Skip to main content
Top
Published in: Ethics and Information Technology 4/2018

25-09-2018 | Original Paper

Treating sensitive topics online: a privacy dilemma

Author: Paula Helm

Published in: Ethics and Information Technology | Issue 4/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. In this debate, my research is focused on what I refer to as “self-determined groups” which can be defined as groups whose members consciously and willingly perceive themselves as being part of a communicative network. While much attention is given to new forms of algorithmically generated groups, current research on group privacy fails to account for the ways in which self-determined groups are affected by changes brought about by new information technologies. In an explorative case study on self-organized therapy groups, I show how these groups have developed their own approach to privacy protection, functioning on the basis of social practices followed by all participants. This informal approach was effective in pre-digital times, but online, privacy threats have reached a new level extending beyond the scope of a group’s influence. I therefore argue that self-determined sensitive topic groups are left facing what I present as a dilemma: a tension between the seemingly irreconcilable need for connectivity and a low threshold, on the one hand, and the need for privacy and trust, on the other. In light of this dilemma, I argue that we need new sorts of political solutions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
For example, companies such as Cambridge Analytica or Deep Roots Analytics have recently developed tools that are explicitly intended to analyze group-related communications.
 
2
For more far-reaching discussions on the matter of sensitive data, see, for example Wacks (1989), who seeks to establish a foundational definition of “sensitive information;” Fried (1968), who argues for the protection of a socially determined kernel of sensitive information; or Gerety (1977), who suggests limiting privacy rights to information that is sensitive and Ohm (2015), who proposes defining sensitive data in terms of the risk of privacy harm that can be caused by the data.
 
3
In order to gain access to the unpublished papers documenting A.A. history and internal correspondence you are required to submit an official request to the General Service Offices of A.A. in New York stating motive and intention. Assuming you are granted access, you then have to appear in person at the Offices where you are handed the relevant archive folders to be examined in situ.
 
4
An exhaustive list of all meetings observed can be found in Appendix to this article.
 
5
“Sharing” means that individual members recount their experience of their disease, the solutions they found while struggling with their recovery process, as well as the emotions and break-downs they went through.
 
6
1992 The A.A. Message in a changing World; 1996 Preserving our Fellowship—Our Challenge, 1999—Trusting Our Future to A.A. Principles, 2011—We are Responsible for A.A.’s Future—Let it Begin With Us, 2013—Anonymity: Our Spiritual Responsibility in the Digital Age 62nd GSC.
 
8
Namely, an open source software called “ghostery.” For more information, see: https://​www.​ghostery.​com/​about-ghostery/​.
 
9
By horizontal privacy intrusions I mean intrusions relating to actors with equally distributed power resources, and by vertical privacy intrusions I mean intrusions that involve power asymmetries that are structurally embedded (Masur et al. 2017, 180 ff.).
 
10
Social swarms have been defined as a “heterogeneous whole” characterized by their decentralized, interconnected, intelligent networks of independent but interconnected actors (Thacker 2004).
 
11
This sentence has been suggested by one of the anonymous reviewers whom I thank very much for his/her advices and ideas on this piece.
 
