Abstract
This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. In this debate, my research is focused on what I refer to as “self-determined groups” which can be defined as groups whose members consciously and willingly perceive themselves as being part of a communicative network. While much attention is given to new forms of algorithmically generated groups, current research on group privacy fails to account for the ways in which self-determined groups are affected by changes brought about by new information technologies. In an explorative case study on self-organized therapy groups, I show how these groups have developed their own approach to privacy protection, functioning on the basis of social practices followed by all participants. This informal approach was effective in pre-digital times, but online, privacy threats have reached a new level extending beyond the scope of a group’s influence. I therefore argue that self-determined sensitive topic groups are left facing what I present as a dilemma: a tension between the seemingly irreconcilable need for connectivity and a low threshold, on the one hand, and the need for privacy and trust, on the other. In light of this dilemma, I argue that we need new sorts of political solutions.
Similar content being viewed by others
Notes
For example, companies such as Cambridge Analytica or Deep Roots Analytics have recently developed tools that are explicitly intended to analyze group-related communications.
For more far-reaching discussions on the matter of sensitive data, see, for example Wacks (1989), who seeks to establish a foundational definition of “sensitive information;” Fried (1968), who argues for the protection of a socially determined kernel of sensitive information; or Gerety (1977), who suggests limiting privacy rights to information that is sensitive and Ohm (2015), who proposes defining sensitive data in terms of the risk of privacy harm that can be caused by the data.
In order to gain access to the unpublished papers documenting A.A. history and internal correspondence you are required to submit an official request to the General Service Offices of A.A. in New York stating motive and intention. Assuming you are granted access, you then have to appear in person at the Offices where you are handed the relevant archive folders to be examined in situ.
An exhaustive list of all meetings observed can be found in Appendix to this article.
“Sharing” means that individual members recount their experience of their disease, the solutions they found while struggling with their recovery process, as well as the emotions and break-downs they went through.
1992 The A.A. Message in a changing World; 1996 Preserving our Fellowship—Our Challenge, 1999—Trusting Our Future to A.A. Principles, 2011—We are Responsible for A.A.’s Future—Let it Begin With Us, 2013—Anonymity: Our Spiritual Responsibility in the Digital Age 62nd GSC.
Namely, an open source software called “ghostery.” For more information, see: https://www.ghostery.com/about-ghostery/.
By horizontal privacy intrusions I mean intrusions relating to actors with equally distributed power resources, and by vertical privacy intrusions I mean intrusions that involve power asymmetries that are structurally embedded (Masur et al. 2017, 180 ff.).
Social swarms have been defined as a “heterogeneous whole” characterized by their decentralized, interconnected, intelligent networks of independent but interconnected actors (Thacker 2004).
This sentence has been suggested by one of the anonymous reviewers whom I thank very much for his/her advices and ideas on this piece.
See, for instance: https://www.reddit.com/r/alcoholicsanonymous/.
This finding is based on information provided by the “Ghostery” software, for more information, see fn. 8.
References
Acquisti, A., & Gross, R. (2005). Information revelation and privacy in online social networks. In R. Gross & A. Acquisti. Proceedings of the 2005 Workshop on Privacy in the Electronic Society (WPES), ACM (pp. 71–80).
Acquisti, A., & Gross, R. (2009). Information revelation and privacy in online social networks. In D. Matheson (ed), Contours of privacy. Cambridge: Cambridge Scholars Publishing.
Acquisti, A., Stutzan, F., & Gross, R. (2012). Silent listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality,2, 7–41.
Alcoholics Anonymous. (1935–1939). Folder: ‘Correspondences 1935–1939’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices.
Alcoholics Anonymous. (1935–1955). Folder: ‘Anonymity Breaches’. Unpublished archive material. New York: Alcoholics Anonymous General Service Offices.
Alcoholics Anonymous. (1957). Alcoholics anonymous comes of age. New York: The Grapevine Inc.
