SlideShare a Scribd company logo
1 of 27
The Value—and Limits—of
Distributive Justice in
Information Privacy
Digital Sociology Mini-conference
Eastern Sociological Society
March 19, 2016
JEFFREY ALAN JOHNSON
INTERIM DIRECTOR
INSTITUTIONAL EFFECTIVENESS & PLANNING
UTAH VALLEY UNIVERSITY
Justice and
Information
Privacy
@the_other_jeff
“The findings and the
theories that emerged
have often relied on
overlapping constructs
nestled within loosely
bounded nomological
networks. This has
resulted in a
suboptimal cumulative
contribution to
knowledge.”
(Smith, Dinev, & Xu
2011)
Justice and
Information
Privacy
@the_other_jeff
“The findings and the
theories that emerged
have often relied on
overlapping constructs
nestled within loosely
bounded nomological
networks. This has
resulted in a
suboptimal cumulative
contribution to
knowledge.”
(Smith, Dinev, & Xu
2011)
Privacy, however,
is a concept in
disarray. Nobody
can articulate
what it means.
(Solove 2008)
Justice and
Information
Privacy
@the_other_jeff
The question behind this paper is
whether we can bring coherence by
viewing information privacy as a
question of justice. David Schlosberg,
for example, made important strides in
environmental justice by taking the
underlying theory of justice seriously.
The underlying theory of justice is even
more implicit in information privacy, and
thus stands to gain even more from
analysis.
Privacy as
an
Instrument
of Justice
@the_other_jeff
“That social norm is
just something that
has evolved over
time.”
“Privacy as we knew it
in the past is no longer
feasible.”
“I trade my privacy for
the convenience.”
Title IV or ADEA: Case
law protections on
information collection.
ADA or GINA:
Statutory protections
but with exceptions for
legitimate uses.
Privacy as
an
Instrument
of Justice
@the_other_jeff
Privacy can be dead—it can be traded for
convenience, abandoned because it is impractical,
evolve out of existence—because it is not justice in
itself; rather it simply contributes to the pursuit of
justice in other areas. If information privacy is no
longer feasible or has evolved out of existence, then
one simply looks elsewhere for such protections—a
belief that one’s own virtue upholds a system of
perfect meritocracy, perhaps? But this does not
undermine the value of privacy; e.g., the privacy of
GitHub contributors clearly supports more equitable
outcomes. We want to study this but we need more
that just instrumental theories.
Most privacy theories
protect privacy by
controlling the flow
of information to
other parties, i.e.,
by distributing it.
Information
Privacy as a
Distributive
Question
@the_other_jeff
“Access to individually
identifiable personal
information”
“The ability of the
individual to protect
information about
himself “
Information
Privacy as a
Distributive
Question
@the_other_jeff
If the purpose of privacy is to distribute
information, then justice in information
privacy must be to distribute it well.
From the perspective of most theories
of information privacy, then, privacy is a
question of distributive justice. Hence if
we can build a coherent theory of
distributive justice in information then
that would protect privacy.
Process-
Oriented
Distributive
Justice
@the_other_jeff
“A distribution
is just if it
arises from
another just
distribution by
legitimate
means.”
—Robert
Nozick
Justice in Original
Acquisition
Justice in Transfer
Justice in Transfer
(Rinse)
Justice in Transfer
(Repeat)
Consent in
Process-
Distributive
Privacy
@the_other_jeff
Justice in
transfer
requires a
more
robust
principle of
consent
than “caveat
emptor.”
Privacy Policies and
Terms of Service
Agreements
Consent in
Process-
Distributive
Privacy
@the_other_jeff
The Apple iTunes Terms of Service (2015)
agreement, for example, runs nearly 21,000 words,
suggesting a reading time of between 98 and 136
minutes without accounting for the difficulty of the
text. It has a Flesch-Kincaid Grade Level score of
16—a college graduate—and a Flesch Reading
Ease score of 31.4, putting it above the reading
comprehension level of the more than 70% of
Americans without a bachelor’s degree.
Consent in
Process-
Distributive
Privacy
@the_other_jeff
Justice in
transfer
requires a
more
robust
principle of
consent
than “caveat
emptor.”
Privacy Policies and
Terms of Service
Agreements
FERPA
HIPAA Privacy Rule
Consent in
Process-
Distributive
Privacy
@the_other_jeff
Process-
distributive
privacy
requires a
principle of
justice in
original
acquisition.
Educational Data
Creation and
Collection
Pattern-
Oriented
Distributive
Justice
@the_other_jeff
A distribution is just if
it conforms to a just
pattern of distribution.
𝐷𝐼𝑆𝑇𝑗 ( 𝑑𝑖𝑟𝑒𝑐𝑡𝑙𝑦 𝑟𝑒𝑙𝑒𝑣𝑎𝑛𝑡 𝑒𝑡ℎ𝑖𝑐𝑎𝑙 𝑣𝑎𝑟𝑖𝑎𝑏𝑙𝑒𝑠 )
Rawls’ Difference Principle:
𝑚𝑎𝑥𝑖𝑚𝑖𝑛 ∈ 𝑠ℎ𝑎𝑟𝑒𝑠 𝑜𝑓 𝑠𝑜𝑐𝑖𝑎𝑙 𝑠𝑢𝑟𝑝𝑙𝑢𝑠
Pattern-
Oriented
Distributive
Justice
@the_other_jeff
While process is important to some pattern
theories of distributive justice, in those theories
the process is usually instrumental to either
reach or justify a particular pattern of
distribution. Rawls’ original position and veil of
ignorance are well-known procedural solutions
to the problem of how to ensure that
individuals choosing principles of justice will do
so without regard for their own interests. But
Rawls is clear that the original position is
intended to justify a set of distributive
principles.
Distributing
Rights to
Information
Privacy
@the_other_jeff
Distributive
“rights” are
usually legally
protected flow
controls.
HIPAA “gives you
rights over your health
information.”
European Data
Protection Directive
Distributing
Rights to
