Locational privacy willingness – a framework

AUTHOR
Gonçalo Jorge Morais da Costa, Nuno Sotero Alves da Silva and Piotr Pawlak

ABSTRACT

During ETHICOMP 2008 the authors have proven that tourists’ locational privacy is a myth (Costa, Silva & Pawlak, 2008)! Hence, the aim of this manuscript is to shed some light over the lack of control of locational privacy, what is a desirable state of such, and a conceptual framework that allow citizens and governments to achieve a desirable condition.

Despite literature claim that a key feature of Web 2.0 is the ability of users to control their personal information O’Reilly (2005) through multiple applications (e.g. Norrie, 2008), the truth is that empirical evidences clearly demonstrate continuous violations to personal privacy (Brandimarte, Acquisti & Loewenstein, 2010) since informational existentialism reshapes Heidegger‘s concept of appropriation (being and time) (Costa & Silva, 2010). Considering that Web 2.0 applications are omnipresent in several recent technologies, as for instance iPad, iPhone, smartphones mobile phones, etc. it is feasible to claim that locational privacy is also at steak (e.g. Hill, 2011). Although is vital to address the concept of locational privacy, as well as its evolution.

According to Blumberg & Chase (2007) locational privacy is the ability of an individual to move in public space with the reasonable expectation that their location will not be systematically and secretly recorded for later use. Or, concerns the utilization of information with reference to an individual’s current location to grant additional relevant information and services to that individual, being a specific type of context-awareness (Duckham & Kulik, 2006). Bearing in mind again the complex interaction among global and local systems (stakeholders, technologies and regulations) emerges glocal privacy (Costa, Silva & Pawlak, 2008), which is consistent with Meyrowitz (2005) argument.

Eric Gordon (2009) claims that local information access is no longer restricted to the geographic location, due to the network configuration or distributed fluxes of information in spite of the undefeatable cultural barriers that glocality imposes; so, a desirable state of locational privacy must cluster peoples’ sharing willingness into categories (Olson, Grudin & Horvitz, 2005) even at a political level (Bellier & Wilson, 2000). The question is extremely difficult to answer unequivocally, because the ratio between center and locality is differently understood over the nations (Bomberg, Peterson & Stubb, 2008). However certain common values can be observed, accepted by most of societies, setting out a framework of privacy for both individuals and local communities.

In order to present a conceptual framework the authors will first draw their attention to the work of Pedersen (1999). Pedersen presents a consolidated model for the attainment of five privacy needs for each of the six types of privacy (figure 1).
Social_Impact_of_Social_fig1
Figure 1. Diagram of the types of privacy by privacy functions

The five privacy functions were autonomy, confiding, rejuvenation, contemplation, and creativity. In accordance with the model the users’ profiles describe six types of privacy (solitude, reserve, isolation, intimacy with family, anonymity, intimacy with friends). Both dimensions of the matrix will be under scrutiny into the light of web 2.0 applications and locational privacy as a way to develop a novel conceptual framework.

REFERENCES

Bellier I., & Wilson T. M. (2000). An anthropology of the European Union: Building, imagining and experiencing the new Europe. Oxford: Berg Publishers.

Blumberg, A., & Chase, (2007). Electronic tolling and locational privacy: How to make ez-pass preserve locational privacy. Online at http://math.stanford.edu/~blumberg/traffic/secureEZ.pdf (accessed 02 February 2011).

Bomberg E., Peterson J., & Stubb A. (2008). The European Union: How does it work. New York, NY: Oxford University Press.

Brandimarte, L., Acquisti, A., & Loewenstein, G. (2010, June). Misplaced confidences: Privacy and the control paradox. Paper presented at the Ninth Annual Workshop on the Economics of Information Security, Cambridge, MA.

Costa, G. J. M., & Silva, N. S. A. (2010). Informational existentialism! Will information ethics shape our cultures, International Review of Information Ethics, 13, 33-41.

Costa, G. J. M., Silva, N. S. A., & Pawlak, Piotr (2010). Network tourism: a fallacy of location privacy! In M. Arias-Oliva et al. (Eds.), ETHICOMP 2010 (pp. 93-102). Tarragona. Spain.

Duckham, M., & Kulik, L. (2006). Location privacy and location-aware computing. In J. Drummond et al. (Eds.), Dynamic & Mobile GIS: Investigating Change in Space and Time (pp. 34-51). Boca Rator, FL: CRC Press.

Gordon, E. (2009). Redefining the local: The distinction between located information and local knowledge in location-based games. In A. S. Silva & D. M. Sutko (Eds.), Digital Cityscapes: Merging Digital and Urban Playspaces (pp. 21-36). New York, NY: Peter Lang Publishing.

Hill, K. (2011). Why your cell phone is more private in Ohio than in California. Online at http://blogs.forbes.com/kashmirhill/2011/01/04/why-your-cell-phone-is-more-private-in-ohio-than-in-california/ (accessed 04 February 2011).

Meyrowitz, J. (2005). The rise of glocality: New sense of place and identity in the global village. In K. Nyíri (Ed.), A Sense of Place: The Global and the Local in Mobile Communication (pp. 21-30). Vienna: Passagen Verlag.

Norrie, M. C. (2008). PIM meets web 2.0, Lecture Notes in Computer Science, 5231, 15-25.

O’Reilly, T. (2005). What is web 2.0- Design patterns and business models for the next generation of software. Online at http://oreilly.com/web2/archive/what-is-web-20.html (accessed 04 February 2011).

Olson, J., Grudin, J., & Horvitz, E. (2005). Toward understanding preferences for sharing and privacy. In G. Veer & C. Gale (Eds.), Conference on Human Factors in Computing Systems (pp. 1985-1988). Portland, OR: ACM.

Pedersen, D. M. (1999). Model for types of privacy by privacy functions, Journal of Environmental Psychology, 19(4), 397-405.

Comments are closed.