Writer and philosopher

Privacy

Privacy is the state of remoteness of an individual or a group, or their personal space, or their property, from scrutiny, intrusion or interference from others. It's under threat from all sorts of directions - technology of course, but also the increasing tendency of both governments and private citizens to assume that others' private affairs are public property.

Books relating to Privacy

Dictionary of Privacy, Data Protection and Information Security

The Dictionary of Privacy, Data Protection and Information Security explains the complex technical terms, legal concepts, privacy management techniques, conceptual matters and vocabulary that inform public debate about privacy.

Interdisciplinary in scope, this Dictionary is invaluable to students, scholars and researchers in law, technology and computing, cybersecurity, sociology, public policy and administration, and regulation. It is also a vital reference for diverse practitioners including data scientists, lawyers, policymakers and regulators.

Find Out More

The De-Identification Decision-Making Framework

The De-Identification Decision-Making Framework is an adaptation to the Australian context of the
UK resource The Anonymisation Decision-Making Framework, and is the result of a close
collaboration of CSIRO and the Office of the Australian Information Commissioner, with input from
the Australian Bureau of Statistics and the Australian Institute of Health and Welfare. The
adaptation has required revisions due to differences in the legal frameworks, the use of Australian
examples and terminology, and minimal additional changes.

Find Out More

The Anonymisation Decision-Making Framework

The ADF provides a way of thinking about anonymisation and the reuse of personal data that breaks out of the constraints of overly technical or overly legal framings of the problem. Effectively anonymising data whilst still remaining compliant with GDPR is possible, given a suitable framework and set of tools. GDPR is intended to facilitate proper and appropriate data sharing and reuse as well as protecting data subjects. The ADF provides a mechanism for realising both of these ambitions.

Find Out More

The Spy in the Coffee Machine

We are entering a new state of global hypersurveillance. As we increasingly resort to technology for our work and play, our electronic activity leaves behind digital footprints that can be used to track our movements. In our cars, telephones, even our coffee machines, tiny computers communicating wirelessly via the Internet can serve as miniature witnesses, forming powerful networks whose emergent behaviour can be very complex, intelligent, and invasive. The question is: how much of an infringement on privacy are they? Exposing the invasion of our privacy from CCTVs to blogs, The Spy in the Coffee Machine explores what—if anything—we can do to prevent it from disappearing forever in the digital age, and provides readers with a much needed wake-up call to the benefits and dangers of this new technology.

Find Out More

Life and the Law in the Era of Data-Driven Agency

This ground-breaking and timely book explores how big data, artificial intelligence and algorithms are creating new types of agency, and the impact that this is having on our lives and the rule of law. Addressing the issues in a thoughtful, cross-disciplinary manner, leading scholars in law, philosophy, computer science and politics examine the ways in which data-driven agency is transforming democratic practices and the meaning of individual choice.

Find Out More

The Seven Veils of Privacy

In this book, Kieron O’Hara reveals that much of the conflict around privacy results from taking different perspectives that veil key assumptions and disguise points of agreement. Focusing on the seven most important of these perspectives, he offers a framework for negotiating this important but complex topic.

Expertly blending insights from philosophy, history, sociology, law, computing and politics, and with plenty of real-world examples, O’Hara’s The Seven Veils of Privacy is both an ideal introduction to the field, and a challenging critique of it.

The Seven Veils of Privacy: How our Debates about Privacy Conceal its Nature is a highly informative book for readers who want to understand privacy through its value, definition, usage and context. Readers will get a stronger sense of what privacy is – and what it is not – by reflecting on the context of the topic, ranging from the personal level to societal realms. Kieron O’Hara sets out to solve the problem of defining privacy by examining its historical and various cultural understandings. 

Kat Fuller, The Sociological Review

Find Out More

Articles relating to Privacy

Privacy, privacy enhancing technologies and the individual

Web Science Trust White Paper #1

2022

Themes: Privacy, Semantic Web/linked data

Law has granted individuals some rights over the use of data about them, but data protection rights have not redressed the balance between the individual and the tech giants. A number of approaches aim to augment personal rights to allow individuals to police their own information space, facilitating informational self-determination. This reports reviews this approach to privacy protection, explaining how controls have generally been conceived either as the use of technology to aid individuals in this policing task, or the creation of further legal instruments to augment their powers. It focuses on two recent attempts to secure or support data protection rights, one using technology and the other the law. The former is called Solid, a decentralised platform for linked data, while the latter is a novel application of trust law to develop data trusts in which individuals’ data is managed by a trustee with the individuals as beneficiaries. The report argues that structural impediments make it hard for thriving, diverse ecosystems of Solid apps or data trusts to achieve critical mass – a problem that has traditionally haunted this empowering approach.

Read the article Download the article

Data trusts

European Data Protection Law Review, 6(4), 484-491

2020

Themes: Data trusts, Privacy

Recent years have seen the burgeoning of a literature on data trusts, and the unwary might therefore be led to believe that it is an idea whose time has come. Unfortunately, the ideas of the various authors who have contributed to this literature, who include the present author, haven’t always coincided, and have been aimed at different problems at different levels of detail and hand-waving. We might therefore say more accurately that ‘data trust’ is a brand whose time has come, which in itself is a not uninteresting phenomenon, worthy of consideration.

Read the article Download the article

Between the editors

Mireille Hildebrandt & Kieron O'Hara (eds.), Life and the Law in the Era of Data-Driven Agency, 16-43

2020

Co-authors: Mireille Hildebrandt,

Themes: Privacy, Society

This chapter contains a crossing of swords and thoughts between the editors, who come from different disciplinary backgrounds and different philosophical traditions, but nevertheless occupy much common ground. The conversation is too short to enable the cutting edge of Occam’s razor, but refers to other work with more extensive argumentation. We agree on a great deal. In particular, we share a precautionary approach that requires proactive consideration of how one’s experimental business models or progressive politics may impact others. However, as the reader will see, at that point we part company! The ensuing dialogue has been illuminating for us, and hopefully will whet the reader’s appetite for the excellent chapters that follow in our edited book Life and the Law in the Era of Data-Driven Agency.

Read the article Download the article

Preface

Mireille Hildebrandt & Kieron O'Hara (eds.), Life and the Law in the Era of Data-Driven Agency, xii-xiv

2020

Co-authors: Mireille Hildebrandt

Themes: Privacy, Society

Preface to the volume Life and the Law in the Era of Data-Driven Agency, edited by Mireille Hildebrandt and Kieron O’Hara.

Read the article Download the article

Introduction: Life and the law in the era of data-driven agency

Mireille Hildebrandt & Kieron O'Hara (eds.), Life and the Law in the Era of Data-Driven Agency, 1-15

2020

Co-authors: Mireille Hildebrandt

Themes: Privacy, Society

This chapter introduces the core topics of the volume Life and the Law in the Era of Data-Driven Agency, providing a hopefully appetizing overview of the chapters and their interrelations.

Read the article Download the article

On blockchains and the General Data Protection Regulation

EU Blockchain Observatory and Forum

2018

Co-authors: Luis-Daniel Ibáñez, Elena Simperl

Themes: Blockchain/cryptocurrency, Data protection

In this paper, we review the legal and technological state of play of the GDPR-Blockchain relationship. Next, we analyse three interaction scenarios between data subjects and blockchain systems, and propose possible ways of achieving GDPR compliance by using state of the art technologies. Finally we review current efforts in the use of blockchains to enforce GDPR principles, in particular ‘Data Protection by Design’.

Read the article Download the article

Functional anonymisation: personal data and the data environment

Computer Law and Security Review, 34(2), 204-221

2018

Co-authors: Mark Elliot, Charles Raab, Christine M. O'Keefe, Elaine Mackey, Chris Dibben, Heather Gowans, Kingsley Purdam, Karen Mc Cullagh

Themes: Data anonymisation

Anonymisation of personal data has a long history stemming from the expansion of the types of data products routinely provided by National Statistical Institutes. Variants on anonymisation have received serious criticism reinforced by much-publicised apparent failures. We argue that both the operators of such schemes and their critics have become confused by being overly focused on the properties of the data itself. We claim that, far from being able to determine whether data is anonymous (and therefore non-personal) by looking at the data alone, any anonymisation technique worthy of the name must take account of not only the data but also its environment.

This paper proposes an alternative formulation called functional anonymisation that focuses on the relationship between the data and the environment within which the data exists (the data environment). We provide a formulation for describing the relationship between the data and its environment that links the legal notion of personal data with the statistical notion of disclosure control. Anonymisation, properly conceived and effectively conducted, can be a critical part of the toolkit of the privacy-respecting data controller and the wider remit of providing accurate and usable data.

Read the article

You are being watched: review of Macnish, The Ethics of Surveillance

Metascience, 27(2), 271-274

2018

Themes: Privacy

Review of Kevin Macnish’s book The Ethics of Surveillance.

Read the article Download the article

The digitally extended self: a lexicological analysis of personal data

Journal of Information Science, 44(4), 552-565

2017

Co-authors: Brian Parkinson, David E. Millard, Richard Giordano

Themes: Privacy

Individuals’ privacy, especially with regard to their personal data, is increasingly an area of concern as people interact with a wider and more pervasive set of digital services. Unfortunately, the terminology around personal data is used inconsistently, the concepts are unclear and there is a poor understanding of their relationships. This is a challenge to those who need to discuss personal data in precise terms, for example, legislators, academics and service providers who seek informed consent from their users. In this article, we present a lexicological analysis of the terms used to describe personal data, use this analysis to identify common concepts and propose a model of the digitally extended self that shows how these concepts of personal data fit together. We then validate the model against key publications and show in practice how it can be used to describe personal data in three scenarios. Our work shows that there is no clearly delineated kernel of personal data, but rather that there are layers of personal data, with different qualities, sources and claims of ownership, which extend out from the individual and form the digitally extended self.