Alcoholics Anonymous. (2013). The A.A. service manual. Twelve concepts for world service. New York: The A.A. Grapevine, Inc.
Altman, I. (1975). The environment and social behavior. Monterey: Brooks and Cole.
Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday. 11(9).
Barocas, S., & Nissenbaum, H. (2014). Big data’s end run around anonymity and consent. In J. Lane, V. Stodden, S. Bender & H. Nissenbaum (Eds.), Privacy, big data, and the public good: Frameworks for engagement (pp. 44–75). New York: Cambridge University Press.
Becker, C., & Seubert, S. (2016). Privatheit, kommunikative Freiheit und Demokratie. Datenschutz und Datensicherheit, 1/2016, 73–78.
Betancourt, M. (2016). The critique of digital capitalism: An Analysis of the political economy of digital culture and technology. Brooklyn: Punctum Books.
Bloustein, E. (1978). Individual and group privacy. New Brunswick: Transaction Books.
Boyd, D, & Marwick, A. E. (2014). Networked privacy: How teenagers negotiate context in social media. New Media + Society, 16(7), 1051–1067.
Bryant, A. (2007). Grounded theory in historical perspective: An epistemological account. In A. Bryant & K. Charmaz (Eds.), The SAGE handbook of grounded theory (pp. 31–57). Los Angeles: Sage.
Cohen, J. (2012). Configuring the networked self: Law, code and the play of everyday practice. New Haven: Yale University Press.
Colman, C., & Laenen, F. (2012). “Recovery Came First”: Desistance versus recovery in the criminal careers of drug using offenders. The Scientific World Journal: 1–9.
Crawford, K. (2013). The hidden biases in big data. Harvard Business Review. Retrieved August 5, 2017, from, https://hbr.org/2013/04/the-hidden-biases-in-big-data.
De Wolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454.
Dourish, P., & Palen, L. (2003). Unpacking “Privacy” for a Network World. Computer Human Interaction, 5(1), 129–136.
Dumsday, T. (2009). Anonymity and privacy: Conceptual links and normative implications. In D. Matheson (Ed.), Contours of privacy (pp. 71–84). Cambridge: Cambridge Scholars Publishing.
Etzioni, A. (1999). The limits of privacy. New York: Basic Books.
Floridi, L. (2014). Open data, data protection and group privacy. Philosophical Technology, 27(1), 1–3.
Floridi, L. (2017). Group privacy: A defence and an interpretation. In L. Taylor, L. Floridi & L. B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 83–100). New York: Springer.
Fried, C. (1968). Privacy. The Yale Law Journal, 77(3), 475–493.
Frois, C. (2009). The anonymous society: Identity, transformation and anonymity in 12 steps. Cambridge: Cambridge Scholars Publishing.
Fuchs, C. (2011). Towards an alternative concept of privacy. Journal of Information, Communication and Ethics in Society, 9(4), 220–237.
Fuchs, C. (2012). The political economy of privacy on Facebook. Television & New Media, 13(2), 139–159.
Gerety, T. (1977). Redefining privacy. Harvard Civil Rights-Civil Liberties Law Review, 12, 233–296.
Habermas, J. (1990). Strukturwandel der Öffentlichkeit: Untersuchungen zu einer Kategorie der bürgerlichen Gesellschaft. Frankfurt: Suhrkamp.
Habermas, J. (1992). Faktizität und Geltung - Beiträge zur Diskurstheorie des Rechts und des demokratischen Rechtsstaats. Frankfurt: Suhrkamp.
Helm, P. (2016a). Group privacy in times of big data. Digital Culture and Society, 2(2), 137–152.
Helm, P. (2016b). Suchtkultur und Gruppentherapie: Vom anonymen Ich zum anonymen Wir. Wiesbaden: Springer.
Honneth, A. (1992). Integrity and disrespect: Principles of a conception of morality based on the theory of recognition. Political Theory, 20(2), 187–201.
