Skip to main content
Erschienen in: Ethics and Information Technology 4/2018

25.09.2018 | Original Paper

Treating sensitive topics online: a privacy dilemma

verfasst von: Paula Helm

Erschienen in: Ethics and Information Technology | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. In this debate, my research is focused on what I refer to as “self-determined groups” which can be defined as groups whose members consciously and willingly perceive themselves as being part of a communicative network. While much attention is given to new forms of algorithmically generated groups, current research on group privacy fails to account for the ways in which self-determined groups are affected by changes brought about by new information technologies. In an explorative case study on self-organized therapy groups, I show how these groups have developed their own approach to privacy protection, functioning on the basis of social practices followed by all participants. This informal approach was effective in pre-digital times, but online, privacy threats have reached a new level extending beyond the scope of a group’s influence. I therefore argue that self-determined sensitive topic groups are left facing what I present as a dilemma: a tension between the seemingly irreconcilable need for connectivity and a low threshold, on the one hand, and the need for privacy and trust, on the other. In light of this dilemma, I argue that we need new sorts of political solutions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
For example, companies such as Cambridge Analytica or Deep Roots Analytics have recently developed tools that are explicitly intended to analyze group-related communications.
 
2
For more far-reaching discussions on the matter of sensitive data, see, for example Wacks (1989), who seeks to establish a foundational definition of “sensitive information;” Fried (1968), who argues for the protection of a socially determined kernel of sensitive information; or Gerety (1977), who suggests limiting privacy rights to information that is sensitive and Ohm (2015), who proposes defining sensitive data in terms of the risk of privacy harm that can be caused by the data.
 
3
In order to gain access to the unpublished papers documenting A.A. history and internal correspondence you are required to submit an official request to the General Service Offices of A.A. in New York stating motive and intention. Assuming you are granted access, you then have to appear in person at the Offices where you are handed the relevant archive folders to be examined in situ.
 
4
An exhaustive list of all meetings observed can be found in Appendix to this article.
 
5
“Sharing” means that individual members recount their experience of their disease, the solutions they found while struggling with their recovery process, as well as the emotions and break-downs they went through.
 
6
1992 The A.A. Message in a changing World; 1996 Preserving our Fellowship—Our Challenge, 1999—Trusting Our Future to A.A. Principles, 2011—We are Responsible for A.A.’s Future—Let it Begin With Us, 2013—Anonymity: Our Spiritual Responsibility in the Digital Age 62nd GSC.
 
8
Namely, an open source software called “ghostery.” For more information, see: https://​www.​ghostery.​com/​about-ghostery/​.
 
9
By horizontal privacy intrusions I mean intrusions relating to actors with equally distributed power resources, and by vertical privacy intrusions I mean intrusions that involve power asymmetries that are structurally embedded (Masur et al. 2017, 180 ff.).
 
10
Social swarms have been defined as a “heterogeneous whole” characterized by their decentralized, interconnected, intelligent networks of independent but interconnected actors (Thacker 2004).
 
11
This sentence has been suggested by one of the anonymous reviewers whom I thank very much for his/her advices and ideas on this piece.
 