Read the article Download the article

Social machines as an approach to group privacy

Linnet Taylor, Luciano Floridi & Bart van der Sloot (eds.), Group Privacy: New Challenges of Data Technologies, 101-122

2016

Co-authors: Dave Robertson

Themes: Privacy, Social machines

This chapter introduces the notion of social machines as a way of conceptualising and formalising the interactions between people and private networked technology for problem-solving. It is argued that formalisation of such ‘social computing’ will generate requirements for information flow within social machines and across their boundaries with the outside world. These requirements provide the basis for a notion of group privacy that is neither derivative from the idea of individual privacy preferences, nor founded in political or moral argument, but instead related to the integrity of the social machine and its capabilities for bottom-up problem-solving. This notion of group privacy depends on a particular technological setup, and is not intended to be a general definition, but it has purchase in the context of pervasive technology and big data which has made the question of group privacy pressing and timely.

Read the article

The seven veils of privacy

IEEE Internet Computing, 20(2), 86-91

2016

Themes: Privacy

Here, Kieron O’Hara details a framework of seven levels to help separate the effects and affects of privacy from the facts. In looking at when a privacy boundary is crossed or not, this framework helps citizens think about when that’s problematic, and why this differs not only across cultures, but also across generations and even for the same individuals.

Read the article Download the article

The right to be forgotten: the good, the bad and the ugly

IEEE Internet Computing, 19(4), 73-79

2015

Themes: Data protection

Viviane Reding’s (three-time European Commissioner) muscular speeches advocating a right to be forgotten for Europeans kick-started a ruckus that has pitched the European Union (EU) against the US and privacy activists against Big Data advocates. This issue gained momentum in May 2014, when an appeal by Google Spain against a decision of the Spanish Data Protection Authority (DPA), la Agencia Española de Protección de Datos (AEPD), was rejected by the Court of Justice of the European Union (CJEU), thereby enshrining the right to be forgotten in law. This paper discusses in depth considers the right to be forgotten, including its potential ramifications and successes.

Read the article Download the article

The fridge’s brain sure ain’t the icebox

IEEE Internet Computing, 18(6), 81-84

2014

Themes: Computing/The Internet, Privacy

The emergence of the Internet of Things (IoT) promises new and exciting possibilities for our personal health, transport, the environment, and many other areas. However, it does of course pose privacy and security problems. This article argues that there are six complex and difficult privacy concerns that are specific to the IoT. The situation is made even more complex because it isn’t clear who should regulate the IoT, and how best to do it.

Read the article Download the article

The future of social Is personal: the potential of the Personal Data Store

Daniele Miorandi, Vincenzo Maltese, Michael Rovatsos, Anton Nijholt & James Stewart (ed.), Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society, 125-158

2014

Co-authors: Max Van Kleek

Themes: Computing/The Internet, Privacy

This chapter argues that technical architectures that facilitate the longitudinal, decentralised and individual-centric personal collection and curation of data will be an important, but partial, response to the pressing problem of the autonomy of the data subject, and the asymmetry of power between the subject and large scale service providers/data consumers. Towards framing the scope and role of such Personal Data Stores (PDSs), the legalistic notion of personal data is examined, and it is argued that a more inclusive, intuitive notion expresses more accurately what individuals require in order to preserve their autonomy in a data-driven world of large aggregators. Six challenges towards realising the PDS vision are set out: the requirement to store data for long periods; the difficulties of managing data for individuals; the need to reconsider the regulatory basis for third-party access to data; the need to comply with international data handling standards; the need to integrate privacy-enhancing technologies; and the need to future-proof data gathering against the evolution of social norms. The open experimental PDS platform INDX is introduced and described, as a means of beginning to address at least some of these six challenges.

Read the article

Are we getting privacy the wrong way round?

IEEE Internet Computing, 17(4), 89-92

2013

Themes: Privacy

Individualists, communitarians, and technological determinists agree that privacy’s benefits accrue to individuals, and that its costs (in terms of less security or efficiency) fall on society. As such, it is the individual’s choice to give privacy away. However, privacy does benefit wider society in important respects, and so this consensus is flawed.

Read the article Download the article

Talks relating to Privacy

The Seven Veils of Privacy

Digital Trust & Security Seminar Series, Digital Futures, University of Manchester

March 20th, 2024

Themes: Privacy

Category: Invited talk

Watch

The Seven Veils of Privacy

Interview with Giles Brown for Talk Radio Europe

March 18th, 2024

Themes: Privacy

Category: Interview

Listen

Computationally Mediated Pro-Social Deception

Promotional film for CHI '16: the 2016 CHI Conference on Human Factors in Computing Systems

April 26th, 2016

Themes: Privacy

Category: Promotional video

Watch

Data Mining – Exploring the Ethical Dilemmas

#MiningData, Exploring the Ethical Dilemmas, Southampton

July 17th, 2018

Themes: Computing/The Internet, Privacy

Category: Panel

Watch

The Right to be De-listed: the Good, the Bad and the Ugly

iCLIC conference: Internet intermediaries and the law enforcement process - Challenges and opportunities, Southampton Law School

September 17th, 2015

Themes: Privacy

Category: Conference talk

Watch

Ethics of Surveillance, Power and Citizenship

#MiningData, Exploring the Ethical Dilemmas, Southampton

July 17th, 2018

Themes: Computing/The Internet, Privacy

Category: Invited talk

Watch