Kühl, S. (2014). Gruppen, Organisationen, Familien und Bewegungen. Zur Soziologie mitgliedschaftsbasierter Systeme zwischen Interaktion und Gesellschaft. Zeitschrift für Soziologie. Sonderheft Interaktion - Organisation - Gesellschaft revisited (pp. 65–85).
MacKinnon, C. (1989). Toward a feminist theory of the state. Cambridge: Harvard University Press.
Mantelero, A. (2016). Personal data for decisional purposes in the age of analytics: From an individual to a collective dimension of data protection. Computer Law and Security Review, 32(2), 238–255.
Mantelero, A. (2017). From group privacy to collective privacy: Towards a new dimension of privacy and data protection in the big data era. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 139–158). New York: Springer.
Masur, P., Teutsch, D., Dienlin, T., & Trepte, S. (2017). Online-Privatheitskompetenz und deren Bedeutung für demokratische Gesellschaften. In S. Seubert & P. Helm (Eds.), Privatheit und Demokratie. FJSB (pp. 180–189).
Matthews, S. (2010). Anonymity and the social self. American Philosophical Quarterly, 47(4), 351–363.
Mittelstadt, B. (2017). From individual to group privacy in big data analytics. Philosophy & Technology, 30(4), 475–494.
Nissenbaum, H. (1999). The meaning of anonymity in an information age. The Information Society 15(2):141–144.
Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford: Stanford University Press.
Ohm, P. (2010). Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57(6), 1701–1777.
Ohm, P. (2015). Sensitive information. Southern California Law Review, 88, 2–55.
Pateman, C. (1989). Feminist critiques of the public/private dichotomy. In C. Pateman (Ed.), The disorder of women. Democracy, feminism and political theory (pp. 118–140). Stanford: Stanford University Press.
Putnam, R. (1993). The prosperous community: Social capital and public life. The American Prospect, 13, 35–42.
Putnam, R. (2000). Bowling alone: The collapse and revival of American community. New York: Simon & Schuster.
Rachels, J. (1975). Why privacy is important. Philosophy & Public Affairs, 4(4), 323–333.
Rössler, B. (1994). Der Wert des Privaten. Frankfurt: Suhrkamp.
Schäfer, B. (1999). Die soziale Gruppe. In H. Korte & B. Schäfer (Eds.), Einführung in Hauptbegriffe der Soziologie (pp. 127–142). Wiesbaden: Springer.
Sevignani, S. (2015). Privacy and capitalism in the age of social media. New York: Routledge.
Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154(3), 477–560.
Stahl, T. (2016). Indiscriminate mass surveillance and the public sphere. Ethics in Information Technology, 18(1), 33–39.
Taddicken, M. (2014). The ‘Privacy Paradox’ in the social web: The impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. Journal of Computer-Mediated Communication, 19(2), 248–273.
Taylor, L. (2015). No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Environment and Planning D: Society and Space, 34(2), 319–336.
Taylor, L. (2017). Safety in numbers? Group privacy and big data analytics in the developing world. In L. Taylor, L. Floridi & B. van der Sloot (Eds.), Group privacy: New challenges of data technologies (pp. 13–36). New York: Springer.
Taylor, L., Floridi, L., & van der Sloot, B. (2017). Group privacy: New challenges of data technologies. New York: Springer.
Thacker, E. (2004). Networks, swarms and multitudes. In A. Kroker (Ed.), Life in the wires: The CTheory Reader (pp. 165–177). Victoria: Theory Books.
Tocqueville, A. (1990[1840]). Democracy in America. New York: Vintage Books.
Trepte, S., Reinecke, L., Ellison, N., Quiring, O., Yao, M., & Ziegele, M. (2017). A cross-cultural perspective on the privacy calculus. Social Media Society, 3(1), 1–13.