13
This finding is based on information provided by the “Ghostery” software, for more information, see fn. 8.
 
Literatur
Zurück zum Zitat Acquisti, A., & Gross, R. (2005). Information revelation and privacy in online social networks. In R. Gross & A. Acquisti. Proceedings of the 2005 Workshop on Privacy in the Electronic Society (WPES), ACM (pp. 71–80). Acquisti, A., & Gross, R. (2005). Information revelation and privacy in online social networks. In R. Gross & A. Acquisti. Proceedings of the 2005 Workshop on Privacy in the Electronic Society (WPES), ACM (pp. 71–80).
Zurück zum Zitat Acquisti, A., & Gross, R. (2009). Information revelation and privacy in online social networks. In D. Matheson (ed), Contours of privacy. Cambridge: Cambridge Scholars Publishing. Acquisti, A., & Gross, R. (2009). Information revelation and privacy in online social networks. In D. Matheson (ed), Contours of privacy. Cambridge: Cambridge Scholars Publishing.
Zurück zum Zitat Acquisti, A., Stutzan, F., & Gross, R. (2012). Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality,2, 7–41. Acquisti, A., Stutzan, F., & Gross, R. (2012). Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality,2, 7–41.
Zurück zum Zitat Alcoholics Anonymous. (1935–1939). Folder: ‘Correspondences 1935–1939’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices. Alcoholics Anonymous. (1935–1939). Folder: ‘Correspondences 1935–1939’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices.
Zurück zum Zitat Alcoholics Anonymous. (1935–1955). Folder: ‘Anonymity Breaches’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices. Alcoholics Anonymous. (1935–1955). Folder: ‘Anonymity Breaches’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices.
Zurück zum Zitat Alcoholics Anonymous. (1957). Alcoholics anonymous comes of age. New York: The Grapevine Inc. Alcoholics Anonymous. (1957). Alcoholics anonymous comes of age. New York: The Grapevine Inc.
Zurück zum Zitat Alcoholics Anonymous. (2013). The A.A. service manual. Twelve concepts for world service. New York: The A.A. Grapevine, Inc. Alcoholics Anonymous. (2013). The A.A. service manual. Twelve concepts for world service. New York: The A.A. Grapevine, Inc.
Zurück zum Zitat Altman, I. (1975). The environment and social behavior. Monterey: Brooks and Cole. Altman, I. (1975). The environment and social behavior. Monterey: Brooks and Cole.
Zurück zum Zitat Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday. 11(9). Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday. 11(9).
Zurück zum Zitat Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement (pp. 44–75). New York: Cambridge University Press.CrossRef Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement (pp. 44–75). New York: Cambridge University Press.CrossRef
Zurück zum Zitat Becker, C., & Seubert, S. (2016). Privatheit, kommunikative Freiheit und Demokratie. Datenschutz und Datensicherheit, 1/2016, 73–78.CrossRef Becker, C., & Seubert, S. (2016). Privatheit, kommunikative Freiheit und Demokratie. Datenschutz und Datensicherheit, 1/2016, 73–78.CrossRef
Zurück zum Zitat Betancourt, M. (2016). The critique of digital capitalism: An Analysis of the political economy of digital culture and technology. Brooklyn: Punctum Books. Betancourt, M. (2016). The critique of digital capitalism: An Analysis of the political economy of digital culture and technology. Brooklyn: Punctum Books.
Zurück zum Zitat Bloustein, E. (1978). Individual and group privacy. New Brunswick: Transaction Books. Bloustein, E. (1978). Individual and group privacy. New Brunswick: Transaction Books.
Zurück zum Zitat Boyd, D, & Marwick, A. E. (2014). Networked privacy: How teenagers negotiate context in social media. New Media + Society, 16(7), 1051–1067.CrossRef Boyd, D, & Marwick, A. E. (2014). Networked privacy: How teenagers negotiate context in social media. New Media + Society, 16(7), 1051–1067.CrossRef
