The first reading by Beldad et al. (2011) proposed a theoretical framework for personal information-related behaviors on the Internet. There was a lot of good information in this article, however, to shorten my discussion, I would like to just discuss the idea of social exchange. This article discusses how individuals may trade their personal information for other benefits. That is, an individual may give up some of his or her privacy to gain a monetary reward, or some other type of reward such as group membership on a social media site such as Facebook. I found it interesting to consider our private information as a type of currency that can be used to purchase tangibles and intangibles. The second reading also discussed this idea when describing how Google is attempting to shift the responsibility of privacy over to the users. Although, I agree that that our information is just that, it is ours. I fear that we often hand it over without even realizing what is at stake. As discussed in some of the readings, even if the privacy statements are read in full, how many of us completely understand them? Also, can we really trust these companies with our information? It seems that this loss of privacy may be a cost of participating in the network.
Finally, the last three readings discussed the distinction between the public and the private. Ford (2011) started off the discussion by describing the times that we live in, and how we are currently seeing a break down of the barrier between the public and the private. Although the public/private divide has often been treated as a dichotomy, Ford argues that this view must change to better reflect this barrier break down previously mentioned. She goes on to give examples of how technology has helped to blur the divide between the public/private. For example, she discussed how some individuals have actually turned much of their own life into a public show by using webcams to broadcast themselves online. After discussing many other examples, Ford attempts to reconceptualize the public and the private by proposing a continuum that “is anchored on one end by the ‘private’ and on the other by the ‘public’.” Ford goes on to declare that “between the purely private and the purely public there exist an infinite and infinitely variable number of configurations that fall somewhere between” the public and private distinctions.
Although, Ford makes a good case for a public/private continuum, not everyone has bought into this idea. Shortly after Ford’s article, Jurgenson and Rey (2012) published a comment on this proposed continuum. In fact, Jurgenson and Rey discuss how Ford did not break far enough away from the traditional idea of the public/private distinction. They argue that privacy and publicity may “be better understood as a dialectic.” That is, they view privacy as implying publicity and vice versa. They go on to discuss how posting a picture online makes it public, but that this implies the private by not displaying the whole story. For example, individuals viewing the photo may not know who took it, where it was taken, or what the photographer chose not to photograph. In short, this dialectic view describes how publicity can reinforce privacy and the other way around.
In a response by Ford (2012) to the comments of Jurgenson and Rey, Ford states that her recent research has further strengthened her continuum argument. She goes on to explain in greater detail how her continuum may better explain some of the public/private examples discussed in Jurgenson and Rey’s article. For example, Ford discusses how the act of ‘white walling’ can be better understood within her continuum view. She describes how once information has been made public, but is then deleted, there is no guarantee that the information is completely private. This information may have already been viewed and even copied. She argues that this “deleted content exists in the liminal space between the truly public and the truly private.” To be fair, I can somewhat see both sides. However, I would probably side with Ford’s continuum model.
Beldad, A., de Jong, M., & Steehouder, M. (2011). A comprehensive theoretical framework for personal information-related behaviors on the internet. The Information Society, 27, 220-232.
Bodle, R. (2011). Privacy and participation in the cloud: Ethical implications of Google’s privacy practices and public communications. In B. E. Drushel & K. German (Eds.), The ethics of emerging media: Information, social norms, and new media technology (pp. 155-174). New York: Continuum.
Ford, S. M. (2011). Reconceptualizing the public/private distinction in the age of information technology. Information, Communication & Society, 14, 550-567.
Ford, S. M. (2012). Response to Jurgenson and Rey. Information, Communication & Society, 15, 294- 296.
Jurgenson, N., & Rey, P. J. (2012). Comment on Sarah Ford’s ‘Reconceptualization of privacy and publicity’. Information, Communication & Society, 15, 287-293.