Trepte, S., & Teutsch, D. (2016). Das “Privacy Paradox”. In M. Krämer, S. Schwan, D. Unz & D. M. Suckfüll (Eds.), Medienpsychologie. Schlüsselbegriffe und Konzepte (pp. 372–377). Stuttgart: Kohlhammer Verlag.
Tufekci, Z. (2008). Can you see me now? Audience and disclosure management in online social network sites. Bulletin of Science and Technology Studies, 11/4, 544–564.
Tyrell, H. (1983). Zwischen Interaktion und Organisation II. Die Familie als Gruppe. In F. Neidhardt (Ed.), Gruppensoziologie. Perspektiven und Materialien (pp. 362–390). Wiesbaden: Springer.
Wacks, R. (1989). Personal information: Privacy and the law. Oxford: Clarendon Press.
Wallace, K. A. (1999). ‘Anonymity’. Ethics and Information Technology, 1(1), 23–35.
Warren, M. E. (2001). Democracy and association. Princeton: Princeton University Press.
Wimmer, J. (2007). Gegenöffentlichkeit in der Mediengesellschaft. Analyse eines medialen Spannungsverhältnisses. Wiesbaden: Springer.
Young, I. (2014). Five faces of oppression. Albany: State University of New York Press.
Acknowledgements
The work for this article has been funded by the Volkswagen Foundation.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Sample of meetings selected for participant observation
Group | Place | Regular time | Dates visited |
---|---|---|---|
Alcoholics Anonymous | AA-Room, Passau/Germany | Thursdays 7.00 pm | Every 1st Thursday per month, May–Feb. 2012–2013 |
Overeaters Anonymous | KISS, Regensburg/Germany | 2.00 pm | 2.6.2013 |
Overeaters Anonymous | LGBT Center, New York City | Daily 12.00 pm | 11.2., 29.3., 3.5., 25.6.2013 |
Narcotics Anonymous and Experts | Empire Hotel, New York City | “Roundtable” | 19.04.2013 |
Narcotics Anonymous | St. Gregory’s Church, New York City | Mondays 7.00 pm | 20.04.2013 |
Alcoholics Anonymous | Quakers´ House, Pennsylvania | Mondays 8.00 pm | 13.05.2013 |
Sex Addicts Anonymous | LGBT Center, New York City | Saturdays 6.00 pm | 18.05.2013 |
Gamblers Anonymous | St. Agatha Church 702, 49th | Thursdays 7.00 pm | 16.05.2013 |
Al-Anon | St. Gregory’s Church, New York State, Saugertiers | Thursdays 12.00 pm | 16.05.2013 |
Sex and Love Addicts Anonymous | Methodist Church, New York City | Tuesdays 6.00 pm | 21.05.2013 |
Sex and Love Addicts Anonymous | Methodist Church, New York City | Saturdays 18.00 | 01.06.2013 |
Overeaters Anonymous | Community Center Brooklyn, New York City | Mondays 6.00 pm | 24.06.2013 |
Alcoholics Anonymous | General Service Offices of AA, New York | Fridays 11.00 pm | 14.06., 28.06., 6.8., 13.09., 20.09. 2013 |
Underearners Anonymous | LGBT Center, New York City | Daily 10.00 am | 29.06.2013 |
Adult Children of Alcoholics (ACOA) | LGBT Center, New York City | Sundays 11.00 am | 30.06.2013 |
Narcotics Anonymous | Methodist Church, New York State, Woodstock | Sundays 7.30 pm | 14.07.2013 |
Overeaters Anonymous | Group-Center, New York City | Tuesdays 8.00 pm | 23.07.2013 |
Alcoholics Anonymous | Self-Help Center, Frankfurt am Main | Sundays 6.00 pm | 08.09.2013 |
Rights and permissions
About this article
Cite this article
Helm, P. Treating sensitive topics online: a privacy dilemma. Ethics Inf Technol 20, 303–313 (2018). https://doi.org/10.1007/s10676-018-9482-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10676-018-9482-4