ESRCSeminar:Policy, Privacy and Digital Presence: The right to be forgotten in the virtual world

Privacy Revisited in Context of Social Media

Janet Hui XUE

,

PhD student at the Soft Power Advocacy & Research Centre, MacquarieUniversity

PhD visiting student at the Centre for Social-Legal Studies, University ofOxford

What is new in the context of Social Media?

Defining concept of privacyremains long-lasting exercise(Westin, 1967; Gavison,1980, Petronio, 1991, 2002; Rawlins, 1998;GumpertDrucker, 2001; Nissenbaum, 1998), and largely loses clarity with the recent intersection with another term- personal data(Kasper, 2005, Cutilloet.al., 2009; G¨urses, 2010; Greenleaf, 2012).As data flow is experienced internetworked online transmission and multi-layer offline spatial distribution, understanding this pair of terms ischallenged in different contexts afforded by social media site (SNS).

These contexts complicate any single stage of life cycle of personal data as well as the parameters of data transmission norms. The life cycle of personal data include data collection, stockpiling, processing, and dissemination. Parameters of data transmission norms consist of actors (subject, sender, recipient), attributes (types of data), and transmission principles (constraints under which data flows).Data flows in these new contexts could weaken, blur or strengthen traditional borders of many kinds as well as create new borders of inclusion and exclusion (MarxMuschert, 2007). Some paradoxical characteristics of SNS are thus generated-sharing and hiding, public and private, professional and personal, solitude and intimate, etc.These characteristics enable information privacy, bodily privacy, relational privacy, and communication privacy in the traditional age become intertwined with each other and converged in the age of SNS (XueChitty, 2013).

Therefore, I argue thatprivacy cannot be viewed by polarized perspectives:subjectivity and autonomy against the society, or completely transparent to others, buteach individual’s controllability right of personal data by setting up the boundaries of being to self and being with others.However, this controllability needs constant negotiation with other individuals, organizations, and states. This controllability varies because of cultural values, technology design, and legal regulation. The latter three are hardly separated from each other but insteadintersected to define contexts. Therefore, the controllability differs as data flow cross different media platforms, national borders and are processed by different data users. The controllability alsovariesas relations shaped between individual, and society and state in a new surveillance.

In thefollowing space I will outline major points on conceptualization of privacy which I would like to discuss with you over the seminars from perspectives of data subjects and data users. It will contribute to understandings of privacy in the context of social media.

Data subjects: Sharing and hiding

  1. What I would like to share or hide – classification of personal data
  2. When I would like to share or hide – retention and deletion
  3. Why I would like to share or hide – cultural value and social norms
  4. Whom I would like to share or hide–inclusion and exclusion
  5. What harms might occur to me -inequality and injustice
  6. What I can do if these harms occur to me – technical design and legal solution

Data users: Collection and process (misuse)

  1. Is it personal data at all – personal data and impersonal data(anonymity, pseudo-anonymity)
  2. What are criteria for collecting
  3. Should this criteria differ to different collectors– corporation, governments, individual users
  4. Categorization of collection and misuse: over collection with notice, collection without insufficient notice,intentional/unintentional leaking, intensive data mining for marking purpose, intrusion of private space (Xue Chitty, 2013)
  5. What are economic value and social impact of privacy loss for corporation and individuals?– sharing ownership and sharing responsibility

New surveillance

Surveillance is an approach of population management in terms of politics, economics and culture.

  1. Surveillance erodes our privacy: past, present and future
  2. We use surveillance technologies to protect our privacy(Marx. 2003)
  3. We monitor others while we intend to protect our own privacy
  4. We are all watchers while being watched with incomparablecapabilities
  5. Mass surveillanceleads to social sorting anddifferentiates people’s protection capability of privacy (Lyon, 2003)
  6. Mass surveillance changes the relations between individuals, organization and society

Privacy, security and identity(some discussion above also refers to this aspect)

1.Exchange privacy for security –do we feel secure when living in society of documented mobility, activity and location?

2.What happens to personal data is a deeply serious question if that data in part actually constitutes who the person is (Lyon, 2003).

3.Present different sets of personal data in different contexts – multi-identity management

Reference

Bennett, C.J. and Parsons, C. (2013) Privacy and surveillance: The multidisciplinary literature on the capture, use, and disclosure of personal information in cyberspace, in Dutton, W. ed.,The Oxford Handbook of Internet Studies.

Cutillo, L.A. and Molva, R. and Strufe, T.(2009)Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network, accessed on 2012.10.7

Gavison, R. E. (1980) ‘Privacy and the Limits of Law’, The Yale Law Journal, 89 (3):421-471. Available at SSRN: on 2012.08.30.

Greenleaf, G (2012) ‘Global data privacy in a networked world’(in press) Chapter in Brown, I (Ed) Research Handbook on Governance of the Internet, Edward Elgar Publishing, Cheltenham, on 2012.08.30.

Gumpert and Drucker (2001) ‘Public Boundaries: Privacy and Surveillance in a Technological World,’ Communication Quarterly, 49(2): 115-129.

Kasper, D. V. S. (2005)Theevolution (or devolution) of privacy, Sociological Forum, 20: 69-92.

Lyon, D. (2003) Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination, Routledge.

Marx, G. (2003) ‘ATack in the Shoe: Neutralizing and Resisting the New Surveillance’, Journal of Social Issues, Vol.59 (2), pp.369-390.

Marx, G. and Muschert, G.W. (2007) Personal Information, Borders, and the New Surveillance Studies, accessed on 2013.8.23.

Marx, G. (2012) “You paper please” : Personal and professional encounters with surveillance, in Ball, K. et.al.,ed.,Routeledge Handbook of Surveillance Studies.

Nissenbaum, H. (1998) Protecting Privacy in an Information Age: The Problem of Privacy in Public, accessed on 2012.8.30.

Petronio, S. (2002) Boundaries of privacy: Dialectics of disclosure. New York: State University of

New York Press.

Rawlins, W. K. (1998)‘Theorizing public and private domains and practices ofcommunication: Introductory concerns’,Communication Theory, 8 (4): 369-380.

Warren, Samuel and Brandeis, Warren, 1890, The right to privacy. Harvard Law Review, 4(5), 193–220.

Westin, A. F. (1967)Privacy and Freedom. New York: Atheneum.

Xue, H.; Chitty, N. (2013)Commercial Misuse of Personal Data by Stakeholders of SNS and Its Policy Implications: A Case Study on Weibo,presented on China and the New Internet World: The Eleventh Chinese Internet Research Conference (CIRC11), Oxford Internet Institute, Oxford, 6.15.