Information
Privacy
@the_other_jeff
In order for information privacy rights to
work distributively, you already need a
theory of information privacy to
operationalize and delineate, e.g., how
to interpret Riley v. California beyond
the search incident to arrest rule?
Distributing
Rights vs.
Distributing
Information
@the_other_jeff
Process and
Pattern suggest
different
solutions to
privacy vs.
open data
challenge.
Just transfer of a
universal & inalienable
right is trivial.
Distributive justice for
a non-scarce good
that must be restricted
is a novel problem.
Beyond
Distributive
Privacy
@the_other_jeff
Distributive
justice misses
the structural
conditions of
distribution
Target operates (in) a
political economy of
information marked by
inequality.
Information is itself
constituted by
translation regimes.
Beyond
Distributive
Privacy
@the_other_jeff
Clearly, the exchange of information between consumers
and suppliers is not equitable, as large corporations do not in
the same transaction generally reveal to customers detailed
information regarding their internal structure or operations. . .
. [I]t is this very inequality in the relationship between
consumers and suppliers of goods and services in the
marketplace that compels individuals to provide personal
information. The ability of the producer or supplier to set the
terms of the contract that the consumer can only accept or
decline defines the transaction as inherently inequitable. . . .
The consumer is ultimately a “contract taker, rather than a
contract maker,” and thus provides the information in the
belief that it represents a reasonable transaction cost. . . .
[I]ndividuals are not necessarily aware of the degree of
inequalities in their relationship with suppliers because
marketers and advertisers have effectively concealed the
consumerist Panopticon. (Campbell and Carlson 2002, 591–
592)
Beyond
Distributive
Privacy
@the_other_jeff
Non-material goods are relations
that shape action, not things.
Greene, 2010:
A person enjoys political obscurity when she can
go about her day as she so chooses without
others perceiving or otherwise determining the
nature of her political views. The politically
obscure person is able to control and manage
the extent of disassociation from the political
views she holds (or once held) or political
actions taken in the present and in the past.
Beyond
Distributive
Privacy
@the_other_jeff
When Greene translates this concept into a right
that can be distributed, the language of action,
and in fact the actors involved, disappear.
Rather than controlling and managing, the
person simply “exist[s]”; the others actively trying
to know and influence her political views become
a passive, impersonal occurrence that happens
to a person. A right that is possessed gives no
consideration to what one might do with such a
right; it is merely passed out and its recipients
wished the best of luck.
Political obscurity therefore describes a broader right
than anonymity: it is the fundamental right to exist
without one's political preferences being
continuously recorded and, consistent with the right
articulated in Reporters Committee, a right against
state-facilitated cataloguing of one's political
preferences.
Beyond
Distributive
Privacy
@the_other_jeff
Non-material goods are relations
that shape action, not things.
Greene, 2010:
Structural
Privacy and
Gamergate
@the_other_jeff
The problem
in Gamergate
is not unequal
privacy but
silencing and
power.
Anita Sarkeesian is
everything wrong with the
feminist woman, and she is
going to die screaming like
the craven little whore that
she is if you let her come to
USU. I will write my
manifesto in her spilled
blood, and you will all bear
witness to what feminist lies
and poison have done to the
men of America.
Structural
Privacy and
Gamergate
@the_other_jeff
The threats directed toward Quinn, Wu, and Sarkeesian
were not just insults meant to hurt their feelings.
Gamergate depends critically on the structure of gender
relations. It began when Quinn’s ex-boyfriend, in a
lengthy diatribe, accused her of being sexually
unfaithful, it peaked when someone still unidentified
threatened to massacre “the craven little whore” who
has poisoned the men of America. Doxing them was a
threat intended to silence them and maintain a system
of structural power that favors men, one that was, due
to the legally enshrined hyper-masculine culture of Utah
that treats carrying a gun as the sine qua non of
manhood, successful in at least Sarkeesian’s case.
These three women’s information privacy was violated
not simply in that personal information was distributed
improperly but because information about them was
used as a tool of domination and oppression.
Toward
Structural
Information
Justice
@the_other_jeff
What if the real (and much more difficult to
document) harm befell those who did not—or
would not—sign the petition? What if the harm in
releasing petition names is not to activists being
mooned or shouted at as they advocate publicly
for their cause? What if the real privacy victim is
a mother of two, passing a petition circulator
entering the grocery store, fearful that signing a
petition—even for a cause in which she very
much believes—might create a lifelong indelible
association with that cause on her Internet
record? (Greene 2010)
Further
Information
@the_other_jeff
Jeffrey Alan Johnson
Interim Director,
Institutional Effectiveness & Planning
Utah Valley University
jeffrey.johnson@uvu.edu
@the_other_jeff
Full paper available at
http://ssrn.com/abstract=2747177

