Abstract
The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical issues in Big Data research about human affairs. Thus, scientists must learn to take public concerns about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that contrast with “Notice and Consent” forms and offers models for scientists to consider when approaching their potential subjects in research. Drawing from Lessig, Code and Other Laws of Cyberspace, the chapter suggests that four main regulators drive the shape of online activity: Code (or Architecture), Laws, Markets, and Norms. Specifically, scientists should adopt best practices in protecting computerized Big Data (Code), remain completely transparent about their data management practices (Law), make smart choices when deploying digital solutions that place a premium on information protection (Market), and, critically, portray themselves to the public as seriously concerned with protecting the privacy of persons and security of data (Norms). The community of Big Data users and collectors should remember that such data are not just “out there” somewhere but are the intimate details of the lives of real persons who have just as deep an interest in protecting their privacy as they do in the good work that is conducted with such data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bakos, Y., Marotta-Wurgler, F., & Trossen, D. (2014). Does anyone read the fine print? Consumer attention to standard-form contracts. The Journal of Legal Studies, 43(1), 1–35. doi:10.1086/674424.
Boyd, D. (2010). Privacy and Publicity in the Context of Big Data. Retrieved from http://www.danah.org/papers/talks/2010/WWW2010.html.
Calo, R. (2015). Privacy and Markets: A Love Story. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2640607.
Chideya, F. (2015). Medical Privacy Under Threat in the Age of Big Data. Retrieved from https://firstlook.org/theintercept/2015/08/06/how-medical-privacy-laws-leave-patient-data-exposed/.
Christian, L., Dimock, M., Doherty, C., Keeter, S., & Kohut, A. (2012). Assessing the Representativeness of Public Opinion Surveys. Retrieved from http://www.people-press.org/files/legacy-pdf/Assessing%20the%20Representativeness%20of%20Public%20Opinion%20Surveys.pdf.
CIGI-Ipsos. (2014). CIGI-Ipsos Global Survey on Internet Security and Trust. Retrieved from https://www.cigionline.org/internet-surveyl.
Fisher, M. & Timberg, C. (2013). Americans Uneasy About Surveillance But Often Use Snooping Tools, Post Poll Finds. Retrieved from https://www.washingtonpost.com/world/national-security/americans-uneasy-about-surveillance-but-often-use-snooping-tools-post-poll-finds/2013/12/21/ca15e990–67f9-11e3-ae56-22de072140a2_story.html.
Gao, G. (2015). What Americans Think About NSA Surveillance, National Security and Privacy. Retrieved from http://www.pewresearch.org/fact-tank/2015/05/29/what-americans-think-about-nsa-surveillance-national-security-and-privacy/.
Hogan, M., & Shepherd, T. (2015). Information ownership and materiality in an age of big data surveillance. Journal of Information Policy, 5, 6–31. doi:10.5325/jinfopoli.5.2015.0006.
Kerry, C. (2014). Missed Connections: Talking with Europe About Data, Privacy, and Surveillance. Retrieved from http://www.brookings.edu/~/media/research/files/papers/2014/05/20-europe-privacy-surveillance-kerry/kerry_europefreetradeprivacy.pdf.
Marotta-Wurgler, F. (2011). Some realities of online contracting. Supreme Court Economic Review, 19(1), 11–23. doi:10.1086/664560.
Newton, K., & Norris, P. (1999). Confidence in Public Institutions: Faith, Culture, or Performance? Retrieved from http://www.hks.harvard.edu/fs/pnorris/Acrobat/NEWTON.PDF.
Paterson, N. (2014). End user privacy and policy-based networking. Journal of Information Policy, 4, 28–43. doi:10.5325/jinfopoli.4.2014.0028.
Preibusch, S. (2015). Privacy Behaviors After Snowden. Communications of the ACM, 58(5), 48–55. doi:10.1145/2663341.
Rainie, L., & Madden, M. (2015). Americans’ Privacy Strategies Post-Snowden. Retrieved from http://www.pewinternet.org/files/2015/03/PI_AmericansPrivacyStrategies_0316151.pdf.
Schneier, B. (2014). Over 700 Million People Taking Steps to Avoid NSA Surveillance. Retrieved from http://www.lawfareblog.com/over-700-million-people-taking-steps-avoid-nsa-surveillance.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Knapp, J.A. (2016). Engaging the Public in Ethical Reasoning About Big Data. In: Collmann, J., Matei, S. (eds) Ethical Reasoning in Big Data. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-28422-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-28422-4_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28420-0
Online ISBN: 978-3-319-28422-4
eBook Packages: Computer ScienceComputer Science (R0)