REQUIREMENTS

WEB-CT

A. JAMES MCADAMS

NOTRE DAME

Print Page

Private / Public / Internet: Private Realms

 

Home / Morality Tales / Private Realms / Public Realms / Corporate and Individual / Utopia/Dystopia / Projects

 

PolS 486 / CAPP 479

" . . . the right to be left alone---the most comprehensive of rights and the right most valued by civilized men."

Louis Brandeis

 
 
     
 

Page Two

Thursday, January 22, 2004

Internet Metaphors

We are accustomed to using metaphors to describe things to others. But the specific metaphors we use have a way of shaping others' understanding and expectations of a given phenomena as well as their approaches to it. Thus, if one defines 'international terrorism' as any act of violence against the United States, this definition will have different implications for our behavior than one based upon a narrower definition. It will also have a major impact on the way we view our options.

Similarly, our views of the Internet are shaped by the metaphors that are used to describe it. Although it is not always apparent, the experience of exploring or 'surfing' the Internet has been captured in many different ways, some of them mutually exclusive.

Read the following essays in your Reader:

Jonathan Katz, "Birth of a Digital Nation," WIRED, Issue 5.04, April 1997

Alfred C. Yen, "Western Frontier or Feudal Society?: Metaphors and Perceptions in Cyberspace," Berkeley Tech. L. J., 2002

Jonathan Rosen, The Talmud and the Internet (Farrar, Straus & Giroux), selections

As you read these essays, ask yourself the following questions: 1) What Net metaphors are the authors using and how do they differ?; 2) Which of these metaphors corresponds most directly to your own use of the Net? It's conceivable that you experience combinations of these descriptions. But is it possible that you could experience all of them simultaneously? Finally, 3) What are the implications of each of these metaphors for our understanding of the world we live in. Does our choice of metaphors actually matter?

Practical assignment: Visit Google's Website. Ask yourself which of the three metaphors best describes your Google experience. Second, go to Google's Services page and determine which metaphor Google would most like to use to define itself.

One extremely interesting page outlines Google search patterns, and then breaks them down according to subjects and countries.

It's hard to know how to contact Google, but one might begin here:

Consumer PR
Eileen Rodriguez
+1.650.623.4235
eileen@google.com

Ideally the best people to contact would be its co-founders: Sergey Brin and Larry Page. I could only find old Stanford addresses for them. I challenge you to do better. It would be interesting to converse with them about Google's founding philosophy.

 

Satisfied Google Users Say...

Message from: Terry

"After 34 years of not knowing who my father was, I typed his name into Google.com and found a link that I thought might help me. I sent an email to the link's website contact who then forwarded my information to my father. Two days later, I received a 3-page email from the man who I thought might be my father – it was indeed him. He had also been looking for me for years, but to no avail. I just wanted to say thank you, as I now have the opportunity to meet my father, introduce him to his new grandson, and meet my two half-brothers and a half-sister. Mainly, I just wanted to say thank you."

Message from: Ann

"I just wanted to let you know that Google may well have saved my life. My sons and I were walking home from having eaten out. A half block from my house, I felt this pressure building in my chest. Immediately, I thought, 'heart attack' and ran through how I'd been feeling that the day (I had been nauseated). My first thought was, 'confirm suspicions,' and immediately, upon arriving home, I went to google and typed in 'heart attack.' I kept thinking, 'you only have minutes...' I found a site that listed symptoms. Indeed, I was having a heart attack. I was at the Albany fire station within minutes. Five baby aspirin later, and a few squirts of nitro and I was in the ambulance on my way to the hospital. The good news is, I have no residual damage. My heart is back to normal. Thank you for providing the Google search engine. I'm sure my recovery was complete because of the speed within which I was able to get help."

 
 
 

REQUIREMENTS

WEB-CT

A. JAMES MCADAMS

NOTRE DAME

Print Page

Page Three

Tuesday, January 27, 2004

The American Idea of Privacy

Read the Fourth Amendment closely. What does this amendment have to do with privacy? What guidance does it give to public officials? To what extent do citizens have privacy? What word is missing in this amendment?

Fourth Amendment: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

Robert Ellis Smith's book, Ben Franklin's Website (see reviews on this link), will give you some ideas about both the evolution and the content of the American concept of privacy. Read the chapters in the book corresponding to the following words: "Watchfulness" "Serenity," and--for ways of understanding the concept of privacy in American Constitutional interpretation--"Brandeis."

For Smith's views on the 'top ten myths about privacy', watch this video (30+ mins.) In this talk, Smith frequently refers to a top privacy site, epic.org. Smith himself is the publisher of a similar site, Privacy Journal.

Why is personal privacy such an important part of American culture? At the same time, why are we still inclined, arguably more than most liberal societies, to place limits on personal privacy (e.g., what we read, what we look at)? Or is it just a matter of other societies placing different limits on personal privacy? How does any liberal society maintain an appropriate balance between the basic right to privacy and behavior that is purportedly excessive or corrupting? Or should we be able to do absolutely anything we want in the 'privacy' of our own home?

