Professional Documents
Culture Documents
Privacy in Context: Technology, Policy, and The Integrity of Social Life
Privacy in Context: Technology, Policy, and The Integrity of Social Life
BOOK REVIEW
HELEN NISSENBAUM
149
VOL. 1
150
that threaten privacy. Each of the chapters contributes illustrations of how information technologies and
socio-technical systems affect the flow of private information and cause privacy concerns. At the beginning,
the author effectively presents different modalities of monitoring and tracking technologies, and captures the
fact that advances in digital media have escalated public concerns about privacy. The following chapter covers
the technological capacities to aggregate and analyze personal information through database technologies.
The last chapter of Part I raises issues related to distributing, disclosing, and spreading the capacity of digital
information technologies, mostly regarding the Internet and its services such as Google Street View and
Facebook.
Part II provides some of the most significant and influential scholarly contributions to discussions of privacy,
focusing on what privacy is and why it matters. Chapters 4 and 5 offer theoretical explanations on how the
concept of privacy has been connected to rights and values. Chapter 5 in particular discusses the
public/private dichotomy as the foundation for a right to privacy, which becomes the theoretical basis to
advance Nissenbaums observation and evaluation of privacy concerns presented by socio-technical systems.
The authors discussion distinguishes three dimensions of privacy in an effort to articulate a right to privacy
within the public/private dichotomy: (1) actors, divided into governmental and private actors; (2) realm,
divided into the public and the private; and (3) information, divided into the public and the personal.
However, throughout Chapter 6 the author reveals some of the paradoxes, discontinuities, and trade-offs
around the right to privacy and the moral significance of privacy in digitized socio-technical systems as well as
our personal practices. Accordingly, the author urges an appreciation of the concept of privacy in public to
better understand and interpret privacy in digitized media environments.
Finally, Part III introduces Nissenbaums key theoretical proposition, contextual integrity, to serve as a
foundation for the framework of contemporary socio-technical systems. The framework of contextual
integrity essentially advocates the notion of appropriateness. Here appropriateness is conceptually
associated with a context and an informational norm. The author introduces these principle notions in
Chapter 7. Contexts and informational norms have been elaborated through the various social theories and
philosophies of Paul DiMaggio, Pierre Bourdieu, and Theodore Schatzki. Contexts are recognized as
abstract representations of social structures experienced in daily life. Informational norms are characterized
by four key parameters: contexts, actors, attributes, and transmission principles, and are context-relative in
essence. Context-relative or context-appropriate flow of personal information is the central notion of the
contextual integrity proposition. The author presents the framework of contextual integrity as a model for
understanding and predicting reactions to alterations in information practices. Meanwhile, the following
chapters develop normative supports for the framework of contextual integrity with prescriptive guides.
Nissenbaums ultimate thesis is that a right to privacy is neither a right to secrecy nor a right to control but a
right to appropriate flow of personal information. In this regard, the author positions herself on the side of
the openness of information rather than the restriction of information. However, the questions the author
tries to pose are substantially matters of the context within which personal information is generated,
processed, and distributed through digitized media environments. Thus, fundamentally, it is all about the
social and political legitimacy of the flows of personal information in an information network susceptible to
privacy intrusion.
Specifically, it is a common conception that digitization of media has opened a whole new sphere in every
aspect of information processing, and has improved the accessibility and availability of information.
Accessibility and availability of information are contingent upon the vulnerability of a personal right to
VOL. 1
151
privacy. For instance, the general public consumes a variety of digital utilities at the cost of their privacy on
social networking sites, location-based smart phone applications, and so forth. Regardless of the willingness
to relinquish privacy, the users consent is forced in order to benefit from technological systems.
Furthermore, the staggering discourses on fiber-optic broadband, 4G wireless networks, and cloud
computing urge us to reexamine the validity of the current framework of understanding privacy concerns in
the digital age, and there are critical implications for public policy in protecting privacy. Therefore,
Nissenbaums efforts to attract attention to privacy concerns, and to elaborate a new framework, are not only
appropriate but also timely.
Reviewed by Sangyong Han
Doctoral Candidate, College of Communications
Pennsylvania State University