Design for Embedding the Value of Privacy in Personal Information Management Systems

Authors

  • Haleh Asgarinia PhD candidate

DOI:

https://doi.org/10.55613/jeet.v33i1.129

Keywords:

personal autonomy, personal information management systems; value of privacy; values hierarchy

Abstract

Personal Information Management Systems (PIMS) aim to facilitate the sharing of personal information and protect privacy. Efforts to enhance privacy management, aligned with established privacy policies, have led to guidelines for integrating transparent notices and meaningful choices within these systems. Although discussions have revolved around the design of privacy-friendly systems that comply with legal requirements, there has been relatively limited philosophical discourse on incorporating the value of privacy into these systems. Exploring the connection between privacy and personal autonomy illuminates the instrumental value of privacy in enabling individuals to live their lives autonomously, highlighting the importance of intentionally embedding the value of privacy into these systems. To translate the value of privacy into concrete design requirements, this study constructs a values hierarchy consisting of values, norms, and design requirements. After analyzing the relationships between privacy and autonomy and identifying norms, the design requirements translated from the norms associated with the components of personal autonomy are specified at the lowest layer. These requirements include a design to prevent unauthorized access and dark patterns and to provide effective and efficient notices and choices. The findings contribute to expanding the requirements for designing the aspect of privacy as a legal requirement to incorporate the value of privacy into systems.

References

Asgarinia, H., Chomczyk Penedo, A., Esteves, B., & Lewis, D. (2023). “Who Should I Trust with My Data?” Ethical and Legal Challenges for Innovation in New Decentralized Data Management Technologies. Information, 14(7)(351). https://doi.org/10.3390/info14070351

Barocas, S., & Nissenbaum, H. (2009). On Notice: The Trouble with Notice and Consent (SSRN Scholarly Paper 2567409). https://papers.ssrn.com/abstract=2567409

Benson, P. (1994). Free Agency and Self-Worth. The Journal of Philosophy, 91(12), 650–668. https://doi.org/10.2307/2940760

Bratman, M. E. (2007). Structures of Agency: Essays. Oxford University Press.

Brey, P. (2010). Values in technology and disclosive computer ethics. In L. Floridi (Ed.), The Cambridge Handbook of Information and Computer Ethics (pp. 41–58). Cambridge University Press.

Christidis, K., & Devetsikiotis, M. (2016). Blockchains and Smart Contracts for the Internet of Things. IEEE Access, 4, 2292–2303. https://doi.org/10.1109/ACCESS.2016.2566339

Christman, J. (2004). Relational Autonomy, Liberal Individualism, and the Social Constitution of Selves. Philosophical Studies, 117(1), 143–164.

Christman, J. (2009). The historical conception of autonomy. In The Politics of Persons: Individual Autonomy and Socio-historical Selves (pp. 133–163). Cambridge University Press.

Coron, J.-S. (2006). What is cryptography? IEEE Security & Privacy, 4(1), 70–73. https://doi.org/10.1109/MSP.2006.29

Feng, Y., Yao, Y., & Sadeh, N. (2021). A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 1–16.

Frankfurt, H. G. (1971). Freedom of the Will and the Concept of a Person. The Journal of Philosophy, 68(1), 5–20.

Friedman, B., Jr, P. H. K., & Borning, A. (2008). Value Sensitive Design and Information Systems. In K. E. Himma & H. T. Tavani (Eds.), The Handbook of Information and Computer Ethics (pp. 69–101). John Wiley & Sons, Inc.

Goffman, E. (1959). The presentation of self in everyday life. Doubleday.

Grannis, A. (2015). You Didn’t Even Notice: Elements of Effective Online Privacy Policies. Fordham Urban Law Journal, 42(5), 1109–1170.

Henschke, A. (2017). Ethics in an Age of Surveillance: Personal Information and Virtual Identities. Cambridge University Press.

Henschke, A. (2021). From need to share to need to care: Information aggregation and the need to care about how surveillance technologies are used for counter-terrorism. In S. Miller, A. Henschke, & J. F. Feltes, Counter-Terrorism (pp. 156–168). Edward Elgar Publishing.

Hölbl, M., Kompara, M., Kamišalić, A., & Nemec Zlatolas, L. (2018). A Systematic Review of the Use of Blockchain in Healthcare. Symmetry, 10(10), Article 10.

Janssen, H., & Singh, J. (2022). Personal Information Management Systems. Internet Policy Review, 11(2), 1–6.

Kant, I. (1993). Grounding for the metaphysics of morals ; with, On a supposed right to lie because of philanthropic concerns (J. W. (James W. Ellington, Trans.). Indianapolis : Hackett Pub. Co. http://archive.org/details/groundingformet000kant

Khezr, S., Moniruzzaman, M., Yassine, A., & Benlamri, R. (2019). Blockchain Technology in Healthcare: A Comprehensive Review and Directions for Future Research. Applied Sciences, 9(9), Article 9.