13
This finding is based on information provided by the “Ghostery” software, for more information, see fn. 8.
 
Literature
go back to reference Acquisti, A., & Gross, R. (2005). Information revelation and privacy in online social networks. In R. Gross & A. Acquisti. Proceedings of the 2005 Workshop on Privacy in the Electronic Society (WPES), ACM (pp. 71–80). Acquisti, A., & Gross, R. (2005). Information revelation and privacy in online social networks. In R. Gross & A. Acquisti. Proceedings of the 2005 Workshop on Privacy in the Electronic Society (WPES), ACM (pp. 71–80).
go back to reference Acquisti, A., & Gross, R. (2009). Information revelation and privacy in online social networks. In D. Matheson (ed), Contours of privacy. Cambridge: Cambridge Scholars Publishing. Acquisti, A., & Gross, R. (2009). Information revelation and privacy in online social networks. In D. Matheson (ed), Contours of privacy. Cambridge: Cambridge Scholars Publishing.
go back to reference Acquisti, A., Stutzan, F., & Gross, R. (2012). Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality,2, 7–41. Acquisti, A., Stutzan, F., & Gross, R. (2012). Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality,2, 7–41.
go back to reference Alcoholics Anonymous. (1935–1939). Folder: ‘Correspondences 1935–1939’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices. Alcoholics Anonymous. (1935–1939). Folder: ‘Correspondences 1935–1939’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices.
go back to reference Alcoholics Anonymous. (1935–1955). Folder: ‘Anonymity Breaches’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices. Alcoholics Anonymous. (1935–1955). Folder: ‘Anonymity Breaches’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices.
go back to reference Alcoholics Anonymous. (1957). Alcoholics anonymous comes of age. New York: The Grapevine Inc. Alcoholics Anonymous. (1957). Alcoholics anonymous comes of age. New York: The Grapevine Inc.
go back to reference Alcoholics Anonymous. (2013). The A.A. service manual. Twelve concepts for world service. New York: The A.A. Grapevine, Inc. Alcoholics Anonymous. (2013). The A.A. service manual. Twelve concepts for world service. New York: The A.A. Grapevine, Inc.
go back to reference Altman, I. (1975). The environment and social behavior. Monterey: Brooks and Cole. Altman, I. (1975). The environment and social behavior. Monterey: Brooks and Cole.
go back to reference Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday. 11(9). Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday. 11(9).
go back to reference Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement (pp. 44–75). New York: Cambridge University Press.CrossRef Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement (pp. 44–75). New York: Cambridge University Press.CrossRef
go back to reference Becker, C., & Seubert, S. (2016). Privatheit, kommunikative Freiheit und Demokratie. Datenschutz und Datensicherheit, 1/2016, 73–78.CrossRef Becker, C., & Seubert, S. (2016). Privatheit, kommunikative Freiheit und Demokratie. Datenschutz und Datensicherheit, 1/2016, 73–78.CrossRef
go back to reference Betancourt, M. (2016). The critique of digital capitalism: An Analysis of the political economy of digital culture and technology. Brooklyn: Punctum Books. Betancourt, M. (2016). The critique of digital capitalism: An Analysis of the political economy of digital culture and technology. Brooklyn: Punctum Books.
go back to reference Bloustein, E. (1978). Individual and group privacy. New Brunswick: Transaction Books. Bloustein, E. (1978). Individual and group privacy. New Brunswick: Transaction Books.
go back to reference Boyd, D, & Marwick, A. E. (2014). Networked privacy: How teenagers negotiate context in social media. New Media + Society, 16(7), 1051–1067.CrossRef Boyd, D, & Marwick, A. E. (2014). Networked privacy: How teenagers negotiate context in social media. New Media + Society, 16(7), 1051–1067.CrossRef
go back to reference Bryant, A. (2007). Grounded theory in historical perspective: An epistemological account. In A. Bryant & K. Charmaz (Eds.), The SAGE handbook of grounded theory (pp. 31–57). Los Angeles: Sage.CrossRef Bryant, A. (2007). Grounded theory in historical perspective: An epistemological account. In A. Bryant & K. Charmaz (Eds.), The SAGE handbook of grounded theory (pp. 31–57). Los Angeles: Sage.CrossRef
go back to reference Cohen, J. (2012). Configuring the networked self: Law, code and the play of everyday practice. New Haven: Yale University Press. Cohen, J. (2012). Configuring the networked self: Law, code and the play of everyday practice. New Haven: Yale University Press.
