Information privacy and social self-Authorship

Research output: Contribution to journalArticle

1 Scopus citations

Abstract

The dominant approach in privacy theory defines information privacy as some form of control over personal information. In this essay, I argue that the control approach is mistaken, but for different reasons than those offered by its other critics. I claim that information privacy involves the drawing of epistemic boundaries boundaries between what others should and shouldn't know about us. While controlling what information others have about us is one strategy we use to draw such boundaries, it is not the only one. We conceal information about ourselves and we reveal it. And since the meaning of information is not self-evident, we also work to shape how others contextualize and interpret the information that they have about us. Information privacy is thus about more than controlling information; it involves the constant work of producing and managing public identities, what I call "social self-Authorship." In the second part of the essay, I argue that thinking about information privacy in these terms reveals threats to privacy that the control approach neglects. Namely, information technology makes social self-Authorship invisible and unnecessary by making it difficult for us to know when others are forming impressions about us and by providing others with tools for making assumptions about who we are which obviate the need for our involvement in the process.

Original languageEnglish (US)
Pages (from-to)216-239
Number of pages24
JournalTechne: Research in Philosophy and Technology
Volume20
Issue number3
DOIs
StatePublished - 2016

All Science Journal Classification (ASJC) codes

  • Philosophy
  • History and Philosophy of Science

Fingerprint Dive into the research topics of 'Information privacy and social self-Authorship'. Together they form a unique fingerprint.

Cite this