Abstract
We consider the privacy of personal information on the World Wide Web, emphasizing a concept of privacy as an aspect of social relationships between individuals. We make three contributions to understanding the right to privacy on the Web: (1) we highlight the role of informed consent as an important consideration for privacy, (2) we identify conditions under which the collection and centralization of personal information can be ethically justified, and (3) we offer an interpretation of a "reasonable expectation of privacy" for Internet cookies, a mechanism used by Web sites to remember information about visits to that site.The views, opinions, and conclusions of this paper are not necessarily those of the University of Illinois. Preliminary versions of this paper were presented at the Seventh Annual Meeting of the Association for Practical and Professional Ethics, Dallas, TX, February 26[28, 1998, and the ACM Policy 98 Conference, Washington D.C., May 10-12, 1998.Address for correspondence: Michael C. Loui, Graduate College, 801 S. Wright Street, Champaign, IL 61820-6210, e-mail: [email protected], telephone: (217) 333-6715, fax: (217) 333-8019.
- 1 Morin, Richard, "Cruising the ...... in The ... Post lnternet..out warny, wasmngwn National Weekly Edition. June 23, 1997, page 35.Google Scholar
- 2 ivloor, james ra., lowarus a lneory of n: __ 111iniormaLiOll ill {lie /-xge, r rivacy Computers and Socie#. September 1997, pp. 27-32. r91 xvr .... o .... a r# ,, Google ScholarDigital Library
- 3 warren, oamueiL#, andLouis# " .. a_. ,,'T'L_ D'_L._ I"LI ... inC_L OLIIO#III#LII, L/. D{RIIL{eiS, I IIC l%l.#llk UJ r{lvat.y. Ferdinand David, ed., Philosophical Dimensions of Privacy: An Anthology, (-'___L_'J__ }k,f ... L .... (-'___L_:A__TT_: ... :#_D .. I#OA --_ "7# 1/#52 l-ic#, 13F. / .)-# kJkilllOllU#(3, IVlitbbiiL.llLlSCttb: #.,H.IIIL)IIU#C UIIIVUIblLy 15/O"-1, UO.Google Scholar
- 4 Fried, Charles. "Privacy." in Schoeman, Ferdinand David, ed., Philosophical .lift %Jd.lll L31 IU#IT, s..#al 111.31 lUg)k, .rl rt # rJ u tu#, , zJtrrtcrtaturta uj x ,#v, ty. University Press, 1984, pp. 203-222.Google Scholar
- 5 XYL#,-#-:,., A 1.,-. 1#' D,,: .... ./ C.,..,.-.l#.,.,., 1%1 .. V.-,,-b- A ,-K ... 1 QC"/ L.)j 1~!~%.,o1.111, 11Atall 1. I ! lllUl.ff UItCA# I ICC~.#UI~I} ~ #M, YV 1Oil'S, .L ILII#,II*.#U.III, I JUI ~Google Scholar
- 6 Beardsley, Elizabeth. "Privacy: Autonomy and selective disclosure,'> in Pennock, J.R .hA l \YT #k .. n .#A# AT.#,.# YTTT. D 4.,.., NT .. V,-.,-b. Arl#rtnn Pr,#cc 1 O71Google Scholar
- 7 Parent, W.A. "Privacy, Morality, and the Law," in Philosophy and Public Affairs, ~ ,,-,I 19 n,-, A 1:;oll l t)R:# nn 9#t'}_#RR ... , ... , ... i,-,.,., VV" ""'# ..Google Scholar
- 8 Gavison, Ruth. "Privacy and the Limits of Law," in johnson, Deborah G. and T-Tel@n 1#T1#cenl#a,lm oA# (-Tnmqnutpr~ 1#t#lir~ #.#nrin/ l/r#/,J#~ T Inner Raclclle River_ New jersey: Prentice Hail, i995, pp. jJ2-J)u.Google Scholar
- 9 'k/root Iame# M "The F rhic# nfPriwcv Prnrecrinn " in library Trand.c vnl qq. t-- a ... ,., ..... , .......... I ...... # ..... J .... ' ... ' nos. i and 2, Summer/Fall i 990, pp. 69-82.Google Scholar
- 10 Rzcheiv lame.# "Whv Privacy i# lmnortanr." in lahn.#on. Deborah G and Helen u- #a ..... ' .# ...... d ... ~ ... C .... , --- a ..... , Nissenbaum, eds., Computers, Ethics & Social Values. Upper Saddle River, New Jersey: Prentice Hall, !995, pp. 351-357.Google Scholar