Korsgaard, C. M. (1996). The Sources of Normativity (O. O’Neill, Ed.). Cambridge University Press.

Korsgaard, C. M. (2009). Self-Constitution: Agency, Identity, and Integrity. Oxford University Press.

Mackenzie, C. (2000). Imagining Oneself Otherwise. In C. Mackenzie & N. Stoljar (Eds.), Relational Autonomy: Feminist Per-spectives on Autonomy, Agency, and the Social Self. Oup Usa.

Mackenzie, C. (2008). Relational Autonomy, Normative Authority and Perfectionism. Journal of Social Philosophy, 39(4), 512–533.

Mackenzie, C. (2023). Autonomous agency, we-agency, and social oppression. The Southern Journal of Philosophy, 61(2), 373–389.

Mackenzie, C., & Stoljar, N. (2000). Introduction. In C. Mackenzie & N. Stoljar (Eds.), Relational Autonomy Feminist Perspectives on Autonomy, Agency, and the Social Self. Oxford University Press.

McLeod, C. (2002). Self-Trust and Reproductive Autonomy. MIT Press. https://mitpress.mit.edu/9780262537230/self-trust-and-reproductive-autonomy/

Miller, S., & Bossomaier, T. (2021). Privacy, Encryption and Counter-Terrorism. In A. Henschke, A. Reed, S. Robbins, & S. Miller (Eds.), Counter-Terrorism, Ethics and Technology: Emerging Challenges at the Frontiers of Counter-Terrorism (pp. 139–154). Springer International Publishing.

Nissenbaum, H. F. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford Law Books.

Oshana, M. A. L. (1998). Personal Autonomy and Society. Journal of Social Philosophy, 29(1), 81–102.

Rachels, J. (1975). Why Privacy is Important. Philosophy and Public Affairs, 4(4), 323–333.

Riesman, D. (1952). Faces in the Crowd: Individual Studies in Character and Politics. Yale University Press.

Rössler, B. (2005). The Value of Privacy | Wiley. Polity.

Rössler, B., & Mokrosinska, D. (2013). Privacy and social interaction. Philosophy & Social Criticism, 39(8), 771–791.

Schaub, F., Balebako, R., & Cranor, L. F. (2017). Designing Effective Privacy Notices and Controls. IEEE Internet Computing, 21(3), 70–77.

Schaub, F., Balebako, R., Durity, A. L., & Cranor, L. F. (2018). A Design Space for Effective Privacy Notices*. In E. Selinger, J. Polonetsky, & O. Tene (Eds.), The Cambridge Handbook of Consumer Privacy (1st ed., pp. 365–393). Cambridge University Press.

Solove, D. J. (2008). Understanding Privacy (SSRN Scholarly Paper ID 1127888). Social Science Research Network. https://papers.ssrn.com/abstract=1127888

Solove, D. J. (2013). Introduction: Privacy Self-Management and the Consent Dilemma. Harvard Law Review, 126:1880, 1880–1903.

Terpstra, A., Schouten, A. P., Rooij, A. de, & Leenes, R. E. (2019). Improving privacy choice through design: How designing for reflection could support privacy self-management. First Monday. https://doi.org/10.5210/fm.v24i7.9358

van de Poel, I. (2009). Values in Engineering Design. In Philosophy of Technology and Engineering Sciences (pp. 973–1006). Else-vier.

van de Poel, I. (2013). Translating Values into Design Requirements. In D. P. Michelfelder, N. McCarthy, & D. E. Goldberg (Eds.), Philosophy and Engineering: Reflections on Practice, Principles and Process (Vol. 15, pp. 253–266). Springer Netherlands.

Véliz, C. (2021). Privacy is Power: Why and How You Should Take Back Control of Your Data. Bantam Press.

Waldman, A. E. (2016). Privacy, Notice, and Design. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2780305

Waldman, A. E. (2018). Privacy, Notice, and Design. STANFORD TECHNOLOGY LAW REVIEW, 21:129. https://digitalcommons.nyls.edu/fac_articles_chapters/1330

Waldman, A. E. (2020). Cognitive biases, dark patterns, and the ‘privacy paradox.’ Current Opinion in Psychology, 31, 105–109.

Westin, A. F. (1967). Privacy And Freedom. Washington and Lee Law Review, 25(1), 166–170.

Williams, B. (1976). Persons, Character, and Morality. In J. Rachels (Ed.), Moral Luck: Philosophical Papers 1973?1980. Cambridge University Press.

Downloads

Published

2024-02-21

How to Cite

Design for Embedding the Value of Privacy in Personal Information Management Systems. (2024). Journal of Ethics and Emerging Technologies, 33(1), 1-19. https://doi.org/10.55613/jeet.v33i1.129

Similar Articles

1-10 of 28

You may also start an advanced similarity search for this article.