  Gender differences in partner violence in a birth cohort of 21-year-olds: bridging the gap between clinical and epidemiological approaches. , 1997, Journal of consulting and clinical psychology.

[79]  Judee K. Burgoon,et al.  Privacy and Communication , 1982 .

[80]  A. Rubin TELEVISION USE BY CHILDREN AND ADOLESCENTS , 1979 .

[81]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[82]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[83]  A. Giddens The Constitution of Society , 1985 .

[84]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[85]  V. Derlega,et al.  Privacy and self-disclosure in social relationships. , 1977 .

[86]  N. Luhmann,et al.  The Reality of the Mass Media , 2000 .

[87]  Eleanore Hartson,et al.  Time Out , 1982 .

[88]  O. Gandy,et al.  Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .

[89]  I. Altman,et al.  Social penetration: The development of interpersonal relationships , 1973 .

[90]  I. Altman,et al.  Privacy regulation, territorial displays, and effectiveness of individual functioning. , 1980 .

[91]  A. Bandura Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.

[92]  K. Norris,et al.  Dakota: A Spiritual Geography , 1993 .

[93]  S. Rafaeli,et al.  Why Communication Researchers Should Study the Internet: A Dialogue , 1996, J. Comput. Mediat. Commun..

[94]  Irwin Altman,et al.  Toward a Transactional Perspective , 1990 .

[95]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[96]  C. Mackinnon Toward a Feminist Theory of the State , 1989 .

[97]  Robin M. Kowalski,et al.  Impression management: A literature review and two-component model. , 1990 .

[98]  Oren Etzioni,et al.  The World-Wide Web: quagmire or gold mine? , 1996, CACM.

[99]  Julie E. Cohen Examined Lives: Informational Privacy and the Subject as Object , 2000 .

[100]  Christopher Peterson,et al.  Gender differences in best friendships , 1993 .

[101]  Joseph S. Fulda AI watch: data mining and the Web , 1998, CSOC.

[102]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[103]  Laura Stafford,et al.  Idealization and Communication in Long-Distance Premarital Relationships. , 1990 .

[104]  Sylvain C. Boies,et al.  Sexuality on the Internet: From sexual exploration to pathological expression. , 1999 .

[105]  W. Furman,et al.  Romantic views: Toward a theory of adolescent romantic relationships. , 1994 .

[106]  L. Millward,et al.  Sexual self-concept and sexual risk-taking. , 1997, Journal of adolescence.

[107]  E. Rogers Diffusion of Innovations , 1962 .

[108]  W. H. Ittelson,et al.  An Introduction to environmental psychology , 1977 .

[109]  Judith S. Olson,et al.  Distance Matters , 2000, Hum. Comput. Interact..

[110]  J. Habermas,et al.  Knowledge and Human Interests , 1972 .

[111]  Paul Syverson,et al.  Onion Routing for Anonymous and Private Internet Connections , 1999 .

[112]  Patricia Brierley Newell A systems model of privacy , 1994 .

[113]  John Hartley,et al.  Communicative democracy in a redactional society: the future of journalism studies , 2000 .

[114]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[115]  N. J. Marshall DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.

[116]  Thomas M. Cooley,et al.  A treatise on the law of torts, or, The wrongs which arise independent of contract. , 1993 .

[117]  J. W. DeCew,et al.  Uneasy Access: Privacy for Women in a Free Society , 1988 .

[118]  Amitai Etzioni,et al.  THE NEW GOLDEN RULE Community and Morality in a Democratic Society , 1997 .

[119]  John Deighton The right to be let alone , 1998 .

[120]  Donald D. Dorfman,et al.  The effect of stimulus uncertainty on the relationship between frequency of exposure and liking. , 1975 .

[121]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[122]  Herman T. Tavani,et al.  Computer matching and personal privacy: can they be compatible? , 1996, CQL '96.

[123]  Andrew J. Rohm,et al.  Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .

[124]  Bette Hileman,et al.  RIGHT TO KNOW: EPA proposes lower reporting thresholds for persistent bioaccumulative chemicals , 1999 .

[125]  Kennon M. Sheldon,et al.  Trait Self and True Self: Cross-Role Variation in the Big-Five Personality Traits and Its Relations With Psychological Authenticity and Subjective Well-Being , 1997 .

[126]  K. Cook,et al.  Social Exchange Theory , 1989, Theoretical Sociology.

[127]  Anne Eisenberg,et al.  Privacy and Data Collection on the Net , 1996 .

