100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Data, privacy and society: Samenvatting + notities / Summary + notes $5.92   Add to cart

Summary

Data, privacy and society: Samenvatting + notities / Summary + notes

2 reviews
 96 views  6 purchases
  • Course
  • Institution

Comprehensive summary of the data, privacy & society course, taught by Jo Pierson. This summary includes all slides and additional information from the lessons. // Comprehensive summary of the course data, privacy & society taught by Jo Pierson. This summary includes all slides and additiona...

[Show more]

Preview 10 out of 128  pages

  • August 6, 2021
  • 128
  • 2020/2021
  • Summary

2  reviews

review-writer-avatar

By: soufoanita • 2 year ago

reply-writer-avatar

By: asannen • 2 year ago

Sad to see that you only give 1 star. May I ask why?

reply-writer-avatar

By: soufoanita • 2 year ago

i am sorry about that. i bought the notes because i thought it was your own summary but i noticed that it is just the same as the professor's slides (which we. can get on Canvas).

reply-writer-avatar

By: asannen • 2 year ago

As described these are indeed the slides + my notes.

review-writer-avatar

By: kübrakara1 • 3 year ago

Just checked the summary, all slides are in it. The author also implemented his/her notes, so that's great! Was expecting a bit more notes to complement the slides, but this will definitely do it. Worth the money. Thank you, you're saving me!

reply-writer-avatar

By: asannen • 3 year ago

Thanks for this review! I wish you the best of luck with your exam!

avatar-seller
CURSUS DATA, PRIVACY AND SOCIETY




2020-2021




Sociale wetenschappen & Solvay Business School

,INHOUDSOPGAVE

Introduction ................................................................................................................................. 6
Mediated communication ............................................................................................................... 6
Privacy ............................................................................................................................................. 6
1. Desire for privacy ................................................................................................................................... 7
2. Rethinking concept of privacy ................................................................................................................ 8
3. Social value of privacy .......................................................................................................................... 10

Part 1 – Overview + Situating privacy .......................................................................................... 11
Law .................................................................................................................................................... 11
EU data protection (Mayer-Schönberger) ..................................................................................... 11
Current case study ......................................................................................................................... 15
TechCrunch: WTF is GDPR? ........................................................................................................... 15
GDPR .............................................................................................................................................. 18
GDPR Core definitions (Art.4) ........................................................................................................ 20
GDPR Principles (Art.5) .................................................................................................................. 21
GDPR Core definitions (Art.4) ........................................................................................................ 22
GDPR Rights of data subject (Art.12-23) ....................................................................................... 22
GDPR Lawfulness of processing (Art.6.1) ...................................................................................... 23
GDPR Core definitions (Art.4) ........................................................................................................ 24
GDPR Special categories (Art.9) .................................................................................................... 24
GDPR Core definitions (Art.4) ........................................................................................................ 24
GDPR Profiling (Art.22) .................................................................................................................. 25
GDPR Data protection by design (Art.25) ...................................................................................... 25
GDPR Data protection by default (Art.25)..................................................................................... 26
GDPR Data protection impact assessment (DPIA) (Art.35) ........................................................... 26
computer science – social sciences .................................................................................................... 27
Situating privacy ............................................................................................................................ 27
Situating privacy: Facebook case................................................................................................... 27
Situating privacy: computer science ............................................................................................. 30
Situating privacy: CS – Confidentiality........................................................................................... 31
Situating privacy: CS – Control ...................................................................................................... 33
Situating privacy: CS – Practice ..................................................................................................... 34
Databait privacy scoring framework ............................................................................................. 36
Situating privacy ............................................................................................................................ 37
Situating privacy: social science .................................................................................................... 38


2

, Beyond liberal concept of privacy ................................................................................................. 39
Political economy of Facebook ...................................................................................................... 40
Socialist privacy ideals and social networking............................................................................... 45
Digital rights organisations ............................................................................................................ 46
Non-commercial, non-profit internet platforms ........................................................................... 46
Conclusion ..................................................................................................................................... 47

