Topic 6: Privacy Flashcards

(19 cards)

1
Q

Technological Privacy Protection Strategies

A
  • Audience Segmentation: Choose post visibility
  • Un-tag: Remove yourself from tagged posts
  • Delete: Remove posts, including ephemeral content e.g. stories
  • Block: Prevent contact with specific individuals
  • Deactivate: Terminate accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Privacy Protection Strategies

A
  • Social Steganography: Use of social context to make the underlying message of content visible to only certain readers
  • Self Censorship: Reveal only what you want online
  • Multiple Spaces: Segment audience with multiple accounts
  • White Walling: Post no content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information Asymmetry

A

Social media companies have more information about users than what the user chooses to explicitly disclose e.g. data from observed patterns is collected such as liked content to derive details of gender, ethnicity, and sexuality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital Self

A

An online representation of an individual shaped through their interactions and behaviour. Consisting of:
1. A Digital Mosaic
2. A Digital Persona

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Mosaic

A

A multifaceted collection of a user’s digital presence built from digital footprints:
- Digital Footprints: Traces left behind from online activity, such as from watching a video
- 3rd Party Footprints: Traces left behind from a user’s connections/friends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital Persona

A

A digital persona is an aggregation of multiple data sources (including digital mosaics and third party data). A user can have multiple digital personas, which are all encapsulated under one digital self

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Categories in Westin’s Attitudes to Privacy

A
  • Fundamentalists: Highly distrustful of data-collecting organisations, they prioritise privacy rights and legal protections over consumer benefits
  • Pragmatic: Balance privacy concerns with consumer advantages, they expect organisations to earn trust and provide opt-out choices
  • Unconcerned: Trust organisations easily and are willing to trade privacy for consumer benefits, they oppose additional privacy regulations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Article 12 of the UN’s Universal Declaration of Human Rights (UDHR)

A

Safeguards privacy and dignity to ensure individuals are not unfairly subject to surveillance, defamation, or intrusion without cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Article 7 of the EU’s Charter of Fundamental Rights (CFR)

A

Similar to Article 12 of the UDHR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Article 8 of the EU’s Charter for Fundamental Rights (CFR)

A

Establishes protection of personal data, requiring data to be processed fairly, for specified purposes and with consent or legal justification. (Basis of GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Intellectual Privacy safeguard?

A

The ability to freely think, explore ideas and form beliefs without fear of external pressure, crucial for independent thought and creativity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is privacy important?

A

It acts as a barrier against excessive state control, it protects democracy by ensuring individuals can think critically, express dissent and contribute to democratic processes without self-censoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privacy Trade-off

A

A balance between what information is shared and what is kept private e.g. a company receives information about you and you receive free services / tailored content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Privacy Calculus

A

The process of weighing perceived costs/risks (loss of privacy, data misuse) and perceived benefits (convenience, personalisation). Users are unlikely to disclose data is perceived risks outweigh perceived benefits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Privacy Paradox

A

The discrepancy between individuals’ expressed behaviour about privacy and their actual behaviour (people report intending not to share much personal data but in practice share more than anticipated) due to
- Bounded Rationality
- Behavioural Anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bounded Rationality

A

The capability of individuals to make fully rational decisions is limited due to
- Incomplete Information
- Asymmetric Information
- Rational Ignorance: The cost of learning something outweighs the perceived benefit of knowing it

17
Q

Behavioural Anomalies

A

A set of behavioural patterns that deviate from true rationality
- Valence Effect: Tendency to overestimate of the likelihood of favourable events
- Overconfidence Bias: Tendency to overestimate abilities and knowledge
- Status Quo Bias: Tendency to prefer things to remain unchanged
- Reciprocity and Fairness: Innate desire to act fairly in transactions with others
- Inequity Aversion: Preference for fairness, individuals dislike when others receive resources they do not deserve

18
Q

Structuration

A

The process of which social structures (rules, norms, etc) are both created and reinforced by actions of individuals and the structures in turn shape and constrain actions

19
Q

8 Approaches to Solving Privacy Issues

A
  1. Transparency: Through laws (e.g. privacy notice)
  2. Purpose Limitation: Data must be collected for a defined purpose i.e. GDPR
  3. Self-management: Give users more control over their data but requires digital literacy to be effective
  4. Right to be Forgotten: Inadequate or irrelevant data should be deleted
  5. Data Amnesia: Add expiry dates to data so no intervention is required from individuals. Challenging to implement as it requires new policy and technical design
  6. Anonymity: Remove or encrypt identifying information
  7. Safe Haven: Keep data under strict access controls like the census data
  8. Privacy by Design: Incorporate privacy into every step of the design process