The Aesthetics of Online Privacy: Do We Communicate Context through Interface Design?

By Stevens, J. Richard | Forum on Public Policy: A Journal of the Oxford Round Table, Spring 2008 | Go to article overview

The Aesthetics of Online Privacy: Do We Communicate Context through Interface Design?


Stevens, J. Richard, Forum on Public Policy: A Journal of the Oxford Round Table


Introduction

In recent years, the intersection between privacy and new technologies continues to be a critical area of controversy and debate in American political and cultural discussions. Thousands of books related to privacy are released every year. A March 2004 search on Amazon.com for books containing the word "privacy" yielded a results page containing 45,751 items, a repeat search in March 2008 yielded 184,398 books (a more than four-fold increase in as many years). Privacy literature would appear to be growing exponentially.

Privacy has many meanings. For some, privacy is a matter of restricting access to individuals within society. (2) For others, privacy is about personal autonomy and control of one's body. (3) And within each of these categories exist several sub-groupings of issues. Within the ranks of the access-based privacy advocates some argue for protection of one's image, others for data protection and still others for the safeguarding of space. Within the ranks of the autonomy-based privacy advocates, some argue for abortion rights, some for medical rights and others for DNA genome protections.

This work is an attempt to demonstrate how interface design is often used to exploit confusion among data consumers about what constitutes privacy, leading many to disclose their valuable data for little, if any, compensation. In order to grasp how privacy norms are manipulated in online environments, it will be necessary to examine what role contextual clues play in the information disclosure decisions of Internet users.

Rosen described privacy in terms of context, as decisions concerning information disclosure depend heavily on the circumstances, audience and perceived implications of the disclosure. (4) Palen and Dourish argue that privacy in networked contexts is a negotiated process conditioned by the expectations and experiences of the disclosing users. (5)

   Dey, Abowd and Salber defined context as

   any information that can be used to characterize the situation of
   entities (i.e., whether a person, place, or object) that are
   considered relevant to the interaction between a user and
   an application, including the user and the application themselves.
   Context is typically the location, identity, and state of the
   people, groups, and computational and physical
   objects". (6)

Grudin presented an example of how changes in the context of information dissemination through aggregation of a search engine for a newsgroup called Deja News altered the experience of newsgroup readers, as one put it "we were discovering things about our colleagues that we didn't want to know." (7)

Privacy attitudes are neither static nor inflexible. When people see that the potential benefits for an information transaction outweigh the potential risks, they voluntarily adjust their privacy comfort levels. (8) Stutzman surveyed 200 students and found that while students tend to view protecting their identity information online as important and cite concerns about the consequences of sharing information, they do not feel their online identity is well-protected nor do they plan to curb their future disclosure activities. (9)

McMillan and Morrison used qualitative analysis to show that college students increasingly rely on Internet technology in each of four primary domains (self, family, real communities and virtual communities). (10) But the relationships maintained in each of these domains can be quite different, and the information disclosure decisions would hardly be consistent between domains. Context would appear to be rather important to how students manage personal information.

Interface design is defined by Steven Johnson as producing "software that shapes the interaction between user and computer. The interface serves as a kind of translator, mediating between the two parties making one sensible to the other." (11) Manuel Castells describes the back end of digital architecture as "unseen logic of the meta-network, where value is produced, cultural codes are created and power is decided. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA 8, MLA 7, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Note: primary sources have slightly different requirements for citation. Please see these guidelines for more information.

Cited article

The Aesthetics of Online Privacy: Do We Communicate Context through Interface Design?
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen
Items saved from this article
  • Highlights & Notes
  • Citations
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA 8, MLA 7, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Search by... Author
    Show... All Results Primary Sources Peer-reviewed

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.