Part 2 – Overview + Privacy in Media and Communication Studies ............................................... 49
Artefact .............................................................................................................................................. 49
Introduction: media and communication ..................................................................................... 49
Meaning and function of privacy .................................................................................................. 50
Classic texts and authors: technology ........................................................................................... 50
Traditional debates & dominant schools: technology .................................................................. 53
Classic texts and authors: people .................................................................................................. 54
Classic texts and authors: Petronio ............................................................................................... 55
Traditional debates & dominant schools: people ......................................................................... 56
Classic texts and authors: society .................................................................................................. 56
Traditional debates & dominant schools: society ......................................................................... 57
China’s Social Credit System .......................................................................................................... 58
Practices – Socio-economic arrangements ........................................................................................ 63
Part 2: Current case study ............................................................................................................. 63
Part 2: Current case study - Privacy .............................................................................................. 64
Part 2: Current case study – Networked publics ........................................................................... 66
Part 2: Current case study – Architecture ..................................................................................... 67
Part 2: Current case study – Privacy norms and values ................................................................ 68
Part 2: Current case study – Boundary work................................................................................. 68
Part 2: Privacy in MCS – Practices ................................................................................................. 70
Movie: ‘The Social Network’ (2010) .............................................................................................. 70
Part 2: Privacy in MCS - Practices .................................................................................................. 70
Applying Bucher: algorithmic knowledge (Ana Pop Stefanija) ...................................................... 74
Part 2: Privacy in MCS – Socioeconomic arrangements ................................................................ 76
CI: Overview .................................................................................................................................. 77
CI: Google Buzz .............................................................................................................................. 77
CI: Notice-and-consent .................................................................................................................. 78
Online Behavioural Advertising (OBA) ..................................................................................................... 78




3

, OBA - Third-party tracking ....................................................................................................................... 79
OBA - Third-party tracking by Facebook .................................................................................................. 79
OBA - Cookie data .................................................................................................................................... 79
OBA - Cookie affordances ........................................................................................................................ 80
OBA - Real-Time Bidding (RTB)................................................................................................................. 80
CI: Notice-and-consent .................................................................................................................. 81
CI: Theory of contextual integrity .................................................................................................. 84
CI: Locating contexts online and explicating presiding norms ...................................................... 85
CI: Synopsis .................................................................................................................................... 87
Contextual Integrity Fundamentals ............................................................................................... 89
CI ethical legitimacy: evaluating norms......................................................................................... 90

Part 3 – Overview + Data and public values ................................................................................. 93
Empowerment-by-design .................................................................................................................. 93
Part 3: Current case study ............................................................................................................. 93
Disruption: advertising industry ............................................................................................................... 95
Part 3: Current case study ............................................................................................................. 96
Monitisation ............................................................................................................................................. 96
Part 3: Overview ............................................................................................................................ 98
Digital media.................................................................................................................................. 98
Part 3: Overview ............................................................................................................................ 98
Empowerment-by-Design: theory ............................................................................................... 104
Part 3: Data & public values – EbD .............................................................................................. 106
Cooperative responsibility ............................................................................................................... 107
Part 3: Data & public values – Cooperative responsibility .......................................................... 107
Online platforms.......................................................................................................................... 107
Toward cooperative responsibility .............................................................................................. 108
Coop resp: fairness ...................................................................................................................... 110
Coop resp: contentious content .................................................................................................. 110
Coop resp: diversity ..................................................................................................................... 111
Case study: sharing economy and labour conditions .................................................................. 112
Cooperative responsibility: lay-out ............................................................................................. 113
Cooperative responsibility: Uber ................................................................................................. 113
Cooperative responsibility: lay-out ............................................................................................. 114
Cooperative responsibility: Uber ................................................................................................. 115
Cooperative responsibility: lay-out ............................................................................................. 115



4

, Cooperative responsibility: Uber ................................................................................................. 116
Conclusion ................................................................................................................................... 116
Part 3: Current case study ........................................................................................................... 117
Data literacy .................................................................................................................................... 119
Part 3: Data & public values – Data literacy ................................................................................ 120
I. Google: the pioneer of surveillance capitalism ........................................................................ 120
II. A balance of power.................................................................................................................. 121
III. Search for Capitalism: Impatient Money and the State of Exception .................................... 122
IV. The Discovery of Behavioral Surplus ...................................................................................... 122
V. Surplus at Scale ....................................................................................................................... 125
VI. A Human Invention ................................................................................................................ 125
VII. The Secrets of Extraction ...................................................................................................... 126
VIII. Summarizing the Logic and Operations of Surveillance Capitalism ..................................... 127




5

,INTRODUCTION

Mediated communication
• Mutual shaping
o Information society (Frank Webster) -> Network society (Manuel Castells)
-> Platform society (José van Dijck)
o Individual privacy -> Contextual privacy -> Networked privacy
• From ‘social media’ to ‘connective media’ (van Dijck, 2013)
o Human connectedness is gradually replaced by automated connectivity
o Connectivity = engineered, curated and steered connectedness (i.e. activity
of creating social connections) that draws people to the platform to create
and consume content (UGC), advertising and data (through algorithms)
o The ‘social’ in ‘social media’ encompasses connectedness and connectivity
▪ Companies tend to stress the first and minimise the second meaning


Privacy
Solove, Daniel J. (2015) 'The meaning and value of privacy', in B. Roessler & D.
Mokrosinska (Eds.) Social dimensions of privacy: Interdisciplinary perspectives.
Cambridge: Cambridge University Press, 71-81.




