Skip to main content
Log in

Treating sensitive topics online: a privacy dilemma

  • Original Paper
  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. In this debate, my research is focused on what I refer to as “self-determined groups” which can be defined as groups whose members consciously and willingly perceive themselves as being part of a communicative network. While much attention is given to new forms of algorithmically generated groups, current research on group privacy fails to account for the ways in which self-determined groups are affected by changes brought about by new information technologies. In an explorative case study on self-organized therapy groups, I show how these groups have developed their own approach to privacy protection, functioning on the basis of social practices followed by all participants. This informal approach was effective in pre-digital times, but online, privacy threats have reached a new level extending beyond the scope of a group’s influence. I therefore argue that self-determined sensitive topic groups are left facing what I present as a dilemma: a tension between the seemingly irreconcilable need for connectivity and a low threshold, on the one hand, and the need for privacy and trust, on the other. In light of this dilemma, I argue that we need new sorts of political solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. For example, companies such as Cambridge Analytica or Deep Roots Analytics have recently developed tools that are explicitly intended to analyze group-related communications.

  2. For more far-reaching discussions on the matter of sensitive data, see, for example Wacks (1989), who seeks to establish a foundational definition of “sensitive information;” Fried (1968), who argues for the protection of a socially determined kernel of sensitive information; or Gerety (1977), who suggests limiting privacy rights to information that is sensitive and Ohm (2015), who proposes defining sensitive data in terms of the risk of privacy harm that can be caused by the data.

  3. In order to gain access to the unpublished papers documenting A.A. history and internal correspondence you are required to submit an official request to the General Service Offices of A.A. in New York stating motive and intention. Assuming you are granted access, you then have to appear in person at the Offices where you are handed the relevant archive folders to be examined in situ.

  4. An exhaustive list of all meetings observed can be found in Appendix to this article.

  5. “Sharing” means that individual members recount their experience of their disease, the solutions they found while struggling with their recovery process, as well as the emotions and break-downs they went through.

  6. 1992 The A.A. Message in a changing World; 1996 Preserving our Fellowship—Our Challenge, 1999—Trusting Our Future to A.A. Principles, 2011—We are Responsible for A.A.’s Future—Let it Begin With Us, 2013—Anonymity: Our Spiritual Responsibility in the Digital Age 62nd GSC.

  7. http://www.aa.org; http://www.na.org; http://www.slaa.org; http://www.oa.org; http://www.ga.org.

  8. Namely, an open source software called “ghostery.” For more information, see: https://www.ghostery.com/about-ghostery/.

  9. By horizontal privacy intrusions I mean intrusions relating to actors with equally distributed power resources, and by vertical privacy intrusions I mean intrusions that involve power asymmetries that are structurally embedded (Masur et al. 2017, 180 ff.).

  10. Social swarms have been defined as a “heterogeneous whole” characterized by their decentralized, interconnected, intelligent networks of independent but interconnected actors (Thacker 2004).

  11. This sentence has been suggested by one of the anonymous reviewers whom I thank very much for his/her advices and ideas on this piece.

  12. See, for instance: https://www.reddit.com/r/alcoholicsanonymous/.

  13. This finding is based on information provided by the “Ghostery” software, for more information, see fn. 8.

References

  • Acquisti, A., & Gross, R. (2005). Information revelation and privacy in online social networks. In R. Gross & A. Acquisti. Proceedings of the 2005 Workshop on Privacy in the Electronic Society (WPES), ACM (pp. 71–80).

  • Acquisti, A., & Gross, R. (2009). Information revelation and privacy in online social networks. In D. Matheson (ed), Contours of privacy. Cambridge: Cambridge Scholars Publishing.

    Google Scholar 

  • Acquisti, A., Stutzan, F., & Gross, R. (2012). Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality,2, 7–41.

    Google Scholar 

  • Alcoholics Anonymous. (1935–1939). Folder: ‘Correspondences 1935–1939’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices.

  • Alcoholics Anonymous. (1935–1955). Folder: ‘Anonymity Breaches’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices.

  • Alcoholics Anonymous. (1957). Alcoholics anonymous comes of age. New York: The Grapevine Inc.

