Privacy Lost
Privacy Lost: How Technology is Endangering Your Privacy is a non-fiction book by David H. Holtzman, a technologist and privacy expert.[1] The book is an examination into the effect that technology is having and will have on human society. The book was released in September, 2006.
The book, authored by Holtzman, adopts a conversational writing style and is intended for a general readership. The central argument advanced in the book posits that a significant portion of the populace remains oblivious to the extent of data being collected about them and fails to comprehend the implications of such data when analyzed en masse. The book serves as a survey of the theoretical evolution of privacy, the contemporary state of societal attitudes towards privacy, and the ramifications of technological advancements on privacy. The overall message of the book is one of caution, warning of the potential hazards that could emerge if current trends continue.
Summary[edit]
Holtzman divides Privacy Lost into six sections:
- Privacy Invasions Hurt – Examines the damages caused by the loss of privacy, including descriptions of the “Seven Sins Against Privacy” and the collateral damage this loss causes society.
- Why Technology is Key – The history behind Americans’ concept of privacy, how and why technology affects privacy, and how new forms of technology create new types of crimes.
- Privacy in Context – Inspects the relationship between privacy and the law, identity and culture in a technological world.
- The Technology Eroding Privacy – Discusses the voyeurism of surveillance technology and the virtual “stalking” capabilities allowed by networks, tags and locators.
- The Watchers – Takes a close look at the two main culprits invading Americans’ privacy: corporate marketers and the U.S. Government.
- What Can Be Done? – What the future holds in store for our privacy, including ways our privacy can be safeguarded and a call to action for all those who feel troubled by the path down which our privacy is being led, including how to “fight back”.
Sins against privacy[edit]
Holtzman starts by laying out what he describes as the "Seven Sins" against privacy and prescribes 'commandments' which correlate to each. The sins are as follows:
- The Sin of Intrusion – Commandment: Don't spy on me just because you can.
- The Sin of Latency – Commandment: Thou shall erase my data.
- The Sin of Deception – Commandment: Keep my information to thyself.
- The Sin of Profiling – Commandment: Don't judge me by your data.
- The Sin of Identity Theft – Commandment: Protect my data as if it were thine own.
- The Sin of Outing – Commandment: I am who I say I am.
- The Sin of Lost Dignity – Commandment: Don't Humiliate me with my private information.
Terminology introduced[edit]
- Warhol – Internet celebrities, people raised to celebrity status in small subsections because of their activity online on sites like YouTube and Myspace—based on the phrase fifteen minutes of fame, coined by American avant-garde artist Andy Warhol. E.g., Kibo, lonelygirl15, Brooke Brodack, and Christine Dolce, a.k.a. "ForBiddeN."
- Panopticon – The point in the future at which we are all observed without our knowledge – based on a prison designed by 18th century British philosopher Jeremy Bentham.
- Puppetry – Unapproved use of another person’s virtual identity.
- Taggles – a “gaggle of tags” – A hypothetical situation in which real world tags (e.g., RFID tags) can track a person’s journey through the day while also connecting to databases which connect the tagged object (e.g., clothing) to the owner.
- Golem Porn – Simulated pornography either entirely digitized or with real faces grafted on to bodies to which they do not belong.
Strategies for resisting privacy violations[edit]
Holtzman lays out five profiles which he describes as archetypes of how people cope with the coming omnipresence of surveillance and database technology.
- The Ignorer – Ignorers pretend there is no problem… Not an effective long term strategy.
- The Avoider – Avoiders duck situations in which they have to give out personal information. This strategy works less well after 9/11 and will become less effective with time.
- The Deceiver – The deceiver lies. It works for now, but as databases are becoming cross-linked, soon liars will be caught by technological double-checking and force to authenticate with real info.
- The Curmudgeon – Curmudgeons refuse to give out information. This includes avoiding the use of technologies which are easily spied upon. This strategy is increasingly ineffective with the pervasiveness of wireless internet, cordless phones, and electronic communication (e.g., Skype). The curmudgeon never puts their SSN on any form except for a mandatory government form.
- The Vigilante – Vigilantes strike back. They put up websites talking about experiences with vendors, and track down scam artists on their own. In the future they will strike back against spammers with Denial-of-Service attacks, viruses, spear phishing, and other forms of digital retribution.
References[edit]
- ↑ Lustig, Natalie (March 11, 2007). "Author details how technology erodes your privacy". Pittsburgh Post-Gazette. p. 43.
External links[edit]
Other articles of the topic Books : Books, Style guide
Some use of "" in your query was not closed by a matching "".Some use of "" in your query was not closed by a matching "".
This article "Privacy Lost" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:Privacy Lost. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.