You are on page 1of 27

“You have zero privacy anyway. Get over it.


Scott McNealy
Founder and Chairman of SUN Microsystems

Who’s watching you?
The STS View of the Changing Landscape of the
Institution of Privacy

Ricky Yean
David Tran
November 20, 2008
1
Overview
Definition

How We Got Here

IDUAR of Internet on Privacy

9/11

Social Networks

Summary

2
Privacy: A societal
institution
"Each individual is continually engaged in a personal adjustment
process in which he balances the desire for privacy with the desire
for disclosure and communication of himself to others, in light of
the environmental conditions and social norms set by the society in
which he lives." – Alan Westin, Privacy and Freedom, 1968

Required? Sacrifice?

3
How we got here:

4
How we got here:

4
How we got here:

4
I
D
U
A
R

5
I
D Innovation: Creation of
internet protocols and

U world wide web

Applications such as E-
A Mail

R Enables faster access
to and sharing of
information

But who has access to
this information?

5
I
D
U
A
R

6
I “The decision to make the Web an open system was necessary for it to be
universal. You can't propose that something be a universal space and at

D the same time keep control of it.” -Tim Berners-Lee, Father of WWW

Number of Internet Hosts
U Gov’t transferred
control of
A internet access to
public ISPs in
R 1989

6
I “The decision to make the Web an open system was necessary for it to be
universal. You can't propose that something be a universal space and at

D the same time keep control of it.” -Tim Berners-Lee, Father of WWW

U Gov’t transferred
control of
A internet access to
public ISPs in
R 1989

6
I
D
U
A
R

7
I Consumers
D
U
Government
A
R
Businesses

7
I
D
U
A
R

8
Convenient and
I streamlined access to
everyday tasks and

D information

U
Low prerequisites
A User-friendly
R interfaces

Takes little or no
thought (esp. to
privacy)

8
I
D
U
A
R

9
I “ACLU Asks FCC to Scrutinize
ISP Surveillance of Customers’
D Internet Habits”

U “EFF is suing AT&T for it's
participation in the Bush
A administration's massive
and illegal warrantless

R “We may be legally compelled in the
future to disclose personally identifiable
wiretapping. “
information about you ... [But] We will use
reasonable and lawful efforts to limit
the scope of any such legally required
disclosure, and we will make every
attempt to notify you in advance insofar as
we are legally permitted to do so. “

9
Watershed Moment: 9/11
Leading Up to 9/11:

FTC statues and lawsuits

9/11 Changes SCES: National
security before personal
privacy

Homeland Security Act:
“Cyber Security
Enhancement”

DARPA: Total Information
Awareness

10
Watershed Moment: 9/11
Leading Up to 9/11:

FTC statues and lawsuits

9/11 Changes SCES: National
security before personal
privacy

Homeland Security Act:
“Cyber Security
Enhancement”

DARPA: Total Information
Awareness

10
Watershed Moment: 9/11
Leading Up to 9/11:

FTC statues and lawsuits

9/11 Changes SCES: National
security before personal
privacy

Homeland Security Act:
“Cyber Security
Enhancement”

DARPA: Total Information
Awareness

10
Watershed Moment: 9/11
Leading Up to 9/11:

FTC statues and lawsuits

9/11 Changes SCES: National
security before personal
privacy

Homeland Security Act:
“Cyber Security
Enhancement”

DARPA: Total Information
Awareness

10
Case Study: Social Networks

11
Online Teens

Have online Profiles
Do not have online profiles

Contacted by stranger
Never contacted by stranger

12
Summary: Future Trends in Online
Privacy and Implications

Open Standards

Ultimately, people must be aware of what information
they are divulging and understand the implications of
new technology and policies on their private
information.

13
McKay, S. “The Evolution of Online Privacy: 2000-2003”. Journal of Legal, Ethical, and Regulatory Issues, Volume 6,
Number 2, 2003.

Lenhart, A. , Madden, M. “Teens, Privacy, & Online Social Networks”. PEW Internet & American Life Project.

“Effect of the USA Patriot Act on Internet Privacy”. http://cyber.law.harvard.edu/privacy/Introduction%20to
%20Module%20V.htm

“History of Communications”. http://www.fcc.gov/omd/history/internet/common-standards.html”

Westin, Alan, Privacy and Freedom.

“Homeland Security Act of 2002”. http:/”P/www.whitehouse.gov/deptofhomeland/bill/

“EPIC Terrorism (Total) Information Awareness Page”. http://epic.org/privacy/profiling/tia/

“Privacy”. Stanford Encyclopedia of Philosophy. http://plato.stanford.edu/entries/privacy/

“Tim Berners-Lee”. http://www.w3.org/People/Berners-Lee/

“Federal Trade Commision”. http://www.ftc.gov/foia/privacy_act.shtm

“Sun on Privacy: Get Over It”. http://www.wired.com/politics/law/news/1999/01/17538

14
Images Used

http://www.crunchgear.com/wp-content/uploads/2008/08/usenet.gif

http://www.uvsc.edu/email/images/email-at1.gif

http://www.sortedsites.com/images/w3c-big.jpg

http://www.booktelevision.com/thewordthisweek/images/tabloids.jpg

http://upload.wikimedia.org/wikipedia/en/thumb/f/f9/DoubleClick_logo.svg/304px-DoubleClick_logo.svg.png

http://www.bu.edu/eng/news-cms/photos/Darpa_logo.jpg

http://www.meganboler.net/wp-content/uploads/2008/08/bush-as-uncle-sam-unwarranted-wiretap-730567.jpg

http://www.thomevincent.com/blog/images/web20/web20.jpg

http://imagecache2.allposters.com/images/pic/EPH/7827~The-Patriot-Act-Posters.jpg

http://www.fcc.gov/omd/history/internet/images/mci-mail.jpg

http://content.answers.com/main/content/wp/en/f/fa/Logo_cs40.gif

http://gothamist.com/attachments/nyc_toby/Wragge_Lane.jpg

http://www.top-tread-tyres.co.http://sourcenotes.files.wordpress.com/2008/07/facebook-logo.jpguk/images/email%20icon.gif

http://images.celebrities.com/d/DBeckhamAndSonS998.jpg

http://farm4.static.flickr.com/3250/2418014918_5f6439a7b8.jpg?v=0

15
Appendix A: User Data on Social Networks

Public Data No Data
Private Data

16