The Private Life in a Digital World
Index
L. McCreary (2008) What was Privacy?...........................................................................................................................2
Video: N. Leone (2020) ‘I have nothing to hide’ Data Privacy in 2020.............................................................................2
S. Margulis (2011) Three Theories of Privacy: An Overview. Chapter 2............................................................................2
Trepte, S. (2021) The Social Media Privacy Model: Privacy and Communication in the Light of Social Media
Affordances.....................................................................................................................................................................4
Video: How Social Media Can Cost Someone Their Job...................................................................................................6
Harcourt, B. (2014) Exposed. The Expository Society.......................................................................................................6
Shahin, S. (2022) West India Company: The Rise of New Imperialists in Digital World....................................................6
Video: Age of Surveillance Capitalism: ‘We Thought We Were Searching Google, But Google Was Searching Us’.........6
Marwick & boyd (2014) Networked privacy: How teenagers negotiate context in social media.....................................6
Video: TikTok Is Spying on You.........................................................................................................................................6
Arora & Scheiber (2017) Slumdog romance: Facebook love and digital privacy at the margins......................................7
Video: Data Protection in Africa......................................................................................................................................7
Fritz & Gonzales (2018) Not the Normal Trans Story: Negotiating Trans Narratives While Crowdfunding at the
Margins...........................................................................................................................................................................8
Video: How Gay Dating Apps Are Being Abused & Used for Entrapment Around The World..........................................8
Baker-White (2022) Nothing Sacred: These Apps Reserve The Right To Sell Your Prayers. Buzzfeed...............................8
Video: US Supreme Court to hear FBI mosque surveillance case.....................................................................................9
Brownlie (2018) Looking out for each other online: Digital outreach, emotional surveillance and safe(r) spaces...........9
Video: Can coronavirus tracking apps protect data privacy?...........................................................................................9
Internet Research: Ethical Guidelines 3.0........................................................................................................................9
Academy/Industry partnership and corporate data: Ethical considerations..................................................................10
Shahin & Zheng (2020) Big Data and the Illusion of Choice: Comparing the Evolution of India’s Aadhaar and China’s
Social Credit System as Technosocial Discourses............................................................................................................10
Zaeem & Barber (2020) The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise....................11
Video: GDPR explained: How the new data protection act could change your life........................................................12
, L. McCreary (2008) What was Privacy?
Most answers to the question ‘what is privacy?’ begin with the individual.
Privacy = partly a form of self-possession – custody of the facts of one’s life – unless we decide otherwise. Everything
we know about ourselves and wish to control.
What was privacy?
People could once feel confident that what others might find out about them would be treated with reasonable care
and consideration and thus would probably do them no harm. But they can no longer feel confident.
Information Information
privacy exploitation
The intersection of private lives and public spaces brings to the fore a second version of privacy = a feature of the
social contract – one that every culture has negotiated for itself over time in order to preserve dignity, civility and
cohesion.
Attitudes towards privacy are shifting, abetted by new technologies that generate new threats to privacy and new
forms of online self-exposure that appear to disregard them.
Video: N. Leone (2020) ‘I have nothing to hide’ Data Privacy in
2020
Growth hacking = the art of growing a company as fast as possible with very little budget through combining data
and rapid experimentation to get to understand the behavior of users.
S. Margulis (2011) Three Theories of Privacy: An Overview.
Chapter 2
Westin’s theory
Westin’s theory of privacy addresses how people protect themselves by temporarily limiting access of others to
themselves.
Privacy (Westin) = the claim of individuals, groups, or institutions to determine for themselves when, how, and to
what extent information about them is communicated to others. Privacy is the voluntary and temporary withdrawal
of a person from the general society through physical or psychological means.
Westin proposes that people need privacy. Privacy helps us to adjust emotionally to day-to-day interpersonal
interactions. Privacy is both a dynamic process and a non-monotonic function.
4 states of privacy:
1. Solitude: being free from observation by others.
2. Intimacy: a small group seclusion for members to achieve a close, relaxed, frank relationship.
3. Anonymity: freedom from identification and from surveillance in public places and for public acts.
4. Reserve: the desire to limit disclosures to others.
4 functions/purposes of privacy:
1. Personal autonomy: the desire to avoid being manipulated, dominated or exposed by others.
2. Emotional release: releasing the tension of social life (eg. role demands) and the management of losses and
of bodily functions.
3. Self-evaluation: integrating experience into meaningful patterns and exerting individuality on events.
4. Limited and protected communication:
Limited communication sets interpersonal boundaries
2
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Maaike274. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €3,49. Je zit daarna nergens aan vast.