Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Value-and Limits-of Distributive Justice in Information Privacy


Published on

Information privacy is rife with unanswered questions of distributive justice. Privacy at least contributes to achieving just distributions of social goods. Information flow models of privacy assume answers to questions about justice in acquisition and transfer that may be indefensible on their own or incompatible with each other. Rights approaches often assume rather than articulate a justification of privacy itself. And there are considerable implicit differences between the two in what is to be distributed. It should not be seen as practical to address questions of information privacy without considering these questions. But Young’s critique of the distributive paradigm reveals deeper problems with understanding the question of justice in information privacy. Information privacy is as much a matter of social structure as it is of distributing material or moral goods, and the focus on distribution obscures the ways in which information privacy violations challenge the ability to participate in determining one’s actions. These critiques suggest that a more productive line of inquiry would be to pursue information justice as a matter of primarily structural rather than distributive justice.

Published in: Technology
  • You can ask here for a help. They helped me a lot an i`m highly satisfied with quality of work done. I can promise you 100% un-plagiarized text and good experts there. Use with pleasure! ⇒ ⇐
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

The Value-and Limits-of Distributive Justice in Information Privacy

  1. 1. The Value—and Limits—of Distributive Justice in Information Privacy Digital Sociology Mini-conference Eastern Sociological Society March 19, 2016 JEFFREY ALAN JOHNSON INTERIM DIRECTOR INSTITUTIONAL EFFECTIVENESS & PLANNING UTAH VALLEY UNIVERSITY
  2. 2. Justice and Information Privacy @the_other_jeff “The findings and the theories that emerged have often relied on overlapping constructs nestled within loosely bounded nomological networks. This has resulted in a suboptimal cumulative contribution to knowledge.” (Smith, Dinev, & Xu 2011)
  3. 3. Justice and Information Privacy @the_other_jeff “The findings and the theories that emerged have often relied on overlapping constructs nestled within loosely bounded nomological networks. This has resulted in a suboptimal cumulative contribution to knowledge.” (Smith, Dinev, & Xu 2011) Privacy, however, is a concept in disarray. Nobody can articulate what it means. (Solove 2008)
  4. 4. Justice and Information Privacy @the_other_jeff The question behind this paper is whether we can bring coherence by viewing information privacy as a question of justice. David Schlosberg, for example, made important strides in environmental justice by taking the underlying theory of justice seriously. The underlying theory of justice is even more implicit in information privacy, and thus stands to gain even more from analysis.
  5. 5. Privacy as an Instrument of Justice @the_other_jeff “That social norm is just something that has evolved over time.” “Privacy as we knew it in the past is no longer feasible.” “I trade my privacy for the convenience.” Title IV or ADEA: Case law protections on information collection. ADA or GINA: Statutory protections but with exceptions for legitimate uses.
  6. 6. Privacy as an Instrument of Justice @the_other_jeff Privacy can be dead—it can be traded for convenience, abandoned because it is impractical, evolve out of existence—because it is not justice in itself; rather it simply contributes to the pursuit of justice in other areas. If information privacy is no longer feasible or has evolved out of existence, then one simply looks elsewhere for such protections—a belief that one’s own virtue upholds a system of perfect meritocracy, perhaps? But this does not undermine the value of privacy; e.g., the privacy of GitHub contributors clearly supports more equitable outcomes. We want to study this but we need more that just instrumental theories.
  7. 7. Most privacy theories protect privacy by controlling the flow of information to other parties, i.e., by distributing it. Information Privacy as a Distributive Question @the_other_jeff “Access to individually identifiable personal information” “The ability of the individual to protect information about himself “
  8. 8. Information Privacy as a Distributive Question @the_other_jeff If the purpose of privacy is to distribute information, then justice in information privacy must be to distribute it well. From the perspective of most theories of information privacy, then, privacy is a question of distributive justice. Hence if we can build a coherent theory of distributive justice in information then that would protect privacy.
  9. 9. Process- Oriented Distributive Justice @the_other_jeff “A distribution is just if it arises from another just distribution by legitimate means.” —Robert Nozick Justice in Original Acquisition Justice in Transfer Justice in Transfer (Rinse) Justice in Transfer (Repeat)
  10. 10. Consent in Process- Distributive Privacy @the_other_jeff Justice in transfer requires a more robust principle of consent than “caveat emptor.” Privacy Policies and Terms of Service Agreements
  11. 11. Consent in Process- Distributive Privacy @the_other_jeff The Apple iTunes Terms of Service (2015) agreement, for example, runs nearly 21,000 words, suggesting a reading time of between 98 and 136 minutes without accounting for the difficulty of the text. It has a Flesch-Kincaid Grade Level score of 16—a college graduate—and a Flesch Reading Ease score of 31.4, putting it above the reading comprehension level of the more than 70% of Americans without a bachelor’s degree.
  12. 12. Consent in Process- Distributive Privacy @the_other_jeff Justice in transfer requires a more robust principle of consent than “caveat emptor.” Privacy Policies and Terms of Service Agreements FERPA HIPAA Privacy Rule
  13. 13. Consent in Process- Distributive Privacy @the_other_jeff Process- distributive privacy requires a principle of justice in original acquisition. Educational Data Creation and Collection
  14. 14. Pattern- Oriented Distributive Justice @the_other_jeff A distribution is just if it conforms to a just pattern of distribution. 𝐷𝐼𝑆𝑇𝑗 ( 𝑑𝑖𝑟𝑒𝑐𝑡𝑙𝑦 𝑟𝑒𝑙𝑒𝑣𝑎𝑛𝑡 𝑒𝑡ℎ𝑖𝑐𝑎𝑙 𝑣𝑎𝑟𝑖𝑎𝑏𝑙𝑒𝑠 ) Rawls’ Difference Principle: 𝑚𝑎𝑥𝑖𝑚𝑖𝑛 ∈ 𝑠ℎ𝑎𝑟𝑒𝑠 𝑜𝑓 𝑠𝑜𝑐𝑖𝑎𝑙 𝑠𝑢𝑟𝑝𝑙𝑢𝑠