More Related Content

What's hot (20)

Social justice report in ethics
Social justice report in ethicsSocial justice report in ethics
Social justice report in ethics
 
Theories of Justice (John Rawls and Amartya Sen)
Theories of Justice (John Rawls and Amartya Sen)Theories of Justice (John Rawls and Amartya Sen)
Theories of Justice (John Rawls and Amartya Sen)
 
What is Justice
What is JusticeWhat is Justice
What is Justice
 
John rawls
John rawlsJohn rawls
John rawls
 
Justice
JusticeJustice
Justice
 
John rawls
John rawlsJohn rawls
John rawls
 
Theory of justice
Theory of justiceTheory of justice
Theory of justice
 
Global distributive justice
Global distributive justiceGlobal distributive justice
Global distributive justice
 
Theories of justice
Theories of justiceTheories of justice
Theories of justice
 
John rawls
John rawlsJohn rawls
John rawls
 
Egalitarianism
EgalitarianismEgalitarianism
Egalitarianism
 
Theory of justice
Theory of justiceTheory of justice
Theory of justice
 
G6 rawlsi
G6 rawlsiG6 rawlsi
G6 rawlsi
 
Anarchy, state, and utopia
Anarchy, state, and utopiaAnarchy, state, and utopia
Anarchy, state, and utopia
 
Theories of justice
Theories of justiceTheories of justice
Theories of justice
 
A critique of john rawls’ social justice theory and the fate of nigeria’s pol...
A critique of john rawls’ social justice theory and the fate of nigeria’s pol...A critique of john rawls’ social justice theory and the fate of nigeria’s pol...
A critique of john rawls’ social justice theory and the fate of nigeria’s pol...
 
Business ethics
Business ethicsBusiness ethics
Business ethics
 
John rawls power point update
John rawls power point updateJohn rawls power point update
John rawls power point update
 
Justice
JusticeJustice
Justice
 
THE CHAIN IS AS STRONG AS ITS WEAKEST LINK
THE CHAIN IS AS STRONG AS ITS WEAKEST LINKTHE CHAIN IS AS STRONG AS ITS WEAKEST LINK
THE CHAIN IS AS STRONG AS ITS WEAKEST LINK
 

Viewers also liked

Organizational justice ppt
Organizational justice pptOrganizational justice ppt
Organizational justice pptMaheen Tahir
 