    Google Scholar 

  • Alcoholics Anonymous. (2013). The A.A. service manual. Twelve concepts for world service. New York: The A.A. Grapevine, Inc.

    Google Scholar 

  • Altman, I. (1975). The environment and social behavior. Monterey: Brooks and Cole.

    Google Scholar 

  • Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday. 11(9).

  • Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement (pp. 44–75). New York: Cambridge University Press.

    Chapter  Google Scholar 

  • Becker, C., & Seubert, S. (2016). Privatheit, kommunikative Freiheit und Demokratie. Datenschutz und Datensicherheit, 1/2016, 73–78.

    Article  Google Scholar 

  • Betancourt, M. (2016). The critique of digital capitalism: An Analysis of the political economy of digital culture and technology. Brooklyn: Punctum Books.

    Google Scholar 

  • Bloustein, E. (1978). Individual and group privacy. New Brunswick: Transaction Books.

    Google Scholar 

  • Boyd, D, & Marwick, A. E. (2014). Networked privacy: How teenagers negotiate context in social media. New Media + Society, 16(7), 1051–1067.

    Article  Google Scholar 

  • Bryant, A. (2007). Grounded theory in historical perspective: An epistemological account. In A. Bryant & K. Charmaz (Eds.), The SAGE handbook of grounded theory (pp. 31–57). Los Angeles: Sage.

    Chapter  Google Scholar 

  • Cohen, J. (2012). Configuring the networked self: Law, code and the play of everyday practice. New Haven: Yale University Press.

    Google Scholar 

  • Colman, C., & Laenen, F. (2012). “Recovery Came First”: Desistance versus recovery in the criminal careers of drug using offenders. The Scientific World Journal: 1–9.

    Article  Google Scholar 

  • Crawford, K. (2013). The hidden biases in big data. Harvard Business Review. Retrieved August 5, 2017, from, https://hbr.org/2013/04/the-hidden-biases-in-big-data.

  • De Wolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454.

    Article  Google Scholar 

  • Dourish, P., & Palen, L. (2003). Unpacking “Privacy” for a Network World. Computer Human Interaction, 5(1), 129–136.

    Google Scholar 

  • Dumsday, T. (2009). Anonymity and privacy: Conceptual links and normative implications. In D. Matheson (Ed.), Contours of privacy (pp. 71–84). Cambridge: Cambridge Scholars Publishing.

    Google Scholar 

  • Etzioni, A. (1999). The limits of privacy. New York: Basic Books.

    Google Scholar 

  • Floridi, L. (2014). Open data, data protection and group privacy. Philosophical Technology, 27(1), 1–3.

    Article  Google Scholar 

  • Floridi, L. (2017). Group privacy: A defence and an interpretation. In L. Taylor, L. Floridi & L. B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 83–100). New York: Springer.

    Google Scholar 

  • Fried, C. (1968). Privacy. The Yale Law Journal, 77(3), 475–493.

    Article  Google Scholar 

  • Frois, C. (2009). The anonymous society: Identity, transformation and anonymity in 12 steps. Cambridge: Cambridge Scholars Publishing.

    Google Scholar 

  • Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220–237.

    Article  Google Scholar 

  • Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media, 13(2), 139–159.

    Article  Google Scholar 

  • Gerety, T. (1977). Redefining privacy. Harvard Civil Rights-Civil Liberties Law Review, 12, 233–296.

    Google Scholar 

  • Habermas, J. (1990). Strukturwandel der Öffentlichkeit: Untersuchungen zu einer Kategorie der bürgerlichen Gesellschaft. Frankfurt: Suhrkamp.

    Google Scholar 

  • Habermas, J. (1992). Faktizität und Geltung - Beiträge zur Diskurstheorie des Rechts und des demokratischen Rechtsstaats. Frankfurt: Suhrkamp.

    Google Scholar 

  • Helm, P. (2016a). Group privacy in times of big data. Digital Culture and Society, 2(2), 137–152.

    Article  Google Scholar 

  • Helm, P. (2016b). Suchtkultur und Gruppentherapie: Vom anonymen Ich zum anonymen Wir. Wiesbaden: Springer.

    Google Scholar 

  • Honneth, A. (1992). Integrity and disrespect: Principles of a conception of morality based on the theory of recognition. Political Theory, 20(2), 187–201.

