The digitally extended self: A lexicological analysis of personal data

Individual’s privacy, especially with regard to their personal data, is increasingly an area of concern as people interact with a wider and more pervasive set of digital services. Unfortunately, the terminology around personal data is used inconsistently, the concepts are unclear and there is a poor understanding of their relationships. This is a challenge to those who need to discuss personal data in precise terms, for example, legislators, academics and service providers who seek informed consent from their users. In this article, we present a lexicological analysis of the terms used to describe personal data, use this analysis to identify common concepts and propose a model of the digitally extended self that shows how these concepts of personal data fit together. We then validate the model against key publications and show in practice how it can be used to describe personal data in three scenarios. Our work shows that there is no clearly delineated kernel of personal data, but rather that there are layers of personal data, with different qualities, sources and claims of ownership, which extend out from the individual and form the digitally extended self.

[1]  Elgar Fleisch,et al.  Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and affect in the privacy calculus , 2015, Inf. Syst. J..

[2]  Robert J. Glushko Categorization: Describing Resource Classes and Types , 2013 .

[3]  Lauren Amy Gelman Privacy, Free Speech, and "Blurry Edged" Social Networks , 2009 .

[4]  Hasan Bakhshi,et al.  How can we measure the modern digital economy? , 2016 .

[5]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[6]  Cameron Buckner The Ego Tunnel: The Science of Mind and the Myth of the Self , 2012 .

[7]  Surinder Batra,et al.  Big Data Analytics and Its Reflections on DIKW Hierarchy , 2014 .

[8]  D. Lyon Jesus in Disneyland: Religion in Postmodern Times , 2000 .

[9]  S. Cherry,et al.  Total recall [life recording software] , 2005, IEEE Spectrum.

[10]  Sara B. Kiesler,et al.  The Ideal Elf: Identity Exploration in World of Warcraft , 2007, Cyberpsychology Behav. Soc. Netw..

[11]  J. E. Clark The Digital Imperative: Making the Case for a 21st-Century Pedagogy , 2010 .

[12]  Andrés Sanchez,et al.  Facebook Feeding Frenzy: Resistance-through-Distance and Resistance-through-Persistence in the Societied Network , 2009 .

[13]  Sherry Turkle,et al.  Constructions and reconstructions of self in virtual reality: Playing in the MUDs , 1994 .

[14]  S. Greysen,et al.  Online Professionalism and the Mirror of Social Media , 2010, Journal of General Internal Medicine.

[15]  J. Borges,et al.  A TAXONOMY OF PRIVACY , 2006 .

[16]  Charles Safran,et al.  Toward a national framework for the secondary use of health data: an American Medical Informatics Association White Paper. , 2007, Journal of the American Medical Informatics Association : JAMIA.

[17]  Deborah G. Johnson,et al.  Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness , 2002, Inf. Soc..

[18]  Alessandro Acquisti,et al.  The challenges of personal data markets and privacy , 2015, Electron. Mark..

[19]  S. Hammer,et al.  International Journal of Health Geographics Combining Google Earth and Gis Mapping Technologies in a Dengue Surveillance System for Developing Countries , 2022 .

[20]  Clifton F. Guthrie Digital Media Ethics , 2010, The SAGE International Encyclopedia of Mass Media and Society.

[21]  Winn Schwartau,et al.  Information Warfare: Chaos on the Electronic Superhighway , 1994 .

[22]  George Siemens,et al.  Penetrating the fog: analytics in learning and education , 2014 .

[23]  Nicola Osborne,et al.  Managing your digital footprint , 2015 .

[24]  Jennifer E. Rowley,et al.  The wisdom hierarchy: representations of the DIKW hierarchy , 2007, J. Inf. Sci..

[25]  Tristan Henderson,et al.  Virtual Walls: Protecting Digital Privacy in Pervasive Environments , 2007, Pervasive.

[26]  T. Marteau,et al.  The Place of Inter-Rater Reliability in Qualitative Research: An Empirical Study , 1997 .

[27]  Robin Mackenzie,et al.  Challenges of ethical and legal responsibilities when technologies’ uses and users change: social networking sites, decision-making capacity and dementia , 2012, Ethics and Information Technology.

