Home
Research
Publications
Courses
CV
Bio
Contact info

Special Topics in Technology Studies: Digital Media and Privacy
E57.3150
Wednesday 3:20 - 5:30 pm
Call number: 43175 (4 credits)
Spring 2010
Helen Nissenbaum, Department of Media, Culture, and Communication

Digital technologies have dramatically altered the shape of communications and information flows in societies, enabling massive transformations in the capacity to monitor behavior, to amass and analyze personal information, and to distribute, publish, communicate and disseminate it. As a result, some would claim, they have radically and irrevocably diminished privacy and provoked social anxiety, inspiring new laws and policies, widespread advocacy efforts, and technical responses aimed at mitigating and resisting their impacts.

All of this falls within the scope of the seminar, which undertakes a multi-faceted, multi-disciplinary examination of the relationship between privacy and technology, extending back to applications of old technologies such as photography and wiretaps but focusing on technical innovations in digital media and information sciences from databases and video surveillance to biometrics, the Web, social networks, and more. Because it is hardly ever possible to draw a straight line between technology and social implication, our study will be broadly encompassing, including in its scope the people, practices, institutions, and vested interests that have supported the application of technologies to monitor people, store information about them, and predict, even shape their actions. That is to say, we will be studying the relationship between privacy and key socio-technical systems.

Readings for the seminar will reflect the multi-disciplinarity of scholarly and research literatures on privacy, drawn from moral and political philosophy, law, computer science, media and communications studies, sociology, policy studies, and more. In addition to covering a sample of this literature -- now quite vast -- students will stake out sub-areas of particular interest, conduct self-directed research, and present their findings to the group. Examples might include privacy in communications, in social networks, in media and journalism; privacy and surveillance; privacy of citizens in relation to governments, to the global corporate sector, to online commercial actors; or in relation to health, medical, psychiatric and genetic information.

Texts

Nissenbaum, H. (2009) Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford: Stanford University Press)
Regan, P. (1995) Legislating Privacy: Technology, Social Values, and Public Policy

Other required readings will be posted on the Blackboard Course Homepage

Requirements & Grading

Student engagement is key to a successful seminar.

Participation: Students will select topics and readings for which they will have primary responsible at weekly meetings of the seminar. It goes without saying that readings should be completed before each meeting.

Research paper: Over the course of the semester, students will develop a question, conduct research, and write a term paper of approximately 15-20 pages. We will establish a timetable for specific milestones, including, locating an area of concern; articulating a question; producing an annotated bibliography; and completing a draft. This will be done in discussion with instructor and other seminar participants.


Schedule


Jan 20 SEMINAR INTRODUCTION

Case discussion

Greenhouse, L., Into the Closet
Liptak, A., Supreme Court Takes Texting Case

Jan 27 PRIVACY, TECHNOLOGY, SOCIETY

Readings

Nissenbaum, Privacy in Context (Introduction and Part One)
Winner, Do Artifacts Have Politics
Latour, Where Are the Missing Masses
Weinberg, Can Technology Replace Social Engineering?

Feb 3 INTEREST BRAWLS

Readings

United States Department of Health, Education & Welfare. 1973. Records, Computers, and the Rights of Citizens. Summary and Recommendations
Regan, Legislating Privacy (Chapter 5)
Marx, A Tack in the Shoe
Brin, Transparent Society (Selections)
Gandy, Toward a Political Economy of Information
Posner, An Economic Theory of Privacy
EPIC.org website: Read up on cases, including LotusMarketplace Households, complaints against Doubleclick

Feb 10 PHILOSOPHICAL FOUNDATIONS, JUSTIFICATORY FRAMEWORKS

Readings

Nissenbaum, Privacy in Context (Intro to Section Two and Chapter 4)
Reiman, Driving to the Panopticon
Van den Hoven, Privacy and the Varieties of Informational Wrongdoing
Gavison, Privacy and the Limits of the Law
Cohen, The Examined Life
Regan, Legislating Privacy (chapter 4)

Feb 17 PRIVACY AND SOCIETY

Readings

Post, The Social Foundations of Privacy
Regan, Legislating Privacy (Chapter 8)

Feb 24 PRIVACY LAW, LANDSCAPE, TORTS

Readings

Warren and Brandeis, The Right to Privacy
Prosser, Privacy
Solove, The Origins and Growth of Information Privacy Law

March 3: NO REGULAR CLASS

Mar 10 PRIVACY LAW, CONSTITUTION, FOURTH AMENDMENT

Readings

Kerr (O), The Case for the Third-Party Doctrine
Friewald, A First Principles Approach to Communications Privacy
Kerr (I) and McGill, Emanations, Snoop Dogs and Reasonable Expectations of Privacy
Kerr (I) et. al., Tessling on My Brain
Nissenbaum, Privacy in Context (Chapters 5,6)

Mar 17 SPRING RECESS

Mar 24 TECHNOLOGY AND SOCIETY

Readings

Pfaffenberger, Technological Dramas
Introna, Towards a Post-Human Intra-Actional Account of Socio-Technical Agency
Orlikowski and Barley, Technology and Institutions

