Privacy as a Machine

Surveys indicate that privacy persists as an issue of public and individual concern. It is a highly relevant issue in systems engineering today, and the need for privacy studies will be escalating substantially in the coming years as agencies increasingly turn to Internet-based cloud computing, however, conceptual difficulty exists in defining privacy. According to researchers in the field, prominent legal accounts are inadequate, and much work on privacy is either too eclectic or too narrowly focused. This paper is an attempt to join recent philosophical approaches and legal maneuvers with methods used in engineering to schematize the mechanisms of privacy. It starts with the notion propounded by French philosophers Deleuze and Guattari of a machine that produces and interrupts. A flow-based schematization is proposed as an apparatus for describing such a machines. The man as a machine metaphor is then incorporated to define privacy as a person's machine. The results provide an initial foundation on which to treat privacy as a defense mechanism that monitors and guards against substantial loss of self-demarked "things," e.g., personal data and activities.

[1]  Alaric Kohler,et al.  To Think Human out of the Machine Paradigm: Homo Ex Machina , 2010, Integrative psychological & behavioral science.

[2]  E. Poovammal,et al.  Utility Independent Privacy Preserving Data Mining on Vertically Partitioned Data , 2009 .

[3]  T. Kuhn,et al.  The Structure of Scientific Revolutions. , 1964 .

[4]  Sabah Al-Fedaghi,et al.  Flow-Based Specification of Time Design Requirements , 2015 .

[5]  Sabah Al-Fedaghi Heraclitean Ontology for Specifying Systems , 2015 .

[6]  Jukka Vuorinen,et al.  Pacific Asia Conference on Information Systems ( PACIS ) 8-11-2009 SECURITY AS A MACHINE-STRUGGLING BETWEEN ORDER AND CHAOS , 2013 .

[7]  Max E. Valentinuzzi,et al.  Understanding the Human Machine: A Primer for Bioengineering , 2004 .

[8]  M. Boden,et al.  Mind As Machine: A History of Cognitive Science Two-Volume Set , 2006 .

[9]  F. Guattari,et al.  Capitalism and Schizophrenia I , 1983 .

[10]  Jukka Vuorinen Parasitic Order Machine. A Sociology and Ontology of Information Securing , 2014 .

[11]  S. Al-Fedaghi Conceptualization of Various and Conflicting Notions of Information , 2014 .

[12]  Sabah Al-Fedaghi On a Flow-Based Paradigm in Modeling and Programming , 2015 .

[13]  S. Al-Fedaghi Diagrammatic Representation as a Tool for Clarifying Logical Arguments , 2015 .

[14]  GLENN,et al.  Philosophical Views on the Value of Privacy , 1966 .

[15]  Laura A. Rosenbury,et al.  Sex In and Out of Intimacy , 2010 .

[16]  E. Crouch,et al.  Man and Machine , 1991, British Journal of Psychiatry.

[17]  C. W. Bain,et al.  Man and Machine , 1928, Nature.

[18]  Sabah Al-Fedaghi,et al.  Computer Science Approach to Information-Like Artifacts as Exemplified by Memes , 2015 .

[19]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[20]  J. Moor The ethics of privacy protection , 1990 .