Zurück zum Zitat Bryant, A. (2007). Grounded theory in historical perspective: An epistemological account. In A. Bryant & K. Charmaz (Eds.), The SAGE handbook of grounded theory (pp. 31–57). Los Angeles: Sage.CrossRef Bryant, A. (2007). Grounded theory in historical perspective: An epistemological account. In A. Bryant & K. Charmaz (Eds.), The SAGE handbook of grounded theory (pp. 31–57). Los Angeles: Sage.CrossRef
Zurück zum Zitat Cohen, J. (2012). Configuring the networked self: Law, code and the play of everyday practice. New Haven: Yale University Press. Cohen, J. (2012). Configuring the networked self: Law, code and the play of everyday practice. New Haven: Yale University Press.
Zurück zum Zitat Colman, C., & Laenen, F. (2012). “Recovery Came First”: Desistance versus recovery in the criminal careers of drug using offenders. The Scientific World Journal: 1–9.CrossRef Colman, C., & Laenen, F. (2012). “Recovery Came First”: Desistance versus recovery in the criminal careers of drug using offenders. The Scientific World Journal: 1–9.CrossRef
Zurück zum Zitat De Wolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454.CrossRef De Wolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454.CrossRef
Zurück zum Zitat Dourish, P., & Palen, L. (2003). Unpacking “Privacy” for a Network World. Computer Human Interaction, 5(1), 129–136. Dourish, P., & Palen, L. (2003). Unpacking “Privacy” for a Network World. Computer Human Interaction, 5(1), 129–136.
Zurück zum Zitat Dumsday, T. (2009). Anonymity and privacy: Conceptual links and normative implications. In D. Matheson (Ed.), Contours of privacy (pp. 71–84). Cambridge: Cambridge Scholars Publishing. Dumsday, T. (2009). Anonymity and privacy: Conceptual links and normative implications. In D. Matheson (Ed.), Contours of privacy (pp. 71–84). Cambridge: Cambridge Scholars Publishing.
Zurück zum Zitat Etzioni, A. (1999). The limits of privacy. New York: Basic Books. Etzioni, A. (1999). The limits of privacy. New York: Basic Books.
Zurück zum Zitat Floridi, L. (2014). Open data, data protection and group privacy. Philosophical Technology, 27(1), 1–3.CrossRef Floridi, L. (2014). Open data, data protection and group privacy. Philosophical Technology, 27(1), 1–3.CrossRef
Zurück zum Zitat Floridi, L. (2017). Group privacy: A defence and an interpretation. In L. Taylor, L. Floridi & L. B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 83–100). New York: Springer. Floridi, L. (2017). Group privacy: A defence and an interpretation. In L. Taylor, L. Floridi & L. B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 83–100). New York: Springer.
Zurück zum Zitat Frois, C. (2009). The anonymous society: Identity, transformation and anonymity in 12 steps. Cambridge: Cambridge Scholars Publishing. Frois, C. (2009). The anonymous society: Identity, transformation and anonymity in 12 steps. Cambridge: Cambridge Scholars Publishing.
Zurück zum Zitat Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220–237.CrossRef Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220–237.CrossRef
Zurück zum Zitat Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media, 13(2), 139–159.CrossRef Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media, 13(2), 139–159.CrossRef
Zurück zum Zitat Gerety, T. (1977). Redefining privacy. Harvard Civil Rights-Civil Liberties Law Review, 12, 233–296. Gerety, T. (1977). Redefining privacy. Harvard Civil Rights-Civil Liberties Law Review, 12, 233–296.
Zurück zum Zitat Habermas, J. (1990). Strukturwandel der Öffentlichkeit: Untersuchungen zu einer Kategorie der bürgerlichen Gesellschaft. Frankfurt: Suhrkamp. Habermas, J. (1990). Strukturwandel der Öffentlichkeit: Untersuchungen zu einer Kategorie der bürgerlichen Gesellschaft. Frankfurt: Suhrkamp.
