Privacy and the Identity Gap in Socio-Technical Systems

Privacy and the Identity Gap in Socio-Technical Systems

Catherine Heeney (The University of Oxford, UK)
DOI: 10.4018/978-1-60566-264-0.ch008
OnDemand PDF Download:


The chapter discusses the traditional expectations about privacy protection and argues that current models for the governance of data do not adequately fulfil these expectations. The traditional models of privacy protection are based on the assumption that strict anomymisation of released statistical data is the way to protect privacy and ensure public trust in the research enterprise. It will be argued that the main barriers to privacy preservation and the perpetuation of public trust are due to the capabilities of information technology on the one hand and the availability of numerous data sources on the other. Furthermore, both types of resource enable certain types of organisation to ‘read’ and categorise other people. The realities of data-processing technologies challenge the dichotomy, present in the legal framework for data-protection, between ‘personal’ and research data. This dichotomy, moreover, is not useful in the protection of informational privacy. The chapter will refer to several examples of uses of data in what are in effect ‘socio-technical systems’, which arguably challenge accepted methods of privacy protection in this area.
Chapter Preview

So act that you use humanity, whether in your own person or in the person of any other, always at the same time as end, never merely as a means. (Ak 4:429)

—Kant, I, 1997 Translation,

Groundwork of the Metaphysics of Morals

Cambridge University Press



Research organisations maintain that strict anonymisation of disseminated results is the bedrock of privacy protection and the best way to ensure public trust. In this chapter it will be argued that the realities of data processing within certain ‘socio-technical systems’ mean that the process of anonymisation, which is applied to statistical data, does not alone satisfactorily achieve these aims. The chapter considers traditional approaches taken to the protection of the privacy of data subjects by research organisations. It will be argued that these must be rethought in the light of the availability and use of sophisticated data-processing technologies and multiple data sources. Research organisations rely on a traditional model of anonymisation and informed consent to ensure ethical treatment of data and this approach is still the standard (Lowrance, 2002). This model ostensibly allows data-subjects to control the circumstances in which they provide data and ensure that direct consequences arising from the provision of data will be limited. However, there are many challenges to the efficacy of this model in protecting the values it intends to protect, including privacy and related benefits (Vedder, 2001). The chapter will discuss ways of understanding privacy and consider how certain types of reuse of data, such as profiling, are outside the original organisational context, challenge accepted norms of data classification and as a result undermine the ability of the current data protection framework to protect privacy. Nissenbaum’s (1998) concept of ‘contextual integrity’ will be used to explore likely expectations with regard to privacy. The chapter will refer to the use of outputs of National Statistical Institutes (NSIs) in ‘socio-technical systems’ such as that constituted by the information super-bureau, Experion. NSIs provide a good example of a visible public sector organisation, which compiles and disseminates statistical or anonymised data.

Key Terms in this Chapter

Anomymisation: This process involves removing identifiers from the data. This can be done in number of different ways often in combination, these include: Removing variables (The first obvious application of this method is the removal of direct identifiers from the data file.); Global recoding (global recoding consisting in aggregating the values observed in a variable into pre-defined classes, for example, recoding age into five-year age groups); local suppression (which consists in replacing the observed value of one or more variables in a certain record). Anonymization is one solution to minimize the risk of identity disclosure when distributing microdata.

Profiling: This relates to the recording and classification of behaviors. This occurs through aggregating information. This often collating information often derived from a number of resources to build profiles on individuals in order to sell products and to sell model and predict behavior. These profiles may be used by marketers for target advertising. Companies may link profiles to individual’s identities.

Categorize: This means assigning an entity to a category. It involves the classification, labeling of entities so that they can be assigned to a class or a category. This can be done by existing categories (for example age) or specially designed ones, which can, for example be used to segment populations on the basis of a number of different characteristics that they have.

Context: Context involves the organization, or set of researchers or professionals who collected data and explicit or implicit agreements that were established with data-subjects. Context can mean the physical situation but also involves a number of understandings and expectations about what one can expect from data given in a particular situation under a specific set of conditions. An example of a breach of context would be if data provided to one’s doctor for medical purposes was used by a credit company to assess an individual’s financial viability.

Socio-Technical Systems: These are associations of information technology organizations and people. The term embodies recognition that there is interaction between people and technologies. The term also refers to the interaction between societal structures and values and human behaviors.

Personal Data: This is simply identifiable data. In Article 2(b) of EU Directive 95/46/EC, ‘Personal data’ is defined as data that can directly or indirectly be linked to an individual, through an identification number, for example, or to a particular characteristic that would indicate a person’s identity.