- 11 Benn, Stanley I. "Privacy,rreectom, # ' and respect for persons, in acnoeman, Ferdinand David, ed., Philosophical Dimensions of Privacy: An Anthology, D .. L__'_J__ Xi_ _1 ..... # .. L_.'J__ il_." ... .'#_n .. #lo/, __ q'-)'# ")9/, /-. A. D-#,.9"-t. warn- pp. ivlassacllUSe{ts: 1-17C55, oriugc #lnvcrslty 70% #amoriL{gc, IGoogle Scholar
- 12 Faden, Ruth R. and Tom L. Beauchamp. A History and Theory ofln#rmed .... RT .. V--I. I#.~#.A T T--: ... :.-. D .. 1 DO/L k.#U{lJg{l#. INUW IUIK#, U.,KIUIH WlllVK;lbll.y 1.7)'OO,Google Scholar
- 13 Gorovitz, Samuel. "Informed Consent and Patient Autonomy," in Caliahan, Joan c# #a mh:.# r. ... "" Pro#ssi it/o .. #J., cu., #tr#tcttt xaattca trt onal r ~# # .. v_.l., c#.c_.a Wnivers l.,tl#. J.,#k.w iUll#. UAIUIU I Ik.Oo, 988, pp. 182-187.Google Scholar
- 14 rlAI T;A#. W'k.,,.i,#o AI,,,# K#f,#;#l 17.,;.,,-,.,. 7 .. k .. I kff.,,-,, (-'.,,-,-o,- D.,-.;,#.# kff ~,=o,-.,b t 1 "-xj J.#lU/-,, %..#lld.l ILO, I i.lO.ll l~lLl)lk, l, l.a~ l(#L1-al L.aM.I UL#-'I ~ hi, J.VI(I.I f %J61 U#.,l, X#.b#lli(l. ~VI. d#.O tdA{#, and Loren H. Roth. In#rmed Consent: A Stuei# in Decisionmakinz in Psychiat#. n,t=,, v.,t. Tr,# #,,;i~.,A O .. #o#A 1#1#.#~~ 1o1_1%. i 11#., UBIIIUI#.AL 1 l#..dld, lJUT.Google Scholar
- 15 Martin, Mike W. and Roland Schinzinger. Ethics in Engineering. McGraw-Hill P,,kllol-,ln,-, (-" .... 1 ORO i I.,kOlldLLJ.lll#) %..J#.#lll#./(#kll}, I }l J}.Google Scholar
- 16 johnson, Deborah G. ComPuter Ethics, 2nd ed., Upper Saddle River, New jersey, Prentice Ha!l, !994. Google ScholarDigital Library
- 17 Forester, Tom and Perry Morrison. Computer Ethics: Cautionary Tales andEthicai IDilvmma~ ;. C#mm, tina 9net ed Camhrictae_ Ma#ch#,#err#, The MTT Pre#. .......... "_t" ... "&, .... , O#, ................ ' i994. Google ScholarDigital Library
- 18 O,#aittner, Ja#h,,a "Invasion of Privacy" in Time, AL, gust 25, ! 997, pp. 28-35.Google Scholar
- 19 Barlow, john P. "Private Life in Cyberspace," in johnson, Deborah G. and Helen Nissenbaum, eds, Computer Ethics & Social Values, Upper Saddle River, New jersey: Prenticerlan, .. 1995, pp. 310-313.Google Scholar
- 20 Laudon, Kenneth C. Dossier SocieW Value Choices in the Design of National T__Z"_ .,:___ o ... kT_ '%T_._I_ ,~-#_1 ... k-'_ IT_-" ... .'--_ TI .. ('tO{ 9/'% IOYK: #OO. L, OlUInOla Du Jnjormarwn oysrem5, in ew U lliVe{sl ty r ross, I Google ScholarDigital Library
- 21 Shattuck, John. "Computer Matching is a Serious Threat to Individual Rights," ill T_L .. 1-#_L _-_L t"# _--A LI_I __ 1%.T: .. L ... A- N ...... #/,Otcau*l-'-" #.#")# Out/atC--''l UUb., UCLIUIH.I.I #J. dilL{ KICICII INIS,.NCIIURUIII, J 011115011, Values. Upper Saddle River, New Jersey: Prentice Hall, 1995, pp. 305-309. r,-1,-i1 ~"#.1___ X,f I __,.1 T_T l C#:,-L "T ... I#,T__I .. I .. l._l ... L._IA# #iGoogle Scholar
- 22 bUlllkt, ll, ivi.j, dllU 1 l.j. Olllltll. butua lVlilllkCtpliik, ia. I iuuai;llul#a.. M#,,# ,,s Information Privacy. Concerns," in Johnson, Deborah G. and Helen Nissenbaum, #A# I# ... ,,#_. 12+h'#.J#q#;#ll/.L,. IT .. (2.AAI.#D; .. N.T .. j D,-,#,#,-;,-= #u#., #,,,{,,,c,,, vt , ersey: ~ ,#,,t.# Hail, 1995, pp. 269-277.Google Scholar
- 23 #----#roal "XX#ere is our Data?" in &cure Compudng: .... TD, Magazine #r tlo, ProtecHon of information., August l #/, pp. i 8-22.Google Scholar
- 24 Hunter, Larry. "p,,hl;~ lmag# " in Johnson, Deborah G. and Helen Nissenbaum, eds., Computers, Ethics & Social "values. Upper Saddle River, New jersey: Prentice Mall l qqq nn ?t')#-?qR .. ' .. # UtGoogle Scholar
- 25 Parker, Donn B., Ethical Conflicts in Computer Science and Technology, Arlington, Virginia: AF!PS Press, !979.Google Scholar
- 26 "fibre, Willis H., "The New Faces of Privacy," in The information Socie{y, vol. 9, ! 993, pp. ! 95-211. A 1 . n_: ~ n I 17(#1_ _11 ... CGoogle Scholar
