Database Nation

Last updated
Database Nation: The Death of Privacy in the 21st Century
Database Nation.jpg
Author Simson Garfinkel
CountryUnited States
LanguageEnglish
Published2000
Publisher O'Reilly Media
ISBN 1-56592-653-6

Database Nation is a non-fiction book written by Simson Garfinkel and published in January 2000. In his book, Garfinkel calls on regular people to be aware of what information they are forced to give away, and he calls on the government to protect privacy by passing relevant laws. [1]

Contents

Content

Database Nation gives a general overview of information collection and ownership, GIS and GPS data, purchasing data and other topics related to privacy along with examples of how privacy gets breached. [2] For example, Garfinkel tells a story about a customer who had slipped and fallen on the supermarket's property and decided to sue the supermarket. In response, the supermarket threatened to damage customer's reputation by disclosing the fact that they frequently purchased an alcohol. [3] :202 Special attention is given to medical privacy. For instance, Garfinkel tells how Medical Information Bureau collects medical information and sells it to insurance companies. [4]

Garfinkel shows that, due to the market forces, the technology has a tendency to get more privacy-invasive, especially the technology involving computerization, since the technology that enhances privacy gets more expensive. For example, credit-issuing companies are not interested in spending more money on their security procedures, and this leads to an increase in identity theft. [5]

Garfinkel calls on the government to outlaw blanket consents and to restrict what an agreement can demand from the customer in its terms and conditions. Also, he appeals to the government to bring back the Office of Technology Assessment which was closed in 1995. One of the objectives of the OTA was to "identify existing or probable impacts of technology or technological programs", and it had published many reports dealing with privacy issues. [3] :204–205

Related Research Articles

<span class="mw-page-title-main">Loyalty program</span> Marketing strategy designed to encourage customers to continue to shop at a business

A loyalty program is a marketing strategy designed to encourage customers to continue to shop at or use the services of a business associated with the program. A loyalty program typically involves the operator of a particular program set up an account for a customer of a business associated with the scheme, and then issue to the customer a loyalty card which may be a plastic or paper card, visually similar to a credit card, that identifies the cardholder as a participant in the program. Cards may have a barcode or magstripe to more easily allow for scanning, although some are chip cards or proximity cards.

<span class="mw-page-title-main">Wearable computer</span> Small computing device worn on the body

A wearable computer, also known as a body-borne computer, is a computing device worn on the body. The definition of 'wearable computer' may be narrow or broad, extending to smartphones or even ordinary wristwatches.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Consumer privacy is information privacy as it relates to the consumers of products and services.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.

<span class="mw-page-title-main">Convenience</span> Ease accessibility, save resources, and decrease frustration

Convenient procedures, products and services are those intended to increase ease in accessibility, save resources and decrease frustration. A modern convenience is a labor-saving device, service or substance which make a task easier or more efficient than a traditional method. Convenience is a relative concept, and depends on context. For example, automobiles were once considered a convenience, yet today are regarded as a normal part of life.

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.

<span class="mw-page-title-main">Simson Garfinkel</span> American academic and journalist (born 1965)

Simson L. Garfinkel is the chief scientist of BasisTech in Somerville, Massachusetts. He was previously a program scientist at AI2050, part of Schmidt Futures. He has held several roles across government, including a Senior Data Scientist at the Department of Homeland Security, the US Census Bureau's Senior Computer Scientist for Confidentiality and Data Access and a computer scientist at the National Institute of Standards and Technology. From 2006 to 2015, he was an associate professor at the Naval Postgraduate School in Monterey, California. In addition to his research, Garfinkel is a journalist, an entrepreneur and an inventor; his work is generally concerned with computer security, privacy and information technology.

Information privacy, data privacy or data protection laws provide a legal framework on how to obtain, use and store data of natural persons. The various laws around the world describe the rights of natural persons to control who is using its data. This includes usually the right to get details on which data is stored, for what purpose and to request the deletion in case the purpose is not given anymore.

<i>Being Digital</i> 1995 book by Nicholas Negroponte

Being Digital is a non-fiction book about digital technologies and their possible future by technology author, Nicholas Negroponte. It was originally published in January 1995 by Alfred A. Knopf.