CHAPTER 2 (ETHICAL PRINCIPLES IN BUSINESS)
CHAPTER 2 (ETHICAL PRINCIPLES IN BUSINESS)CHAPTER 2 (ETHICAL PRINCIPLES IN BUSINESS)
CHAPTER 2 (ETHICAL PRINCIPLES IN BUSINESS)Nandjebo Phellep
 
Organizational Citizenship Behavior
Organizational Citizenship BehaviorOrganizational Citizenship Behavior
Organizational Citizenship BehaviorSharath g
 

Viewers also liked (6)

Is it harder to publish academic books in the digital age?
Is it harder to publish academic books in the digital age?Is it harder to publish academic books in the digital age?
Is it harder to publish academic books in the digital age?
 
Organizational justice ppt
Organizational justice pptOrganizational justice ppt
Organizational justice ppt
 
Organizational justice
Organizational justiceOrganizational justice
Organizational justice
 
CHAPTER 2 (ETHICAL PRINCIPLES IN BUSINESS)
CHAPTER 2 (ETHICAL PRINCIPLES IN BUSINESS)CHAPTER 2 (ETHICAL PRINCIPLES IN BUSINESS)
CHAPTER 2 (ETHICAL PRINCIPLES IN BUSINESS)
 
chapter02
 chapter02 chapter02
chapter02
 
Organizational Citizenship Behavior
Organizational Citizenship BehaviorOrganizational Citizenship Behavior
Organizational Citizenship Behavior
 

Similar to The Value-and Limits-of Distributive Justice in Information Privacy

Write about Distribution Network Configuration and Inventory Contr.docx
Write about Distribution Network Configuration and Inventory Contr.docxWrite about Distribution Network Configuration and Inventory Contr.docx
Write about Distribution Network Configuration and Inventory Contr.docxericbrooks84875
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.Paolo Cirio
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 
Censorship and Privacy
Censorship and Privacy Censorship and Privacy
Censorship and Privacy Daniel Appiah
 
The Ethics of Dataveillance
The Ethics of DataveillanceThe Ethics of Dataveillance
The Ethics of DataveillanceFairSay
 
Ch 7 Privacy
Ch 7 PrivacyCh 7 Privacy
Ch 7 PrivacyProEthics
 
Argument And Persuasion Essay Topics
Argument And Persuasion Essay TopicsArgument And Persuasion Essay Topics
Argument And Persuasion Essay TopicsStephanie Watson
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_defAlessandro Mantelero
 
Did voters accept a law without proper hypocritical of a.docx
Did voters accept a law without proper hypocritical of a.docxDid voters accept a law without proper hypocritical of a.docx
Did voters accept a law without proper hypocritical of a.docxstirlingvwriters
 

Similar to The Value-and Limits-of Distributive Justice in Information Privacy (14)

Write about Distribution Network Configuration and Inventory Contr.docx
Write about Distribution Network Configuration and Inventory Contr.docxWrite about Distribution Network Configuration and Inventory Contr.docx
Write about Distribution Network Configuration and Inventory Contr.docx
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
Censorship and Privacy
Censorship and Privacy Censorship and Privacy
Censorship and Privacy
 
The Ethics of Dataveillance
The Ethics of DataveillanceThe Ethics of Dataveillance
The Ethics of Dataveillance
 
Capstone
CapstoneCapstone
Capstone
 
Ch 7 Privacy
Ch 7 PrivacyCh 7 Privacy
Ch 7 Privacy
 
Argument And Persuasion Essay Topics
Argument And Persuasion Essay TopicsArgument And Persuasion Essay Topics
Argument And Persuasion Essay Topics
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Public Policy Essays
Public Policy EssaysPublic Policy Essays
Public Policy Essays
 
Big Data - Security Concerns
Big Data - Security ConcernsBig Data - Security Concerns
Big Data - Security Concerns
 
Mantelero collective privacy in3_def
Mantelero collective privacy in3_defMantelero collective privacy in3_def
Mantelero collective privacy in3_def
 
Did voters accept a law without proper hypocritical of a.docx
Did voters accept a law without proper hypocritical of a.docxDid voters accept a law without proper hypocritical of a.docx
Did voters accept a law without proper hypocritical of a.docx
 

More from Digital Sociology Mini-Conference

Tweeting #Ferguson: Mediatized fields and the new activist journalist
Tweeting #Ferguson: Mediatized fields and the new activist journalistTweeting #Ferguson: Mediatized fields and the new activist journalist
Tweeting #Ferguson: Mediatized fields and the new activist journalistDigital Sociology Mini-Conference
 
Communities Creating Action: Online Mormon Feminism in Facebook Groups by Kar...
Communities Creating Action: Online Mormon Feminism in Facebook Groups by Kar...Communities Creating Action: Online Mormon Feminism in Facebook Groups by Kar...
Communities Creating Action: Online Mormon Feminism in Facebook Groups by Kar...Digital Sociology Mini-Conference
 
Playing with Property: Young People and the Right to the ‘Smart’ City
Playing with Property: Young People and the Right to the ‘Smart’ CityPlaying with Property: Young People and the Right to the ‘Smart’ City
Playing with Property: Young People and the Right to the ‘Smart’ CityDigital Sociology Mini-Conference
 
Reimagining the interview: Adapting qualitative methods to the digital realm ...
Reimagining the interview: Adapting qualitative methods to the digital realm ...Reimagining the interview: Adapting qualitative methods to the digital realm ...
Reimagining the interview: Adapting qualitative methods to the digital realm ...Digital Sociology Mini-Conference
 
Ethnography in the virtual world: Methodological opportunities and challenges
Ethnography in the virtual world: Methodological opportunities and challengesEthnography in the virtual world: Methodological opportunities and challenges
Ethnography in the virtual world: Methodological opportunities and challengesDigital Sociology Mini-Conference
 
Contextual analysis of hashtag activism for the purpose of identifying ideal ...
Contextual analysis of hashtag activism for the purpose of identifying ideal ...Contextual analysis of hashtag activism for the purpose of identifying ideal ...
Contextual analysis of hashtag activism for the purpose of identifying ideal ...Digital Sociology Mini-Conference
 

More from Digital Sociology Mini-Conference (20)

MediaCamp: Communications for Public Scholarship
MediaCamp: Communications for Public ScholarshipMediaCamp: Communications for Public Scholarship
MediaCamp: Communications for Public Scholarship
 
Social Explorer
Social ExplorerSocial Explorer
Social Explorer
 
Ess ds chiara
Ess ds chiaraEss ds chiara
Ess ds chiara
 
Dreaming the Future_Firuzeh Shokooh Valle
Dreaming the Future_Firuzeh Shokooh ValleDreaming the Future_Firuzeh Shokooh Valle
Dreaming the Future_Firuzeh Shokooh Valle
 
#BlackLivesMatter: The Evolution of Collective Identity
#BlackLivesMatter: The Evolution of Collective Identity#BlackLivesMatter: The Evolution of Collective Identity
#BlackLivesMatter: The Evolution of Collective Identity
 
Wiest ess2016-new mediamobilization
Wiest ess2016-new mediamobilizationWiest ess2016-new mediamobilization
Wiest ess2016-new mediamobilization
 
Tweeting #Ferguson: Mediatized fields and the new activist journalist
Tweeting #Ferguson: Mediatized fields and the new activist journalistTweeting #Ferguson: Mediatized fields and the new activist journalist
Tweeting #Ferguson: Mediatized fields and the new activist journalist
 
Communities Creating Action: Online Mormon Feminism in Facebook Groups by Kar...
Communities Creating Action: Online Mormon Feminism in Facebook Groups by Kar...Communities Creating Action: Online Mormon Feminism in Facebook Groups by Kar...
Communities Creating Action: Online Mormon Feminism in Facebook Groups by Kar...
 
Rape and the Internet: Demands for Change
Rape and the Internet: Demands for ChangeRape and the Internet: Demands for Change
Rape and the Internet: Demands for Change
 
Nancy Ross on Mormon Feminist Podcasting Networks
Nancy Ross on Mormon Feminist Podcasting NetworksNancy Ross on Mormon Feminist Podcasting Networks
Nancy Ross on Mormon Feminist Podcasting Networks
 
Microcelebrity and The Tenure Track
Microcelebrity and The Tenure TrackMicrocelebrity and The Tenure Track
Microcelebrity and The Tenure Track
 
Nobody has come to help us yet
Nobody has come to help us yetNobody has come to help us yet
Nobody has come to help us yet
 
Playing with Property: Young People and the Right to the ‘Smart’ City
Playing with Property: Young People and the Right to the ‘Smart’ CityPlaying with Property: Young People and the Right to the ‘Smart’ City
Playing with Property: Young People and the Right to the ‘Smart’ City
 
Reimagining the interview: Adapting qualitative methods to the digital realm ...
Reimagining the interview: Adapting qualitative methods to the digital realm ...Reimagining the interview: Adapting qualitative methods to the digital realm ...
Reimagining the interview: Adapting qualitative methods to the digital realm ...
 
