Privacy Isn’t Dead – It’s Not Even Sleeping

It’s become something of a predictable phenomenon: an article, op-ed, or blog post will surface with an incendiary quote indicating that privacy is dead, or that Internet users have given up privacy with abandon. A slew of data is thrown around – often reporting on teenagers’ online habits – and a eulogy for privacy is trumpeted. Last week, the process repeated itself when a CNET article waxed and waned about why no one cares about privacy anymore.

It is true that our society’s use of technology is changing the ways we interact and has eroded some privacy barriers. However, claims that ‘no one’ cares about privacy are at best short-sighted hyperbole and at worst poorly veiled justifications for future infringements on privacy. As danah boyd [sic], a leading researcher on privacy, social networks, and youth aptly put it this weekend at SXSW: “When people say that privacy is dead, it just warrants others to disregard it.”

Nuanced View of Privacy – The CNET article, which stands as only the most recent of many privacy dirges, referred to a Pew survey that found 40 percent of people with an online profile have disabled privacy settings. But consider the flipside: 60% of adults and 66% of teens maintain privacy settings. This data is consistent with what we are hearing from the social networks themselves: over 50% of Facebook users customized their privacy settings last December using Facebook’s new privacy wizard. As Facebook’s Tim Sparapani recently stated, Facebook users sent a clear message that “privacy is important to [me], I’m going to control my data and I’ve now been given tools by Facebook to do so.”

Of course these statistics fail to reveal the many other actions that users take to protect their privacy. For example, a 2007 Pew study found that more than half of teens post false information to their online profiles, like incorrect birthdays. (Although this technically violates Facebook’s terms of service, Facebook acknowledged that posting false personal information was acceptable behavior.) Other privacy protective behaviors include the widespread use of browser plug-ins that block advertisers from obtaining user information. Continue reading.

Related Posts

FTC’s exploring privacy roundtable webcast "The Federal Trade Commission will host a series of day-long public roundtable discussions to explore the privacy challenges posed by the vast array o...
Unintended Consequences: Twelve Years Under the DMCA Twelve years after the passage of the controversial Digital Millennium Copyright Act (DMCA), the law continues to stymie fair use, free speech, scient...
A Primer on Information Theory and Privacy If we ask whether a fact about a person identifies that person, it turns out that the answer isn't simply yes or no. If all I know about a person is t...
Browser Versions Carry 10.5 Bits of Identifying Information on Average This is part 3 of a series of posts on user tracking on the modern web. You can also read part 1 and part 2. Whenever you visit a web page, your br...
It’s not the Gates, it’s the bars To pay so much attention to Bill Gates' retirement is missing the point. What really matters is not Gates, nor Microsoft, but the unethical system of ...
Digital Books and Your Rights: A Checklist for Readers I. Introduction After several years of false starts, the universe of digital books seems at last poised to expand dramatically. Readers should view...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.

Leave a Comment

Your email address will not be published. Required fields are marked *