[28]  Megan Poore,et al.  Writing for Academic Success , 2011 .

[29]  Roger Clarke,et al.  Web 2.0 as Syndication , 2008, J. Theor. Appl. Electron. Commer. Res..

[30]  S. Cherry The battle for broadband [Internet protocol television] , 2005, IEEE Spectrum.

[31]  Edward E. Jones,et al.  Life as theater: A dramaturgical sourcebook. , 1975 .

[32]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[33]  Neal R Haddaway,et al.  The Role of Google Scholar in Evidence Reviews and Its Applicability to Grey Literature Searching , 2015, PloS one.

[34]  Jodi Kearns Privacy Rights in the Digital Age , 2017 .

[35]  Joanne M. McInnerney,et al.  Online Learning: Social Interaction and the Creation of a Sense of Community , 2004, J. Educ. Technol. Soc..

[36]  Catherine Heeney,et al.  Breaching the Contract? Privacy and the UK Census , 2012, Inf. Soc..

[37]  Irene Pollach,et al.  What's wrong with online privacy policies? , 2007, CACM.

[38]  Daniel J. Solove Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .

[39]  Yvonne Rogers,et al.  Reflecting human values in the digital age , 2009, CACM.

[40]  A. Siibak Constructing the Self through the Photo selection - Visual Impression Management on Social Networking Websites , 2009 .

[41]  Nicholas Walliman,et al.  Social research methods , 2006 .

[42]  Xavier L’Hoiry,et al.  The Honest Data Protection Officer’s Guide to Enable Citizens to exercise their Subject Access Rights: lessons from a ten-country European study , 2015 .

[43]  Pierangela Samarati,et al.  Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project , 2010, J. Comput. Secur..

[44]  Omer Tene,et al.  Shades of Gray: Seeing the Full Spectrum of Practical Data De-Identification , 2016 .

[45]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[46]  G. S. O'Keeffe,et al.  The Impact of Social Media on Children, Adolescents, and Families , 2011, Pediatrics.

[47]  Michael Smithson,et al.  Toward a Social Theory of Ignorance , 1985 .

[48]  Jessica Vitak,et al.  Digital footprints: online identity management and search in the age of transparency , 2007 .

[49]  François Heinderyckx Reclaiming the High Ground in the Age of Onlinement , 2014 .

[50]  Victoria L. Crittenden,et al.  We're all connected: The power of the social media ecosystem , 2011 .

[51]  Sam Dallas,et al.  Word of Mouse , 2010 .

[52]  Alistair Kelman,et al.  Database Nation: The Death of Privacy in the 21st Century , 2000, J. Inf. Law Technol..

[53]  Daniel J. Solove,et al.  Privacy and Power: Computer Databases and Metaphors for Information Privacy , 2001 .

[54]  B. Olivier Cyberspace and Identity , 2011 .

[55]  Lori B. Andrews,et al.  I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy , 2012 .

[56]  J. Palfrey,et al.  Born digital: understanding the first generation of digital natives , 2009, Choice Reviews Online.

[57]  Erika Pearson,et al.  All the World Wide Web's a Stage: The Performance of Identity in Online Social Networks , 2009, First Monday.

[58]  L. Floridi The Ontological Interpretation of Informational Privacy , 2005, Ethics and Information Technology.

[59]  Tomas A. Lipinski,et al.  The Digital Person: Technology and Privacy in the Information Age , 2008 .

[60]  S. Greysen,et al.  Online posting of unprofessional content by medical students. , 2009, JAMA.

[61]  Frank Vander Valk,et al.  Identity, Power, and Representation in Virtual Environments , 2008 .

[62]  James C. McElroy,et al.  The influence of personality on Facebook usage, wall postings, and regret , 2012, Comput. Hum. Behav..

[63]  Serge Gutwirth,et al.  Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .

[64]  Roy Coleman Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination , 2003 .

[65]  Sarah H. Ludington Reining in the Data Traders: A Tort for the Misuse of Personal Information , 2007 .

[66]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[67]  Tanya Byron,et al.  Safer children in a digital world : the report of the Byron Review : be safe, be aware, have fun , 2008 .

[68]  Christopher Millard,et al.  Defining ‘Personal Data’ in e-Social Science , 2011 .