Ethnography in the virtual world: Methodological opportunities and challenges
Ethnography in the virtual world: Methodological opportunities and challengesEthnography in the virtual world: Methodological opportunities and challenges
Ethnography in the virtual world: Methodological opportunities and challenges
 
W. Michael Johnson: Microscale Ecometrics 031516
W. Michael Johnson: Microscale Ecometrics 031516W. Michael Johnson: Microscale Ecometrics 031516
W. Michael Johnson: Microscale Ecometrics 031516
 
Dina Pinsky, "Digital Ethnography and the IRB"
Dina Pinsky, "Digital Ethnography and the IRB"Dina Pinsky, "Digital Ethnography and the IRB"
Dina Pinsky, "Digital Ethnography and the IRB"
 
Digital workplace culture - ess conference - beth kelley
Digital workplace culture - ess conference - beth kelleyDigital workplace culture - ess conference - beth kelley
Digital workplace culture - ess conference - beth kelley
 
Mediated spectacles, social media and social change
Mediated spectacles, social media and social changeMediated spectacles, social media and social change
Mediated spectacles, social media and social change
 
Contextual analysis of hashtag activism for the purpose of identifying ideal ...
Contextual analysis of hashtag activism for the purpose of identifying ideal ...Contextual analysis of hashtag activism for the purpose of identifying ideal ...
Contextual analysis of hashtag activism for the purpose of identifying ideal ...
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