6

,• ‘Our privacy is under assault’ by
o Business and industry
o Governments
o Employers
o Peers
▪ “The gossip that circulates in high school and college is no longer
ephemeral and fleeting”
• Conclusion?
o “With all these developments, many are asking whether privacy is still alive.
With so much information being gathered, with so much surveillance, with
so much disclosure, how can people expect privacy anymore? If we can’t
expect privacy, is it possible to protect it? Many contend that fighting for
privacy is a losing battle, so we might as well just grin and bear it.”
• Answer
1. Desire for privacy instead of expecting privacy
2. Rethinking concept of privacy
3. Social value of privacy


1. Desire for privacy
• ’Do people expect privacy anymore?’
o Law should protect privacy not because we expect it, because we desire it
• Privacy is much more than keeping secrets, but also about:



7

, o Confidentiality
o Maintaining data security
o Having control over information
o Notifying about data others have and how it will be used = need for better
“data due process”
▪ E.g. innocent people on terrorist watch lists, with no recourse to challenge, financial
and employment decisions made based on unknown profiles, blacklist visitors
Tomorrowland

o So: “Privacy thus involves more than keeping secrets – it is about how we
regulate information flow, how we ensure that others use our information
responsibly, how we exercise control over our information, how we should
limit the way others can use our data.”
• Possible for law to limit how others use our data, cf. copyright law
o But how?
o Rethinking concept and value of privacy


2. Rethinking concept of privacy
• Rethinking concept of privacy
o Vague, especially in contrast to security, freedom of speech, efficient
consumer transactions, etc.
• Attempts to locate common denominator for all things we view as private is
wrong approach
o Many theories of privacy focus on nature of information or matter involved
▪ Seeking to identify various types of information and matters that are
private <-> no particular kind of information or matter is inherently
private (e.g. body, home)
o Reasonable expectation of privacy test, but how to determine
▪ Surveys and polls <-> enormous differences
▪ Examine behavioural data <-> knowledge lack (data literacy) ~ privacy
paradox
• But also different conceptualisation possible
o Privacy is not just what people expect but also about what they desire!
▪ Privacy is something we construct through norms and the law
• Focus for understaning privacy?




8

, o Focal point for theory on privacy should be on the problems that create a
desire for privacy and hence we want law to address, i.e. problems in
experience
o Not one thing, but many distinct and related things, so need to understand
privacy in a more pluralistic manner
• Framework for recognising privacy problems
o Four basic groups of harmful activities
1. Information collection: collecting/harvesting info, but no always
harmful
2. Information processing: store, combine, manipulate, search and use
3. Information dissemination: transfer to others or release
4. Invasion: impingement directly on individual
o Groups 1 to 3 moving further away from individual control, while group 4
progresses toward individual yet do not necessarily involve information
• Starts from ‘data subject’
o Individual whose life is most directly affected by activities classified in
taxonomy
o People / user / citizen / consumer / employee / etc.




• Basic groups of harmful activities
1. Information collection
▪ Surveillance: watching, listening or recording info; e.g. CCTV
▪ Interrogation: forms of questioning or probing for info; e.g. opt- out
issue
o Information processing
▪ Aggregation: combination various pieces of data; e.g. linking databases
▪ Identification: linking to particular individual; e.g. personal health data
▪ Insecurity: carelessnes of protecting stored info; e.g. data breach
▪ Secondary use: using collected info for purpose different from original
collection without consent; e.g. Cambridge Analytica
▪ Exclusion: failure to allow data subject to know how info is maintained
and used; e.g. data broker


9

, o Information dissemination
▪ Breach of confidentiality: breaking promise of keeping info secret; e.g.
tex information
▪ Disclosure: revelation of truthful info about person that affects way
others judge reputation; e.g. libel
▪ Exposure: revealing another’s nudity, grief, or bodily functions; e.g.
sexting, revenge porn
▪ Increased accessibility: amplifying accessibility of info; e.g. Google
streetview
▪ Blackmail: threat to disclose personal info; e.g. extortion hacking
▪ Appropriation: use data subject’s identity to serve another’s aims and
interest; e.g. identity theft
▪ Distortion: dissiminating fase or misleading info; e.g. fake news
o Invasion
▪ Intrusion: invasive acts disturbing one’s tranquility or solitude; e.g.
house entering without warrent
▪ Decisional interference: incursion into data subject’s decisions
regarding private affairs; e.g. manipulative nudging, algorithmic
blackbox


3. Social value of privacy
• Social value of privacy
o People are social beings
o Value of protecting individual rights emerges from their contribution to
society
▪ ‘Social basis and social justification’ for civil liberties (Dewey)
o Protecting invidual privacy as society because good society protects against
excessive intrusion and nosiness into people’s lives
o Privacy has social value
• Conclusion
o Understaning privacy as a pluralistic concept with social value




10

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller asannen. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $5.92. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$5.92  6x  sold
  • (2)
  Add to cart