Big data privacy: The datafication of personal information

ABSTRACT In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy. This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information can violate privacy but does not call for consent.

[1]  L. Floridi The Ontological Interpretation of Informational Privacy , 2005, Ethics and Information Technology.

[2]  Daniel J. Solove,et al.  Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .

[3]  Daniel J. Solove,et al.  Privacy Self-Management and the Consent Dilemma , 2012 .

[4]  J. W. DeCew In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .

[5]  Bernd Frohmann,et al.  Subjectivity and information ethics , 2008, J. Assoc. Inf. Sci. Technol..

[6]  Daniel J. Solove Understanding Privacy (Chapter One) , 2008 .

[7]  M. Zimmer “But the data is already public”: on the ethics of research in Facebook , 2010, Ethics and Information Technology.

[8]  Ian Hosein Privacy as freedom , 2006 .

[9]  A. Allen,et al.  An Ethical Duty to Protect One's Own Information Privacy? , 2013 .

[10]  Charles Duhigg,et al.  How Companies Learn Your Secrets , 2012 .

[11]  H. Tavani Informational Privacy: Concepts, Theories, and Controversies , 2009 .

[12]  Philip E. Agre,et al.  Surveillance and Capture: Two Models of Privacy , 1994, Inf. Soc..

[13]  Anthony Mills,et al.  Data, Information, Knowledge, and Wisdom , 2011 .

[14]  ZimmerMichael But the data is already public , 2010 .

[15]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[16]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[17]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[18]  Andrew McLaughlin The Whale and the Reactor: A Search for Limits in an Age of High Technology , 1987 .

[19]  Paul Cooper,et al.  Data, information, knowledge and wisdom , 2014 .

[20]  Viktor Mayer-Schnberger,et al.  Big Data: A Revolution That Will Transform How We Live, Work, and Think , 2013 .

[21]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[22]  Bart W. Schermer,et al.  The crisis of consent: how stronger legal protection may lead to weaker consent in data protection , 2014, Ethics and Information Technology.

[23]  Katharine Armstrong,et al.  Big data: a revolution that will transform how we live, work, and think , 2014 .

[24]  D. Lyon Surveillance society: Monitoring Everyday Life , 2001 .