Abstract
The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy (Nissenabum 2010), to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging technologies. We then apply that heuristic device to questions surrounding one aspect of cloud computing -- viz., "cloud storage" technology. In particular, we focus on current practices affecting Google Docs as an instance of a cloud-storage system.
- Breitbart (2010) "Google software bug shared private online documents," http://www.breitbart.com/article.php?id=CNG.54c3200980573ae4c...Retrieved March 25, 2011.Google Scholar
- Brey, P. (2000) "Disclosive Computer Ethics," Computers and Society, Vol. 30, No. 4, pp. 10--16. Google ScholarDigital Library
- Cavoukian, A. (2008) Privacy in the Clouds: A White Paper on Privacy and Digital Identity: Implications for the Internet. Available at: http://www.ipc.on.ca/images/resources/privacyintheclouds.pdf.Google Scholar
- Freidman, B., Kahn, P., and Borning, A. (2008) "Value Sensitive Design and Information Systems." In Himma, K. E. and Tavani, H. T., eds. The Handbook of Information and Computer Ethics. Hoboken, NJ: John Wiley and Sons, pp. 69--101.Google Scholar
- Grodzinsky, F. S. and Tavani, H. T. (2005) "P2P Networks and the Verizon v. RIAA Case: Implications for Personal Privacy and Intellectual Property," Ethics and Information Technology, Vol. 7, No. 4, pp. 28--39. Google ScholarDigital Library
- Grodzinsky, F. S. and Tavani, H. T. (2008) "Online File Sharing: Resolving the Tensions between Privacy and Property," Computers and Society, Vol. 38, No. 4, pp. 28--39. Google ScholarDigital Library
- Grodzinsky, F. S. and Tavani, H. T. (2009) "Can the 'Contextual Integrity' Model of Privacy Be Applied to Blogs and the Blogosphere?" In M. Bottis, ed. Eighth International Conference on Computer Ethics: Philosophy Enquiry. Athens, Greece: Nomiki Bibliothiki, pp. 302--311. {Reprinted in slightly revised form in International Journal of Internet Research Ethics, Vol. 3, No. 1, 2010, pp. 38--47.}Google Scholar
- Knorr, E., and Gruman, G. (2010) "What Cloud Computing Really Means," InfoWorld. Retrieved from http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031?page=0,0 December 3, 2010.Google Scholar
- Miller. K. and Voas, J. (2010) "Ethics in the Cloud," IT Professional, Vol.12, No.5, pp. 4--5. Google ScholarDigital Library
- Moor, J. (1997) "Towards a Theory of Privacy in the Information Age," Computers and Society, Vol. 27, No. 3, pp. 27--32. Google ScholarDigital Library
- Nissenbaum, H. (1997) "Toward an Approach to Privacy in Public: Challenges of Information Technology," Ethics and Behavior, Vol. 7, No. 3, pp. 207--219.Google ScholarCross Ref
- Nissenbaum, H. (1998) "Protecting Privacy in an Information Age," Law and Philosophy, Vol. 17, pp. 559--596.Google Scholar
- Nissenbaum, H. (2004) "Privacy as Contextual Integrity," Washington Law Review, Vol. 79, No. 1, pp. 119--157.Google Scholar
- Nissenbaum, H. (2010) Privacy in Context: Technology, Policy, and the Integrity of Social Life. Palo Alto, CA: Stanford University Press. Google ScholarDigital Library
- Pieters, W. and van Cleeff, A. (2009) "The Precautionary Principle in a World of Digital Dependencies," IEEE Computer, Vol. 42, No. 8, pp. 50--56. Google ScholarDigital Library
- Privacy Rights Clearing House. (2008) The Privacy Implications of Cloud Computing. Available at http://www.privacy rights.org/ar/cloud-computing.htm.Google Scholar
- Tavani, H. T. (2007) "Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy," Metaphilosophy, Vol. 38, 1, pp. 1--2.Google ScholarCross Ref
- Tavani, H. T. (2008a) "Information Privacy: Concepts, Theories and Controversies." In Himma, K. E. and Tavani, H. T., eds. The Handbook of Information and Computer Ethics. Hoboken, NJ: John Wiley and Sons, pp. 131--164.Google Scholar
- Tavani, H. T. (2008b) "Floridi's Ontological Theory of Informational Privacy: Some Implications and Challenges," Ethics and Information Technology, Vol. 10, Nos. 2-3, pp. 155--156. Google ScholarDigital Library
- Zeng, K. and Cavoukian A. (2010) Modeling Cloud Computing Architecture without Compromising Privacy: A Privacy by Design Approach. Available at: www.privacybydesign.caGoogle Scholar
Index Terms
- Privacy in "the cloud": applying Nissenbaum's theory of contextual integrity
Recommendations
Cloud Storage as the Infrastructure of Cloud Computing
ICICCI '10: Proceedings of the 2010 International Conference on Intelligent Computing and Cognitive InformaticsAs an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company’s high-performance computing and storage infrastructure through web services. With cloud ...
Cloud Computing Security: From Single to Multi-clouds
HICSS '12: Proceedings of the 2012 45th Hawaii International Conference on System SciencesThe use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, ...
Cloud Computing: An Overview
CloudCom '09: Proceedings of the 1st International Conference on Cloud ComputingIn order to support the maximum number of user and elastic service with the minimum resource, the Internet service provider invented the cloud computing. within a few years, emerging cloud computing has became the hottest technology. From the ...
Comments