Group Assignment: Contact Smith and ask him a question about the readings above. ellis84e@ma.ultranet.com.

 

 
 
 

 

Page Four

Thursday, January 29, 2004

Digital Paranoia: Am I Being Watched?

In this section, we will consider some well-known threats to our privacy that emerge from the Internet. There are two questions I wish to consider: 1) Whether or to what extent our privacy is actually being threatened; and 2) If our privacy is being threatened, how this condition has come to pass. Is the loss of privacy something that is being done to us? Or have we somehow acquiesced to our loss of privacy?

A Three-Part Assignment:

1. For background Reading, read "Cyberspace" in Robert Ellis Smith, Ben Franklin's Website (which you own).

Then, contrast Karen Coyle's argument about the loss of privacy, "Privacy or Paranoia," with Amitai Etzioni's reasoning about the same subject in "The Hyper-hyping of Privacy." Both of these articles are in your reader.

2. How much of a threat to my privacy is represented by the Internet? Reflect upon possible answers to this question by considering each of the following topics:

a. The threat from 'cookies':

What are cookies anyway?

Why are advertisers interested in me?

Why are cookies not as bad as they seem (or, so say some people)? This site may be down. If so, try Network Advertising Initiative (NAI).

How cookies can be justified according to the law.

What can these people learn about me?

Do I have no say in all of this?

b. The threat from 'spam' and 'spyware':

Spam Predictions

What can pop-ups do for you (or, so we are told)?

Will the Can-Spam Act of 2003 work?: Yes! versus No!

The Spies from Cydoor: go to 'Support,' then 'FAQ'

c. Contact the marketing people at Cydoor or Gator/Claria, and ask them how they justify their use of spyware and/or why they prefer opt-out policies for consumers rather than opt-in. On the subject of cookies, there are email links for the NAI site above ( nai@networkadvertising.org), or Double Click (privacy@doubleclick.net ), or Jupiter (privacy@bitpipe.com)

(The Cydoor links worked on one of my computers but not on the other; I don't know why. Interestingly, if you go to the most notorious marketer of spyware, CommonName, you will see that ND has blocked it).

 

 

 
 

REQUIREMENTS

WEB-CT

A. JAMES MCADAMS

NOTRE DAME

Print Page

 

Page Five

Tuesday, February 3, 2004

The Conversation

What is entailed by the deliberate violation of personal privacy?

Both in class and in the evening, we will have a 'private' showing of Francis Ford Coppola's masterpiece, The Conversation. Coppola made the film, which stars Gene Hackman in one of his finest screen roles, between the production of Godfather I and Godfather II. Although the latter films are more glamorous, The Conversation is more intellectually probing. I find it just as disturbing as the two Godfathers, though in a psychological and not a physical sense.

As you watch the film, look for answers to its two primary themes: 1) How do you hurt someone when you violate their privacy? and 2) How do you hurt yourself in the process?

Both themes are integrally related to the subject matter of this course.

Some viewers of the film are disappointed with its final scene because it doesn't seem to fit into the rest of the movie. Of course, paranoia isn't your typical bread and butter material for Hollywood. But if you look closely throughout the film, you will recognize that the concluding event does in fact make perfect sense. It's just that not everything is as it appears. Clue: At what point does Harry Caul's Real Life descend into Virtual Reality?

Please reserve both this class period and Tuesday evening for watching the entire film. On a later date, I will tell you the evening location. I will also provide dinner.

 

 
     
 

Page Six

Thursday, February 5

The Private Realm: A Wrapping-Up

As you know, I've added this section to give us a little more time to discuss "The Conversation" and to review the material we have covered in this section of the course. From "Private Realms," we now move on to a discussion of "Public Realms." This topic implies three sets of questions: 1) What is the relationship between "private" and "public"? 2) To what extent has this relationship changed as a result of the Internet Revolution (Or is it a revolution?); and, 3) What should we do to modify this relationship when we feel change is appropriate or necessary?

 

Essay Assignment, due by class time, next Thursday, February 12.

Please write a two-page, typed, double-spaced response to the following question. Because you have limited space (but lots of time), you should craft your essay as carefully as possible. Be clear, concise, organized, and persuasive.

"Whose view of human nature is correct, Katz's or Sunstein's? Take a stand on this question and explain how and why it will decisively influence your assessment of the Internet's value."

This essay will be graded. It's fine with me if you want to discuss the question with each other on the WebCT discussion page. You do not have to do this if you don't want to. Make sure you have read at least the first half of Sunstein's book by class time on Tuesday!

 

 
A. James McAdams / Nanovic Institute for European Studies / Department of Political Science / amcadams@nd.edu