- 27 Nissenbaum, Helen. "Toward an #pproacn t'rivacy in Ol YUDIIC: to k.,ll#l.lleDg#S Information Technolo#," in Ethics and Behavior. vol. 7, no. 3, 1997, pp. 207- 219.Google ScholarCross Ref
- 28 Gerety, Tom. "Redefining Privacy," in Harvard Civil Rights- Civil Liberties Law /3_.: .... 1 -- 2, 1 (#--/.-/ #v#w, vo,. 12, .o. #,//.Google Scholar
- 29 Malcolm's Guide to Persistent Cookies http://www.em~net/.-mal/cookiesinfo.htmiGoogle Scholar
- 30 #qdy ta#D ~'#^^1.:# NT ... L. .. // .... :!1.--; ..... /...-.I.;.# ,C-.,-,.; Lo#Jf:2/#l 'S ~ ~ I I I %.#UUI%J.IL, i "NULls.}. 111.1.1.3.11 w w 10~.IIIUllIIII(:IL1.UO.M, ka)III/ #i.,ta)Ulklt..l#.#)lGoogle Scholar
- 31 Mayer-Schoenberger, Viktor. "The Internet and Privacy. Legislation: Cookies for d. 1 lK.d.1.i lit w#,.)l, r t~#)#~ttuj u#~ ctub uj #),, y UI. I, zool.,i.t# 1, XVlOLI M, IX I / , 1997, at http://www.wvjoit.wvu.edu/wvjoit/current/issue 1/articles/mayer/ llldy M.I,II 1-111,Google Scholar
- 32 Cranor, Lorrie Faith. "'The Role of Technoiogy in Seif Reguiatory Privacy Regimes," .... A ~,-,,. ,-I# NT.,t;,-,n.d T,4 .... ;,-,#r; ... A ln#r#rmqtinn AAmlnlcrr.#rlnn l.Jll#.~-- #l%.#u llk#I 1.11%.# .1. lllOklk.llk#lll#.l. Jl#l#l.#lk.#llllllL.lkllll#.l#lLlllkJlld I#kllll.l l.LlJklk.#llllKll-lk-l%JJl*l .# #k#. .... OIk.lK.II.#l%.#all., December i 996, at http://www.research.att.com/-iorrie/pubs/NTiA.htmi. 3 iGoogle Scholar
- 33 rag,1 (-'#-#n{r,=l qi ... ;r}# (-#.n# qna#4"nrA lo{/rv}a qamxritm .1.,.} I'#nmmarea CI'R#Illy Ld.,,j #.a#.#,l# ... , ,_., .......... V ......... ")' ........ , v = , Associates, inc., i997. Google ScholarDigital Library
- 34 .{#}*, ... pd .... # ..... r;o, at http://#.cookiecentral.com/javacoo#A.htm.Google Scholar
- 35 johnson, Deborah G. and Helen Nissenbaum, eds, Computers Ethics & Social l/a/,xa~_ 1 Inner SactAle River. New Jersey: Prentice Hall. 1995. Google ScholarDigital Library
- 36 Nissenbaum, Helen, "Can We Protect Privacy in Public?" in ACM SIGCAS Con#rence in Computer Ethics. June 1997, Rotterdamn, The Netherlands. ~ T ,,'I"I7"7"1Google Scholar
- 37 Moor, james, m., wnat is Computerr_.mlcs, ... in jonnson, ....... weooran v,. and Helen Nissenbaum, eds., Computers~ Ethics~ & Social Values. Upper Saddle River, XT t _ n ... : t t _11 nn# e#ew jersey: rrenuce man, I :,v.#, pp. 7-14.Google Scholar
Index Terms
- Taking the byte out of cookies: privacy, consent, and the Web
Recommendations
An Empirical Study of Web Cookies
WWW '16: Proceedings of the 25th International Conference on World Wide WebWeb cookies are used widely by publishers and 3rd parties to track users and their behaviors. Despite the ubiquitous use of cookies, there is little prior work on their characteristics such as standard attributes, placement policies, and the knowledge ...
Cookies That Give You Away: The Surveillance Implications of Web Tracking
WWW '15: Proceedings of the 24th International Conference on World Wide WebWe study the ability of a passive eavesdropper to leverage "third-party" HTTP tracking cookies for mass surveillance. If two web pages embed the same tracker which tags the browser with a unique cookie, then the adversary can link visits to those pages ...
Cookies and Web browser design: toward realizing informed consent online
CHI '01: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsWe first provide criteria for assessing informed consent online. Then we examine how cookie technology and Web browser designs have responded to concerns about informed consent. Specifically, we document relevant design changes in Netscape Navigator and ...
Comments