Statistical: Statistical data is legally a separate entity from the ‘personal’ data covered by data protection legislation. Statistical data is said to answer questions about number, amount and percentages rather than about individuals.

Privacy: Liberal political theory recognizes this capacity in the rational individual and tends to advocate the protection of the individual’s ability to use this capacity. From this is derived the notion that privacy is one way in which the individual could be protected from becoming subject to manipulation by others. An important point is that the concept of privacy in this chapter is almost always informational privacy or privacy as it relates to information disclosed by an individual. How the concept of informational privacy is derived will be crucial to understanding the way in which other central concepts are used.

Data-Dichotomy: This relates to the distinction between ‘personal’ and statistical data, or the split between identified and non-identified data. The dichotomy between statistical and personal data is constantly reiterated and is relevant to how individual privacy in relation to data is protected.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Ben Shneiderman
Brian Whitworth, Aldo de Moor
Brian Whitworth, Aldo de Moor
List of Reviewers
Prologue: General Socio-Technical Theory
Chapter 1
Brian Whitworth
A socio-technical system (STS) is a social system built upon a technical base. An STS adds social requirements to human-computer interaction (HCI)... Sample PDF
The Social Requirements of Technical Systems
Chapter 2
Matti Tedre
This chapter introduces the reader to some social research characteristics that are central to the social study of computer science. It introduces... Sample PDF
The Social Study of Computer Science
Chapter 3
Ann Borda, Jonathan P. Bowen
This chapter introduces the concept of a Virtual Organization (VO), using the Internet to link geographically separated participants in an efficient... Sample PDF
Virtual Collaboration and Community
Chapter 4
David Davenport
This chapter analyses the effect that social values have on the design of technical systems. Beginning with an examination of the role technology... Sample PDF
The Social Derivation of Technical Systems
Chapter 5
Ken Eason, José Abdelnour-Nocera
This chapter sets the traditional focus of socio-technical systems theory on primary work systems in a modern context where information and... Sample PDF
Socio-Technical Theory and Work Systems in the Information Age
Chapter 6
Peter Day
This chapter introduces the community engagement strategy of the Community Network Analysis (CNA) project and considers its significance to research... Sample PDF
An Engagement Strategy for Community Network Research and Design
Chapter 7
Cleidson R.B. de Souza, David F. Redmiles
This chapter reviews the socio-technical relationship between organizational and software structure. It describes the early theoretical work about... Sample PDF
On the Alignment of Organizational and Software Structure
Ronald K. Stamper
Prologue: Socio-Technical Perspectives
Chapter 8
Catherine Heeney
The chapter discusses the traditional expectations about privacy protection and argues that current models for the governance of data do not... Sample PDF
Privacy and the Identity Gap in Socio-Technical Systems
Chapter 9
Ronald Leenes
Second Life can be seen as a social microcosmos in which fairly normal people lead a social life and where social needs develop. Privacy is one of... Sample PDF
Privacy Regulation in the Metaverse
Chapter 10
David Tuffley
This chapter introduces a process reference model of leadership for integrated teams operating in virtual environments. Geographically dispersed... Sample PDF
Leadership of Integrated Teams in Virtual Environments
Chapter 11
Monique Janneck
For a technology use to be successful, the circumstance of its introduction into a use context—or recontextualization— is crucial. The users of a... Sample PDF
Recontextualising Technology in Appropriation Processes
Chapter 12
Petter Bae Brandtzæg, Jan Heim
The last few years have seen a substantial growth in online communities such as MySpace and Facebook. In order to survive and increase in size... Sample PDF
Explaining Participation in Online Communities
Chapter 13
Malcolm Shore
This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the... Sample PDF
Cyber Security and Anti-Social Networking
Chapter 14
Wilson Huang, Shun-Yung Kevin Wang
This chapter examines the gaps that arise between reactive social control systems and proactive technology systems. The authors further link these... Sample PDF
Emerging Cybercrime Variants in the Socio-Technical Space
Chapter 15
Elayne W. Coakes, Peter Smith, Dee Alwis
This chapter presents the argument that service innovation is promoted by supporting divergent interpretations, enlarging the scope of employee and... Sample PDF
Developing Innovative Practice in Service Industries