The Value-and Limits-of Distributive Justice in Information Privacy

  • 1. The Value—and Limits—of Distributive Justice in Information Privacy Digital Sociology Mini-conference Eastern Sociological Society March 19, 2016 JEFFREY ALAN JOHNSON INTERIM DIRECTOR INSTITUTIONAL EFFECTIVENESS & PLANNING UTAH VALLEY UNIVERSITY
  • 2. Justice and Information Privacy @the_other_jeff “The findings and the theories that emerged have often relied on overlapping constructs nestled within loosely bounded nomological networks. This has resulted in a suboptimal cumulative contribution to knowledge.” (Smith, Dinev, & Xu 2011)
  • 3. Justice and Information Privacy @the_other_jeff “The findings and the theories that emerged have often relied on overlapping constructs nestled within loosely bounded nomological networks. This has resulted in a suboptimal cumulative contribution to knowledge.” (Smith, Dinev, & Xu 2011) Privacy, however, is a concept in disarray. Nobody can articulate what it means. (Solove 2008)
  • 4. Justice and Information Privacy @the_other_jeff The question behind this paper is whether we can bring coherence by viewing information privacy as a question of justice. David Schlosberg, for example, made important strides in environmental justice by taking the underlying theory of justice seriously. The underlying theory of justice is even more implicit in information privacy, and thus stands to gain even more from analysis.
  • 5. Privacy as an Instrument of Justice @the_other_jeff “That social norm is just something that has evolved over time.” “Privacy as we knew it in the past is no longer feasible.” “I trade my privacy for the convenience.” Title IV or ADEA: Case law protections on information collection. ADA or GINA: Statutory protections but with exceptions for legitimate uses.
  • 6. Privacy as an Instrument of Justice @the_other_jeff Privacy can be dead—it can be traded for convenience, abandoned because it is impractical, evolve out of existence—because it is not justice in itself; rather it simply contributes to the pursuit of justice in other areas. If information privacy is no longer feasible or has evolved out of existence, then one simply looks elsewhere for such protections—a belief that one’s own virtue upholds a system of perfect meritocracy, perhaps? But this does not undermine the value of privacy; e.g., the privacy of GitHub contributors clearly supports more equitable outcomes. We want to study this but we need more that just instrumental theories.
  • 7. Most privacy theories protect privacy by controlling the flow of information to other parties, i.e., by distributing it. Information Privacy as a Distributive Question @the_other_jeff “Access to individually identifiable personal information” “The ability of the individual to protect information about himself “
  • 8. Information Privacy as a Distributive Question @the_other_jeff If the purpose of privacy is to distribute information, then justice in information privacy must be to distribute it well. From the perspective of most theories of information privacy, then, privacy is a question of distributive justice. Hence if we can build a coherent theory of distributive justice in information then that would protect privacy.
  • 9. Process- Oriented Distributive Justice @the_other_jeff “A distribution is just if it arises from another just distribution by legitimate means.” —Robert Nozick Justice in Original Acquisition Justice in Transfer Justice in Transfer (Rinse) Justice in Transfer (Repeat)
  • 10. Consent in Process- Distributive Privacy @the_other_jeff Justice in transfer requires a more robust principle of consent than “caveat emptor.” Privacy Policies and Terms of Service Agreements
  • 11. Consent in Process- Distributive Privacy @the_other_jeff The Apple iTunes Terms of Service (2015) agreement, for example, runs nearly 21,000 words, suggesting a reading time of between 98 and 136 minutes without accounting for the difficulty of the text. It has a Flesch-Kincaid Grade Level score of 16—a college graduate—and a Flesch Reading Ease score of 31.4, putting it above the reading comprehension level of the more than 70% of Americans without a bachelor’s degree.
  • 12. Consent in Process- Distributive Privacy @the_other_jeff Justice in transfer requires a more robust principle of consent than “caveat emptor.” Privacy Policies and Terms of Service Agreements FERPA HIPAA Privacy Rule
  • 13. Consent in Process- Distributive Privacy @the_other_jeff Process- distributive privacy requires a principle of justice in original acquisition. Educational Data Creation and Collection
  • 14. Pattern- Oriented Distributive Justice @the_other_jeff A distribution is just if it conforms to a just pattern of distribution. 𝐷𝐼𝑆𝑇𝑗 ( 𝑑𝑖𝑟𝑒𝑐𝑡𝑙𝑦 𝑟𝑒𝑙𝑒𝑣𝑎𝑛𝑡 𝑒𝑡ℎ𝑖𝑐𝑎𝑙 𝑣𝑎𝑟𝑖𝑎𝑏𝑙𝑒𝑠 ) Rawls’ Difference Principle: 𝑚𝑎𝑥𝑖𝑚𝑖𝑛 ∈ 𝑠ℎ𝑎𝑟𝑒𝑠 𝑜𝑓 𝑠𝑜𝑐𝑖𝑎𝑙 𝑠𝑢𝑟𝑝𝑙𝑢𝑠
  • 15. Pattern- Oriented Distributive Justice @the_other_jeff While process is important to some pattern theories of distributive justice, in those theories the process is usually instrumental to either reach or justify a particular pattern of distribution. Rawls’ original position and veil of ignorance are well-known procedural solutions to the problem of how to ensure that individuals choosing principles of justice will do so without regard for their own interests. But Rawls is clear that the original position is intended to justify a set of distributive principles.
  • 16. Distributing Rights to Information Privacy @the_other_jeff Distributive “rights” are usually legally protected flow controls. HIPAA “gives you rights over your health information.” European Data Protection Directive
  • 17. Distributing Rights to Information Privacy @the_other_jeff In order for information privacy rights to work distributively, you already need a theory of information privacy to operationalize and delineate, e.g., how to interpret Riley v. California beyond the search incident to arrest rule?
  • 18. Distributing Rights vs. Distributing Information @the_other_jeff Process and Pattern suggest different solutions to privacy vs. open data challenge. Just transfer of a universal & inalienable right is trivial. Distributive justice for a non-scarce good that must be restricted is a novel problem.
  • 19. Beyond Distributive Privacy @the_other_jeff Distributive justice misses the structural conditions of distribution Target operates (in) a political economy of information marked by inequality. Information is itself constituted by translation regimes.
  • 20. Beyond Distributive Privacy @the_other_jeff Clearly, the exchange of information between consumers and suppliers is not equitable, as large corporations do not in the same transaction generally reveal to customers detailed information regarding their internal structure or operations. . . . [I]t is this very inequality in the relationship between consumers and suppliers of goods and services in the marketplace that compels individuals to provide personal information. The ability of the producer or supplier to set the terms of the contract that the consumer can only accept or decline defines the transaction as inherently inequitable. . . . The consumer is ultimately a “contract taker, rather than a contract maker,” and thus provides the information in the belief that it represents a reasonable transaction cost. . . . [I]ndividuals are not necessarily aware of the degree of inequalities in their relationship with suppliers because marketers and advertisers have effectively concealed the consumerist Panopticon. (Campbell and Carlson 2002, 591– 592)
  • 21. Beyond Distributive Privacy @the_other_jeff Non-material goods are relations that shape action, not things. Greene, 2010: A person enjoys political obscurity when she can go about her day as she so chooses without others perceiving or otherwise determining the nature of her political views. The politically obscure person is able to control and manage the extent of disassociation from the political views she holds (or once held) or political actions taken in the present and in the past.
  • 22. Beyond Distributive Privacy @the_other_jeff When Greene translates this concept into a right that can be distributed, the language of action, and in fact the actors involved, disappear. Rather than controlling and managing, the person simply “exist[s]”; the others actively trying to know and influence her political views become a passive, impersonal occurrence that happens to a person. A right that is possessed gives no consideration to what one might do with such a right; it is merely passed out and its recipients wished the best of luck.
  • 23. Political obscurity therefore describes a broader right than anonymity: it is the fundamental right to exist without one's political preferences being continuously recorded and, consistent with the right articulated in Reporters Committee, a right against state-facilitated cataloguing of one's political preferences. Beyond Distributive Privacy @the_other_jeff Non-material goods are relations that shape action, not things. Greene, 2010:
  • 24. Structural Privacy and Gamergate @the_other_jeff The problem in Gamergate is not unequal privacy but silencing and power. Anita Sarkeesian is everything wrong with the feminist woman, and she is going to die screaming like the craven little whore that she is if you let her come to USU. I will write my manifesto in her spilled blood, and you will all bear witness to what feminist lies and poison have done to the men of America.
  • 25. Structural Privacy and Gamergate @the_other_jeff The threats directed toward Quinn, Wu, and Sarkeesian were not just insults meant to hurt their feelings. Gamergate depends critically on the structure of gender relations. It began when Quinn’s ex-boyfriend, in a lengthy diatribe, accused her of being sexually unfaithful, it peaked when someone still unidentified threatened to massacre “the craven little whore” who has poisoned the men of America. Doxing them was a threat intended to silence them and maintain a system of structural power that favors men, one that was, due to the legally enshrined hyper-masculine culture of Utah that treats carrying a gun as the sine qua non of manhood, successful in at least Sarkeesian’s case. These three women’s information privacy was violated not simply in that personal information was distributed improperly but because information about them was used as a tool of domination and oppression.
  • 26. Toward Structural Information Justice @the_other_jeff What if the real (and much more difficult to document) harm befell those who did not—or would not—sign the petition? What if the harm in releasing petition names is not to activists being mooned or shouted at as they advocate publicly for their cause? What if the real privacy victim is a mother of two, passing a petition circulator entering the grocery store, fearful that signing a petition—even for a cause in which she very much believes—might create a lifelong indelible association with that cause on her Internet record? (Greene 2010)
  • 27. Further Information @the_other_jeff Jeffrey Alan Johnson Interim Director, Institutional Effectiveness & Planning Utah Valley University jeffrey.johnson@uvu.edu @the_other_jeff Full paper available at http://ssrn.com/abstract=2747177