  15. 15. Pattern- Oriented Distributive Justice @the_other_jeff While process is important to some pattern theories of distributive justice, in those theories the process is usually instrumental to either reach or justify a particular pattern of distribution. Rawls’ original position and veil of ignorance are well-known procedural solutions to the problem of how to ensure that individuals choosing principles of justice will do so without regard for their own interests. But Rawls is clear that the original position is intended to justify a set of distributive principles.
  16. 16. Distributing Rights to Information Privacy @the_other_jeff Distributive “rights” are usually legally protected flow controls. HIPAA “gives you rights over your health information.” European Data Protection Directive
  17. 17. Distributing Rights to Information Privacy @the_other_jeff In order for information privacy rights to work distributively, you already need a theory of information privacy to operationalize and delineate, e.g., how to interpret Riley v. California beyond the search incident to arrest rule?
  18. 18. Distributing Rights vs. Distributing Information @the_other_jeff Process and Pattern suggest different solutions to privacy vs. open data challenge. Just transfer of a universal & inalienable right is trivial. Distributive justice for a non-scarce good that must be restricted is a novel problem.
  19. 19. Beyond Distributive Privacy @the_other_jeff Distributive justice misses the structural conditions of distribution Target operates (in) a political economy of information marked by inequality. Information is itself constituted by translation regimes.
  20. 20. Beyond Distributive Privacy @the_other_jeff Clearly, the exchange of information between consumers and suppliers is not equitable, as large corporations do not in the same transaction generally reveal to customers detailed information regarding their internal structure or operations. . . . [I]t is this very inequality in the relationship between consumers and suppliers of goods and services in the marketplace that compels individuals to provide personal information. The ability of the producer or supplier to set the terms of the contract that the consumer can only accept or decline defines the transaction as inherently inequitable. . . . The consumer is ultimately a “contract taker, rather than a contract maker,” and thus provides the information in the belief that it represents a reasonable transaction cost. . . . [I]ndividuals are not necessarily aware of the degree of inequalities in their relationship with suppliers because marketers and advertisers have effectively concealed the consumerist Panopticon. (Campbell and Carlson 2002, 591– 592)
  21. 21. Beyond Distributive Privacy @the_other_jeff Non-material goods are relations that shape action, not things. Greene, 2010: A person enjoys political obscurity when she can go about her day as she so chooses without others perceiving or otherwise determining the nature of her political views. The politically obscure person is able to control and manage the extent of disassociation from the political views she holds (or once held) or political actions taken in the present and in the past.
  22. 22. Beyond Distributive Privacy @the_other_jeff When Greene translates this concept into a right that can be distributed, the language of action, and in fact the actors involved, disappear. Rather than controlling and managing, the person simply “exist[s]”; the others actively trying to know and influence her political views become a passive, impersonal occurrence that happens to a person. A right that is possessed gives no consideration to what one might do with such a right; it is merely passed out and its recipients wished the best of luck.
  23. 23. Political obscurity therefore describes a broader right than anonymity: it is the fundamental right to exist without one's political preferences being continuously recorded and, consistent with the right articulated in Reporters Committee, a right against state-facilitated cataloguing of one's political preferences. Beyond Distributive Privacy @the_other_jeff Non-material goods are relations that shape action, not things. Greene, 2010:
  24. 24. Structural Privacy and Gamergate @the_other_jeff The problem in Gamergate is not unequal privacy but silencing and power. Anita Sarkeesian is everything wrong with the feminist woman, and she is going to die screaming like the craven little whore that she is if you let her come to USU. I will write my manifesto in her spilled blood, and you will all bear witness to what feminist lies and poison have done to the men of America.
  25. 25. Structural Privacy and Gamergate @the_other_jeff The threats directed toward Quinn, Wu, and Sarkeesian were not just insults meant to hurt their feelings. Gamergate depends critically on the structure of gender relations. It began when Quinn’s ex-boyfriend, in a lengthy diatribe, accused her of being sexually unfaithful, it peaked when someone still unidentified threatened to massacre “the craven little whore” who has poisoned the men of America. Doxing them was a threat intended to silence them and maintain a system of structural power that favors men, one that was, due to the legally enshrined hyper-masculine culture of Utah that treats carrying a gun as the sine qua non of manhood, successful in at least Sarkeesian’s case. These three women’s information privacy was violated not simply in that personal information was distributed improperly but because information about them was used as a tool of domination and oppression.
  26. 26. Toward Structural Information Justice @the_other_jeff What if the real (and much more difficult to document) harm befell those who did not—or would not—sign the petition? What if the harm in releasing petition names is not to activists being mooned or shouted at as they advocate publicly for their cause? What if the real privacy victim is a mother of two, passing a petition circulator entering the grocery store, fearful that signing a petition—even for a cause in which she very much believes—might create a lifelong indelible association with that cause on her Internet record? (Greene 2010)
  27. 27. Further Information @the_other_jeff Jeffrey Alan Johnson Interim Director, Institutional Effectiveness & Planning Utah Valley University @the_other_jeff Full paper available at