skip to main content
research-article

Privacy in "the cloud": applying Nissenbaum's theory of contextual integrity

Published:01 October 2011Publication History
Skip Abstract Section

Abstract

The present essay is organized into five main sections. We begin with a few preliminary remarks about "cloud computing," which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum's framework of "privacy as contextual integrity." In particular, we examine Nissenbaum's "Decision Heuristic" model, described in her most recent work on privacy (Nissenabum 2010), to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging technologies. We then apply that heuristic device to questions surrounding one aspect of cloud computing -- viz., "cloud storage" technology. In particular, we focus on current practices affecting Google Docs as an instance of a cloud-storage system.

References

  1. Breitbart (2010) "Google software bug shared private online documents," http://www.breitbart.com/article.php?id=CNG.54c3200980573ae4c...Retrieved March 25, 2011.Google ScholarGoogle Scholar
  2. Brey, P. (2000) "Disclosive Computer Ethics," Computers and Society, Vol. 30, No. 4, pp. 10--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Cavoukian, A. (2008) Privacy in the Clouds: A White Paper on Privacy and Digital Identity: Implications for the Internet. Available at: http://www.ipc.on.ca/images/resources/privacyintheclouds.pdf.Google ScholarGoogle Scholar
  4. Freidman, B., Kahn, P., and Borning, A. (2008) "Value Sensitive Design and Information Systems." In Himma, K. E. and Tavani, H. T., eds. The Handbook of Information and Computer Ethics. Hoboken, NJ: John Wiley and Sons, pp. 69--101.Google ScholarGoogle Scholar
  5. Grodzinsky, F. S. and Tavani, H. T. (2005) "P2P Networks and the Verizon v. RIAA Case: Implications for Personal Privacy and Intellectual Property," Ethics and Information Technology, Vol. 7, No. 4, pp. 28--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Grodzinsky, F. S. and Tavani, H. T. (2008) "Online File Sharing: Resolving the Tensions between Privacy and Property," Computers and Society, Vol. 38, No. 4, pp. 28--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Grodzinsky, F. S. and Tavani, H. T. (2009) "Can the 'Contextual Integrity' Model of Privacy Be Applied to Blogs and the Blogosphere?" In M. Bottis, ed. Eighth International Conference on Computer Ethics: Philosophy Enquiry. Athens, Greece: Nomiki Bibliothiki, pp. 302--311. {Reprinted in slightly revised form in International Journal of Internet Research Ethics, Vol. 3, No. 1, 2010, pp. 38--47.}Google ScholarGoogle Scholar
  8. Knorr, E., and Gruman, G. (2010) "What Cloud Computing Really Means," InfoWorld. Retrieved from http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031?page=0,0 December 3, 2010.Google ScholarGoogle Scholar
  9. Miller. K. and Voas, J. (2010) "Ethics in the Cloud," IT Professional, Vol.12, No.5, pp. 4--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Moor, J. (1997) "Towards a Theory of Privacy in the Information Age," Computers and Society, Vol. 27, No. 3, pp. 27--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Nissenbaum, H. (1997) "Toward an Approach to Privacy in Public: Challenges of Information Technology," Ethics and Behavior, Vol. 7, No. 3, pp. 207--219.Google ScholarGoogle ScholarCross RefCross Ref
  12. Nissenbaum, H. (1998) "Protecting Privacy in an Information Age," Law and Philosophy, Vol. 17, pp. 559--596.Google ScholarGoogle Scholar
  13. Nissenbaum, H. (2004) "Privacy as Contextual Integrity," Washington Law Review, Vol. 79, No. 1, pp. 119--157.Google ScholarGoogle Scholar
  14. Nissenbaum, H. (2010) Privacy in Context: Technology, Policy, and the Integrity of Social Life. Palo Alto, CA: Stanford University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Pieters, W. and van Cleeff, A. (2009) "The Precautionary Principle in a World of Digital Dependencies," IEEE Computer, Vol. 42, No. 8, pp. 50--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Privacy Rights Clearing House. (2008) The Privacy Implications of Cloud Computing. Available at http://www.privacy rights.org/ar/cloud-computing.htm.Google ScholarGoogle Scholar
  17. Tavani, H. T. (2007) "Philosophical Theories of Privacy: Implications for an Adequate Online Privacy Policy," Metaphilosophy, Vol. 38, 1, pp. 1--2.Google ScholarGoogle ScholarCross RefCross Ref
  18. Tavani, H. T. (2008a) "Information Privacy: Concepts, Theories and Controversies." In Himma, K. E. and Tavani, H. T., eds. The Handbook of Information and Computer Ethics. Hoboken, NJ: John Wiley and Sons, pp. 131--164.Google ScholarGoogle Scholar
  19. Tavani, H. T. (2008b) "Floridi's Ontological Theory of Informational Privacy: Some Implications and Challenges," Ethics and Information Technology, Vol. 10, Nos. 2-3, pp. 155--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Zeng, K. and Cavoukian A. (2010) Modeling Cloud Computing Architecture without Compromising Privacy: A Privacy by Design Approach. Available at: www.privacybydesign.caGoogle ScholarGoogle Scholar

Index Terms

  1. Privacy in "the cloud": applying Nissenbaum's theory of contextual integrity

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader