For more information about how to cite these materials visit

Similar documents
For more information about how to cite these materials visit

For more information about how to cite these materials visit

For more information about how to cite these materials visit

SI Digital Libraries and Archives, Winter 2009

Open Education Resources: open licenses

For more information about how to cite these materials visit

Copyright 2008, Paul Conway.

SI Digital Libraries, Winter 2008

Online Identity By CommonLit Staff 2014

Author: Ida Lucy Iacobucci, 2015

Northfleet Technology College Course Outline: Information Technology in a Global Society

Tracking and predicting growth of health information using scientometrics methods and Google Trends

Author: Ida Lucy Iacobucci, 2015

Game and Learn: An Introduction to Educational Gaming 6. Critical Gaming

Get Creative (and stay legal): Copyright Compliance with Creative Commons and Open Educational Resources

MIS 404 LEGAL & ETHICAL ISSUES IN COMPUTING ETHICS AND INFORMATION TECHNOLOGY. Week 11b: Ethical Game Play

50 Graded Trax Problems with solutions. Collected and annotated by Martin Møller Skarbiniks Pedersen

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

Security and Risk Assessment in GDPR: from policy to implementation

Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytics

Principles for the Networked World

ARCH Structures 2, Winter 2009

Unit 11. Vocabulary Card Images. Skills Strand Grade 3. Core Knowledge Language Arts

MEDICINE LICENSE TO PUBLISH

Individual Test Item Specifications

For Parents and Teachers What It Means to Stick Up for Yourself How to Get and Use Personal Power

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework

OFFICIAL RULES ASMP STYLE PHOTO CONTEST

Choices by Design, a Primer: Finding and Using Openly Licensed Resources October 20, 2014

#WCDET. Images and Fonts Using Them Legally

Open Access to music research in Sweden the pros and cons of publishing in university digital archives

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework

NANNIES ON CALL NANNY APPLICATION

UNDERSTANDING CREATIVE COMMONS LICENSES IN THE EDUCATIONAL CONTEXT

Wk Lecture Outline Lab Topic Checkpoint. Blogging, The Internet & Networked Communities

FIPPs Fair Information Practice Principles

Guide for lived experience speakers: preparing for an interview or speech

Resource Review. In press 2018, the Journal of the Medical Library Association

2. CYBERSPACE Relevance to Sustainability? Critical Features Knowledge Aggregation and Facilitation Revolution Four Cases in the Middle East**

STRANDS AND STANDARDS

TOWN OF MORAGA ART IN PUBLIC SPACES POLICY

While entry is at the discretion of the centre, it would be beneficial if candidates had the following IT skills:

FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES

Christina Narensky, Psy.D.

Demystifying Creative Commons. Open textbooks are typically copyrighted as one of these:

0x1A Great Papers in Computer Security

Nitya Nanda. The Energy and Resources Institute (TERI)

Why the Hell Am I Playing This?

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Lesli K. Johnson Licensed Psychologist Licensed Independent Social Worker 17 Blue Line Drive Athens, Ohio (740)

THE OFFICIAL RULES OF THE 2017 FRIENDS OF THE FOX RIVER PHOTO CONTEST

Notice of Privacy Practices

Creative Rights Management for Intellectual Property in K-12

THE YEAR AHEAD A GOAL OR DREAM WITHOUT A PLAN IS JUST A WISH. I BELIEVE ANYTHING IS POSSIBLE IN LIFE WITH THE RIGHT PLAN.

Ethics of Data Science

Competition Manual. 11 th Annual Oregon Game Project Challenge

If this is you then let s get down to business and swat some buzz words.

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263

Web 2.0 in social science research

A Human Factors Approach to. Healthcare

V Grech. Publishing on the WWW. Part 1 - Static graphics. Images Paediatr Cardiol Oct-Dec; 2(4):

The Quest for the Perfect Search Engine: Values, Technical Design, and the Flow of Personal Information in Spheres of Mobility

FINDING & CITING IMAGES IN PAPERS & PRESENTATIONS

To participate in the Technology Fair the students will have to do the following:

The Official Rules of the HRM s

The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group

Category Discussion Guides

PAPILLON BRANDING AND SOCIAL MEDIA GUIDELINES

17.181/ SUSTAINABLE DEVELOPMENT Theory and Policy

Privacy Policy SOP-031

UCF Patents, Trademarks and Trade Secrets. (1) General. (a) This regulation is applicable to all University Personnel (as defined in section

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota

Identify and use a variety of media storage (cd, dvd, flash, cloud, and etc ) and rationalize their use for specific purposes

Pokémon Bank. Getting Started. Introduction. Passes. Using Pokémon Bank

Australia Council for the Arts. Artistic vibrancy. Self-reflection tool. Self-reflection tool 1

BIG IDEAS. Personal design choices require self-exploration, collaboration, and evaluation and refinement of skills. Learning Standards

F.A.Q. Card Holders & Merchants Card Holders

Fraunhofer ISI Seite 1

Doing Your Own PhotoVoice Project A Guide By Laura Lorenz, PhD and Barbara Webster

sencill abiert s de licencias CIUDAD DE MÉXIC CT 2, 2014

TRANSLATION OF GENOMICS FOR PATIENT CARE AND RESEARCH PATIENT S PERSPECTIVE

TRBOnet Mobile. User Guide. for Android. Version 2.0. Internet. US Office Neocom Software Jog Road, Suite 202 Delray Beach, FL 33446, USA

Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA Health Insurance Portability and Accountability Act (HIPAA)

TRBOnet Mobile. User Guide. for ios. Version 1.8. Internet. US Office Neocom Software Jog Road, Suite 202 Delray Beach, FL 33446, USA

POLICY PHILOSOPHY DEFINITIONS AC.2.11 INTELLECTUAL PROPERTY. Programs and Curriculum. APPROVED: Chair, on Behalf of SAIT s Board of Governors

BUILDING A COMPETITION ROBOT SESHAN BROTHERS

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Women into Engineering: An interview with Simone Weber

3D Bio printing. Nazrawit Mekonnen IT /29/15. "By placing this statement on my webpage, I certify that I have read and understand the GMU

Supplemental end user software license agreement terms

Nikon Photo Contest International

Internet, Human Rights and privacy

AUTOMATA What happens when your creation comes to life?

Copyright, Legal Notice and Disclaimer

The University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND

How To Create A Superstar Success Book

it has had almost 70 decades worth of workshops, each hosted in a small rural town of

The DR system in a suitcase for mobile X-ray

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media

Transcription:

Author(s): Paul Conway, PhD, 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution Share Alike 3.0 License: http://creativecommons.org/licenses/by-sa/3.0/ We have reviewed this material in accordance with U.S. Copyright Law and have tried to maximize your ability to use, share, and adapt it. The citation key on the following slide provides information about how you may share and adapt this material. Copyright holders of content included in this material should contact open.michigan@umich.edu with any questions, corrections, or clarification regarding the use of content. For more information about how to cite these materials visit http://open.umich.edu/privacy-and-terms-use. Any medical information in this material is intended to inform and educate and is not a tool for self-diagnosis or a replacement for medical evaluation, advice, diagnosis or treatment by a healthcare professional. Please speak to your physician if you have questions about your medical condition. Viewer discretion is advised: Some medical content is graphic and may not be suitable for all viewers.

Citation Key for more information see: http://open.umich.edu/wiki/citationpolicy Use + Share + Adapt { Content the copyright holder, author, or law permits you to use, share and adapt. } Public Domain Government: Works that are produced by the U.S. Government. (17 USC 105) Public Domain Expired: Works that are no longer protected due to an expired copyright term. Public Domain Self Dedicated: Works that a copyright holder has dedicated to the public domain. Creative Commons Zero Waiver Creative Commons Attribution License Creative Commons Attribution Share Alike License Creative Commons Attribution Noncommercial License Creative Commons Attribution Noncommercial Share Alike License GNU Free Documentation License Make Your Own Assessment { Content Open.Michigan believes can be used, shared, and adapted because it is ineligible for copyright. } Public Domain Ineligible: Works that are ineligible for copyright protection in the U.S. (17 USC 102(b)) *laws in your jurisdiction may differ { Content Open.Michigan has used under a Fair Use determination. } Fair Use: Use of works that is determined to be Fair consistent with the U.S. Copyright Act. (17 USC 107) *laws in your jurisdiction may differ Our determination DOES NOT mean that all uses of this 3rd-party content are Fair Uses and we DO NOT guarantee that your use of the content is Fair. To use this content you should do your own independent analysis to determine whether or not your use will be Fair.

