Privacy can be experienced in a number of forms. Alan Westin defined four states – or experiences – of privacy: solitude, intimacy, anonymity, and reserve. Solitude is a physical separation from others (31). Intimacy is a “close, relaxed, and frank relationship between two or more individuals” resulting from the “corporate [collective] seclusion” of a small unit (31). Anonymity is the “desire of individuals for times of 'public privacy'” (32). Lastly, reserve is the “creation of a psychological barrier against unwanted intrusion [which] occurs when the individual's need to limit communication about himself is protected by the willing discretion of those surrounding around him” (32). It is this last state of privacy that is the most crucial to the preservation of the self. As Robert Murphy observe...
... middle of paper ...
...A Behavioural Understanding of Privacy and Its Implications for Privacy Law.” The Modern Law Review 75.5 (2012): 806 – 836. Web. 19 Dec. 2013.
Kufer, Joseph. “Privacy, Autonomy, and Self-Concept.” American Philosophical Quarterly 24.1 (1987): 81 – 89. Web. 19 Dec. 2013.
Lynch, Michael. “Privacy and the Threat to the Self.” The New York Times 22 June 2012: n. pag. Web. 19 Dec. 2013.
Murphy, Robert. “Social Distance and the Veil.” American Anthropologist 66.6 (1964): 1257 – 1274. Web. 19 Dec. 2013.
Reiman, Jeffrey. “Privacy, Intimacy, and Personhood.” Philosophy & Public Affairs 6.1 (1976): 26 – 44. Web. 19 Dec. 2013.
Smith, Jenna (2001). “Privacy and Private States.” The Private I: Privacy in a Public World. Ed. Molly Peacock. Saint Paul: Graywolf Press, 2001. 3 – 22. Web. 19 Dec. 2013.
Westin, Alan. Privacy and Freedom. New York: Atheneum, 1967. Web. 19 Dec. 2013.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- “All human beings have three lives: public, private, and secret.”This quotation can have various interpretations. One main idea which Gabriel García Márquez is portraying in this quote is that privacy is vital for a person and gives the individual autonomy and individuality. Without privacy a person would not be able to live normally. However privacy can and is violated in various scenarios, for instance, in marriage. In the story “To Room Nineteen” written by Doris Lessing the protagonists, Susan Rawlings, privacy was intruded which lead to her suicide.... [tags: To Room Nineteen Essays]
1468 words (4.2 pages)
- The article, “National Identity Cards Strange Liberty, Banish Privacy” by Charles Levendosky, implies that Identity Cards give us a false sense of security. The system would not prevent terrorists from using fake documents to get a national identity card and all citizens’ private information would be shared with government agencies and commercial organizations, therefore all personal information can be easily accessed through a computer system. This would result in a surveillance society with many obstacles due to human errors and leaving citizens with no privacy and freedom to be themselves.... [tags: Identity Cards, privacy]
791 words (2.3 pages)
- Surveillance is an old tactic primarily used by sovereigns throughout the history of mankind. In the western world, surveillance is emerging as an instrumental means of sovereign control. Surveillance-centered sates use the power to acquire material of specific individuals, extensive analysis of situations, groups and people, as well as inhibiting dysfunction. Surveillance is also used by companies and or stores to deny theft. Regardless the specifications of surveillance, all practices use the same modes of inquiry, supervision, regulation, and organization.... [tags: power and identity, cameras]
2301 words (6.6 pages)
- With everyone joining the online world your privacy is at even greater risk then ever before. The internet has become part of our everyday lives, from social networking to online transactions. Your privacy is threatened every day. However is our privacy threatened by our own government. According to the pew research data 56% of Americans say that it is acceptable for the NSA to run through millions of Americans phone records in order to prevent terrorism. (Pew Research Center) Many people still believe that the government has no business in our lives, yet many people including our government invade our digital privacy.... [tags: Privacy Identity Management]
1044 words (3 pages)
- Accordingly, this paper will provide a conceptual discussion using relevant theory that critically analyses tensions between self-identity and social identity. These theories propose that aspects of identity driving behaviour is dependent on the context. Foremost, identity theory is reflective of the correlation concerning the roles that people enact in society and then therefore, includes the identities that those roles exhibit (Hogg, et al., 1995, p. 266). Striker, followed by Tajfel and Turner, compose that social identity theory consist of two levels: personal identity and social identity (Hogg, et al., 1995, p.... [tags: Sociology, Identity, Social psychology, Identity]
1299 words (3.7 pages)
- Benjamin Komoetie, the main character in Fiela’s Child by Dalene Matthee, arrived on the doorstep of Fiela and Selling Komoetie when he was only three years old. It is fortunate that Fiela and Selling Komoetie had raised Benjamin as their own from the day he arrived on their door step until was twelve years old. Although Fiela and Selling Komoetie are not the biological parents of Benjamin, they are remarkable parental figures, as well as the only ones Benjamin knew. At the age of twelve, census takers discovered Benjamin living with Komoetie’s, and had suddenly recalled a story of a boy who had vanished from the forest.... [tags: self identity, fiela's child, dalene matthee]
997 words (2.8 pages)
- identity or autonomy. Representatives of left-wing movements, active in the region, were encouraging agricultural workers to seize land from the large landlords. These disturbances were put down, but not without violence. Meanwhile, in Khuzestan, the center of Iran 's oil industry, members of the Arabic-speaking population organized and demanded a larger share of oil revenues for the region, more jobs for local inhabitants, the use of Arabic as a semi-official language, and a larger degree of local autonomy.... [tags: Iran, Mohammad Reza Pahlavi, Macroeconomics]
1626 words (4.6 pages)
- About 15 million United States residents have their identities and information used fraudulently each year. Along the use of their identities, they also had a combined financial loss totaling up to almost $50 billion. Major companies such as Apple, Verizon, Target, Sony, and many more have been victims of consumer information hacking. In each of the cases, millions of consumers’ personal information has been breached. In the article “Home Depot 's 56 Million Card Breach Bigger Than Target 's” on September 18, 2014, 56 million cards were breached due to cyber attackers.... [tags: Identity theft, Privacy, Credit card]
1586 words (4.5 pages)
- The Lack of Privacy Online Emily often eats her favorite sandwich in a certain restaurant. Once, she mentioned the restaurant in a text message to her friend with whom she wanted to meet there. Then, she searched for some movies on the Internet. She did not believe to what she had seen. All of the pages she visited had small advertisement banners on the sides promoting near restaurants that offer the sandwich she likes. She was frightened and began to question what all the Internet knows about her and who all can access her private information.... [tags: Privacy, Internet privacy, Identity theft]
1370 words (3.9 pages)
- Abstract: In this paper, I will briefly define privacy and "fair information practices." Then I will discuss the regime of self-regulation that is currently in place in the United States to protect these principles as they relate to consumer online data collection and dissemination. Specifically, I will show that there are some problems with this system. In particular, I will point out that privacy practices are not universal, and that companies may not be driven to implement fair information practices by market forces because of the strong financial incentives for them to do otherwise. Finally, I will suggest that legislation like that used in the European Union might be a viable... [tags: Essay on Internet Privacy]
2726 words (7.8 pages)