Mark Aakhus
Prologue: Socio-Technical Analysis
Chapter 16
Hans Weigand
Often socio-technical systems are designed simply on the basis of what the user asks, and without considering explicitly whether the required... Sample PDF
Using Communication Norms in Socio-Technical Systems
Chapter 17
Jonas Sjöström, Göran Goldkuhl
This chapter introduces the theoretical framework of Socio-Instrumental Pragmatism (SIP) and illustrates how it has been used as an analytic... Sample PDF
Socio-Instrumental Pragmatism in Action
Chapter 18
Paul J. Bracewell
Analytics provides evidence for objective corporate decision-making. Lack of understanding of analytical techniques can create confusion amongst... Sample PDF
A Framework for Using Analytics to Make Decisions
Chapter 19
Mikael Lind, Peter Rittgen
Setting up co-design processes involving several stakeholders is a complex task. In this chapter the authors have looked upon experiences from... Sample PDF
The Challenges of Co-Design and the Case of e-Me
Chapter 20
Harry S. Delugach
Automated tools are often used to support software development workflows. Many of these tools are aimed toward a development workflow that relies... Sample PDF
Formal Analysis of Workflows in Software Development
Chapter 21
Dorit Nevo, Brent Furneaux
This chapter reviews the significance of expectations to information systems development with particular emphasis on the process of requirements... Sample PDF
The Role of Expectations in Information Systems Development
Chapter 22
Jeff Axup
With mobile technologies increasingly weaving themselves into the fabric of our communities, it would be beneficial to increase our understanding of... Sample PDF
Building a Path for Future Communities
Thomas Erickson
Prologue: Socio-Technical Design
Chapter 23
Thomas Herrmann
Socio-technical systems integrate technical and organizational structures and are related to various stakeholders and their perspectives. The design... Sample PDF
Systems Design with the Socio-Technical Walkthrough
Chapter 24
Anders I. Mørch
This chapter presents a translational approach to socio-technical design, as a new approach to the theorybased design of user interfaces, supported... Sample PDF
Applied Pragmatism and Interaction Design
Chapter 25
Manuel Kolp, Yves Wautelet
Information systems are deeply linked to human activities. Unfortunately, development methodologies have been traditionally inspired by programming... Sample PDF
A Social Framework for Software Architectural Design
Chapter 26
Designing for Trust  (pages 388-401)
Piotr Cofta
Designing for trust is a methodology that attempts to design our perception of trust in information systems, in the long-term expectation that such... Sample PDF
Designing for Trust
Chapter 27
Dan Dixon
Three decades ago the concept of pattern languages were introduced in the field of architecture and they have since become widely used in... Sample PDF
Pattern Languages for CMC Design
Chapter 28
Anton Nijholt, Dirk Heylen, Rutger Rienks
In this chapter the authors discuss a particular approach to the creation of socio-technical systems for the meeting domain. Besides presenting a... Sample PDF
Creating Social Technologies to Assist and Understand Social Interactions
Chapter 29
Jos Benders, Ronald Batenburg, Paul Hoeken, Roel Schouteten
This chapter sketches an Organization Design perspective called “Modern Socio-technical Design”, and subsequently discusses the implementation of... Sample PDF
A Modern Socio-Technical View on ERP-Systems
Chapter 30
Mary Allan, David Thorns
The chapter introduces the Bourdieuean habitus and field theory as a framework for an alternative way of investigating how perceptions of Media Rich... Sample PDF
Being Face to Face: A State of Mind or Technological Design?
Chapter 31
Rebecca M. Ellis
This chapter introduces the work of sociologist Pierre Bourdieu and his concepts of “the field” and “capital” in relation to eBay. In any given... Sample PDF
Applying Bourdieu to eBay's Success and Socio-Technical Design
Chapter 32
Christopher A. Miller
This chapter focuses not on technology mediation of human relationships, but rather on human-like relationships with technology itself. The author... Sample PDF
Relationships and Etiquette with Technical Systems
Anton Nijholt
Prologue: Socio-Technical Implementation
Chapter 33
Laura Anna Ripamonti, Ines Di Loreto, Dario Maggiorini
The necessity of supporting more and more social interaction (and not only mere information sharing) in online environments is the disruptive force... Sample PDF
Augmenting Actual Life Through MUVEs
Chapter 34
Mohamed Ben Ammar, Mahmoud Neji, Adel M. Alimi
Affective computing is a new artificial intelligence area that deals with the possibility of making computers able to recognize human emotions in... Sample PDF
The Role of Affect in an Agent-Based Collaborative E-Learning System Used for Engineering Education
Chapter 35
Pernilla Qvarfordt, Shumin Zhai
