The Private Life in a Digital World
Index
L. McCreary (2008) What was Privacy?...........................................................................................................................2
Video: N. Leone (2020) ‘I have nothing to hide’ Data Privacy in 2020.............................................................................2
S. Margulis (2011) Three Theories of Privacy: An Overview. Chapter 2............................................................................2
Trepte, S. (2021) The Social Media Privacy Model: Privacy and Communication in the Light of Social Media
Affordances.....................................................................................................................................................................4
Video: How Social Media Can Cost Someone Their Job...................................................................................................6
Harcourt, B. (2014) Exposed. The Expository Society.......................................................................................................6
Shahin, S. (2022) West India Company: The Rise of New Imperialists in Digital World....................................................6
Video: Age of Surveillance Capitalism: ‘We Thought We Were Searching Google, But Google Was Searching Us’.........6
Marwick & boyd (2014) Networked privacy: How teenagers negotiate context in social media.....................................6
Video: TikTok Is Spying on You.........................................................................................................................................6
Arora & Scheiber (2017) Slumdog romance: Facebook love and digital privacy at the margins......................................7
Video: Data Protection in Africa......................................................................................................................................7
Fritz & Gonzales (2018) Not the Normal Trans Story: Negotiating Trans Narratives While Crowdfunding at the
Margins...........................................................................................................................................................................8
Video: How Gay Dating Apps Are Being Abused & Used for Entrapment Around The World..........................................8
Baker-White (2022) Nothing Sacred: These Apps Reserve The Right To Sell Your Prayers. Buzzfeed...............................8
Video: US Supreme Court to hear FBI mosque surveillance case.....................................................................................9
Brownlie (2018) Looking out for each other online: Digital outreach, emotional surveillance and safe(r) spaces...........9
Video: Can coronavirus tracking apps protect data privacy?...........................................................................................9
Internet Research: Ethical Guidelines 3.0........................................................................................................................9
Academy/Industry partnership and corporate data: Ethical considerations..................................................................10
Shahin & Zheng (2020) Big Data and the Illusion of Choice: Comparing the Evolution of India’s Aadhaar and China’s
Social Credit System as Technosocial Discourses............................................................................................................10
Zaeem & Barber (2020) The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise....................11
Video: GDPR explained: How the new data protection act could change your life........................................................12
, L. McCreary (2008) What was Privacy?
Most answers to the question ‘what is privacy?’ begin with the individual.
Privacy = partly a form of self-possession – custody of the facts of one’s life – unless we decide otherwise. Everything
we know about ourselves and wish to control.
What was privacy?
People could once feel confident that what others might find out about them would be treated with reasonable care
and consideration and thus would probably do them no harm. But they can no longer feel confident.
Information Information
privacy exploitation
The intersection of private lives and public spaces brings to the fore a second version of privacy = a feature of the
social contract – one that every culture has negotiated for itself over time in order to preserve dignity, civility and
cohesion.
Attitudes towards privacy are shifting, abetted by new technologies that generate new threats to privacy and new
forms of online self-exposure that appear to disregard them.
Video: N. Leone (2020) ‘I have nothing to hide’ Data Privacy in
2020
Growth hacking = the art of growing a company as fast as possible with very little budget through combining data
and rapid experimentation to get to understand the behavior of users.
S. Margulis (2011) Three Theories of Privacy: An Overview.
Chapter 2
Westin’s theory
Westin’s theory of privacy addresses how people protect themselves by temporarily limiting access of others to
themselves.
Privacy (Westin) = the claim of individuals, groups, or institutions to determine for themselves when, how, and to
what extent information about them is communicated to others. Privacy is the voluntary and temporary withdrawal
of a person from the general society through physical or psychological means.
Westin proposes that people need privacy. Privacy helps us to adjust emotionally to day-to-day interpersonal
interactions. Privacy is both a dynamic process and a non-monotonic function.
4 states of privacy:
1. Solitude: being free from observation by others.
2. Intimacy: a small group seclusion for members to achieve a close, relaxed, frank relationship.
3. Anonymity: freedom from identification and from surveillance in public places and for public acts.
4. Reserve: the desire to limit disclosures to others.
4 functions/purposes of privacy:
1. Personal autonomy: the desire to avoid being manipulated, dominated or exposed by others.
2. Emotional release: releasing the tension of social life (eg. role demands) and the management of losses and
of bodily functions.
3. Self-evaluation: integrating experience into meaningful patterns and exerting individuality on events.
4. Limited and protected communication:
Limited communication sets interpersonal boundaries
2
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Maaike274. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for $3.79. You're not tied to anything after your purchase.