CMST 2LW3 Lecture Notes - Lecture 15: Computer Security, Human Computer, Social Theory
Document Summary
Pre-internet: preservation of privacy to sustain intimatee relationships with others. Privacy as surveillance of the bureaucratic state (foucault) Privacy as an extension of state limit on the seizure and search of property. Privacy laws as responses to technological developments (lindsay) What is privacy? it depends on the roles played by those who send and receive (information ow and whom the information is about) Depends on norms, negative (deny), or positive (allow) There is a realm of public information about persons to which no privacy norms apply. An aggregation of information doesn"t violate privacy if its parts, taken individually, do not. What is privacy: controlled by the individual, controlled by the collective. From privacy to con dentiality (not on the midterm: privacy as a component of security privacy often seen as a subset of security, security as a constraint on privacy.