3 SI 410 ETHICS AND INFORMATION TECHNOLOGY Week 10a: Privacy Reconsidered

THEMES Information privacy Self-identity and self-esteem Privacy and online identity management 4

Shoemaker Self-exposure and exposure of self (2010) PRIVACY RE-DEFINED 1. Privacy 2. Self-identity 3. Online identity Privacy is informational privacy Maintaining a zone of personal privacy Room for self-identity Autonomy ability to manage the public presentation of self-identity Are we more or less than our information? 5

Shoemaker Self-exposure and exposure of self (2010) PRIVACY RE-DEFINED 1. Privacy 2. Self-identity Theories of privacy and privacy rights: Control over zone of personal info 3. Online identity Limitation: restricted in certain contexts Restricted Access/Limited Control Protection from intrusion and information access by others in the context of a situation Loss of privacy = condition Violation of privacy = right Problem of privacy in public: what does Shoemaker mean by this issue? 6

Shoemaker Self-exposure and exposure of self (2010) VARIETIES OF SELF-IDENTITY 1. Privacy 2. Self-identity Identification Self determination and motivation 3. Online identity Narrative identity Self-told story of my life Mostly psychological properties Social identity Collective categories (kinds of persons) Personal dimensions Self-esteem identity Properties that ground emotions in stable ways 7

IDENTITY MANAGEMENT AND AUTONOMY 1. Privacy 2. Self-identity 3. Online identity Zone of identity protection is narrow Only properties of self-identity Managing public exposure Threats to autonomy Shoemaker Self-exposure and exposure of self (2010) Unable to do what I want with my self One has information privacy when one has control over the access to and presentation of (unrevealed) information about one s selfidentity. (p. 10) 8

Shoemaker Self-exposure and exposure of self (2010) DATA MINING EXAMPLE 1. Privacy 2. Self-identity 3. Online identity Data mining is patterning from publicly available bits of information. A modified control theory of identity Patterning is objectionable when: Unauthorized Construal of one s self-identity Correct and shameful Correct and prideful (not controlled) Incorrect Harm: undermined capacity to manage the presentation and public construal of one s self-identity Right: only if interest is strong enough 9

Brennan & Pettit, Esteem, Identifiability, and the Internet (2008) ANONYMITY AND THE INTERNET 1 Anonymity 2 Ethics 3 Esteem 4 Complications Esteem devolves to the avatar, whose reputation is a crucial factor in social relations Let s find some examples of high and low esteem situations Esteem for the avatar devolves to the owner The management of identities servers multiple needs of the owner 10

Brennan & Pettit, Esteem, Identifiability, and the Internet (2008) ESTEEM AND IDENTITY INTEGRATION 1 Anonymity 2 Ethics 3 Esteem 4 Complications Not always a good idea Online reputation can be higher than one s offline reality Personal advantage to separating identities Online avatars as a secret society with special benefits 11

12 Please see original image of William Haefeli s "What was the point of writing a blog nobody else could read? at The New Yorker, http://www.cartoonbank.com/2010/what-was-the-point-of-writing-a-blog-that-nobody-else-could-read/invt/135997/

AVATARS AND IDENTITY - COMPLICATIONS 1 Anonymity 2 Ethics 3 Esteem 4 Complications The use of avatars to project identity (self) The use of avatars to hide identity (self) What are the ethical consequences of this choice? If esteem can turn to dis-esteem, where does the harm lie? 13

Additional Source Information for more information see: http://open.umich.edu/wiki/citationpolicy Slide 12, Image 3: Please see original image of William Haefeli s "What was the point of writing a blog nobody else could read? at The New Yorker, http://www.cartoonbank.com/2010/what-was-the-point-of-writing-a-blog-that-nobodyelse-could-read/invt/135997/ 14 PAUL CONWAY Associate Professor School of Information University of Michigan www.si.umich.edu