    Article  Google Scholar 

  • Kühl, S. (2014). Gruppen, Organisationen, Familien und Bewegungen. Zur Soziologie mitgliedschaftsbasierter Systeme zwischen Interaktion und Gesellschaft. Zeitschrift für Soziologie. Sonderheft Interaktion - Organisation - Gesellschaft revisited (pp. 65–85).

  • MacKinnon, C. (1989). Toward a feminist theory of the state. Cambridge: Harvard University Press.

    Google Scholar 

  • Mantelero, A. (2016). Personal data for decisional purposes in the age of analytics: From an individual to a collective dimension of data protection. Computer Law and Security Review, 32(2), 238–255.

    Article  Google Scholar 

  • Mantelero, A. (2017). From group privacy to collective privacy: Towards a new dimension of privacy and data protection in the big data era. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 139–158). New York: Springer.

    Google Scholar 

  • Masur, P., Teutsch, D., Dienlin, T., & Trepte, S. (2017). Online-Privatheitskompetenz und deren Bedeutung für demokratische Gesellschaften. In S. Seubert & P. Helm (Eds.), Privatheit und Demokratie. FJSB (pp. 180–189).

  • Matthews, S. (2010). Anonymity and the social self. American Philosophical Quarterly, 47(4), 351–363.

    MathSciNet  Google Scholar 

  • Mittelstadt, B. (2017). From individual to group privacy in big data analytics. Philosophy & Technology, 30(4), 475–494.

    Article  Google Scholar 

  • Nissenbaum, H. (1999). The meaning of anonymity in an information age. The Information Society 15(2):141–144.

    Article  Google Scholar 

  • Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford University Press.

    Google Scholar 

  • Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57(6), 1701–1777.

    Google Scholar 

  • Ohm, P. (2015). Sensitive information. Southern California Law Review, 88, 2–55.

    Google Scholar 

  • Pateman, C. (1989). Feminist critiques of the public/private dichotomy. In C. Pateman (Ed.), The disorder of women. Democracy, feminism and political theory (pp. 118–140). Stanford: Stanford University Press.

    Google Scholar 

  • Putnam, R. (1993). The prosperous community: Social capital and public life. The American Prospect, 13, 35–42.

    Google Scholar 

  • Putnam, R. (2000). Bowling alone: The collapse and revival of American community. New York: Simon & Schuster.

    Google Scholar 

  • Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323–333.

    Google Scholar 

  • Rössler, B. (1994). Der Wert des Privaten. Frankfurt: Suhrkamp.

    Google Scholar 

  • Schäfer, B. (1999). Die soziale Gruppe. In H. Korte & B. Schäfer (Eds.), Einführung in Hauptbegriffe der Soziologie (pp. 127–142). Wiesbaden: Springer.

    Google Scholar 

  • Sevignani, S. (2015). Privacy and capitalism in the age of social media. New York: Routledge.

    Book  Google Scholar 

  • Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477–560.

    Article  Google Scholar 

  • Stahl, T. (2016). Indiscriminate mass surveillance and the public sphere. Ethics in Information Technology, 18(1), 33–39.

    Article  Google Scholar 

  • Taddicken, M. (2014). The ‘Privacy Paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248–273.

    Article  Google Scholar 

  • Taylor, L. (2015). No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environment and Planning D: Society and Space, 34(2), 319–336.

    Article  Google Scholar 

  • Taylor, L. (2017). Safety in numbers? Group privacy and big data analytics in the developing world. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 13–36). New York: Springer.

    Google Scholar 

  • Taylor, L., Floridi, L., & van der Sloot, B. (2017). Group privacy: New challenges of data technologies. New York: Springer.

    Book  Google Scholar 

  • Thacker, E. (2004). Networks, swarms and multitudes. In A. Kroker (Ed.), Life in the wires: The CTheory Reader (pp. 165–177). Victoria: Theory Books.

    Google Scholar 

  • Tocqueville, A. (1990[1840]). Democracy in America. New York: Vintage Books.

    Google Scholar 

  • Trepte, S., Reinecke, L., Ellison, N., Quiring, O., Yao, M., & Ziegele, M. (2017). A cross-cultural perspective on the privacy calculus. Social Media Society, 3(1), 1–13.