Editor's Notes

  1. While process is important to some pattern theories of distributive justice, in those theories the process is usually instrumental to either reach or justify a particular pattern of distribution. Rawls’ original position and veil of ignorance are well-known procedural solutions to the problem of how to ensure that individuals choosing principles of justice will do so without regard for their own interests. But Rawls is clear that the original position is intended to justify a set of distributive principles.
  2. When Greene translates this concept into a right that can be distributed, the language of action, and in fact the actors involved, disappear. Rather than controlling and managing, the person simply “exist[s]”; the others actively trying to know and influence her political views become a passive, impersonal occurrence that happens to a person. A right that is possessed gives no consideration to what one might do with such a right; it is merely passed out and its recipients wished the best of luck.
  3. When Greene translates this concept into a right that can be distributed, the language of action, and in fact the actors involved, disappear. Rather than controlling and managing, the person simply “exist[s]”; the others actively trying to know and influence her political views become a passive, impersonal occurrence that happens to a person. A right that is possessed gives no consideration to what one might do with such a right; it is merely passed out and its recipients wished the best of luck.
  4. She points, for example, to the publication of signers of a Maryland petition to bring an anti-same sex marriage measure to the ballot by an LGBT newspaper that resulted in one university terminating its chief diversity officer, who had signed the petition, as an example of how a lack of political obscurity undermines the capacity to act politically.