Eye-gaze plays an important role in face-to-face communication. This chapter presents research on exploiting the rich information contained in human... Sample PDF
Gaze-Aided Human-Computer and Human-Human Dialogue
Chapter 36
Licia Calvi
The chapter presents and combines the results of two case studies dealing with online communities1 in order to understand under which conditions... Sample PDF
How to Engage Users in Online Sociability
Chapter 37
Ivan Launders
The UK National Health Service (NHS) provides the opportunity to undertake local socio-technical system design to help staff maximize the... Sample PDF
Socio-Technical Systems and Knowledge Representation
Chapter 38
Claire de la Varre, Julie Keane, Matthew J. Irvin, Wallace Hannum
This chapter describes the design of a sociotechnical system to support rural high school students in an online distance education (ODE) course. The... Sample PDF
Social Support for Online Learning
Chapter 39
Jeremy Birnholtz, Emilee J. Rader, Daniel B. Horn, Thomas Finholt
This chapter uses the theoretical notion of common ground to explore remote participation in experimental research. On one hand, there is a desire... Sample PDF
Enabling Remote Participation in Research
Starr Roxanne Hiltz
Prologue: Socio-Technical Evaluation
Chapter 40
John M. Carroll, Mary Beth Rosson, Umer Farooq, Jamika D. Burge
Socio-technical systems are social systems that incorporate technological infrastructures. At the group level of analysis, the most important... Sample PDF
Community Collective Efficacy
Chapter 41
Tanguy Coenen, Wouter Van den Bosch, Veerle Van der Sluys
This chapter views social networking sites as supporting social capital and the advantages which derive from it, namely emotional support... Sample PDF
An Analysis of the Socio-Technical Gap in Social Networking Sites
Chapter 42
Olga Kulyk, Betsy van Dijk, Paul van der Vet, Anton Nijholt, Gerrit van der Veer
This chapter addresses awareness support to enhance teamwork in co-located collaborative environments. In particular, the authors focus on the... Sample PDF
Situational Awareness In Collaborative Work Environments
Chapter 43
Janet L. Holland
This chapter deals with research on the development and use of an assessment instrument for measuring affective satisfaction in online learning. The... Sample PDF
A Scale of Affective Satisfaction in Online Learning Communities
Chapter 44
David Hinds, Ronald M. Lee
In this chapter, the authors suggest how measures of “social network health” can be used to evaluate the status and progress of a virtual community.... Sample PDF
Assessing the Social Network Health of Virtual Communities
Chapter 45
Bertram C. Bruce, Andee Rubin, Junghyun An
This chapter introduces situated evaluation as an approach for evaluating socio-technical innovation and change. Many current evaluations simply... Sample PDF
Situated Evaluation of Socio-Technical Systems
Chapter 46
Heike Winschiers-Theophilus
Communities all over the world have established their own value systems which do not necessarily correlate with the intrinsic values of technology.... Sample PDF
Cultural Appropriation of Software Design and Evaluation
Charles Steinfield
Prologue: The Future of Socio-Technical Systems
Chapter 47
Peter J. Denning
Wicked problems (messes) are tangled social situations that are too costly to stay in and too intransigent to get out of. Collaboration is essential... Sample PDF
Resolving Wicked Problems through Collaboration
Chapter 48
Rachel McLean
As a social activity, the shopping experience can not be recreated or improved through technical design alone. This chapter proposes that there is... Sample PDF
The Myth of the e-Commerce Serf to Sovereign Powershift
Chapter 49
Theresa Dirndorfer Anderson
This chapter explores the challenges associated with teaching the principles of socio-technical systems in the dynamic climate that characterizes... Sample PDF
Teaching the Socio-Technical Practices of Tomorrow Today
Chapter 50
Isa Jahnke
The chapter describes an empirical study of a socio-technical community—as an extended part of an institution— with the aim of revealing its... Sample PDF
Socio-Technical Communities: From Informal to Formal?
Chapter 51
Laurence Claeys, Johan Criel
This chapter introduces the concept of critical user participation as a means to see the socio-technical gap in context aware applications as an... Sample PDF
Future Living in a Participatory Way
Chapter 52
Paul Hodgson
This chapter analyses the formation and generation of social trust through communications technology in postmodern society, and presents some... Sample PDF
The Impact of Communications Technology on Trust
Chapter 53
Kenneth E. Kendall, Julie E. Kendall
This chapter explores the social, organizational, and individual impacts of emerging information technologies using the advent of recent... Sample PDF
Good and Evil in the Garden of Emerging Information Technologies
About the Contributors