Zurück zum Zitat Habermas, J. (1992). Faktizität und Geltung - Beiträge zur Diskurstheorie des Rechts und des demokratischen Rechtsstaats. Frankfurt: Suhrkamp. Habermas, J. (1992). Faktizität und Geltung - Beiträge zur Diskurstheorie des Rechts und des demokratischen Rechtsstaats. Frankfurt: Suhrkamp.
Zurück zum Zitat Helm, P. (2016a). Group privacy in times of big data. Digital Culture and Society, 2(2), 137–152.CrossRef Helm, P. (2016a). Group privacy in times of big data. Digital Culture and Society, 2(2), 137–152.CrossRef
Zurück zum Zitat Helm, P. (2016b). Suchtkultur und Gruppentherapie: Vom anonymen Ich zum anonymen Wir. Wiesbaden: Springer. Helm, P. (2016b). Suchtkultur und Gruppentherapie: Vom anonymen Ich zum anonymen Wir. Wiesbaden: Springer.
Zurück zum Zitat Honneth, A. (1992). Integrity and disrespect: Principles of a conception of morality based on the theory of recognition. Political Theory, 20(2), 187–201.CrossRef Honneth, A. (1992). Integrity and disrespect: Principles of a conception of morality based on the theory of recognition. Political Theory, 20(2), 187–201.CrossRef
Zurück zum Zitat Kühl, S. (2014). Gruppen, Organisationen, Familien und Bewegungen. Zur Soziologie mitgliedschaftsbasierter Systeme zwischen Interaktion und Gesellschaft. Zeitschrift für Soziologie. Sonderheft Interaktion - Organisation - Gesellschaft revisited (pp. 65–85). Kühl, S. (2014). Gruppen, Organisationen, Familien und Bewegungen. Zur Soziologie mitgliedschaftsbasierter Systeme zwischen Interaktion und Gesellschaft. Zeitschrift für Soziologie. Sonderheft Interaktion - Organisation - Gesellschaft revisited (pp. 65–85).
Zurück zum Zitat MacKinnon, C. (1989). Toward a feminist theory of the state. Cambridge: Harvard University Press. MacKinnon, C. (1989). Toward a feminist theory of the state. Cambridge: Harvard University Press.
Zurück zum Zitat Mantelero, A. (2016). Personal data for decisional purposes in the age of analytics: From an individual to a collective dimension of data protection. Computer Law and Security Review, 32(2), 238–255.CrossRef Mantelero, A. (2016). Personal data for decisional purposes in the age of analytics: From an individual to a collective dimension of data protection. Computer Law and Security Review, 32(2), 238–255.CrossRef
Zurück zum Zitat Mantelero, A. (2017). From group privacy to collective privacy: Towards a new dimension of privacy and data protection in the big data era. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 139–158). New York: Springer. Mantelero, A. (2017). From group privacy to collective privacy: Towards a new dimension of privacy and data protection in the big data era. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 139–158). New York: Springer.
Zurück zum Zitat Masur, P., Teutsch, D., Dienlin, T., & Trepte, S. (2017). Online-Privatheitskompetenz und deren Bedeutung für demokratische Gesellschaften. In S. Seubert & P. Helm (Eds.), Privatheit und Demokratie. FJSB (pp. 180–189). Masur, P., Teutsch, D., Dienlin, T., & Trepte, S. (2017). Online-Privatheitskompetenz und deren Bedeutung für demokratische Gesellschaften. In S. Seubert & P. Helm (Eds.), Privatheit und Demokratie. FJSB (pp. 180–189).
Zurück zum Zitat Matthews, S. (2010). Anonymity and the social self. American Philosophical Quarterly, 47(4), 351–363.MathSciNet Matthews, S. (2010). Anonymity and the social self. American Philosophical Quarterly, 47(4), 351–363.MathSciNet
Zurück zum Zitat Mittelstadt, B. (2017). From individual to group privacy in big data analytics. Philosophy & Technology, 30(4), 475–494.CrossRef Mittelstadt, B. (2017). From individual to group privacy in big data analytics. Philosophy & Technology, 30(4), 475–494.CrossRef