Information ethics has been defined as "the branch of ethics that focuses on the relationship between the creation, organization, dissemination, and use of information, and the ethical standards and moral codes governing human conduct in society". It examines the morality that comes from information as a resource, a product, or as a target. It provides a critical framework for considering moral issues concerning informational privacy, moral agency, new environmental issues, problems arising from the life-cycle of information. It is very vital to understand that librarians, archivists, information professionals among others, really understand the importance of knowing how to disseminate proper information as well as being responsible with their actions when addressing information.

<span class="mw-page-title-main">Paul Dourish</span> British-American computer scientist

Paul Dourish is a computer scientist best known for his work and research at the intersection of computer science and social science. Born in Scotland, he holds the Steckler Endowed Chair of Information and Computer Science at the University of California, Irvine, where he joined the faculty in 2000, and where he directs the Steckler Center for Responsible, Ethical, and Accessible Technology. He is a Fellow of the AAAS, the ACM, and the BCS, and is a two-time winner of the ACM CSCW "Lasting Impact" award, in 2016 and 2021.

Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow online users to protect the privacy of their personally identifiable information (PII), which is often provided to and handled by services or applications. PETs use techniques to minimize an information system's possession of personal data without losing functionality. Generally speaking, PETs can be categorized as hard and soft privacy technologies.

<span class="mw-page-title-main">Cyberethics</span>

Cyber ethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society. For years, various governments have enacted regulations while organizations have defined policies about cyberethics.

Information technology law(IT law) or information, communication and technology law (ICT law) (also called cyberlaw) concerns the juridical regulation of information technology, its possibilities and the consequences of its use, including computing, software coding, artificial intelligence, the internet and virtual worlds. The ICT field of law comprises elements of various branches of law, originating under various acts or statutes of parliaments, the common and continental law and international law. Some important areas it covers are information and data, communication, and information technology, both software and hardware and technical communications technology, including coding and protocols.

The Internet Hunt was a monthly online game and search training tool, conceived and conducted by Rick Gates, as Director of Library Automation UC Santa Barbara, which began 31 August 1992, before the World Wide Web.

The social data revolution is the shift in human communication patterns towards increased personal information sharing and its related implications, made possible by the rise of social networks in the early 2000s. This phenomenon has resulted in the accumulation of unprecedented amounts of public data.

<span class="mw-page-title-main">Enterprise social networking</span>

Enterprise social networking focuses on the use of online social networks or social relations among people who share business interests and/or activities. Enterprise social networking is often a facility of enterprise social software, which is essentially social software used in "enterprise" (business/commercial) contexts. It encompasses modifications to corporate intranets and other classic software platforms used by large companies to organize their communication, collaboration and other aspects of their intranets. Enterprise social networking is also generally thought to include the use of a standard external social networking service to generate visibility for an enterprise.

<span class="mw-page-title-main">De-identification</span> Preventing personal identity from being revealed

De-identification is the process used to prevent someone's personal identity from being revealed. For example, data produced during human subject research might be de-identified to preserve the privacy of research participants. Biological data may be de-identified in order to comply with HIPAA regulations that define and stipulate patient privacy laws.

<span class="mw-page-title-main">Hancock (programming language)</span> Programming language intended for data mining

Hancock is a C-based programming language, first developed by researchers at AT&T Labs in 1998, to analyze data streams. The language was intended by its creators to improve the efficiency and scale of data mining. Hancock works by creating profiles of individuals, utilizing data to provide behavioral and social network information.

References

  1. Etter, Selma C. (2000). "Database Nation the Death of Privacy in the 21st Century". Journal of Computing in Higher Education. 12 (1): 141–143. Retrieved January 19, 2024.
  2. Krammer, Joan (2001). "Database nation: the death of privacy in the 21st century [Reviews]". IEEE Annals of the History of Computing. 23 (3): 80–81. doi:10.1109/MAHC.2001.948913 . Retrieved January 19, 2024.
  3. 1 2 Gurwin, Robert S. (2000). "Database Nation: Does Information Technology of the 21st Century Pose a Daunting Threat to Personal Privacy in America?". Journal of Computer & Information Law. 19 (1). Retrieved January 19, 2024.
  4. Frye, Curtis D. "Technology and Society Book Reviews". Archived from the original on April 16, 2016. Retrieved October 27, 2010.
  5. Regan, Priscilla (2000). "Preserving Privacy". Issues in Science and Technology. 16 (4). Retrieved January 19, 2024.

This article is based on: