Seven Types of Privacy

As technologies to develop, conceptualisations of privacy have developed alongside them, from a “right to be let alone” to attempts to capture the complexity of privacy issues within frameworks that highlight the legal, social-psychological, economic or political concerns that technologies present. However, this reactive highlighting of concerns or intrusions does not provide an adequate framework though which to understand the ways in which privacy should be proactively protected. Rights to privacy, such as those enshrined in the European Charter of Fundamental Rights, require a forward-looking privacy framework that positively outlines the parameters of privacy in order to prevent intrusions, infringements and problems. This paper makes a contribution to a forward-looking privacy framework by examining the privacy impacts of six new and emerging technologies. It analyses the privacy issues that each of these technologies present and argues that there are seven different types of privacy. We also use this case study information to suggest that an imprecise conceptualisation of privacy may be necessary to maintain a fluidity that enables new dimensions of privacy to be identified, understood and addressed in order to effectively respond to rapid technological evolution.

[1]  Jane Kaye,et al.  Identifiability, genomics and U.K. data protection law. , 2010, European journal of health law.

[2]  Daniel J. Solove,et al.  'I've Got Nothing to Hide' and Other Misunderstandings of Privacy , 2007 .

[3]  Jon Alexander,et al.  Regulating Privacy: Data Protection and Public Policy in Europe and the United States Colin J. Bennett Ithaca: Cornell University Press, 1992, pp. xix, 263 , 1993, Canadian Journal of Political Science/Revue canadienne de science politique.

[4]  R. V. Schomberg Towards Responsible Research and Innovation in the Information and Communication Technologies and Security Technologies Fields , 2011 .

[5]  Silvia Venier Global mobility and security , 2010 .

[6]  Rachel Finn,et al.  Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications , 2012, Comput. Law Secur. Rev..

[7]  Lara Srivastava Radio frequency identification: ubiquity for humanity , 2007 .

[8]  klausdieterborchardt European Economic and Social Committee , 2010 .

[9]  Christian Fuchs,et al.  Towards an Alternative Concept of Privacy , 2011, J. Inf. Commun. Ethics Soc..

[10]  Demetrius Klitou Backscatter body scanners - A strip search by other means , 2008, Comput. Law Secur. Rev..

[11]  D. Lyon Surveillance after September 11 , 2001 .

[12]  D. Kasper,et al.  The Evolution (or Devolution) of Privacy , 2005 .

[13]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[14]  M. Farah,et al.  Neuroethics: the practical and the philosophical , 2005, Trends in Cognitive Sciences.

[15]  Priscilla M. Regan Legislating Privacy: Technology, Social Values, and Public Policy, Priscilla M. Regan. 1995. University of North Carolina Press, Chapel Hill, NC. 332 pages. ISBN: 0-8070-2226-4. $34.95 , 1995, The Handbook of Privacy Studies.

[16]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[17]  Anton Nijholt,et al.  BCI for Games: A 'State of the Art' Survey , 2008, ICEC.

[18]  James Q. Whitman The Two Western Cultures of Privacy: Dignity versus Liberty , 2004 .

[19]  Marc Langheinrich,et al.  A survey of RFID privacy approaches , 2009, Personal and Ubiquitous Computing.

[20]  Anil Kumar Understanding Privacy , 2010 .

[21]  Grossi Luigi,et al.  RFID Technologies: Emerging Issues, Challenges and Policy Options , 2007 .

[22]  Scott M. Stevens,et al.  Entertainment Computing - ICEC 2008, 7th International Conference, Pittsburgh, PA, USA, September 25-27, 2008. Proceedings , 2008, ICEC.

[23]  G. Church,et al.  From genetic privacy to open consent , 2008, Nature Reviews Genetics.

[24]  Benjamin J. Goold,et al.  Surveillance and the Political Value of Privacy , 2009 .

[25]  Ian R. Kerr,et al.  Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society , 2009 .

[26]  DNA identification and surveillance creep , 1999 .

[27]  Torin Monahan,et al.  Surveillance and Security: Technological Politics and Power in Everyday Life , 2006 .

[28]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[29]  Paul McBride Beyond Orwell : the application of unmanned aircraft systems in domestic surveillance operations , 2009 .

[30]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[31]  Serge Gutwirth,et al.  Privacy and the Information Age , 2001 .

[32]  Catharine A. MacKinnon,et al.  Feminism Unmodified: Discourses on Life and Law , 1987 .

[33]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[34]  G. T. Marx,et al.  Soft Surveillence: A Growth of Mandatory Volunteerism in Collecting Personal Information — “Hey Buddy Can You Spare a DNA?” , 2006 .

[35]  Dennis J. McFarland,et al.  Brain–computer interfaces for communication and control , 2002, Clinical Neurophysiology.