Mar 31 CONTEXTUAL INTEGRITY

Readings

Nissenbaum, Privacy in Context (Part 3)

Apr 7 DATA AGGREGATION, MINING, PROFILING

Readings

Gandy, Coming to Terms with the Panoptic Sort
Lyon, Data, Discrimination, Dignity
Vedder, KDD: The Challenge to Individualism
Zarsky, Mine Your Own Business

Apr 14 WEB 2.0, BLOGS, SOCIAL NETWORKS

Readings

Allen-Castelitto, Coercing Privacy
Gajda, Judging Journalism: The Turn toward Privacy and Judicial Regulation of the Press
Miscellaneous postings online
boyd, danah, Making Sense of Privacy and Publicity

Apr 21 SURVEILLANCE, CULTURAL CONTENT, TRACKING, ADVERTISING

Readings

Lyon, Surveillance (Selections)
Kerr (I), Hacking@Privacy: Anti-Curcumvention Laws, DRM and the Piracy of Personal information
Cohen, A Right to Read Anonymously

Apr 28 IDENTITY, IDENTIFICATION, ANONYMITY, RESISTANCE

Readings

Levy, Crypto-Rebels
Clark, J., Gauvin, P. and C. Adams, Exit Node Repudiation for Anonymity Networks
Doe, J., What's in a Name? Who Benefits from the Publication Ban in Sexual Assault Trials?
Froomkin, M., Anonymity and the Law in the United States
Froomkin, M., Identity Cards and Identity Romanticism
C. Lucock and K. Black, Anonymity and the Law in Canada
Nissenbaum, H. and D. Howe, TrackMeNot: Resisting Surveillance in Web Search

Course Bibliography

Allen-Castellitto, A. "Coercing Privacy." William and Mary Law Review, 40, 1999, 723-757.

Barnes, R. "Supreme Court will Decide Whether Employees Text Messages are Private," The Washington Post. December 15, 2009.

boyd, danah. 2010. “Making Sense of Privacy and Publicity.” SXSW. Austin, Texas, March 13.

Brin, D., "Privacy Under Siege." The Transparent Society, 3-26. New York: Perseus Books, 1998, 54-88.

Brin, D., "The Challenge of an Open Society." The Transparent Society. New York: Perseus Books, 1998, 3-26.

Clark, J., Gauvin, P. and C. Adams, “Exit Node Repudiation for Anonymity Networks,” Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. Eds I. Kerr, C. Lucock, & V. Steeves, Oxford: Oxford University Press, 2009, 399-416.

Cohen, J. "A Right to Read Anonymously: A Closer Look at 'Copyright Management' In Cyberspace," Connecticut Law Review, 28, 1996, 981-1039.

Cohen, J. "Examined Lives: Informational Privacy and the Subject as Object." Stanford Law Review, 52, 2000, 1373-1438.

Doe, J. “What's in a Name? Who Benefits from the Publication Ban in Sexual Assault Trials?” Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. Eds I. Kerr, C. Lucock and V. Steeves, Oxford: Oxford University Press, 2009, 265-281.

Freiwald, S. "A First Principles Approach to Communications Privacy," Stanford Technology Law Review. 3, 2007

Froomkin, M. “Anonymity and the Law in the United States,” Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. (Eds) I. Kerr, C. Lucock, and V. Steeves, Oxford: Oxford University Press, 2009, 441-464.

Froomkin, M. “Identity Cards and Identity Romanticism,” Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. (Eds) I. Kerr, C. Lucock, and V. Steeves, Oxford: Oxford University Press, 2009, 246-263.

Gajda, A. "Judging Journalism: The Turn toward Privacy and Judicial Regulation of the Press," California Law Review, 97(1039), 2009, 1039-1106.

Gandy, O. 1996. "Coming to Terms with the Panoptic Sort," In Computers, Surveillance, and Privacy, edited by D. Lyon and E. Zureik. Minnesota: University of Minnesota Press.

Gandy, O. 1993. The Panoptic Sort: A Political Economy of Personal Information. Boulder, CO: Westview Press.

Gandy, O. "Toward a Political Economy of Personal Information." Critical Studies in Media Communication, 10(1), 1993, 70-97.

Gavison, R. "Privacy and the Limits of Law," The Yale Law Journal, 89(3), 1980, 421-471.

Greenhouse, L. "Into the Closet," The New York Times. January 14, 2010.

Hildebrandt, M. "Who is Profiling Who? Invisible Visibility," Reinventing Data Protection Springer Business Media, 2009, 239-252.

Introna, L. "Towards a Post-human Intra-actional Account of Socio-technical Agency (and Morality)." Moral Agency and Technical Artefacts Scientific Workshop, NIAS, Hague, 2007.

Kerr, I. "Hacking@Privacy: Anti-Circumvention Laws, DRM and the Piracy of Personal Information," (2005) Canadian Privacy Law Review, I, 25-34.

Kerr, I., Binnie, M., and C. Aoki, "Tessling On My Brain: The Future of Lie Detection and Brain Privacy in the Criminal Justice System," Canadian Journal of Criminology and Criminal Justice, 2008, 1-17.