go back to reference Colman, C., & Laenen, F. (2012). “Recovery Came First”: Desistance versus recovery in the criminal careers of drug using offenders. The Scientific World Journal: 1–9.CrossRef Colman, C., & Laenen, F. (2012). “Recovery Came First”: Desistance versus recovery in the criminal careers of drug using offenders. The Scientific World Journal: 1–9.CrossRef
go back to reference De Wolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454.CrossRef De Wolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454.CrossRef
go back to reference Dourish, P., & Palen, L. (2003). Unpacking “Privacy” for a Network World. Computer Human Interaction, 5(1), 129–136. Dourish, P., & Palen, L. (2003). Unpacking “Privacy” for a Network World. Computer Human Interaction, 5(1), 129–136.
go back to reference Dumsday, T. (2009). Anonymity and privacy: Conceptual links and normative implications. In D. Matheson (Ed.), Contours of privacy (pp. 71–84). Cambridge: Cambridge Scholars Publishing. Dumsday, T. (2009). Anonymity and privacy: Conceptual links and normative implications. In D. Matheson (Ed.), Contours of privacy (pp. 71–84). Cambridge: Cambridge Scholars Publishing.
go back to reference Etzioni, A. (1999). The limits of privacy. New York: Basic Books. Etzioni, A. (1999). The limits of privacy. New York: Basic Books.
go back to reference Floridi, L. (2014). Open data, data protection and group privacy. Philosophical Technology, 27(1), 1–3.CrossRef Floridi, L. (2014). Open data, data protection and group privacy. Philosophical Technology, 27(1), 1–3.CrossRef
go back to reference Floridi, L. (2017). Group privacy: A defence and an interpretation. In L. Taylor, L. Floridi & L. B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 83–100). New York: Springer. Floridi, L. (2017). Group privacy: A defence and an interpretation. In L. Taylor, L. Floridi & L. B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 83–100). New York: Springer.
go back to reference Frois, C. (2009). The anonymous society: Identity, transformation and anonymity in 12 steps. Cambridge: Cambridge Scholars Publishing. Frois, C. (2009). The anonymous society: Identity, transformation and anonymity in 12 steps. Cambridge: Cambridge Scholars Publishing.
go back to reference Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220–237.CrossRef Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220–237.CrossRef
go back to reference Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media, 13(2), 139–159.CrossRef Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media, 13(2), 139–159.CrossRef
go back to reference Gerety, T. (1977). Redefining privacy. Harvard Civil Rights-Civil Liberties Law Review, 12, 233–296. Gerety, T. (1977). Redefining privacy. Harvard Civil Rights-Civil Liberties Law Review, 12, 233–296.
go back to reference Habermas, J. (1990). Strukturwandel der Öffentlichkeit: Untersuchungen zu einer Kategorie der bürgerlichen Gesellschaft. Frankfurt: Suhrkamp. Habermas, J. (1990). Strukturwandel der Öffentlichkeit: Untersuchungen zu einer Kategorie der bürgerlichen Gesellschaft. Frankfurt: Suhrkamp.
go back to reference Habermas, J. (1992). Faktizität und Geltung - Beiträge zur Diskurstheorie des Rechts und des demokratischen Rechtsstaats. Frankfurt: Suhrkamp. Habermas, J. (1992). Faktizität und Geltung - Beiträge zur Diskurstheorie des Rechts und des demokratischen Rechtsstaats. Frankfurt: Suhrkamp.
go back to reference Helm, P. (2016a). Group privacy in times of big data. Digital Culture and Society, 2(2), 137–152.CrossRef Helm, P. (2016a). Group privacy in times of big data. Digital Culture and Society, 2(2), 137–152.CrossRef
go back to reference Helm, P. (2016b). Suchtkultur und Gruppentherapie: Vom anonymen Ich zum anonymen Wir. Wiesbaden: Springer. Helm, P. (2016b). Suchtkultur und Gruppentherapie: Vom anonymen Ich zum anonymen Wir. Wiesbaden: Springer.
go back to reference Honneth, A. (1992). Integrity and disrespect: Principles of a conception of morality based on the theory of recognition. Political Theory, 20(2), 187–201.CrossRef Honneth, A. (1992). Integrity and disrespect: Principles of a conception of morality based on the theory of recognition. Political Theory, 20(2), 187–201.CrossRef
go back to reference Kühl, S. (2014). Gruppen, Organisationen, Familien und Bewegungen. Zur Soziologie mitgliedschaftsbasierter Systeme zwischen Interaktion und Gesellschaft. Zeitschrift für Soziologie. Sonderheft Interaktion - Organisation - Gesellschaft revisited (pp. 65–85). Kühl, S. (2014). Gruppen, Organisationen, Familien und Bewegungen. Zur Soziologie mitgliedschaftsbasierter Systeme zwischen Interaktion und Gesellschaft. Zeitschrift für Soziologie. Sonderheft Interaktion - Organisation - Gesellschaft revisited (pp. 65–85).
go back to reference MacKinnon, C. (1989). Toward a feminist theory of the state. Cambridge: Harvard University Press. MacKinnon, C. (1989). Toward a feminist theory of the state. Cambridge: Harvard University Press.
