Is privacy privacy?

被引:30
|
作者
Nissim, Kobbi [1 ]
Wood, Alexandra [2 ]
机构
[1] Georgetown Univ, Dept Comp Sci, Washington, DC 20057 USA
[2] Harvard Univ, Berkman Klein Ctr Internet & Soc, Cambridge, MA 02138 USA
关键词
informational privacy; privacy law; formal privacy models; differential privacy;
D O I
10.1098/rsta.2017.0358
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This position paper observes how different technical and normative conceptions of privacy have evolved in parallel and describes the practical challenges that these divergent approaches pose. Notably, past technologies relied on intuitive, heuristic understandings of privacy that have since been shown not to satisfy expectations for privacy protection. With computations ubiquitously integrated in almost every aspect of our lives, it is increasingly important to ensure that privacy technologies provide protection that is in line with relevant social norms and normative expectations. Similarly, it is also important to examine social norms and normative expectations with respect to the evolving scientific study of privacy. To this end, we argue for a rigorous analysis of the mapping from normative to technical concepts of privacy and vice versa. We review the landscape of normative and technical definitions of privacy and discuss specific examples of gaps between definitions that are relevant in the context of privacy in statistical computation. We then identify opportunities for overcoming their differences in the design of new approaches to protecting privacy in accordance with both technical and normative standards. This article is part of a discussion meeting issue 'The growing ubiquity of algorithms in society: implications, impacts and innovations'.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] PRIVACY AND THE RIGHT TO PRIVACY
    MCCLOSKEY, HJ
    [J]. PHILOSOPHY, 1980, 55 (211) : 17 - 38
  • [2] Amplifying Privacy in Privacy Amplification
    Aggarwal, Divesh
    Dodis, Yevgeniy
    Jafargholi, Zahra
    Miles, Eric
    Reyzin, Leonid
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 183 - 198
  • [3] Disaster privacy/privacy disaster
    Sanfilippo, Madelyn R.
    Shvartzshnaider, Yan
    Reyes, Irwin
    Nissenbaum, Helen
    Egelman, Serge
    [J]. JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, 2020, 71 (09) : 1002 - 1014
  • [4] Privacy without the right to privacy
    Anderson, Scott A.
    [J]. MONIST, 2008, 91 (01): : 81 - 107
  • [5] PERSONAL PRIVACY IS ABSOLUTE PRIVACY
    不详
    [J]. NATURE, 1981, 290 (5805) : 349 - 349
  • [6] Privacy Law: Biometrics and privacy
    Grijpink, Jan
    [J]. 2001, Elsevier Ltd (17):
  • [7] Privacy-Privacy Tradeoffs
    Pozen, David E.
    [J]. UNIVERSITY OF CHICAGO LAW REVIEW, 2016, 83 (01): : 221 - 247
  • [8] δ-privacy: Bounding Privacy Leaks in Privacy Preserving Data Mining
    Li, Zhizhou
    Lai, Ten H.
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 124 - 142
  • [9] Which Privacy Policy Works, Privacy Assurance or Personalization Declaration? An Investigation of Privacy Policies and Privacy Concerns
    Fue Zeng
    Qing Ye
    Zhilin Yang
    Jing Li
    Yiping Amy Song
    [J]. Journal of Business Ethics, 2022, 176 : 781 - 798
  • [10] Security and Privacy: Why Privacy Matters
    Bird, Stephanie J.
    [J]. SCIENCE AND ENGINEERING ETHICS, 2013, 19 (03) : 669 - 671