Kerr, I. and J. McGill, "Emanations, Snoop Dogs and Reasonable Expectations of Privacy," Criminal Law Quarterly, 52(3), 2007, 392-432.

Kerr, O. "The Case for the Third-Party Doctrine," Michigan Law Review, 107, 2009, 1-49.

Latour, B. "Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts." Shaping Technology/Building Society. Ed. W. Bijker and J. Law. Cambridge, MA: MIT Press, 1992, 225-258.

Levy, S. "Crypto Rebels," High Noon on the Electronic Frontier. Ed. Peter Ludlow. Cambridge, MA: MIT Press, 1996, 185-205.

Liptak, A. "Supreme Court Takes Texting Case," The New York Times. December 15, 2009.

C. Lucock and K. Black, “Anonymity and the Law in Canada,” Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. (Eds) I. Kerr, C. Lucock, and V. Steeves, Oxford: Oxford University Press, 2009, 465-483.

Lyon, D. "A Sociology of Information," in C. Calhoun, C. Rojek and B. Turner (eds.) The Sage Handbook of Sociology, London, Thousand Oaks and New Delhi: Sage, 2005.

Lyon, D. "Data, Discrimination, Dignity," Surveillance Studies: An Overview. Malden, MA: Polity Press, 2007, 179-197.

Lyon, D. "Surveillance (Selections)" Surveillance Studies: An Overview. Malden, MA: Polity Press, 2007, 9-70.

Marx, G. "A Tack in the Shoe: Neutralizing and Resisting the New Surveillance," Journal of Social Issues, 59(2), 2003, 369-390.

Nissenbaum, H. and D. Howe, “TrackMeNot: Resisting Surveillance in Web Search,” Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society. (Eds) I. Kerr, C. Lucock, and V. Steeves, Oxford: Oxford University Press, 2009.

Orlikowski, W. and S. Barley, "Technology and Institutions: What Can Research on Information Technology and Research on Organizations Learn from Each Other?" MIS Quarterly. 25(2), 2001, 145-165.

Pfaffenberger, B. "Technological Dramas." Science, Technology, & Human Values, 17 (3), 1992, 282-312.

Pinch, T. "Technology and Institutions: Living in a Material World." Theory & Society, 37(5), 2008, 461-483.

Posner, R. A. "An Economic Theory of Privacy." Regulation, 2(3), 1978, 19-26.

Post, R. "The Social Foundations of Privacy: Community and Self in the Common Law Tort," California Law Review. 77(5), 1989, 957-1010.

Prosser, W. "Privacy." California Law Review, 48(3), 1960, 383-423.

Regan, P. "Communication Privacy: Transmitting Our Message." Legislating Privacy. Chapel Hill: University of North Carolina Press, 1995,

Regan, P. "Chapter 4: Information Privacy: Recording Our Transactions." Legislating Privacy. Chapel Hill: University of North Carolina Press, 1995, 69-108.

Regan, P. "Chapter 8: Privacy and the Common Good: Implications for Public Policy." Legislating Privacy. Chapel Hill: University of North Carolina Press, 1995, 212-243.

Reiman, J. 1995. "Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future." Santa Clara Computer and High Technology Law Journal, 11 (1): 27-44.

Sassen, S. "Towards a Sociology of Information Technology," Current Sociology. 50(3), 2002, 365-388.

Solove, D. "A Taxonomy of Privacy." University of Pennsylvania Law Review, 154, no. 3 (2006): 477-564.

Solove, D. "The Origins and Growth of Information Privacy Law," PLI/PAT, 748, 2003, 29.

"Summary and Recommendations from Records, Computers, and the Rights of Citizens." Report of the Secretary's Advisory Committee on Automated Personal Data Systems. U. S. Department of Health, Education & Welfare. (Copyright by Massachusetts Institute of Technology, 1973).

Van den Hoven, J. "Privacy and the Varieties of Informational Wrongdoing." Computer Ethics. Ed. John Weckert. Hampshire, England: Ashgate Publishing Limited, 2007, 317-330.

Vedder, A. "KDD: The Challenge to Individualism." Ethics and Information Technology, 1, 1999, 275-281.

Warren, S. and L. Brandeis. "The Right to Privacy [The Implicit Made Explicit]." Philosophical Dimensions of Privacy: An Anthology. Ed. F. Schoeman, Cambridge: Cambridge University Press, 75-103.

Weinberg, Alvin M. "Can Technology Replace Social Engineering?" Controlling Technology: Contemporary Issues. Ed. W. B. Thompson. Buffalo, NY: Prometheus Books, 1991. 41-48.

Westin, A. Privacy and Freedom. London: The Bodley Head Ltd., 1970.

Winner, L. "Do Artifacts have Politics?" The Whale and the Reactor. Chicago: The University of Chicago Press, 1986, 19-39.

Zarsky, T. Z. "Mine Your Own Business!: Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion," Yale Journal of Law & Technology, 5(4), 2002, 1-56.



Last Updated: April 10, 2010
Need Help? Web-Master