go back to reference Mantelero, A. (2016). Personal data for decisional purposes in the age of analytics: From an individual to a collective dimension of data protection. Computer Law and Security Review, 32(2), 238–255.CrossRef Mantelero, A. (2016). Personal data for decisional purposes in the age of analytics: From an individual to a collective dimension of data protection. Computer Law and Security Review, 32(2), 238–255.CrossRef
go back to reference Mantelero, A. (2017). From group privacy to collective privacy: Towards a new dimension of privacy and data protection in the big data era. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 139–158). New York: Springer. Mantelero, A. (2017). From group privacy to collective privacy: Towards a new dimension of privacy and data protection in the big data era. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 139–158). New York: Springer.
go back to reference Masur, P., Teutsch, D., Dienlin, T., & Trepte, S. (2017). Online-Privatheitskompetenz und deren Bedeutung für demokratische Gesellschaften. In S. Seubert & P. Helm (Eds.), Privatheit und Demokratie. FJSB (pp. 180–189). Masur, P., Teutsch, D., Dienlin, T., & Trepte, S. (2017). Online-Privatheitskompetenz und deren Bedeutung für demokratische Gesellschaften. In S. Seubert & P. Helm (Eds.), Privatheit und Demokratie. FJSB (pp. 180–189).
go back to reference Matthews, S. (2010). Anonymity and the social self. American Philosophical Quarterly, 47(4), 351–363.MathSciNet Matthews, S. (2010). Anonymity and the social self. American Philosophical Quarterly, 47(4), 351–363.MathSciNet
go back to reference Mittelstadt, B. (2017). From individual to group privacy in big data analytics. Philosophy & Technology, 30(4), 475–494.CrossRef Mittelstadt, B. (2017). From individual to group privacy in big data analytics. Philosophy & Technology, 30(4), 475–494.CrossRef
go back to reference Nissenbaum, H. (1999). The meaning of anonymity in an information age. The Information Society 15(2):141–144.CrossRef Nissenbaum, H. (1999). The meaning of anonymity in an information age. The Information Society 15(2):141–144.CrossRef
go back to reference Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford University Press. Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford University Press.
go back to reference Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57(6), 1701–1777. Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57(6), 1701–1777.
go back to reference Ohm, P. (2015). Sensitive information. Southern California Law Review, 88, 2–55. Ohm, P. (2015). Sensitive information. Southern California Law Review, 88, 2–55.
go back to reference Pateman, C. (1989). Feminist critiques of the public/private dichotomy. In C. Pateman (Ed.), The disorder of women. Democracy, feminism and political theory (pp. 118–140). Stanford: Stanford University Press. Pateman, C. (1989). Feminist critiques of the public/private dichotomy. In C. Pateman (Ed.), The disorder of women. Democracy, feminism and political theory (pp. 118–140). Stanford: Stanford University Press.
go back to reference Putnam, R. (1993). The prosperous community: Social capital and public life. The American Prospect, 13, 35–42. Putnam, R. (1993). The prosperous community: Social capital and public life. The American Prospect, 13, 35–42.
go back to reference Putnam, R. (2000). Bowling alone: The collapse and revival of American community. New York: Simon & Schuster. Putnam, R. (2000). Bowling alone: The collapse and revival of American community. New York: Simon & Schuster.
go back to reference Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323–333. Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323–333.
go back to reference Rössler, B. (1994). Der Wert des Privaten. Frankfurt: Suhrkamp. Rössler, B. (1994). Der Wert des Privaten. Frankfurt: Suhrkamp.
go back to reference Schäfer, B. (1999). Die soziale Gruppe. In H. Korte & B. Schäfer (Eds.), Einführung in Hauptbegriffe der Soziologie (pp. 127–142). Wiesbaden: Springer. Schäfer, B. (1999). Die soziale Gruppe. In H. Korte & B. Schäfer (Eds.), Einführung in Hauptbegriffe der Soziologie (pp. 127–142). Wiesbaden: Springer.
go back to reference Sevignani, S. (2015). Privacy and capitalism in the age of social media. New York: Routledge.CrossRef Sevignani, S. (2015). Privacy and capitalism in the age of social media. New York: Routledge.CrossRef
go back to reference Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477–560.CrossRef Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477–560.CrossRef
go back to reference Stahl, T. (2016). Indiscriminate mass surveillance and the public sphere. Ethics in Information Technology, 18(1), 33–39.CrossRef Stahl, T. (2016). Indiscriminate mass surveillance and the public sphere. Ethics in Information Technology, 18(1), 33–39.CrossRef