    Google Scholar 

  • Trepte, S., & Teutsch, D. (2016). Das “Privacy Paradox”. In M. Krämer, S. Schwan, D. Unz & D. M. Suckfüll (Eds.), Medienpsychologie. Schlüsselbegriffe und Konzepte (pp. 372–377). Stuttgart: Kohlhammer Verlag.

    Google Scholar 

  • Tufekci, Z. (2008). Can you see me now? Audience and disclosure management in online social network sites. Bulletin of Science and Technology Studies, 11/4, 544–564.

    Google Scholar 

  • Tyrell, H. (1983). Zwischen Interaktion und Organisation II. Die Familie als Gruppe. In F. Neidhardt (Ed.), Gruppensoziologie. Perspektiven und Materialien (pp. 362–390). Wiesbaden: Springer.

    Chapter  Google Scholar 

  • Wacks, R. (1989). Personal information: Privacy and the law. Oxford: Clarendon Press.

    Google Scholar 

  • Wallace, K. A. (1999). ‘Anonymity’. Ethics and Information Technology, 1(1), 23–35.

    Article  Google Scholar 

  • Warren, M. E. (2001). Democracy and association. Princeton: Princeton University Press.

    Google Scholar 

  • Wimmer, J. (2007). Gegenöffentlichkeit in der Mediengesellschaft. Analyse eines medialen Spannungsverhältnisses. Wiesbaden: Springer.

    Google Scholar 

  • Young, I. (2014). Five faces of oppression. Albany: State University of New York Press.

    Google Scholar 

Download references

Acknowledgements

The work for this article has been funded by the Volkswagen Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Paula Helm.

Appendix

Appendix

Sample of meetings selected for participant observation

Group

Place

Regular time

Dates visited

Alcoholics Anonymous

AA-Room, Passau/Germany

Thursdays 7.00 pm

Every 1st Thursday per month, May–Feb. 2012–2013

Overeaters Anonymous

KISS, Regensburg/Germany

2.00 pm

2.6.2013

Overeaters Anonymous

LGBT Center, New York City

Daily 12.00 pm

11.2., 29.3., 3.5., 25.6.2013

Narcotics Anonymous and Experts

Empire Hotel, New York City

“Roundtable”

19.04.2013

Narcotics Anonymous

St. Gregory’s Church, New York City

Mondays

7.00 pm

20.04.2013

Alcoholics Anonymous

Quakers´ House, Pennsylvania

Mondays 8.00 pm

13.05.2013

Sex Addicts Anonymous

LGBT Center, New York City

Saturdays 6.00 pm

18.05.2013

Gamblers Anonymous

St. Agatha Church 702, 49th

Thursdays 7.00 pm

16.05.2013

Al-Anon

St. Gregory’s Church, New York State, Saugertiers

Thursdays 12.00 pm

16.05.2013

Sex and Love Addicts Anonymous

Methodist Church, New York City

Tuesdays 6.00 pm

21.05.2013

Sex and Love Addicts Anonymous

Methodist Church, New York City

Saturdays 18.00

01.06.2013

Overeaters Anonymous

Community Center Brooklyn, New York City

Mondays 6.00 pm

24.06.2013

Alcoholics Anonymous

General Service Offices of AA, New York

Fridays 11.00 pm

14.06., 28.06., 6.8., 13.09., 20.09. 2013

Underearners Anonymous

LGBT Center, New York City

Daily 10.00 am

29.06.2013

Adult Children of Alcoholics (ACOA)

LGBT Center, New York City

Sundays 11.00 am

30.06.2013

Narcotics Anonymous

Methodist Church, New York State, Woodstock

Sundays 7.30 pm

14.07.2013

Overeaters Anonymous

Group-Center, New York City

Tuesdays 8.00 pm

23.07.2013

Alcoholics Anonymous

Self-Help Center, Frankfurt am Main

Sundays 6.00 pm

08.09.2013

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Helm, P. Treating sensitive topics online: a privacy dilemma. Ethics Inf Technol 20, 303–313 (2018). https://doi.org/10.1007/s10676-018-9482-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10676-018-9482-4

Keywords

Navigation