Zurück zum Zitat Nissenbaum, H. (1999). The meaning of anonymity in an information age. The Information Society 15(2):141–144.CrossRef Nissenbaum, H. (1999). The meaning of anonymity in an information age. The Information Society 15(2):141–144.CrossRef
Zurück zum Zitat Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford University Press. Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford University Press.
Zurück zum Zitat Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57(6), 1701–1777. Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57(6), 1701–1777.
Zurück zum Zitat Ohm, P. (2015). Sensitive information. Southern California Law Review, 88, 2–55. Ohm, P. (2015). Sensitive information. Southern California Law Review, 88, 2–55.
Zurück zum Zitat Pateman, C. (1989). Feminist critiques of the public/private dichotomy. In C. Pateman (Ed.), The disorder of women. Democracy, feminism and political theory (pp. 118–140). Stanford: Stanford University Press. Pateman, C. (1989). Feminist critiques of the public/private dichotomy. In C. Pateman (Ed.), The disorder of women. Democracy, feminism and political theory (pp. 118–140). Stanford: Stanford University Press.
Zurück zum Zitat Putnam, R. (1993). The prosperous community: Social capital and public life. The American Prospect, 13, 35–42. Putnam, R. (1993). The prosperous community: Social capital and public life. The American Prospect, 13, 35–42.
Zurück zum Zitat Putnam, R. (2000). Bowling alone: The collapse and revival of American community. New York: Simon & Schuster. Putnam, R. (2000). Bowling alone: The collapse and revival of American community. New York: Simon & Schuster.
Zurück zum Zitat Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323–333. Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323–333.
Zurück zum Zitat Rössler, B. (1994). Der Wert des Privaten. Frankfurt: Suhrkamp. Rössler, B. (1994). Der Wert des Privaten. Frankfurt: Suhrkamp.
Zurück zum Zitat Schäfer, B. (1999). Die soziale Gruppe. In H. Korte & B. Schäfer (Eds.), Einführung in Hauptbegriffe der Soziologie (pp. 127–142). Wiesbaden: Springer. Schäfer, B. (1999). Die soziale Gruppe. In H. Korte & B. Schäfer (Eds.), Einführung in Hauptbegriffe der Soziologie (pp. 127–142). Wiesbaden: Springer.
Zurück zum Zitat Sevignani, S. (2015). Privacy and capitalism in the age of social media. New York: Routledge.CrossRef Sevignani, S. (2015). Privacy and capitalism in the age of social media. New York: Routledge.CrossRef
Zurück zum Zitat Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477–560.CrossRef Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477–560.CrossRef
Zurück zum Zitat Stahl, T. (2016). Indiscriminate mass surveillance and the public sphere. Ethics in Information Technology, 18(1), 33–39.CrossRef Stahl, T. (2016). Indiscriminate mass surveillance and the public sphere. Ethics in Information Technology, 18(1), 33–39.CrossRef
Zurück zum Zitat Taddicken, M. (2014). The ‘Privacy Paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248–273.CrossRef Taddicken, M. (2014). The ‘Privacy Paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248–273.CrossRef
Zurück zum Zitat Taylor, L. (2015). No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environment and Planning D: Society and Space, 34(2), 319–336.CrossRef Taylor, L. (2015). No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environment and Planning D: Society and Space, 34(2), 319–336.CrossRef
Zurück zum Zitat Taylor, L. (2017). Safety in numbers? Group privacy and big data analytics in the developing world. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 13–36). New York: Springer. Taylor, L. (2017). Safety in numbers? Group privacy and big data analytics in the developing world. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 13–36). New York: Springer.
