Your SlideShare is downloading. ×
Privacy, Data Protection and SNS
Privacy, Data Protection and SNS
Privacy, Data Protection and SNS
Privacy, Data Protection and SNS
Privacy, Data Protection and SNS
Privacy, Data Protection and SNS
Privacy, Data Protection and SNS
Privacy, Data Protection and SNS
Privacy, Data Protection and SNS
Privacy, Data Protection and SNS
Privacy, Data Protection and SNS
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Privacy, Data Protection and SNS

2,060

Published on

Exploding personal data and a troubled conceptualization of privacy have made informational privacy a recurrent, messy and real problem. Van den Hoven presents a new conceptualization for privacy that …

Exploding personal data and a troubled conceptualization of privacy have made informational privacy a recurrent, messy and real problem. Van den Hoven presents a new conceptualization for privacy that is more adequate at addressing these problems.
www.privacyinsocialnetworksites.nl

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,060
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
61
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Privacy, Data Protection and SNS
      • Prof. dr. Jeroen van den Hoven
      • Scientific Director 3TU Centre Ethics and Technology
      • Professor Delft University of Technology
      • Professorial Fellow Australian National University
  • 2. EXPLODING Personal Data
    • EMPLOYEE MONITORING
    • INTERNET SEARCH BEHAVIOR
    • TELECOMMUNICATION
    • VEHICLE REGISTRATION SYSTEMS
    • INTERNET OF THINGS
    • PAYMENTS
    • CCTV IN PUBLIC PLACES
    • SOCIAL SECURITY
    • HOMELAND SECURITY
    • POPULATION REGISTRATION
    • SNS
    • AMBIENT ASSISTED LIVING
    • PROFILES
    • COOKIES
    • KNOWLEDGE DISCOVERY IN DATA BASES
    • RFID
  • 3. Privacy
    • Consider an empty restaurant
    • Consider a successful SNS
    • Informational (tort privacy)
    • Decisional (constitutional)
    • What is personal data?
      • Referential (identity based)
      • Attributive (attribute based)
  • 4. Privacy
    • A) recurrent problem (explain)
    • B) messy problem (clear up)
    • C) real problem (understand)
  • 5. A. Data greed explained Commodity Prisoners’ Dilemmas; Principal- Agent Public goods Free-riders Negative reasons Customer relations pro-active service Positive reasons Market Government Accumulation of Personal data
  • 6. B. Mess: Privacy Accounts
    • Scarcity Account
    • Moral self-ownership
    • Autonomy
    • Personal sphere/zone
    • Property
    • Human dignity
    • Utilitarian
  • 7. C. Problem
    • liberalist &. communitarians divided over
    • conception of the liberal self:
    • “unencumbered, punctual, un-situated”
    • individual rights, privacy, autonomy
    • community/corporation needs: information, surveillance, monitoring
  • 8. Normative principles of DATA PROTECTION (EU 95 Directive)
    • notification
    • participation
    • purpose specification
    • use limitation
    • security
    • accuracy
    • accountability
    • informed consent (Central Principle of Data Protection)
  • 9. Conceptualizing “privacy”
    • privacy (USA) vs. data-protection (EU)
    • reconstruction in terms of moral reasons for data-protection
    • Why establish data-protection regimes, norms, habits which put autonomy/informed consent and other constraints (95 Dir) center stage?
  • 10. Moral grounds for data-protection
    • 1. Preventing harm
    • 2. Establishing transparency, fairness and equality of opportunity/arms in market for personal data
    • 3.Respecting Informational Justice: Separation of spheres of access (Walzer)
    • 4.Respecting Moral autonomy
  • 11. Importance of Design
    • Privacy by Design
    • Privacy Enhancing Technology (PET)
    • Business Process Redesign (BPR)
    • Specified in the form of:
    • Deontic constraints on information relations, information actions, implemented in software and architectures

×