
Contents
-
-
-
-
-
-
-
-
-
9.1 Visions and context 9.1 Visions and context
-
9.2 A privacy primer 9.2 A privacy primer
-
9.3 Government data collection 9.3 Government data collection
-
9.4 Consumer privacy 9.4 Consumer privacy
-
9.5 Health information 9.5 Health information
-
9.6 Personal information visible through social media 9.6 Personal information visible through social media
-
9.7 Surveillance everywhere 9.7 Surveillance everywhere
-
9.8 Recording, remembering, and forgetting 9.8 Recording, remembering, and forgetting
-
9.9 Confidential information, privacy for government, and whistle-blowers 9.9 Confidential information, privacy for government, and whistle-blowers
-
9.10 Privacy laws 9.10 Privacy laws
-
9.11 What shall we do? 9.11 What shall we do?
-
9.12 Summary 9.12 Summary
-
9.13 Key terms 9.13 Key terms
-
-
-
-
-
-
Cite
Abstract
Fears about loss of privacy in computerized societies have been central to dystopian literature. The issue has also concerned thoughtful computer scientists and lawyers since the 1960s. By then, the scope of the computer revolution was making clear that governments and corporations could keep records about almost every aspect of our lives. As data storage became virtually limitless at trivial cost, effective uses of data grew, as did risks to personal privacy. We shall define privacy, look at its manifestations and roles, and discuss current and future threats to it. We shall introduce concepts that are key to understanding privacy, such as informed consent. A major concern is the threats to information privacy or data privacy, in which a person’s confidential information has errors or becomes exposed to people who should not be able to see or use it. We shall examine situations in which privacy can be invaded by governments, organizations, and individuals. Governments amass vast stores of personal data during the everyday course of administration and regulation. Government surveillance in many nations captures information that should be private, a topic we discussed in Chapter 6. Search engines, credit rating organizations, and insurance companies also gather huge amounts of data on consumers. When data is incorrect, or is hacked, there are serious implications for information privacy. Criminals seek to gain leverage by ferreting out computer-based data about personal financial transactions. Health information is a particularly sensitive area in which many people feel especially vulnerable. These are all ‘classical’ privacy concerns, the dangers of which were evident in the 1960s. New technologies have raised more concerns. Social media holds vast quantities of personal data that we have willingly disclosed, including information that could prove embarrassing later in life. A vivid example of a privacy breech was the Cambridge Analytica/Facebook scandal of 2018. New technologies raise new privacy concerns. Chips use GPS to track our location and movements. Recent advances in computer vision and the widespread deployment of video cameras enable face recognition. Chips located in the environment and embedded as sensors and prostheses in our bodies make our activities and even our moods accessible by others.
Sign in
Personal account
- Sign in with email/username & password
- Get email alerts
- Save searches
- Purchase content
- Activate your purchase/trial code
- Add your ORCID iD
Purchase
Our books are available by subscription or purchase to libraries and institutions.
Purchasing informationMonth: | Total Views: |
---|---|
October 2022 | 3 |
November 2022 | 1 |
December 2022 | 4 |
February 2023 | 1 |
March 2023 | 5 |
May 2023 | 3 |
June 2023 | 1 |
August 2023 | 9 |
September 2023 | 2 |
October 2023 | 4 |
November 2023 | 2 |
February 2024 | 2 |
March 2024 | 2 |
June 2024 | 3 |
July 2024 | 3 |
September 2024 | 2 |
January 2025 | 8 |
February 2025 | 2 |
Get help with access
Institutional access
Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:
IP based access
Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.
Sign in through your institution
Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.
If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.
Sign in with a library card
Enter your library card number to sign in. If you cannot sign in, please contact your librarian.
Society Members
Society member access to a journal is achieved in one of the following ways:
Sign in through society site
Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:
If you do not have a society account or have forgotten your username or password, please contact your society.
Sign in using a personal account
Some societies use Oxford Academic personal accounts to provide access to their members. See below.
Personal account
A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.
Some societies use Oxford Academic personal accounts to provide access to their members.
Viewing your signed in accounts
Click the account icon in the top right to:
Signed in but can't access content
Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.
Institutional account management
For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.