go back to reference Taddicken, M. (2014). The ‘Privacy Paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248–273.CrossRef Taddicken, M. (2014). The ‘Privacy Paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248–273.CrossRef
go back to reference Taylor, L. (2015). No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environment and Planning D: Society and Space, 34(2), 319–336.CrossRef Taylor, L. (2015). No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environment and Planning D: Society and Space, 34(2), 319–336.CrossRef
go back to reference Taylor, L. (2017). Safety in numbers? Group privacy and big data analytics in the developing world. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 13–36). New York: Springer. Taylor, L. (2017). Safety in numbers? Group privacy and big data analytics in the developing world. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 13–36). New York: Springer.
go back to reference Taylor, L., Floridi, L., & van der Sloot, B. (2017). Group privacy: New challenges of data technologies. New York: Springer.CrossRef Taylor, L., Floridi, L., & van der Sloot, B. (2017). Group privacy: New challenges of data technologies. New York: Springer.CrossRef
go back to reference Thacker, E. (2004). Networks, swarms and multitudes. In A. Kroker (Ed.), Life in the wires: The CTheory Reader (pp. 165–177). Victoria: Theory Books. Thacker, E. (2004). Networks, swarms and multitudes. In A. Kroker (Ed.), Life in the wires: The CTheory Reader (pp. 165–177). Victoria: Theory Books.
go back to reference Tocqueville, A. (1990[1840]). Democracy in America. New York: Vintage Books. Tocqueville, A. (1990[1840]). Democracy in America. New York: Vintage Books.
go back to reference Trepte, S., Reinecke, L., Ellison, N., Quiring, O., Yao, M., & Ziegele, M. (2017). A cross-cultural perspective on the privacy calculus. Social Media Society, 3(1), 1–13. Trepte, S., Reinecke, L., Ellison, N., Quiring, O., Yao, M., & Ziegele, M. (2017). A cross-cultural perspective on the privacy calculus. Social Media Society, 3(1), 1–13.
go back to reference Trepte, S., & Teutsch, D. (2016). Das “Privacy Paradox”. In M. Krämer, S. Schwan, D. Unz & D. M. Suckfüll (Eds.), Medienpsychologie. Schlüsselbegriffe und Konzepte (pp. 372–377). Stuttgart: Kohlhammer Verlag. Trepte, S., & Teutsch, D. (2016). Das “Privacy Paradox”. In M. Krämer, S. Schwan, D. Unz & D. M. Suckfüll (Eds.), Medienpsychologie. Schlüsselbegriffe und Konzepte (pp. 372–377). Stuttgart: Kohlhammer Verlag.
go back to reference Tufekci, Z. (2008). Can you see me now? Audience and disclosure management in online social network sites. Bulletin of Science and Technology Studies, 11/4, 544–564. Tufekci, Z. (2008). Can you see me now? Audience and disclosure management in online social network sites. Bulletin of Science and Technology Studies, 11/4, 544–564.
go back to reference Tyrell, H. (1983). Zwischen Interaktion und Organisation II. Die Familie als Gruppe. In F. Neidhardt (Ed.), Gruppensoziologie. Perspektiven und Materialien (pp. 362–390). Wiesbaden: Springer.CrossRef Tyrell, H. (1983). Zwischen Interaktion und Organisation II. Die Familie als Gruppe. In F. Neidhardt (Ed.), Gruppensoziologie. Perspektiven und Materialien (pp. 362–390). Wiesbaden: Springer.CrossRef
go back to reference Wacks, R. (1989). Personal information: Privacy and the law. Oxford: Clarendon Press. Wacks, R. (1989). Personal information: Privacy and the law. Oxford: Clarendon Press.
go back to reference Wallace, K. A. (1999). ‘Anonymity’. Ethics and Information Technology, 1(1), 23–35.CrossRef Wallace, K. A. (1999). ‘Anonymity’. Ethics and Information Technology, 1(1), 23–35.CrossRef
go back to reference Warren, M. E. (2001). Democracy and association. Princeton: Princeton University Press. Warren, M. E. (2001). Democracy and association. Princeton: Princeton University Press.
go back to reference Wimmer, J. (2007). Gegenöffentlichkeit in der Mediengesellschaft. Analyse eines medialen Spannungsverhältnisses. Wiesbaden: Springer. Wimmer, J. (2007). Gegenöffentlichkeit in der Mediengesellschaft. Analyse eines medialen Spannungsverhältnisses. Wiesbaden: Springer.
go back to reference Young, I. (2014). Five faces of oppression. Albany: State University of New York Press. Young, I. (2014). Five faces of oppression. Albany: State University of New York Press.
Metadata
Title
Treating sensitive topics online: a privacy dilemma
Author
Paula Helm
Publication date
25-09-2018
Publisher
Springer Netherlands
Published in
Ethics and Information Technology / Issue 4/2018
Print ISSN: 1388-1957
Electronic ISSN: 1572-8439
DOI
https://doi.org/10.1007/s10676-018-9482-4

Other articles of this Issue 4/2018

Ethics and Information Technology 4/2018 Go to the issue

Premium Partner