Zurück zum Zitat Taylor, L., Floridi, L., & van der Sloot, B. (2017). Group privacy: New challenges of data technologies. New York: Springer.CrossRef Taylor, L., Floridi, L., & van der Sloot, B. (2017). Group privacy: New challenges of data technologies. New York: Springer.CrossRef
Zurück zum Zitat Thacker, E. (2004). Networks, swarms and multitudes. In A. Kroker (Ed.), Life in the wires: The CTheory Reader (pp. 165–177). Victoria: Theory Books. Thacker, E. (2004). Networks, swarms and multitudes. In A. Kroker (Ed.), Life in the wires: The CTheory Reader (pp. 165–177). Victoria: Theory Books.
Zurück zum Zitat Tocqueville, A. (1990[1840]). Democracy in America. New York: Vintage Books. Tocqueville, A. (1990[1840]). Democracy in America. New York: Vintage Books.
Zurück zum Zitat Trepte, S., Reinecke, L., Ellison, N., Quiring, O., Yao, M., & Ziegele, M. (2017). A cross-cultural perspective on the privacy calculus. Social Media Society, 3(1), 1–13. Trepte, S., Reinecke, L., Ellison, N., Quiring, O., Yao, M., & Ziegele, M. (2017). A cross-cultural perspective on the privacy calculus. Social Media Society, 3(1), 1–13.
Zurück zum Zitat Trepte, S., & Teutsch, D. (2016). Das “Privacy Paradox”. In M. Krämer, S. Schwan, D. Unz & D. M. Suckfüll (Eds.), Medienpsychologie. Schlüsselbegriffe und Konzepte (pp. 372–377). Stuttgart: Kohlhammer Verlag. Trepte, S., & Teutsch, D. (2016). Das “Privacy Paradox”. In M. Krämer, S. Schwan, D. Unz & D. M. Suckfüll (Eds.), Medienpsychologie. Schlüsselbegriffe und Konzepte (pp. 372–377). Stuttgart: Kohlhammer Verlag.
Zurück zum Zitat Tufekci, Z. (2008). Can you see me now? Audience and disclosure management in online social network sites. Bulletin of Science and Technology Studies, 11/4, 544–564. Tufekci, Z. (2008). Can you see me now? Audience and disclosure management in online social network sites. Bulletin of Science and Technology Studies, 11/4, 544–564.
Zurück zum Zitat Tyrell, H. (1983). Zwischen Interaktion und Organisation II. Die Familie als Gruppe. In F. Neidhardt (Ed.), Gruppensoziologie. Perspektiven und Materialien (pp. 362–390). Wiesbaden: Springer.CrossRef Tyrell, H. (1983). Zwischen Interaktion und Organisation II. Die Familie als Gruppe. In F. Neidhardt (Ed.), Gruppensoziologie. Perspektiven und Materialien (pp. 362–390). Wiesbaden: Springer.CrossRef
Zurück zum Zitat Wacks, R. (1989). Personal information: Privacy and the law. Oxford: Clarendon Press. Wacks, R. (1989). Personal information: Privacy and the law. Oxford: Clarendon Press.
Zurück zum Zitat Wallace, K. A. (1999). ‘Anonymity’. Ethics and Information Technology, 1(1), 23–35.CrossRef Wallace, K. A. (1999). ‘Anonymity’. Ethics and Information Technology, 1(1), 23–35.CrossRef
Zurück zum Zitat Warren, M. E. (2001). Democracy and association. Princeton: Princeton University Press. Warren, M. E. (2001). Democracy and association. Princeton: Princeton University Press.
Zurück zum Zitat Wimmer, J. (2007). Gegenöffentlichkeit in der Mediengesellschaft. Analyse eines medialen Spannungsverhältnisses. Wiesbaden: Springer. Wimmer, J. (2007). Gegenöffentlichkeit in der Mediengesellschaft. Analyse eines medialen Spannungsverhältnisses. Wiesbaden: Springer.
Zurück zum Zitat Young, I. (2014). Five faces of oppression. Albany: State University of New York Press. Young, I. (2014). Five faces of oppression. Albany: State University of New York Press.
Metadaten
Titel
Treating sensitive topics online: a privacy dilemma
verfasst von
Paula Helm
Publikationsdatum
25.09.2018
Verlag
Springer Netherlands
Erschienen in
Ethics and Information Technology / Ausgabe 4/2018
Print ISSN: 1388-1957
Elektronische ISSN: 1572-8439
DOI
https://doi.org/10.1007/s10676-018-9482-4

Weitere Artikel der Ausgabe 4/2018

Ethics and Information Technology 4/2018 Zur Ausgabe