Linking Platforms, Practices, and Developer Ethics: Levers for Privacy Discourse in Mobile Application Development

Privacy is a critical challenge for corporate social responsibility in the mobile device ecosystem. Mobile application firms can collect granular and largely unregulated data about their consumers, and must make ethical decisions about how and whether to collect, store, and share these data. This paper conducts a discourse analysis of mobile application developer forums to discover when and how privacy conversations, as a representative of larger ethical debates, arise during development. It finds that online forums can be useful spaces for ethical deliberations, as developers use these spaces to define, discuss, and justify their values. It also discovers that ethical discussions in mobile development are prompted by work practices which vary considerably between iOS and Android, today’s two major mobile platforms. For educators, regulators, and managers interested in encouraging more ethical discussion and deliberation in mobile development, these work practices provide a valuable point of entry. But while the triggers for privacy conversations are quite different between platforms, ultimately the justifications for privacy are similar. Developers for both platforms use moral and cautionary tales, moral evaluation, and instrumental and technical rationalization to justify and legitimize privacy as a value in mobile development. Understanding these three forms of justification for privacy is useful to educators, regulators, and managers who wish to promote ethical practices in mobile development.

[1]  Katie Shilton,et al.  Values Levers , 2013 .

[2]  Kirsten E. Martin Understanding Privacy Online: Development of a Social Contract Approach to Privacy , 2016 .

[3]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[4]  Tarleton Gillespie,et al.  The politics of ‘platforms’ , 2010, New Media Soc..

[5]  Yang Wang,et al.  Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising (CMU-CyLab-11-017) , 2011 .

[6]  Lynette I. Millett,et al.  Engaging Privacy and Information Technology in a Digital Age: Executive Summary , 2010, J. Priv. Confidentiality.

[7]  Katie Shilton,et al.  Putting mobile application privacy in context: An empirical study of user privacy expectations for mobile devices , 2016, Inf. Soc..

[8]  T. Shepherd,et al.  Doing well by doing good? Normative tensions underlying Twitter’s corporate social responsibility ethos , 2014 .

[9]  Kirsten E. Martin,et al.  Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online , 2013, First Monday.

[10]  Helen Nissenbaum,et al.  Bias in computer systems , 1996, TOIS.

[11]  Jessica K. Miller,et al.  Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system , 2007, GROUP.

[12]  S. Brusoni,et al.  Ethics, Technology and Organizational Innovation , 2017 .

[13]  Nick Doty,et al.  Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[14]  Katie Shilton,et al.  Why experience matters to privacy: How context‐based experience moderates consumer privacy expectations for mobile applications , 2015, J. Assoc. Inf. Sci. Technol..

[15]  P. Verbeek,et al.  Materializing Morality , 2006 .

[16]  Lucas D. Introna,et al.  Privacy in the Information Age: Stakeholders, Interests and Values , 1999, Journal of business ethics : JBE.

[17]  Rafael Capurro,et al.  Privacy. An Intercultural Perspective , 2005, Ethics and Information Technology.

[18]  P. Brey,et al.  Anticipating ethical issues in emerging IT , 2012, Ethics and Information Technology.

[19]  J. Herkert,et al.  Future directions in engineering ethics research: Microethics, macroethics and the role of professional societies , 2001, Science and engineering ethics.

[20]  J. Moor What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.

[21]  W. Orlikowski Sociomaterial Practices: Exploring Technology at Work , 2007 .

[22]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[23]  Hazel Hall,et al.  Organizational knowledge and communities of practice , 2005, Annu. Rev. Inf. Sci. Technol..

[24]  Paul A. Pavlou,et al.  State of the information privacy literature: where are we now and where should we go? , 2011 .

[25]  Julie E. Cohen Configuring the Networked Self - Law, Code, and the Play of Everyday Practice , 2012 .

[26]  David H. Guston Participating Despite Questions: Toward a More Confident Participatory Technology Assessment , 2011, Sci. Eng. Ethics.

[27]  Jinyan Zang,et al.  Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps , 2015 .

[28]  Steven B. Lipner,et al.  The trustworthy computing security development lifecycle , 2004, 20th Annual Computer Security Applications Conference.

[29]  Helen Nissenbaum,et al.  Respecting Context to Protect Privacy: Why Meaning Matters , 2018, Sci. Eng. Ethics.

[30]  Ctrl-Z The right to be forgotten.pdf , 2016 .

[31]  Robert Boguslaw,et al.  Privacy and Freedom , 1968 .

[32]  R. F. Beltramini,et al.  A 30-Year Historical Examination of Ethical Concerns Regarding Business Ethics: Who’s Concerned? , 2012 .

[33]  A. Cavoukian Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices , 2012 .

[34]  Lorrie Faith Cranor,et al.  What do they "indicate?": evaluating security and privacy indicators , 2006, INTR.

[35]  Katie Shilton,et al.  Platform privacies: Governance, collaboration, and the different meanings of “privacy” in iOS and Android development , 2018, New Media Soc..

[36]  K. K. Cetina,et al.  The Practice Turn in Contemporary Theory , 2001 .

[37]  Laurence Ashworth,et al.  Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .

[38]  Lorrie Faith Cranor,et al.  The Privacy and Security Behaviors of Smartphone App Developers , 2014 .

[39]  Christopher Kelty,et al.  Two Bits: The Cultural Significance of Free Software , 2008 .

[40]  Rachelle Hollander,et al.  Ethics education and scientific and engineering research : what's been learned? what should be done? : summary of a workshop , 2009 .

[41]  Lorrie Faith Cranor,et al.  A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.