全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

A Metric for Calculating the Extent of Non-Knowledge (Level) of Personal Privacy

DOI: 10.4236/oalib.1113554, PP. 1-13

Subject Areas: Sociology

Keywords: Personal Privacy, Personal Privacy Basic Components, Deep and General Personal Privacy, Social Distance, Metric for Calculating the Extent of Non-Knowledge of Personal Privacy Information

Full-Text   Cite this paper   Add to My Lib

Abstract

Personal privacy, in various aspects, has occupied humanity since the dawn of civilization, evolving and changing throughout human history. For the last two decades, the privacy issue has persistently remained the focus of public attention. Privacy, especially different aspects of personal privacy1, continues to be at the center of public debate. This growing preoccupation with personal privacy stems from the great changes [1] that information and communication technologies (ICTs) have brought about in all walks of life during the last twenty years. The information revolution has made it possible to translate personal privacy into personal privacy information and, consequently, to discuss personal privacy in terms of personal privacy information. According to Shannon’s information theory [2]. Information is measurable and quantifiable, so discussing personal privacy information allows us to replace a qualitative discussion of the definitions and essence of personal privacy with a quantitative discussion of the degree of one’s privacy in each state of affairs. In this article, I will introduce a metric for quantifying and measuring personal privacy in each situation. This metric is based on the concept of “social distance” [3], which is equivalent to personal privacy. We will see how, with insights from information theory and the technological capabilities of ICTs, the abstract concept of social distance can be quantified and measured.

Cite this paper

Oppenheim, Y. (2025). A Metric for Calculating the Extent of Non-Knowledge (Level) of Personal Privacy. Open Access Library Journal, 12, e3554. doi: http://dx.doi.org/10.4236/oalib.1113554.

References

[1]  Toffler, A. (1980) The Third Wave. Morrow, 17.
[2]  Shannon, C.E. (1948) A Mathematical Theory of Communication. Bell System Technical Journal, 27, 623-656. https://doi.org/10.1002/j.1538-7305.1948.tb00917.x
[3]  Simmel, G. (1910) How Is Society Possible? American Journal of Sociology, 16, 372-391. https://doi.org/10.1086/211904
[4]  Solove, D.J. (2009) Understanding Privacy. Harvard University Press, 1-2.
[5]  Nissenbaum, H. (2009) Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, 16. https://doi.org/10.1515/9780804772891
[6]  Schoeman, F.D. (1984) Privacy: Philosophical Dimensions. In: Schoeman, F.D., Ed., Philosophical Dimensions of Privacy: An Anthology, Cambridge University Press, 3.
[7]  Laurie, G. (2002) Genetic Privacy: A Challenge to Medico Legal Norm. Cambridge University Press, 6. https://doi.org/10.1017/cbo9780511495342
[8]  Hongladarom, S. (2016) A Buddhist Theory of Privacy. Springer, 16.
[9]  Gavison, R. (1980) Privacy and the Limits of Law. The Yale Law Journal, 89, 421. https://doi.org/10.2307/795891
[10]  Solove, D.J. (2002) Conceptualizing Privacy. California Law Review, 90, 1088 1154. https://doi.org/10.2307/3481326
[11]  https://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html
[12]  Gavison, R. (1980) Privacy and the Limits of Law. The Yale Law Journal, 89, 433.
[13]  Solove, D.J. (2002) Conceptualizing Privacy. California Law Review, 90, 1107.
[14]  Fried, C. (1968) Privacy. The Yale Law Journal, 77, 475-493. https://doi.org/10.2307/794941
[15]  Gerstein, R.S. (1978) Intimacy and Privacy. Ethics, 89, 76-81. https://doi.org/10.1086/292105
[16]  Yair, O. (2024) Personal Privacy in the Age of the Internet.
[17]  “Autonomy”, Internet Encyclopedia of Philosophy. https://iep.utm.edu/autonomy/
[18]  Floridi, L. (2011) The Informational Nature of Personal Identity. Minds and Machines, 21, 549-566. https://doi.org/10.1007/s11023-011-9259-6
[19]  Levin, I. (2016) Cyber-Physical Systems as a Cultural Phenomenon. International Journal of Design Sciences and Technology, 22, 67-80.
[20]  Rabi, L. (2009) The Burden of Individuality: The Origins of the Modern Ideal of Individuality. Pardes, 255. (In Hebrew)
[21]  Garcia, J.J.E. (1988) Individuality: An Essay on the Foundation of Metaphysics. State University of New York Press, 234.
[22]  Schechtman, M. (2007) Stories, Lives, and Basic Survival: A Refinement and Defense of the Narrative View. In: Hutto, D., Ed., Narrative and Understanding Persons, Cambridge University Press, 155-178. https://doi.org/10.1017/cbo9780511627903.009
[23]  Birnhack, M.D. (2010) Private Space: The Right to Privacy, Law and Technology. Bar-Ilan University, 269. (In Hebrew)
[24]  Nissenbaum, H. (1999) The Meaning of Anonymity in an In-formation Age. The Information Society, 15, 141-144. https://doi.org/10.1080/019722499128592
[25]  Schneier, B. (2016) Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton and Company, 4-42.
[26]  Simmel, G. and Wolff, K.H. (1950) The Sociology of Georg Simmel. Free Press, 312.
[27]  For the Full Excel File. https://onedrive.live.com/edit?id=CAC67BD0F9AD4A17!s19064f3a06d64bffaea3c 3187d97c39f&resid=CAC67BD0F9AD4A17!s19064f3a06d64bffaea3c3187d97c39f& amp;cid=cac67bd0f9ad4a17&ithint=file%2Cxlsx&redeem=aHR0cHM6Ly8xZ HJ2Lm1zL3gvYy9jYWM2N2JkMGY5YWQ0YTE3L0VUcFBCaG5XQnY5THJxUERHSDJYdzU4Qk1iRzR BLXZlM1JsX0FfanRYSkdiYlE_ZT12VFc5TWk&migratedtospo=true&wdo=2
[28]  ChatGPT Prompts Appendix. https://1drv.ms/w/c/cac67bd0f9ad4a17/ERrHn7bWXp9KnjY9PCXyBhQBILgm0FKA6fJwV1BROWEueg?e=ak970B

Full-Text


Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133