Information Privacy

Albert Topdjian
2 min readNov 9, 2016

Assembling my initial thoughts

Information privacy, or data privacy (or data protection), is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

As depicted above there are cases where our online data is stolen, miss used, and vulnerable, but the talk around information privacy is more than just how to protect our data from leaks or attacks. It’s about solidifying the boundaries between our ownership and right to decide what we do with our online data.

Currently society is in an interesting state where we are so willing to give out “private” information in exchange for a service yet we expect our to have complete control over that information once it leaves our hands. It’s like telling someone a secret, it requires you take a huge leap of faith to trust the person on the other end to keep it safe, yet once you tell them you lost the control and right over your secret. This balance struggle is what is currently happening between the typical citizen, corporations and the government. We are cornered into sharing our secrets in exchange for a service or product, that in many cases we cannot live without. It’s as if our personal information acts another kind of currency. To purchase the things we need continue to live “normally”.

Are we really willingly giving away our personal data? Or is it blackmail? Either way, this issue presses important questions about trust, ownership, and rights.

Such a complex and wicked problem can be difficult to dissect, let alone develop any solutions to. To dive into such a deep problem one can only take baby steps into wrapping their minds around this space.

First attempt at mapping out aspects of personal data and privacy

By beginning to map out the objects that exist within such a system and how they interact and link with one another, it can make it easier to find intervention points.

The goal is to continue to break down the facets of information security in such a way as to shed light on possible alterations that can ease the tensions within privacy concerns and personal data.

Speak Lab_11.08.16

--

--