[128]  Deborah G. Johnson,et al.  Computers, ethics & social values , 1995 .

[129]  J. Davis Structural Balance, Mechanical Solidarity, and Interpersonal Relations , 1963, American Journal of Sociology.

[130]  Jerold L. Hale,et al.  Nonverbal expectancy violations: Model elaboration and application to immediacy behaviors , 1988 .

[131]  Hank Wolfe Privacy enhancing technology , 1997 .

[132]  Pamela J. Shoemaker,et al.  Hardwired for News: Using Biological and Cultural Evolution to Explain the Surveillance Function , 1996 .

[133]  D. Buhrmester,et al.  The development of companionship and intimacy. , 1987, Child development.

[134]  D. Jacobson Doing Research in Cyberspace , 1999 .

[135]  Charles T. Hill,et al.  Self-Disclosure in Dating Couples: Sex Roles and the Ethic of Openness* , 1980 .

[136]  R. Bharat Rao,et al.  Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange , 2006, J. Comput. Mediat. Commun..

[137]  Judee K. Burgoon,et al.  Maintaining and Restoring Privacy through Communication in Different Types of Relationships , 1989 .

[138]  E. Erikson Identity, youth, and crisis , 1968 .

[139]  Lawrence R. Wheeless SELF‐DISCLOSURE AND INTERPERSONAL SOLIDARITY: MEASUREMENT, VALIDATION, AND RELATIONSHIPS , 1976 .

[140]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[141]  G. Kok,et al.  The Theory of Planned Behavior: A Review of its Applications to Health-Related Behaviors , 1996, American journal of health promotion : AJHP.

[142]  Leonard Carmichael,et al.  The Human Condition , 1960 .

[143]  Robert S. Gerstein Intimacy and Privacy , 1978, Ethics.

[144]  T. Newcomb The acquaintance process , 1961 .

[145]  John R. Aiello,et al.  Field Study of the Proxemic Behavior of Young School Children in Three Subcultural Groups. , 1971 .

[146]  Patricia Brierley Newell Perspectives on privacy , 1995 .

[147]  Lee Sproull,et al.  Reducing social context cues: electronic mail in organizational communication , 1986 .

[148]  S. Duval,et al.  A theory of objective self awareness , 1972 .

[149]  P. Ekman,et al.  Facial signs of emotional experience. , 1980 .

[150]  I. Altman Privacy: A Conceptual Analysis. , 1976 .

[151]  Joachim Friedrich Staab The Role of News Factors in News Selection: A Theoretical Reconsideration , 1990 .

[152]  E. Hall,et al.  The Hidden Dimension , 1970 .

[153]  K. Sheehan,et al.  An investigation of gender differences in on-line privacy concerns and resultant behaviors , 1999 .

[154]  P. V. Marsden,et al.  Core Discussion Networks of Americans , 1987 .

[155]  Robert D. Putnam,et al.  Bowling alone: the collapse and revival of American community , 2000, CSCW '00.

[156]  J. Walther Interpersonal Effects in Computer-Mediated Interaction , 1992 .

[157]  S. Petronio Communication Boundary Management: A Theoretical Model of Managing Disclosure of Private Information Between Marital Couples , 1991 .

[158]  Eric M. Uslaner,et al.  Social capital and the net , 2000, CACM.

[159]  Nancy K. Baym,et al.  Personal Connections in the Digital Age , 1994 .

[160]  Jean Bethke Elshtain,et al.  Democracy On Trial , 1994 .

[161]  S. Jourard,et al.  Some factors in self-disclosure. , 1958, Journal of abnormal psychology.

[162]  Malcolm R. Parks,et al.  `Making Moosic': The Development of Personal Relationships on Line and a Comparison to their Off-Line Counterparts , 1998 .

[163]  Lorrie Faith Cranor,et al.  Internet privacy , 1999, CACM.

[164]  M P Lawton,et al.  Wish for privacy for young and old. , 1970, Journal of gerontology.

[165]  Paul Halmos Solitude and privacy;: A study of social isolation, its causes and therapy , 1969 .

[166]  Jonathan L. Freedman Crowding and behavior , 1975 .

[167]  S. Turkle Life on the Screen: Identity in the Age of the Internet , 1997 .

[168]  Beatriz Colomina,et al.  Privacy and Publicity , 1994 .

[169]  C. Berger,et al.  SOME EXPLORATIONS IN INITIAL INTERACTION AND BEYOND: TOWARD A DEVELOPMENTAL THEORY OF INTERPERSONAL COMMUNICATION , 1975 .