Utopia
Dystopia
Functions of utopian worldview:
4 industrial revolutions
1784: Mechanical production, railroads and steam power
1870: Mass production, electrical power and the advent of the assembly line
1969: Automated production, electronics, and computers
Now: Artificial intelligence,
Uncertainty avoidance
The extent to which a society, or group relies on social norms, rules and procedures to minimize the unpredictability of future events
Privacy is defined by
cultures, times, individuals
Three theoretical perspectives:
Westin, 1967: Political-scientific approach:
→ Privacy in interaction with others; society as a whole
Altman, 1975: Psychological approach:
→ privacy for the self; wellbeing and identity regulation
Petronio, 2002: Communication approach:
→ privacy as information ownership and sharing
Westin: privacy as a basic need:
Purposes of privacy: what is privacy for?
States of privacy: how can privacy be achieved?
Irwin Altman formulated the Privacy Regulation Theory;
understanding why individuals alternate between states of sociality and solitude
Five elements of privacy:
Sharing benefits: are generally classified as belonging to three main categories:
Sharing risks. In considering these risks, people need to distinguish between:
The privacy paradox
Assessing users’ perception of privacy versus their privacy protecting behavior scholars have often found the results paradoxical
Limits of the privacy calculus. Behavior quite often guided by “heuristics”
Social proof
Persuasive techniques by platforms
Foot in the door
Door in the face
Affect heuristics
“Framing” effects
Privacy fatigue
Privacy fatigue consit of
Cynism & Emotional exhaustion
Media affordances:
Rationale of expectancy theory
Maximize positive consequences and minimize negative ones. Costs/Bennefits
Privacy
Attitudes consist of:
Differences privacy attitudes/privacy concerns:
Privacy concerns: unipolar –> negative
Privacy attitudes: bipolar
Information sharing online is considered to happen in a trade-off. What are the two forces involved?
Usefulness and security