IMPACTS OF TECHNOLOGY: Information Technology and Privacy
(E38.1034001SP02)
Department of Culture and Communication
Instructor: Helen Nissenbaum
The course examines social impacts of technology through the case of information technologies and their impacts on privacy. Few social values have been as dramatically affected as privacy by developments in the huge array of technologies of information, from photography to video, from databases to biometrics, from wire-taps to polygraphs. Social commentary attending these developments have been equally diverse, predicting the death of privacy, proclaiming its insignificance, and suggesting that technology itself has brought privacy into existence as an inchoate set of disparate values and interests. We will study some of these technologies and their impacts. We will note the people, institutions, and interests that are affected. And we will learn how to think about some of the challenges and evaluate them from the perspective of social, ethical, and political values.
The subject of technology and privacy can be approached from many different vantage points. In the course, we adopt a philosophical perspective. This means that we seek to appreciate the effects of technology on privacy through an understanding of the meaning and value of privacy. The course is structured around several issues:
The technology. We will study a variety of technologies that have raised questions and protest, including photography, video-recording, biometrics, computer databases, computer and online monitoring, information processing techniques, and polygraphs. We also will examine some of the proposed technical solutions to privacy threats.
The contexts. We study some of the contexts in which these various technologies operate, especially those that have aroused public controversy, such as the workplace, marketplace, home, World Wide Web, doctorıs office, public squares, mind, body, and on the road.
The law. We study the extent and limits of privacy protection provided through law.
The value of privacy. We study the meaning and value of privacy through philosophical analysis and ethical, political and legal theory.
Privacy in conflict. Claims have been made about several important values that appear to conflict with privacy, including free speech, profit, efficiency, security, and accountability. How do we choose? Can we make sensible tradeoffs?
Technology and values. Should we blame technology for the loss of privacy? Or, is technology merely the tool that assists legitimate social forces?
The course divides into roughly two parts. In the first, we study a varied tradition of work in the humanities and social sciences that looks at the social, political and moral dimensions of technology generally - the rich and sometimes troubling relationship of humanity to technology. We will ask whether technology is a neutral force and what this question even means. We will ask whether and to what extent technology is determined by internal forces of science and engineering or broader social, moral and political forces. In the second part of the course, we turn attention to information and communications technology, carrying with us themes and principles learned in the first part. Our central focus, here, is both on the idea that values may be "embodied" in computer and information systems and what this means for those of us who are committed to a set of moral and political values.
The course, throughout, combines attention to theory as well as application. Students will be expected to gain competency in theory as well as familiarity with key cases. They will be given opportunity to demonstrate this competency in classroom discussion and written assignments. We will give particular attention to the cases of the Internet and World Wide Web.
Readings
-
Web
Resources. Many readings have been made available through the Course
homepage either via External
Links
or Course Documents. Those available online are marked
CD.
- Course Reader: All other readings (except if noted otherwise) can be found in the Course Reader. Available from: MacDougal Copy Center, 127 MacDougal
Street
(betw. W3 & W4). Call before going:
212-460-8591
- Weston, A, A Rulebook for Arguments
(Indianapolis: Hackett Publishing Company)/span>
Course requirements and grading
Students are expected to attend all classes and complete assigned readings prior to class meetings.
Performance in class will be assessed according to three criteria and grades assigned accordingly:
participation, examinations, and essays. To pass the class, students MUST attain passing grades on each of
these criteria, but grades will be assigned on the basis of the following:
30% Participation (Attendance and classroom and online participation)
40% Examinations (Midterm and Final)
30% Essays (Two short essays)
Class Schedule (subject to change)
January 22: Introduction to the course
January 24: Recent Technological Challenges
We review examples of technological innovations that have stirred cries of "privacy invasion".
Short paper due today
Short Paper (approx. 2-pages): Evaluate one of the cases discussed in the articles, such as thermal imaging,
EZ Pass, cell phone identification numbers, Microsoft's GUID, the FBI's "magic lantern" software (read about it in:
http://www.msnbc.com/news/660096.asp). Describe how the technology works, how it is or can be used, and whether you
approve or disapprove of it. Give reasons that are as broadly persuasive as possible. (Imagine, for example, that you
are writing for the Opinions section of The New York Times.) You can, but need not, do some further reading on the
particular cases. (Best bet for quick results is EPIC website.)
Readings:
- Penenberg, Adam L. "The Surveillance Society." Wired. (December 2001).
157-161.
- Greenhouse, Linda "Justices Say Warrant is Required In High-Tech Searches,"
The New York Times, June 12, A.1
- Marx, Gary "Technology and Gender: Thomas I. Voire and the Case of the Peeping
Tom," Sociological Quarterly, (forthcoming). CD
- Barlow, John P. "Private Life in Cyberspace." Computers, Ethics, and Social
Values. Eds. D. Johnson and H. Nissenbaum. (Englewood Cliffs: Prentice Hall,
1995). 310-314.
- Various readings from popular media about surveillance on the Roads
January 29: Anonymity
Being anonymous is, strictly speaking, to be unnamed. Anonymity is sometimes considered an important aspect of
privacy but it can also be dangerous. Anonymity may be increasingly difficult to achieve in an information age.
Readings:
Rosen
Warren and Brandeis
Weinberg
Bentham
Feb. 7: Biometrics
In an impersonal world, how can we know enough about the people around us, who we may need to depend on and trust?
Biometric technologies not only identify, they also authenticate identity. Is this a good thing?
Readings:
Stikeman
Clarke Website
Feb. 7, 12: Databases
When computers came to serve not only as calculators but as information processors, it was not long before their powers to store, organize, manipulate and analyze information about people were exploited. In many cases, the ends were good. But, soon, the worries of "big brother" were publicly aired, along with a sense that something needed to be done to control their proliferation and growth.
Readings:
Records, Computers, and the Rights of Citizens
Clarke
Gandy
Tavani
Feb. 14, 19: Technology and Society
How can we understand the social implications of technology, generally. What can we say about the complex relationships among people, technology, societies, and values. We read about some of the central views on this matter, beginning with the question: what is technology, anyhow?
Readings:
Ellul
Florman
Mesthene
Winner
Mumford
Feb. 21: Medical and Genetic Privacy
Good healthcare depends on a vast body of knowledge, including the knowledge physicians and other caregivers have of
individual patients. This information is stored and used. It is of great value to the patients themselves and to society at
large - public health and research. But should there be restraints on what information is gathered and how it is used?
Should genetic information be treated in unique ways?
Readings:
Annas
Murray
Goldman
See Healthprivacy.org
Feb. 26: Getting to Know You, Personally
With information, we can learn not only about bodies but about minds, about personalities. Is this sinister, or just a slightly enhanced version of "getting to know you"?
Readings:
Regan
Westin
Feb. 28: Communications
We sometimes take for granted the privacy of our communications. We can whisper, pass notes, even send things in the mail, and expect them to remain secret. What can we expect, hope, or demand of our new communications technologies, from telephones to landlines to cell phones to email?
Readings:
Regan
March 5: Catch-up and Review
March 7: Midterm
Mar. 12,14: Break
Mar.19, 21: Philosophical Analysis
What is privacy and why do we value it? These are the basic questions philosophers have asked.
The questions are important because they provide reasons or justifications for heartfelt opinions on controversial issues.
We will see, however, why theorists and activists alike have found privacy a challenging notion to grasp and defend.
What interests and values does privacy challenge and how do we settle important tradeoffs?
Readings:
Reiman
Gavison
Nissenbaum
March 26: Nostalgia: Is privacy really on the wane?
The online world offers protection from much of the scrutiny of physical interaction - others can't see or hear us. They may not know us. Yet online transaction has become increasingly a source of betrayal of our habits and origins. How so? And what should we do about it?
Readings:
Bennett
Online profiling (See EPIC)
Kang (mainly from Section II on)
April 2: In the workplace
Do our bosses have a right to monitor us? There is an increasing sense that we give up privacy when we cross the threshold of our places of work.
Readings:
Rule
April 4, 9: The Law
U.S. law has grappled with both conceptual and normative privacy issues. Pulled in opposite directions by those, on the one hand, who see privacy as a distinctive value and on the other, by those who see it as a hodge-podge of more fundamental values, the law reveals complexity and confusion in its commitment to privacy. We examine various sources of legal protection for privacy, and will consider some of both the skeptical and committed positions.
Readings:
Constitution of the United States of America
http://lcweb2.loc.gov/const/const.html
Bloustein
Posner
Apr. 11, 16: The Skeptics
Skeptical views on privacy are maintained on a variety of grounds: people don't care about privacy; privacy conflicts with other more important interests and liberties; and privacy is a negative social value. We will critically evaluate some of these arguments.
Readings:
Gotlieb
Singleton
Brin
Apr. 18, 23: Technology as Protector of Privacy
Information technology - databases, biometrics, genetics, surveillance cameras - is usually understood as posing threats to privacy. But, here, we consider ways in which information technology can serve to protect privacy.
Readings:
Levy
Reagle and Cranor
Schneier and Banisar
Wayner
April 25: Guest speaker
April 30: Guest speaker
May 2: Catch-up and Review